I. Ajzen and M. Fishbein, Attitude-behavior relations: A theoretical analysis and review of empirical research., Psychological Bulletin, vol.84, issue.5, p.888, 1977.
DOI : 10.1037/0033-2909.84.5.888

R. Baeza-yates, L. Calderón-benavides, and C. González-caro, The Intention Behind Web Queries, String processing and information retrieval, pp.98-109, 2006.
DOI : 10.1007/11880561_9

L. Bass, P. Clements, and R. Kazman, Software architecture in practice, 2nd edn. sei series in software engineering, 2003.

L. E. Baum, T. Petrie, G. Soules, and N. Weiss, A maximization technique occurring in the statistical analysis of probabilistic functions of markov chains. The annals of mathematical statistics, pp.164-171, 1970.

Y. Bengio, Learning deep architectures for ai. Foundations and trends, Machine Learning, pp.1-127, 2009.

A. W. Biermann and J. A. Feldman, On the synthesis of finite-state machines from samples of their behavior. Computers, IEEE Transactions on, vol.100, issue.6, pp.592-597, 1972.

J. E. Cook and A. L. Wolf, Discovering models of software processes from event-based data, ACM Transactions on Software Engineering and Methodology, vol.7, issue.3, pp.215-249, 1998.
DOI : 10.1145/287000.287001

A. Dardenne, A. Van-lamsweerde, and S. Fickas, Goal-directed requirements acquisition, Science of Computer Programming, vol.20, issue.1-2, pp.3-50, 1993.
DOI : 10.1016/0167-6423(93)90021-G

F. D. Davis, R. P. Bagozzi, and P. R. Warshaw, User Acceptance of Computer Technology: A Comparison of Two Theoretical Models, Management Science, vol.35, issue.8, pp.982-1003, 1989.
DOI : 10.1287/mnsc.35.8.982

. Eclipse, Filtered udc data, 2013.

. Eclipse, Usage data collector, 2013.

A. J. Enright, S. Van-dongen, and C. A. Ouzounis, An efficient algorithm for large-scale detection of protein families, Nucleic Acids Research, vol.30, issue.7, pp.1575-1584, 2002.
DOI : 10.1093/nar/30.7.1575

M. Fowler, Refactoring: Improving the Design of Existing Code, 1999.
DOI : 10.1007/3-540-45672-4_31

J. A. Hartigan and M. A. Wong, Algorithm AS 136: A K-Means Clustering Algorithm, Applied Statistics, vol.28, issue.1, pp.100-108, 1979.
DOI : 10.2307/2346830

J. Herbst and D. Karagiannis, Integrating machine learning and workflow management to support acquisition and adaptation of workflow models, Database and Expert Systems Applications Proc. 9th Intl WS. on, pp.745-752, 1998.

M. Jarke and K. Pohl, Establishing visions in context: towards a model of requirements processes, ICIS, pp.23-34, 1993.

B. H. Juang and L. R. Rabiner, Hidden Markov Models for Speech Recognition, Technometrics, vol.50, issue.4, pp.251-272, 1991.
DOI : 10.1007/978-3-642-66286-7

G. Khodabandelou-]-g, C. Khodabandelou, R. Hug, C. Deneckère, and . Salinesi, Contextual recommendations using intention mining on process traces Process mining versus intention mining, Proceedings of 7th Intl. Conf. on RCIS Enterprise, Business-Process and Information Systems Modeling, pp.466-480, 2013.

G. Khodabandelou, C. Hug, R. Deneckere, and C. Salinesi, Supervised intentional process models discovery using Hidden Markov models, IEEE 7th International Conference on Research Challenges in Information Science (RCIS), 2013.
DOI : 10.1109/RCIS.2013.6577711

URL : https://hal.archives-ouvertes.fr/hal-00803875

D. Lorenzoli, L. Mariani, and M. Pezzè, Automatic generation of software behavioral models, Proceedings of the 13th international conference on Software engineering , ICSE '08, pp.501-510, 2008.
DOI : 10.1145/1368088.1368157

E. Murphy-hill and A. Black, Breaking the barriers to successful refactoring, Proceedings of the 13th international conference on Software engineering , ICSE '08, pp.421-430, 2008.
DOI : 10.1145/1368088.1368146

K. Park, T. Lee, S. Jung, H. Lim, and S. Nam, Extracting Search Intentions from Web Search Logs, 2010 2nd International Conference on Information Technology Convergence and Services, pp.1-6, 2010.
DOI : 10.1109/ITCS.2010.5581286

L. Rabiner and B. Juang, An introduction to hidden Markov models, IEEE ASSP Magazine, vol.3, issue.1, pp.4-16, 1986.
DOI : 10.1109/MASSP.1986.1165342

C. Rolland, Modeling the requirements engineering process In Information Modelling and Knowledge Bases V: Principles and Formal Techniques: Results of the 3rd European-Japanese Seminar, pp.85-96, 1993.

C. Rolland, N. Prakash, and A. Benjamen, A Multi-Model View of Process Modelling, Requirements Engineering, vol.4, issue.4, pp.169-187, 1999.
DOI : 10.1007/s007660050018

URL : https://hal.archives-ouvertes.fr/hal-00707568

C. Rolland and C. Salinesi, Modeling Goals and Reasoning with Them, Engineering and Managing Software Requirements, pp.189-217, 2005.
DOI : 10.1007/3-540-28244-0_9

URL : https://hal.archives-ouvertes.fr/hal-00706380

A. Rozinat, A. A. De-medeiros, C. W. Günther, A. Weijters, and . Van-der-aalst, Towards an evaluation framework for process mining algorithms, 2007.

P. Soffer and C. Rolland, Combining Intention-Oriented and State-Based Process Modeling, Conceptual Modeling?ER 2005, pp.47-62, 2005.
DOI : 10.1007/11568322_4

M. Vakilian, N. Chen, S. Negara, B. A. Rajkumar, B. P. Bailey et al., Use, disuse, and misuse of automated refactorings, 2012 34th International Conference on Software Engineering (ICSE), pp.233-243, 2012.
DOI : 10.1109/ICSE.2012.6227190

W. Van-der-aalst, T. Weijters, and L. Maruster, Workflow mining: Discovering process models from event logs. Knowledge and Data Engineering, IEEE Transactions on, vol.16, issue.9, pp.1128-1142, 2004.

W. M. Van-der-aalst and W. Van-der-aalst, Process mining: discovery, conformance and enhancement of business processes, 2011.

Z. Xing and E. Stroulia, Refactoring Practice: How it is and How it Should be Supported - An Eclipse Case Study, 2006 22nd IEEE International Conference on Software Maintenance, pp.458-468, 2006.
DOI : 10.1109/ICSM.2006.52

E. Yu, Modelling strategic relationships for process reengineering, Social Modeling for Requirements Engineering, vol.11, 2011.