2017 24th Asia-Pacific Software Engineering Conference (APSEC) 2017
DOI: 10.1109/apsec.2017.14
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Approach to Traceability Recovery Based on Word Embeddings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…Although not enjoying the immense popularity of Word2Vec, it is still prominent to the scientific community [46,6,39,7]. In requirement traceability, researchers also made use of word embeddings to recover appropriate links [9,45,44]. Our current approach differs from these in many aspects.…”
Section: Related Workmentioning
confidence: 99%
“…Although not enjoying the immense popularity of Word2Vec, it is still prominent to the scientific community [46,6,39,7]. In requirement traceability, researchers also made use of word embeddings to recover appropriate links [9,45,44]. Our current approach differs from these in many aspects.…”
Section: Related Workmentioning
confidence: 99%
“…The distribution of vectors within the space varies depending on the specific approach taken. The use of word embedding has achieved significant success for addressing NLP challenges in domains such as ad-hoc information retrieval [4][51], bug localization [57], question answering [15] and also trace link recovery [58] [20].…”
Section: Word Embedding (We)mentioning
confidence: 99%
“…Nevertheless, traditional feature representation methods often ignore the contextual information or word order in texts and remain unsatisfactory for capturing the semantics of the words. Recent studies in SE [75,74,76,69] began to use pre-trained word embeddings, which can capture rich syntactic and semantic features of words in a low-dimensional vector. For example, Han et al [69] proposed a deep learning approach to predict the severity level of software vulnerability, using a continuous skip-gram model (one of the popular word embedding models) to capture word-level features and a one-layer shallow CNN to capture sentence-level features in vulnerability descriptions.…”
Section: Feature Preparationmentioning
confidence: 99%