{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:48:18Z","timestamp":1725986898703},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319981765"},{"type":"electronic","value":"9783319981772"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13094-6_14","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T01:45:32Z","timestamp":1277171132000},"page":"165-179","source":"Crossref","is-referenced-by-count":13,"title":["Comparing Safety Analysis Based on Sequence Diagrams and Textual Use Cases"],"prefix":"10.1007","author":[{"given":"Tor","family":"St\u00e5lhane","sequence":"first","affiliation":[]},{"given":"Guttorm","family":"Sindre","sequence":"additional","affiliation":[]},{"given":"Lydie","family":"du Bousquet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"44","key":"14_CR1","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1038\/scientificamerican1004-76","volume":"291","author":"N. Gershenfeld","year":"2004","unstructured":"Gershenfeld, N., Krikorian, R., Cohen, D.: The Internet of Things. Scientific American\u00a0291(44), 76\u201381 (2004)","journal-title":"Scientific American"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1145\/75577.75579","volume":"33","author":"D. Batra","year":"1990","unstructured":"Batra, D., Hoffer, J.A., Bostrom, R.P.: Comparing Representations with Relational and EER Models. Communications of the ACM\u00a033, 126\u2013139 (1990)","journal-title":"Communications of the ACM"},{"key":"14_CR3","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/978-3-540-25931-2_25","volume-title":"Diagrammatic Representation and Inference","author":"P.C.-H. Cheng","year":"2004","unstructured":"Cheng, P.C.-H.: Why Diagrams Are (Sometimes) Six Times Easier than Words: Benefits beyond Locational Indexing. In: Blackwell, A.F., Marriott, K., Shimojima, A. (eds.) Diagrams 2004. LNCS (LNAI), vol.\u00a02980, pp. 242\u2013260. Springer, Heidelberg (2004)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Larkin, J.H., Simon, H.A.: Why a Diagram is (Sometimes) Worth Ten Thousand Words. Cognitive Science\u00a011 (1987)","DOI":"10.1111\/j.1551-6708.1987.tb00863.x"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/47.735365","volume":"41","author":"A. Boekelder","year":"1998","unstructured":"Boekelder, A., Steehouder, M.: Selecting and Switching: Some Advantages of Diagrams over Tables and Lists for Presenting Instructions. IEEE Transactions on Professional Communication\u00a041, 229\u2013241 (1998)","journal-title":"IEEE Transactions on Professional Communication"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/192433.192442","volume":"18","author":"L. Allmendinger","year":"1994","unstructured":"Allmendinger, L.: Diagrams and Design Tools in Context. ACM SIGDOC Asterisk Journal of Computer Documentation\u00a018, 25\u201341 (1994)","journal-title":"ACM SIGDOC Asterisk Journal of Computer Documentation"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/175276.175283","volume":"37","author":"R.A. Coll","year":"1994","unstructured":"Coll, R.A., Coll, J.H., Thakur, G.: Graphs and tables: a four factor experiment. Communications of the ACM\u00a037, 77\u201384 (1994)","journal-title":"Communications of the ACM"},{"key":"14_CR8","unstructured":"Guiochet, J., Vilchis, A.: Safety Analysis of a Medical Robot for Tele-echography"},{"key":"14_CR9","unstructured":"Long, Z., Jinglun, Z.: Analysis and Study of System Safety Based on Event Sequence Diagram. International Journal of Computer Science and Network Security\u00a08(2) (February 2008)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Ren, C.: A Safety Inspection Management System for Mine equipment Based on UML. In: 2009 International Conference on Signal Processing Systems (2009)","DOI":"10.1109\/ICSPS.2009.84"},{"key":"14_CR11","volume-title":"Proc. RE 2001, Toronto, Canada","author":"K. Allenby","year":"2001","unstructured":"Allenby, K., Kelly, T.: Deriving Safety Requirements Using Scenarios. In: Proc. RE 2001, Toronto, Canada, August 27-31. IEEE, Los Alamitos (2001)"},{"key":"14_CR12","unstructured":"Alspaugh, T.A., et al.: Clarity for Stakeholders: Empirical Evaluation of ScenarioML, Use cases and Sequence Diagrams. In: Fifth International Workshop on Comparative Evaluation in Requirements Engineering (2007)"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering\u00a010, 34\u201344 (2005)","journal-title":"Requirements Engineering"},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2003.1159030","volume":"20","author":"I.F. Alexander","year":"2003","unstructured":"Alexander, I.F.: Misuse Cases, Use Cases with Hostile Intent. IEEE Software\u00a020, 58\u201366 (2003)","journal-title":"IEEE Software"},{"key":"14_CR15","unstructured":"Larman, C.: Applying UML and Patterns \u2013 An Introduction to Object-Oriented Analysis and Design and Iterative Development, 3rd edn. Pearson Education Inc., London, ISBN 0-13-148906-2"},{"key":"14_CR16","unstructured":"Pender, T.: UML Bible, Wiley Publishing Inc., Indianapolis, Indiana, US (2003), ISBN 0-7645-2604-9"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-540-75563-0_29","volume-title":"Conceptual Modeling - ER 2007","author":"T. St\u00e5lhane","year":"2007","unstructured":"St\u00e5lhane, T., Sindre, G.: A comparison of two approaches to safety analysis based on use cases. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol.\u00a04801, pp. 423\u2013437. Springer, Heidelberg (2007)"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/978-3-540-87875-9_50","volume-title":"Model Driven Engineering Languages and Systems","author":"T. St\u00e5lhane","year":"2008","unstructured":"St\u00e5lhane, T., Sindre, G.: Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., V\u00f6lter, M. (eds.) MODELS 2008. LNCS, vol.\u00a05301, pp. 721\u2013735. Springer, Heidelberg (2008)"},{"key":"14_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in Software Engineering: An Introduction","author":"C. Wohlin","year":"2000","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in Software Engineering: An Introduction. Kluwer Academic, Norwell (2000)"},{"key":"14_CR20","unstructured":"Tukey, J.W.: Data analysis and behavioral science or learning to bear the quantitative man burden by shunning badmandments. In: Jones, L.W. (ed.) The Collected Works of John W. Tukey, Wadsworth, Monterey, CA, vol.\u00a0III, pp. 187\u2013389 (1986)"},{"key":"14_CR21","unstructured":"Achour, C.B., et al.: Guiding Use Case Authoring: Results of an Empirical Study. In: Proceedings of the 4th IEEE International Symposium on Requirements Engineering \u2013 RE 1999, Limerick, Ireland (1999)"},{"key":"14_CR22","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1023\/A:1026542700033","volume":"5","author":"K. Cox","year":"2000","unstructured":"Cox, K., Phalp, K.: Replicating the CREWS use case Authoring Guidelines Experiment. Empirical Software Engineering\u00a05, 245\u2013267 (2000)","journal-title":"Empirical Software Engineering"}],"container-title":["Notes on Numerical Fluid Mechanics and Multidisciplinary Design","Active Flow and Combustion Control 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13094-6_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T02:29:56Z","timestamp":1552616996000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13094-6_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783319981765","9783319981772"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13094-6_14","relation":{},"ISSN":["1612-2909","1860-0824"],"issn-type":[{"type":"print","value":"1612-2909"},{"type":"electronic","value":"1860-0824"}],"subject":[],"published":{"date-parts":[[2010]]}}}