{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T23:58:27Z","timestamp":1740095907154,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642020490"},{"type":"electronic","value":"9783642020506"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02050-6_7","type":"book-chapter","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T23:22:21Z","timestamp":1244244141000},"page":"74-88","source":"Crossref","is-referenced-by-count":6,"title":["Early Identification of Problem Interactions: A Tool-Supported Approach"],"prefix":"10.1007","author":[{"given":"Thein Than","family":"Tun","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yijun","family":"Yu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robin","family":"Laney","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bashar","family":"Nuseibeh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"8","key":"7_CR1","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/TSE.2003.1223642","volume":"29","author":"D.L. Parnas","year":"2003","unstructured":"Parnas, D.L., Lawford, M.: The role of inspection in software quality assurance. IEEE Trans. Softw. Eng.\u00a029(8), 674\u2013676 (2003)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"7_CR2","unstructured":"Jackson, M.: Problem Frames: Analyzing and structuring software development problems. ACM Press & Addison Wesley (2001)"},{"issue":"2","key":"7_CR3","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1145\/857076.857079","volume":"35","author":"W.N. Robinson","year":"2003","unstructured":"Robinson, W.N., Pawlowski, S.D., Volkov, V.: Requirements interaction management. ACM Computing Surveys\u00a035(2), 132\u2013190 (2003)","journal-title":"ACM Computing Surveys"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/RE.2008.13","volume-title":"Proceedings of the 2008 16th IEEE International Requirements Engineering Conference","author":"I. Jureta","year":"2008","unstructured":"Jureta, I., Mylopoulos, J., Faulkner, S.: Revisiting the core ontology and problem in requirements engineering. In: Proceedings of the 2008 16th IEEE International Requirements Engineering Conference, pp. 71\u201380. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"7_CR5","first-page":"293","volume-title":"Proceedings of the International Conference on Automated Software Engineering","author":"Y. Wang","year":"2007","unstructured":"Wang, Y., McIlraith, S.A., Yu, Y., Mylopoulos, J.: An automated approach to monitoring and diagnosing requirements. In: Proceedings of the International Conference on Automated Software Engineering, pp. 293\u2013302. ACM, New York (2007)"},{"key":"7_CR6","first-page":"1055","volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence","author":"M. Shanahan","year":"1989","unstructured":"Shanahan, M.: Prediction is deduction but explanation is abduction. In: Proceedings of the International Joint Conference on Artificial Intelligence, pp. 1055\u20131060. Morgan Kaufmann, San Francisco (1989)"},{"key":"7_CR7","first-page":"686","volume-title":"Proc. of the International Joint Conference and Symposium on Logic Programming","author":"M. Denecker","year":"1992","unstructured":"Denecker, M., Schreye, D.D.: Sldnfa: an abductive procedure for normal abductive programs. In: Proc. of the International Joint Conference and Symposium on Logic Programming, pp. 686\u2013700. MIT Press, Cambridge (1992)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/3-540-45619-8_3","volume-title":"Logic Programming","author":"A. Russo","year":"2002","unstructured":"Russo, A., Miller, R., Nuseibeh, B., Kramer, J.: An abductive approach for analysing event-based requirements specifications. In: Stuckey, P.J. (ed.) ICLP 2002. LNCS, vol.\u00a02401, pp. 22\u201337. Springer, Heidelberg (2002)"},{"key":"7_CR9","unstructured":"Laney, R., Tun, T.T., Jackson, M., Nuseibeh, B.: Composing features by managing inconsistent requirements. In: Proceedings of 9th International Conference on Feature Interactions in Software and Communication Systems (ICFI 2007), pp. 141\u2013156 (2007)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/3-540-48317-9_17","volume-title":"Artificial Intelligence Today","author":"M.P. Shanahan","year":"1999","unstructured":"Shanahan, M.P.: The event calculus explained. In: Woolridge, M.J., Veloso, M. (eds.) Artificial Intelligence Today. LNCS, vol.\u00a01600, pp. 409\u2013430. Springer, Heidelberg (1999)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Miller, R., Shanahan, M.: The event calculus in classical logic - alternative axiomatisations. Journal of Electronic Transactions on Artificial Intelligence (1999)","DOI":"10.1007\/3-540-48317-9_17"},{"key":"7_CR12","volume-title":"Commonsense Reasoning","author":"E.T. Mueller","year":"2006","unstructured":"Mueller, E.T.: Commonsense Reasoning. Morgan Kaufmann, San Francisco (2006)"},{"key":"7_CR13","unstructured":"Decreasoner, http:\/\/decreasoner.sourceforge.net\/"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Kolberg, M., Magill, E., Marples, D., Tsang, S.: Feature interactions in services for internet personal appliances. In: Proceedings of IEEE International Conference on Communications (ICC 2002), vol.\u00a04, pp. 2613\u20132618 (2001)","DOI":"10.1109\/ICC.2002.997315"},{"key":"7_CR15","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/1370811.1370826","volume-title":"Proceedings of International Workshop on Applications and Advances of Problem Frames","author":"A. Classen","year":"2008","unstructured":"Classen, A., Laney, R., Tun, T.T., Heymans, P., Hubaux, A.: Using the event calculus to reason about problem diagrams. In: Proceedings of International Workshop on Applications and Advances of Problem Frames, pp. 74\u201377. ACM, New York (2008)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Bayardo Jr., R.J., Schrag, R.: Using CSP look-back techniques to solve real-world SAT instances. In: AAAI\/IAAI, pp. 203\u2013208 (1997)","DOI":"10.1007\/3-540-61551-2_65"},{"key":"7_CR17","unstructured":"Relsat, http:\/\/code.google.com\/p\/relsat\/"},{"key":"7_CR18","volume-title":"Software Engineering and Knowledge Engineering","author":"A. Russo","year":"2000","unstructured":"Russo, A., Nuseibeh, B.: On the use of logical abduction in software engineering. In: Chang, S.K. (ed.) Software Engineering and Knowledge Engineering. World Scientific, Singapore (2000)"},{"issue":"11","key":"7_CR19","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1109\/32.730542","volume":"24","author":"A.v. Lamsweerde","year":"1998","unstructured":"Lamsweerde, A.v., Letier, E., Darimont, R.: Managing conflicts in goal-driven requirements engineering. IEEE Trans. Softw. Eng.\u00a024(11), 908\u2013926 (1998), http:\/\/dx.doi.org\/10.1109\/32.730542","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"7_CR20","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1145\/514183.514186","volume":"2","author":"C. Nentwich","year":"2002","unstructured":"Nentwich, C., Capra, L., Emmerich, W., Finkelstein, A.: xlinkit: a consistency checking and smart link generation service. ACM Trans. Interet Technol.\u00a02(2), 151\u2013185 (2002)","journal-title":"ACM Trans. Interet Technol."},{"key":"7_CR21","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1145\/1134285.1134339","volume-title":"Proceedings of the International Conference on Software Engineering","author":"A. Egyed","year":"2006","unstructured":"Egyed, A.: Instant consistency checking for the uml. In: Proceedings of the International Conference on Software Engineering, pp. 381\u2013390. ACM Press, New York (2006)"},{"key":"7_CR22","first-page":"166","volume-title":"Proceedings of RE 2006","author":"R. Seater","year":"2006","unstructured":"Seater, R., Jackson, D.: Requirement progression in problem frames applied to a proton therapy system. In: Proceedings of RE 2006, Washington, DC, USA, pp. 166\u2013175. IEEE Computer Society Press, Los Alamitos (2006)"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02050-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T23:48:33Z","timestamp":1739144913000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02050-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020490","9783642020506"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02050-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}