{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:37:48Z","timestamp":1767919068752,"version":"3.49.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030353322","type":"print"},{"value":"9783030353339","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35333-9_11","type":"book-chapter","created":{"date-parts":[[2019,11,18]],"date-time":"2019-11-18T00:01:29Z","timestamp":1574035289000},"page":"145-160","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["When NFR Templates Pay Back? A Study on Evolution of Catalog of NFR Templates"],"prefix":"10.1007","author":[{"given":"Sylwia","family":"Kopczy\u0144ska","sequence":"first","affiliation":[]},{"given":"Jerzy","family":"Nawrocki","sequence":"additional","affiliation":[]},{"given":"Miros\u0142aw","family":"Ochodek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,18]]},"reference":[{"key":"11_CR1","unstructured":"Website of NoRTs. http:\/\/norts.cs.put.poznan.pl"},{"key":"11_CR2","unstructured":"Adolph, S., Bramble, P., Cockburn, A., Pols, A.: Patterns for Effective Use Cases. Addison-Wesley, Boston (2002)"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.infsof.2019.01.009","volume":"110","author":"Wasim Alsaqaf","year":"2019","unstructured":"Alsaqaf, W., Daneva, M., Wieringa, R.: Quality requirements challenges in the context of large-scale distributed agile: an empirical study. Inf. Softw. Technol. 110, 39\u201355 (2019)","journal-title":"Information and Software Technology"},{"key":"11_CR4","unstructured":"Berry, D.M., Kamsties, E., Krieger, M.M.: From Contract Drafting to Software Specification: Linguistic Sources of Ambiguity. A Handbook. Ver 1.0. https:\/\/cs.uwaterloo.ca\/~dberry\/handbook\/ambiguityHandbook.pdf . Accessed 07 Sept 2015"},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/52.506460","volume":"13","author":"B Boehm","year":"1996","unstructured":"Boehm, B., In, H.: Identifying quality-requirement conflicts. IEEE Softw. 13(2), 25\u201335 (1996)","journal-title":"IEEE Softw."},{"issue":"1","key":"11_CR6","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1590\/S0104-65001999000200003","volume":"6","author":"KK Breitman","year":"1999","unstructured":"Breitman, K.K., Leite, J.C.S., Finkelstein, A.: The world sa stage: a survey on requirements engineering using a real-life case study. J. Braz. Comput. Soc. 6(1), 13\u201337 (1999)","journal-title":"J. Braz. Comput. Soc."},{"key":"11_CR7","unstructured":"Cleland-Huang, J., Mazrouee, S., Liguo, H., Port, D.: Open-Science teraPROMISE repository. http:\/\/openscience.us\/repo\/requirements\/other-requirements\/nfr . (2010). Accessed 26 June 2017"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Denger, C., Berry, D.M., Kamsties, E.: Higher quality requirements specifications through natural language patterns. In: IEEE International Conference on Software: Science, Technology and Engineering, pp. 80\u201390 (2003)","DOI":"10.1109\/SWSTE.2003.1245428"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Doerr, J., Paech, B., Koehler, M.: Requirements engineering process improvement based on an information model. In: 2004 Proceedings of 12th IEEE International Requirements Engineering Conference, pp. 70\u201379. IEEE (2004)","DOI":"10.1109\/ICRE.2004.1335665"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Eckhardt, J., Vogelsang, A., Femmer, H., Mager, P.: Challenging incompleteness of performance requirements by sentence patterns. In: International Requirements Engineering Conference (RE), pp. 46\u201355. IEEE (2016)","DOI":"10.1109\/RE.2016.24"},{"key":"11_CR11","first-page":"1","volume-title":"Competitive Engineering","author":"Tom Gilb","year":"2005","unstructured":"Gilb, T.: Competitive Engineering: A Handbook for Systems and Software Engineering Management Using Planguage. Butterworth-Heinemann, Oxford (2005)"},{"key":"11_CR12","unstructured":"Hull, E., Jackson, K., Dick, J.: Requirements Engineering (2005)"},{"key":"11_CR13","unstructured":"ISO\/IEC: ISO\/IEC 25010 - Systems and software engineering - Systems and software Quality Requirements and Evaluation (SQuaRE) - System and software quality models. Technical report, ISO\/IEC (2010)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Kopczynska, S., Nawrocki, J.: Using non-functional requirements templates for elicitation: a case study. In: IEEE International Workshop Requirements Patterns (2014)","DOI":"10.1109\/RePa.2014.6894844"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.infsof.2018.06.009","volume":"103","author":"Sylwia Kopczy\u0144ska","year":"2018","unstructured":"Kopczynska, S., Nawrocki, J., Ochodek, M.: An empirical study on catalog of non-functional requirement templates: Usefulness Maintenance Issues. Inf. Softw. Technol. 103, 75\u201391 (2018)","journal-title":"Information and Software Technology"},{"key":"11_CR16","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-030-26574-8_11","volume-title":"Integrating Research and Practice in Software Engineering","author":"S Kopczy\u0144ska","year":"2020","unstructured":"Kopczy\u0144ska, S., Ochodek, M., Nawrocki, J.: On importance of non-functional requirements in agile software projects\u2014a survey. In: Jarzabek, S., Poniszewska-Mara\u0144da, A., Madeyski, L. (eds.) Integrating Research and Practice in Software Engineering. SCI, vol. 851, pp. 145\u2013158. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-26574-8_11"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Lam, W., McDermid, T., Vickers, A.: Ten steps towards systematic requirements reuse. In: Intenational Symposium on Requirements Engineering, pp. 6\u201315. IEEE (1997)","DOI":"10.1007\/BF02813029"},{"issue":"5","key":"11_CR18","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/52.232400","volume":"10","author":"DR Lindstrom","year":"1993","unstructured":"Lindstrom, D.R.: Five ways to destroy a development project. IEEE Softw. 10(5), 55\u201358 (1993)","journal-title":"IEEE Softw."},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Mavin, A., Wilkinson, P.: Big Ears (The Return of \u201cEasy Approach to Requirements Engineering\u201d). In: Requirements Engineering Conference, pp. 277\u2013282 (2010)","DOI":"10.1109\/RE.2010.39"},{"issue":"3","key":"11_CR20","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MS.1997.589224","volume":"14","author":"B Nuseibeh","year":"1997","unstructured":"Nuseibeh, B.: Ariane 5: who dunnit? IEEE Softw. 14(3), 15\u201316 (1997)","journal-title":"IEEE Softw."},{"issue":"6","key":"11_CR21","doi-asserted-by":"publisher","first-page":"2719","DOI":"10.1007\/s10664-016-9485-x","volume":"22","author":"Cristina Palomares","year":"2016","unstructured":"Palomares, C., Quer, C., Franch, X.: Requirements reuse and requirement patterns: a state of the practice survey. Empirical Softw. Eng. 22, 1\u201344 (2015)","journal-title":"Empirical Software Engineering"},{"key":"11_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12578-2","volume-title":"Requirements Engineering: Fundamentals, Principles, and Techniques","author":"K Pohl","year":"2010","unstructured":"Pohl, K.: Requirements Engineering: Fundamentals, Principles, and Techniques. Springer, Heidelberg (2010)"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Pohl, K., Rupp, C.: Requirements Engineering Fundamentals. Rocky Nook, San Rafael (2011)","DOI":"10.1007\/978-3-642-12578-2_20"},{"key":"11_CR24","unstructured":"R Documentation: Box Plots. www.rdocumentation.org\/packages\/graphics\/versions\/3.5.1\/topics\/boxplot . Accessed 28th Sept 2018"},{"issue":"2","key":"11_CR25","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MS.2008.48","volume":"25","author":"B Regnell","year":"2008","unstructured":"Regnell, B., Svensson, R.B., Olsson, T.: Supporting roadmapping of quality requirements. IEEE Softw. 25(2), 42\u201347 (2008)","journal-title":"IEEE Softw."},{"key":"11_CR26","unstructured":"Renault, S., M\u00e9ndez Bonilla, \u00d3., Franch Guti\u00e9rrez, J., Quer Bosor, M.C., et al.: A pattern-based method for building requirements documents in call-for-tender processes. IJCSA 6(5), 175\u2013202 (2009)"},{"issue":"4","key":"11_CR27","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1007\/s10664-016-9481-1","volume":"22","author":"Maria Riaz","year":"2016","unstructured":"Riaz, M., et al.: Identifying the implied: findings from three differentiated replications on the use of security requirements templates. Empirical Softw. Eng. 22, 2127\u20132178 (2016)","journal-title":"Empirical Software Engineering"},{"key":"11_CR28","unstructured":"Robertson, S., Robertson, J.: Mastering the Requirements Process: Getting Requirements Right, 3rd edn. Addison-Wesley, Boston (2012)"},{"key":"11_CR29","unstructured":"Sommerville, I., Sawyer, P.: Requirements Engineering: A Good Practice Guide. Wiley, Hoboken (1997)"},{"key":"11_CR30","unstructured":"Withall, S.: Software Requirement Patterns (Developer Best Practices). Microsoft Press, Redmond (2007)"},{"key":"11_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in Software Engineering","author":"Claes Wohlin","year":"2012","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29044-2"}],"container-title":["Lecture Notes in Computer Science","Product-Focused Software Process Improvement"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35333-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,5]],"date-time":"2022-10-05T21:17:31Z","timestamp":1665004651000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35333-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030353322","9783030353339"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35333-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PROFES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Product-Focused Software Process Improvement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"profes2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/profes2019.upc.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The 11 short papers were selected from 30 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}