{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T00:35:40Z","timestamp":1726446940534},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,4,28]],"date-time":"2015-04-28T00:00:00Z","timestamp":1430179200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s00766-015-0226-2","type":"journal-article","created":{"date-parts":[[2015,4,27]],"date-time":"2015-04-27T05:33:33Z","timestamp":1430112813000},"page":"253-280","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Leveraging topic modeling and part-of-speech tagging to support combinational creativity in requirements engineering"],"prefix":"10.1007","volume":"20","author":[{"given":"Tanmay","family":"Bhowmik","sequence":"first","affiliation":[]},{"given":"Nan","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Juha","family":"Savolainen","sequence":"additional","affiliation":[]},{"given":"Anas","family":"Mahmoud","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,28]]},"reference":[{"key":"226_CR1","doi-asserted-by":"crossref","unstructured":"Lemos J, Alves C, Duboc L, Rodrigues GN (2012) A systematic mapping study on creativity in requirements engineering. In: Proceedings of the annual ACM symposium on applied computing (SAC), pp 1083\u20131088","DOI":"10.1145\/2245276.2231945"},{"key":"226_CR2","doi-asserted-by":"crossref","unstructured":"Maiden N, Jones S, Karlsen K, Neill R, Zachos K, Milne A (2010) Requirements engineering as creative problem solving: a research agenda for idea finding. In: Proceedings of the international requirements engineering conference (RE), pp 57\u201366","DOI":"10.1109\/RE.2010.16"},{"key":"226_CR3","doi-asserted-by":"crossref","unstructured":"Maiden N, Ncube C, Robertson S (2007) Can requirements be creative? Experiences with an enhanced air space management system. In: Proceedings of the international conference on software engineering (ICSE), pp 632\u2013641","DOI":"10.1109\/ICSE.2007.24"},{"key":"226_CR4","volume-title":"Handbook of creativity","author":"RJ Sternberg","year":"1999","unstructured":"Sternberg RJ (1999) Handbook of creativity. Cambridge University Press, Cambridge"},{"key":"226_CR5","volume-title":"The creative mind: Myths and mechanisms","author":"MA Boden","year":"2003","unstructured":"Boden MA (2003) The creative mind: Myths and mechanisms. Routledge, London"},{"issue":"5","key":"226_CR6","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MS.2004.1331305","volume":"21","author":"N Maiden","year":"2004","unstructured":"Maiden N, Gizikis A, Robertson S (2004) Provoking creativity: imagine what your requirements could be like. IEEE Softw 21(5):68\u201375","journal-title":"IEEE Softw"},{"key":"226_CR7","doi-asserted-by":"crossref","unstructured":"Maiden N, Manning S, Robertson S, Greenwood J (2004) Integrating creativity workshops into structured requirements processes. In: Proceedings of the ACM conference on designing interactive systems: processes, practices, methods, and techniques, pp 113\u2013122","DOI":"10.1145\/1013115.1013132"},{"key":"226_CR8","doi-asserted-by":"crossref","unstructured":"Maiden N, Robertson S (2005) Integrating creativity into requirements processes: experiences with an air traffic management system. In: Proceedings of the international requirements engineering conference (RE), pp 105\u2013114","DOI":"10.1109\/RE.2005.34"},{"key":"226_CR9","doi-asserted-by":"crossref","unstructured":"Karlsen IK, Maiden N, Kerne A (2009) Inventing requirements with creativity support tools. In: Requirements engineering: foundation for software quality. Springer, Berlin, pp 162\u2013174","DOI":"10.1007\/978-3-642-02050-6_14"},{"key":"226_CR10","doi-asserted-by":"crossref","unstructured":"Zachos K, Maiden N (2008) Inventing requirements from software: an empirical investigation with web services. In: Proceedings of the international requirements engineering conference (RE), pp 145\u2013154","DOI":"10.1109\/RE.2008.39"},{"issue":"12","key":"226_CR11","doi-asserted-by":"crossref","first-page":"1736","DOI":"10.1109\/TSE.2013.39","volume":"39","author":"N Hariri","year":"2013","unstructured":"Hariri N, Castro-Herrera C, Mirakhorli M, Cleland-Huang J, Mobasher B (2013) Supporting domain analysis through mining and recommending features from online product listings. IEEE Trans Softw Eng 39(12):1736\u20131752","journal-title":"IEEE Trans Softw Eng"},{"key":"226_CR12","doi-asserted-by":"crossref","unstructured":"Maiden N (2013) Requirements engineering as information search and idea discovery (keynote). In: Proceedings of the international requirements engineering conference (RE), pp 1\u20131","DOI":"10.1109\/RE.2013.6636697"},{"key":"226_CR13","doi-asserted-by":"crossref","unstructured":"Bhowmik T, Niu N, Mahmoud A, Savolainen J (2014) Automated support for combinational creativity in requirements engineering. In: Proceedings of the international requirements engineering conference (RE), pp 243\u2013252","DOI":"10.1109\/RE.2014.6912266"},{"issue":"2","key":"226_CR14","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1086\/421787","volume":"110","author":"RS Burt","year":"2004","unstructured":"Burt RS (2004) Structural holes and good ideas. Am J Sociol 110(2):349\u2013399","journal-title":"Am J Sociol"},{"key":"226_CR15","doi-asserted-by":"crossref","unstructured":"Pirolli P (2009) An elementary social information foraging model. In: Proceedings of the SIGCHI conference on human factors in computing systems (CHI), pp 605\u2013614","DOI":"10.1145\/1518701.1518795"},{"key":"226_CR16","doi-asserted-by":"crossref","unstructured":"Linstead E, Lopes C, Baldi P (2008) An application of Latent Dirichlet Allocation to analyzing software evolution. In: Proceedings of the international conference on machine learning and applications (ICMLA), pp 813\u2013818","DOI":"10.1109\/ICMLA.2008.47"},{"key":"226_CR17","first-page":"993","volume":"3","author":"D Blei","year":"2003","unstructured":"Blei D, Ng A, Jordan M (2003) Latent Dirichlet Allocation. J Mach Learn Res 3:993\u20131022","journal-title":"J Mach Learn Res"},{"key":"226_CR18","doi-asserted-by":"crossref","unstructured":"Brill E (1992) A simple rule-based part of speech tagger. In: Proceedings of the workshop on speech and natural language, pp 112\u2013116","DOI":"10.3115\/1075527.1075553"},{"key":"226_CR19","doi-asserted-by":"crossref","unstructured":"Kersten M, Murphy G (2005) Mylar: a degree-of-interest model for ides. In: Proceedings of the international conference on aspect-oriented software development (AOSD), pp 159\u2013168","DOI":"10.1145\/1052898.1052912"},{"issue":"6","key":"226_CR20","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1016\/S0142-694X(99)00034-4","volume":"21","author":"M Suwa","year":"2000","unstructured":"Suwa M, Gero J, Purcell T (2000) Unexpected discoveries and S-invention of design requirements: important vehicles for a design process. Des Stud 21(6):539\u2013567","journal-title":"Des Stud"},{"key":"226_CR21","unstructured":"Maher ML, Brady K, Fisher DH (2013) Computational models of surprise in evaluating creative design. In: Proceedings of the international conference on computational creativity (ICCC), pp 147\u2013151"},{"key":"226_CR22","unstructured":"Ritchie G (2001) Assessing creativity. In: Proceedings of the AISB-01 symposium on AI and creativity in arts and science, pp 3\u201311"},{"key":"226_CR23","doi-asserted-by":"crossref","unstructured":"N\u00f6bauer M, Seyff N, Maiden N, Zachos K (2011) S3c: using service discovery to support requirements elicitation in the erp domain. In: Proceedings of the international conference on advanced information systems engineering, pp 18\u201332","DOI":"10.1007\/978-3-642-21640-4_4"},{"issue":"1","key":"226_CR24","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s00766-006-0039-4","volume":"12","author":"R Lutz","year":"2007","unstructured":"Lutz R, Patterson-Hine A, Nelson S, Frost CR, Tal D, Harris R (2007) Using obstacle analysis to identify contingency requirements on an unpiloted aerial vehicle. Requir Eng J 12(1):41\u201354","journal-title":"Requir Eng J"},{"key":"226_CR25","doi-asserted-by":"crossref","unstructured":"Salinesi C, Mazo R, Diaz D, Djebbi O (2010) Using integer constraint solving in reuse based requirements engineering. In: Proceedings of the international requirements engineering conference (RE), pp 243\u2013251","DOI":"10.1109\/RE.2010.36"},{"key":"226_CR26","unstructured":"Fuxman A, Pistore M, Mylopoulos J, Traverso P (2001) Model checking early requirements specifications in tropos. In: Proceedings of the international requirements engineering conference (RE), pp 174\u2013181"},{"key":"226_CR27","doi-asserted-by":"crossref","unstructured":"Sakhnini V, Berry DM, Mich L (2010) Validation of the effectiveness of an optimized epmcreate as an aid for creative requirements elicitation. In: Proceedings of the 16th international working conference on requirements engineering: foundation for software quality, pp 91\u2013105","DOI":"10.1007\/978-3-642-14192-8_11"},{"issue":"3","key":"226_CR28","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s00766-011-0133-0","volume":"17","author":"V Sakhnini","year":"2012","unstructured":"Sakhnini V, Mich L, Berry DM (2012) The effectiveness of an optimized epmcreate as a creativity enhancement technique for web site requirements elicitation. Requir Eng 17(3):171\u2013186","journal-title":"Requir Eng"},{"key":"226_CR29","doi-asserted-by":"crossref","unstructured":"Lefons E, Pazienza M, Silvestri A, Tangorra F, Corfiati L, De Giacomo P (1977) An algebraic model for systems of psychically interacting subjects. In: Proceedings of the IFAC workshop information & systems, pp 155\u2013163","DOI":"10.1016\/S1474-6670(17)66572-8"},{"key":"226_CR30","doi-asserted-by":"crossref","unstructured":"Mahaux M, Nguyen L, Gotel O, Mich L, Mavin A, Schmid K (2013) Collaborative creativity in requirements engineering: analysis and practical advice. In: Proceedings of the international conference on research challenges in information science (RCIS), pp 1\u201310","DOI":"10.1109\/RCIS.2013.6577678"},{"key":"226_CR31","doi-asserted-by":"crossref","unstructured":"Damian D, Marczak S, Kwan I (2007) Collaboration patterns and the impact of distance on awareness in requirements-centred social networks. In: Proceedings of the international requirements engineering conference (RE), pp 59\u201368","DOI":"10.1109\/RE.2007.51"},{"key":"226_CR32","doi-asserted-by":"crossref","unstructured":"Begel A, Khoo Y, Zimmermann T (2010) Codebook: discovering and exploiting relationships in software repositories. In: Proceedings of the international conference on software engineering (ICSE), pp 125\u2013134","DOI":"10.1145\/1806799.1806821"},{"key":"226_CR33","doi-asserted-by":"crossref","unstructured":"Sarma A, Maccherone L, Wagstrom P, Herbsleb J (2009) Tesseract: interactive visual exploration of socio-technical relationships in software development. In: Proceedings of the international conference on software engineering (ICSE), pp 23\u201333","DOI":"10.1109\/ICSE.2009.5070505"},{"key":"226_CR34","doi-asserted-by":"crossref","unstructured":"Wolf T, Schroter A, Damian D, Nguyen T (2009) Predicting build failures using social network analysis on developer communication. In: Proceedings of the international conference on software engineering (ICSE), pp 1\u201311","DOI":"10.1109\/ICSE.2009.5070503"},{"key":"226_CR35","doi-asserted-by":"crossref","unstructured":"Asuncion H, Asuncion A, Taylor R (2010) Software traceability with topic modeling. In: Proceedings of the international conference on software engineering (ICSE), pp 95\u2013104","DOI":"10.1145\/1806799.1806817"},{"key":"226_CR36","doi-asserted-by":"crossref","unstructured":"Linstead E, Rigor P, Bajracharya S, Lopes C, Baldi P (2007) Mining concepts from code with probabilistic topic models. In: Proceedings of the international conference on automated software engineering (ASE), pp 461\u2013464","DOI":"10.1145\/1321631.1321709"},{"key":"226_CR37","doi-asserted-by":"crossref","unstructured":"Thomas S, Adams B, Hassan A, Blostein D (2010) Validating the use of topic models for software evolution. In: Proceedings of the IEEE working conference on source code analysis and manipulation (SCAM), pp 55\u201364","DOI":"10.1109\/SCAM.2010.13"},{"key":"226_CR38","doi-asserted-by":"crossref","unstructured":"Porteous I, Newman D, Ihler A, Asuncion A, Smyth P, Welling M (2008) Fast collapsed gibbs sampling for Latent Dirichlet Allocation. In: Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining, pp 569\u2013577","DOI":"10.1145\/1401890.1401960"},{"issue":"2","key":"226_CR39","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/s10618-008-0118-x","volume":"18","author":"E Linstead","year":"2009","unstructured":"Linstead E, Bajracharya S, Ngo T, Rigor P, Lopes C, Baldi P (2009) Sourcerer: mining and searching internet-scale software repositories. Data Mining Knowl Discov 18(2):300\u2013336","journal-title":"Data Mining Knowl Discov"},{"key":"226_CR40","unstructured":"Linstead E, Rigor P, Bajracharya SK, Lopes CV, Baldi P (2007) Mining internet-scale software repositories. In: Proceedings of the neural information processing systems (NIPS)"},{"key":"226_CR41","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29807-3","volume-title":"Advances in K-means clustering: a data mining thinking","author":"J Wu","year":"2012","unstructured":"Wu J (2012) Advances in K-means clustering: a data mining thinking. Springer, Berlin"},{"key":"226_CR42","unstructured":"Borgatti SP, Everett MG, Freeman LC (2002) Ucinet for windows: software for social network analysis. Analytic Technologies"},{"key":"226_CR43","doi-asserted-by":"crossref","unstructured":"Bastian M, Heymann S, Jacomy M (2009) Gephi: an open source software for exploring and manipulating networks. In: Proceedings of the international conference on weblogs and social media (ICWSM), pp 361\u2013362","DOI":"10.1609\/icwsm.v3i1.13937"},{"key":"226_CR44","unstructured":"Chang J, Boyd-Graber JL, Gerrish S, Wang C, Blei DM (2009) Reading tea leaves: how humans interpret topic models. In: Proceedings of the neural information processing systems (NIPS), vol 22, pp 288\u2013296"},{"key":"226_CR45","doi-asserted-by":"crossref","unstructured":"Liaskos S, Lapouchnian A, Yu Y, Yu E, Mylopoulos J (2006) On goal-based variability acquisition and analysis. In: Proceedings of the international conference on requirements engineering (RE), pp 79\u201388","DOI":"10.1109\/RE.2006.45"},{"key":"226_CR46","doi-asserted-by":"crossref","unstructured":"Niu N, Easterbrook S (2008) Extracting and modeling product line functional requirements. In: Proceedings of the international requirements engineering conference (RE), pp 155\u2013164","DOI":"10.1109\/RE.2008.49"},{"key":"226_CR47","first-page":"1","volume-title":"Universals in linguistic theory","author":"C Fillmore","year":"1968","unstructured":"Fillmore C (1968) The case for case. In: Bach E, Harms R (eds) Universals in linguistic theory. Holt, Rinehart and Winston, New York, pp 1\u201388"},{"key":"226_CR48","unstructured":"Hill E (2010) Integrating natural language and program structure information to improve software search and exploration. PhD. Thesis, University of Delaware"},{"key":"226_CR49","doi-asserted-by":"crossref","unstructured":"Gupta S, Malik S, Pollock L, Vijay-Shanker K (2013) Part-of-speech tagging of program identifiers for improved text-based software engineering tools. In: Proceedings of the international conference on program comprehension (ICPC), pp 3\u201312","DOI":"10.1109\/ICPC.2013.6613828"},{"key":"226_CR50","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to information retrieval","author":"CD Manning","year":"2008","unstructured":"Manning CD, Raghavan P, Sch\u00fctze H (2008) Introduction to information retrieval, vol 1. Cambridge University Press, Cambridge"},{"key":"226_CR51","doi-asserted-by":"crossref","unstructured":"Ernst NA, Murphy GC (2012) Case studies in just-in-time requirements analysis. In: IEEE international workshop on empirical requirements engineering, pp 25\u201332","DOI":"10.1109\/EmpiRE.2012.6347678"},{"key":"226_CR52","doi-asserted-by":"crossref","unstructured":"Knauss E, Damian D, Poo-Caamano G, Cleland-Huang J (2012) Detecting and classifying patterns of requirements clarifications. In: Proceedings of the IEEE international requirements engineering conference (RE), pp 251\u2013260","DOI":"10.1109\/RE.2012.6345811"},{"key":"226_CR53","doi-asserted-by":"crossref","unstructured":"Liu H, Gao Y, Niu Z (2012) An initial study on refactoring tactics. In: Annual international computers, software & applications conference, pp 213\u2013218","DOI":"10.1109\/COMPSAC.2012.31"},{"issue":"1","key":"226_CR54","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1049\/ip-sen:20020202","volume":"149","author":"W Scacchi","year":"2002","unstructured":"Scacchi W (2002) Understanding the requirements for developing open source software systems. IEE Softw 149(1):24\u201339","journal-title":"IEE Softw"},{"key":"226_CR55","doi-asserted-by":"crossref","unstructured":"Niu N, Bhowmik T, Liu H, Niu Z (2014) Traceability-enabled refactoring for managing just-in-time requirements. In: Proceedings of the IEEE international requirements engineering conference (RE), pp 133\u2013142","DOI":"10.1109\/RE.2014.6912255"},{"key":"226_CR56","doi-asserted-by":"crossref","unstructured":"Zaman S, Adams B, Hassan AE (2011) Security versus performance bugs: a case study on firefox. In: Proceedings of the working conference on mining software repositories (MSR), pp 93\u2013102","DOI":"10.1145\/1985441.1985457"},{"key":"226_CR57","doi-asserted-by":"crossref","unstructured":"Griffiths TL, Steyvers M (2004) Finding scientific topics. In: Proceedings of the national academy of sciences of the United States of America, pp 5228\u20135235","DOI":"10.1073\/pnas.0307752101"},{"key":"226_CR58","doi-asserted-by":"crossref","unstructured":"Niu N, Savolainen J, Bhowmik T, Mahmoud A, Reddivari S (2012) A framework for examining topical locality in object-oriented software. In: Proceedings of the annual computer software and applications conference (COMPSAC), pp 219\u2013224","DOI":"10.1109\/COMPSAC.2012.32"},{"key":"226_CR59","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780195147308.001.0001","volume-title":"Group creativity: innovation through collaboration","author":"PB Paulus","year":"2003","unstructured":"Paulus PB, Nijstad BA (2003) Group creativity: innovation through collaboration. Oxford University Press, Oxford"},{"key":"226_CR60","volume-title":"Applied statistics and probability for engineers","author":"D Montgomery","year":"2010","unstructured":"Montgomery D, Runger G (2010) Applied statistics and probability for engineers. Wiley, New York"},{"key":"226_CR61","volume-title":"Case study research: design and methods","author":"RK Yin","year":"2008","unstructured":"Yin RK (2008) Case study research: design and methods, vol 5. Sage, London"},{"key":"226_CR62","doi-asserted-by":"crossref","unstructured":"Bird C, Pattison D, D\u2019Souza R, Filkov V, Devanbu P (2008) Latent social structure in open source projects. In: Proceedings of the ACM SIGSOFT international symposium on foundations of software engineering (SIGSOFT\/FSE), pp 24\u201335","DOI":"10.1145\/1453101.1453107"},{"key":"226_CR63","doi-asserted-by":"crossref","unstructured":"Niu N, Mahmoud A (2012) Enhancing candidate link generation for requirements tracing: the cluster hypothesis revisited. In: Proceedings of the international requirements engineering conference (RE), pp 81\u201390","DOI":"10.1109\/RE.2012.6345842"},{"key":"226_CR64","unstructured":"Popescu A-M, Etzioni O, Kautz H (2003) Towards a theory of natural language interfaces to databases. In: Proceedings of the 8th international conference on intelligent user interfaces, pp 149\u2013157"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-015-0226-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-015-0226-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-015-0226-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T20:29:18Z","timestamp":1691612958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-015-0226-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,28]]},"references-count":64,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["226"],"URL":"https:\/\/doi.org\/10.1007\/s00766-015-0226-2","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,28]]}}}