Results 1 -
4 of
4
A Text Retrieval Approach to Recover Links among E-Mails and Source Code Classes
"... Abstract—During software development and evolution, the com-munication among stakeholders is one of the most important activities. Stakeholders communicate to discuss various topics, ranging from low-level concerns (e.g., refactoring) to high-level resolutions (e.g., design rationale). To support su ..."
Abstract
- Add to MetaCart
in many cases outperforms the baselines: text retrieval and lightweight text search approaches. This paper is built on [1]. Keywords-Information retrieval, software maintenance; traceabil-ity recovery; BM25F I.
Using Code Ownership to Improve IR-Based Traceability Link
"... Abstract—Information Retrieval (IR) techniques have gained wide-spread acceptance as a method for automating traceabil-ity recovery. These techniques recover links between software artifacts based on their textual similarity, i.e., the higher the similarity, the higher the likelihood that there is a ..."
Abstract
- Add to MetaCart
Abstract—Information Retrieval (IR) techniques have gained wide-spread acceptance as a method for automating traceabil-ity recovery. These techniques recover links between software artifacts based on their textual similarity, i.e., the higher the similarity, the higher the likelihood
Traceability recovery by modeling programmer behavior
- Reverse Engineering, 2000. Proceedings. Seventh Working Conference on. IEEE
, 2000
"... comprehension, object orientation When a system evolves, while the source code is changed documentation and traceability links are barely ever up-dated: maintaining traceability information between soft-ware artifacts is a costly and tedious activity frequently sac-rificed during development and mai ..."
Abstract
-
Cited by 14 (1 self)
- Add to MetaCart
and maintenance due to market pressure. This paper presents a new method to recovery traceabil-ity links between high level and low level artifacts. The method is based on the partial knowledge of a subset of traceabilty links. It can be fully automated and the human intervention is only required to confirm
ii List of Publications
, 2014
"... pages 156–175, 2013. [2] Johannes Buchmann, Denise Demirel, and Jeroen van de Graaf. Towards a publicly-verifiable mix-net providing everlasting privacy. In Financial Cryptog-raphy, pages 197–204, 2013. [3] Denise Demirel, Jeroen van de Graaf, and Roberto Araùjo. Improving helios ..."
Abstract
- Add to MetaCart
pages 156–175, 2013. [2] Johannes Buchmann, Denise Demirel, and Jeroen van de Graaf. Towards a publicly-verifiable mix-net providing everlasting privacy. In Financial Cryptog-raphy, pages 197–204, 2013. [3] Denise Demirel, Jeroen van de Graaf, and Roberto Araùjo. Improving helios