{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T12:05:27Z","timestamp":1769601927068,"version":"3.49.0"},"reference-count":130,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T00:00:00Z","timestamp":1740787200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1109\/tse.2025.3534027","type":"journal-article","created":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T18:47:03Z","timestamp":1738003623000},"page":"825-832","source":"Crossref","is-referenced-by-count":1,"title":["Recovering Traceability Links Between Code and Documentation: A Retrospective"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7892-9202","authenticated-orcid":false,"given":"Giulio","family":"Antoniol","sequence":"first","affiliation":[{"name":"Department of Computer and Software Engineering, Polytechnique Montreal, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0049-1279","authenticated-orcid":false,"given":"Gerardo","family":"Canfora","sequence":"additional","affiliation":[{"name":"University of Sannio, Benevento, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2522-1527","authenticated-orcid":false,"given":"Gerardo","family":"Casazza","sequence":"additional","affiliation":[{"name":"DENSO International Europe B.V., World Trade Centre, Amsterdam, The Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4238-1425","authenticated-orcid":false,"given":"Andrea","family":"De Lucia","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Salerno, Fisciano, SA, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1436-6076","authenticated-orcid":false,"given":"Ettore","family":"Merlo","sequence":"additional","affiliation":[{"name":"Department of Computer and Software Engineering, Polytechnique Montreal, Montreal, QC, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1994.292398"},{"key":"ref2","volume-title":"Software Change Impact Analysis.","author":"Arnold","year":"1996"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/52.43044"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/52.542294"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/(sici)1097-024x(199610)26:10<1161::aid-spe58>3.0.co;2-x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/32.895989"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"ref8","volume-title":"Modern Information Retrieval","author":"Baeza-Yates","year":"1999"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/32.83915"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2902362"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9255-y"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201194"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1276933.1276934"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.30"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806817"},{"key":"ref18","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"Blei","year":"2003","journal-title":"J. Mach. Learn. Res."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080780"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1214\/09-AOAS309"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.14"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0021-9045(72)90080-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2010.20"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806855"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671312"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2009.39"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.10.019"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1145\/3377811.3380921","article-title":"Establishing multilevel test-to-code traceability links","volume-title":"Proc. 42nd ACM\/IEEE Int. Conf. Softw. Eng.","author":"White","year":"2020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025120"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393671"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2008.109"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9078-4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.58"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-021-00287-w"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510167"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9479-8"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-017-0221-6"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/175290.175300"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1131421.1131424"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321667"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.03.007"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.11.013"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3049735"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-014-0170-2"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1801"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1805"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.08.012"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-017-0226-1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.32"},{"issue":"1","key":"ref51","doi-asserted-by":"crossref","first-page":"2:1","DOI":"10.1145\/2220352.2220354","article-title":"Minersoft: Software retrieval in grid and cloud computing infrastructures","volume":"12","author":"Dikaiakos","year":"2012","journal-title":"ACM Trans. Internet Technol."},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.97"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2900245"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.18"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.043"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2967383"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70768"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9088-2"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1958"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.10.017"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2010.12.004"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.03.015"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321637"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.13"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9285-5"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510149"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9410-8"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-007-0045-1"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.122"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2620458"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1370750.1370771"},{"issue":"4","key":"ref72","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1002\/smr.1710","article-title":"The impact of vocabulary normalization","volume":"27","author":"Binkley","year":"2015","journal-title":"J. Softw. Evol. Process"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2995736"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.89"},{"key":"ref75","first-page":"112","article-title":"A simple rule-based part of speech tagger","volume-title":"Proc. Speech Natural Lang.: Proc. Workshop","author":"Brill","year":"1992"},{"issue":"7","key":"ref76","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1002\/smr.1564","article-title":"Improving ir-based traceability recovery via noun-based indexing of software artifacts","volume":"25","author":"Capobianco","year":"2013","journal-title":"J. Softw. Evol. Process"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.09.009"},{"issue":"2","key":"ref78","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/s10664-014-9315-y","article-title":"An empirical study on the importance of source code entities for requirements traceability","volume":"20","author":"Ali","year":"2015","journal-title":"Empirical Softw. Eng."},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.156"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.16"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.08.002"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.39"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.71"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613840"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2006.32"},{"issue":"2","key":"ref86","doi-asserted-by":"crossref","DOI":"10.1007\/s10664-021-10091-5","article-title":"Propagating frugal user feedback through closeness of code dependencies to improve IR-based traceability recovery","volume":"27","author":"Gao","year":"2022","journal-title":"Empirical Softw. Eng."},{"issue":"1","key":"ref87","doi-asserted-by":"crossref","first-page":"3:1","DOI":"10.1145\/3078841","article-title":"Predicting query quality for applications of text retrieval to software engineering tasks","volume":"26","author":"Mills","year":"2017","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"6","key":"ref88","doi-asserted-by":"crossref","first-page":"159:1","DOI":"10.1145\/3607179","article-title":"A systematic review of automated query reformulations in source code search","volume":"32","author":"Rahman","year":"2023","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME52107.2021.00014"},{"key":"ref90","first-page":"244","article-title":"Clustering support for automated tracing","volume-title":"Proc. 22nd IEEE\/ACM Int. Conf. Automated Softw. Eng.","author":"Duan","year":"2007"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0121-4"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.9"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1145\/3377811.3380418","article-title":"Improving the effectiveness of traceability link recovery using hierarchical Bayesian networks","volume-title":"Proc. 42nd ACM\/IEEE Int. Conf. Softw. Eng.","author":"Moran","year":"2020"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-018-0243-8"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110406"},{"issue":"1","key":"ref96","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10664-021-10050-0","article-title":"Information retrieval versus deep learning approaches for generating traceability links in bilingual projects","volume":"27","author":"Lin","year":"2022","journal-title":"Empirical Softw. Eng."},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606598"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491432"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.97"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.195"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9090-8"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-016-0260-8"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.14"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.08.004"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9460-6"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2239-5"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510129"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.16"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9561-x"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/REW57809.2023.00087"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/3555803"},{"key":"ref112","article-title":"The tailor handbook of trustworthy AI","year":"2022"},{"key":"ref113","article-title":"Securing artificial intelligence (SAI): Traceability of AI models","year":"2024","journal-title":"DTR\/SAI-004, European Telecommunications Standards Institute (ETSI)"},{"key":"ref114","article-title":"Position: Data authenticity, consent, and provenance for AI are all broken: What will it take to fix them?","volume-title":"Proc. 41st Int. Conf. Mach. Learn.","author":"Longpre","year":"2024"},{"key":"ref115","article-title":"Mit: Data provenance for AI","year":"2024"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.07.009"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101318"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3128646"},{"key":"ref119","article-title":"Poisoning attacks and defenses on artificial intelligence: A survey","author":"Ramirez","year":"2022"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2025.103980"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/AICAS54282.2022.9869923"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.110935"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-023-10291-1"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/3561048"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2021.3133846"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00135"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3616865"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/3652155"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-023-10402-y"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1452"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/10930340\/10855629.pdf?arnumber=10855629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:56:07Z","timestamp":1743054967000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10855629\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":130,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3534027","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3]]}}}