{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:00:49Z","timestamp":1768420849775,"version":"3.49.0"},"reference-count":122,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Cal Poly SURP"},{"name":"Cal Poly RSCA"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1319680"],"award-info":[{"award-number":["CCF-1319680"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2020,4,1]]},"DOI":"10.1109\/tse.2018.2861735","type":"journal-article","created":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T21:39:56Z","timestamp":1533073196000},"page":"420-441","source":"Crossref","is-referenced-by-count":18,"title":["Leveraging Historical Associations between Requirements and Source Code to Identify Impacted Classes"],"prefix":"10.1109","volume":"46","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6340-0058","authenticated-orcid":false,"given":"Davide","family":"Falessi","sequence":"first","affiliation":[]},{"given":"Justin","family":"Roll","sequence":"additional","affiliation":[]},{"given":"Jin L.C.","family":"Guo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9436-5606","authenticated-orcid":false,"given":"Jane","family":"Cleland-Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.66"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76440-3_4"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/spe.986"},{"key":"ref32","first-page":"30","article-title":"Evolving trace links between requirements and code across multiple versions of a software system","author":"rahimi","year":"2016","journal-title":"Intl Conf Software Maintenance and Evolution"},{"key":"ref31","first-page":"311","article-title":"Bleu: A method for automatic evaluation of machine translation","author":"papineni","year":"2002","journal-title":"Proc 40th Annu Meet Assoc Comput Linguist"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3115\/1631862.1631865"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/32.859533"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2479217"},{"key":"ref35","first-page":"356","article-title":"Poirot: A distributed tool supporting enterprise-wide automated traceability","author":"lin","year":"2006","journal-title":"Proc 14th IEEE Int Conf Requirements Eng"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TEFSE.2013.6620156"},{"key":"ref28","first-page":"163","article-title":"SEMILAR: The semantic similarity toolkit","author":"rus","year":"2013","journal-title":"Proc 51st Annu Meeting Assoc Comput Linguistics\/Proc Conf Syst Demonstrations"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3115\/1034678.1034693"},{"key":"ref29","first-page":"157","article-title":"A comparison of greedy and optimal assessment of natural language student input using word-to-word similarity metrics","author":"rus","year":"2012","journal-title":"Proc 7th Workshop Building Educational Appl Using NLP"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595716"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227244"},{"key":"ref21","first-page":"1930","article-title":"A comparative study of stemming algorithms","volume":"2","author":"jivani","year":"2011","journal-title":"Int J Comput Appl Technol"},{"key":"ref24","article-title":"Semantic Measures Library and Toolkit.","year":"2013"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9339-3"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/13487689.13487691"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.43"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3982-4"},{"key":"ref51","author":"mitchell","year":"1997","journal-title":"Machine Learning"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1097\/00005053-195707000-00032","article-title":"Nonparametric statistics for the behavioral sciences","volume":"125","author":"siegel","year":"1957","journal-title":"The Journal of Nervous and Mental Disease"},{"key":"ref58","article-title":"Data mining: Practical machine learning tools and techniques","author":"witten","year":"2016"},{"key":"ref57","first-page":"271","article-title":"Comparative study of attribute selection using gain ratio and correlation based feature selection","volume":"2","author":"karegowda","year":"2010","journal-title":"Int J Inf Technol Knowl Manage"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1126\/science.103.2684.677"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/BF00125812"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134349"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/PROMISE.2007.10"},{"key":"ref52","article-title":"Information gain versus gain ratio: A study of split method biases","author":"harris","year":"2002","journal-title":"AMAI"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1294948.1294953"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1996.564987"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.01.006"},{"key":"ref6","first-page":"47","author":"wetzlmaier","year":"2015","journal-title":"Improving Manual Change Impact Analysis with Tool Support A Study in an Industrial Project"},{"key":"ref5","first-page":"109","article-title":"Do developers benefit from requirements traceability when evolving and maintaining a software system?","author":"m\u00e4der","year":"2016","journal-title":"Proceedings of Software Engineering Fachtagung des GIFachbereichs Softwaretechnik"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2377656.2377660"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MTD.2015.7332623"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593891"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.28"},{"key":"ref45","author":"fowler","year":"1999","journal-title":"Refactoring Improving the Design of Existing Code"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.32"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3084226.3084239"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.111"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"ref44","first-page":"419","article-title":"Component metrics to measure component quality","author":"cho","year":"2001","journal-title":"Proc Asia-Pacific Software Eng Conf"},{"key":"ref43","article-title":"Sonarqube","author":"sonarsource","year":"2018"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.2307\/2340521"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.2307\/2347628"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9460-6"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1214\/09-SS054"},{"key":"ref77","author":"witten","year":"2005","journal-title":"Data Mining Practical Machine Learning Tools and Techniques"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9233-9"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SST.2015.13"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-X_40"},{"key":"ref79","first-page":"1","article-title":"Curating github for engineered software projects","volume":"22","author":"munaiah","year":"2016","journal-title":"Empirical Softw Eng"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00043-X"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50023-4"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00043-X"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-011-9173-9"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985859"},{"key":"ref66","first-page":"230","article-title":"Comparative analysis of serial decision tree classification algorithms","volume":"3","author":"anyanwu","year":"2009","journal-title":"Int J Comput Sci Secur"},{"key":"ref67","first-page":"417","article-title":"Robust prediction of fault-proneness by random forests","author":"guo","year":"2004","journal-title":"Proc 15th Int Symp Softw Rel Eng"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889252"},{"key":"ref69","first-page":"41","article-title":"A comparison of event models for naive bayes text classification","volume":"752","author":"mccallum","year":"1998","journal-title":"Proc AAAI Workshop Learn Text Categorization"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2893462"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806817"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138008"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.17"},{"key":"ref94","article-title":"Analyzing the impact of changing software requirements: A traceability-based methodology","author":"o'neal","year":"2003"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357816"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.07.002"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1183929"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.03.002"},{"key":"ref105","first-page":"53","article-title":"Feature location in source code: A taxonomy and survey","volume":"25","author":"dit","year":"2013","journal-title":"Journal of Software: Evolution and Process"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/IWSE.2005.1"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9441-9"},{"key":"ref90","article-title":"A review of software change impact analysis","author":"lehnert","year":"2011"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.43"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.52"},{"key":"ref111","first-page":"133","article-title":"On integrating orthogonal information retrieval methods to improve traceability link recovery","author":"gethers","year":"2011","journal-title":"Proc IEEE Intern Conf on Software Maintenance"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0121-4"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491432"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.101"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.17"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1475"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.32"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/smr.366"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2016.9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.72"},{"key":"ref14","first-page":"175","article-title":"Extending software change impact analysis into cots components","author":"bohner","year":"2002","journal-title":"Software Engineering Workshop Proceedings 27th Annual NASA Goddard\/IEEE"},{"key":"ref15","first-page":"439","article-title":"Program slicing","author":"weiser","year":"1981","journal-title":"5th Int Conf on Software Engineering"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.83"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/32.83912"},{"key":"ref82","first-page":"151","article-title":"Stress: A semi-automated, fully replicable approach","author":"falessi","year":"2017","journal-title":"Proc Int Symp On Empirical Software Engineering"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.24"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2024445.2024454"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2347736.2347755"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1978802.1978812"},{"key":"ref84","article-title":"Apache ignite project.","year":"2018"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2003.1232454"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180207"},{"key":"ref83","article-title":"Apache accumulo project.","year":"2018"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636704"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00242-5"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.28"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491415"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985898"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(98)10019-5"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312987"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9513-5"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901740"},{"key":"ref85","article-title":"Apache isis project","year":"2018"},{"key":"ref86","article-title":"Apache tika project","year":"2018"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312975"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.122"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9069393\/08423658.pdf?arnumber=8423658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:34:37Z","timestamp":1651070077000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8423658\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":122,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tse.2018.2861735","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}