{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T05:23:09Z","timestamp":1737091389644,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540720348"},{"type":"electronic","value":"9783540720355"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72035-5_33","type":"book-chapter","created":{"date-parts":[[2007,6,5]],"date-time":"2007-06-05T16:02:15Z","timestamp":1181059335000},"page":"424-437","source":"Crossref","is-referenced-by-count":6,"title":["Supporting Use-Case Reviews"],"prefix":"10.1007","author":[{"given":"Alicja","family":"Ciemniewska","sequence":"first","affiliation":[]},{"given":"Jakub","family":"Jurkiewicz","sequence":"additional","affiliation":[]},{"given":"\u0141ukasz","family":"Olek","sequence":"additional","affiliation":[]},{"given":"Jerzy","family":"Nawrocki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","volume-title":"Patterns for Effective Use Cases","author":"S. Adolph","year":"2002","unstructured":"Adolph, S., et al.: Patterns for Effective Use Cases. Addison-Wesley, Reading (2002)"},{"key":"33_CR2","unstructured":"Klein, D., Manning, C.: Fast Exact Inference with a Factored Model for Natural Language Parsing. In: Advances in Neural Information Processing Systems, 15th edn. (2003)"},{"key":"33_CR3","first-page":"36","volume-title":"Automated Software Engineering","author":"V. Ambriola","year":"1997","unstructured":"Ambriola, V., Gervasi, V.: Processing natural language requirements. In: Automated Software Engineering, pp. 36\u201345. IEEE Computer Society Press, Los Alamitos (1997), citeseer.ist.psu.edu\/ambriola97processing.html"},{"key":"33_CR4","volume-title":"Writing Effective Use Cases","author":"A. Cockburn","year":"2001","unstructured":"Cockburn, A.: Writing Effective Use Cases. Addison-Wesley, Reading (2001)"},{"key":"33_CR5","volume-title":"Software for use: a practical guide to the models and methods of usage-centered design","author":"L.L. Constantine","year":"1999","unstructured":"Constantine, L.L., Lockwood, L.A.D.: Software for use: a practical guide to the models and methods of usage-centered design. ACM Press, New York (1999)"},{"key":"33_CR6","unstructured":"de Marneffe, M.-C., MacCartney, B., Manning, C.D.: Generating typed dependency parses from phrase structure parses. In: LREC (2006)"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Fabbrini, F., et al.: The linguistic approach to the natural language requirements quality: benefit of the use of an automatic tool. In: Proceedings of the 26th Annual NASA Goddard Software Engineering Workshop, pp. 97\u2013105 (2001)","DOI":"10.1109\/SEW.2001.992662"},{"key":"33_CR8","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/ICRE.2002.1048518","volume-title":"RE \u201902: Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering","author":"A. Fantechi","year":"2002","unstructured":"Fantechi, A., et al.: Application of linguistic techniques for use case analysis. In: RE \u201902: Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering, Washington, DC, USA, pp. 157\u2013164. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"33_CR9","volume-title":"Refactoring: Improving the Design of Existing Code","author":"M. Fowler","year":"1999","unstructured":"Fowler, M., et al.: Refactoring: Improving the Design of Existing Code. Addison-Wesley, Reading (1999)"},{"issue":"4","key":"33_CR10","first-page":"227","volume":"27","author":"Z. Huzar","year":"2002","unstructured":"Huzar, Z., \u0141abuzek, M.: A tool assisting creation of business models. Foundations of Computing and Decision Sciences\u00a027(4), 227\u2013238 (2002)","journal-title":"Foundations of Computing and Decision Sciences"},{"key":"33_CR11","unstructured":"IEEE. Ieee standard for software reviews (ieee std 1028-1997) (1997)"},{"key":"33_CR12","unstructured":"Jacobson, I.: Use cases - yesterday, today, and tomorrow. Technical report, Rational Software (2002)"},{"key":"33_CR13","volume-title":"Object-Oriented Software Engineering: A Use Case Driven Approach","author":"I. Jacobson","year":"2004","unstructured":"Jacobson, I.: Object-Oriented Software Engineering: A Use Case Driven Approach. Addison-Wesley, Reading (2004)"},{"key":"33_CR14","unstructured":"Kamsties, E., Peach, B.: Taming ambiguity in natural language requirements. In: ICSSEA, Paris (December 2000)"},{"issue":"11","key":"33_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/163359.163366","volume":"36","author":"J.C. Knight","year":"1993","unstructured":"Knight, J.C., Myers, E.A.: An improved inspection technique. Commun. ACM\u00a036(11), 51\u201361 (1993), doi:10.1145\/163359.163366","journal-title":"Commun. ACM"},{"key":"33_CR16","volume-title":"The rational unified process made easy: a practitioner\u2019s guide to the RUP","author":"P. Kroll","year":"2003","unstructured":"Kroll, P., Kruchten, P.: The rational unified process made easy: a practitioner\u2019s guide to the RUP. Addison-Wesley Longman Publishing, Boston (2003)"},{"key":"33_CR17","volume-title":"Safety Critical Systems","author":"B. Macias","year":"1993","unstructured":"Macias, B., Pulman, S.G.: Natural language processing for requirement specifications. In: Safety Critical Systems, Chapman and Hall, Boca Raton (1993)"},{"key":"33_CR18","unstructured":"Mich, L., Garigliano, R.: Ambiguity measures in requirement engineering. In: Int. Conf. On Software Theory and Practice, Beijing, China (August 2000)"},{"key":"33_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/11751113_19","volume-title":"Rapid Integration of Software Engineering Techniques","author":"J. Nawrocki","year":"2006","unstructured":"Nawrocki, J., et al.: Balancing agility and discipline with xprince. In: Guelfi, N., Savidis, A. (eds.) RISE 2005. LNCS, vol.\u00a03943, pp. 266\u2013277. Springer, Heidelberg (2006)"},{"key":"33_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1007\/11499053_34","volume-title":"Extreme Programming and Agile Processes in Software Engineering","author":"J. Nawrocki","year":"2005","unstructured":"Nawrocki, J., Olek, \u0141.: Uc workbench - a tool for writing use cases. In: Baumeister, H., Marchesi, M., Holcombe, M. (eds.) XP 2005. LNCS, vol.\u00a03556, pp. 230\u2013234. Springer, Heidelberg (2005)"},{"key":"33_CR21","series-title":"Frontiers in Artificial Intelligence and Applications","first-page":"319","volume-title":"Software Engineering: Evolution and Emerging Technologies","author":"J. Nawrocki","year":"2005","unstructured":"Nawrocki, J., Olek, \u0141.: Use-cases engineering with uc workbench. In: Zieli\u0144ski, K., Szmuc, T. (eds.) Software Engineering: Evolution and Emerging Technologies. Frontiers in Artificial Intelligence and Applications, vol.\u00a0130, pp. 319\u2013329. IOS Press, Amsterdam (Oct. 2005)"},{"key":"33_CR22","volume-title":"Software Engineering - A Practitioners Approach","author":"R. Pressman","year":"2001","unstructured":"Pressman, R.: Software Engineering - A Practitioners Approach. McGraw-Hill, New York (2001)"},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Wilson, W.M., Rosenberg, L.H., Hyatt, L.E.: Automated analysis of requirement specifications. In: Proceedings of the 1997 (19th) International Conference on Software Engineering, pp. 161\u2013171 (1997)","DOI":"10.1145\/253228.253258"},{"issue":"1-2","key":"33_CR24","first-page":"89","volume":"29","author":"M. \u0141abuzek","year":"2004","unstructured":"\u0141abuzek, M.: Modelling the meaning of descriptions of reality to improve consistency between them and business models. Foundations of Computing and Decision Sciences\u00a029(1-2), 89\u2013101 (2004)","journal-title":"Foundations of Computing and Decision Sciences"}],"container-title":["Lecture Notes in Computer Science","Business Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72035-5_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T23:45:57Z","timestamp":1737071157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72035-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540720348","9783540720355"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72035-5_33","relation":{},"subject":[]}}