{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T19:55:47Z","timestamp":1726430147507},"reference-count":88,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,5,4]],"date-time":"2016-05-04T00:00:00Z","timestamp":1462320000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100006952","name":"Louisiana Board of Regents","doi-asserted-by":"publisher","award":["LEQSF(2015-18)-RD-A-07"],"id":[{"id":"10.13039\/100006952","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s00766-016-0252-8","type":"journal-article","created":{"date-parts":[[2016,5,4]],"date-time":"2016-05-04T10:58:45Z","timestamp":1462359525000},"page":"357-381","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["Detecting, classifying, and tracing non-functional software requirements"],"prefix":"10.1007","volume":"21","author":[{"given":"Anas","family":"Mahmoud","sequence":"first","affiliation":[]},{"given":"Grant","family":"Williams","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,4]]},"reference":[{"key":"252_CR1","doi-asserted-by":"crossref","unstructured":"Abadi A, Nisenson M, Simionovici Y (2008) A traceability technique for specifications. In: International conference on program comprehension, pp 103\u2013112","DOI":"10.1109\/ICPC.2008.30"},{"key":"252_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal C, Zhai C (2012) A survey of text clustering algorithms. Mining text data. Springer, Newyork, pp 77\u2013128","DOI":"10.1007\/978-1-4614-3223-4_4"},{"key":"252_CR3","doi-asserted-by":"crossref","unstructured":"Anquetil N, Fourrier C, Lethbridge T (1999) Experiments with clustering as a software remodularization method. In: Working conference on reverse engineering, pp 235\u2013255","DOI":"10.1109\/WCRE.1999.806964"},{"key":"252_CR4","unstructured":"Anquetil N, Lethbridge T (1998) Assessing the relevance of identifier names in a legacy software system. In: Conference of the centre for advanced studies on collaborative research, pp 4\u201314"},{"key":"252_CR5","unstructured":"Antoniol1 G, Gu\u00e9h\u00e9neuc Y, Merlo E, Tonella P (2007) Mining the lexicon used by programmers during software evolution. In: International conference on software maintenance, pp 14\u201323"},{"key":"252_CR6","unstructured":"Arthur D, Vassilvitskii S (2007) K-means++: the advantages of careful seeding. In: Annual ACM-SIAM symposium on discrete algorithms, pp 1027\u20131035"},{"key":"252_CR7","first-page":"1183","volume":"3","author":"R Bekkerman","year":"2003","unstructured":"Bekkerman R, El-Yaniv R, Tishby N, Winter Y (2003) Distributional word clusters vs. words for text categorization. J Mach Learn Res 3:1183\u20131208","journal-title":"J Mach Learn Res"},{"key":"252_CR8","unstructured":"Bollegala D, Matsuo Y, Ishizuka M (2007) Measuring semantic similarity between words using web search engines. In: International conference on world wide web, pp 757\u2013766"},{"key":"252_CR9","unstructured":"Budiu R, Royer C, Pirolli P (2007) Modeling information scent: a comparison of LSA, PMI and GLSA similarity measures on common tests and corpora. In: Large scale semantic access to content (text, image, video, and sound), pp 314\u2013332"},{"issue":"3","key":"252_CR10","doi-asserted-by":"crossref","first-page":"510","DOI":"10.3758\/BF03193020","volume":"39","author":"J Bullinaria","year":"2007","unstructured":"Bullinaria J, Levy J (2007) Extracting semantic representations from word co-occurrence statistics: a computational study. Behav Res Methods 39(3):510\u2013526","journal-title":"Behav Res Methods"},{"key":"252_CR11","volume-title":"Information retrieval","author":"CJ Rijsbergen van","year":"1979","unstructured":"van Rijsbergen CJ (1979) Information retrieval. Butterworths, New York"},{"key":"252_CR12","doi-asserted-by":"crossref","unstructured":"Carre\u0144o G, Winbladh K (2013) Analysis of user comments: an approach for software requirements evolution. In: International conference on software engineering, pp 343\u2013348","DOI":"10.1109\/ICSE.2013.6606604"},{"issue":"4","key":"252_CR13","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1016\/j.infsof.2009.10.010","volume":"52","author":"A Casamayor","year":"2010","unstructured":"Casamayor A, Godoy D, Campo M (2010) Identification of non-functional requirements in textual specifications: a semi-supervised learning approach. Inf Softw Technol 52(4):436\u2013445","journal-title":"Inf Softw Technol"},{"key":"252_CR14","unstructured":"Chang J, Boyd-Graber J, Gerrish S, Wang C, Blei D (2009) Reading tea leaves: how humans interpret topic models. Curran Associates, County Down, pp 288\u2013296"},{"key":"252_CR15","doi-asserted-by":"crossref","unstructured":"Chen J, Ren Y, Riedl J (2010) The effects of diversity on group productivity and member withdrawal in online volunteer groups. In: SIGCHI conference on human factors in computing systems, pp 821\u2013830","DOI":"10.1145\/1753326.1753447"},{"key":"252_CR16","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/978-3-642-02463-4_19","volume":"5600","author":"L Chung","year":"2009","unstructured":"Chung L, do Prado Leite J (2009) On non-functional requirements in software engineering. Concept Model Found Appl Lecture Notes Comput Sci 5600:363\u2013379","journal-title":"Concept Model Found Appl Lecture Notes Comput Sci"},{"key":"252_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5269-7","volume-title":"Non-functional requirements in software engineering","author":"L Chung","year":"2000","unstructured":"Chung L, Nixon B, Yu E, Mylopoulos J (2000) Non-functional requirements in software engineering. Kluwer Academic, Boston"},{"issue":"1","key":"252_CR18","first-page":"22","volume":"16","author":"K Church","year":"1990","unstructured":"Church K, Hanks P (1990) Word association norms, mutual information, and lexicography. Comput Ling 16(1):22\u201329","journal-title":"Comput Ling"},{"issue":"3","key":"252_CR19","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/TKDE.2007.48","volume":"19","author":"R Cilibrasi","year":"2007","unstructured":"Cilibrasi R, Vitanyi P (2007) The Google similarity distance. IEEE Trans Knowl Data Eng 19(3):370\u2013383","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"9","key":"252_CR20","doi-asserted-by":"crossref","first-page":"796","DOI":"10.1109\/TSE.2003.1232285","volume":"29","author":"J Cleland-Huang","year":"2003","unstructured":"Cleland-Huang J, Chang C, Christensen M (2003) Event-based traceability for managing evolutionary change. IEEE Trans Softw Eng 29(9):796\u2013810","journal-title":"IEEE Trans Softw Eng"},{"key":"252_CR21","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Heimdahl M, Huffman-Hayes J, Lutz R, M\u00e4der P (2012) Trace queries for safety requirements in high assurance systems. In: International conference on requirements engineering: foundation for software quality, pp 179\u2013193","DOI":"10.1007\/978-3-642-28714-5_16"},{"key":"252_CR22","unstructured":"Cleland-Huang J, Schmelzer D (2003) Dynamically tracing non-functional requirements through design pattern invariants. In: Workshop on traceability in emerging forms of software tracing non-functional requirements"},{"key":"252_CR23","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Settimi R, BenKhadra O, Berezhanskaya E, Christina S (2005) Goal-centric traceability for managing non-functional requirements. In: International conference on software engineering, pp 362\u2013371","DOI":"10.1109\/ICSE.2005.1553579"},{"issue":"2","key":"252_CR24","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s00766-007-0045-1","volume":"12","author":"J Cleland-Huang","year":"2007","unstructured":"Cleland-Huang J, Settimi R, Zou X, Solc P (2007) Automated classification of non-functional requirements. Requir Eng 12(2):103\u2013120","journal-title":"Requir Eng"},{"key":"252_CR25","unstructured":"Cysneiros LM (2007) Evaluating the effectiveness of using catalogues to elicit nonfunctional requirements. In: Workshop em Engenharia de Requisitos, pp 107\u2013115"},{"key":"252_CR26","doi-asserted-by":"crossref","unstructured":"De Lucia A, Oliveto R, Sgueglia P (2006) Incremental approach and user feedbacks: a silver bullet for traceability recovery. In: International conference on software maintenance, pp 299\u2013309","DOI":"10.1109\/ICSM.2006.32"},{"issue":"1","key":"252_CR27","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s10664-008-9090-8","volume":"14","author":"A Lucia De","year":"2009","unstructured":"De Lucia A, Oliveto R, Tortora G (2009) Assessing IR-based traceability recovery tools through controlled experiments. Empir Softw Eng 14(1):57\u201392","journal-title":"Empir Softw Eng"},{"key":"252_CR28","doi-asserted-by":"crossref","DOI":"10.1007\/b97673","volume-title":"Design and analysis of experiments","author":"A Dean","year":"1999","unstructured":"Dean A, Voss D (1999) Design and analysis of experiments. Springer, New York"},{"issue":"6","key":"252_CR29","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester S, Dumais S, Furnas G, Landauer T, Harshman R (1990) Indexing by latent semantic analysis. J Am Soc Inf Sci 41(6):391\u2013407","journal-title":"J Am Soc Inf Sci"},{"key":"252_CR30","doi-asserted-by":"crossref","unstructured":"Dei\u00dfenb\u00f6ck F, Pizka M (2005) Concise and consistent naming. In: International workshop on program comprehension, pp 97\u2013106","DOI":"10.1109\/WPC.2005.14"},{"issue":"5","key":"252_CR31","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1137\/0911052","volume":"11","author":"J Demmel","year":"1990","unstructured":"Demmel J, Kahan W (1990) Accurate singular values of bidiagonal matrices. J Sci Stat Comput 11(5):873\u2013912","journal-title":"J Sci Stat Comput"},{"key":"252_CR32","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7287.001.0001","volume-title":"WordNet: an electronic lexical database","author":"C Fellbaum","year":"1998","unstructured":"Fellbaum C (1998) WordNet: an electronic lexical database. MIT Press, Cambridge"},{"key":"252_CR33","doi-asserted-by":"crossref","unstructured":"Funahashi T, Yamana H (2010) Reliability verification of search engines\u2019 hit counts: How to select a reliable hit count for a query. In: International conference on current trends in web engineering, pp 114\u2013125","DOI":"10.1007\/978-3-642-16985-4_11"},{"key":"252_CR34","unstructured":"Gabrilovich E, Markovitch S (2007) Computing semantic relatedness using Wikipedia-based explicit semantic analysis. In: International joint conference on artificial intelligence, pp 1606\u20131611"},{"key":"252_CR35","doi-asserted-by":"crossref","unstructured":"Glinz M (2007) On non-functional requirements. In: IEEE international requirements engineering conference, pp 21\u201326","DOI":"10.1109\/RE.2007.45"},{"issue":"4","key":"252_CR36","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1023\/A:1008617922496","volume":"4","author":"L Goldin","year":"1997","unstructured":"Goldin L, Berry D (1997) AbstFinder, a prototype natural language text abstraction finder for use in requirements elicitation. Autom Softw Eng 4(4):375\u2013412","journal-title":"Autom Softw Eng"},{"key":"252_CR37","doi-asserted-by":"crossref","unstructured":"Gotel O, Cleland-Huang J, Huffman-Hayes J, Zisman A, Egyed A, Grnbacher P, Dekhtyar A, Antoniol G, Maletic J (2012) The grand challenge of traceability (v1.0). In: Software and systems traceability. Springer, London","DOI":"10.1007\/978-1-4471-2239-5_16"},{"key":"252_CR38","doi-asserted-by":"crossref","unstructured":"Gracia J, Trillo R, Espinoza M, Mena E (2006) Querying the web: a multiontology disambiguation method. In: International conference on web engineering, pp 241\u2013248","DOI":"10.1145\/1145581.1145630"},{"issue":"1","key":"252_CR39","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/s007660170013","volume":"6","author":"D Gross","year":"2000","unstructured":"Gross D, Yu E (2000) From non-functional requirements to design through patterns. Requir Eng 6(1):18\u201336","journal-title":"Requir Eng"},{"key":"252_CR40","unstructured":"Guo W, Li H, Ji H, Diab M (2013) Linking tweets to news: a framework to enrich short text data in social media. In: Annual meeting of the association for computational linguistics, pp 239\u2013249"},{"key":"252_CR41","doi-asserted-by":"crossref","unstructured":"Hearst M, Pedersen J (1996) Reexamining the cluster hypothesis: scatter\/gather on retrieval results. In: International ACM SIGIR conference on Research and development in information retrieval, pp 76\u201384","DOI":"10.1145\/243199.243216"},{"issue":"6","key":"252_CR42","doi-asserted-by":"crossref","first-page":"1754","DOI":"10.1007\/s10664-013-9261-0","volume":"19","author":"E Hill","year":"2014","unstructured":"Hill E, Binkley D, Lawrie D, Pollock L, Vijay-Shanker K (2014) An empirical study of identifier splitting techniques. Empir Softw Eng 19(6):1754\u20131780","journal-title":"Empir Softw Eng"},{"key":"252_CR43","doi-asserted-by":"crossref","unstructured":"Hill E, Fry Z, Boyd H, Sridhara G, Novikova Y, Pollock L, Vijay-Shanker K (2008) Amap: Automatically mining abbreviation expansions in programs to enhance software maintenance tools. In: International working conference on mining software repositories, pp 79\u201388","DOI":"10.1145\/1370750.1370771"},{"key":"252_CR44","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/978-3-642-37688-7_7","volume-title":"Quality issues in the management of web information","author":"A Holzinger","year":"2013","unstructured":"Holzinger A, Yildirim P, Geier M, Simonic KM (2013) Quality-based knowledge discovery from medical text on the web. In: Pasi G, Bordogna G, Jain L (eds) Quality issues in the management of web information. Springer, Berlin, pp 145\u2013158"},{"issue":"1","key":"252_CR45","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TSE.2006.3","volume":"32","author":"J Huffman-Hayes","year":"2006","unstructured":"Huffman-Hayes J, Dekhtyar A, Sundaram S (2006) Advancing candidate link generation for requirements tracing: the study of methods. IEEE Trans Softw Eng 32(1):4\u201319","journal-title":"IEEE Trans Softw Eng"},{"key":"252_CR46","doi-asserted-by":"crossref","unstructured":"Kassab M, Ormandjieva O, Daneva M (2009) A metamodel for tracing non-functional requirements. In: World congress on computer science and information engineering, pp 687\u2013694","DOI":"10.1109\/CSIE.2009.946"},{"key":"252_CR47","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316801","volume-title":"Finding groups in data: an introduction to cluster analysis","author":"L Kaufman","year":"1990","unstructured":"Kaufman L, Rousseeuw P (1990) Finding groups in data: an introduction to cluster analysis. Wiley, New York"},{"key":"252_CR48","volume-title":"Requirements engineering: processes and techniques","author":"G Kotonya","year":"1998","unstructured":"Kotonya G, Sommerville I (1998) Requirements engineering: processes and techniques. Wiley, New York"},{"issue":"3","key":"252_CR49","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.infsof.2006.10.017","volume":"49","author":"A Kuhn","year":"2007","unstructured":"Kuhn A, Ducasse S, G\u00eerba T (2007) Semantic clustering: identifying topics in source code. Inf Softw Technol 49(3):230\u2013243","journal-title":"Inf Softw Technol"},{"issue":"2","key":"252_CR50","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1037\/0033-295X.104.2.211","volume":"104","author":"T Landauer","year":"1997","unstructured":"Landauer T, Dutnais S (1997) A solution to plato\u2019s problem: the latent semantic analysis theory of acquisition, induction, and representation of knowledge. Psychol Rev 104(2):211\u2013240","journal-title":"Psychol Rev"},{"key":"252_CR51","unstructured":"Lau J, Newman D, Karimi S, Baldwin T (2010) Best topic word selection for topic labelling. In: International conference on computational linguistics, pp 605\u2013613"},{"key":"252_CR52","volume-title":"Combining local context and WordNet similarity for word sense identification","author":"C Leacock","year":"1998","unstructured":"Leacock C, Chodorow M (1998) Combining local context and WordNet similarity for word sense identification. MIT Press, Cambridge"},{"key":"252_CR53","doi-asserted-by":"crossref","unstructured":"Lesk M (1986) Automatic sense disambiguation using machine readable dictionaries: how to tell a pine cone from an ice cream cone. In: Annual international conference on systems documentation, pp 24\u201326","DOI":"10.1145\/318723.318728"},{"key":"252_CR54","doi-asserted-by":"crossref","unstructured":"Lo D, Nagappan N, Zimmermann T (2015) How practitioners perceive the relevance of software engineering research. In: Joint meeting on foundations of software engineering, pp 415\u2013425","DOI":"10.1145\/2786805.2786809"},{"key":"252_CR55","doi-asserted-by":"crossref","unstructured":"Lohar S, Amornborvornwong S, Zisman A, Cleland-Huang J (2013) Improving trace accuracy through data-driven configuration and composition of tracing features. In: Joint meeting on foundations of software engineering, pp 378\u2013388","DOI":"10.1145\/2491411.2491432"},{"issue":"1","key":"252_CR56","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/s00766-003-0179-8","volume":"9","author":"M Luisa","year":"2004","unstructured":"Luisa M, Mariangela F, NoviInverardi P (2004) Market research for requirements analysis using linguistic tools. Requir Eng 9(1):40\u201356","journal-title":"Requir Eng"},{"issue":"2","key":"252_CR57","doi-asserted-by":"crossref","first-page":"203","DOI":"10.3758\/BF03204766","volume":"28","author":"K Lund","year":"1996","unstructured":"Lund K, Burgess C (1996) Producing high-dimensional semantic spaces from lexical co-occurrence. Behav Res Methods Instrum Comput 28(2):203\u2013208","journal-title":"Behav Res Methods Instrum Comput"},{"key":"252_CR58","doi-asserted-by":"crossref","unstructured":"Maalej W, Nabil H (2015) Bug report, feature request, or simply praise? On automatically classifying app reviews. In: Requirements engineering conference, pp 116\u2013125","DOI":"10.1109\/RE.2015.7320414"},{"key":"252_CR59","doi-asserted-by":"crossref","unstructured":"Mahmoud A (2015) An information theoretic approach for extracting and tracing non-functional requirements. In: International requirements engineering conference","DOI":"10.1109\/RE.2015.7320406"},{"issue":"3","key":"252_CR60","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/s00766-013-0199-y","volume":"20","author":"A Mahmoud","year":"2015","unstructured":"Mahmoud A, Niu N (2015) On the role of semantics in automated requirements tracing. Requir Eng 20(3):281\u2013300","journal-title":"Requir Eng"},{"key":"252_CR61","unstructured":"Mihalcea R, Corley C, Strapparava C (2006) Corpus-based and knowledge-based measures of text semantic similarity. In: National conference on artificial intelligence, pp 775\u2013780"},{"key":"252_CR62","unstructured":"Mimno D, Wallach H, Talley E, Leenders M, McCallum A (2011) Optimizing semantic coherence in topic models. In: The conference on empirical methods in natural language processing, pp 262\u2013272"},{"key":"252_CR63","doi-asserted-by":"crossref","unstructured":"Mirakhorli M, Cleland-Huang J (2012) Tracing non-functional requirements. In: Zisman A, Cleland-Huang J, Gotel O (eds) Software and systems traceability. Springer, New York, pp 299\u2013320","DOI":"10.1007\/978-1-4471-2239-5_14"},{"issue":"6","key":"252_CR64","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/32.142871","volume":"18","author":"J Mylopoulos","year":"1992","unstructured":"Mylopoulos J, Chung L, Nixon B (1992) Representing and using nonfunctional requirements: a process-oriented approach. IEEE Trans Softw Eng 18(6):483\u2013497","journal-title":"IEEE Trans Softw Eng"},{"key":"252_CR65","unstructured":"Newman D, Han Lau J, Grieser K, Baldwin T (2010) Automatic evaluation of topic coherence. In: Annual conference of the North American chapter of the association for computational linguistics, pp 100\u2013108"},{"key":"252_CR66","doi-asserted-by":"crossref","unstructured":"Newman D, Noh Y, Talley E, Karimi S, Baldwin T (2010) Evaluating topic models for digital libraries. In: Annual joint conference on digital libraries, pp 215\u2013224","DOI":"10.1145\/1816123.1816156"},{"key":"252_CR67","doi-asserted-by":"crossref","unstructured":"Niu N, Mahmoud A (2012) Enhancing candidate link generation for requirements tracing: the cluster hypothesis revisited. In: IEEE international requirements engineering conference, pp 81\u201390","DOI":"10.1109\/RE.2012.6345842"},{"issue":"3","key":"252_CR68","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/2.910904","volume":"34","author":"B Nuseibeh","year":"2001","unstructured":"Nuseibeh B (2001) Weaving together requirements and architectures. Computer 34(3):115\u2013119","journal-title":"Computer"},{"key":"252_CR69","doi-asserted-by":"crossref","unstructured":"Oliveto R, Gethers M, Poshyvanyk D, De Lucia A (2010) On the equivalence of information retrieval methods for automated traceability link recovery. In: International conference on program comprehension, pp 68\u201371","DOI":"10.1109\/ICPC.2010.20"},{"key":"252_CR70","doi-asserted-by":"crossref","unstructured":"Peraldi Frati MA, Albinet A (2010) Requirement traceability in safety critical systems. In: Workshop on critical automotive applications: robustness and safety, pp 11\u201314","DOI":"10.1145\/1772643.1772647"},{"key":"252_CR71","doi-asserted-by":"crossref","unstructured":"Pollock L (2012) Leveraging natural language analysis of software: achievements, challenges, and opportunities. In: IEEE international conference on software maintenance, pp 4\u20134","DOI":"10.1109\/ICSM.2012.6405245"},{"key":"252_CR72","doi-asserted-by":"crossref","unstructured":"Pollock L, Vijay-Shanker K, Hill E, Sridhara G, Shepherd D (2013) Natural language-based software analyses and tools for software maintenance, Lecture notes in computer science, vol 7171. Springer, Berlin, pp 94\u2013125","DOI":"10.1007\/978-3-642-36054-1_4"},{"key":"252_CR73","volume-title":"An algorithm for suffix stripping","author":"F Porter","year":"1997","unstructured":"Porter F (1997) An algorithm for suffix stripping. Morgan Kaufmann Publishers Inc, Burlington"},{"key":"252_CR74","unstructured":"Resnik P (1995) Using information content to evaluate semantic similarity in a taxonomy. In: International joint conference on artificial intelligence, pp 448\u2013453"},{"key":"252_CR75","unstructured":"Rosario B (2000) Latent semantic indexing: an overview. INFOSYS 240 Spring Paper, University of California, Berkeley"},{"issue":"11","key":"252_CR76","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1145\/361219.361220","volume":"18","author":"G Salton","year":"1975","unstructured":"Salton G, Wong A, Yang C (1975) A vector space model for automatic indexing. Commun ACM 18(11):613\u2013620","journal-title":"Commun ACM"},{"issue":"11","key":"252_CR77","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1109\/TSE.2005.129","volume":"31","author":"P Sawyer","year":"2005","unstructured":"Sawyer P, Rayson P, Cosh K (2005) Shallow knowledge as an aid to deep understanding in early phase requirements engineering. IEEE Trans Softw Eng 31(11):969\u2013981","journal-title":"IEEE Trans Softw Eng"},{"key":"252_CR78","doi-asserted-by":"crossref","unstructured":"Slankas J, Williams L (2013) Automated extraction of non-functional requirements in available documentation. In: International workshop on natural language analysis in software engineering (NaturaLiSE), pp 9\u201316","DOI":"10.1109\/NAturaLiSE.2013.6611715"},{"key":"252_CR79","doi-asserted-by":"crossref","unstructured":"Slonim N, Tishby N (2000) Document clustering using word clusters via the information bottleneck method. In: International ACM SIGIR conference on research and development in information retrieval, pp 208\u2013215","DOI":"10.1145\/345508.345578"},{"key":"252_CR80","doi-asserted-by":"crossref","unstructured":"Sousa D, Sarmento L, Rodrigues EM (2010) Characterization of the twitter replies network: are user ties social or topical? In: International workshop on search and mining user-generated contents, pp 63\u201370","DOI":"10.1145\/1871985.1871996"},{"key":"252_CR81","doi-asserted-by":"crossref","unstructured":"Sridhara G, Hill E, Pollock L, Vijay-Shanker K (2008) Identifying word relations in software: A comparative study of semantic similarity tools. In: IEEE international conference on program comprehension, pp 123\u2013132","DOI":"10.1109\/ICPC.2008.18"},{"key":"252_CR82","unstructured":"Strube M, Ponzetto S (2006) Wikirelate! computing semantic relatedness using Wikipedia. In: National conference on artificial intelligence, pp 1419\u20131424"},{"issue":"1","key":"252_CR83","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1002\/asi.20704","volume":"59","author":"M Thelwall","year":"2008","unstructured":"Thelwall M (2008) Extracting accurate and complete results from search engines: case study windows live. J Am Soc Inform Sci Technol 59(1):38\u201350","journal-title":"J Am Soc Inform Sci Technol"},{"key":"252_CR84","doi-asserted-by":"crossref","unstructured":"Turney P (2001) Mining the web for synonyms: PMI-IR versus LSA on TOEFL. In: European conference on machine learning, pp 491\u2013502","DOI":"10.1007\/3-540-44795-4_42"},{"issue":"1","key":"252_CR85","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s10115-009-0203-5","volume":"21","author":"WL Woon","year":"2009","unstructured":"Woon WL, Madnick S (2009) Asymmetric information distances for automated taxonomy construction. Knowl Inf Syst 21(1):91\u2013111","journal-title":"Knowl Inf Syst"},{"key":"252_CR86","doi-asserted-by":"crossref","unstructured":"Wu Z, Palmer M (1994) Verbs semantics and lexical selection. In: Annual meeting on association for computational linguistics, pp 133\u2013138","DOI":"10.3115\/981732.981751"},{"issue":"2","key":"252_CR87","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1177\/0047287508321193","volume":"47","author":"Z Xiang","year":"2008","unstructured":"Xiang Z, W\u00f6ber K, Fesenmaier D (2008) Representation of the online tourism domain in search engines. J Travel Res 47(2):137\u2013150","journal-title":"J Travel Res"},{"key":"252_CR88","unstructured":"Zhang W, Yang Y, Wang Q, Shu F (2011) An empirical study on classification of non-functional requirements. In: International conference on software engineering and knowledge engineering, pp 190\u2013195"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-016-0252-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-016-0252-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-016-0252-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T08:29:04Z","timestamp":1567844944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-016-0252-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,4]]},"references-count":88,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["252"],"URL":"https:\/\/doi.org\/10.1007\/s00766-016-0252-8","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,4]]}}}