{"id":"https://openalex.org/W3014850002","doi":"https://doi.org/10.1109/saner48275.2020.9054838","title":"Leveraging Machine Learning for Software Redocumentation","display_name":"Leveraging Machine Learning for Software Redocumentation","publication_year":2020,"publication_date":"2020-02-01","ids":{"openalex":"https://openalex.org/W3014850002","doi":"https://doi.org/10.1109/saner48275.2020.9054838","mag":"3014850002"},"language":"en","primary_location":{"id":"doi:10.1109/saner48275.2020.9054838","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saner48275.2020.9054838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018441801","display_name":"Verena Geist","orcid":"https://orcid.org/0000-0002-3729-1265"},"institutions":[{"id":"https://openalex.org/I4210126338","display_name":"Software Competence Center Hagenberg (Austria)","ror":"https://ror.org/02ks3nr96","country_code":"AT","type":"company","lineage":["https://openalex.org/I4210126338"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Verena Geist","raw_affiliation_strings":["Software Analytics and Evolution Software, Competence Center Hagenberg GmbH, Hagenberg, Austria"],"affiliations":[{"raw_affiliation_string":"Software Analytics and Evolution Software, Competence Center Hagenberg GmbH, Hagenberg, Austria","institution_ids":["https://openalex.org/I4210126338"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102812665","display_name":"M. Moser","orcid":"https://orcid.org/0000-0003-3367-3546"},"institutions":[{"id":"https://openalex.org/I4210126338","display_name":"Software Competence Center Hagenberg (Austria)","ror":"https://ror.org/02ks3nr96","country_code":"AT","type":"company","lineage":["https://openalex.org/I4210126338"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Michael Moser","raw_affiliation_strings":["Software Analytics and Evolution Software, Competence Center Hagenberg GmbH, Hagenberg, Austria"],"affiliations":[{"raw_affiliation_string":"Software Analytics and Evolution Software, Competence Center Hagenberg GmbH, Hagenberg, Austria","institution_ids":["https://openalex.org/I4210126338"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103053531","display_name":"Josef Pichler","orcid":"https://orcid.org/0009-0007-6908-0474"},"institutions":[{"id":"https://openalex.org/I4210136249","display_name":"University of Applied Sciences Upper Austria","ror":"https://ror.org/03jqp6d56","country_code":"AT","type":"education","lineage":["https://openalex.org/I4210136249"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Josef Pichler","raw_affiliation_strings":["Department of Software Engineering, University of Applied Sciences Upper Austria, Hagenberg, Austria"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, University of Applied Sciences Upper Austria, Hagenberg, Austria","institution_ids":["https://openalex.org/I4210136249"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087420196","display_name":"Stefanie Beyer","orcid":null},"institutions":[{"id":"https://openalex.org/I4210166741","display_name":"University of Klagenfurt","ror":"https://ror.org/05q9m0937","country_code":"AT","type":"education","lineage":["https://openalex.org/I4210166741"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Stefanie Beyer","raw_affiliation_strings":["Software Engineering Research Group, Alpen-Adria-Universit\u00e4t Klagenfurt, Klagenfurt, Austria"],"affiliations":[{"raw_affiliation_string":"Software Engineering Research Group, Alpen-Adria-Universit\u00e4t Klagenfurt, Klagenfurt, Austria","institution_ids":["https://openalex.org/I4210166741"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052107936","display_name":"Martin Pinzger","orcid":"https://orcid.org/0000-0002-5536-3859"},"institutions":[{"id":"https://openalex.org/I4210166741","display_name":"University of Klagenfurt","ror":"https://ror.org/05q9m0937","country_code":"AT","type":"education","lineage":["https://openalex.org/I4210166741"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Martin Pinzger","raw_affiliation_strings":["Software Engineering Research Group, Alpen-Adria-Universit\u00e4t Klagenfurt, Klagenfurt, Austria"],"affiliations":[{"raw_affiliation_string":"Software Engineering Research Group, Alpen-Adria-Universit\u00e4t Klagenfurt, Klagenfurt, Austria","institution_ids":["https://openalex.org/I4210166741"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5018441801"],"corresponding_institution_ids":["https://openalex.org/I4210126338"],"apc_list":null,"apc_paid":null,"fwci":2.5035,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.91382136,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.878950297832489},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.6457314491271973},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6339172124862671},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6182788610458374},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5554317235946655},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5092567205429077},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.48771652579307556},{"id":"https://openalex.org/keywords/documentation","display_name":"Documentation","score":0.4851892590522766},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.4842647910118103},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.4809081554412842},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.47486019134521484},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45956140756607056},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.45096638798713684},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.36667299270629883},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.3461472988128662},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10628482699394226}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.878950297832489},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.6457314491271973},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6339172124862671},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6182788610458374},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5554317235946655},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5092567205429077},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.48771652579307556},{"id":"https://openalex.org/C56666940","wikidata":"https://www.wikidata.org/wiki/Q788790","display_name":"Documentation","level":2,"score":0.4851892590522766},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.4842647910118103},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.4809081554412842},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.47486019134521484},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45956140756607056},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.45096638798713684},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.36667299270629883},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3461472988128662},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10628482699394226},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/saner48275.2020.9054838","is_oa":false,"landing_page_url":"https://doi.org/10.1109/saner48275.2020.9054838","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W142212369","https://openalex.org/W1480376833","https://openalex.org/W1532325895","https://openalex.org/W1553894716","https://openalex.org/W1901269435","https://openalex.org/W2070111972","https://openalex.org/W2071929645","https://openalex.org/W2074627850","https://openalex.org/W2101512909","https://openalex.org/W2118020653","https://openalex.org/W2129858079","https://openalex.org/W2597819689","https://openalex.org/W2941068928","https://openalex.org/W2945876109","https://openalex.org/W6763053362"],"related_works":["https://openalex.org/W1791687657","https://openalex.org/W4211053310","https://openalex.org/W3196568648","https://openalex.org/W2901304563","https://openalex.org/W4313330935","https://openalex.org/W2772076593","https://openalex.org/W2079150660","https://openalex.org/W4385489206","https://openalex.org/W1599145671","https://openalex.org/W1984574506"],"abstract_inverted_index":{"Source":[0],"code":[1,97],"comments":[2,32,88],"contain":[3],"key":[4],"information":[5,93],"about":[6],"the":[7,27,34,56,95,104,120,135],"underlying":[8],"software":[9,76],"system.":[10],"Many":[11],"redocumentation":[12],"approaches,":[13],"however,":[14],"cannot":[15],"exploit":[16],"this":[17],"valuable":[18,92],"source":[19,96],"of":[20,58,74,139],"information.":[21],"This":[22],"is":[23,61],"mainly":[24],"due":[25],"to":[26,86,113],"fact":[28],"that":[29,131],"not":[30],"all":[31],"have":[33],"same":[35,105],"goals":[36],"and":[37,40,64,66,72,89,118,141],"target":[38],"audience":[39],"can":[41],"therefore":[42],"only":[43],"be":[44,84],"used":[45],"selectively":[46],"for":[47],"redocumentation.":[48],"Performing":[49],"a":[50,114,127],"required":[51],"classification":[52],"manually,":[53],"e.g.":[54],"in":[55,137],"form":[57],"heuristic":[59,124],"rules,":[60],"usually":[62],"time-consuming":[63],"error-prone":[65],"strongly":[67],"dependent":[68],"on":[69],"programming":[70],"languages":[71],"guidelines":[73],"concrete":[75],"systems.":[77],"By":[78],"leveraging":[79],"machine":[80,110,132],"learning,":[81],"it":[82],"should":[83],"possible":[85],"classify":[87],"thus":[90],"transfer":[91],"from":[94],"into":[98],"documentation":[99],"with":[100,122],"less":[101,142],"effort":[102],"but":[103],"quality.":[106],"We":[107],"applied":[108],"different":[109],"learning":[111,133],"techniques":[112],"COBOL":[115],"legacy":[116],"system":[117],"compared":[119],"results":[121],"industry-strength":[123],"classification.":[125],"As":[126],"result,":[128],"we":[129],"found":[130],"outperforms":[134],"heuristics":[136],"number":[138],"errors":[140],"effort.":[143]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
