{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:31:21Z","timestamp":1761708681733,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,5,21]],"date-time":"2011-05-21T00:00:00Z","timestamp":1305936000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,21]]},"DOI":"10.1145\/1984642.1984648","type":"proceedings-article","created":{"date-parts":[[2011,5,24]],"date-time":"2011-05-24T13:04:30Z","timestamp":1306242270000},"page":"32-39","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["How do we trace requirements"],"prefix":"10.1145","author":[{"given":"Wei-Keat","family":"Kong","sequence":"first","affiliation":[{"name":"University of Kentucky, Lexington, KY, USA"}]},{"given":"Jane","family":"Huffman Hayes","sequence":"additional","affiliation":[{"name":"University of Kentucky, Lexington, KY, USA"}]},{"given":"Alex","family":"Dekhtyar","sequence":"additional","affiliation":[{"name":"California Polytechnic State University, San Luis Obispo, CA, USA"}]},{"given":"Jeff","family":"Holden","sequence":"additional","affiliation":[{"name":"California Polytechnic State University, San Luis Obispo, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1041053"},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE International Conference on","author":"Cleland-Huang J.","year":"2002","unstructured":"Cleland-Huang , J. , Chang , C.K. , Sethi , G. , Javvaji , K. , Hu , H. and Xia , J . 2002. Automating Speculative Queries through Event-Based Requirements Traceability. Requirements Engineering , IEEE International Conference on ( Los Alamitos, CA, USA , 2002 ), 289. Cleland-Huang, J., Chang, C.K., Sethi, G., Javvaji, K., Hu, H. and Xia, J. 2002. Automating Speculative Queries through Event-Based Requirements Traceability. Requirements Engineering, IEEE International Conference on (Los Alamitos, CA, USA, 2002), 289."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985925"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.35"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1260984.1261262"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.34"},{"key":"e_1_3_2_1_8_1","unstructured":"Gotel O. and Finkelstein C. 1994. An analysis of the requirements traceability problem. (1994) 94--101.  Gotel O. and Finkelstein C. 1994. An analysis of the requirements traceability problem. (1994) 94--101."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107656.1107661"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 11th IEEE International Conference on Requirements Engineering","author":"Hayes J. H.","year":"2003","unstructured":"Hayes , J. H. , Dekhtyar , A. and Osborne , J . 2003. Improving Requirements Tracing via Information Retrieval . Proceedings of the 11th IEEE International Conference on Requirements Engineering ( Washington, DC, USA , 2003 ), 138--. Hayes, J. H., Dekhtyar, A. and Osborne, J. 2003. Improving Requirements Tracing via Information Retrieval. Proceedings of the 11th IEEE International Conference on Requirements Engineering (Washington, DC, USA, 2003), 138--."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083153"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.3"},{"key":"e_1_3_2_1_13_1","first-page":"193","article-title":"REquirements TRacing On target (RETRO): improving software maintenance through traceability recovery","volume":"3","author":"Hayes J. H.","year":"2007","unstructured":"Hayes , J. H. , Dekhtyar , A. , Sundaram , S. K. , Holbrook , E. A. , Vadlamudi , S. and April , A. 2007 . REquirements TRacing On target (RETRO): improving software maintenance through traceability recovery . ISSE. 3 , 3 (2007), 193 -- 202 . Hayes, J. H., Dekhtyar, A., Sundaram, S. K., Holbrook, E. A., Vadlamudi, S. and April, A. 2007. REquirements TRacing On target (RETRO): improving software maintenance through traceability recovery. ISSE. 3, 3 (2007), 193--202.","journal-title":"ISSE."},{"key":"e_1_3_2_1_14_1","volume-title":"International Conference on","author":"Marcus A.","year":"2003","unstructured":"Marcus , A. and Maletic , J. I . 2003. Recovering Documentation-to-Source-Code Traceability Links using Latent Semantic Indexing. Software Engineering , International Conference on ( Los Alamitos, CA, USA , 2003 ), 125. Marcus, A. and Maletic, J. I. 2003. Recovering Documentation-to-Source-Code Traceability Links using Latent Semantic Indexing. Software Engineering, International Conference on (Los Alamitos, CA, USA, 2003), 125."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009844119158"}],"event":{"name":"ICSE11: International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Waikiki, Honolulu HI USA","acronym":"ICSE11"},"container-title":["Proceedings of the 4th International Workshop on Cooperative and Human Aspects of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/1984642.1984648","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/1984642.1984648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:51Z","timestamp":1750243971000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/1984642.1984648"}},"subtitle":["an initial study of analyst behavior in trace validation tasks"],"short-title":[],"issued":{"date-parts":[[2011,5,21]]},"references-count":14,"alternative-id":["10.1145\/1984642.1984648","10.1145\/1984642"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/1984642.1984648","relation":{},"subject":[],"published":{"date-parts":[[2011,5,21]]},"assertion":[{"value":"2011-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}