{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,19]],"date-time":"2026-05-19T13:20:04Z","timestamp":1779196804535,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CCF-1927679"],"award-info":[{"award-number":["CCF-1927679"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3377811.3380418","type":"proceedings-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T18:25:34Z","timestamp":1601576734000},"page":"873-885","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Improving the effectiveness of traceability link recovery using hierarchical bayesian networks"],"prefix":"10.1145","author":[{"given":"Kevin","family":"Moran","sequence":"first","affiliation":[{"name":"William &amp; Mary"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David N.","family":"Palacio","sequence":"additional","affiliation":[{"name":"William &amp; Mary"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carlos","family":"Bernal-C\u00e1rdenas","sequence":"additional","affiliation":[{"name":"William &amp; Mary"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel","family":"McCrystal","sequence":"additional","affiliation":[{"name":"William &amp; Mary"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Denys","family":"Poshyvanyk","sequence":"additional","affiliation":[{"name":"William &amp; Mary"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chris","family":"Shenefiel","sequence":"additional","affiliation":[{"name":"Research Group"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeff","family":"Johnson","sequence":"additional","affiliation":[{"name":"Cisco Security and Trust Engineering"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2020,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. CoEST Traceability Datasets http:\/\/sarec.nd.edu\/coest\/datasets.html."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. Comet Online Appendix https:\/\/semeru-code-public.gitlab.io\/Project-Websites\/comet-website."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. The Jenkins Automation Framework https:\/\/jenkins.io."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. Theano Library http:\/\/deeplearning.net\/software\/theano\/."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the International Conference on Software Maintenance (ICSE'00)","author":"Lucia De","year":"2000","unstructured":"Antoniol, Canfora, Casazza, and De Lucia. 2000. Information retrieval models for recovering traceability links between code and documentation. In Proceedings of the International Conference on Software Maintenance (ICSE'00). 40--49."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering -","volume":"1","author":"Asuncion Hazeline U.","unstructured":"Hazeline U. Asuncion, Arthur U. Asuncion, and Richard N. Taylor. 2010. Software Traceability with Topic Modeling. In Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering - Volume 1 (ICSE '10). 95--104."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Robert Bassett and Julio Deride. 2018. Maximum a posteriori estimators as a limit of Bayes estimators.","DOI":"10.1007\/s10107-018-1241-0"},{"key":"e_1_3_2_1_9_1","first-page":"5","article-title":"Program Understanding and the Concept Assignment","volume":"37","author":"Biggerstaff Ted J.","year":"1994","unstructured":"Ted J. Biggerstaff, Bharat G. Mitbander, and Dallas E. Webster. 1994. Program Understanding and the Concept Assignment Problem. Commun. ACM 37, 5 (May 1994), 72--82.","journal-title":"Problem. Commun. ACM"},{"key":"e_1_3_2_1_10_1","volume-title":"Pattern Recognition and Machine Learning (Information Science and Statistics)","author":"Bishop Christopher M.","unstructured":"Christopher M. Bishop. 2006. Pattern Recognition and Machine Learning (Information Science and Statistics). Springer-Verlag New York, Inc."},{"key":"e_1_3_2_1_11_1","volume-title":"SUS: A quick and dirty usability scale. In Usability evaluation in industry","author":"Brooke J.","year":"1996","unstructured":"J. Brooke. 1996. SUS: A quick and dirty usability scale. In Usability evaluation in industry, P. W. Jordan, B. Weerdmeester, A. Thomas, and I. L. Mclelland (Eds.). Taylor and Francis."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1232285"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806825"},{"key":"e_1_3_2_1_14_1","volume-title":"Software and Systems Traceability","author":"Cleland-Huang Jane","unstructured":"Jane Cleland-Huang, Orlena Gotel, and Andrea Zisman. 2012. Software and Systems Traceability. Springer Publishing Company, Incorporated."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593891"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2666612"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.43"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2006.32"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.14"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9090-8"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.17"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9460-6"},{"key":"e_1_3_2_1_23_1","volume-title":"Bayesian Data Analysis in Empirical Software Engineering Research","author":"Furia Carlo A.","year":"1811","unstructured":"Carlo A. Furia, Robert Feldt, and Richard Torkar. 2019. Bayesian Data Analysis in Empirical Software Engineering Research. IEEE Transactions on Software Engineering abs\/1811.05422 (2019)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.47"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the International Conference on Software Maintenance (ICSM'11)","author":"Gethers M.","unstructured":"M. Gethers, R. Oliveto, D. Poshyvanyk, and A. D. Lucia. 2011. On integrating orthogonal information retrieval methods to improve traceability recovery. In Proceedings of the International Conference on Software Maintenance (ICSM'11). 133--142."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.9"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901740"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.3"},{"key":"e_1_3_2_1_29_1","volume-title":"Hoffman and Andrew Gelman","author":"Matthew","year":"2011","unstructured":"Matthew D. Hoffman and Andrew Gelman. 2011. The No-U-Turn Sampler: Adaptively Setting Path Lengths in Hamiltonian Monte Carlo. (2011)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.16"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1987856.1987862"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884610"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491428"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491432"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 20th IEEE International Conference on Software Maintenance, 2004. Proceedings. (ICSM'04)","author":"Lucia A. De","unstructured":"A. De Lucia, F. Fasano, R. Oliveto, and G. Tortora. 2004. Enhancing an artefact management system with traceability recovery features. In Proceedings of the 20th IEEE International Conference on Software Maintenance, 2004. Proceedings. (ICSM'04). 306--315."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.60"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 20th IEEE International Conference on Program Comprehension (ICPC'12)","author":"Mahmoud A.","unstructured":"A. Mahmoud, N. Niu, and S. Xu. 2012. A semantic relatedness approach for traceability link recovery. In Proceedings of the 20th IEEE International Conference on Program Comprehension (ICPC'12). 183--192."},{"key":"e_1_3_2_1_38_1","volume-title":"classifying, and tracing non-functional software requirements. Requirements Engineering 21, 3 (01","author":"Mahmoud Anas","year":"2016","unstructured":"Anas Mahmoud and Grant Williams. 2016. Detecting, classifying, and tracing non-functional software requirements. Requirements Engineering 21, 3 (01 Sep 2016), 357--381."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 25th International Conference on Software Engineering (ICSE '03)","author":"Marcus Andrian","unstructured":"Andrian Marcus and Jonathan I. Maletic. 2003. Recovering Documentation-to-source-code Traceability Links Using Latent Semantic Indexing. In Proceedings of the 25th International Conference on Software Engineering (ICSE '03). IEEE Computer Society, Washington, DC, USA, 125--135."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEFSE.2009.5069582"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00045"},{"key":"e_1_3_2_1_42_1","unstructured":"Peter Morville. 2020. User Experience Design. http:\/\/semanticstudios.com\/user_experience_design\/."},{"key":"e_1_3_2_1_43_1","volume-title":"Machine Learning: A Probabilistic Perspective","author":"Murphy Kevin P.","year":"2012","unstructured":"Kevin P. Murphy. 2012. Machine Learning: A Probabilistic Perspective. The MIT Press."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.01.005"},{"key":"e_1_3_2_1_45_1","volume-title":"Outline of a Theory of Statistical Estimation Based on the Classical Theory of Probability","author":"Neyman J.","unstructured":"J. Neyman. 1937. Outline of a Theory of Statistical Estimation Based on the Classical Theory of Probability. Royal Society. https:\/\/books.google.com\/books?id=jqBtGwAACAAJ"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/2821445.2821454"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332517"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2010.20"},{"key":"e_1_3_2_1_49_1","unstructured":"H. Ra\u00efffa and R. Schlaifer. 1961. Applied statistical decision theory. Division of Research Graduate School of Business Adminitration Harvard University. https:\/\/books.google.com\/books?id=wPBLAAAAMAAJ"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180207"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126905"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568290"},{"key":"e_1_3_2_1_53_1","unstructured":"George Spanoudakis Artur S d'Avila Garcez and Andrea Zisman. 2003. Revising Rules to Capture Requirements Traceability Relations: A Machine Learning Approach.. In SEKE (SEKE'03). 570--577."}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","location":"Seoul South Korea","acronym":"ICSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"]},"container-title":["Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380418","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377811.3380418","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377811.3380418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:40Z","timestamp":1750200100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380418"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":53,"alternative-id":["10.1145\/3377811.3380418","10.1145\/3377811"],"URL":"https:\/\/doi.org\/10.1145\/3377811.3380418","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}