Feature location in source code: a taxonomy and survey

SUMMARY Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature location techniques have been introduced that automate some or all of this process, and a comprehensive overview of this large body of work...

Full description

Saved in:
Bibliographic Details
Published inJournal of software : evolution and process Vol. 25; no. 1; pp. 53 - 95
Main Authors Dit, Bogdan, Revelle, Meghan, Gethers, Malcom, Poshyvanyk, Denys
Format Journal Article
LanguageEnglish
Published Chichester, UK John Wiley & Sons, Ltd 01.01.2013
Wiley Subscription Services, Inc
Subjects
Online AccessGet full text
ISSN2047-7473
2047-7481
DOI10.1002/smr.567

Cover

Loading…
Abstract SUMMARY Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature location techniques have been introduced that automate some or all of this process, and a comprehensive overview of this large body of work would be beneficial to researchers and practitioners. This paper presents a systematic literature survey of feature location techniques. Eighty‐nine articles from 25 venues have been reviewed and classified within the taxonomy in order to organize and structure existing work in the field of feature location. The paper also discusses open issues and defines future directions in the field of feature location. Copyright © 2011 John Wiley & Sons, Ltd. We present a survey of eighty‐nine feature location articles that were classified along nine key dimensions of a taxonomy. Researchers can use the taxonomy and survey as a basis for advancing the field, while practitioners can use it to identify techniques and tools that are well‐suited to their needs. The survey also discusses some of the open issues in feature location, such as the need for comparisons between approaches and benchmarks. We also make publicly available a set of benchmarks for systems used frequently in feature location case studies.
AbstractList SUMMARY Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature location techniques have been introduced that automate some or all of this process, and a comprehensive overview of this large body of work would be beneficial to researchers and practitioners. This paper presents a systematic literature survey of feature location techniques. Eighty‐nine articles from 25 venues have been reviewed and classified within the taxonomy in order to organize and structure existing work in the field of feature location. The paper also discusses open issues and defines future directions in the field of feature location. Copyright © 2011 John Wiley & Sons, Ltd. We present a survey of eighty‐nine feature location articles that were classified along nine key dimensions of a taxonomy. Researchers can use the taxonomy and survey as a basis for advancing the field, while practitioners can use it to identify techniques and tools that are well‐suited to their needs. The survey also discusses some of the open issues in feature location, such as the need for comparisons between approaches and benchmarks. We also make publicly available a set of benchmarks for systems used frequently in feature location case studies.
SUMMARY Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature location techniques have been introduced that automate some or all of this process, and a comprehensive overview of this large body of work would be beneficial to researchers and practitioners. This paper presents a systematic literature survey of feature location techniques. Eighty-nine articles from 25 venues have been reviewed and classified within the taxonomy in order to organize and structure existing work in the field of feature location. The paper also discusses open issues and defines future directions in the field of feature location. Copyright © 2011 John Wiley & Sons, Ltd.
Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature location techniques have been introduced that automate some or all of this process, and a comprehensive overview of this large body of work would be beneficial to researchers and practitioners. This paper presents a systematic literature survey of feature location techniques. Eighty‐nine articles from 25 venues have been reviewed and classified within the taxonomy in order to organize and structure existing work in the field of feature location. The paper also discusses open issues and defines future directions in the field of feature location. Copyright © 2011 John Wiley & Sons, Ltd.
Author Dit, Bogdan
Gethers, Malcom
Poshyvanyk, Denys
Revelle, Meghan
Author_xml – sequence: 1
  givenname: Bogdan
  surname: Dit
  fullname: Dit, Bogdan
– sequence: 2
  givenname: Meghan
  surname: Revelle
  fullname: Revelle, Meghan
– sequence: 3
  givenname: Malcom
  surname: Gethers
  fullname: Gethers, Malcom
– sequence: 4
  givenname: Denys
  surname: Poshyvanyk
  fullname: Poshyvanyk, Denys
  email: Denys Poshyvanyk, Computer Science Department, The College of William & Mary, Williamsburg, VA, USA., denys@cs.wm.edu
  organization: Computer Science Department, The College of William & Mary, VA, Williamsburg, USA
BookMark eNp1kFtLAzEQhYNUsNbiXwj44INszWWz6fqm1VahrXhD30KanYWt7aYmu9r990YrgqLzMgPzcebM2UWt0paA0D4lPUoIO_ZL1xOJ3EJtRmIZybhPW9-z5Duo6_2chEoYEbFoo2QIuqod4IU1uipsiYsSe1s7A9jYDE6wxpVe29IuG6zLDPvavUKzh7ZzvfDQ_eod9DC8uB9cRuPr0dXgdBwZnnIZAZM8p3HOM2q4gBmjaSrjmMxMTjPgtC9oLCSjiQBtBGc50bNMMkmFTjiRGe-gg43uytmXGnyl5sFbGU4qKokkqUwoCdThhjLOeu8gVytXLLVrFCXqIxcVclEhl0BGv0hTVJ9_V04Xiz_4ow3_Viyg-U9W3U1uf6gXvoL1N63dswpbKdTjdKTO6DmZ3Aym6om_A64QgbM
CitedBy_id crossref_primary_10_1109_TSE_2016_2592905
crossref_primary_10_1016_j_infsof_2012_09_013
crossref_primary_10_1145_2544173_2509522
crossref_primary_10_1007_s10515_019_00251_9
crossref_primary_10_1109_TSE_2013_45
crossref_primary_10_1007_s10270_021_00870_5
crossref_primary_10_1109_TSE_2012_71
crossref_primary_10_1007_s10664_013_9255_y
crossref_primary_10_1016_j_is_2021_101882
crossref_primary_10_15388_21_INFOR454
crossref_primary_10_1007_s10664_011_9194_4
crossref_primary_10_1109_TSE_2021_3059481
crossref_primary_10_1109_TSE_2014_2387172
crossref_primary_10_1155_2014_180528
crossref_primary_10_4018_IJOSSP_2019070103
crossref_primary_10_4236_jsea_2014_75038
crossref_primary_10_1109_TSE_2019_2910531
crossref_primary_10_1109_TSE_2021_3049735
crossref_primary_10_3390_electronics10101181
crossref_primary_10_1002_smr_1773
crossref_primary_10_1145_3280988
crossref_primary_10_1002_smr_1650
crossref_primary_10_1002_smr_1892
crossref_primary_10_1016_j_infsof_2023_107320
crossref_primary_10_1002_stvr_1475
crossref_primary_10_1007_s10270_021_00893_y
crossref_primary_10_1007_s10115_015_0909_5
crossref_primary_10_1007_s10664_018_9639_0
crossref_primary_10_1007_s10515_022_00329_x
crossref_primary_10_1016_j_infsof_2014_04_014
crossref_primary_10_1145_3034827
crossref_primary_10_1145_3078841
crossref_primary_10_1109_ACCESS_2020_2985915
crossref_primary_10_1109_TSE_2024_3406224
crossref_primary_10_1016_j_jss_2022_111532
crossref_primary_10_1109_ACCESS_2018_2873509
crossref_primary_10_1109_TSE_2015_2479232
crossref_primary_10_1016_j_datak_2018_06_001
crossref_primary_10_1145_3472616
crossref_primary_10_1002_smr_1799
crossref_primary_10_1109_TSE_2024_3522973
crossref_primary_10_55969_paradigmplus_v1n2a2
crossref_primary_10_1016_j_jss_2015_05_006
crossref_primary_10_1145_3596217
crossref_primary_10_1007_s10664_020_09823_w
crossref_primary_10_1587_transinf_2020EDP7255
crossref_primary_10_1002_spe_2900
crossref_primary_10_1109_ACCESS_2018_2883533
crossref_primary_10_1155_2018_5913634
crossref_primary_10_1109_ACCESS_2023_3236392
crossref_primary_10_1155_2018_5494209
crossref_primary_10_1145_3604905
crossref_primary_10_1007_s10664_012_9233_9
crossref_primary_10_1007_s10664_016_9486_9
crossref_primary_10_1145_3565971
crossref_primary_10_1007_s10664_020_09874_z
crossref_primary_10_1007_s11831_021_09593_8
crossref_primary_10_1145_3129456
crossref_primary_10_1007_s10664_014_9327_7
crossref_primary_10_1145_3715002
crossref_primary_10_1109_TSE_2020_3000520
crossref_primary_10_1145_2522920_2522930
crossref_primary_10_1002_smr_1619
crossref_primary_10_1007_s10664_015_9410_8
crossref_primary_10_1007_s10664_021_10104_3
crossref_primary_10_1007_s10664_017_9499_z
crossref_primary_10_1587_transinf_2023KBP0004
crossref_primary_10_1002_smr_1736
crossref_primary_10_1145_3593800
crossref_primary_10_1007_s10664_021_10021_5
crossref_primary_10_1109_TSE_2025_3534071
crossref_primary_10_1002_spe_2805
crossref_primary_10_1002_smr_1695
crossref_primary_10_1002_spe_2525
crossref_primary_10_1109_TSE_2017_2664836
crossref_primary_10_1016_j_advengsoft_2012_07_001
crossref_primary_10_1002_smr_1805
crossref_primary_10_1007_s10664_018_9672_z
crossref_primary_10_1016_j_infsof_2021_106679
crossref_primary_10_1007_s10270_019_00727_y
crossref_primary_10_1002_smr_1886
crossref_primary_10_1109_ACCESS_2022_3232982
crossref_primary_10_1002_smr_1801
crossref_primary_10_1109_TEVC_2017_2751100
crossref_primary_10_1007_s10270_021_00920_y
crossref_primary_10_1016_j_asoc_2017_10_048
crossref_primary_10_1007_s10664_021_10108_z
crossref_primary_10_1002_spe_3364
crossref_primary_10_1007_s11432_015_0860_9
crossref_primary_10_1109_TSE_2013_38
crossref_primary_10_1007_s10270_015_0512_y
crossref_primary_10_1049_iet_sen_2020_0084
crossref_primary_10_1007_s10664_012_9224_x
crossref_primary_10_1002_smr_1593
crossref_primary_10_1109_ACCESS_2022_3151395
crossref_primary_10_1145_3480027
crossref_primary_10_1016_j_scico_2013_03_015
crossref_primary_10_1016_j_infsof_2014_01_012
crossref_primary_10_1016_j_infsof_2018_03_004
crossref_primary_10_1142_S0218194014500193
crossref_primary_10_1007_s10664_019_09741_6
crossref_primary_10_1109_TSE_2024_3452595
crossref_primary_10_1155_2017_4382348
crossref_primary_10_1016_j_infsof_2019_106235
Cites_doi 10.1109/ICSM.2006.66
10.1109/CSMR.2010.17
10.1109/ICSM.2010.5609654
10.1145/643603.643622
10.1142/S021819401000492X
10.1145/324133.324140
10.1109/ICSM.2000.882985
10.1109/WPC.2005.33
10.1109/ICSM.2004.1357792
10.1145/1062455.1062492
10.1007/3-540-45429-2_17
10.1145/1117696.1117710
10.1109/ICSM.2005.50
10.1145/32206.32212
10.1007/s10664-008-9095-3
10.1109/ICSE.2003.1201304
10.1109/ASSET.1999.756769
10.1002/smr.338
10.1109/ICSM.2007.4362618
10.1002/smr.340
10.1049/iet-sen.2008.0078
10.1109/TSE.2003.1178051
10.1109/ICSM.2009.5306315
10.1145/1370175.1370185
10.1109/ICPC.2010.29
10.1145/1321631.1321667
10.1145/1134285.1134428
10.1145/1368088.1368130
10.1145/1008992.1009024
10.1109/ICSE.2007.79
10.1016/S0169-7552(98)00110-X
10.1109/CSMR.2001.914970
10.1109/ICSM.2009.5306312
10.1109/WCRE.2006.32
10.1145/1287624.1287675
10.1109/ICPC.2008.14
10.1145/1566445.1566539
10.1109/TSE.2003.1183929
10.1109/TSE.2005.71
10.1109/ICPC.2007.6
10.1109/ICPC.2010.27
10.1109/ICSE.2003.1201219
10.1109/ICSM.2010.5609555
10.1109/APSEC.2003.1254391
10.1109/WCRE.2008.33
10.1109/ICSM.2005.42
10.1109/MC.2007.402
10.1109/ICSM.2005.48
10.1002/smr.4360070105
10.1016/j.jss.2004.12.018
10.1145/1066129.1066145
10.1109/VISSOF.2007.4290719
10.1109/WCRE.2003.1287240
10.1109/ICSM.2006.60
10.1145/1321631.1321637
10.1109/MS.2004.40
10.1109/VISSOF.2007.4290701
10.1145/1081706.1081711
10.1109/ICPC.2008.39
10.1109/CSMR.2008.4493314
10.1007/978-1-4615-4625-2_1
10.1109/ICPC.2007.22
10.1109/APSEC.2010.51
10.1109/WPC.2000.852498
10.1109/ICPC.2006.32
10.1109/WPC.2002.1021348
10.1109/TSE.2006.116
10.1109/ICSE.2007.80
10.1142/S0218194005002464
10.1145/1131421.1131424
10.1162/jmlr.2003.3.4-5.993
10.1109/CSMR.2006.47
10.1016/S0164-1212(02)00052-3
10.1109/ICPC.2008.21
10.1109/ICPC.2006.46
10.1109/ICSM.2001.972777
10.1109/ICPC.2006.19
10.1109/ICPC.2008.35
10.1109/WCRE.2004.10
10.1145/774833.774837
10.1145/1119655.1119660
10.1002/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9
10.1109/ICSM.2005.89
10.1109/ICSM.2001.972749
10.1109/ICSECOMPANION.2007.70
10.1145/1810295.1810345
10.1145/1148493.1148508
10.1109/ICSE.2009.5070524
10.1145/1273463.1273480
10.1016/j.infsof.2010.04.002
10.1145/1101908.1101923
10.1145/1368088.1368092
10.1109/ICSM.2005.22
10.1109/2.689678
10.1109/CSMR.2009.34
10.1145/581339.581390
10.1145/1031607.1031622
10.1109/WCRE.2006.39
10.1109/ASE.2003.1240310
10.1109/CSMR.2001.914982
10.1109/ICPC.2009.5090036
10.1109/ICSM.1992.242542
10.1109/TSE.2008.36
10.1016/0165-1684(94)90029-9
10.1109/ICPC.2007.13
10.1145/1806799.1806827
10.1145/13487689.13487691
10.1109/ICPC.2010.10
10.1109/TSE.2007.1016
10.1145/1218563.1218587
10.1109/TSE.2006.88
10.1109/WPC.2005.43
10.1109/ICSM.1996.565034
10.1145/1101908.1101970
10.1145/1189748.1189751
10.1109/TSE.2009.28
10.1109/WPC.2001.921740
10.1109/ICPC.2009.5090045
10.1109/ICSM.2010.5609669
10.1109/TSE.2004.101
10.1109/WPC.2005.22
10.1145/1858996.1859066
10.1145/984321.984322
10.1109/WCRE.2008.49
10.1109/ICPC.2006.17
ContentType Journal Article
Copyright Copyright © 2011 John Wiley & Sons, Ltd.
Copyright © 2013 John Wiley & Sons, Ltd.
Copyright_xml – notice: Copyright © 2011 John Wiley & Sons, Ltd.
– notice: Copyright © 2013 John Wiley & Sons, Ltd.
DBID BSCLL
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/smr.567
DatabaseName Istex
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2047-7481
EndPage 95
ExternalDocumentID 3788353491
10_1002_smr_567
SMR567
ark_67375_WNG_B1D0MQCN_X
Genre article
GroupedDBID .3N
.4S
.GA
.Y3
05W
0R~
10A
1OC
31~
33P
3SF
50Z
52O
52U
8-0
8-1
8-3
8-4
8-5
930
A03
AAESR
AAEVG
AAHHS
AANLZ
AAONW
AASGY
AAXRX
AAZKR
ABCUV
ABPVW
ACAHQ
ACBWZ
ACCFJ
ACCZN
ACPOU
ACXBN
ACXQS
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADOZA
ADXAS
ADZMN
AEEZP
AEIGN
AEIMD
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFZJQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ALUQN
AMBMR
AMYDB
ARCSS
ATUGU
AUFTA
AZBYB
AZFZN
BAFTC
BDRZF
BHBCM
BMNLL
BMXJE
BRXPI
BSCLL
BY8
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
EBS
EDO
EJD
F00
F01
F04
G-S
G.N
GODZA
HGLYW
HZ~
I-F
LATKE
LEEKS
LH4
LITHE
LOXES
LUTES
LW6
LYRES
MEWTI
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
O66
O9-
P2W
P2X
PQQKQ
Q.N
Q11
QB0
R.K
ROL
SUPJJ
TUS
W8V
W99
WBKPD
WIH
WIK
WOHZO
WXSBR
WYISQ
WZISG
~WT
AAHQN
AAMNL
AANHP
AAYCA
ACRPL
ACYXJ
ADNMO
AFWVQ
ALVPJ
AAYXX
ADMLS
AEYWJ
AGHNM
AGQPQ
AGYGG
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c3937-e273f14f3d1c35eb21997440bcf1de318514572165eac532f0abd72715a6307d3
IEDL.DBID DR2
ISSN 2047-7473
IngestDate Mon Jul 14 08:22:05 EDT 2025
Tue Jul 01 05:18:38 EDT 2025
Thu Apr 24 23:07:08 EDT 2025
Wed Jan 22 16:45:05 EST 2025
Wed Oct 30 09:53:03 EDT 2024
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License http://onlinelibrary.wiley.com/termsAndConditions#vor
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3937-e273f14f3d1c35eb21997440bcf1de318514572165eac532f0abd72715a6307d3
Notes istex:7D4CDB23C487BBACD27F09BF27438A0192F62801
ArticleID:SMR567
ark:/67375/WNG-B1D0MQCN-X
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 1707097610
PQPubID 2034650
PageCount 43
ParticipantIDs proquest_journals_1707097610
crossref_primary_10_1002_smr_567
crossref_citationtrail_10_1002_smr_567
wiley_primary_10_1002_smr_567_SMR567
istex_primary_ark_67375_WNG_B1D0MQCN_X
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate January 2013
PublicationDateYYYYMMDD 2013-01-01
PublicationDate_xml – month: 01
  year: 2013
  text: January 2013
PublicationDecade 2010
PublicationPlace Chichester, UK
PublicationPlace_xml – name: Chichester, UK
– name: Chichester
PublicationTitle Journal of software : evolution and process
PublicationTitleAlternate J. Softw. Evol. and Proc
PublicationYear 2013
Publisher John Wiley & Sons, Ltd
Wiley Subscription Services, Inc
Publisher_xml – name: John Wiley & Sons, Ltd
– name: Wiley Subscription Services, Inc
References Cubranic D, Murphy GC, Singer J, Booth KS. Hipikat: a project memory for software development. IEEE Transactions on Software Engineering 2005; 316: 446-465. (June)
Furnas GW, Landauer TK, Gomez LM, Dumais ST. The vocabulary problem in human-system communication. Communications of the ACM 1987: 30(11): 964-971.
Robillard MP, Shepherd D, Hill E, Vijay-Shanker K, Pollock L. An Empirical Study of the Concept Assignment Problem. McGill University: Montreal, Quebec, Canada. 2007b.
Sahner RA, Trivedi KS. SHARPE: Symbolic Hierarchical Automated Reliability and Performance Evaluator, Introduction and Guide for Users. Duke University: Durham, NC. 1986.
Simmons S, Edwards D, Wilde N, Homan J, Groble M. Industrial tools for the feature location problem: an exploratory study. Journal of Software Maintenance Research and Practice 2006; 18(6): 457-474.
Rohatgi A, Hamou-Lhadj A, Rilling J. An approach for solving the feature location problem by measuring the component modification impact. IET Software 2009; 3(4): 292-311. (August)
Robillard MP, Coelho W, Murphy GC. How effective developers investigate source code: an exploratory study. IEEE Transactions on Software Engineering (TSE) 2004; 30(12): 889-903.
Edwards D, Simmons S, Wilde N. An approach to feature location in distributed systems. Journal of Systems and Software 2006; 79(1): 57-68. (Jan. 2006)
Petrenko M, Poshyvanyk D, Rajlich V, Buchta J. teaching software evolution in open source. IEEE Computer 2007; 40(11): 25-31.
Eaddy M, Zimmermann T, Sherwood K, Garg V, Murphy G, Nagappan N, Aho AV. Do crosscutting concerns cause defects?. IEEE Transaction on Software Engineering 2008b; 34(4): 497-515. (July-August)
Wilde N, Scully M. Software reconnaissance: mapping program features to code. Journal of Software Maintenance Research and Practice 1995; 7: 49-62.
Deerwester S, Dumais ST, Furnas GW, Landauer TK, Harshman R. Indexing by latent semantic analysis. Journal of the American Society for Information Science 1990; 41: 391-407.
Greevy O, Ducasse S, Girba T. Analyzing software evolution through feature views. Journal of Software Maintenance and Evolution: Research and Practice 2006; 18(6): 425-456. (November)
Lukins SK, Kraft NA, Etzkorn LH. Bug localization using latent Dirichlet allocation. Information and Software Technology 2010; 52(9): 972-990.
Agrawal H, Alberi JL, Horgan JR, Li JJ, London S, Wong WE, Ghosh S, Wilde N. Mining system tests to aid software maintenance. Computer 1998; 317: 64-73. (July 1998)
Egyed A, Grünbacher P. Identifying requirements conflicts and cooperation. IEEE Software 2004;21(6): 50-58. (Nov. 2004)
Eisenbarth T, Koschke R, Simon D. Locating features in source code. IEEE Transactions on Software Engineering 2003; 29(3): 210-224. (March)
Comon P. Independent component analysis, a new concept? Signal Process. 1994; 363: 287-314. (Apr. 1994)
Egyed A, Grünbacher P. Supporting software understanding with automated traceability. International Journal of Software Engineering and Knowledge Engineering 2005a; 15(5): 783-810. (Oct. 2005)
Ko AJ, Myers BA, Coblenz MJ, Aung HH. An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks. IEEE Transactions on Software Engineering (TSE) 2006; 32(12); 971-987. (December)
Robillard MP. Topology analysis of software dependencies. ACM Transactions on Software Engineering and Methodology 2008; 17(4): 1-36. (August)
Egyed A. A scenario-driven approach to trace dependency analysis. IEEE Transactions on Software Engineering (TSE) 2003; 29(2): 116-132. (February)
Poshyvanyk D, Guéhéneuc, YG, Marcus A, Antoniol G, Rajlich V. Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. IEEE Transactions on Software Engineering 2007a: 33(6): 420-432. (June)
Zhao W, Zhang L, Liu Y, Sun J, Yang F. SNIAFL: towards a static non-interactive approach to feature location. ACM Transactions on Software Engineering and Methodologies (TOSEM) 2006; 15(2): 195-226.
Kitchenham B. Procedures for Performing Systematic Reviews, Keele UK (ed.). Keele University: TR/SE-0401, I. 1353-I. 7776.
Bohnet J, Döellner J. Analyzing feature implementation by visual exploration of architecturally-embedded call-graphs. Proceedings of International Workshop on Dynamic Systems Analysis (r'06). Shanghai: China, 2006a: 41-48.
Sartipi K, Safyallah H. Dynamic Knowledge Extraction from Software Systems using Sequential Pattern Mining. International Journal of Software Engineering and Knowledge Engineering (IJSEKE) 2010; 20(6): September, 761-782.
Wilde N, Buckellew M, Page H, Rajlich V, Pounds L. A comparison of methods for locating features in legacy software. Journal of Systems and Software 2003; 65(2): 105-114. (February 15)
Schach S. Object-Oriented and Classical Software Engineering (5th edn). McGraw-Hill Higher Education: New York, 2001.
Antoniol G, Guéhéneuc YG. Feature identification: an epidemiological metaphor. IEEE Transactions on Software Engineering 2006 329: 627-641.
Robillard MP, Murphy GC. Representing concerns in source code. ACM Transactions on Software Engineering and Methodology (TOSEM) 2007a; 16(1).
Cornelissen B, Zaidman A, Van Deursen A, Moonen L, Koschke R. A systematic survey of program comprehension through dynamic analysis. IEEE Trans. on Software Engineering September-October 2010: 35(5): 684-702.
Cleary B, Exton C, Buckley J, English M. An empirical analysis of information retrieval based concept location techniques in software comprehension. Empirical Software Engineering 2009: 141: 93-130.
Somerville I. Software Engineering (6th edn). Addison-Wesley: New Work, 2001.
Blei DM, Ng AY, Jordan MI. Latent Dirichlet allocation. Journal of Machine Learning Research 2003; 3: 993-1022.
Salton G, McGill M. Introduction to Modern Information Retrieval. McGraw-Hill: New York, NY, USA. 1986.
Zhai C, Lafferty, J. A study of smoothing methods for language models applied to information retrieval. ACM Transactions on Information Systems 2004; 22(2): 179-214. (Apr. 2004)
Kleinberg JM. Authoritative sources in a hyperlinked environment. Journal of the ACM 1999; 46(5): 604-632.
2004; 21
2004; 22
2005a; 15
1987; 30
2006; 79
2006; 32
2008b
2008a
1999; 46
2008b; 34
2003b
2003a
1990; 41
2009; 14
2004; 30
2010; 20
2005b
2001
2000
2005a
2007a; 33
2003; 3
1986
2005; 31
1994; 36
2010; 35
2006c
2006b
2010
2006a
2008; 17
2006; 15
2009
1998
2008
2007
2006; 18
1996
2006
2001c
1994
2005
2001b
2004
2001a
2003
1992
2002
2005c
1995; 7
1999
2007b
2007a; 16
2007a
2010b
2010a
2003; 29
2007; 40
2009; 3
1998; 31
2010; 52
2003; 65
e_1_2_11_70_1
e_1_2_11_93_1
Binkley D (e_1_2_11_18_1) 2010
Robillard MP (e_1_2_11_29_1) 2007
e_1_2_11_32_1
e_1_2_11_55_1
e_1_2_11_78_1
e_1_2_11_36_1
e_1_2_11_51_1
e_1_2_11_74_1
e_1_2_11_97_1
e_1_2_11_13_1
e_1_2_11_118_1
e_1_2_11_125_1
e_1_2_11_106_1
e_1_2_11_48_1
e_1_2_11_121_1
e_1_2_11_102_1
e_1_2_11_144_1
e_1_2_11_140_1
e_1_2_11_81_1
e_1_2_11_20_1
e_1_2_11_66_1
e_1_2_11_47_1
e_1_2_11_89_1
e_1_2_11_24_1
e_1_2_11_62_1
e_1_2_11_129_1
e_1_2_11_8_1
Sahner RA (e_1_2_11_43_1) 1986
e_1_2_11_85_1
e_1_2_11_136_1
e_1_2_11_59_1
e_1_2_11_113_1
e_1_2_11_132_1
e_1_2_11_50_1
e_1_2_11_92_1
Schach S (e_1_2_11_141_1) 2001
e_1_2_11_31_1
e_1_2_11_77_1
e_1_2_11_58_1
e_1_2_11_119_1
e_1_2_11_35_1
e_1_2_11_73_1
e_1_2_11_12_1
e_1_2_11_54_1
e_1_2_11_96_1
e_1_2_11_103_1
e_1_2_11_126_1
e_1_2_11_28_1
e_1_2_11_5_1
e_1_2_11_122_1
e_1_2_11_145_1
e_1_2_11_61_1
e_1_2_11_80_1
Somerville I (e_1_2_11_142_1) 2001
e_1_2_11_46_1
e_1_2_11_69_1
e_1_2_11_88_1
e_1_2_11_107_1
e_1_2_11_9_1
e_1_2_11_23_1
e_1_2_11_42_1
e_1_2_11_65_1
e_1_2_11_84_1
e_1_2_11_114_1
e_1_2_11_16_1
e_1_2_11_137_1
e_1_2_11_110_1
e_1_2_11_39_1
e_1_2_11_133_1
Kitchenham B (e_1_2_11_7_1)
e_1_2_11_72_1
e_1_2_11_91_1
e_1_2_11_30_1
e_1_2_11_57_1
e_1_2_11_99_1
e_1_2_11_34_1
e_1_2_11_53_1
e_1_2_11_76_1
e_1_2_11_95_1
e_1_2_11_11_1
e_1_2_11_6_1
e_1_2_11_104_1
e_1_2_11_27_1
e_1_2_11_127_1
e_1_2_11_2_1
e_1_2_11_100_1
e_1_2_11_123_1
Rajlich V (e_1_2_11_4_1) 2004
e_1_2_11_83_1
e_1_2_11_60_1
e_1_2_11_45_1
e_1_2_11_68_1
e_1_2_11_41_1
e_1_2_11_87_1
e_1_2_11_108_1
e_1_2_11_22_1
e_1_2_11_64_1
e_1_2_11_115_1
e_1_2_11_138_1
e_1_2_11_15_1
e_1_2_11_111_1
e_1_2_11_134_1
Binkley D (e_1_2_11_146_1) 2010
e_1_2_11_38_1
e_1_2_11_19_1
e_1_2_11_130_1
e_1_2_11_94_1
e_1_2_11_71_1
e_1_2_11_90_1
e_1_2_11_10_1
e_1_2_11_56_1
e_1_2_11_79_1
e_1_2_11_14_1
e_1_2_11_52_1
e_1_2_11_98_1
e_1_2_11_33_1
e_1_2_11_75_1
e_1_2_11_105_1
e_1_2_11_128_1
e_1_2_11_26_1
e_1_2_11_3_1
e_1_2_11_49_1
e_1_2_11_101_1
e_1_2_11_124_1
e_1_2_11_143_1
e_1_2_11_120_1
e_1_2_11_82_1
e_1_2_11_21_1
e_1_2_11_44_1
e_1_2_11_67_1
e_1_2_11_25_1
e_1_2_11_40_1
e_1_2_11_63_1
e_1_2_11_86_1
e_1_2_11_109_1
e_1_2_11_139_1
e_1_2_11_116_1
e_1_2_11_37_1
e_1_2_11_135_1
e_1_2_11_112_1
e_1_2_11_131_1
Salton G (e_1_2_11_17_1) 1986
Bohnet J (e_1_2_11_117_1) 2006
References_xml – reference: Sartipi K, Safyallah H. Dynamic Knowledge Extraction from Software Systems using Sequential Pattern Mining. International Journal of Software Engineering and Knowledge Engineering (IJSEKE) 2010; 20(6): September, 761-782.
– reference: Blei DM, Ng AY, Jordan MI. Latent Dirichlet allocation. Journal of Machine Learning Research 2003; 3: 993-1022.
– reference: Deerwester S, Dumais ST, Furnas GW, Landauer TK, Harshman R. Indexing by latent semantic analysis. Journal of the American Society for Information Science 1990; 41: 391-407.
– reference: Kitchenham B. Procedures for Performing Systematic Reviews, Keele UK (ed.). Keele University: TR/SE-0401, I. 1353-I. 7776.
– reference: Somerville I. Software Engineering (6th edn). Addison-Wesley: New Work, 2001.
– reference: Robillard MP, Shepherd D, Hill E, Vijay-Shanker K, Pollock L. An Empirical Study of the Concept Assignment Problem. McGill University: Montreal, Quebec, Canada. 2007b.
– reference: Cleary B, Exton C, Buckley J, English M. An empirical analysis of information retrieval based concept location techniques in software comprehension. Empirical Software Engineering 2009: 141: 93-130.
– reference: Edwards D, Simmons S, Wilde N. An approach to feature location in distributed systems. Journal of Systems and Software 2006; 79(1): 57-68. (Jan. 2006)
– reference: Antoniol G, Guéhéneuc YG. Feature identification: an epidemiological metaphor. IEEE Transactions on Software Engineering 2006 329: 627-641.
– reference: Lukins SK, Kraft NA, Etzkorn LH. Bug localization using latent Dirichlet allocation. Information and Software Technology 2010; 52(9): 972-990.
– reference: Furnas GW, Landauer TK, Gomez LM, Dumais ST. The vocabulary problem in human-system communication. Communications of the ACM 1987: 30(11): 964-971.
– reference: Zhao W, Zhang L, Liu Y, Sun J, Yang F. SNIAFL: towards a static non-interactive approach to feature location. ACM Transactions on Software Engineering and Methodologies (TOSEM) 2006; 15(2): 195-226.
– reference: Egyed A, Grünbacher P. Supporting software understanding with automated traceability. International Journal of Software Engineering and Knowledge Engineering 2005a; 15(5): 783-810. (Oct. 2005)
– reference: Robillard MP. Topology analysis of software dependencies. ACM Transactions on Software Engineering and Methodology 2008; 17(4): 1-36. (August)
– reference: Simmons S, Edwards D, Wilde N, Homan J, Groble M. Industrial tools for the feature location problem: an exploratory study. Journal of Software Maintenance Research and Practice 2006; 18(6): 457-474.
– reference: Poshyvanyk D, Guéhéneuc, YG, Marcus A, Antoniol G, Rajlich V. Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. IEEE Transactions on Software Engineering 2007a: 33(6): 420-432. (June)
– reference: Sahner RA, Trivedi KS. SHARPE: Symbolic Hierarchical Automated Reliability and Performance Evaluator, Introduction and Guide for Users. Duke University: Durham, NC. 1986.
– reference: Greevy O, Ducasse S, Girba T. Analyzing software evolution through feature views. Journal of Software Maintenance and Evolution: Research and Practice 2006; 18(6): 425-456. (November)
– reference: Agrawal H, Alberi JL, Horgan JR, Li JJ, London S, Wong WE, Ghosh S, Wilde N. Mining system tests to aid software maintenance. Computer 1998; 317: 64-73. (July 1998)
– reference: Zhai C, Lafferty, J. A study of smoothing methods for language models applied to information retrieval. ACM Transactions on Information Systems 2004; 22(2): 179-214. (Apr. 2004)
– reference: Bohnet J, Döellner J. Analyzing feature implementation by visual exploration of architecturally-embedded call-graphs. Proceedings of International Workshop on Dynamic Systems Analysis (r'06). Shanghai: China, 2006a: 41-48.
– reference: Ko AJ, Myers BA, Coblenz MJ, Aung HH. An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks. IEEE Transactions on Software Engineering (TSE) 2006; 32(12); 971-987. (December)
– reference: Cornelissen B, Zaidman A, Van Deursen A, Moonen L, Koschke R. A systematic survey of program comprehension through dynamic analysis. IEEE Trans. on Software Engineering September-October 2010: 35(5): 684-702.
– reference: Eaddy M, Zimmermann T, Sherwood K, Garg V, Murphy G, Nagappan N, Aho AV. Do crosscutting concerns cause defects?. IEEE Transaction on Software Engineering 2008b; 34(4): 497-515. (July-August)
– reference: Egyed A, Grünbacher P. Identifying requirements conflicts and cooperation. IEEE Software 2004;21(6): 50-58. (Nov. 2004)
– reference: Egyed A. A scenario-driven approach to trace dependency analysis. IEEE Transactions on Software Engineering (TSE) 2003; 29(2): 116-132. (February)
– reference: Wilde N, Buckellew M, Page H, Rajlich V, Pounds L. A comparison of methods for locating features in legacy software. Journal of Systems and Software 2003; 65(2): 105-114. (February 15)
– reference: Wilde N, Scully M. Software reconnaissance: mapping program features to code. Journal of Software Maintenance Research and Practice 1995; 7: 49-62.
– reference: Comon P. Independent component analysis, a new concept? Signal Process. 1994; 363: 287-314. (Apr. 1994)
– reference: Rohatgi A, Hamou-Lhadj A, Rilling J. An approach for solving the feature location problem by measuring the component modification impact. IET Software 2009; 3(4): 292-311. (August)
– reference: Petrenko M, Poshyvanyk D, Rajlich V, Buchta J. teaching software evolution in open source. IEEE Computer 2007; 40(11): 25-31.
– reference: Cubranic D, Murphy GC, Singer J, Booth KS. Hipikat: a project memory for software development. IEEE Transactions on Software Engineering 2005; 316: 446-465. (June)
– reference: Eisenbarth T, Koschke R, Simon D. Locating features in source code. IEEE Transactions on Software Engineering 2003; 29(3): 210-224. (March)
– reference: Robillard MP, Murphy GC. Representing concerns in source code. ACM Transactions on Software Engineering and Methodology (TOSEM) 2007a; 16(1).
– reference: Robillard MP, Coelho W, Murphy GC. How effective developers investigate source code: an exploratory study. IEEE Transactions on Software Engineering (TSE) 2004; 30(12): 889-903.
– reference: Salton G, McGill M. Introduction to Modern Information Retrieval. McGraw-Hill: New York, NY, USA. 1986.
– reference: Schach S. Object-Oriented and Classical Software Engineering (5th edn). McGraw-Hill Higher Education: New York, 2001.
– reference: Kleinberg JM. Authoritative sources in a hyperlinked environment. Journal of the ACM 1999; 46(5): 604-632.
– start-page: 293
  year: 2004
  end-page: 303
– year: 2007b
– start-page: 21
  year: 2008
  end-page: 30
– volume: 3
  start-page: 292
  issue: 4
  year: 2009
  end-page: 311
  article-title: An approach for solving the feature location problem by measuring the component modification impact
  publication-title: IET Software
– start-page: 130
  year: 2009
  end-page: 137
– volume: 79
  start-page: 57
  issue: 1
  year: 2006
  end-page: 68
  article-title: An approach to feature location in distributed systems
  publication-title: Journal of Systems and Software
– start-page: 63
  year: 2007b
  end-page: 66
– start-page: 44
  year: 2010
  end-page: 45
– start-page: 270
  year: 1996
– volume: 31
  start-page: 446
  issue: 6
  year: 2005
  end-page: 465
  article-title: Hipikat: a project memory for software development
  publication-title: IEEE Transactions on Software Engineering
– start-page: 361
  year: 2007
  end-page: 370
– volume: 18
  start-page: 457
  issue: 6
  year: 2006
  end-page: 474
  article-title: Industrial tools for the feature location problem: an exploratory study
  publication-title: Journal of Software Maintenance Research and Practice
– start-page: 301
  year: 2008
  end-page: 310
– start-page: 234
  year: 2007
  end-page: 243
– start-page: 118
  year: 2007
  end-page: 128
– start-page: 371
  year: 2003
  end-page: 378
– year: 1986
– start-page: 86
  year: 2005
  end-page: 95
– start-page: 1
  year: 2010
  end-page: 2
– volume: 29
  start-page: 116
  issue: 2
  year: 2003
  end-page: 132
  article-title: A scenario‐driven approach to trace dependency analysis
  publication-title: IEEE Transactions on Software Engineering (TSE)
– year: 2008
– start-page: 83
  year: 2006
  end-page: 92
– start-page: 268
  year: 2008b
  end-page: 271
– start-page: 165
  year: 2010
  end-page: 174
– start-page: 133
  year: 2005a
  end-page: 142
– start-page: 15
  year: 2007
  end-page: 24
– volume: 22
  start-page: 179
  issue: 2
  year: 2004
  end-page: 214
  article-title: A study of smoothing methods for language models applied to information retrieval
  publication-title: ACM Transactions on Information Systems
– volume: 7
  start-page: 49
  year: 1995
  end-page: 62
  article-title: Software reconnaissance: mapping program features to code
  publication-title: Journal of Software Maintenance Research and Practice
– start-page: I. 1353
  end-page: I. 7776
– volume: 35
  start-page: 684
  issue: 5
  year: 2010
  end-page: 702
  article-title: A systematic survey of program comprehension through dynamic analysis
  publication-title: IEEE Trans. on Software Engineering
– volume: 15
  start-page: 783
  issue: 5
  year: 2005a
  end-page: 810
  article-title: Supporting software understanding with automated traceability
  publication-title: International Journal of Software Engineering and Knowledge Engineering
– start-page: 915
  year: 2008a
  end-page: 916
– start-page: 780
  year: 2008
  end-page: 783
– start-page: 71
  year: 2006
  end-page: 80
– start-page: 68
  year: 2001
  end-page: 76
– year: 2007
– volume: 32
  start-page: 971
  issue: 12
  year: 2006
  end-page: 987
  article-title: An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks
  publication-title: IEEE Transactions on Software Engineering (TSE)
– start-page: 176
  year: 2001b
  end-page: 179
– volume: 32
  start-page: 627
  issue: 9
  year: 2006
  end-page: 641
  publication-title: IEEE Transactions on Software Engineering
– start-page: 16
  year: 2009
  end-page: 24
– start-page: 361
  year: 2009
  end-page: 370
– start-page: 69
  year: 2005
  end-page: 72
– start-page: 255
  year: 2010b
  end-page: 258
– start-page: 408
  year: 2003
  end-page: 418
– year: 2010
– start-page: 170
  year: 2004
  end-page: 177
– volume: 46
  start-page: 604
  issue: 5
  year: 1999
  end-page: 632
  article-title: Authoritative sources in a hyperlinked environment
  publication-title: Journal of the ACM
– start-page: 406
  year: 2002
  end-page: 416
– start-page: 156
  year: 2010
  end-page: 159
– start-page: 23
  year: 2005
  end-page: 32
– start-page: 214
  year: 2004
  end-page: 223
– start-page: 271
  year: 2002
  end-page: 278
– start-page: 754
  year: 2007
  end-page: 757
– year: 2002
– volume: 29
  start-page: 210
  issue: 3
  year: 2003
  end-page: 224
  article-title: Locating features in source code
  publication-title: IEEE Transactions on Software Engineering
– start-page: 360
  year: 2005b
  end-page: 363
– volume: 30
  start-page: 889
  issue: 12
  year: 2004
  end-page: 903
  article-title: How effective developers investigate source code: an exploratory study
  publication-title: IEEE Transactions on Software Engineering (TSE)
– start-page: 109
  year: 2009
  end-page: 118
– start-page: 103
  year: 2007
  end-page: 112
– start-page: 347
  year: 2005
  end-page: 356
– start-page: 155
  year: 2008
  end-page: 164
– start-page: 364
  year: 2001a
  end-page: 373
– start-page: 137
  year: 2006a
  end-page: 146
– start-page: 3
  year: 2006
  end-page: 14
– start-page: 385
  year: 2010b
  end-page: 394
– year: 2009
– start-page: 136
  year: 2006
  end-page: 144
– start-page: 42
  year: 2007
  end-page: 55
– start-page: 602
  year: 2001a
  end-page: 611
– volume: 33
  start-page: 420
  issue: 6
  year: 2007a
  end-page: 432
  article-title: Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval
  publication-title: IEEE Transactions on Software Engineering
– year: 2001
– start-page: 236
  year: 2008
  end-page: 241
– start-page: 161
  year: 2007a
  end-page: 162
– volume: 40
  start-page: 25
  issue: 11
  year: 2007
  end-page: 31
  article-title: teaching software evolution in open source
  publication-title: IEEE Computer
– start-page: 33
  year: 2005c
  end-page: 42
– start-page: 334
  year: 2006c
  end-page: 338
– start-page: 27
  year: 2003
  end-page: 36
– start-page: 241
  year: 2006
  end-page: 244
– start-page: 33
  year: 2000
  end-page: 39
– start-page: 300
  year: 2001c
  end-page: 309
– start-page: 2
  year: 2004
  end-page: 9
– volume: 3
  start-page: 993
  year: 2003
  end-page: 1022
  article-title: Latent Dirichlet allocation
  publication-title: Journal of Machine Learning Research
– start-page: 72
  year: 2004
  end-page: 81
– volume: 30
  start-page: 964
  issue: 11
  year: 1987
  end-page: 971
  article-title: The vocabulary problem in human–system communication
  publication-title: Communications of the ACM
– start-page: 78
  year: 2004
  end-page: 82
– start-page: 252
  year: 2006b
  end-page: 255
– start-page: 37
  year: 2007b
  end-page: 48
– start-page: 107
  year: 1998
  end-page: 117
– start-page: 126
  year: 2005
  end-page: 135
– start-page: 212
  year: 2007
  end-page: 224
– volume: 52
  start-page: 972
  issue: 9
  year: 2010
  end-page: 990
  article-title: Bug localization using latent Dirichlet allocation
  publication-title: Information and Software Technology
– start-page: 200
  year: 1992
  end-page: 205
– start-page: 41
  year: 2006a
  end-page: 48
– start-page: 1
  year: 2010a
  end-page: 5
– volume: 34
  start-page: 497
  issue: 4
  year: 2008b
  article-title: Do crosscutting concerns cause defects?
  publication-title: IEEE Transaction on Software Engineering
– start-page: 341
  year: 2010
  end-page: 344
– start-page: 11
  year: 2005a
  end-page: 20
– start-page: 218
  year: 2009
  end-page: 222
– start-page: 90
  year: 2003
  end-page: 101
– start-page: 53
  year: 2008a
  end-page: 62
– start-page: 14
  year: 2007
  end-page: 23
– start-page: 357
  year: 2005
  end-page: 366
– start-page: 839
  year: 2006
  end-page: 842
– start-page: 82
  year: 2004
  end-page: 91
– volume: 31
  start-page: 64
  issue: 7
  year: 1998
  end-page: 73
  article-title: Mining system tests to aid software maintenance
  publication-title: Computer
– start-page: 178
  year: 2003
  end-page: 187
– start-page: 193
  year: 2008
  end-page: 202
– volume: 20
  start-page: 761
  issue: 6
  year: 2010
  end-page: 782
  article-title: Dynamic Knowledge Extraction from Software Systems using Sequential Pattern Mining
  publication-title: International Journal of Software Engineering and Knowledge Engineering (IJSEKE)
– start-page: 482
  year: 1994
  end-page: 498
– start-page: 138
  year: 2008
  end-page: 142
– start-page: 718
  year: 2005b
– volume: 14
  start-page: 93
  issue: 1
  year: 2009
  end-page: 130
  article-title: An empirical analysis of information retrieval based concept location techniques in software comprehension
  publication-title: Empirical Software Engineering
– volume: 21
  start-page: 50
  issue: 6
  year: 2004
  end-page: 58
  article-title: Identifying requirements conflicts and cooperation
  publication-title: IEEE Software
– volume: 18
  start-page: 425
  issue: 6
  year: 2006
  end-page: 456
  article-title: Analyzing software evolution through feature views
  publication-title: Journal of Software Maintenance and Evolution: Research and Practice
– volume: 41
  start-page: 391
  year: 1990
  end-page: 407
  article-title: Indexing by latent semantic analysis
  publication-title: Journal of the American Society for Information Science
– start-page: 54
  year: 2007
  end-page: 63
– volume: 15
  start-page: 195
  issue: 2
  year: 2006
  end-page: 226
  article-title: SNIAFL: towards a static non‐interactive approach to feature location
  publication-title: ACM Transactions on Software Engineering and Methodologies (TOSEM)
– volume: 65
  start-page: 105
  issue: 2
  year: 2003
  end-page: 114
  article-title: A comparison of methods for locating features in legacy software
  publication-title: Journal of Systems and Software
– start-page: 337
  year: 2005
  end-page: 346
– start-page: 41
  year: 2007
  end-page: 42
– start-page: 24
  year: 2003
  end-page: 27
– start-page: 95
  year: 2006b
  end-page: 104
– start-page: 225
  year: 2003a
  end-page: 234
– year: 2006
– start-page: 84
  year: 2006
  end-page: 88
– volume: 16
  issue: 1
  year: 2007a
  article-title: Representing concerns in source code
  publication-title: ACM Transactions on Software Engineering and Methodology (TOSEM)
– start-page: 822
  year: 2003b
  end-page: 823
– start-page: 65
  year: 2005b
  end-page: 69
– start-page: 14
  year: 2010
  end-page: 23
– start-page: 12
  year: 2010a
  end-page: 18
– start-page: 241
  year: 2000
  end-page: 249
– start-page: 194
  year: 1999
  end-page: 203
– start-page: 91
  year: 2007
  end-page: 102
– volume: 17
  start-page: 1
  issue: 4
  year: 2008
  end-page: 36
  article-title: Topology analysis of software dependencies
  publication-title: ACM Transactions on Software Engineering and Methodology
– start-page: 230
  year: 2001b
  end-page: 239
– volume: 36
  start-page: 287
  issue: 3
  year: 1994
  end-page: 314
  article-title: Independent component analysis, a new concept?
  publication-title: Signal Process.
– start-page: 149
  year: 2005
  end-page: 152
– year: 1999
– ident: e_1_2_11_139_1
  doi: 10.1109/ICSM.2006.66
– ident: e_1_2_11_86_1
  doi: 10.1109/CSMR.2010.17
– ident: e_1_2_11_116_1
  doi: 10.1109/ICSM.2010.5609654
– ident: e_1_2_11_121_1
  doi: 10.1145/643603.643622
– ident: e_1_2_11_144_1
  doi: 10.1142/S021819401000492X
– ident: e_1_2_11_90_1
  doi: 10.1145/324133.324140
– ident: e_1_2_11_102_1
  doi: 10.1109/ICSM.2000.882985
– ident: e_1_2_11_128_1
  doi: 10.1109/WPC.2005.33
– ident: e_1_2_11_134_1
– ident: e_1_2_11_34_1
  doi: 10.1109/ICSM.2004.1357792
– ident: e_1_2_11_136_1
  doi: 10.1145/1062455.1062492
– volume-title: An Empirical Study of the Concept Assignment Problem
  year: 2007
  ident: e_1_2_11_29_1
– ident: e_1_2_11_124_1
  doi: 10.1007/3-540-45429-2_17
– ident: e_1_2_11_54_1
  doi: 10.1145/1117696.1117710
– ident: e_1_2_11_6_1
  doi: 10.1109/ICSM.2005.50
– ident: e_1_2_11_19_1
  doi: 10.1145/32206.32212
– ident: e_1_2_11_59_1
  doi: 10.1007/s10664-008-9095-3
– ident: e_1_2_11_115_1
  doi: 10.1109/ICSE.2003.1201304
– ident: e_1_2_11_41_1
  doi: 10.1109/ASSET.1999.756769
– ident: e_1_2_11_103_1
  doi: 10.1002/smr.338
– ident: e_1_2_11_27_1
  doi: 10.1109/ICSM.2007.4362618
– ident: e_1_2_11_37_1
  doi: 10.1002/smr.340
– start-page: 2
  volume-title: IEEE Software
  year: 2004
  ident: e_1_2_11_4_1
– ident: e_1_2_11_84_1
  doi: 10.1049/iet-sen.2008.0078
– ident: e_1_2_11_105_1
  doi: 10.1109/TSE.2003.1178051
– ident: e_1_2_11_60_1
  doi: 10.1109/ICSM.2009.5306315
– ident: e_1_2_11_120_1
  doi: 10.1145/1370175.1370185
– ident: e_1_2_11_75_1
  doi: 10.1109/ICPC.2010.29
– volume-title: Encyclopedia of Software Engineering
  year: 2010
  ident: e_1_2_11_146_1
– ident: e_1_2_11_23_1
  doi: 10.1145/1321631.1321667
– ident: e_1_2_11_28_1
  doi: 10.1145/1134285.1134428
– ident: e_1_2_11_138_1
  doi: 10.1145/1368088.1368130
– ident: e_1_2_11_70_1
  doi: 10.1145/1008992.1009024
– ident: e_1_2_11_135_1
  doi: 10.1109/ICSE.2007.79
– ident: e_1_2_11_89_1
  doi: 10.1016/S0169-7552(98)00110-X
– ident: e_1_2_11_126_1
  doi: 10.1109/CSMR.2001.914970
– ident: e_1_2_11_130_1
  doi: 10.1109/ICSM.2009.5306312
– ident: e_1_2_11_96_1
  doi: 10.1109/WCRE.2006.32
– ident: e_1_2_11_131_1
  doi: 10.1145/1287624.1287675
– start-page: I. 1353
  volume-title: Procedures for Performing Systematic Reviews
  ident: e_1_2_11_7_1
– ident: e_1_2_11_145_1
– ident: e_1_2_11_58_1
  doi: 10.1109/ICPC.2008.14
– ident: e_1_2_11_95_1
  doi: 10.1145/1566445.1566539
– ident: e_1_2_11_8_1
  doi: 10.1109/TSE.2003.1183929
– ident: e_1_2_11_92_1
– ident: e_1_2_11_21_1
  doi: 10.1109/TSE.2005.71
– ident: e_1_2_11_110_1
  doi: 10.1109/ICPC.2007.6
– ident: e_1_2_11_109_1
  doi: 10.1109/ICPC.2010.27
– ident: e_1_2_11_99_1
  doi: 10.1109/ICSE.2003.1201219
– ident: e_1_2_11_65_1
  doi: 10.1109/ICSM.2010.5609555
– ident: e_1_2_11_127_1
  doi: 10.1109/APSEC.2003.1254391
– volume-title: Object‐Oriented and Classical Software Engineering
  year: 2001
  ident: e_1_2_11_141_1
– ident: e_1_2_11_30_1
  doi: 10.1109/WCRE.2008.33
– ident: e_1_2_11_11_1
  doi: 10.1109/ICSM.2005.42
– ident: e_1_2_11_140_1
  doi: 10.1109/MC.2007.402
– ident: e_1_2_11_81_1
  doi: 10.1109/ICSM.2005.48
– volume-title: Software Engineering
  year: 2001
  ident: e_1_2_11_142_1
– ident: e_1_2_11_9_1
  doi: 10.1002/smr.4360070105
– ident: e_1_2_11_46_1
  doi: 10.1016/j.jss.2004.12.018
– ident: e_1_2_11_123_1
  doi: 10.1145/1066129.1066145
– ident: e_1_2_11_119_1
  doi: 10.1109/VISSOF.2007.4290719
– volume-title: Introduction to Modern Information Retrieval
  year: 1986
  ident: e_1_2_11_17_1
– ident: e_1_2_11_38_1
  doi: 10.1109/WCRE.2003.1287240
– ident: e_1_2_11_104_1
– ident: e_1_2_11_67_1
– ident: e_1_2_11_111_1
  doi: 10.1109/ICSM.2006.60
– ident: e_1_2_11_94_1
  doi: 10.1145/1321631.1321637
– ident: e_1_2_11_106_1
  doi: 10.1109/MS.2004.40
– ident: e_1_2_11_26_1
  doi: 10.1109/VISSOF.2007.4290701
– ident: e_1_2_11_53_1
  doi: 10.1145/1081706.1081711
– ident: e_1_2_11_25_1
  doi: 10.1109/ICPC.2008.39
– ident: e_1_2_11_56_1
  doi: 10.1109/CSMR.2008.4493314
– start-page: 41
  volume-title: Analyzing feature implementation by visual exploration of architecturally‐embedded call‐graphs. Proceedings of International Workshop on Dynamic Systems Analysis (r'06)
  year: 2006
  ident: e_1_2_11_117_1
– ident: e_1_2_11_143_1
  doi: 10.1007/978-1-4615-4625-2_1
– ident: e_1_2_11_97_1
  doi: 10.1109/ICPC.2007.22
– ident: e_1_2_11_98_1
  doi: 10.1109/APSEC.2010.51
– ident: e_1_2_11_13_1
  doi: 10.1109/WPC.2000.852498
– ident: e_1_2_11_113_1
  doi: 10.1109/ICPC.2006.32
– ident: e_1_2_11_3_1
  doi: 10.1109/WPC.2002.1021348
– volume-title: SHARPE: Symbolic Hierarchical Automated Reliability and Performance Evaluator, Introduction and Guide for Users
  year: 1986
  ident: e_1_2_11_43_1
– ident: e_1_2_11_137_1
  doi: 10.1109/TSE.2006.116
– ident: e_1_2_11_55_1
  doi: 10.1109/ICSE.2007.80
– ident: e_1_2_11_107_1
  doi: 10.1142/S0218194005002464
– ident: e_1_2_11_93_1
  doi: 10.1145/1131421.1131424
– ident: e_1_2_11_16_1
  doi: 10.1162/jmlr.2003.3.4-5.993
– ident: e_1_2_11_35_1
  doi: 10.1109/CSMR.2006.47
– ident: e_1_2_11_5_1
  doi: 10.1016/S0164-1212(02)00052-3
– ident: e_1_2_11_47_1
  doi: 10.1109/ICPC.2008.21
– ident: e_1_2_11_68_1
  doi: 10.1109/ICPC.2006.46
– ident: e_1_2_11_79_1
  doi: 10.1109/ICSM.2001.972777
– ident: e_1_2_11_12_1
  doi: 10.1109/ICPC.2006.19
– ident: e_1_2_11_83_1
  doi: 10.1109/ICPC.2008.35
– ident: e_1_2_11_24_1
  doi: 10.1109/WCRE.2004.10
– ident: e_1_2_11_114_1
  doi: 10.1145/774833.774837
– ident: e_1_2_11_73_1
  doi: 10.1145/1119655.1119660
– ident: e_1_2_11_15_1
  doi: 10.1002/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9
– ident: e_1_2_11_87_1
  doi: 10.1109/ICSM.2005.89
– ident: e_1_2_11_20_1
  doi: 10.1109/ICSM.2001.972749
– ident: e_1_2_11_33_1
  doi: 10.1109/ICSECOMPANION.2007.70
– ident: e_1_2_11_85_1
  doi: 10.1145/1810295.1810345
– ident: e_1_2_11_118_1
  doi: 10.1145/1148493.1148508
– ident: e_1_2_11_62_1
  doi: 10.1109/ICSE.2009.5070524
– ident: e_1_2_11_77_1
  doi: 10.1145/1273463.1273480
– ident: e_1_2_11_2_1
– ident: e_1_2_11_66_1
  doi: 10.1016/j.infsof.2010.04.002
– ident: e_1_2_11_80_1
  doi: 10.1145/1101908.1101923
– ident: e_1_2_11_122_1
  doi: 10.1145/1368088.1368092
– ident: e_1_2_11_36_1
  doi: 10.1109/ICSM.2005.22
– ident: e_1_2_11_42_1
  doi: 10.1109/2.689678
– ident: e_1_2_11_49_1
– ident: e_1_2_11_57_1
  doi: 10.1109/CSMR.2009.34
– ident: e_1_2_11_51_1
  doi: 10.1145/581339.581390
– ident: e_1_2_11_100_1
  doi: 10.1145/1031607.1031622
– ident: e_1_2_11_39_1
  doi: 10.1109/WCRE.2006.39
– ident: e_1_2_11_82_1
– ident: e_1_2_11_22_1
  doi: 10.1109/ASE.2003.1240310
– ident: e_1_2_11_44_1
  doi: 10.1109/CSMR.2001.914982
– ident: e_1_2_11_48_1
  doi: 10.1109/ICPC.2009.5090036
– ident: e_1_2_11_40_1
  doi: 10.1109/ICSM.1992.242542
– ident: e_1_2_11_74_1
  doi: 10.1109/TSE.2008.36
– ident: e_1_2_11_71_1
  doi: 10.1016/0165-1684(94)90029-9
– ident: e_1_2_11_61_1
  doi: 10.1109/ICPC.2007.13
– ident: e_1_2_11_76_1
  doi: 10.1145/1806799.1806827
– ident: e_1_2_11_14_1
  doi: 10.1145/13487689.13487691
– ident: e_1_2_11_88_1
  doi: 10.1109/ICPC.2010.10
– ident: e_1_2_11_31_1
  doi: 10.1109/TSE.2007.1016
– ident: e_1_2_11_63_1
  doi: 10.1145/1218563.1218587
– ident: e_1_2_11_10_1
  doi: 10.1109/TSE.2006.88
– ident: e_1_2_11_133_1
  doi: 10.1109/WPC.2005.43
– ident: e_1_2_11_125_1
  doi: 10.1109/ICSM.1996.565034
– ident: e_1_2_11_108_1
  doi: 10.1145/1101908.1101970
– ident: e_1_2_11_52_1
  doi: 10.1145/1189748.1189751
– ident: e_1_2_11_32_1
  doi: 10.1109/TSE.2009.28
– ident: e_1_2_11_45_1
  doi: 10.1109/WPC.2001.921740
– ident: e_1_2_11_129_1
  doi: 10.1109/ICPC.2009.5090045
– ident: e_1_2_11_91_1
  doi: 10.1109/ICSM.2010.5609669
– ident: e_1_2_11_78_1
– ident: e_1_2_11_112_1
– ident: e_1_2_11_132_1
  doi: 10.1109/TSE.2004.101
– ident: e_1_2_11_50_1
  doi: 10.1109/WPC.2005.22
– volume-title: Encyclopedia of Software Engineering
  year: 2010
  ident: e_1_2_11_18_1
– ident: e_1_2_11_101_1
  doi: 10.1145/1858996.1859066
– ident: e_1_2_11_69_1
  doi: 10.1145/984321.984322
– ident: e_1_2_11_72_1
  doi: 10.1109/WCRE.2008.49
– ident: e_1_2_11_64_1
  doi: 10.1109/ICPC.2006.17
SSID ssj0000620545
Score 2.4469972
Snippet SUMMARY Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature...
Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature...
SUMMARY Feature location is the activity of identifying an initial location in the source code that implements functionality in a software system. Many feature...
SourceID proquest
crossref
wiley
istex
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 53
SubjectTerms concept location
Feature location
program comprehension
software maintenance and evolution
Title Feature location in source code: a taxonomy and survey
URI https://api.istex.fr/ark:/67375/WNG-B1D0MQCN-X/fulltext.pdf
https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fsmr.567
https://www.proquest.com/docview/1707097610
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6iFy--xfVFDuKta5MmbdebbxF2wRcuXkLSJCCrVbq7ov56Z9ru-kIQTz00Ie1MZuZjmPmGkC0nHPh9kwYRYOtASGeC1LdkwIWDYJb6JEqxUbjdiU-vxVlXdj-N-qr4IcYJN7SM0l-jgWvT3_kgDe0_FE0ZYx85VmohHLrg4-xKGHPAIli_yJGKADBzVHXM4uadeuuXUDSFUn35gjM_o9Uy3BzPktvRh1ZVJr3mcGCa2ds3Dsd__ckcmalBKN2rbs08mXD5ApkdDXigtb0vkhgB4rBwFCMeapDe5bRK91Pshd-lmg70S9kXQXVuaX9YPLvXJXJ9fHR1cBrUgxaCDPnwAgcYxjPhI8uyCNTFsfpEiNBknllMkgKqksjyI8FNy4j7UBsLwIdJHYOPsNEymcwfc7dCqG-FmbBeWmNbIjHCaM6yNGJeJFYb7htkeyRzldUs5DgM415V_MlcgTQUSKNB6HjhU0W88XPJdqm08Xtd9LBOLZHqpnOi9tlh2D4_6Khug6yPtKpqE-0rloC3AzDGwgbZKtXz2znqsn0Bj9W_LVsj07wcmYFpmnUyOSiGbgOAy8Bslnf0HZDg6Ww
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwEB5ROJRLebSILRR8QNyyxI6dZLlRXtuWXQkK6kocrDi2pYo2RdldBPx6ZpLsAkVIVU85xJaTGc_Mp9HMNwBbTjr0-yYNIsTWgVTOBKnvqEBIh8Es9UmUUqNwrx93L-TXgRo0VZXUC1PzQ0wTbmQZlb8mA6eE9M4ja-jwd9lWcfIG5mieNxnlwZmY5lfCWCAaoQpGQWQEiJqjumeWdu80e58FozmS6-0zpPkUr1YB52gBLiefWteZXLXHI9PO7_9icfy_f1mEdw0OZXv1xVmCGVcsw8JkxgNrTP49xIQRx6VjFPRIiexnweqMP6N2-F2WsVF2W7VGsKywbDgub9zdB7g4Ojzf7wbNrIUgJ0q8wCGM8Vz6yPI8Qo0JKkCRMjS555bypAisFBH9KPTUKhI-zIxF7MNVFqObsNEKzBZ_CrcKzHfCXFqvrLEdmRhpMsHzNOJeJjYzwrdgeyJ0nTdE5DQP45euKZSFRmlolEYL2HThdc298XLJdqW16fusvKJStUTpH_1j_ZkfhL3T_b4etGB9olbdWOlQ8wQdHuIxHrZgq9LPa-fo770zfHz8t2Wb8LZ73jvRJ1_639ZgXlQTNChrsw6zo3LsPiGOGZmN6sI-AB_k7YU
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT9swED8NkCZeYB-glY_ND4i3lNixk5S3QdcBW6uNgVbxYsWxLU1AQGmLGH89d0nawaZJiKc8xFaSO9_dL6e73wFsOenQ75s0iBBbB1I5E6S-owIhHQaz1CdRSo3C_UF8cCqPhmr4YNRXzQ8xS7iRZVT-mgz82vqdP6Sho8uyreJkDhZkHKb039U9FrP0ShgLBCNUwCiIiwBBc1S3zNLunWbvo1i0QGK9fQQ0H8LVKt70luFs-qZ1mcl5ezI27fzuLxLHZ33KK1hqUCj7WB-b1_DCFW9geTrhgTUG_xZiQoiT0jEKeaRC9qtgdb6fUTP8LsvYOLutGiNYVlg2mpQ37vcKnPY-newfBM2khSAnQrzAIYjxXPrI8jxCfQkqP5EyNLnnlrKkCKsU0fwo9NMqEj7MjEXkw1UWo5Ow0SrMF1eFewfMd8JcWq-ssR2ZGGkywfM04l4mNjPCt2B7KnOdNzTkNA3jQtcEykKjNDRKowVstvC6Zt74d8l2pbTZ_aw8p0K1ROmfg896j3fD_vf9gR62YGOqVd3Y6EjzBN0dojEetmCrUs__nqN_9I_xsva0ZR_g5bduT389HHxZh0VRjc-glM0GzI_LidtEEDM276vjeg-Gkew9
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Feature+location+in+source+code%3A+a+taxonomy+and+survey&rft.jtitle=Journal+of+software+%3A+evolution+and+process&rft.au=Dit%2C+Bogdan&rft.au=Revelle%2C+Meghan&rft.au=Gethers%2C+Malcom&rft.au=Poshyvanyk%2C+Denys&rft.date=2013-01-01&rft.issn=2047-7473&rft.eissn=2047-7481&rft.volume=25&rft.issue=1&rft.spage=53&rft.epage=95&rft_id=info:doi/10.1002%2Fsmr.567&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_smr_567
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2047-7473&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2047-7473&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2047-7473&client=summon