{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T16:02:10Z","timestamp":1720195330414},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T00:00:00Z","timestamp":1478736000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T00:00:00Z","timestamp":1478736000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000083","name":"Directorate for Computer and Information Science and Engineering","doi-asserted-by":"publisher","award":["CCF-1543176"],"id":[{"id":"10.13039\/100000083","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10664-016-9476-y","type":"journal-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T07:28:01Z","timestamp":1478762881000},"page":"1028-1062","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Automated training-set creation for software architecture traceability problem"],"prefix":"10.1007","volume":"22","author":[{"given":"Waleed","family":"Zogaan","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Mujhid","sequence":"additional","affiliation":[]},{"given":"Joanna C.","family":"S. Santos","sequence":"additional","affiliation":[]},{"given":"Danielle","family":"Gonzalez","sequence":"additional","affiliation":[]},{"given":"Mehdi","family":"Mirakhorli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"key":"9476_CR1","doi-asserted-by":"crossref","unstructured":"Anish PR, Balasubramaniam B, Cleland-Huang J, Wieringa R, Daneva M, Ghaisas S (2015) Identifying architecturally significant functional requirements. In: Proceedings of the Fifth International Workshop on Twin Peaks of Requirements and Architecture, TwinPeaks \u201915. IEEE Press, NJ, USA, pp 3\u20138","DOI":"10.1109\/TwinPeaks.2015.9"},{"key":"9476_CR2","unstructured":"California Senate Bill SB 1386 (2002) \n http:\/\/www.leginfo.ca.gov\/pub\/13-14\/bill\/sen\/sb_1351-1400\/sb_1351_bill_20140221_introduced.pdf"},{"key":"9476_CR3","unstructured":"Congress US (1999) Gramm-Leach-Bliley Act, Financial Privacy Rule. 15 USC:6801\u20136809. \n http:\/\/www.law.cornell.edu\/uscode\/usc_sup_01_15_10_94_20_I.html"},{"key":"9476_CR4","unstructured":"Council PCI, Payment card industry (pci) data security standard Available over the Internet (July 2010). \n https:\/\/www.pcisecuritystandards.org"},{"key":"9476_CR5","doi-asserted-by":"crossref","unstructured":"Bachmann F, Bass L, Klein M (2003) Deriving Architectural Tactics: Architectural A Step Toward Methodical Architectural Design. Technical Report, Software Engineering Institute","DOI":"10.21236\/ADA413701"},{"key":"9476_CR6","unstructured":"Bass L, Clements P, Kazman R (2003) Software Architecture in Practice. Adison Wesley"},{"issue":"7","key":"9476_CR7","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/1160434.1160447","volume":"4","author":"GWJr Beeler","year":"2006","unstructured":"Beeler GW Jr, Gardner D (2006) A requirements primer. Queue 4(7):22\u201326","journal-title":"Queue"},{"key":"9476_CR8","doi-asserted-by":"crossref","unstructured":"Brodley CE (1993) Addressing the selective superiority problem: Automatic algorithm\/model class selection","DOI":"10.1016\/B978-1-55860-307-3.50009-5"},{"issue":"6","key":"9476_CR9","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TEVC.2003.819265","volume":"7","author":"JR Cano","year":"2003","unstructured":"Cano JR, Herrera F, Lozano M (2003) Using evolutionary algorithms as instance selection for data reduction in kdd An experimental study. Trans Evol Comp 7(6):561\u2013575","journal-title":"Trans Evol Comp"},{"key":"9476_CR10","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Czauderna A, Gibiec M, Emenecker J (2010) A machine learning approach for tracing regulatory codes to product specific requirements. In: ICSE (1), pp 155\u2013164","DOI":"10.1145\/1806799.1806825"},{"key":"9476_CR11","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Gotel O, Huffman Hayes J, Mader P, Zisman A (2014) Software traceability: Trends and future directions. In: Proceedings of the 36th International Conference on Software Engineering (ICSE), India","DOI":"10.1145\/2593882.2593891"},{"issue":"2","key":"9476_CR12","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s00766-007-0045-1","volume":"12","author":"J Cleland-Huang","year":"2007","unstructured":"Cleland-Huang J, Settimi R, Zou X, Solc P (2007) Automated detection and classification of non-functional requirements. Requir Eng 12(2):103\u2013120","journal-title":"Requir Eng"},{"key":"9476_CR13","doi-asserted-by":"crossref","unstructured":"Dyer R, Rajan H, Nguyen HA, Nguyen TN (2014) Mining billions of ast nodes to study actual and potential usage of java language features. In: Proceedings of the 36th International Conference on Software Engineering, ICSE 2014. ACM, NY, USA, pp 779\u2013790","DOI":"10.1145\/2568225.2568295"},{"issue":"3","key":"9476_CR14","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1109\/TIT.1972.1054809","volume":"18","author":"G Gates","year":"1972","unstructured":"Gates G (1972) The reduced nearest neighbor rule (corresp). IEEE Trans Inf Theory 18(3):431\u2013433","journal-title":"IEEE Trans Inf Theory"},{"key":"9476_CR15","doi-asserted-by":"crossref","unstructured":"Gethers M, Oliveto R, Poshyvanyk D, Lucia A (2011) On integrating orthogonal information retrieval methods to improve traceability recovery. In: 2011 27th IEEE International Conference on Software Maintenance (ICSM), pp 133\u2013142","DOI":"10.1109\/ICSM.2011.6080780"},{"key":"9476_CR16","doi-asserted-by":"crossref","unstructured":"Gibiec M, Czauderna A, Cleland-Huang J (2010) Towards mining replacement queries for hard-to-retrieve traces. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, ASE \u201910. ACM, NY, USA, pp 245\u2013254","DOI":"10.1145\/1858996.1859046"},{"key":"9476_CR17","unstructured":"Kohavi R (1995) A study of cross-validation and bootstrap for accuracy estimation and model selection. Morgan Kaufmann"},{"key":"9476_CR18","unstructured":"Koders (2014) \n http:\/\/www.koders.com"},{"key":"9476_CR19","unstructured":"Liebchen GA, Shepperd M (2008) Data sets and data quality in software engineering. In: Proceedings of the 4th International Workshop on Predictor Models in Software Engineering, PROMISE\u201908. ACM, NY, USA, pp 39\u201344"},{"key":"9476_CR20","doi-asserted-by":"crossref","unstructured":"Mahmoud A (2015) An information theoretic approach for extracting and tracing non-functional requirements. In: Proceedings RE. IEEE, pp 36\u201345","DOI":"10.1109\/RE.2015.7320406"},{"key":"9476_CR21","volume-title":"Lucene in Action","author":"M McCandless","year":"2010","unstructured":"McCandless M, Hatcher E, Gospodnetic O (2010) Lucene in Action, 2nd edn. Covers Apache Lucene 3.0. Manning Publications Co, CT, USA","edition":"2nd edn."},{"key":"9476_CR22","doi-asserted-by":"crossref","unstructured":"Mehdi Mirakhorli J. C.-H. (2015) Detecting, tracing, and monitoring architectural tactics in code. IEEE Trans Software Eng","DOI":"10.1109\/TSE.2015.2479217"},{"key":"9476_CR23","unstructured":"Mirakhorli M (2014) Preserving the quality of architectural decisions in source code. PhD Dissertation, DePaul University Library"},{"key":"9476_CR24","doi-asserted-by":"crossref","unstructured":"Mirakhorli M, Cleland-Huang J (2011) Tracing Non-Functional Requirements. In: Zisman A, Cleland-Huang J, Gotel O (eds) Software and Systems Traceability. Springer-Verlag","DOI":"10.1007\/978-1-4471-2239-5"},{"key":"9476_CR25","doi-asserted-by":"crossref","unstructured":"Mirakhorli M, Cleland-Huang J (2011) Using tactic traceability information models to reduce the risk of architectural degradation during system maintenance. In: Proceedings of the 2011 27th IEEE International Conference on Software Maintenance, ICSM \u201911. IEEE Computer Society, DC, USA, pp 123\u2013132","DOI":"10.1109\/ICSM.2011.6080779"},{"key":"9476_CR26","doi-asserted-by":"crossref","unstructured":"Mirakhorli M, Fakhry A, Grechko A, Wieloch M, Cleland-Huang J (2014) Archie: A tool for detecting, monitoring, and preserving architecturally significant code. In: CM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2014)","DOI":"10.1145\/2635868.2661671"},{"key":"9476_CR27","doi-asserted-by":"crossref","unstructured":"Mirakhorli M, M\u00e4der P., Cleland-Huang J (2012) Variability points and design pattern usage in architectural tactics. In: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE \u201912. ACM, pp 52:1\u201352:11","DOI":"10.1145\/2393596.2393657"},{"key":"9476_CR28","doi-asserted-by":"crossref","unstructured":"Mirakhorli M, Shin Y, Cleland-Huang J, Cinar M (2012) A tactic centric approach for automating traceability of quality concerns. In: International Conference on Software Engineering, ICSE (1)","DOI":"10.1109\/ICSE.2012.6227153"},{"key":"9476_CR29","doi-asserted-by":"publisher","unstructured":"Molina LC, Belanche L, Nebot \u00c0 (2002) Feature Selection Algorithms: A Survey and Experimental Evaluation. In: Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 9\u201312 December 2002, Maebashi City, Japan. doi:\n 10.1109\/ICDM.2002.1183917\n \n , \n 10.1109\/ICDM.2002.1183917\n \n , pp 306\u2013313","DOI":"10.1109\/ICDM.2002.1183917"},{"issue":"6","key":"9476_CR30","first-page":"54","volume":"4","author":"MLC Passini","year":"2013","unstructured":"Passini MLC, Estb\u0306anez K. B., Figueredo GP, Ebecken NFF (2013) A strategy for training set selection in text classification problems. (IJACSA) International Journal of Advanced Computer Science and Applications 4(6):54\u201360","journal-title":"(IJACSA) International Journal of Advanced Computer Science and Applications"},{"key":"9476_CR31","volume-title":"Automatic text processing: The transformation, analysis, and retrieval of information by computer","author":"G Salton","year":"1989","unstructured":"Salton G (1989) Automatic text processing: The transformation, analysis, and retrieval of information by computer. Addison-Wesley Longman Publishing Co., Inc., MA, USA"},{"key":"9476_CR32","unstructured":"Skalak DB (1994) Prototype and feature selection by sampling and random mutation hill climbing algorithms. In: Machine Learning: Proceedings of the Eleventh International Conference. Morgan Kaufmann, pp 293\u2013301"},{"key":"9476_CR33","unstructured":"University of California I (2010) The sourcerer project. sourcerer.ics.uci.edu"},{"key":"9476_CR34","unstructured":"De Winter JCF (2013) Using the Student\u2019s t-test with extremely small sample sizes"},{"issue":"3","key":"9476_CR35","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1023\/A:1007626913721","volume":"38","author":"DR Wilson","year":"2000","unstructured":"Wilson DR, Martinez TR (2000) Reduction techniques for instance-basedlearning algorithms. Mach Learn 38(3):257\u2013286","journal-title":"Mach Learn"},{"key":"9476_CR36","doi-asserted-by":"crossref","unstructured":"Zhu J, Zhou M, Mockus A (2014) Patterns of folder use and project popularity: A case study of github repositories. In: Proceedings of the 8th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement ESEM \u201914, vol 4, pp 30:1\u201330:4","DOI":"10.1145\/2652524.2652564"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-016-9476-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9476-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9476-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T15:06:23Z","timestamp":1589727983000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-016-9476-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,10]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["9476"],"URL":"https:\/\/doi.org\/10.1007\/s10664-016-9476-y","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,10]]},"assertion":[{"value":"10 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}