{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:16:07Z","timestamp":1772039767067,"version":"3.50.1"},"reference-count":66,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1016\/j.infsof.2018.09.009","type":"journal-article","created":{"date-parts":[[2018,9,27]],"date-time":"2018-09-27T14:00:06Z","timestamp":1538056806000},"page":"126-141","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":26,"special_numbering":"C","title":["Exploiting Parts-of-Speech for effective automated requirements traceability"],"prefix":"10.1016","volume":"106","author":[{"given":"Nasir","family":"Ali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5224-9970","authenticated-orcid":false,"given":"Haipeng","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Abdelwahab","family":"Hamou-Lhadj","sequence":"additional","affiliation":[]},{"given":"Jameleddine","family":"Hassine","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.infsof.2018.09.009_bib0001","series-title":"1st International Conference on Requirements Engineering","first-page":"94","article-title":"An analysis of the requirements traceability problem","author":"Gotel","year":"1994"},{"key":"10.1016\/j.infsof.2018.09.009_bib0002","series-title":"Requirements Engineering: Foundation for Software Quality","first-page":"179","article-title":"Trace queries for safety requirements in high assurance systems","author":"Cleland-Huang","year":"2012"},{"key":"10.1016\/j.infsof.2018.09.009_bib0003","series-title":"18th IEEE International Requirements Engineering Conference (RE)","first-page":"297","article-title":"Creating safety requirements traceability for assuring and recertifying legacy safety-critical systems","author":"Hill","year":"2010"},{"key":"10.1016\/j.infsof.2018.09.009_bib0004","series-title":"Software and Systems Traceability","first-page":"3","article-title":"Traceability fundamentals","author":"Gotel","year":"2012"},{"issue":"6","key":"10.1016\/j.infsof.2018.09.009_bib0005","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MS.2003.1241364","article-title":"How software engineers use documentation: the state of the practice","volume":"20","author":"Lethbridge","year":"2003","journal-title":"IEEE Softw."},{"key":"10.1016\/j.infsof.2018.09.009_bib0006","series-title":"Engineering and Managing Software Requirements","first-page":"405","article-title":"Requirements experience in practice: studies of six companies","author":"Gorschek","year":"2005"},{"issue":"10","key":"10.1016\/j.infsof.2018.09.009_bib0007","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","article-title":"Recovering traceability links between code and documentation","volume":"28","author":"Antoniol","year":"2002","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"5","key":"10.1016\/j.infsof.2018.09.009_bib0008","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/TSE.2012.71","article-title":"Trustrace: mining software repositories to improve the accuracy of requirement traceability links","volume":"39","author":"Ali","year":"2013","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2018.09.009_bib0009","series-title":"Proceedings of the 2011 18th Working Conference on Reverse Engineering","first-page":"45","article-title":"Requirements traceability for object oriented systems by partitioning source code","author":"Ali","year":"2011"},{"key":"10.1016\/j.infsof.2018.09.009_bib0010","series-title":"17th IEEE International Conference on Program Comprehension (ICPC\u201909)","first-page":"148","article-title":"On the role of the nouns in ir-based traceability recovery","author":"Capobianco","year":"2009"},{"issue":"7","key":"10.1016\/j.infsof.2018.09.009_bib0011","first-page":"743","article-title":"Improving ir-based traceability recovery via noun-based indexing of software artifacts","volume":"25","author":"Capobianco","year":"2013","journal-title":"J. Softw."},{"issue":"8","key":"10.1016\/j.infsof.2018.09.009_bib0012","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1016\/j.infsof.2014.03.007","article-title":"A noun-based approach to feature location using time-aware term-weighting","volume":"56","author":"Zamani","year":"2014","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.infsof.2018.09.009_bib0013","unstructured":"Java language and virtual machine specifications, (https:\/\/docs.oracle.com\/javase\/specs\/) Last accessed: June2018."},{"issue":"1","key":"10.1016\/j.infsof.2018.09.009_bib0014","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1049\/iet-sen:20070112","article-title":"Analysing source code: looking for useful verb\u2013direct object pairs in all the right places","volume":"2","author":"Fry","year":"2008","journal-title":"IET Softw."},{"key":"10.1016\/j.infsof.2018.09.009_bib0015","unstructured":"T. Hoff, C Coding Standard, 2008, (https:\/\/users.ece.cmu.edu\/~eno\/coding\/CCodingStandard.html). Last accesses: June 2018."},{"key":"10.1016\/j.infsof.2018.09.009_bib0016","series-title":"28th IEEE International Conference on Software Maintenance (ICSM)","first-page":"191","article-title":"An empirical study on requirements traceability using eye-tracking","author":"Ali","year":"2012"},{"key":"10.1016\/j.infsof.2018.09.009_bib0017","series-title":"21st IEEE International Conference on Program Comprehension (ICPC)","first-page":"3","article-title":"Part-of-speech tagging of program identifiers for improved text-based software engineering tools","author":"Gupta","year":"2013"},{"key":"10.1016\/j.infsof.2018.09.009_bib0018","unstructured":"J. Gim\u00e9nez, L. Marquez, SVMTool: a general pos tagger generator based on support vector machines, in: In Proceedings of the 4th International Conference on Language Resources and Evaluation. 43\u201346."},{"key":"10.1016\/j.infsof.2018.09.009_bib0019","series-title":"The 16th IEEE International Conference on Program Comprehension (ICPC 2008)","first-page":"103","article-title":"A traceability technique for specifications","author":"Abadi","year":"2008"},{"issue":"6","key":"10.1016\/j.infsof.2018.09.009_bib0020","doi-asserted-by":"crossref","first-page":"1565","DOI":"10.1007\/s10664-013-9255-y","article-title":"Recovering from a decade: a systematic mapping of information retrieval approaches to software traceability","volume":"19","author":"Borg","year":"2014","journal-title":"Empirical Softw. Eng."},{"key":"10.1016\/j.infsof.2018.09.009_bib0021","series-title":"Proceedings of 25th International Conference on Software Engineering","first-page":"125","article-title":"Recovering documentation-to-source-code traceability links using latent semantic indexing","author":"Marcus","year":"2003"},{"issue":"6","key":"10.1016\/j.infsof.2018.09.009_bib0022","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1109\/TSE.2007.1016","article-title":"Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval","volume":"33","author":"Poshyvanyk","year":"2007","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2018.09.009_bib0023","series-title":"Proceedings of the 2010 IEEE 18th International Conference on Program Comprehension","first-page":"68","article-title":"On the equivalence of information retrieval methods for automated traceability link recovery","author":"Oliveto","year":"2010"},{"key":"10.1016\/j.infsof.2018.09.009_bib0024","series-title":"2013 ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","first-page":"243","article-title":"Ir in software traceability: from a bird\u2019s eye view","author":"Borg","year":"2013"},{"key":"10.1016\/j.infsof.2018.09.009_bib0025","series-title":"27th IEEE International Conference on Software Maintenance (ICSM)","first-page":"133","article-title":"On integrating orthogonal information retrieval methods to improve traceability recovery","author":"Gethers","year":"2011"},{"issue":"4","key":"10.1016\/j.infsof.2018.09.009_bib0026","first-page":"300","article-title":"Comprehensive survey on distance\/similarity measures between probability density functions","volume":"1","author":"Cha","year":"2007","journal-title":"Int. J. Math. Models Methods Appl. Sci."},{"key":"10.1016\/j.infsof.2018.09.009_bib0027","series-title":"Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering-Volume 1","first-page":"95","article-title":"Software traceability with topic modeling","author":"Asuncion","year":"2010"},{"issue":"1","key":"10.1016\/j.infsof.2018.09.009_bib0028","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/TSE.2011.122","article-title":"Empirical principles and an industrial case study in retrieving equivalent requirements via natural language processing techniques","volume":"39","author":"Falessi","year":"2013","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2018.09.009_bib0029","series-title":"Software and Systems Traceability","article-title":"Factors impacting the inputs of traceability recovery approaches","author":"Ali","year":"2011"},{"key":"10.1016\/j.infsof.2018.09.009_bib0030","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/1131421.1131424","article-title":"Sniafl: towards a static noninteractive approach to feature location","volume":"15","author":"Zhao","year":"2006","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"4","key":"10.1016\/j.infsof.2018.09.009_bib0031","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1276933.1276934","article-title":"Recovering traceability links in software artifact management systems using information retrieval methods","volume":"16","author":"Lucia","year":"2007","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"2\u20133","key":"10.1016\/j.infsof.2018.09.009_bib0032","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/S0167-6423(01)00016-8","article-title":"Design-code traceability recovery: selecting the basic linkage properties","volume":"40","author":"Antoniol","year":"2001","journal-title":"Sci. Comput. Program."},{"issue":"1","key":"10.1016\/j.infsof.2018.09.009_bib0033","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1023\/A:1018916522804","article-title":"Design-code traceability for object-oriented systems","volume":"9","author":"Antoniol","year":"2000","journal-title":"Ann. Softw. Eng."},{"key":"10.1016\/j.infsof.2018.09.009_bib0034","series-title":"ICSE Workshop on Traceability in Emerging Forms of Software Engineering (TEFSE\u201909)","first-page":"41","article-title":"Combining textual and structural analysis of software artifacts for traceability link recovery","author":"McMillan","year":"2009"},{"key":"10.1016\/j.infsof.2018.09.009_bib0035","series-title":"Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering","first-page":"95","article-title":"Recovering and using use-case-diagram-to-source-code traceability links","author":"Grechanik","year":"2007"},{"key":"10.1016\/j.infsof.2018.09.009_bib0036","series-title":"21st IEEE International Conference on Program Comprehension (ICPC)","first-page":"123","article-title":"Using code ownership to improve ir-based traceability link recovery","author":"Diaz","year":"2013"},{"key":"10.1016\/j.infsof.2018.09.009_bib0037","series-title":"Modern Information Retrieval","author":"Baeza-Yates","year":"1999"},{"key":"10.1016\/j.infsof.2018.09.009_bib0038","series-title":"19th IEEE International Conference on Program Comprehension (ICPC)","first-page":"11","article-title":"Can better identifier splitting techniques help feature location?","author":"Dit","year":"2011"},{"key":"10.1016\/j.infsof.2018.09.009_bib0039","series-title":"Technical Report","article-title":"Improving information retrieval systems using part of speech tagging","author":"Chowdhury","year":"1998"},{"key":"10.1016\/j.infsof.2018.09.009_bib0040","series-title":"Information Retrieval Architecture and Algorithms","author":"Kowalski","year":"2010"},{"key":"10.1016\/j.infsof.2018.09.009_bib0041","series-title":"Proceedings of the 14th Annual ACM International Conference on Multimedia","first-page":"231","article-title":"Multimedia thumbnails for documents","author":"Erol","year":"2006"},{"key":"10.1016\/j.infsof.2018.09.009_bib0042","series-title":"Proceedings of 2004 International Conference on Machine Learning and Cybernetics","first-page":"1692","article-title":"An improved term weighting scheme for vector space model","volume":"3","author":"Sun","year":"2004"},{"key":"10.1016\/j.infsof.2018.09.009_bib0043","series-title":"Computer Software and Applications Conference, 2006. COMPSAC\u201906. 30th Annual International","first-page":"265","article-title":"Phrasing in dynamic requirements trace retrieval","volume":"1","author":"Zou","year":"2006"},{"issue":"3","key":"10.1016\/j.infsof.2018.09.009_bib0044","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1017\/S1351324999002120","article-title":"An approach to program understanding by natural language understanding","volume":"5","author":"Etzkorn","year":"1999","journal-title":"Nat. Lang. Eng."},{"key":"10.1016\/j.infsof.2018.09.009_bib0045","series-title":"Program Comprehension (ICPC), 2010 IEEE 18th International Conference on","first-page":"156","article-title":"Natural language parsing of program element names for concept extraction","author":"Abebe","year":"2010"},{"issue":"C","key":"10.1016\/j.infsof.2018.09.009_bib0046","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.jss.2014.12.049","article-title":"A time-based approach to automatic bug report assignment","volume":"102","author":"Shokripour","year":"2015","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.infsof.2018.09.009_bib0047","series-title":"16th Working Conference on Reverse Engineering (WCRE\u201909)","first-page":"195","article-title":"Traceability recovery using numerical analysis","author":"Capobianco","year":"2009"},{"issue":"6","key":"10.1016\/j.infsof.2018.09.009_bib0048","doi-asserted-by":"crossref","first-page":"1754","DOI":"10.1007\/s10664-013-9261-0","article-title":"An empirical study of identifier splitting techniques","volume":"19","author":"Hill","year":"2014","journal-title":"Empirical Softw. Eng."},{"key":"10.1016\/j.infsof.2018.09.009_bib0049","series-title":"Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology-Volume 1","first-page":"173","article-title":"Feature-rich part-of-speech tagging with a cyclic dependency network","author":"Toutanova","year":"2003"},{"key":"10.1016\/j.infsof.2018.09.009_bib0050","doi-asserted-by":"crossref","unstructured":"M.F. Porter, An algorithm for suffix stripping(1997) 313\u2013316.","DOI":"10.1049\/cp:19970906"},{"key":"10.1016\/j.infsof.2018.09.009_bib0051","series-title":"Proceedings of the 34th Annual Meeting on Association for Computational Linguistics","first-page":"17","article-title":"Noun-phrase analysis in unrestricted text for information retrieval","author":"Evans","year":"1996"},{"key":"10.1016\/j.infsof.2018.09.009_bib0052","series-title":"Experimentation in Software Engineering: An Introduction","author":"Wohlin","year":"2000"},{"key":"10.1016\/j.infsof.2018.09.009_bib0053","series-title":"Basics of Software Engineering Experimentation","author":"Juristo","year":"2010"},{"issue":"8","key":"10.1016\/j.infsof.2018.09.009_bib0054","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TSE.2002.1027796","article-title":"Preliminary guidelines for empirical research in software engineering","volume":"28","author":"Kitchenham","year":"2002","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.infsof.2018.09.009_bib0055","series-title":"2005 International Symposium on Empirical Software Engineering (ISESE 2005), 17\u201318 November 2005, Noosa Heads, Australia","first-page":"95","article-title":"Reporting guidelines for controlled experiments in software engineering","author":"Jedlitschka","year":"2005"},{"key":"10.1016\/j.infsof.2018.09.009_sbref0052","series-title":"Technical Report","article-title":"A Novel Process and its Implementation for the Multi-objective Miniaturization of Software","author":"Ali","year":"2010"},{"issue":"5","key":"10.1016\/j.infsof.2018.09.009_bib0057","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/TSE.2012.71","article-title":"Trustrace: mining software repositories to improve the accuracy of requirement traceability links","volume":"39","author":"Ali","year":"2013","journal-title":"Softw. Eng. IEEE Trans."},{"key":"10.1016\/j.infsof.2018.09.009_bib0058","series-title":"Reverse Engineering, 2008. WCRE \u201908. 15th Working Conference on","first-page":"165","article-title":"Prereqir: recovering pre-requirements via cluster analysis","author":"Hayes","year":"2008"},{"issue":"5","key":"10.1016\/j.infsof.2018.09.009_bib0059","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/S0306-4573(00)00010-8","article-title":"Variations in relevance judgments and the measurement of retrieval effectiveness","volume":"36","author":"Voorhees","year":"2000","journal-title":"Inf.Process. Manage."},{"key":"10.1016\/j.infsof.2018.09.009_bib0060","series-title":"Proceedings of the Sixteenth ACM Conference on Conference on Information and Knowledge Management","first-page":"623","article-title":"A comparison of statistical significance tests for information retrieval evaluation","author":"Smucker","year":"2007"},{"key":"10.1016\/j.infsof.2018.09.009_bib0061","first-page":"1","article-title":"On the role of semantics in automated requirements tracing","author":"Mahmoud","year":"2014","journal-title":"Requirements Eng."},{"issue":"2","key":"10.1016\/j.infsof.2018.09.009_bib0062","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/1131421.1131424","article-title":"Sniafl: towards a static noninteractive approach to feature location","volume":"15","author":"Zhao","year":"2006","journal-title":"ACM Trans. Softw. Eng.Methodol. (TOSEM)"},{"key":"10.1016\/j.infsof.2018.09.009_bib0063","unstructured":"entagrec."},{"issue":"1","key":"10.1016\/j.infsof.2018.09.009_bib0064","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1049\/iet-sen:20070112","article-title":"Analysing source code: looking for useful verb\u2013direct object pairs in all the right places","volume":"2","author":"Fry","year":"2008","journal-title":"IET Softw."},{"key":"10.1016\/j.infsof.2018.09.009_bib0065","series-title":"Advances in Information Retrieval","first-page":"412","article-title":"Part of speech based term weighting for information retrieval","author":"Lioma","year":"2009"},{"key":"10.1016\/j.infsof.2018.09.009_bib0066","series-title":"34th IEEE Annual Computer Software and Applications Conference (COMPSAC)","first-page":"246","article-title":"Using semantics-enabled information retrieval in requirements tracing: an ongoing experimental investigation","author":"Mahmoud","year":"2010"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584918302040?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584918302040?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T19:38:06Z","timestamp":1755718686000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584918302040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":66,"alternative-id":["S0950584918302040"],"URL":"https:\/\/doi.org\/10.1016\/j.infsof.2018.09.009","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[2019,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Exploiting Parts-of-Speech for effective automated requirements traceability","name":"articletitle","label":"Article Title"},{"value":"Information and Software Technology","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.infsof.2018.09.009","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}