{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T05:55:08Z","timestamp":1726120508522},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030731274"},{"type":"electronic","value":"9783030731281"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-73128-1_1","type":"book-chapter","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T11:04:01Z","timestamp":1617275041000},"page":"3-18","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Is Requirements Similarity a Good Proxy for Software Similarity? An Empirical Investigation in Industry"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Abbas","sequence":"first","affiliation":[]},{"given":"Alessio","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"Anas","family":"Shatnawi","sequence":"additional","affiliation":[]},{"given":"Eduard Paul","family":"Enoiu","sequence":"additional","affiliation":[]},{"given":"Mehrdad","family":"Saadatmand","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,2]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abbas, M., Jongeling, R., Lindskog, C., Enoiu, E.P., Saadatmand, M., Sundmark, D.: Product line adoption in industry: an experience report from the railway domain. In: Proceedings of the 24th ACM Conference on Systems and Software Product Line: Volume A - Volume A. SPLC 2020. ACM, New York (2020)","DOI":"10.1145\/3382025.3414953"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-030-64694-3_11","volume-title":"Reuse in Emerging Software Engineering Practices","author":"M Abbas","year":"2020","unstructured":"Abbas, M., Saadatmand, M., Enoiu, E., Sundamark, D., Lindskog, C.: Automated reuse recommendation of product line assets based on natural language requirements. In: Ben Sassi, S., Ducasse, S., Mili, H. (eds.) Reuse in Emerging Software Engineering Practices, pp. 173\u2013189. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64694-3_11"},{"issue":"10","key":"1_CR3","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/TSE.2016.2635134","volume":"43","author":"C Arora","year":"2016","unstructured":"Arora, C., Sabetzadeh, M., Briand, L., Zimmer, F.: Automated extraction and clustering of requirements glossary terms. Trans. Soft. Eng. 43(10), 918\u2013945 (2016)","journal-title":"Trans. Soft. Eng."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Arora, C., Sabetzadeh, M., Goknil, A., Briand, L.C., Zimmer, F.: Change impact analysis for natural language requirements: an NLP approach. In: International Requirements Engineering Conference (RE), pp. 6\u201315. IEEE (2015)","DOI":"10.1109\/RE.2015.7320403"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"P Bojanowski","year":"2017","unstructured":"Bojanowski, P., Grave, E., Joulin, A., Mikolov, T.: Enriching word vectors with subword information. Trans. Assoc. Comput. Linguist. 5, 135\u2013146 (2017)","journal-title":"Trans. Assoc. Comput. Linguist."},{"issue":"6","key":"1_CR6","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1007\/s10664-013-9255-y","volume":"19","author":"M Borg","year":"2014","unstructured":"Borg, M., Runeson, P., Ard\u00f6, A.: Recovering from a decade: a systematic mapping of information retrieval approaches to software traceability. Empir. Softw. Eng. 19(6), 1565\u20131616 (2014). https:\/\/doi.org\/10.1007\/s10664-013-9255-y","journal-title":"Empir. Softw. Eng."},{"issue":"7","key":"1_CR7","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/TSE.2016.2620458","volume":"43","author":"M Borg","year":"2016","unstructured":"Borg, M., Wnuk, K., Regnell, B., Runeson, P.: Supporting change impact analysis using a recommendation system: an industrial case study in a safety-critical context. IEEE Trans. Soft. Eng. 43(7), 675\u2013700 (2016)","journal-title":"IEEE Trans. Soft. Eng."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Castro-Herrera, C., Cleland-Huang, J., Mobasher, B.: Enhancing stakeholder profiles to improve recommendations in online requirements elicitation. In: International Requirements Engineering Conference, pp. 37\u201346. IEEE (2009)","DOI":"10.1109\/RE.2009.20"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Natt och Dag, J., Regnell, B., Gervasi, V., Brinkkemper, S.: A linguistic-engineering approach to large-scale requirements management. IEEE Softw. 22(1), 32\u201339 (2005)","DOI":"10.1109\/MS.2005.1"},{"key":"1_CR10","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Dumitru, H., et al.: On-demand feature recommendations derived from mining public product descriptions. In: International Conference on Software Engineering, pp. 181\u2013190 (2011)","DOI":"10.1145\/1985793.1985819"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Eyal-Salman, H., Seriai, A.D., Dony, C.: Feature-to-code traceability in a collection of software variants: combining formal concept analysis and information retrieval. In: 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI), pp. 209\u2013216 (2013)","DOI":"10.1109\/IRI.2013.6642474"},{"issue":"1","key":"1_CR13","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/TSE.2011.122","volume":"39","author":"D Falessi","year":"2011","unstructured":"Falessi, D., Cantone, G., Canfora, G.: Empirical principles and an industrial case study in retrieving equivalent requirements via natural language processing techniques. Trans. Softw. Eng. 39(1), 18\u201344 (2011)","journal-title":"Trans. Softw. Eng."},{"key":"1_CR14","unstructured":"Felfernig, A., Falkner, A., Atas, M., Franch, X., Palomares, C.: OpenReq: recommender systems in requirements engineering. In: RS-BDA, pp. 1\u20134 (2017)"},{"issue":"5","key":"1_CR15","doi-asserted-by":"publisher","first-page":"2298","DOI":"10.1007\/s10664-016-9451-7","volume":"22","author":"DM Fern\u00e1ndez","year":"2017","unstructured":"Fern\u00e1ndez, D.M., et al.: Naming the pain in requirements engineering. Empir. Softw. Eng. 22(5), 2298\u20132338 (2017)","journal-title":"Empir. Softw. Eng."},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Ferrari, A., Spagnolo, G.O., Gnesi, S.: Pure: a dataset of public requirements documents. In: 2017 IEEE 25th International Requirements Engineering Conference (RE), pp. 502\u2013505 (2017). https:\/\/doi.org\/10.1109\/RE.2017.29","DOI":"10.1109\/RE.2017.29"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Gervasi, V., Zowghi, D.: Supporting traceability through affinity mining. In: International Requirements Engineering Conference (RE), pp. 143\u2013152. IEEE (2014)","DOI":"10.1109\/RE.2014.6912256"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Guo, J., Cheng, J., Cleland-Huang, J.: Semantically enhanced software traceability using deep learning techniques. In: International Conference on Software Engineering (ICSE), pp. 3\u201314. IEEE (2017)","DOI":"10.1109\/ICSE.2017.9"},{"key":"1_CR19","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-642-45135-5_17","volume-title":"Recommendation Systems in Software Engineering","author":"N Hariri","year":"2014","unstructured":"Hariri, N., Castro-Herrera, C., Cleland-Huang, J., Mobasher, B.: Recommendation systems in requirements discovery. In: Robillard, M.P., Maalej, W., Walker, R.J., Zimmermann, T. (eds.) Recommendation Systems in Software Engineering, pp. 455\u2013476. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-45135-5_17"},{"key":"1_CR20","first-page":"223","volume":"93","author":"M Irshad","year":"2018","unstructured":"Irshad, M., Petersen, K., Poulding, S.: A systematic literature review of software requirements reuse approaches. IST J. 93, 223\u2013245 (2018)","journal-title":"IST J."},{"issue":"2065","key":"1_CR21","doi-asserted-by":"publisher","first-page":"20150202","DOI":"10.1098\/rsta.2015.0202","volume":"374","author":"IT Jolliffe","year":"2016","unstructured":"Jolliffe, I.T., Cadima, J.: Principal component analysis: a review and recent developments. Philos. Trans. Royal Soc. A: Math. Phys. Eng. Sci. 374(2065), 20150202 (2016)","journal-title":"Philos. Trans. Royal Soc. A: Math. Phys. Eng. Sci."},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/3-540-47833-7_25","volume-title":"Software Product-Family Engineering","author":"CW Krueger","year":"2002","unstructured":"Krueger, C.W.: Easing the transition to software mass customization. In: van der Linden, F. (ed.) PFE 2001. LNCS, vol. 2290, pp. 282\u2013293. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-47833-7_25"},{"key":"1_CR23","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. In: International Conference on Machine Learning, pp. 1188\u20131196 (2014)"},{"key":"1_CR24","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-0-387-85820-3_3","volume-title":"Recommender Systems Handbook","author":"P Lops","year":"2011","unstructured":"Lops, P., de Gemmis, M., Semeraro, G.: Content-based recommender systems: state of the art and trends. In: Ricci, F., Rokach, L., Shapira, B., Kantor, P.B. (eds.) Recommender Systems Handbook, pp. 73\u2013105. Springer, Boston, MA (2011). https:\/\/doi.org\/10.1007\/978-0-387-85820-3_3"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Manning, C.D., Sch\u00fctze, H., Raghavan, P.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008)","DOI":"10.1017\/CBO9780511809071"},{"key":"1_CR26","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space (2013)"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Nyamawe, A.S., Liu, H., Niu, N., Umer, Q., Niu, Z.: Automated recommendation of software refactorings based on feature requests. In: International Requirements Engineering Conference (RE), pp. 187\u2013198. IEEE (2019)","DOI":"10.1109\/RE.2019.00029"},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-77243-1_19","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"C Palomares","year":"2018","unstructured":"Palomares, C., Franch, X., Fucci, D.: Personal recommendations in requirements engineering: the OpenReq approach. In: Kamsties, E., Horkoff, J., Dalpiaz, F. (eds.) REFSQ 2018. LNCS, vol. 10753, pp. 297\u2013304. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-77243-1_19"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Pohl, K., B\u00f6ckle, G., van Der Linden, F.J.: Software Product Line Engineering: Foundations, Principles and Techniques. Springer, Heidelberg (2005)","DOI":"10.1007\/3-540-28901-1"},{"issue":"11","key":"1_CR30","first-page":"1016","volume":"8","author":"L Prechelt","year":"2002","unstructured":"Prechelt, L., Malpohl, G., Philippsen, M., et al.: Finding plagiarisms among a set of programs with JPlag. J. UCS 8(11), 1016 (2002)","journal-title":"J. UCS"},{"key":"1_CR31","unstructured":"\u0158eh\u016f\u0159ek, R., Sojka, P.: Software framework for topic modelling with large corpora. In: Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks, pp. 45\u201350. ELRA, May 2010"},{"key":"1_CR32","doi-asserted-by":"publisher","unstructured":"Robillard, M.P., Maalej, W., Walker, R.J., Zimmermann, T. (eds.): Recommendation Systems in Software Engineering. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-45135-5","DOI":"10.1007\/978-3-642-45135-5"},{"issue":"2","key":"1_CR33","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Empir. Softw. Eng. 14(2), 131\u2013164 (2009)","journal-title":"Empir. Softw. Eng."},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Shatnawi, A., Seriai, A., Sahraoui, H., Ziadi, T., Seriai, A.: Reside: reusable service identification from software families. JSS 170 (2020)","DOI":"10.1016\/j.jss.2020.110748"},{"key":"1_CR35","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.jss.2016.07.039","volume":"131","author":"A Shatnawi","year":"2017","unstructured":"Shatnawi, A., Seriai, A.D., Sahraoui, H.: Recovering software product line architecture of a family of object-oriented product variants. J. Syst. Softw. 131, 325\u2013346 (2017)","journal-title":"J. Syst. Softw."},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"White, M., Tufano, M., Vendome, C., Poshyvanyk, D.: Deep learning code fragments for code clone detection. In: International Conference on Automated Software Engineering (ASE), pp. 87\u201398. IEEE (2016)","DOI":"10.1145\/2970276.2970326"},{"key":"1_CR37","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.scico.2014.11.013","volume":"101","author":"R Wieringa","year":"2015","unstructured":"Wieringa, R., Daneva, M.: Six strategies for generalizing software engineering theories. Sci. Comput. Program. 101, 136\u2013152 (2015)","journal-title":"Sci. Comput. Program."},{"key":"1_CR38","unstructured":"Zhao, L., et al.: Natural language processing (NLP) for requirements engineering: A systematic mapping study. arXiv preprint arXiv:2004.01099 (2020)"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Ziadi, T., Frias, L., da Silva, M.A.A., Ziane, M.: Feature identification from the source code of product variants. In: 2012 16th European Conference on Software Maintenance and Reengineering, pp. 417\u2013422. IEEE (2012)","DOI":"10.1109\/CSMR.2012.52"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-73128-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T14:58:36Z","timestamp":1710341916000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-73128-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030731274","9783030731281"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-73128-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"2 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"REFSQ","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Working Conference on Requirements Engineering: Foundation for Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"refsq2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2021.refsq.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}