{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T18:19:21Z","timestamp":1709403561251},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,6,19]],"date-time":"2007-06-19T00:00:00Z","timestamp":1182211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0"},{"start":{"date-parts":[[2007,6,19]],"date-time":"2007-06-19T00:00:00Z","timestamp":1182211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2008,1]]},"DOI":"10.1007\/s00500-007-0214-7","type":"journal-article","created":{"date-parts":[[2007,6,18]],"date-time":"2007-06-18T14:05:03Z","timestamp":1182175503000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Software development with imperfect information"],"prefix":"10.1007","volume":"12","author":[{"given":"Joost","family":"Noppen","sequence":"first","affiliation":[]},{"given":"Pim","family":"van den Broek","sequence":"additional","affiliation":[]},{"given":"Mehmet","family":"Ak\u015fit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,6,19]]},"reference":[{"key":"214_CR1","doi-asserted-by":"crossref","unstructured":"Ak\u015fit M, Marcelloni F (2001) Deferring elimination of design alternatives in object-oriented methods. In: Concurrency and computation: practice and experience, Wiley, Chichester, pp 1247\u20131279","DOI":"10.1002\/cpe.611"},{"issue":"10","key":"214_CR2","first-page":"725","volume":"43","author":"M Ak\u015fit","year":"2001","unstructured":"Ak\u015fit M, Marcelloni F (2001) Leaving inconsistency using fuzzy logic, information and software technology 43(10):725\u2013741","journal-title":"Leaving inconsistency using fuzzy logic, information and software technology"},{"key":"214_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-86786-6","volume-title":"Fuzzy probabilities new approach and applications","author":"JJ Buckley","year":"2003","unstructured":"Buckley JJ (2003) Fuzzy probabilities new approach and applications. Springer, Heidelberg"},{"key":"214_CR4","doi-asserted-by":"crossref","unstructured":"Cimitile A, Lanubile F, Visaggio G (1992) Traceability based on design decisions. In: Proceedings of conference on software maintenance. IEEE Press, New York, pp 309\u2013317","DOI":"10.1109\/ICSM.1992.242530"},{"key":"214_CR5","volume-title":"Documenting software architectures","author":"P Clements","year":"2004","unstructured":"Clements P, Bachmann F, Bass L, Garlan D, Ivers J, Little R, Nord R, Stafford J (2004) Documenting software architectures. Addison Wesley, Reading"},{"key":"214_CR6","unstructured":"Finkelstein A, Kramer J, Nuseibeh B (1994) Software process modelling and technology. Research Studies Press Ltd"},{"key":"214_CR7","volume-title":"The unified software development process","author":"I Jacobson","year":"1999","unstructured":"Jacobson I, Booch G, Rumbough J (1999) The unified software development process. Addison Wesley, Reading"},{"key":"214_CR8","first-page":"39","volume-title":"Configuration management","author":"GE Kaiser","year":"1994","unstructured":"Kaiser GE, Popovich S, Ben-Shaul IZ (1994) A bi-level language for software process modeling. In: Tichy W (eds) Configuration management. Wiley, Chichester, pp 39\u201372"},{"key":"214_CR9","volume-title":"Software engineering risk management","author":"DW Karolak","year":"1995","unstructured":"Karolak DW (1995) Software engineering risk management. Wiley, Chichester. ISBN: 978-0-8186-7194-4"},{"key":"214_CR10","doi-asserted-by":"crossref","unstructured":"Kazman R, Klein M, Barbacci M, Longstaff T, Lipson H, Carriere J (1998) The architecture tradeoff analysis method. In: 4th International conference on engineering of complex computer systems. IEEE Computer Society Press, Los Alamitos, pp 68\u201378","DOI":"10.21236\/ADA350761"},{"key":"214_CR11","doi-asserted-by":"crossref","unstructured":"Law WS, Antonsson EK (1995) Optimization methods for calculating design imprecision. In: Advances in design automation. ASME, New York. pp 471\u2013476","DOI":"10.1115\/DETC1995-0062"},{"key":"214_CR12","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-3-540-36423-8_3","volume-title":"Software engineering with computational intelligence","author":"J Lee","year":"2003","unstructured":"Lee J, Kuo J, Hsueh N, Fanjiang Y (2003) Trade-off requirement engineering. In: Lee J. (eds) Software engineering with computational intelligence. Springer, Heidelberg, pp 51\u201372"},{"issue":"3\u20134","key":"214_CR13","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1207\/s15327051hci0603&4_3","volume":"6","author":"J Lee","year":"1991","unstructured":"Lee J, Lai K (1991) What\u2019s in design rationale. Human\u2013Computer Interaction 6(3\u20134):251\u2013280","journal-title":"Human\u2013Computer Interaction"},{"key":"214_CR14","volume-title":"Object-oriented software engineering practical software development using UML and Java","author":"TC Lethbridge","year":"2005","unstructured":"Lethbridge TC, Lagani\u00e8re R (2005) Object-oriented software engineering practical software development using UML and Java. McGraw Hill, New York"},{"key":"214_CR15","doi-asserted-by":"crossref","unstructured":"Liu X, Da Q (2005) A Decision tree solution considering the decision maker\u2019s attitude. In: Fuzzy sets and systems. Elsevier, Amsterdam, pp 437\u2013454","DOI":"10.1016\/j.fss.2004.11.009"},{"issue":"1","key":"214_CR16","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/0142-694X(91)90006-I","volume":"12","author":"RJ McCall","year":"1991","unstructured":"McCall RJ (1991) PHI: A conceptual foundation for design hypermedia. Design Stud 12(1):30\u201341","journal-title":"Design Stud"},{"issue":"2","key":"214_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1049\/ip-sen:20040079","volume":"151","author":"J Noppen","year":"2004","unstructured":"Noppen J, Ak\u015fit M, Nicola V, Tekinerdogan B (2004) Market-driven approach based on markov decision theory for optimal use of resources in software development. IEE Proc Softw 151(2): 85\u201394","journal-title":"IEE Proc Softw"},{"key":"214_CR18","doi-asserted-by":"crossref","unstructured":"Potts C, Bruns G (1988) Recording the reasons for design decisions. In: ICSE \u201988: Proceedings of the 10th international conference on software engineering. IEEE Computer Society Press, Los Alamitos, pp 418\u2013427","DOI":"10.1109\/ICSE.1988.93722"},{"issue":"1","key":"214_CR19","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/32.895989","volume":"27","author":"B Ramesh","year":"2001","unstructured":"Ramesh B, Jarke M (2001) Toward reference models of requirements traceability. Softw Eng 27(1):58\u201393","journal-title":"Softw Eng"},{"key":"214_CR20","doi-asserted-by":"crossref","unstructured":"Ran A, Kuusela J (1996) Design decision trees. In: IWSSD \u201996: Proceedings of the 8th international workshop on software specification and design. IEEE Computer Society, Washington, DC, pp 172\u2013175","DOI":"10.1109\/IWSSD.1996.501163"},{"key":"214_CR21","doi-asserted-by":"crossref","unstructured":"Regli WC, Hu X, Atwood M, Sun W (2000) A survey of design rationale systems: approaches, representation, capture and retrieval, engineering with computers, vol 16, Springer-Verlag London Limited, pp 209\u2013235","DOI":"10.1007\/PL00013715"},{"key":"214_CR22","volume-title":"Artifical Intelligence A modern approach","author":"S Russel","year":"1995","unstructured":"Russel S, Norvig P (1995): Artifical Intelligence A modern approach. Prentice-Hall, Englewood Cliffs"},{"key":"214_CR23","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-1-4615-0883-0_1","volume-title":"Software architecture and component technology","author":"B Tekinerdogan","year":"2002","unstructured":"Tekinerdogan B, Ak\u015fit M (2002) Classifying and evaluating architecture design methods. In: Ak\u015fit M (eds) Software architecture and component technology. Kluwer Academic Publishers, Dordrecht, pp 3\u201328"},{"issue":"2","key":"214_CR24","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1023\/A:1011236117591","volume":"19","author":"J Tretmans","year":"2001","unstructured":"Tretmans J, Wijbrans K, Chaudron M (2001) Software engineering with formal methods: the development of a storm surge barrier control system revisiting seven myths of formal methods, Form. Methods Syst Des 19(2):195\u2013215","journal-title":"Methods Syst Des"},{"key":"214_CR25","doi-asserted-by":"crossref","unstructured":"Yen J, Lee J (1993) Fuzzy logic as a basis for specifying imprecise requirements. In: Proceedings of 2nd IEEE international conference on fuzzy systems (FUZZ-IEEE\u201993). IEEE Computer Society press, Alamitos, pp 745\u2013749","DOI":"10.1109\/FUZZY.1993.327535"},{"key":"214_CR26","volume-title":"Structured design: fundamentals of a discipline of computer program and systems design","author":"E Yourdon","year":"1979","unstructured":"Yourdon E, Constantine LL (1979) Structured design: fundamentals of a discipline of computer program and systems design. Prentice-Hall, Englewood Cliffs"},{"issue":"4","key":"214_CR27","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/0020-0255(75)90046-8","volume":"8","author":"LA Zadeh","year":"1975","unstructured":"Zadeh LA (1975) The concept of a linguistic variable and its application to approximate reasoning\u2014II. Inf Sci 8(4):301\u2013357","journal-title":"Inf Sci"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-007-0214-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-007-0214-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-007-0214-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-007-0214-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T18:49:33Z","timestamp":1630435773000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-007-0214-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6,19]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,1]]}},"alternative-id":["214"],"URL":"https:\/\/doi.org\/10.1007\/s00500-007-0214-7","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,6,19]]},"assertion":[{"value":"19 June 2007","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"3"}}