{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:53:21Z","timestamp":1754157201155,"version":"3.41.2"},"reference-count":35,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2004,5,1]],"date-time":"2004-05-01T00:00:00Z","timestamp":1083369600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,5,1]]},"abstract":"<jats:p>A software product line (SPL) captures commonalities and variations (C&amp;V) within a family of systems. Although, feature\u2010oriented approaches have been proposed for building product lines, none of them provide a systematic approach for identifying features. This paper proposes a domain analysis method for creating SPL based on scenarios, goals and features. In particular, the paper presents a domain requirements model (DRM) that integrates features with goals and scenarios, and a domain requirements modeling method that uses the DRM. This approach has been applied to the home integration system (HIS) domain to demonstrate its feasibility. This approach makes it possible to systematically identify features and provide the rationale for both features and C&amp;V.<\/jats:p>","DOI":"10.1108\/02635570410530711","type":"journal-article","created":{"date-parts":[[2004,6,5]],"date-time":"2004-06-05T01:49:11Z","timestamp":1086400151000},"page":"296-308","source":"Crossref","is-referenced-by-count":21,"title":["A scenario, goal and feature\u2010oriented domain analysis approach for developing software product lines"],"prefix":"10.1108","volume":"104","author":[{"given":"Sooyong","family":"Park","sequence":"first","affiliation":[]},{"given":"Minseong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Vijayan","family":"Sugumaran","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020919503794900_b1","unstructured":"Ant\u00f3n, A.I. (1996), \u201cGoal\u2010based requirements analysis\u201d, Proceedings of the Second International Conference on Requirements Engineering, Colorado Springs, CO, pp. 136\u201044."},{"key":"key2022020919503794900_b2","unstructured":"Bosch, J. (2000), Design and Use of Software Architectures: Adopting and Evolving a Product\u2010line Approach, Addison\u2010Wesley, Boston, MA."},{"key":"key2022020919503794900_b3","unstructured":"Chandrasekaran, B. and Kaindl, H. (1996), \u201cRepresenting functional requirements and user\u2010system interactions\u201d, Proceedings of AAAI\u201096 Workshop on Modeling and Reasoning about Function, Portland, OR."},{"key":"key2022020919503794900_b5","doi-asserted-by":"crossref","unstructured":"Chastek, G., Donohoe, P. and McGregor, J.D. (2002), Product Line Production Planning for the Home Integration System Example, Technical Note CMU\/SEI\u20102002\u2010TN\u2010029, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.","DOI":"10.21236\/ADA408820"},{"key":"key2022020919503794900_b4","doi-asserted-by":"crossref","unstructured":"Chastek, G., Donohoe, P., Kang, K.C. and Thiel, S. (2001), Product Line Analysis: A Practical Introduction, Technical Report CMU\/SEI\u20102001\u2010TR\u2010001, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA..","DOI":"10.21236\/ADA388924"},{"key":"key2022020919503794900_b7","unstructured":"Clements, P. and Northrop, L. (2001), Software Product Lines: Practices and Patterns, Addison Wesley Longman, Reading, MA."},{"key":"key2022020919503794900_b6","doi-asserted-by":"crossref","unstructured":"Dardenne, A., Lamsweerde, A.V. and Fickas, S. (1993), \u201cGoal\u2010directed requirements acquisition\u201d, Science of Computer Programming, Vol. 20 No. 1\/2, pp. 3\u201050.","DOI":"10.1016\/0167-6423(93)90021-G"},{"key":"key2022020919503794900_b8","doi-asserted-by":"crossref","unstructured":"Donohoe, P. (Ed.) (2000), Software Product Lines: Experience and Research Directions, Kluwer Academic Publishers, Boston, MA.","DOI":"10.1007\/978-1-4615-4339-8"},{"key":"key2022020919503794900_b9","doi-asserted-by":"crossref","unstructured":"Fey, D., Fajta, R. and Boros, A. (2002), \u201cFeature modeling: a meta\u2010model to enhance usability and usefulness\u201d, in Chastek, G. (Ed.), Proceedings of the Second Software Product Line Conference, Springer Verlag, Berlin, pp. 198\u2010216.","DOI":"10.1007\/3-540-45652-X_13"},{"key":"key2022020919503794900_b10","doi-asserted-by":"crossref","unstructured":"Gong, B., Yen, D.C. and Chou, D.C. (1998), \u201cA manager's guide to total quality software design\u201d, Industrial Management & Data Systems, Vol. 98 No. 3, pp. 100\u20107.","DOI":"10.1108\/02635579810213099"},{"key":"key2022020919503794900_b11","unstructured":"Griss, M.L., Favaro, J. and d'Alessandro, M. (1998), \u201cIntegrating feature modeling with the RSEB\u201d, Proceedings of the 5th International Conference on Software Reuse, Victoria, BC, pp. 76\u201085."},{"key":"key2022020919503794900_b12","doi-asserted-by":"crossref","unstructured":"Jacobs, S. and Holten, R. (1995), \u201cGoal\u2010driven business modelling \u2013 supporting decision making within information systems development\u201d, Proceedings of Conference On Organizational Computing Systems, Milpitas, CA, pp. 96\u2010105.","DOI":"10.1145\/224019.224029"},{"key":"key2022020919503794900_b13","unstructured":"Jacobson, I., Griss, M.L. and Jonsson, P. (1997), Software Reuse: Architecture, Process and Organization for Business Success, Addison\u2010Wesley Publishing, New York, NY."},{"key":"key2022020919503794900_b14","doi-asserted-by":"crossref","unstructured":"Kaindl, H. (1995), \u201cAn integration of scenarios with their purposes in task modeling\u201d, Proceedings of Symposium Designing Interactive Systems: Processes, Practices, Methods, and Techniques, ACM Press, New York, NY, pp. 227\u201035.","DOI":"10.1145\/225434.225460"},{"key":"key2022020919503794900_b15","doi-asserted-by":"crossref","unstructured":"Kaindl, H. (2000), \u201cA design process based on a model combining scenarios with goals and functions\u201d, IEEE Transactions on Systems, Vol. 30 No. 5, pp. 537\u201051.","DOI":"10.1109\/3468.867861"},{"key":"key2022020919503794900_b18","doi-asserted-by":"crossref","unstructured":"Kang, K.C., Lee, J. and Donohoe, P. (2002), \u201cFeature\u2010oriented product line engineering\u201d, IEEE Software, Vol. 9 No. 4, pp. 58\u201065.","DOI":"10.1109\/MS.2002.1020288"},{"key":"key2022020919503794900_b19","unstructured":"Kang, K.C., Lee, K. and Lee, J. (2003), \u201cFeature oriented product line software engineering: principles and guidelines\u201d, Domain Oriented Systems Development: Practices and Perspectives, Taylor & Francis, London, pp. 19\u201036."},{"key":"key2022020919503794900_b16","doi-asserted-by":"crossref","unstructured":"Kang, K.C., Cohen, S.G., Hess, J.A., Novak, W.E. and Peterson, A.S. (1990), Feature\u2010oriented Domain Analysis Feasibility Study, Technical Report CMU\/SEI\u201090\u2010TR\u201021, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA.","DOI":"10.21236\/ADA235785"},{"key":"key2022020919503794900_b17","doi-asserted-by":"crossref","unstructured":"Kang, K.C., Kim, S., Lee, J., Kim, K., Shin, E. and Huh, M. (1998), \u201cFORM: a feature\u2010oriented reuse method with domain\u2010specific reference architectures\u201d, Annals of Software Engineering, Vol. 5, pp. 143\u201068.","DOI":"10.1023\/A:1018980625587"},{"key":"key2022020919503794900_b20","doi-asserted-by":"crossref","unstructured":"Lamsweerde, A.D. and Willemet, L. (1998), \u201cInferring declarative requirements specification from operational scenarios\u201d, IEEE Transactions on Software Engineering, Vol. 24 No. 12, pp. 1089\u2010114.","DOI":"10.1109\/32.738341"},{"key":"key2022020919503794900_b21","doi-asserted-by":"crossref","unstructured":"Lee, K., Kang, K.C., Kim, S. and Lee, J. (1999), \u201cFeature\u2010oriented engineering of PBX software for adaptability and reusability\u201d, Software\u2010Practice and Experience, Vol. 29 No. 10, pp. 875\u201096.","DOI":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W"},{"key":"key2022020919503794900_b22","doi-asserted-by":"crossref","unstructured":"Li, L. (2002), \u201cWestern exporting manufacturers\u2019 channel structure in emerging markets\u201d, Industrial Management & Data Systems, Vol. 102 No. 9, pp. 483\u201092.","DOI":"10.1108\/02635570210459614"},{"key":"key2022020919503794900_b23","doi-asserted-by":"crossref","unstructured":"Mylopoulos, J., Chung, L. and Nixon, B. (1992), \u201cRepresenting and using non\u2010functional requirements: a process\u2010oriented approach\u201d, IEEE Transactions on Software Engineering, Vol. 18 No. 6, pp. 483\u201097.","DOI":"10.1109\/32.142871"},{"key":"key2022020919503794900_b24","doi-asserted-by":"crossref","unstructured":"Mylopoulos, J., Chung, L. and Yu, E. (1999), \u201cFrom object\u2010oriented to goal\u2010oriented requirements analysis\u201d, Communications of the ACM, Vol. 42 No. 1, pp. 31\u20107.","DOI":"10.1145\/291469.293165"},{"key":"key2022020919503794900_b25","unstructured":"Neighbors, J. (1981), \u201cSoftware construction using components\u201d, PhD thesis, Department of Information and Computer Science, University of California, Irvine, CA."},{"key":"key2022020919503794900_b26","doi-asserted-by":"crossref","unstructured":"Potts, C., Takahashi, K. and Ant\u00f3n, A.I. (1994), \u201cInquiry\u2010based requirements analysis\u201d, IEEE Software, Vol. 11 No. 2, pp. 21\u201032.","DOI":"10.1109\/52.268952"},{"key":"key2022020919503794900_b28","unstructured":"Rolland, C., Grosz, G. and Kla, R. (1999), \u201cExperience with goal\u2010scenario coupling in requirements engineering\u201d, paper presented at The 4th IEEE International Symposium on Requirements Engineering."},{"key":"key2022020919503794900_b27","doi-asserted-by":"crossref","unstructured":"Rolland, C., Souveyet, C. and Achour, C.B. (1998), \u201cGuiding goal modeling using scenarios\u201d, IEEE Transactions on Software Engineering, Vol. 24, pp. 1055\u201071.","DOI":"10.1109\/32.738339"},{"key":"key2022020919503794900_b29","doi-asserted-by":"crossref","unstructured":"Steinke, G. and Nickolette, C. (2003), \u201cBusiness rules as the basis of an organization's information systems\u201d, Industrial Management & Data Systems, Vol. 98 No. 3, pp. 52\u201063.","DOI":"10.1108\/02635570310456904"},{"key":"key2022020919503794900_b30","doi-asserted-by":"crossref","unstructured":"Sutcliffe, A.G. (1998), \u201cScenario\u2010based requirement analysis\u201d, Requirements Engineering Journal, Vol. 3 No. 1, pp. 48\u201065.","DOI":"10.1007\/BF02802920"},{"key":"key2022020919503794900_b31","doi-asserted-by":"crossref","unstructured":"Thiel, S. and Peruzzi, F. (2000), \u201cStarting a product line approach for an envisioned market: research and experience in an industrial environment\u201d, Proceedings of the First Software Product Line Conference, Kluwer Academic Publishers, Boston, MA, pp. 495\u2010512.","DOI":"10.1007\/978-1-4615-4339-8_26"},{"key":"key2022020919503794900_b32","unstructured":"Vici, A.D. and Argentieri, N. (1998), \u201cFODAcom: an experience with domain analysis in the Italian telecom industry\u201d, Proceedings of the 5th International Conference on Software Reuse, Victoria, BC, Canada, pp. 166\u201075."},{"key":"key2022020919503794900_b33","unstructured":"Wiegers, K.E. (1999), Software Requirements, Microsoft Press, Redmond, WA."},{"key":"key2022020919503794900_b34","doi-asserted-by":"crossref","unstructured":"Yang, H.L. and Tang, J.H. (2003), \u201cA three\u2010stage model of requirements elicitation for Web\u2010based information systems\u201d, Industrial Management & Data Systems, Vol. 103 No. 6, pp. 398\u2010409.","DOI":"10.1108\/02635570310479972"},{"key":"key2022020919503794900_b35","doi-asserted-by":"crossref","unstructured":"Yang, Y.H. (2001), \u201cSoftware quality management and ISO 9000 implementation\u201d, Industrial Management & Data Systems, Vol. 101 No. 7, pp. 329\u201038.","DOI":"10.1108\/EUM0000000005821"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635570410530711","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570410530711\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635570410530711\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:21Z","timestamp":1753400241000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/104\/4\/296-308\/180787"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,5,1]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2004,5,1]]}},"alternative-id":["10.1108\/02635570410530711"],"URL":"https:\/\/doi.org\/10.1108\/02635570410530711","relation":{},"ISSN":["0263-5577"],"issn-type":[{"type":"print","value":"0263-5577"}],"subject":[],"published":{"date-parts":[[2004,5,1]]}}}