Feature location in source code: a taxonomy and survey
SUMMARY Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature location techniques have been introduced that automate some or all of this process, and a comprehensive overview of this large body of work...
Saved in:
Published in | Journal of software : evolution and process Vol. 25; no. 1; pp. 53 - 95 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Chichester, UK
John Wiley & Sons, Ltd
01.01.2013
Wiley Subscription Services, Inc |
Subjects | |
Online Access | Get full text |
ISSN | 2047-7473 2047-7481 |
DOI | 10.1002/smr.567 |
Cover
Loading…
Abstract | SUMMARY
Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature location techniques have been introduced that automate some or all of this process, and a comprehensive overview of this large body of work would be beneficial to researchers and practitioners. This paper presents a systematic literature survey of feature location techniques. Eighty‐nine articles from 25 venues have been reviewed and classified within the taxonomy in order to organize and structure existing work in the field of feature location. The paper also discusses open issues and defines future directions in the field of feature location. Copyright © 2011 John Wiley & Sons, Ltd.
We present a survey of eighty‐nine feature location articles that were classified along nine key dimensions of a taxonomy. Researchers can use the taxonomy and survey as a basis for advancing the field, while practitioners can use it to identify techniques and tools that are well‐suited to their needs. The survey also discusses some of the open issues in feature location, such as the need for comparisons between approaches and benchmarks. We also make publicly available a set of benchmarks for systems used frequently in feature location case studies. |
---|---|
AbstractList | SUMMARY
Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature location techniques have been introduced that automate some or all of this process, and a comprehensive overview of this large body of work would be beneficial to researchers and practitioners. This paper presents a systematic literature survey of feature location techniques. Eighty‐nine articles from 25 venues have been reviewed and classified within the taxonomy in order to organize and structure existing work in the field of feature location. The paper also discusses open issues and defines future directions in the field of feature location. Copyright © 2011 John Wiley & Sons, Ltd.
We present a survey of eighty‐nine feature location articles that were classified along nine key dimensions of a taxonomy. Researchers can use the taxonomy and survey as a basis for advancing the field, while practitioners can use it to identify techniques and tools that are well‐suited to their needs. The survey also discusses some of the open issues in feature location, such as the need for comparisons between approaches and benchmarks. We also make publicly available a set of benchmarks for systems used frequently in feature location case studies. SUMMARY Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature location techniques have been introduced that automate some or all of this process, and a comprehensive overview of this large body of work would be beneficial to researchers and practitioners. This paper presents a systematic literature survey of feature location techniques. Eighty-nine articles from 25 venues have been reviewed and classified within the taxonomy in order to organize and structure existing work in the field of feature location. The paper also discusses open issues and defines future directions in the field of feature location. Copyright © 2011 John Wiley & Sons, Ltd. Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature location techniques have been introduced that automate some or all of this process, and a comprehensive overview of this large body of work would be beneficial to researchers and practitioners. This paper presents a systematic literature survey of feature location techniques. Eighty‐nine articles from 25 venues have been reviewed and classified within the taxonomy in order to organize and structure existing work in the field of feature location. The paper also discusses open issues and defines future directions in the field of feature location. Copyright © 2011 John Wiley & Sons, Ltd. |
Author | Dit, Bogdan Gethers, Malcom Poshyvanyk, Denys Revelle, Meghan |
Author_xml | – sequence: 1 givenname: Bogdan surname: Dit fullname: Dit, Bogdan – sequence: 2 givenname: Meghan surname: Revelle fullname: Revelle, Meghan – sequence: 3 givenname: Malcom surname: Gethers fullname: Gethers, Malcom – sequence: 4 givenname: Denys surname: Poshyvanyk fullname: Poshyvanyk, Denys email: Denys Poshyvanyk, Computer Science Department, The College of William & Mary, Williamsburg, VA, USA., denys@cs.wm.edu organization: Computer Science Department, The College of William & Mary, VA, Williamsburg, USA |
BookMark | eNp1kFtLAzEQhYNUsNbiXwj44INszWWz6fqm1VahrXhD30KanYWt7aYmu9r990YrgqLzMgPzcebM2UWt0paA0D4lPUoIO_ZL1xOJ3EJtRmIZybhPW9-z5Duo6_2chEoYEbFoo2QIuqod4IU1uipsiYsSe1s7A9jYDE6wxpVe29IuG6zLDPvavUKzh7ZzvfDQ_eod9DC8uB9cRuPr0dXgdBwZnnIZAZM8p3HOM2q4gBmjaSrjmMxMTjPgtC9oLCSjiQBtBGc50bNMMkmFTjiRGe-gg43uytmXGnyl5sFbGU4qKokkqUwoCdThhjLOeu8gVytXLLVrFCXqIxcVclEhl0BGv0hTVJ9_V04Xiz_4ow3_Viyg-U9W3U1uf6gXvoL1N63dswpbKdTjdKTO6DmZ3Aym6om_A64QgbM |
CitedBy_id | crossref_primary_10_1109_TSE_2016_2592905 crossref_primary_10_1016_j_infsof_2012_09_013 crossref_primary_10_1145_2544173_2509522 crossref_primary_10_1007_s10515_019_00251_9 crossref_primary_10_1109_TSE_2013_45 crossref_primary_10_1007_s10270_021_00870_5 crossref_primary_10_1109_TSE_2012_71 crossref_primary_10_1007_s10664_013_9255_y crossref_primary_10_1016_j_is_2021_101882 crossref_primary_10_15388_21_INFOR454 crossref_primary_10_1007_s10664_011_9194_4 crossref_primary_10_1109_TSE_2021_3059481 crossref_primary_10_1109_TSE_2014_2387172 crossref_primary_10_1155_2014_180528 crossref_primary_10_4018_IJOSSP_2019070103 crossref_primary_10_4236_jsea_2014_75038 crossref_primary_10_1109_TSE_2019_2910531 crossref_primary_10_1109_TSE_2021_3049735 crossref_primary_10_3390_electronics10101181 crossref_primary_10_1002_smr_1773 crossref_primary_10_1145_3280988 crossref_primary_10_1002_smr_1650 crossref_primary_10_1002_smr_1892 crossref_primary_10_1016_j_infsof_2023_107320 crossref_primary_10_1002_stvr_1475 crossref_primary_10_1007_s10270_021_00893_y crossref_primary_10_1007_s10115_015_0909_5 crossref_primary_10_1007_s10664_018_9639_0 crossref_primary_10_1007_s10515_022_00329_x crossref_primary_10_1016_j_infsof_2014_04_014 crossref_primary_10_1145_3034827 crossref_primary_10_1145_3078841 crossref_primary_10_1109_ACCESS_2020_2985915 crossref_primary_10_1109_TSE_2024_3406224 crossref_primary_10_1016_j_jss_2022_111532 crossref_primary_10_1109_ACCESS_2018_2873509 crossref_primary_10_1109_TSE_2015_2479232 crossref_primary_10_1016_j_datak_2018_06_001 crossref_primary_10_1145_3472616 crossref_primary_10_1002_smr_1799 crossref_primary_10_1109_TSE_2024_3522973 crossref_primary_10_55969_paradigmplus_v1n2a2 crossref_primary_10_1016_j_jss_2015_05_006 crossref_primary_10_1145_3596217 crossref_primary_10_1007_s10664_020_09823_w crossref_primary_10_1587_transinf_2020EDP7255 crossref_primary_10_1002_spe_2900 crossref_primary_10_1109_ACCESS_2018_2883533 crossref_primary_10_1155_2018_5913634 crossref_primary_10_1109_ACCESS_2023_3236392 crossref_primary_10_1155_2018_5494209 crossref_primary_10_1145_3604905 crossref_primary_10_1007_s10664_012_9233_9 crossref_primary_10_1007_s10664_016_9486_9 crossref_primary_10_1145_3565971 crossref_primary_10_1007_s10664_020_09874_z crossref_primary_10_1007_s11831_021_09593_8 crossref_primary_10_1145_3129456 crossref_primary_10_1007_s10664_014_9327_7 crossref_primary_10_1145_3715002 crossref_primary_10_1109_TSE_2020_3000520 crossref_primary_10_1145_2522920_2522930 crossref_primary_10_1002_smr_1619 crossref_primary_10_1007_s10664_015_9410_8 crossref_primary_10_1007_s10664_021_10104_3 crossref_primary_10_1007_s10664_017_9499_z crossref_primary_10_1587_transinf_2023KBP0004 crossref_primary_10_1002_smr_1736 crossref_primary_10_1145_3593800 crossref_primary_10_1007_s10664_021_10021_5 crossref_primary_10_1109_TSE_2025_3534071 crossref_primary_10_1002_spe_2805 crossref_primary_10_1002_smr_1695 crossref_primary_10_1002_spe_2525 crossref_primary_10_1109_TSE_2017_2664836 crossref_primary_10_1016_j_advengsoft_2012_07_001 crossref_primary_10_1002_smr_1805 crossref_primary_10_1007_s10664_018_9672_z crossref_primary_10_1016_j_infsof_2021_106679 crossref_primary_10_1007_s10270_019_00727_y crossref_primary_10_1002_smr_1886 crossref_primary_10_1109_ACCESS_2022_3232982 crossref_primary_10_1002_smr_1801 crossref_primary_10_1109_TEVC_2017_2751100 crossref_primary_10_1007_s10270_021_00920_y crossref_primary_10_1016_j_asoc_2017_10_048 crossref_primary_10_1007_s10664_021_10108_z crossref_primary_10_1002_spe_3364 crossref_primary_10_1007_s11432_015_0860_9 crossref_primary_10_1109_TSE_2013_38 crossref_primary_10_1007_s10270_015_0512_y crossref_primary_10_1049_iet_sen_2020_0084 crossref_primary_10_1007_s10664_012_9224_x crossref_primary_10_1002_smr_1593 crossref_primary_10_1109_ACCESS_2022_3151395 crossref_primary_10_1145_3480027 crossref_primary_10_1016_j_scico_2013_03_015 crossref_primary_10_1016_j_infsof_2014_01_012 crossref_primary_10_1016_j_infsof_2018_03_004 crossref_primary_10_1142_S0218194014500193 crossref_primary_10_1007_s10664_019_09741_6 crossref_primary_10_1109_TSE_2024_3452595 crossref_primary_10_1155_2017_4382348 crossref_primary_10_1016_j_infsof_2019_106235 |
Cites_doi | 10.1109/ICSM.2006.66 10.1109/CSMR.2010.17 10.1109/ICSM.2010.5609654 10.1145/643603.643622 10.1142/S021819401000492X 10.1145/324133.324140 10.1109/ICSM.2000.882985 10.1109/WPC.2005.33 10.1109/ICSM.2004.1357792 10.1145/1062455.1062492 10.1007/3-540-45429-2_17 10.1145/1117696.1117710 10.1109/ICSM.2005.50 10.1145/32206.32212 10.1007/s10664-008-9095-3 10.1109/ICSE.2003.1201304 10.1109/ASSET.1999.756769 10.1002/smr.338 10.1109/ICSM.2007.4362618 10.1002/smr.340 10.1049/iet-sen.2008.0078 10.1109/TSE.2003.1178051 10.1109/ICSM.2009.5306315 10.1145/1370175.1370185 10.1109/ICPC.2010.29 10.1145/1321631.1321667 10.1145/1134285.1134428 10.1145/1368088.1368130 10.1145/1008992.1009024 10.1109/ICSE.2007.79 10.1016/S0169-7552(98)00110-X 10.1109/CSMR.2001.914970 10.1109/ICSM.2009.5306312 10.1109/WCRE.2006.32 10.1145/1287624.1287675 10.1109/ICPC.2008.14 10.1145/1566445.1566539 10.1109/TSE.2003.1183929 10.1109/TSE.2005.71 10.1109/ICPC.2007.6 10.1109/ICPC.2010.27 10.1109/ICSE.2003.1201219 10.1109/ICSM.2010.5609555 10.1109/APSEC.2003.1254391 10.1109/WCRE.2008.33 10.1109/ICSM.2005.42 10.1109/MC.2007.402 10.1109/ICSM.2005.48 10.1002/smr.4360070105 10.1016/j.jss.2004.12.018 10.1145/1066129.1066145 10.1109/VISSOF.2007.4290719 10.1109/WCRE.2003.1287240 10.1109/ICSM.2006.60 10.1145/1321631.1321637 10.1109/MS.2004.40 10.1109/VISSOF.2007.4290701 10.1145/1081706.1081711 10.1109/ICPC.2008.39 10.1109/CSMR.2008.4493314 10.1007/978-1-4615-4625-2_1 10.1109/ICPC.2007.22 10.1109/APSEC.2010.51 10.1109/WPC.2000.852498 10.1109/ICPC.2006.32 10.1109/WPC.2002.1021348 10.1109/TSE.2006.116 10.1109/ICSE.2007.80 10.1142/S0218194005002464 10.1145/1131421.1131424 10.1162/jmlr.2003.3.4-5.993 10.1109/CSMR.2006.47 10.1016/S0164-1212(02)00052-3 10.1109/ICPC.2008.21 10.1109/ICPC.2006.46 10.1109/ICSM.2001.972777 10.1109/ICPC.2006.19 10.1109/ICPC.2008.35 10.1109/WCRE.2004.10 10.1145/774833.774837 10.1145/1119655.1119660 10.1002/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9 10.1109/ICSM.2005.89 10.1109/ICSM.2001.972749 10.1109/ICSECOMPANION.2007.70 10.1145/1810295.1810345 10.1145/1148493.1148508 10.1109/ICSE.2009.5070524 10.1145/1273463.1273480 10.1016/j.infsof.2010.04.002 10.1145/1101908.1101923 10.1145/1368088.1368092 10.1109/ICSM.2005.22 10.1109/2.689678 10.1109/CSMR.2009.34 10.1145/581339.581390 10.1145/1031607.1031622 10.1109/WCRE.2006.39 10.1109/ASE.2003.1240310 10.1109/CSMR.2001.914982 10.1109/ICPC.2009.5090036 10.1109/ICSM.1992.242542 10.1109/TSE.2008.36 10.1016/0165-1684(94)90029-9 10.1109/ICPC.2007.13 10.1145/1806799.1806827 10.1145/13487689.13487691 10.1109/ICPC.2010.10 10.1109/TSE.2007.1016 10.1145/1218563.1218587 10.1109/TSE.2006.88 10.1109/WPC.2005.43 10.1109/ICSM.1996.565034 10.1145/1101908.1101970 10.1145/1189748.1189751 10.1109/TSE.2009.28 10.1109/WPC.2001.921740 10.1109/ICPC.2009.5090045 10.1109/ICSM.2010.5609669 10.1109/TSE.2004.101 10.1109/WPC.2005.22 10.1145/1858996.1859066 10.1145/984321.984322 10.1109/WCRE.2008.49 10.1109/ICPC.2006.17 |
ContentType | Journal Article |
Copyright | Copyright © 2011 John Wiley & Sons, Ltd. Copyright © 2013 John Wiley & Sons, Ltd. |
Copyright_xml | – notice: Copyright © 2011 John Wiley & Sons, Ltd. – notice: Copyright © 2013 John Wiley & Sons, Ltd. |
DBID | BSCLL AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1002/smr.567 |
DatabaseName | Istex CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2047-7481 |
EndPage | 95 |
ExternalDocumentID | 3788353491 10_1002_smr_567 SMR567 ark_67375_WNG_B1D0MQCN_X |
Genre | article |
GroupedDBID | .3N .4S .GA .Y3 05W 0R~ 10A 1OC 31~ 33P 3SF 50Z 52O 52U 8-0 8-1 8-3 8-4 8-5 930 A03 AAESR AAEVG AAHHS AANLZ AAONW AASGY AAXRX AAZKR ABCUV ABPVW ACAHQ ACBWZ ACCFJ ACCZN ACPOU ACXBN ACXQS ADBBV ADEOM ADIZJ ADKYN ADMGS ADOZA ADXAS ADZMN AEEZP AEIGN AEIMD AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFZJQ AHBTC AITYG AIURR AIWBW AJBDE AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN AMBMR AMYDB ARCSS ATUGU AUFTA AZBYB AZFZN BAFTC BDRZF BHBCM BMNLL BMXJE BRXPI BSCLL BY8 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM EBS EDO EJD F00 F01 F04 G-S G.N GODZA HGLYW HZ~ I-F LATKE LEEKS LH4 LITHE LOXES LUTES LW6 LYRES MEWTI MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 O66 O9- P2W P2X PQQKQ Q.N Q11 QB0 R.K ROL SUPJJ TUS W8V W99 WBKPD WIH WIK WOHZO WXSBR WYISQ WZISG ~WT AAHQN AAMNL AANHP AAYCA ACRPL ACYXJ ADNMO AFWVQ ALVPJ AAYXX ADMLS AEYWJ AGHNM AGQPQ AGYGG CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c3937-e273f14f3d1c35eb21997440bcf1de318514572165eac532f0abd72715a6307d3 |
IEDL.DBID | DR2 |
ISSN | 2047-7473 |
IngestDate | Mon Jul 14 08:22:05 EDT 2025 Tue Jul 01 05:18:38 EDT 2025 Thu Apr 24 23:07:08 EDT 2025 Wed Jan 22 16:45:05 EST 2025 Wed Oct 30 09:53:03 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
License | http://onlinelibrary.wiley.com/termsAndConditions#vor |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c3937-e273f14f3d1c35eb21997440bcf1de318514572165eac532f0abd72715a6307d3 |
Notes | istex:7D4CDB23C487BBACD27F09BF27438A0192F62801 ArticleID:SMR567 ark:/67375/WNG-B1D0MQCN-X ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 1707097610 |
PQPubID | 2034650 |
PageCount | 43 |
ParticipantIDs | proquest_journals_1707097610 crossref_primary_10_1002_smr_567 crossref_citationtrail_10_1002_smr_567 wiley_primary_10_1002_smr_567_SMR567 istex_primary_ark_67375_WNG_B1D0MQCN_X |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | January 2013 |
PublicationDateYYYYMMDD | 2013-01-01 |
PublicationDate_xml | – month: 01 year: 2013 text: January 2013 |
PublicationDecade | 2010 |
PublicationPlace | Chichester, UK |
PublicationPlace_xml | – name: Chichester, UK – name: Chichester |
PublicationTitle | Journal of software : evolution and process |
PublicationTitleAlternate | J. Softw. Evol. and Proc |
PublicationYear | 2013 |
Publisher | John Wiley & Sons, Ltd Wiley Subscription Services, Inc |
Publisher_xml | – name: John Wiley & Sons, Ltd – name: Wiley Subscription Services, Inc |
References | Cubranic D, Murphy GC, Singer J, Booth KS. Hipikat: a project memory for software development. IEEE Transactions on Software Engineering 2005; 316: 446-465. (June) Furnas GW, Landauer TK, Gomez LM, Dumais ST. The vocabulary problem in human-system communication. Communications of the ACM 1987: 30(11): 964-971. Robillard MP, Shepherd D, Hill E, Vijay-Shanker K, Pollock L. An Empirical Study of the Concept Assignment Problem. McGill University: Montreal, Quebec, Canada. 2007b. Sahner RA, Trivedi KS. SHARPE: Symbolic Hierarchical Automated Reliability and Performance Evaluator, Introduction and Guide for Users. Duke University: Durham, NC. 1986. Simmons S, Edwards D, Wilde N, Homan J, Groble M. Industrial tools for the feature location problem: an exploratory study. Journal of Software Maintenance Research and Practice 2006; 18(6): 457-474. Rohatgi A, Hamou-Lhadj A, Rilling J. An approach for solving the feature location problem by measuring the component modification impact. IET Software 2009; 3(4): 292-311. (August) Robillard MP, Coelho W, Murphy GC. How effective developers investigate source code: an exploratory study. IEEE Transactions on Software Engineering (TSE) 2004; 30(12): 889-903. Edwards D, Simmons S, Wilde N. An approach to feature location in distributed systems. Journal of Systems and Software 2006; 79(1): 57-68. (Jan. 2006) Petrenko M, Poshyvanyk D, Rajlich V, Buchta J. teaching software evolution in open source. IEEE Computer 2007; 40(11): 25-31. Eaddy M, Zimmermann T, Sherwood K, Garg V, Murphy G, Nagappan N, Aho AV. Do crosscutting concerns cause defects?. IEEE Transaction on Software Engineering 2008b; 34(4): 497-515. (July-August) Wilde N, Scully M. Software reconnaissance: mapping program features to code. Journal of Software Maintenance Research and Practice 1995; 7: 49-62. Deerwester S, Dumais ST, Furnas GW, Landauer TK, Harshman R. Indexing by latent semantic analysis. Journal of the American Society for Information Science 1990; 41: 391-407. Greevy O, Ducasse S, Girba T. Analyzing software evolution through feature views. Journal of Software Maintenance and Evolution: Research and Practice 2006; 18(6): 425-456. (November) Lukins SK, Kraft NA, Etzkorn LH. Bug localization using latent Dirichlet allocation. Information and Software Technology 2010; 52(9): 972-990. Agrawal H, Alberi JL, Horgan JR, Li JJ, London S, Wong WE, Ghosh S, Wilde N. Mining system tests to aid software maintenance. Computer 1998; 317: 64-73. (July 1998) Egyed A, Grünbacher P. Identifying requirements conflicts and cooperation. IEEE Software 2004;21(6): 50-58. (Nov. 2004) Eisenbarth T, Koschke R, Simon D. Locating features in source code. IEEE Transactions on Software Engineering 2003; 29(3): 210-224. (March) Comon P. Independent component analysis, a new concept? Signal Process. 1994; 363: 287-314. (Apr. 1994) Egyed A, Grünbacher P. Supporting software understanding with automated traceability. International Journal of Software Engineering and Knowledge Engineering 2005a; 15(5): 783-810. (Oct. 2005) Ko AJ, Myers BA, Coblenz MJ, Aung HH. An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks. IEEE Transactions on Software Engineering (TSE) 2006; 32(12); 971-987. (December) Robillard MP. Topology analysis of software dependencies. ACM Transactions on Software Engineering and Methodology 2008; 17(4): 1-36. (August) Egyed A. A scenario-driven approach to trace dependency analysis. IEEE Transactions on Software Engineering (TSE) 2003; 29(2): 116-132. (February) Poshyvanyk D, Guéhéneuc, YG, Marcus A, Antoniol G, Rajlich V. Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. IEEE Transactions on Software Engineering 2007a: 33(6): 420-432. (June) Zhao W, Zhang L, Liu Y, Sun J, Yang F. SNIAFL: towards a static non-interactive approach to feature location. ACM Transactions on Software Engineering and Methodologies (TOSEM) 2006; 15(2): 195-226. Kitchenham B. Procedures for Performing Systematic Reviews, Keele UK (ed.). Keele University: TR/SE-0401, I. 1353-I. 7776. Bohnet J, Döellner J. Analyzing feature implementation by visual exploration of architecturally-embedded call-graphs. Proceedings of International Workshop on Dynamic Systems Analysis (r'06). Shanghai: China, 2006a: 41-48. Sartipi K, Safyallah H. Dynamic Knowledge Extraction from Software Systems using Sequential Pattern Mining. International Journal of Software Engineering and Knowledge Engineering (IJSEKE) 2010; 20(6): September, 761-782. Wilde N, Buckellew M, Page H, Rajlich V, Pounds L. A comparison of methods for locating features in legacy software. Journal of Systems and Software 2003; 65(2): 105-114. (February 15) Schach S. Object-Oriented and Classical Software Engineering (5th edn). McGraw-Hill Higher Education: New York, 2001. Antoniol G, Guéhéneuc YG. Feature identification: an epidemiological metaphor. IEEE Transactions on Software Engineering 2006 329: 627-641. Robillard MP, Murphy GC. Representing concerns in source code. ACM Transactions on Software Engineering and Methodology (TOSEM) 2007a; 16(1). Cornelissen B, Zaidman A, Van Deursen A, Moonen L, Koschke R. A systematic survey of program comprehension through dynamic analysis. IEEE Trans. on Software Engineering September-October 2010: 35(5): 684-702. Cleary B, Exton C, Buckley J, English M. An empirical analysis of information retrieval based concept location techniques in software comprehension. Empirical Software Engineering 2009: 141: 93-130. Somerville I. Software Engineering (6th edn). Addison-Wesley: New Work, 2001. Blei DM, Ng AY, Jordan MI. Latent Dirichlet allocation. Journal of Machine Learning Research 2003; 3: 993-1022. Salton G, McGill M. Introduction to Modern Information Retrieval. McGraw-Hill: New York, NY, USA. 1986. Zhai C, Lafferty, J. A study of smoothing methods for language models applied to information retrieval. ACM Transactions on Information Systems 2004; 22(2): 179-214. (Apr. 2004) Kleinberg JM. Authoritative sources in a hyperlinked environment. Journal of the ACM 1999; 46(5): 604-632. 2004; 21 2004; 22 2005a; 15 1987; 30 2006; 79 2006; 32 2008b 2008a 1999; 46 2008b; 34 2003b 2003a 1990; 41 2009; 14 2004; 30 2010; 20 2005b 2001 2000 2005a 2007a; 33 2003; 3 1986 2005; 31 1994; 36 2010; 35 2006c 2006b 2010 2006a 2008; 17 2006; 15 2009 1998 2008 2007 2006; 18 1996 2006 2001c 1994 2005 2001b 2004 2001a 2003 1992 2002 2005c 1995; 7 1999 2007b 2007a; 16 2007a 2010b 2010a 2003; 29 2007; 40 2009; 3 1998; 31 2010; 52 2003; 65 e_1_2_11_70_1 e_1_2_11_93_1 Binkley D (e_1_2_11_18_1) 2010 Robillard MP (e_1_2_11_29_1) 2007 e_1_2_11_32_1 e_1_2_11_55_1 e_1_2_11_78_1 e_1_2_11_36_1 e_1_2_11_51_1 e_1_2_11_74_1 e_1_2_11_97_1 e_1_2_11_13_1 e_1_2_11_118_1 e_1_2_11_125_1 e_1_2_11_106_1 e_1_2_11_48_1 e_1_2_11_121_1 e_1_2_11_102_1 e_1_2_11_144_1 e_1_2_11_140_1 e_1_2_11_81_1 e_1_2_11_20_1 e_1_2_11_66_1 e_1_2_11_47_1 e_1_2_11_89_1 e_1_2_11_24_1 e_1_2_11_62_1 e_1_2_11_129_1 e_1_2_11_8_1 Sahner RA (e_1_2_11_43_1) 1986 e_1_2_11_85_1 e_1_2_11_136_1 e_1_2_11_59_1 e_1_2_11_113_1 e_1_2_11_132_1 e_1_2_11_50_1 e_1_2_11_92_1 Schach S (e_1_2_11_141_1) 2001 e_1_2_11_31_1 e_1_2_11_77_1 e_1_2_11_58_1 e_1_2_11_119_1 e_1_2_11_35_1 e_1_2_11_73_1 e_1_2_11_12_1 e_1_2_11_54_1 e_1_2_11_96_1 e_1_2_11_103_1 e_1_2_11_126_1 e_1_2_11_28_1 e_1_2_11_5_1 e_1_2_11_122_1 e_1_2_11_145_1 e_1_2_11_61_1 e_1_2_11_80_1 Somerville I (e_1_2_11_142_1) 2001 e_1_2_11_46_1 e_1_2_11_69_1 e_1_2_11_88_1 e_1_2_11_107_1 e_1_2_11_9_1 e_1_2_11_23_1 e_1_2_11_42_1 e_1_2_11_65_1 e_1_2_11_84_1 e_1_2_11_114_1 e_1_2_11_16_1 e_1_2_11_137_1 e_1_2_11_110_1 e_1_2_11_39_1 e_1_2_11_133_1 Kitchenham B (e_1_2_11_7_1) e_1_2_11_72_1 e_1_2_11_91_1 e_1_2_11_30_1 e_1_2_11_57_1 e_1_2_11_99_1 e_1_2_11_34_1 e_1_2_11_53_1 e_1_2_11_76_1 e_1_2_11_95_1 e_1_2_11_11_1 e_1_2_11_6_1 e_1_2_11_104_1 e_1_2_11_27_1 e_1_2_11_127_1 e_1_2_11_2_1 e_1_2_11_100_1 e_1_2_11_123_1 Rajlich V (e_1_2_11_4_1) 2004 e_1_2_11_83_1 e_1_2_11_60_1 e_1_2_11_45_1 e_1_2_11_68_1 e_1_2_11_41_1 e_1_2_11_87_1 e_1_2_11_108_1 e_1_2_11_22_1 e_1_2_11_64_1 e_1_2_11_115_1 e_1_2_11_138_1 e_1_2_11_15_1 e_1_2_11_111_1 e_1_2_11_134_1 Binkley D (e_1_2_11_146_1) 2010 e_1_2_11_38_1 e_1_2_11_19_1 e_1_2_11_130_1 e_1_2_11_94_1 e_1_2_11_71_1 e_1_2_11_90_1 e_1_2_11_10_1 e_1_2_11_56_1 e_1_2_11_79_1 e_1_2_11_14_1 e_1_2_11_52_1 e_1_2_11_98_1 e_1_2_11_33_1 e_1_2_11_75_1 e_1_2_11_105_1 e_1_2_11_128_1 e_1_2_11_26_1 e_1_2_11_3_1 e_1_2_11_49_1 e_1_2_11_101_1 e_1_2_11_124_1 e_1_2_11_143_1 e_1_2_11_120_1 e_1_2_11_82_1 e_1_2_11_21_1 e_1_2_11_44_1 e_1_2_11_67_1 e_1_2_11_25_1 e_1_2_11_40_1 e_1_2_11_63_1 e_1_2_11_86_1 e_1_2_11_109_1 e_1_2_11_139_1 e_1_2_11_116_1 e_1_2_11_37_1 e_1_2_11_135_1 e_1_2_11_112_1 e_1_2_11_131_1 Salton G (e_1_2_11_17_1) 1986 Bohnet J (e_1_2_11_117_1) 2006 |
References_xml | – reference: Sartipi K, Safyallah H. Dynamic Knowledge Extraction from Software Systems using Sequential Pattern Mining. International Journal of Software Engineering and Knowledge Engineering (IJSEKE) 2010; 20(6): September, 761-782. – reference: Blei DM, Ng AY, Jordan MI. Latent Dirichlet allocation. Journal of Machine Learning Research 2003; 3: 993-1022. – reference: Deerwester S, Dumais ST, Furnas GW, Landauer TK, Harshman R. Indexing by latent semantic analysis. Journal of the American Society for Information Science 1990; 41: 391-407. – reference: Kitchenham B. Procedures for Performing Systematic Reviews, Keele UK (ed.). Keele University: TR/SE-0401, I. 1353-I. 7776. – reference: Somerville I. Software Engineering (6th edn). Addison-Wesley: New Work, 2001. – reference: Robillard MP, Shepherd D, Hill E, Vijay-Shanker K, Pollock L. An Empirical Study of the Concept Assignment Problem. McGill University: Montreal, Quebec, Canada. 2007b. – reference: Cleary B, Exton C, Buckley J, English M. An empirical analysis of information retrieval based concept location techniques in software comprehension. Empirical Software Engineering 2009: 141: 93-130. – reference: Edwards D, Simmons S, Wilde N. An approach to feature location in distributed systems. Journal of Systems and Software 2006; 79(1): 57-68. (Jan. 2006) – reference: Antoniol G, Guéhéneuc YG. Feature identification: an epidemiological metaphor. IEEE Transactions on Software Engineering 2006 329: 627-641. – reference: Lukins SK, Kraft NA, Etzkorn LH. Bug localization using latent Dirichlet allocation. Information and Software Technology 2010; 52(9): 972-990. – reference: Furnas GW, Landauer TK, Gomez LM, Dumais ST. The vocabulary problem in human-system communication. Communications of the ACM 1987: 30(11): 964-971. – reference: Zhao W, Zhang L, Liu Y, Sun J, Yang F. SNIAFL: towards a static non-interactive approach to feature location. ACM Transactions on Software Engineering and Methodologies (TOSEM) 2006; 15(2): 195-226. – reference: Egyed A, Grünbacher P. Supporting software understanding with automated traceability. International Journal of Software Engineering and Knowledge Engineering 2005a; 15(5): 783-810. (Oct. 2005) – reference: Robillard MP. Topology analysis of software dependencies. ACM Transactions on Software Engineering and Methodology 2008; 17(4): 1-36. (August) – reference: Simmons S, Edwards D, Wilde N, Homan J, Groble M. Industrial tools for the feature location problem: an exploratory study. Journal of Software Maintenance Research and Practice 2006; 18(6): 457-474. – reference: Poshyvanyk D, Guéhéneuc, YG, Marcus A, Antoniol G, Rajlich V. Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. IEEE Transactions on Software Engineering 2007a: 33(6): 420-432. (June) – reference: Sahner RA, Trivedi KS. SHARPE: Symbolic Hierarchical Automated Reliability and Performance Evaluator, Introduction and Guide for Users. Duke University: Durham, NC. 1986. – reference: Greevy O, Ducasse S, Girba T. Analyzing software evolution through feature views. Journal of Software Maintenance and Evolution: Research and Practice 2006; 18(6): 425-456. (November) – reference: Agrawal H, Alberi JL, Horgan JR, Li JJ, London S, Wong WE, Ghosh S, Wilde N. Mining system tests to aid software maintenance. Computer 1998; 317: 64-73. (July 1998) – reference: Zhai C, Lafferty, J. A study of smoothing methods for language models applied to information retrieval. ACM Transactions on Information Systems 2004; 22(2): 179-214. (Apr. 2004) – reference: Bohnet J, Döellner J. Analyzing feature implementation by visual exploration of architecturally-embedded call-graphs. Proceedings of International Workshop on Dynamic Systems Analysis (r'06). Shanghai: China, 2006a: 41-48. – reference: Ko AJ, Myers BA, Coblenz MJ, Aung HH. An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks. IEEE Transactions on Software Engineering (TSE) 2006; 32(12); 971-987. (December) – reference: Cornelissen B, Zaidman A, Van Deursen A, Moonen L, Koschke R. A systematic survey of program comprehension through dynamic analysis. IEEE Trans. on Software Engineering September-October 2010: 35(5): 684-702. – reference: Eaddy M, Zimmermann T, Sherwood K, Garg V, Murphy G, Nagappan N, Aho AV. Do crosscutting concerns cause defects?. IEEE Transaction on Software Engineering 2008b; 34(4): 497-515. (July-August) – reference: Egyed A, Grünbacher P. Identifying requirements conflicts and cooperation. IEEE Software 2004;21(6): 50-58. (Nov. 2004) – reference: Egyed A. A scenario-driven approach to trace dependency analysis. IEEE Transactions on Software Engineering (TSE) 2003; 29(2): 116-132. (February) – reference: Wilde N, Buckellew M, Page H, Rajlich V, Pounds L. A comparison of methods for locating features in legacy software. Journal of Systems and Software 2003; 65(2): 105-114. (February 15) – reference: Wilde N, Scully M. Software reconnaissance: mapping program features to code. Journal of Software Maintenance Research and Practice 1995; 7: 49-62. – reference: Comon P. Independent component analysis, a new concept? Signal Process. 1994; 363: 287-314. (Apr. 1994) – reference: Rohatgi A, Hamou-Lhadj A, Rilling J. An approach for solving the feature location problem by measuring the component modification impact. IET Software 2009; 3(4): 292-311. (August) – reference: Petrenko M, Poshyvanyk D, Rajlich V, Buchta J. teaching software evolution in open source. IEEE Computer 2007; 40(11): 25-31. – reference: Cubranic D, Murphy GC, Singer J, Booth KS. Hipikat: a project memory for software development. IEEE Transactions on Software Engineering 2005; 316: 446-465. (June) – reference: Eisenbarth T, Koschke R, Simon D. Locating features in source code. IEEE Transactions on Software Engineering 2003; 29(3): 210-224. (March) – reference: Robillard MP, Murphy GC. Representing concerns in source code. ACM Transactions on Software Engineering and Methodology (TOSEM) 2007a; 16(1). – reference: Robillard MP, Coelho W, Murphy GC. How effective developers investigate source code: an exploratory study. IEEE Transactions on Software Engineering (TSE) 2004; 30(12): 889-903. – reference: Salton G, McGill M. Introduction to Modern Information Retrieval. McGraw-Hill: New York, NY, USA. 1986. – reference: Schach S. Object-Oriented and Classical Software Engineering (5th edn). McGraw-Hill Higher Education: New York, 2001. – reference: Kleinberg JM. Authoritative sources in a hyperlinked environment. Journal of the ACM 1999; 46(5): 604-632. – start-page: 293 year: 2004 end-page: 303 – year: 2007b – start-page: 21 year: 2008 end-page: 30 – volume: 3 start-page: 292 issue: 4 year: 2009 end-page: 311 article-title: An approach for solving the feature location problem by measuring the component modification impact publication-title: IET Software – start-page: 130 year: 2009 end-page: 137 – volume: 79 start-page: 57 issue: 1 year: 2006 end-page: 68 article-title: An approach to feature location in distributed systems publication-title: Journal of Systems and Software – start-page: 63 year: 2007b end-page: 66 – start-page: 44 year: 2010 end-page: 45 – start-page: 270 year: 1996 – volume: 31 start-page: 446 issue: 6 year: 2005 end-page: 465 article-title: Hipikat: a project memory for software development publication-title: IEEE Transactions on Software Engineering – start-page: 361 year: 2007 end-page: 370 – volume: 18 start-page: 457 issue: 6 year: 2006 end-page: 474 article-title: Industrial tools for the feature location problem: an exploratory study publication-title: Journal of Software Maintenance Research and Practice – start-page: 301 year: 2008 end-page: 310 – start-page: 234 year: 2007 end-page: 243 – start-page: 118 year: 2007 end-page: 128 – start-page: 371 year: 2003 end-page: 378 – year: 1986 – start-page: 86 year: 2005 end-page: 95 – start-page: 1 year: 2010 end-page: 2 – volume: 29 start-page: 116 issue: 2 year: 2003 end-page: 132 article-title: A scenario‐driven approach to trace dependency analysis publication-title: IEEE Transactions on Software Engineering (TSE) – year: 2008 – start-page: 83 year: 2006 end-page: 92 – start-page: 268 year: 2008b end-page: 271 – start-page: 165 year: 2010 end-page: 174 – start-page: 133 year: 2005a end-page: 142 – start-page: 15 year: 2007 end-page: 24 – volume: 22 start-page: 179 issue: 2 year: 2004 end-page: 214 article-title: A study of smoothing methods for language models applied to information retrieval publication-title: ACM Transactions on Information Systems – volume: 7 start-page: 49 year: 1995 end-page: 62 article-title: Software reconnaissance: mapping program features to code publication-title: Journal of Software Maintenance Research and Practice – start-page: I. 1353 end-page: I. 7776 – volume: 35 start-page: 684 issue: 5 year: 2010 end-page: 702 article-title: A systematic survey of program comprehension through dynamic analysis publication-title: IEEE Trans. on Software Engineering – volume: 15 start-page: 783 issue: 5 year: 2005a end-page: 810 article-title: Supporting software understanding with automated traceability publication-title: International Journal of Software Engineering and Knowledge Engineering – start-page: 915 year: 2008a end-page: 916 – start-page: 780 year: 2008 end-page: 783 – start-page: 71 year: 2006 end-page: 80 – start-page: 68 year: 2001 end-page: 76 – year: 2007 – volume: 32 start-page: 971 issue: 12 year: 2006 end-page: 987 article-title: An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks publication-title: IEEE Transactions on Software Engineering (TSE) – start-page: 176 year: 2001b end-page: 179 – volume: 32 start-page: 627 issue: 9 year: 2006 end-page: 641 publication-title: IEEE Transactions on Software Engineering – start-page: 16 year: 2009 end-page: 24 – start-page: 361 year: 2009 end-page: 370 – start-page: 69 year: 2005 end-page: 72 – start-page: 255 year: 2010b end-page: 258 – start-page: 408 year: 2003 end-page: 418 – year: 2010 – start-page: 170 year: 2004 end-page: 177 – volume: 46 start-page: 604 issue: 5 year: 1999 end-page: 632 article-title: Authoritative sources in a hyperlinked environment publication-title: Journal of the ACM – start-page: 406 year: 2002 end-page: 416 – start-page: 156 year: 2010 end-page: 159 – start-page: 23 year: 2005 end-page: 32 – start-page: 214 year: 2004 end-page: 223 – start-page: 271 year: 2002 end-page: 278 – start-page: 754 year: 2007 end-page: 757 – year: 2002 – volume: 29 start-page: 210 issue: 3 year: 2003 end-page: 224 article-title: Locating features in source code publication-title: IEEE Transactions on Software Engineering – start-page: 360 year: 2005b end-page: 363 – volume: 30 start-page: 889 issue: 12 year: 2004 end-page: 903 article-title: How effective developers investigate source code: an exploratory study publication-title: IEEE Transactions on Software Engineering (TSE) – start-page: 109 year: 2009 end-page: 118 – start-page: 103 year: 2007 end-page: 112 – start-page: 347 year: 2005 end-page: 356 – start-page: 155 year: 2008 end-page: 164 – start-page: 364 year: 2001a end-page: 373 – start-page: 137 year: 2006a end-page: 146 – start-page: 3 year: 2006 end-page: 14 – start-page: 385 year: 2010b end-page: 394 – year: 2009 – start-page: 136 year: 2006 end-page: 144 – start-page: 42 year: 2007 end-page: 55 – start-page: 602 year: 2001a end-page: 611 – volume: 33 start-page: 420 issue: 6 year: 2007a end-page: 432 article-title: Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval publication-title: IEEE Transactions on Software Engineering – year: 2001 – start-page: 236 year: 2008 end-page: 241 – start-page: 161 year: 2007a end-page: 162 – volume: 40 start-page: 25 issue: 11 year: 2007 end-page: 31 article-title: teaching software evolution in open source publication-title: IEEE Computer – start-page: 33 year: 2005c end-page: 42 – start-page: 334 year: 2006c end-page: 338 – start-page: 27 year: 2003 end-page: 36 – start-page: 241 year: 2006 end-page: 244 – start-page: 33 year: 2000 end-page: 39 – start-page: 300 year: 2001c end-page: 309 – start-page: 2 year: 2004 end-page: 9 – volume: 3 start-page: 993 year: 2003 end-page: 1022 article-title: Latent Dirichlet allocation publication-title: Journal of Machine Learning Research – start-page: 72 year: 2004 end-page: 81 – volume: 30 start-page: 964 issue: 11 year: 1987 end-page: 971 article-title: The vocabulary problem in human–system communication publication-title: Communications of the ACM – start-page: 78 year: 2004 end-page: 82 – start-page: 252 year: 2006b end-page: 255 – start-page: 37 year: 2007b end-page: 48 – start-page: 107 year: 1998 end-page: 117 – start-page: 126 year: 2005 end-page: 135 – start-page: 212 year: 2007 end-page: 224 – volume: 52 start-page: 972 issue: 9 year: 2010 end-page: 990 article-title: Bug localization using latent Dirichlet allocation publication-title: Information and Software Technology – start-page: 200 year: 1992 end-page: 205 – start-page: 41 year: 2006a end-page: 48 – start-page: 1 year: 2010a end-page: 5 – volume: 34 start-page: 497 issue: 4 year: 2008b article-title: Do crosscutting concerns cause defects? publication-title: IEEE Transaction on Software Engineering – start-page: 341 year: 2010 end-page: 344 – start-page: 11 year: 2005a end-page: 20 – start-page: 218 year: 2009 end-page: 222 – start-page: 90 year: 2003 end-page: 101 – start-page: 53 year: 2008a end-page: 62 – start-page: 14 year: 2007 end-page: 23 – start-page: 357 year: 2005 end-page: 366 – start-page: 839 year: 2006 end-page: 842 – start-page: 82 year: 2004 end-page: 91 – volume: 31 start-page: 64 issue: 7 year: 1998 end-page: 73 article-title: Mining system tests to aid software maintenance publication-title: Computer – start-page: 178 year: 2003 end-page: 187 – start-page: 193 year: 2008 end-page: 202 – volume: 20 start-page: 761 issue: 6 year: 2010 end-page: 782 article-title: Dynamic Knowledge Extraction from Software Systems using Sequential Pattern Mining publication-title: International Journal of Software Engineering and Knowledge Engineering (IJSEKE) – start-page: 482 year: 1994 end-page: 498 – start-page: 138 year: 2008 end-page: 142 – start-page: 718 year: 2005b – volume: 14 start-page: 93 issue: 1 year: 2009 end-page: 130 article-title: An empirical analysis of information retrieval based concept location techniques in software comprehension publication-title: Empirical Software Engineering – volume: 21 start-page: 50 issue: 6 year: 2004 end-page: 58 article-title: Identifying requirements conflicts and cooperation publication-title: IEEE Software – volume: 18 start-page: 425 issue: 6 year: 2006 end-page: 456 article-title: Analyzing software evolution through feature views publication-title: Journal of Software Maintenance and Evolution: Research and Practice – volume: 41 start-page: 391 year: 1990 end-page: 407 article-title: Indexing by latent semantic analysis publication-title: Journal of the American Society for Information Science – start-page: 54 year: 2007 end-page: 63 – volume: 15 start-page: 195 issue: 2 year: 2006 end-page: 226 article-title: SNIAFL: towards a static non‐interactive approach to feature location publication-title: ACM Transactions on Software Engineering and Methodologies (TOSEM) – volume: 65 start-page: 105 issue: 2 year: 2003 end-page: 114 article-title: A comparison of methods for locating features in legacy software publication-title: Journal of Systems and Software – start-page: 337 year: 2005 end-page: 346 – start-page: 41 year: 2007 end-page: 42 – start-page: 24 year: 2003 end-page: 27 – start-page: 95 year: 2006b end-page: 104 – start-page: 225 year: 2003a end-page: 234 – year: 2006 – start-page: 84 year: 2006 end-page: 88 – volume: 16 issue: 1 year: 2007a article-title: Representing concerns in source code publication-title: ACM Transactions on Software Engineering and Methodology (TOSEM) – start-page: 822 year: 2003b end-page: 823 – start-page: 65 year: 2005b end-page: 69 – start-page: 14 year: 2010 end-page: 23 – start-page: 12 year: 2010a end-page: 18 – start-page: 241 year: 2000 end-page: 249 – start-page: 194 year: 1999 end-page: 203 – start-page: 91 year: 2007 end-page: 102 – volume: 17 start-page: 1 issue: 4 year: 2008 end-page: 36 article-title: Topology analysis of software dependencies publication-title: ACM Transactions on Software Engineering and Methodology – start-page: 230 year: 2001b end-page: 239 – volume: 36 start-page: 287 issue: 3 year: 1994 end-page: 314 article-title: Independent component analysis, a new concept? publication-title: Signal Process. – start-page: 149 year: 2005 end-page: 152 – year: 1999 – ident: e_1_2_11_139_1 doi: 10.1109/ICSM.2006.66 – ident: e_1_2_11_86_1 doi: 10.1109/CSMR.2010.17 – ident: e_1_2_11_116_1 doi: 10.1109/ICSM.2010.5609654 – ident: e_1_2_11_121_1 doi: 10.1145/643603.643622 – ident: e_1_2_11_144_1 doi: 10.1142/S021819401000492X – ident: e_1_2_11_90_1 doi: 10.1145/324133.324140 – ident: e_1_2_11_102_1 doi: 10.1109/ICSM.2000.882985 – ident: e_1_2_11_128_1 doi: 10.1109/WPC.2005.33 – ident: e_1_2_11_134_1 – ident: e_1_2_11_34_1 doi: 10.1109/ICSM.2004.1357792 – ident: e_1_2_11_136_1 doi: 10.1145/1062455.1062492 – volume-title: An Empirical Study of the Concept Assignment Problem year: 2007 ident: e_1_2_11_29_1 – ident: e_1_2_11_124_1 doi: 10.1007/3-540-45429-2_17 – ident: e_1_2_11_54_1 doi: 10.1145/1117696.1117710 – ident: e_1_2_11_6_1 doi: 10.1109/ICSM.2005.50 – ident: e_1_2_11_19_1 doi: 10.1145/32206.32212 – ident: e_1_2_11_59_1 doi: 10.1007/s10664-008-9095-3 – ident: e_1_2_11_115_1 doi: 10.1109/ICSE.2003.1201304 – ident: e_1_2_11_41_1 doi: 10.1109/ASSET.1999.756769 – ident: e_1_2_11_103_1 doi: 10.1002/smr.338 – ident: e_1_2_11_27_1 doi: 10.1109/ICSM.2007.4362618 – ident: e_1_2_11_37_1 doi: 10.1002/smr.340 – start-page: 2 volume-title: IEEE Software year: 2004 ident: e_1_2_11_4_1 – ident: e_1_2_11_84_1 doi: 10.1049/iet-sen.2008.0078 – ident: e_1_2_11_105_1 doi: 10.1109/TSE.2003.1178051 – ident: e_1_2_11_60_1 doi: 10.1109/ICSM.2009.5306315 – ident: e_1_2_11_120_1 doi: 10.1145/1370175.1370185 – ident: e_1_2_11_75_1 doi: 10.1109/ICPC.2010.29 – volume-title: Encyclopedia of Software Engineering year: 2010 ident: e_1_2_11_146_1 – ident: e_1_2_11_23_1 doi: 10.1145/1321631.1321667 – ident: e_1_2_11_28_1 doi: 10.1145/1134285.1134428 – ident: e_1_2_11_138_1 doi: 10.1145/1368088.1368130 – ident: e_1_2_11_70_1 doi: 10.1145/1008992.1009024 – ident: e_1_2_11_135_1 doi: 10.1109/ICSE.2007.79 – ident: e_1_2_11_89_1 doi: 10.1016/S0169-7552(98)00110-X – ident: e_1_2_11_126_1 doi: 10.1109/CSMR.2001.914970 – ident: e_1_2_11_130_1 doi: 10.1109/ICSM.2009.5306312 – ident: e_1_2_11_96_1 doi: 10.1109/WCRE.2006.32 – ident: e_1_2_11_131_1 doi: 10.1145/1287624.1287675 – start-page: I. 1353 volume-title: Procedures for Performing Systematic Reviews ident: e_1_2_11_7_1 – ident: e_1_2_11_145_1 – ident: e_1_2_11_58_1 doi: 10.1109/ICPC.2008.14 – ident: e_1_2_11_95_1 doi: 10.1145/1566445.1566539 – ident: e_1_2_11_8_1 doi: 10.1109/TSE.2003.1183929 – ident: e_1_2_11_92_1 – ident: e_1_2_11_21_1 doi: 10.1109/TSE.2005.71 – ident: e_1_2_11_110_1 doi: 10.1109/ICPC.2007.6 – ident: e_1_2_11_109_1 doi: 10.1109/ICPC.2010.27 – ident: e_1_2_11_99_1 doi: 10.1109/ICSE.2003.1201219 – ident: e_1_2_11_65_1 doi: 10.1109/ICSM.2010.5609555 – ident: e_1_2_11_127_1 doi: 10.1109/APSEC.2003.1254391 – volume-title: Object‐Oriented and Classical Software Engineering year: 2001 ident: e_1_2_11_141_1 – ident: e_1_2_11_30_1 doi: 10.1109/WCRE.2008.33 – ident: e_1_2_11_11_1 doi: 10.1109/ICSM.2005.42 – ident: e_1_2_11_140_1 doi: 10.1109/MC.2007.402 – ident: e_1_2_11_81_1 doi: 10.1109/ICSM.2005.48 – volume-title: Software Engineering year: 2001 ident: e_1_2_11_142_1 – ident: e_1_2_11_9_1 doi: 10.1002/smr.4360070105 – ident: e_1_2_11_46_1 doi: 10.1016/j.jss.2004.12.018 – ident: e_1_2_11_123_1 doi: 10.1145/1066129.1066145 – ident: e_1_2_11_119_1 doi: 10.1109/VISSOF.2007.4290719 – volume-title: Introduction to Modern Information Retrieval year: 1986 ident: e_1_2_11_17_1 – ident: e_1_2_11_38_1 doi: 10.1109/WCRE.2003.1287240 – ident: e_1_2_11_104_1 – ident: e_1_2_11_67_1 – ident: e_1_2_11_111_1 doi: 10.1109/ICSM.2006.60 – ident: e_1_2_11_94_1 doi: 10.1145/1321631.1321637 – ident: e_1_2_11_106_1 doi: 10.1109/MS.2004.40 – ident: e_1_2_11_26_1 doi: 10.1109/VISSOF.2007.4290701 – ident: e_1_2_11_53_1 doi: 10.1145/1081706.1081711 – ident: e_1_2_11_25_1 doi: 10.1109/ICPC.2008.39 – ident: e_1_2_11_56_1 doi: 10.1109/CSMR.2008.4493314 – start-page: 41 volume-title: Analyzing feature implementation by visual exploration of architecturally‐embedded call‐graphs. Proceedings of International Workshop on Dynamic Systems Analysis (r'06) year: 2006 ident: e_1_2_11_117_1 – ident: e_1_2_11_143_1 doi: 10.1007/978-1-4615-4625-2_1 – ident: e_1_2_11_97_1 doi: 10.1109/ICPC.2007.22 – ident: e_1_2_11_98_1 doi: 10.1109/APSEC.2010.51 – ident: e_1_2_11_13_1 doi: 10.1109/WPC.2000.852498 – ident: e_1_2_11_113_1 doi: 10.1109/ICPC.2006.32 – ident: e_1_2_11_3_1 doi: 10.1109/WPC.2002.1021348 – volume-title: SHARPE: Symbolic Hierarchical Automated Reliability and Performance Evaluator, Introduction and Guide for Users year: 1986 ident: e_1_2_11_43_1 – ident: e_1_2_11_137_1 doi: 10.1109/TSE.2006.116 – ident: e_1_2_11_55_1 doi: 10.1109/ICSE.2007.80 – ident: e_1_2_11_107_1 doi: 10.1142/S0218194005002464 – ident: e_1_2_11_93_1 doi: 10.1145/1131421.1131424 – ident: e_1_2_11_16_1 doi: 10.1162/jmlr.2003.3.4-5.993 – ident: e_1_2_11_35_1 doi: 10.1109/CSMR.2006.47 – ident: e_1_2_11_5_1 doi: 10.1016/S0164-1212(02)00052-3 – ident: e_1_2_11_47_1 doi: 10.1109/ICPC.2008.21 – ident: e_1_2_11_68_1 doi: 10.1109/ICPC.2006.46 – ident: e_1_2_11_79_1 doi: 10.1109/ICSM.2001.972777 – ident: e_1_2_11_12_1 doi: 10.1109/ICPC.2006.19 – ident: e_1_2_11_83_1 doi: 10.1109/ICPC.2008.35 – ident: e_1_2_11_24_1 doi: 10.1109/WCRE.2004.10 – ident: e_1_2_11_114_1 doi: 10.1145/774833.774837 – ident: e_1_2_11_73_1 doi: 10.1145/1119655.1119660 – ident: e_1_2_11_15_1 doi: 10.1002/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9 – ident: e_1_2_11_87_1 doi: 10.1109/ICSM.2005.89 – ident: e_1_2_11_20_1 doi: 10.1109/ICSM.2001.972749 – ident: e_1_2_11_33_1 doi: 10.1109/ICSECOMPANION.2007.70 – ident: e_1_2_11_85_1 doi: 10.1145/1810295.1810345 – ident: e_1_2_11_118_1 doi: 10.1145/1148493.1148508 – ident: e_1_2_11_62_1 doi: 10.1109/ICSE.2009.5070524 – ident: e_1_2_11_77_1 doi: 10.1145/1273463.1273480 – ident: e_1_2_11_2_1 – ident: e_1_2_11_66_1 doi: 10.1016/j.infsof.2010.04.002 – ident: e_1_2_11_80_1 doi: 10.1145/1101908.1101923 – ident: e_1_2_11_122_1 doi: 10.1145/1368088.1368092 – ident: e_1_2_11_36_1 doi: 10.1109/ICSM.2005.22 – ident: e_1_2_11_42_1 doi: 10.1109/2.689678 – ident: e_1_2_11_49_1 – ident: e_1_2_11_57_1 doi: 10.1109/CSMR.2009.34 – ident: e_1_2_11_51_1 doi: 10.1145/581339.581390 – ident: e_1_2_11_100_1 doi: 10.1145/1031607.1031622 – ident: e_1_2_11_39_1 doi: 10.1109/WCRE.2006.39 – ident: e_1_2_11_82_1 – ident: e_1_2_11_22_1 doi: 10.1109/ASE.2003.1240310 – ident: e_1_2_11_44_1 doi: 10.1109/CSMR.2001.914982 – ident: e_1_2_11_48_1 doi: 10.1109/ICPC.2009.5090036 – ident: e_1_2_11_40_1 doi: 10.1109/ICSM.1992.242542 – ident: e_1_2_11_74_1 doi: 10.1109/TSE.2008.36 – ident: e_1_2_11_71_1 doi: 10.1016/0165-1684(94)90029-9 – ident: e_1_2_11_61_1 doi: 10.1109/ICPC.2007.13 – ident: e_1_2_11_76_1 doi: 10.1145/1806799.1806827 – ident: e_1_2_11_14_1 doi: 10.1145/13487689.13487691 – ident: e_1_2_11_88_1 doi: 10.1109/ICPC.2010.10 – ident: e_1_2_11_31_1 doi: 10.1109/TSE.2007.1016 – ident: e_1_2_11_63_1 doi: 10.1145/1218563.1218587 – ident: e_1_2_11_10_1 doi: 10.1109/TSE.2006.88 – ident: e_1_2_11_133_1 doi: 10.1109/WPC.2005.43 – ident: e_1_2_11_125_1 doi: 10.1109/ICSM.1996.565034 – ident: e_1_2_11_108_1 doi: 10.1145/1101908.1101970 – ident: e_1_2_11_52_1 doi: 10.1145/1189748.1189751 – ident: e_1_2_11_32_1 doi: 10.1109/TSE.2009.28 – ident: e_1_2_11_45_1 doi: 10.1109/WPC.2001.921740 – ident: e_1_2_11_129_1 doi: 10.1109/ICPC.2009.5090045 – ident: e_1_2_11_91_1 doi: 10.1109/ICSM.2010.5609669 – ident: e_1_2_11_78_1 – ident: e_1_2_11_112_1 – ident: e_1_2_11_132_1 doi: 10.1109/TSE.2004.101 – ident: e_1_2_11_50_1 doi: 10.1109/WPC.2005.22 – volume-title: Encyclopedia of Software Engineering year: 2010 ident: e_1_2_11_18_1 – ident: e_1_2_11_101_1 doi: 10.1145/1858996.1859066 – ident: e_1_2_11_69_1 doi: 10.1145/984321.984322 – ident: e_1_2_11_72_1 doi: 10.1109/WCRE.2008.49 – ident: e_1_2_11_64_1 doi: 10.1109/ICPC.2006.17 |
SSID | ssj0000620545 |
Score | 2.4469972 |
Snippet | SUMMARY
Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature... Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature... SUMMARY Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature... |
SourceID | proquest crossref wiley istex |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 53 |
SubjectTerms | concept location Feature location program comprehension software maintenance and evolution |
Title | Feature location in source code: a taxonomy and survey |
URI | https://api.istex.fr/ark:/67375/WNG-B1D0MQCN-X/fulltext.pdf https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fsmr.567 https://www.proquest.com/docview/1707097610 |
Volume | 25 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6iFy--xfVFDuKta5MmbdebbxF2wRcuXkLSJCCrVbq7ov56Z9ru-kIQTz00Ie1MZuZjmPmGkC0nHPh9kwYRYOtASGeC1LdkwIWDYJb6JEqxUbjdiU-vxVlXdj-N-qr4IcYJN7SM0l-jgWvT3_kgDe0_FE0ZYx85VmohHLrg4-xKGHPAIli_yJGKADBzVHXM4uadeuuXUDSFUn35gjM_o9Uy3BzPktvRh1ZVJr3mcGCa2ds3Dsd__ckcmalBKN2rbs08mXD5ApkdDXigtb0vkhgB4rBwFCMeapDe5bRK91Pshd-lmg70S9kXQXVuaX9YPLvXJXJ9fHR1cBrUgxaCDPnwAgcYxjPhI8uyCNTFsfpEiNBknllMkgKqksjyI8FNy4j7UBsLwIdJHYOPsNEymcwfc7dCqG-FmbBeWmNbIjHCaM6yNGJeJFYb7htkeyRzldUs5DgM415V_MlcgTQUSKNB6HjhU0W88XPJdqm08Xtd9LBOLZHqpnOi9tlh2D4_6Khug6yPtKpqE-0rloC3AzDGwgbZKtXz2znqsn0Bj9W_LVsj07wcmYFpmnUyOSiGbgOAy8Bslnf0HZDg6Ww |
linkProvider | Wiley-Blackwell |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwEB5ROJRLebSILRR8QNyyxI6dZLlRXtuWXQkK6kocrDi2pYo2RdldBPx6ZpLsAkVIVU85xJaTGc_Mp9HMNwBbTjr0-yYNIsTWgVTOBKnvqEBIh8Es9UmUUqNwrx93L-TXgRo0VZXUC1PzQ0wTbmQZlb8mA6eE9M4ja-jwd9lWcfIG5mieNxnlwZmY5lfCWCAaoQpGQWQEiJqjumeWdu80e58FozmS6-0zpPkUr1YB52gBLiefWteZXLXHI9PO7_9icfy_f1mEdw0OZXv1xVmCGVcsw8JkxgNrTP49xIQRx6VjFPRIiexnweqMP6N2-F2WsVF2W7VGsKywbDgub9zdB7g4Ojzf7wbNrIUgJ0q8wCGM8Vz6yPI8Qo0JKkCRMjS555bypAisFBH9KPTUKhI-zIxF7MNVFqObsNEKzBZ_CrcKzHfCXFqvrLEdmRhpMsHzNOJeJjYzwrdgeyJ0nTdE5DQP45euKZSFRmlolEYL2HThdc298XLJdqW16fusvKJStUTpH_1j_ZkfhL3T_b4etGB9olbdWOlQ8wQdHuIxHrZgq9LPa-fo770zfHz8t2Wb8LZ73jvRJ1_639ZgXlQTNChrsw6zo3LsPiGOGZmN6sI-AB_k7YU |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT9swED8NkCZeYB-glY_ND4i3lNixk5S3QdcBW6uNgVbxYsWxLU1AQGmLGH89d0nawaZJiKc8xFaSO9_dL6e73wFsOenQ75s0iBBbB1I5E6S-owIhHQaz1CdRSo3C_UF8cCqPhmr4YNRXzQ8xS7iRZVT-mgz82vqdP6Sho8uyreJkDhZkHKb039U9FrP0ShgLBCNUwCiIiwBBc1S3zNLunWbvo1i0QGK9fQQ0H8LVKt70luFs-qZ1mcl5ezI27fzuLxLHZ33KK1hqUCj7WB-b1_DCFW9geTrhgTUG_xZiQoiT0jEKeaRC9qtgdb6fUTP8LsvYOLutGiNYVlg2mpQ37vcKnPY-newfBM2khSAnQrzAIYjxXPrI8jxCfQkqP5EyNLnnlrKkCKsU0fwo9NMqEj7MjEXkw1UWo5Ow0SrMF1eFewfMd8JcWq-ssR2ZGGkywfM04l4mNjPCt2B7KnOdNzTkNA3jQtcEykKjNDRKowVstvC6Zt74d8l2pbTZ_aw8p0K1ROmfg896j3fD_vf9gR62YGOqVd3Y6EjzBN0dojEetmCrUs__nqN_9I_xsva0ZR_g5bduT389HHxZh0VRjc-glM0GzI_LidtEEDM276vjeg-Gkew9 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Feature+location+in+source+code%3A+a+taxonomy+and+survey&rft.jtitle=Journal+of+software+%3A+evolution+and+process&rft.au=Dit%2C+Bogdan&rft.au=Revelle%2C+Meghan&rft.au=Gethers%2C+Malcom&rft.au=Poshyvanyk%2C+Denys&rft.date=2013-01-01&rft.issn=2047-7473&rft.eissn=2047-7481&rft.volume=25&rft.issue=1&rft.spage=53&rft.epage=95&rft_id=info:doi/10.1002%2Fsmr.567&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_smr_567 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2047-7473&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2047-7473&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2047-7473&client=summon |