{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T03:38:03Z","timestamp":1648870683210},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T00:00:00Z","timestamp":1193097600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1007\/s11219-007-9034-3","type":"journal-article","created":{"date-parts":[[2007,10,22]],"date-time":"2007-10-22T13:36:51Z","timestamp":1193060211000},"page":"131-156","source":"Crossref","is-referenced-by-count":1,"title":["A lightweight approach to software validation by comparing UML use cases with internal program documentation selected via call graphs"],"prefix":"10.1007","volume":"16","author":[{"given":"Owen","family":"Funkhouser","sequence":"first","affiliation":[]},{"given":"Letha Hughes","family":"Etzkorn","sequence":"additional","affiliation":[]},{"suffix":"Jr.","given":"William E.","family":"Hughes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,10,23]]},"reference":[{"key":"9034_CR1","unstructured":"Ahlowalla, N. (2002). Testing from use cases using path analysis technique. In Proc. Int. Conf. Software Testing Analysis and Review. \n http:\/\/www.sqe.com\/stareast\/past.asp\n \n . Accessed 9-December-2005."},{"key":"9034_CR2","volume-title":"Stories, use cases","author":"I. Alexander","year":"2004","unstructured":"Alexander, I., & Maiden, N. (2004). Stories, use cases. New York: John Wiley & Sons."},{"key":"9034_CR3","volume-title":"Modern information retrieval","author":"R. Baeza-Yates","year":"1999","unstructured":"Baeza-Yates, R., & Ribiero-Neto, B. 1999, Modern information retrieval. New York: Addison-Wesley."},{"key":"9034_CR4","unstructured":"Bairagi, D., Kumar, S., & Agrawal, D. P. (1997). Precise call graph construction for 00 programs in the presence of virtual functions. In Proc. Int. Conf. Parallel Proc. (pp. 412\u2013416). Bloomington, IL."},{"key":"9034_CR5","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/175290.175300","volume":"37","author":"T. J. Biggerstaff","year":"1994","unstructured":"Biggerstaff, T. J., Mitbander, B. G., & Webster, D. E. (1994). Program understanding and the concept assignment problem. Communications of the ACM, 37, 72\u201378.","journal-title":"Communications of the ACM"},{"key":"9034_CR6","doi-asserted-by":"crossref","unstructured":"Caprile, B., & Tonella, P. (1999). Nomen Est Omen: Analyzing the language of function identifiers. In Proc. Working Conf. Reverse Engineering ((pp. 112\u2013122)). Atlanta, Georgia, USA.","DOI":"10.1109\/WCRE.1999.806952"},{"key":"9034_CR7","unstructured":"Chen, K, & Rajlich, V. (2000). Case study of feature location using dependence graph. In: Proc. Int. Workshop Program Comprehension (pp. 241\u2013249). Limerick, Ireland."},{"key":"9034_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSE.2003.1178051","volume":"29","author":"A. Egyed","year":"2003","unstructured":"Egyed, A. (2003). A scenario-driven approach to trace dependency analysis. IEEE Transactions on Software Engineering, 29, 1\u201317.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9034_CR9","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/2.625311","volume":"30","author":"L. Etzkorn","year":"1997","unstructured":"Etzkorn, L., & Davis, C. (1997). Automatically identifying reusable OO legacy code. IEEE Computer, 30, 66\u201371.","journal-title":"IEEE Computer"},{"key":"9034_CR10","unstructured":"Etzkorn, L. (1997). A Metrics Based Approach to the Automated Identification of Reusable Object-Oriented Reusable Software Components. Doctoral Dissertation, University of Alabama in Huntsville."},{"key":"9034_CR11","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1017\/S1351324999002120","volume":"5","author":"L Etzkorn","year":"1999","unstructured":"Etzkorn, L, Bowen, L., & Davis, C. (1999). An approach to program understanding by natural language understanding. Natural Language Engineering, 5, 219\u2013236.","journal-title":"Natural Language Engineering"},{"key":"9034_CR12","doi-asserted-by":"publisher","first-page":"1731","DOI":"10.1016\/S0378-2166(00)00068-0","volume":"33","author":"L. Etzkorn","year":"2001","unstructured":"Etzkorn, L., Davis, C., & Bowen, L. (2001). The language of comments in computer software: A sublanguage of english. Journal of Pragmatics, 33, 1731\u20131756.","journal-title":"Journal of Pragmatics"},{"key":"9034_CR13","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1142\/S021819400500252X","volume":"15","author":"J. Hayes","year":"2005","unstructured":"Hayes, J., & Dekhtyar, A. (2005). A framework for comparing requirements tracing experiments. International Journal of Software Engineering and Knowledge Engineering, 15, 751\u2013781.","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"key":"9034_CR14","unstructured":"Heumann, J. (2005). Generating Test Cases from Use Cases, in The Rational Edge e-zine: www.therationaledge.com\/content\/jun_o1\/m_cases_jh.html. Accessed 9-December-2005."},{"key":"9034_CR15","unstructured":"Lawrie, D., Morrell, C., Field, H. & Binkley, D. (2006). What\u2019s in a Name? A study of identifiers. In Proc. Fourteenth IEEE Int. Conf. Program Comprehension (pp. 1\u201310). Athens, Greece."},{"key":"9034_CR16","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/52.35588","volume":"6","author":"K. J. Lieberherr","year":"1989","unstructured":"Lieberherr, K. J., & Holland, I. M. (1989). Assuring good style for object-oriented programs. IEEE Software, 6, 38\u201348.","journal-title":"IEEE Software"},{"key":"9034_CR17","doi-asserted-by":"crossref","unstructured":"Maletic, J. I., & Marcus, A. (2001). Supporting program comprehension using semantic and structural information. In Proc. Twenty-third IEEE\/ACM Conf. Software Eng. (pp. 103\u2013112). Toronto, Canada.","DOI":"10.1109\/ICSE.2001.919085"},{"key":"9034_CR18","doi-asserted-by":"crossref","unstructured":"Marcus, A., & Maletic, J. I. (2001). Identification of high-level concept clones in source code. In The Proc. the 16th IEEE Int. Conf. Automated Software Eng. (pp. 107\u2013114). San Diego, CA, USA.","DOI":"10.1109\/ASE.2001.989796"},{"key":"9034_CR19","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1142\/S0218194005002543","volume":"15","author":"A. Marcus","year":"2005","unstructured":"Marcus, A., Maletic, J., & Sergeyev, A. (2005). Recovery of traceability links between software documentation and source code. International Journal Software Engineering and Knowledge Engineering, 15, 811\u2013836.","journal-title":"International Journal Software Engineering and Knowledge Engineering"},{"key":"9034_CR20","doi-asserted-by":"crossref","unstructured":"Marcus, A., Sergeyev, a., Rajlich, V., & Maletic, J. (2004). An information retrieval approach to concept location in source code. In Proc. 11th IEEE Working Conf. Reverse Engineering (pp. 214\u2013223). Delft, The Netherlands.","DOI":"10.1109\/WCRE.2004.10"},{"key":"9034_CR21","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1145\/279310.279314","volume":"7","author":"G. Murphy","year":"1998","unstructured":"Murphy, G., Notkin, D., Griswold, W.G., & Lan, E. (1998). An empirical study of static call graph extractors. ACM Transactions on Software Engineering and Methodology, 7, 158\u2013191.","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"9034_CR22","doi-asserted-by":"crossref","unstructured":"Poshyvanyk, D., Gueheneuc, Y., Marcus, A., Antoniol, G., & Rajlich, V.,(2006). Combining probabilistic ranking and latent semantic indexing for feature identification. In Proc. Fourteenth IEEE Int. Conf. Program Comprehension (pp. 137\u2013146). Athens, Greece.","DOI":"10.1109\/ICPC.2006.17"},{"key":"9034_CR23","doi-asserted-by":"crossref","unstructured":"Rajlich, V., & Wilde, N. (2002). The role of concepts in program comprehension. In Proc. of the IEEE Int. Workshop Program Comprehension (pp. 271\u2013278). Paris, France.","DOI":"10.1109\/WPC.2002.1021348"},{"key":"9034_CR24","unstructured":"Remillard, A. (1996). Software validation made simple. In: Proc. Ninth IEEE Symposium Computer-Based Medical Systems (pp. 36\u201340). Ann Arbor, MI."},{"key":"9034_CR25","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/52.43053","volume":"7","author":"C. Rich","year":"1990","unstructured":"Rich, C., & Wills, L. M. (1990). Recognizing a program\u2019s design: A graph-parsing approach. IEEE Software, 7, 82\u201389.","journal-title":"IEEE Software"},{"key":"9034_CR26","doi-asserted-by":"crossref","unstructured":"Salah, M., Denton, T., Mancoridis, S., Shokoufandeh, A., & Vokolos, F. (2005). Scenariographer: a tool for reverse engineering class usage scenarios from method invocation sequences. In Proc. Twenty-first IEEE Int. Conf. Software Maint (pp. 144\u2013164). Budapest, Hungary.","DOI":"10.1109\/ICSM.2005.78"},{"key":"9034_CR27","doi-asserted-by":"crossref","unstructured":"Salah, M., Mancoridis, S., Antoniol, G., & Dipenta, M. (2005). Towards employing use-cases and dynamic analysis to comprehend Mozilla. In Proc. Twenty-first IEEE International Conf. Software Maintenance (pp. 639\u2013642). Budapest, Hungary.","DOI":"10.1109\/ICSM.2005.94"},{"key":"9034_CR28","doi-asserted-by":"crossref","unstructured":"Simons, A. J. H. (1999). Use cases considered harmful. In Proc. Tech. of Object-Oriented Languages and Systems (pp. 184\u2013193). Nancy, France.","DOI":"10.1109\/TOOLS.1999.779012"},{"key":"9034_CR29","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1002\/smr.4360070105","volume":"7","author":"N. Wilde","year":"1995","unstructured":"Wilde, N., & Scully, M. (1995). Software reconnaissance: Mapping program features to code. Journal of Software Maintenance: Research and Practice, 7, 49\u201362.","journal-title":"Journal of Software Maintenance: Research and Practice"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-007-9034-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-007-9034-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-007-9034-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-007-9034-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T11:56:38Z","timestamp":1581940598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-007-9034-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,23]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["9034"],"URL":"https:\/\/doi.org\/10.1007\/s11219-007-9034-3","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,10,23]]}}}