Abstract—Requirements traceability supports practitioners in reaching higher project maturity and better product quality. To gain this support, traces between various artifacts of the software development process are required. Depending on the number of existing artifacts, establishing traces can be a time-consuming and error-prone task. Additionally, the manual creation of traces frequently interrupts the software development process. In order to overcome those problems, practitioners are asking for techniques that support the creation of traces (see Grand Challenge: Ubiquitous (GC-U)). In this paper, we propose the usage of a graph clustering algorithm to support the retrieval of refinement traces. Refinement traces are traces that exist ...
© Springer International Publishing AG 2017. In recent years, a multitude of techniques has been pro...
Scripts and data sets used in research for An Approach for Traceability Recovery between Bug Reports...
International audienceProcess mining techniques use event logs containing real process executions in...
Software traceability is a sought-after, yet often elusive qual- ity in large software-intensive sys...
Abstract—Modern requirements tracing tools employ infor-mation retrieval methods to automatically ge...
Software traceability establishes a network of connections between diverse artifacts such as require...
Process mining refers to the extraction of process models from event logs. Real-life processes tend ...
Given the complexity of real-life event logs, several trace clustering techniques have been proposed...
Traceability among requirements artifacts (and beyond, in certain cases all the way to actual implem...
As digital objects become increasingly important in people's lives, people may need to understand th...
[Context and Motivation] Requirements Traceability (RT) aims to follow and describe the lifecycle of...
Abstract. Process mining refers to the extraction of process models from event logs. Real-life proce...
Abstract: Traceability of various artifacts created during the development of software systems plays...
The goal of process discovery is to visualize event log data as a process model. In reality, however...
Successful development of software systems involves efficient navigation among software artifacts. H...
© Springer International Publishing AG 2017. In recent years, a multitude of techniques has been pro...
Scripts and data sets used in research for An Approach for Traceability Recovery between Bug Reports...
International audienceProcess mining techniques use event logs containing real process executions in...
Software traceability is a sought-after, yet often elusive qual- ity in large software-intensive sys...
Abstract—Modern requirements tracing tools employ infor-mation retrieval methods to automatically ge...
Software traceability establishes a network of connections between diverse artifacts such as require...
Process mining refers to the extraction of process models from event logs. Real-life processes tend ...
Given the complexity of real-life event logs, several trace clustering techniques have been proposed...
Traceability among requirements artifacts (and beyond, in certain cases all the way to actual implem...
As digital objects become increasingly important in people's lives, people may need to understand th...
[Context and Motivation] Requirements Traceability (RT) aims to follow and describe the lifecycle of...
Abstract. Process mining refers to the extraction of process models from event logs. Real-life proce...
Abstract: Traceability of various artifacts created during the development of software systems plays...
The goal of process discovery is to visualize event log data as a process model. In reality, however...
Successful development of software systems involves efficient navigation among software artifacts. H...
© Springer International Publishing AG 2017. In recent years, a multitude of techniques has been pro...
Scripts and data sets used in research for An Approach for Traceability Recovery between Bug Reports...
International audienceProcess mining techniques use event logs containing real process executions in...