<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Quality Improvements for Trace Links between Source Code and Requirements</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Paul</forename><surname>Hübner</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Institute for Computer Science</orgName>
								<orgName type="institution">Heidelberg University</orgName>
								<address>
									<addrLine>Im Neuenheimer Feld 326</addrLine>
									<postCode>69120</postCode>
									<settlement>Heidelberg</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Quality Improvements for Trace Links between Source Code and Requirements</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">6BE62388BECD14AAD83B0502C8611BF4</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T20:06+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>traceability</term>
					<term>quality</term>
					<term>interaction</term>
					<term>requirement</term>
					<term>source code</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Traceability between source code and requirement artifacts is important for various tasks during software development. However, it is a lot of effort to create and maintain traceability links manually. Therefore, semi-automatic traceability support is developed. [Question/ problem] Traceability research has a strong focus on trace link recovery using information retrieval (IR) techniques. These techniques use the textual similarity of documents to create trace links. The quality according to precision and recall of these techniques is still not satisfying. [Principal ideas/ results] Precision and recall can be improved by providing more data as used in IR. In this thesis, we evaluate two new data source types to create trace links. To link two specific artifacts, we exploit existing links in the context of these artifacts. Furthermore, we use the interaction logs of developers for trace link creation between the artifacts the developers touched. [Contribution]  In this paper, we present the research problems as well as the principal solutions to deal with these challenges, our research methodology, and our progress so far.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Traceability between source code and requirements is important for many software engineering tasks e.g., maintenance, program comparison, verification <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b0">1]</ref> and is a major concern of software engineering research <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b1">2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b14">15]</ref>. IR-based trace link recovery is the most common used technique to discover trace links between artifacts <ref type="bibr" target="#b1">[2]</ref>. This technique creates links between artifacts with textual similarity as implemented in the used IR model. Thus, IR-based trace link creation is limited with respect to similarity measure and the used IR model <ref type="bibr" target="#b11">[12]</ref>. Also precision and recall are not satisfying <ref type="bibr" target="#b12">[13]</ref>.</p><p>To improve the semi-automatic creation of trace links between implementation and requirements artifacts, we investigate different possibilities to create trace links during software development. We build on the approach of Delater et al. <ref type="bibr" target="#b5">[6]</ref> which uses the actual working task of developers as an intermediate element to link the requirements and the code involved in this task. Our main idea is to evaluate two new data sources to create trace links. To link two specific artifacts, we exploit the existing links in the context of these artifacts. Furthermore, we use the interaction logs of developers for trace link creation between the artifacts the developers touched. Therefore, we implement algorithms for these new data sources and compare them with traditional IR methods, based only on the artifacts, as well as with the working task approach of Delater. We also analyze combinations of these methods to improve precision and recall for the recovered trace links. In which precision is the fraction of retrieved trace links that are relevant, while recall is the fraction of relevant trace links that are retrieved.</p><p>The remainder of this paper is structured as follows. Section 2 describes the research problem tackled in this thesis. Section 3 presents the proposed solutions and discusses their novelty. Section 4 gives an overview of related work. Section 5 discusses the applied research methods. With our progress, we conclude the paper in Section 6.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Problem</head><p>The problem of established trace link recovery techniques is their insufficient quality regarding precision and recall <ref type="bibr" target="#b2">[3]</ref>. According to Gotel et al. <ref type="bibr" target="#b6">[7]</ref> there is a tradeoff between precision and recall: if IR-based methods have a good recall (up to 90%), the generated candidate links include a lot of false positives, i.e. precision is between 10 to 20% <ref type="bibr" target="#b6">[7]</ref>. Even with recall values of 90%, important links might be missing. Therefore, we investigate the following general research question: (RQ) How to improve semi-automatically detected trace link quality according to precision and recall? One reason for this problem is that textual similarity is not sufficient to detect links. E.g., a use case is relevant for the class implementing system functions required in the use case, but the class text may use different words than the use case. Another reason for this problem is the dependency between recall and precision when using IR-based recovery techniques. To get high recall values, the threshold defining that two artifacts are linked has to be low <ref type="bibr" target="#b12">[13]</ref>. This often results in a bad precision, as many unrelated artifacts are included. Thus, we propose to use interaction logs and existing links as additional data sources. These additional data sources can improve recall, since they are likely to yield new links compared with IR. Precision will be improved, since false positive links are more unlikely for interaction logs and existing links as for IR. We investigate the following detailed research questions: (RQ1) Do the additional data sources improve precision and recall? (RQ2) Can the combination improve the precision and recall even more? (RQ 2.1) How can the best combination of trace link recovery techniques be determined? (RQ 2.2) Is there a certain combination of trace link recovery techniques which leads to most improvements in precision and recall in different settings?</p><p>To answer RQ1, our proposed solution is based on the usage of two new data sources for trace link creation. We build on the approach of Delater et al. <ref type="bibr" target="#b5">[6]</ref>, where trace links between requirements and code are captured semi-automatically by using tasks as intermediate elements. Trace links are created along with the processing of the task and the associated requirement and code elements based on artefact changes. Figure <ref type="figure" target="#fig_0">1</ref> shows our extension of Delater's approach. It can be separated into two parts.  On the one hand, we use developer's interaction data produced while working with an integrated development environment (IDE) (cf. Figure <ref type="figure" target="#fig_0">1</ref> (1)). Interaction data consists of interaction events. These interaction events have different types e.g., edit, selection, navigation, execution, etc. and are typically related to artifacts like source code or requirements. A set of certain interaction events like edit → navigation → edit is a navigation path. Frequently occurring interaction paths are called interaction patterns. The knowledge of interaction patterns will improve precision as frequent navigation indicates a stronger relation between the artifacts.</p><p>On the other hand, we exploit the existing trace link structure (cf. Figure <ref type="figure" target="#fig_0">1</ref>(2)). to improve the trace link precision, since trace links are created based on already verified trace links. When using data created during runtime for trace link recovery, it is natural to also apply this recovery repeatedly during development and not only after development as it is typical in traditional methods <ref type="bibr" target="#b3">[4]</ref>. This extends trace link recovery to trace link recommendation to developers directly during development. It makes trace links available early in a project. Furthermore, the assessment of the trace links by developers is facilitated, since link recommendations fit to the actual context of a developer. To investigate RQ2, we compare different combinations of trace link recovery techniques regarding precision and recall. The starting point is the combined usage of IR and interaction data-based recovery to increase trace link recall. To increase precision we combine this with the exploitation of the existing trace link structure or interaction patterns. Both can also be used to focus IR-based recovery on specific artifacts.</p><p>In the following we illustrate our ideas by an example. We assume that a developer knows the requirement s/he has to implement. E.g., the developer implements a system function as a set of methods within a class.</p><p>First, we outline how to use developers' interaction data to infer trace links. During the implementation of the methods s/he looks up the detailed specification of the system function in the requirements specification. This navigation between system function definition and implemented methods is logged. After s/he has finished the implementation of the methods, trace links between system function specification and methods can be inferred based on the used navigation paths. Using the working task context as in Delater's work <ref type="bibr" target="#b5">[6]</ref> is an additional benefit, since navigation interactions can be separated based on their association to a task (cf. Figure <ref type="figure" target="#fig_0">1</ref>).</p><p>Second, we outline how to exploit the existing trace links structure of implementation and requirements. Both, requirements and code are typically hierarchical. E.g., a use case includes a system function and a class includes a method.</p><p>Trace links between upper level artifacts can be used to infer trace links between lower level artifacts and vice versa. Assume that the class in which the methods for the system functions should be implemented is already linked with a use case. In the requirements specification the use case is linked with system functions. Thus, the existence of links between the use case and the system functions as well as the use case and the class increases the likelihood that some methods should be linked to the system functions. This can be applied as a filter on previously identified navigation paths or can be used to add additional link candidates. In both cases, precision can be improved by using IR to check the textual similarity between implemented methods and the systems functions specification.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Related Work</head><p>A recent overview of important IR-based trace link recovery approaches in the last decade and an evaluation of the approaches is given by Borg et al. <ref type="bibr" target="#b1">[2]</ref>. We use the evaluation results of the discussed IR approaches as comparison measure for the quality assessment of our approach. Other approaches using additional data sources exist. The following two approaches also exploit the artifacts hierarchy, but not for trace link recovery. De Lucia et al. <ref type="bibr" target="#b4">[5]</ref> presented an approach for a fine-grained management of trace links using a software artifacts hierarchy in addition to traditional IR-based recovery methods. In contrast to our approach, the hierarchy relations were not directly used when recovering trace links, instead they were used to navigate between linked artefacts. Wentao et al. <ref type="bibr" target="#b16">[17]</ref> use existing trace links for further data processing actions. They compare the evolution of code, requirements, and trace links and use the trace links as a starting point to compensate for the divergence between those elements.</p><p>The use of interaction data of developers is widespread in software engineering, especially in the domain of recommendation systems. Maalej et al. <ref type="bibr" target="#b8">[9]</ref> describe how to use interaction data, based on examples of existing recommendation systems, to trigger recommendations about used source artifacts. Furthermore, they describe different methods to aggregate this data to sessions, tasks, and activities and how to filter such data for productive use. We build on these methods for the development of our interaction patterns. Cleland-Huang et al.</p><p>[4] present a study in which they implemented and evaluated an approach to recommend trace links between system model (UML) and requirements during model changes. They use edit interactions to trigger recommendations of trace links which is similar to our approach, but use IR instead of the interaction data to create links. The use of interaction data to find software artifact relations is also applied in the domain of software architecture. Konopka et al. <ref type="bibr" target="#b7">[8]</ref> find relations between source code artifacts and tasks based on IDE interaction data. This is used for grouping code, but not for linking requirements and code as in our approach.</p><p>There are further ways to improve the precision of links. Niu and Mahmoud <ref type="bibr" target="#b13">[14]</ref> presented a machine learning-based clustering approach to reduce the false positives in a trace link candidate list. This has a different focus and could be applied in addition to our approach.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Research Method</head><p>The research method used in this thesis is based on an adapted version of Wieringa's Design Science Methodology <ref type="bibr" target="#b17">[18]</ref> in which we combine several small studies. It consists of the four phases: (1) problem identification, (2) problem establishment, (3) solution design, and (4) solution validation. In the following we introduce these four phases for our research.</p><p>The identified problem <ref type="bibr" target="#b0">(1)</ref> is that the quality of IR-based trace link recovery is not sufficient for software engineering tasks. We establish this problem (2) by the analysis of existing studies and related work for trace link recovery and usage. We conduct a literature review to get an overview of existing trace link recovery approaches, to find possibilities to improve precision and recall of trace links, and to discover options to embed trace link creation in the software development process. Thus, the research questions we answer with our literature review are: What are existing trace link recovery approaches, which data sources and which recovery techniques are used? What are the reasons for insufficient precision and recall of existing approaches? Which options for improvements are discussed and how are they applied? Which kind of experimental setup and which kind of data sets are used to evaluate trace link recovery approaches?</p><p>Our solution design (3) is described in Section 3. To validate the solution (4), we perform studies with two open source projects. The Existing Link Structure Study will use the iTrust project data 1 which consist of a use case-based requirement specification, Java and JSP-based source code, existing trace link definitions, and a project history with multiple versions of the previously mentioned resources available in a version control system (VCS). A history version of the trace link specification can be used to check the recall and precision of our existing link structure algorithm. The Developers' Interaction Data Study will use Mylyn project data 2 which consists of a Bugzilla project consisting of tasks (bugs, issues, etc.) including attached interaction data. The task descriptions are used to specify requirements (as features). Due to the attached Mylyn interaction data, it is possible to see the interaction associated with a specific requirement and the affected source code elements.</p><p>To compare our results with established IR-based trace link recovery approaches we will apply a set of such IR-based recovery approaches to both projects. Moreover, for the developer's interaction data study we also apply Delater's working task-based recovery approach <ref type="bibr" target="#b5">[6]</ref>. This is possible since in the used project data development tasks are explicitly specified.</p><p>We are still looking for project data which give us the to apply both of our new recovery techniques in combination to completely investigate RQ2. Another way to get data to evaluate all our recovery techniques in combination are practical student courses. This requires the integration of our algorithms in the eclipse 3 IDE and their usage to recommend trace links during development.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Progress</head><p>We perform the literature review in parallel to the other task of this thesis. We plan to finalize the research questions and the execution of the search process by mid of 2016, followed by the result evaluation and documentation which we plan to finish by the end of 2016.</p><p>We have already implemented the basic algorithms for the interaction path detection and the use of existing trace link structure. We already performed a statistical analysis on the Mylyn interaction data and extracted basic interaction patterns which we use in the current implementation of our algorithm. For using existing trace link structures we transferred the iTrust data into a local data base implementing a schema for the structured, hierarchical specification of requirements and source code elements as this is necessary for using trace links between those elements.</p><p>We plan to finish the existing link structure analysis with iTrust data in June 2016 and the developers' interaction data study with Mylyn project data in September 2016, including the comparison to only using IR-based trace link recovery. Until then, we also hope to find project data which allows the application and evaluation of both interaction data and existing trace link structure based trace link creation. We plan to finish the research for this thesis by the end of 2017.</p><p>If time permits, we will integrate these algorithms in the eclipse IDE and use them to recommend trace links during development. However, for the evaluation of trace link recommendation a further study with developers using the tool in a real project or at least a student course will be necessary. This is difficult to achieve and therefore not planned as an integral part of the thesis.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Already used and new Trace Link Data Source Types</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">http://agile.csc.ncsu.edu/iTrust, last checked February</note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="25" xml:id="foot_1">, 2016 2 http://www.eclipse.org/mylyn/developers/, last checked February 25, 2016</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Acknowledgment I thank my advisor Barbara Paech for her excellent support. 3 http://www.eclipse.org, last checked February 25, 2016</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">TraceME: Traceability Management in Eclipse</title>
		<author>
			<persName><forename type="first">G</forename><surname>Bavota</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Colangelo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>De Lucia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Fusco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Oliveto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Panichella</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICSM 2012</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2012-09">Sep 2012</date>
			<biblScope unit="page" from="642" to="645" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Recovering from a decade: a systematic mapping of information retrieval approaches to software traceability</title>
		<author>
			<persName><forename type="first">M</forename><surname>Borg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Runeson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ardö</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Empirical Software Engineering</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1" to="52" />
			<date type="published" when="2013-05">May 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Software traceability: trends and future directions</title>
		<author>
			<persName><forename type="first">Cleland-Huang</forename></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Gotel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">C Z</forename><surname>Huffman Hayes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mäder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Zisman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">FOSE 2014</title>
				<meeting><address><addrLine>New York, New York, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2014-05">May 2014</date>
			<biblScope unit="page" from="55" to="69" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Breaking the big-bang practice of traceability: Pushing timely trace recommendations to project stakeholders</title>
		<author>
			<persName><forename type="first">Cleland-Huang</forename></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mäder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mirakhorli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Amornborvornwong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename></persName>
		</author>
		<imprint>
			<date type="published" when="2012-09">2012. Sep 2012</date>
			<publisher>IEEE</publisher>
			<biblScope unit="page" from="231" to="240" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Fine-grained management of software artefacts: the ADAMS system</title>
		<author>
			<persName><forename type="first">A</forename><surname>De Lucia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Fasano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Oliveto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Tortora</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Software: Practice and Experience</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="issue">11</biblScope>
			<biblScope unit="page" from="1007" to="1034" />
			<date type="published" when="2010-10">Oct 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Tracing Requirements and Source Code during Software Development: An Empirical Study</title>
		<author>
			<persName><forename type="first">A</forename><surname>Delater</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Paech</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ESEM 2013</title>
				<meeting><address><addrLine>Baltimore, MD, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2013-10">Oct 2013</date>
			<biblScope unit="page" from="25" to="34" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">The quest for Ubiquity: A roadmap for software and systems traceability research</title>
		<author>
			<persName><forename type="first">O</forename><surname>Gotel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cleland-Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Hayes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zisman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Egyed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Grunbacher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Antoniol</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012-09">2012. Sep 2012</date>
			<publisher>IEEE</publisher>
			<biblScope unit="page" from="71" to="80" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Poster: Discovering Code Dependencies by Harnessing Developer&apos;s Activity</title>
		<author>
			<persName><forename type="first">M</forename><surname>Konopka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Navrat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bielikova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICSE 2015</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2015-05">May 2015</date>
			<biblScope unit="page" from="801" to="802" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Collecting and Processing Interaction Data for Recommendation Systems</title>
		<author>
			<persName><forename type="first">W</forename><surname>Maalej</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Fritz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Robbes</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Recommendation Systems in Software Engineering</title>
				<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="173" to="197" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Do software engineers benefit from source code navigation with traceability? An experiment in software change management</title>
		<author>
			<persName><forename type="first">P</forename><surname>Mäder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Egyed</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ASE 2011</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2011-11">Nov 2011</date>
			<biblScope unit="page" from="444" to="447" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Do developers benefit from requirements traceability when evolving and maintaining a software system?</title>
		<author>
			<persName><forename type="first">P</forename><surname>Mäder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Egyed</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Empirical Software Engineering</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="413" to="441" />
			<date type="published" when="2015-04">Apr 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Combining textual and structural analysis of software artifacts for traceability link recovery</title>
		<author>
			<persName><forename type="first">C</forename><surname>Mcmillan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Poshyvanyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Revelle</surname></persName>
		</author>
		<editor>TEFSE</editor>
		<imprint>
			<date type="published" when="2009">2009. 2009</date>
			<publisher>IEEE</publisher>
			<biblScope unit="page" from="41" to="48" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Traceability-enabled refactoring for managing just-in-time requirements</title>
		<author>
			<persName><forename type="first">N</forename><surname>Niu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Bhowmik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Niu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014-08">2014. Aug 2014</date>
			<publisher>IEEE</publisher>
			<biblScope unit="page" from="133" to="142" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Enhancing candidate link generation for requirements tracing: The cluster hypothesis revisited</title>
		<author>
			<persName><forename type="first">N</forename><surname>Niu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mahmoud</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012-09">2012. Sep 2012</date>
			<publisher>IEEE</publisher>
			<biblScope unit="page" from="81" to="90" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Adaptive User Feedback for IR-Based Traceability Recovery</title>
		<author>
			<persName><forename type="first">A</forename><surname>Panichella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>De Lucia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zaidman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">SST 2015</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2015-05">May 2015</date>
			<biblScope unit="page" from="15" to="21" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Mind the gap: assessing the conformance of software traceability to relevant guidelines</title>
		<author>
			<persName><forename type="first">P</forename><surname>Rempel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mäder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kuschke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cleland-Huang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICSE 2014</title>
				<meeting><address><addrLine>New York, New York, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM Press</publisher>
			<date type="published" when="2014-05">May 2014</date>
			<biblScope unit="page" from="943" to="954" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Continuously delivered? Periodically updated? Never changed? Studying an open source project&apos;s releases of code, requirements, and trace matrix</title>
		<author>
			<persName><forename type="first">Wentao</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gupta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yingbo</forename><surname>Wu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JITRE</title>
		<imprint>
			<biblScope unit="page" from="13" to="16" />
			<date type="published" when="2015">2015. 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Design Science Methodology for Information Systems and Software Engineering</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Wieringa</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>Springer</publisher>
			<pubPlace>Berlin Heidelberg; Berlin, Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
