6 CONCLUSION
This paper proposes a novel lightweight prospective
approach to establish and maintain traceability links,
which we call TCC (tracer-carrying code). TCC uses
a hash value as a tracer (global ID), and TCC automat-
ically embeds a TCC tracer into source code as a side-
effect of users’ copy&paste operation. To show the
feasibility of our TCC approach, we developed sev-
eral TCC prototype systems. We applied them to the
development of a simple iPhone application, which
shows a good result. As a future work, we would like
to implement other prototypes, for example, for IDEs
like Eclipse and Xcode, and for office software like
MS Excel and Powerpoint.
REFERENCES
J. Cleland-Huang, O. Gotel and A. Zisman (Eds.): Software
and Systems Traceability, ISBN: 978-1-4471-5819-6,
Springer, 2012.
J. Cleland-Huang, O. Gotel, J. H. Hayes, P. Mader and
A. Zisman: Software traceability: trends and future
directions, Proc. on Future of Software Engineering
(FOSE 2014). pp.55–69, ACM, 2014.
Programming languages–C: ISO/IEC 9899:1999.
T. Tahara, K. Gondow, S. Ohsuga: DRACULA: Detec-
tor of Data Races in Signals Handlers, 15th Asia-
Pacific Software Engineering Conf. (APSEC), pp.17–
24, 2008.
A. Marcus and J. I. Maletic: Recovering documentation-
to- source-code traceability links using latent semantic
indexing, ICSE’03, pp.125–135, 2003.
H. U. Asuncion, A. U. Asuncion and R. N. Taylor: Software
traceability with topic modeling, ICSE’10, pp.95–
104, 2010.
A. Dekhtyar, J. H. Hayes, S. Sundaram, A. Holbrook and
O. Dekhtyar: Technique integration for requirements
assessment, 15th IEEE Int. Requirements Engineering
Conf. (RE 2007), pp.141–150, 2007.
A. Delater and B. Paech: Analyzing the tracing of re-
quirements and source code during software develop-
ment, a research preview, 19th Int. Working Conf. on
Requirements Engineering: Foundation for Software
Quality (REFSQ 2013), pp.308–314, 2013.
J. H. Hayes, A. Dekhtyar and S. K. Sundaram: Advanc-
ing candidate link generation for requirements tracing:
the study of methods, IEEE Transactions on Software
Engineering, 32(1), pp.4–19, 2006.
M. Gethers, R. Oliveto, D. Poshyvanyk and A. De Lucia:
On integrating orthogonal information retrieval meth-
ods to improve traceability recovery, 27th IEEE Int.
Conf. on Software Maintenance (ICSM), pp.25–30,
2011.
J. Rubin and M. Chechik: A survey of feature location tech-
niques, in the book of Domain engineering: product
lines, languages, and conceptual models, ISBN-10:
3642366538, Springer, pp.29–58, 2013.
B. Dit, M. Revelle, M. Gethers, D. Poshyvanyk: Feature lo-
cation in source code: a taxonomy and survey, Journal
of software maintenance and evolution: research and
practice, 25(1), pp.53–95, 2011
B. Dit, M. Revelle and D. Poshyvanyk: Integrating in-
formation retrieval, execution and link analysis algo-
rithms to improve feature location in software. Empir-
ical Software Engineering, 18(2), pp.277–309, 2013.
T. Ishio, S. Hayashi, H. Kazato and T. Oshima: On the ef-
fectiveness of accuracy of automated feature location
technique, 20th Working Conf. on Reverse Engineer-
ing (WCRE), pp.381–390, 2013.
C. Neumuller and P. Grunbacher: Automating Software
Traceability in Very Small Companies: A Case Study
and Lessons Learne, 21st IEEE/ACM Int. Conf.
on Automated Software Engineering (ASE), pp.145–
156, 2006.
H. U. Asuncion, F. François, and R. N. Taylor: An end-
to-end industrial software traceability tool, Proc. 6th
joint meeting of the European Software Engineer-
ing Conf. and the ACM SIGSOFT Sympo. on The
Foundations of Software Engineering (ESEC-FSE),
pp.115–124, 2007.
F. A. C. Pinheiro and J. A. Goguen: An Object-Oriented
Tool for Tracing Requirements. IEEE Softw. 13(2),
pp.52–64, 1996.
K. Pohl: PRO-ART: enabling requirements pre-traceability,
Proc. 2nd Int. Conf. on Requirements Engineering,
pp.76–84, 1996.
N. Medvidovic, P. Grunbacher, A. Egyed and B. W. Boehm:
Bridging models across the software lifecycle, Jour-
nal of Systems and Software, 68(3), pp.199â
˘
A¸S-215,
2003.
M. Kersten and G. C. Murphy: Mylar: a degree-of-interest
model for IDEs: Proc. 4th Int. Conf. on Aspect-
Oriented Software Development (AOSD) pp.159–
168, 2005.
I. Altintas, O. Barney, E. Jaeger-Frank: Provenance collec-
tion support in the kepler scientific workflow system,
Int. Provenance and Annotation Workshop, pp.118–
132, 2006.
H. U. Asuncion and R. N. Taylor: Capturing custom link
semantics among heterogeneous artifacts and tools,
Proc. 2009 ICSE Workshop on Traceability in Emerg-
ing Forms of Software Engineering (TEFSE ’09),
pp.1–5, 2009.
T. N. Nguyen and E. V. Munson: The software concor-
dance: a new software document management envi-
ronment, SIGDOC’03: Proc. 21st Annual Int. Conf.
on Documentation, pp.198–205, 2003.
D. E. Knuth: Literate programming, Comput. J., 27(2),
pp.97–111, 1984.
Jalil, Z.: A Review of Digital Watermarking Techniques for
Text Documents. Int. Conf. Information and Multime-
dia Technology, ICIMT 2009, pp.230â
˘
A¸S-234, 2009.
G. Myles and C. S. Collberg:Detecting software theft via
whole program path birthmarks, Proc. 7th Int. Conf.
on Information Security, vol. 3225 of LNCS, pages
404–415. Springer, 2004.
App Programming Guide for iOS: Background Execu-
tion, https://developer.apple. com/library/content/
TCC (Tracer-Carrying Code): A Hash-based Pinpointable Traceability Tool using Copy&Paste
231