{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T16:10:07Z","timestamp":1746375007885,"version":"3.40.4"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319119571"},{"type":"electronic","value":"9783319119588"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11958-8_20","type":"book-chapter","created":{"date-parts":[[2014,9,11]],"date-time":"2014-09-11T11:24:40Z","timestamp":1410434680000},"page":"248-259","source":"Crossref","is-referenced-by-count":3,"title":["Detecting Missing Requirements in Conceptual Models"],"prefix":"10.1007","author":[{"given":"Zheying","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Peter","family":"Thanisch","sequence":"additional","affiliation":[]},{"given":"Jyrki","family":"Nummenmaa","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Wiegers, K.E.: Software Requirements, 2nd edn. Microsoft Press (2003)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Jarke, M., Loucopoulos, P., Lyytinen, K., Mylopoulos, J., Robinson, W.: The brave new world of design requirements. Information Systems\u00a036(7) (2011)","DOI":"10.1016\/j.is.2011.04.003"},{"key":"20_CR3","unstructured":"IEEE: In: IEEE Recommended Practice for Software Requirements Specifications. Technical report, IEEE Std 830-1998"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Mavin, A., Wilkinson, P., Harwood, A., Novak, M.: EARS(Easy Approach to Requirements Syntax). In: Proceedings of the 17th IEEE International Requirements Engineering Conference. IEEE computer society (2009)","DOI":"10.1109\/RE.2009.9"},{"issue":"4","key":"20_CR5","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1049\/iet-sen.2010.0072","volume":"6","author":"J. Guo","year":"2012","unstructured":"Guo, J., Wang, Y., Zhang, Z., Nummenmaa, J., Niu, N.: Model-driven approach to developing domain functional requirements in software product lines. IET Software\u00a06(4), 391\u2013401 (2012)","journal-title":"IET Software"},{"key":"20_CR6","unstructured":"Lamsweerde, A.V.: Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley (2009)"},{"key":"20_CR7","first-page":"9","volume":"12","author":"T. Gilb","year":"1997","unstructured":"Gilb, T.: Quantifying the Qualitative: How to Avoid Vague Requirements by Clear Specification Language. Requirenautics Quarterly\u00a012, 9\u201313 (1997)","journal-title":"Requirenautics Quarterly"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Lee, S., Rine, D.: Missing Requirements and Relationship Discovery through Proxy Viewpoints Model. In: Proceeding of the 19th Annual ACM Symposium on Applied Computing, pp. 1513\u20131518 (2004)","DOI":"10.1145\/967900.968203"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Salay, R., Chechik, M., Horko, J.: Managing Requirements Uncertainty with Partial Models. In: The 20th IEEE International Conf. on Requirements Engineering, pp. 1\u201310 (2012)","DOI":"10.1109\/RE.2012.6345804"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Yang, H., Roeck, A.D., Gervasi, V., Willis, A., Nuseibeh, B.: Speculative requirements: Automatic detection of uncertainty in natural language requirements. In: the 20th IEEE International Conference on Requirements Engineering, pp. 11\u201320 (2012)","DOI":"10.1109\/RE.2012.6345795"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Alistair, S., Sawyer, P.: Requirements elicitation: Towards the unknown unknowns. In: The 20th IEEE International Conference on Requirements Engineering, pp. 92\u2013104 (2013)","DOI":"10.1109\/RE.2013.6636709"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Chen, P. P.: The Entity-Relationship Model - Toward a Unified View of Data. ACM Trans. Database Syst., 9\u201336 (1976)","DOI":"10.1145\/320434.320440"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/978-3-642-34002-4_40","volume-title":"Conceptual Modeling","author":"R. Nascimento Fidalgo Do","year":"2012","unstructured":"Do Nascimento Fidalgo, R., De Souza, E.M., Espa\u00f1a, S., De Castro, J.B., Pastor, O.: EERMM: A Metamodel for the Enhanced Entity-Relationship Model. In: Atzeni, P., Cheung, D., Ram, S. (eds.) ER 2012 Main Conference 2012. LNCS, vol.\u00a07532, pp. 515\u2013524. Springer, Heidelberg (2012)"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Gomory, R.: The Known, the Unknown and the Unknowable. Scientific American, p. 120 (June 1995)","DOI":"10.1038\/scientificamerican0695-120"},{"key":"20_CR15","unstructured":"Kontoya, G.: SommervilleI.: Requirements Engineering: Processes and Techniques. Wiley (1998)"},{"key":"20_CR16","unstructured":"Gacitua, R., Ma, L., Nuseibeh, B., Piwek, P., Roeck, A.N., De Rouncefield, M., Sawyer, P., Willis, A., Yang, H.: Making Tacit Requirements Explicit. In: Proc. 2nd International Workshop on Managing Requirements Knowledge (MARK 2009), Atlanta, pp. 85\u201388 (2009)"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/3-540-56777-1_15","volume-title":"Advanced Information Systems Engineering","author":"K. Pohl","year":"1993","unstructured":"Pohl, K.: The Three Dimensions of Requirements Engineering. In: Rolland, C., Cauvet, C., Bodart, F. (eds.) CAiSE 1993. LNCS, vol.\u00a0685, pp. 275\u2013292. Springer, Heidelberg (1993)"},{"issue":"7","key":"20_CR18","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.sysarc.2003.09.006","volume":"50","author":"W.M.N. Wan-Kadir","year":"2004","unstructured":"Wan-Kadir, W.M.N., Loucopoulos, P.: Relating evolving business rules to software design. Journal of Systems Architecture\u00a050(7), 367\u2013382 (2004)","journal-title":"Journal of Systems Architecture"},{"issue":"1","key":"20_CR19","doi-asserted-by":"publisher","first-page":"41","DOI":"10.4018\/jdm.2008010103","volume":"19","author":"P. Loucopoulos","year":"2008","unstructured":"Loucopoulos, P., Wan, K., Wan, M.N.: BROOD: business rules-driven object oriented design. Journal of Database Management\u00a019(1), 41\u201373 (2008)","journal-title":"Journal of Database Management"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Cheng, B.H.C., Atlee, J.M.: Research Directions in Requirements Engineering. In: Future of Software Engineering (FOSE 2007). IEEE (2007)","DOI":"10.1109\/FOSE.2007.17"},{"key":"20_CR21","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-41947-8_15","volume-title":"Information and Software Technologies","author":"P. Thanisch","year":"2013","unstructured":"Thanisch, P., Niemi, T., Nummenmaa, J., Zhang, Z., Niinim\u00e4ki, M., Saariluoma, P.: Incompleteness in Conceptual Data Modelling. In: Skersys, T., Butleris, R., Butkiene, R. (eds.) ICIST 2013. CCIS, vol.\u00a0403, pp. 159\u2013172. Springer, Heidelberg (2013)"},{"issue":"2","key":"20_CR22","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s007660170009","volume":"6","author":"Z. Zhang","year":"2001","unstructured":"Zhang, Z., Lyytinen, K.: A Framework for Component Reuse in a Metamodelling based Software Development. Requirements Engineering Journal\u00a06(2), 116\u2013131 (2001)","journal-title":"Requirements Engineering Journal"},{"key":"20_CR23","unstructured":"Gonzalez-Perez, C., Henderson-Sellers, B.: Metamodelling for Software Engineering. John Wiley & Sons, Ltd. (2008)"},{"key":"20_CR24","unstructured":"Gottesdiener, E.: Discovering an Organization\u2019s Knowledge: Facilitating Business Rules Workshops. In: Proceedings of Annual Meeting of the International Association of Facilitators, Williamsburg, Virginia (1999)"}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11958-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T15:48:01Z","timestamp":1746373681000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11958-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319119571","9783319119588"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11958-8_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}