{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T04:35:24Z","timestamp":1726806924831},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030984632"},{"type":"electronic","value":"9783030984649"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98464-9_4","type":"book-chapter","created":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T15:03:09Z","timestamp":1646751789000},"page":"35-51","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["How Effective Is Automated Trace Link Recovery in Model-Driven Development?"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3869-280X","authenticated-orcid":false,"given":"Randell","family":"Rasiman","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4480-3887","authenticated-orcid":false,"given":"Fabiano","family":"Dalpiaz","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7343-4270","authenticated-orcid":false,"given":"Sergio","family":"Espa\u00f1a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,9]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, A., Nisenson, M., Simionovici, Y.: A traceability technique for specifications. In: Proceedings of ICPC, pp. 103\u2013112 (2008)","DOI":"10.1109\/ICPC.2008.30"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Aung, T.W.W., Huo, H., Sui, Y.: A literature review of automatic traceability links recovery for software change impact analysis. In: Proceedings of ICPC, pp. 14\u201324 (2020)","DOI":"10.1145\/3387904.3389251"},{"issue":"6","key":"4_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-021-09986-0","volume":"26","author":"DM Berry","year":"2021","unstructured":"Berry, D.M.: Empirical evaluation of tools for hairy requirements engineering tasks. Empir. Softw. Eng. 26(6), 1\u201377 (2021). https:\/\/doi.org\/10.1007\/s10664-021-09986-0","journal-title":"Empir. Softw. Eng."},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-72988-4_21","volume-title":"Advanced Information Systems Engineering","author":"F Blaauboer","year":"2007","unstructured":"Blaauboer, F., Sikkel, K., Aydin, M.N.: Deciding to adopt requirements traceability in practice. In: Krogstie, J., Opdahl, A., Sindre, G. (eds.) CAiSE 2007. LNCS, vol. 4495, pp. 294\u2013308. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72988-4_21"},{"issue":"6","key":"4_CR5","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1007\/s10664-013-9255-y","volume":"19","author":"M Borg","year":"2013","unstructured":"Borg, M., Runeson, P., Ard\u00f6, A.: Recovering from a decade: a systematic mapping of information retrieval approaches to software traceability. Empir. Softw. Eng. 19(6), 1565\u20131616 (2013). https:\/\/doi.org\/10.1007\/s10664-013-9255-y","journal-title":"Empir. Softw. Eng."},{"issue":"5","key":"4_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MS.2017.3571562","volume":"34","author":"L Briand","year":"2017","unstructured":"Briand, L., Bianculli, D., Nejati, S., Pastore, F., Sabetzadeh, M.: The case for context-driven software engineering research: generalizability is overrated. IEEE Softw. 34(5), 72\u201375 (2017)","journal-title":"IEEE Softw."},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"102339","DOI":"10.1016\/j.apor.2020.102339","volume":"104","author":"A Callens","year":"2020","unstructured":"Callens, A., Morichon, D., Abadie, S., Delpey, M., Liquet, B.: Using Random forest and Gradient boosting trees to improve wave forecast at a specific location. Appl. Ocean Res. 104, 102339 (2020)","journal-title":"Appl. Ocean Res."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Capobianco, G., De Lucia, A., Oliveto, R., Panichella, A., Panichella, S.: On the role of the nouns in IR-based traceability recovery. In: Proceedings of the ICPC, pp. 148\u2013157, May 2009","DOI":"10.1109\/ICPC.2009.5090038"},{"issue":"6","key":"4_CR9","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MC.2007.195","volume":"40","author":"J Cleland-Huang","year":"2007","unstructured":"Cleland-Huang, J., Berenbach, B., Clark, S., Settimi, R., Romanova, E.: Best practices for automated traceability. Computer 40(6), 27\u201335 (2007)","journal-title":"Computer"},{"issue":"6","key":"4_CR10","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester, S., Dumais, S.T., Furnas, G.W., Landauer, T.K., Harshman, R.: Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci. 41(6), 391\u2013407 (1990)","journal-title":"J. Am. Soc. Inf. Sci."},{"issue":"3","key":"4_CR11","doi-asserted-by":"publisher","first-page":"996","DOI":"10.1007\/s10664-016-9460-6","volume":"22","author":"D Falessi","year":"2016","unstructured":"Falessi, D., Di Penta, M., Canfora, G., Cantone, G.: Estimating the number of remaining links in traceability recovery. Empir. Softw. Eng. 22(3), 996\u20131027 (2016). https:\/\/doi.org\/10.1007\/s10664-016-9460-6","journal-title":"Empir. Softw. Eng."},{"issue":"4","key":"4_CR12","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/TSE.2018.2861735","volume":"46","author":"D Falessi","year":"2018","unstructured":"Falessi, D., Roll, J., Guo, J.L.C., Cleland-Huang, J.: Leveraging historical associations between requirements and source code to identify impacted classes. IEEE Trans. Software Eng. 46(4), 420\u2013441 (2018)","journal-title":"IEEE Trans. Software Eng."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Ghannem, A., Hamdi, M.S., Kessentini, M., Ammar, H.H.: Search-based requirements traceability recovery: a multi-objective approach. In: Proceedings of the CEC, pp. 1183\u20131190 (2017)","DOI":"10.1109\/CEC.2017.7969440"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-1-4471-2239-5_16","volume-title":"Software and Systems Traceability","author":"O Gotel","year":"2012","unstructured":"Gotel, O., et al.: The grand challenge of traceability (v1.0). In: Cleland-Huang, J., Gotel, O., Zisman, A. (eds.) Software and Systems Traceability, pp. 343\u2013409. Springer, London (2012). https:\/\/doi.org\/10.1007\/978-1-4471-2239-5_16"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Guo, J., Cheng, J., Cleland-Huang, J.: Semantically enhanced software traceability using deep learning techniques. In: Proceedings of ICSE, pp. 3\u201314. IEEE (2017)","DOI":"10.1109\/ICSE.2017.9"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Mills, C., Escobar-Avila, J., Haiduc, S.: Automatic traceability maintenance via machine learning classification. In: Proceedings of ICSME, pp. 369\u2013380, July 2018","DOI":"10.1109\/ICSME.2018.00045"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Mills, C., Haiduc, S.: The impact of retrieval direction on IR-based traceability link recovery. In: Proceedings of ICSE NIER, pp. 51\u201354 (2017)","DOI":"10.1109\/ICSE-NIER.2017.14"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Oliveto, R., Gethers, M., Poshyvanyk, D., De Lucia, A.: On the equivalence of information retrieval methods for automated traceability link recovery. In: Proceedings of ICPC, pp. 68\u201371 (2010)","DOI":"10.1109\/ICPC.2010.20"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Port, D., Nikora, A., Hayes, J.H., Huang, L.: Text mining support for software requirements: traceability assurance. In: Proceedings of HICSS, pp. 1\u201311. E (2011)","DOI":"10.1109\/HICSS.2011.399"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Porter, M.F.: An algorithm for suffix stripping. Program (1980)","DOI":"10.1108\/eb046814"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Ramesh, B., Edwards, M.: Issues in the development of a requirements traceability model. In: Proceedings of ISRE, pp. 256\u2013259 (1993)","DOI":"10.1109\/ISRE.1993.324849"},{"key":"4_CR22","doi-asserted-by":"publisher","unstructured":"Rasiman, R., Dalpiaz, F., Espa\u00f1a, S.: Online appendix: how effective is automated trace link recovery in model-driven development? January 2022. https:\/\/doi.org\/10.23644\/uu.19087685.v1","DOI":"10.23644\/uu.19087685.v1"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Rath, M., Rendall, J., Guo, J.L.C., Cleland-Huang, J., Maeder, P.: Traceability in the wild: automatically augmenting incomplete trace links. In: Proceedings of ICSE, vol. 834\u2013845 (2018)","DOI":"10.1145\/3180155.3180207"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-319-44215-0_8","volume-title":"Mobile Web and Intelligent Information Systems","author":"E Umuhoza","year":"2016","unstructured":"Umuhoza, E., Brambilla, M.: Model driven development approaches for mobile applications: a survey. In: Younas, M., Awan, I., Kryvinska, N., Strauss, C., Thanh, D. (eds.) MobiWIS 2016. LNCS, vol. 9847, pp. 93\u2013107. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44215-0_8"},{"key":"4_CR25","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.jss.2018.09.001","volume":"146","author":"B Wang","year":"2018","unstructured":"Wang, B., Peng, R., Li, Y., Lai, H., Wang, Z.: Requirements traceability technologies and technology transfer decision support: a systematic review. J. Syst. Softw. 146, 59\u201379 (2018)","journal-title":"J. Syst. Softw."},{"key":"4_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43839-8","volume-title":"Design Science Methodology for Information Systems and Software Engineering","author":"RJ Wieringa","year":"2014","unstructured":"Wieringa, R.J.: Design Science Methodology for Information Systems and Software Engineering. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43839-8"},{"issue":"4","key":"4_CR27","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/s10270-009-0145-0","volume":"9","author":"S Winkler","year":"2010","unstructured":"Winkler, S., von Pilgrim, J.: A survey of traceability in requirements engineering and model-driven development. Softw. Syst. Model. 9(4), 529\u2013565 (2010)","journal-title":"Softw. Syst. Model."},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in software engineering, vol. 9783642290 (2012)","DOI":"10.1007\/978-3-642-29044-2"},{"issue":"1","key":"4_CR29","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s10614-020-10054-w","volume":"57","author":"J Yoon","year":"2020","unstructured":"Yoon, J.: Forecasting of real GDP growth using machine learning models: gradient boosting and random forest approach. Comput. Econ. 57(1), 247\u2013265 (2020). https:\/\/doi.org\/10.1007\/s10614-020-10054-w","journal-title":"Comput. Econ."}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98464-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T22:38:43Z","timestamp":1726785523000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98464-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030984632","9783030984649"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98464-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"REFSQ","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Working Conference on Requirements Engineering: Foundation for Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Birmingham","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 March 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 March 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"refsq2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2022.refsq.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}