2013
DOI: 10.1007/s10664-013-9255-y
|View full text |Cite
|
Sign up to set email alerts
|

Recovering from a decade: a systematic mapping of information retrieval approaches to software traceability

Abstract: Your article is protected by copyright and all rights are held exclusively by Springer Science +Business Media New York. This e-offprint is for personal use only and shall not be selfarchived in electronic repositories. If you wish to self-archive your article, please use the accepted manuscript version for posting on your own website. You may further deposit the accepted manuscript version in any repository, provided it is only made publicly available 12 months after official publication or later and provided… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
123
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 127 publications
(128 citation statements)
references
References 149 publications
1
123
0
Order By: Relevance
“…A majority of the effort has been spent in recovering the traceability links [30]. Our work advances the literature by showing that traceability can be more than recovered.…”
Section: Related Workmentioning
confidence: 69%
See 1 more Smart Citation
“…A majority of the effort has been spent in recovering the traceability links [30]. Our work advances the literature by showing that traceability can be more than recovered.…”
Section: Related Workmentioning
confidence: 69%
“…In most cases, a recall of 90% is achievable at precision levels of 5-30% [24,27,28,29]. Before choosing an accurate tracing mechanism among the many options [14,30] or even developing a new one, we must understand how traceability is currently practiced in justin-time RE. The pertinent literature, however, is surprisingly scant.…”
Section: A Using Traceability To Locate "Where"mentioning
confidence: 99%
“…There are two main families of IR models used in software engineering: algebraic models and probabilistic models (Borg et al, 2014). For automated bug assignment, four studies used algebraic models (Chen et al, 2011;Kagdi et al, 2012;Nagwani and Verma, 2012;Shokripour et al, 2012).…”
Section: Other Approaches To Automated Bug Assignmentmentioning
confidence: 99%
“…For the textual features, we limit the number of words because of memory applications (Borg et al, 2014 Company Telecom contain information in more than 100 elds. However, most of these elds are empty when the bug report is submitted.…”
Section: Bug Report Feature Selectionmentioning
confidence: 99%
“…The literature also reports on the extension and adaptation of commercial tools for impact analysis purposes [67]. Regarding the current approaches for automated traceability and impact analysis, they have been validated on small data sets [7] and limited artefact types [49]. Therefore, their actual support to industrial needs remains unconfirmed because practitioners usually have to deal with tens of artefact types and thousands of artefacts for SECIA [48].…”
Section: General Literature On Impact Analysismentioning
confidence: 99%