2012 20th IEEE International Requirements Engineering Conference (RE) 2012
DOI: 10.1109/re.2012.6345842
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing candidate link generation for requirements tracing: The cluster hypothesis revisited

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0
1

Year Published

2014
2014
2018
2018

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 44 publications
(34 citation statements)
references
References 25 publications
0
33
0
1
Order By: Relevance
“…To locate more accurately "where" the code base should be refactored, we synthesize clustering-based link retrieval [13] with the as-needed traceability information captured in issue tracking repositories [4]. To determine more precisely "what" refactoring(s) should be applied to the identified places, we develop a new scheme by first examining requirements semantics as they relate to implementation, then leveraging the semantic characterization to uncover the problems in the code (i.e., bad smells [7]) that may impede the fulfillment of the requirements, and finally choosing the type of refactorings that can remove the bad smells.…”
Section: Introductionmentioning
confidence: 99%
“…To locate more accurately "where" the code base should be refactored, we synthesize clustering-based link retrieval [13] with the as-needed traceability information captured in issue tracking repositories [4]. To determine more precisely "what" refactoring(s) should be applied to the identified places, we develop a new scheme by first examining requirements semantics as they relate to implementation, then leveraging the semantic characterization to uncover the problems in the code (i.e., bad smells [7]) that may impede the fulfillment of the requirements, and finally choosing the type of refactorings that can remove the bad smells.…”
Section: Introductionmentioning
confidence: 99%
“…On the basis of major assumptions of the cluster hypothesis, the research assumptions are generated within this phase. On the basis of relevance of information required [23], the documents that behave similarly are present within similar clusters.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…One major drawback of Information retrieval approaches, in particular, TF-IDF similarity scoring, is the huge amount of false positives candidate links that are generated [17]. In the literature, this is handled through the use of an arbitrary cut-off value upon the document's score below which, the document is not considered as a valuable candidate link [18].…”
Section: Hybridizing Mde and Ir In The Toolmentioning
confidence: 99%
“…Tackling the candidate link generation is a major issue in the IR community. Niu and Mahmoud proposed to rely on clustering algorithm to sort between good and bad quality clusters [17]. Our approach is based on a pre-processing enrichment of the documents, synchronized with the model information and can be seen as a complementary work.…”
Section: Related Workmentioning
confidence: 99%