2015 IEEE Twelfth International Symposium on Autonomous Decentralized Systems 2015
DOI: 10.1109/isads.2015.33
|View full text |Cite
|
Sign up to set email alerts
|

A Semantic Approach for Traceability Link Recovery in Aerospace Requirements Management System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Mahmood et al proposed to use semantic knowledge for automatic traceability chain recovery in aerospace demand supervisory system. The purpose is to cut down the consumption cost of time and resources, help software engineering projects meet business needs, and improve the efficiency of time management (Mahmood et al, 2015).…”
Section: Applications Of Semantics In Aerospacementioning
confidence: 99%
“…Mahmood et al proposed to use semantic knowledge for automatic traceability chain recovery in aerospace demand supervisory system. The purpose is to cut down the consumption cost of time and resources, help software engineering projects meet business needs, and improve the efficiency of time management (Mahmood et al, 2015).…”
Section: Applications Of Semantics In Aerospacementioning
confidence: 99%
“…Our earlier work [40] mentions an application where AD-STLR can be applied on "Weather Services for Air Traffic Aviation in Detroit". This paper presents development of National Aeronautics and Space Administration (NASA) autonomous drone traffic management application.…”
Section: Applicationmentioning
confidence: 99%
“…Traceability has been mentioned in many software development methodologies as part of software engineering practice. Maintaining the trace links between software artifacts is crucial to perform various software engineering activities including change impact analysis [1], requirements coverage analysis [2], requirements verification and validation [3], test case selection [4], compliance verification [5], issue assignment [6] and bug localization [7]. Over the last few decades, researchers have attempted to recover trace links automatically using Information Retrieval (IR) techniques.…”
Section: Introductionmentioning
confidence: 99%