2009 ICSE Workshop on Traceability in Emerging Forms of Software Engineering 2009
DOI: 10.1109/tefse.2009.5069582
|View full text |Cite
|
Sign up to set email alerts
|

Combining textual and structural analysis of software artifacts for traceability link recovery

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 74 publications
(46 citation statements)
references
References 24 publications
0
46
0
Order By: Relevance
“…There are reports on several trace automation approaches, such as Egyed's scenario-driven approach to traceability [6], Jackson's key-phrase-based traceability scheme [12]. Further, there are the heterogeneous traceability approach Cleland-Huang et al [4], and approaches by Pinheiro et al [20], Leuser [14], and McMillan et al [16]. These approaches use different techniques to identify requirements interdependencies.…”
Section: Requirement Conflicts Detection and Requirements Tracingmentioning
confidence: 99%
“…There are reports on several trace automation approaches, such as Egyed's scenario-driven approach to traceability [6], Jackson's key-phrase-based traceability scheme [12]. Further, there are the heterogeneous traceability approach Cleland-Huang et al [4], and approaches by Pinheiro et al [20], Leuser [14], and McMillan et al [16]. These approaches use different techniques to identify requirements interdependencies.…”
Section: Requirement Conflicts Detection and Requirements Tracingmentioning
confidence: 99%
“…The current work continues today on improving existing techniques for feature location, impact analysis, traceability link recovery, software reuse, mining developer expertise, and already resulted in several refereed conference publications [10,21,22,24,32].…”
Section: Publications and Current Workmentioning
confidence: 99%
“…Latent Semantic Indexing identifies relationships between terms and concepts in unstructured text and has been successfully applied to a number of software engineering tasks such as feature location [45,160,165,173], traceability link recovery [3,57,100,108,137,148,220], software measurement [139,164], and detecting code clones [136,212]. In LSI, Identifiers and comments extracted from source code comprise a vocabulary set.…”
Section: Unstructured Informationmentioning
confidence: 99%