{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T17:41:25Z","timestamp":1749318085211,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/re.2013.6636708","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:25:31Z","timestamp":1383089131000},"page":"82-91","source":"Crossref","is-referenced-by-count":5,"title":["A mode-based pattern for feature requirements, and a generic feature interface"],"prefix":"10.1109","author":[{"given":"David","family":"Dietrich","sequence":"first","affiliation":[]},{"given":"Joanne M.","family":"Atlee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"129","article-title":"Composing features by managing inconsistent requirements","author":"laney","year":"2007","journal-title":"International Conference on Feature Interactions (ICFI"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062482"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1211541"},{"key":"15","article-title":"Feature-oriented domain analysis (FODA) feasibility study","author":"kang","year":"1990","journal-title":"Carnegie- Mellon University Software Engineering Institute Tech Rep CMU\/SEI- 90-TR-21"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2019136.2019142"},{"journal-title":"Problem Frames Analyzing and Structuring Software Development Problems","year":"2000","author":"jackson","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/32.729683"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(87)90035-9"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/234426.234431"},{"key":"21","first-page":"169","article-title":"Evaluating support for features in advanced modularization technologies","author":"lopez-herrejon","year":"2005","journal-title":"Proceedings of the 19th European Conference on Object-Oriented Programming (ECOOP'05"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2002.1115013"},{"journal-title":"UML Specification Superstructure","year":"2009","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-48354-7_20"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/32.75413"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345799"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/32.667878"},{"key":"27","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S0164-1212(99)00062-X","article-title":"A conceptual basis for feature engineering","volume":"49","author":"turner","year":"1999","journal-title":"Journal of Systems and Software"},{"journal-title":"Software Requirement Patterns","year":"2007","author":"withall","key":"28"},{"key":"3","first-page":"63","article-title":"Modeling knowledge for software development","author":"arango","year":"1985","journal-title":"Proceedings of the 3rd International Workshop on Software Specification and Design (WSSD'85"},{"key":"2","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/978-3-642-02408-5_2","article-title":"Model superimposition in software product lines","author":"apel","year":"2009","journal-title":"Proceedings of the 2nd International Conference on Theory and Practice of Model Transformations (ICMT'09"},{"journal-title":"Design Patterns Elements of Reusable Object-Oriented Software","year":"1995","author":"gamma","key":"10"},{"key":"1","first-page":"144","article-title":"Open modules: Modular reasoning about advice","author":"aldrich","year":"2005","journal-title":"Proceedings of the 19th European Conference on Object-Oriented Programming (ECOOP'05"},{"journal-title":"Doing Hard Time Developing Real-Time Systems with UML Objects Frameworks and Patterns","year":"1999","author":"douglass","key":"7"},{"key":"6","first-page":"13","article-title":"Using security patterns to model and analyze security","author":"cheng","year":"2003","journal-title":"Proceedings of the Workshop on Requirements for High Assurance Systems at the IEEE International Requirements Engineering Conference"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.23"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345807"},{"key":"9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/978-3-642-14192-8_10","article-title":"A metamodel for software requirement patterns","author":"franch","year":"2010","journal-title":"Proceedings of Requirements Engineering Foundation for Software Quality (REFSQ'10)"},{"journal-title":"Analysis Patterns Reusable Object Models","year":"1996","author":"fowler","key":"8"}],"event":{"name":"2013 IEEE 21st International Requirements Engineering Conference (RE)","start":{"date-parts":[[2013,7,15]]},"location":"Rio de Janeiro-RJ, Brazil","end":{"date-parts":[[2013,7,19]]}},"container-title":["2013 21st IEEE International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621629\/6636689\/06636708.pdf?arnumber=6636708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:02:13Z","timestamp":1498093333000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6636708\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/re.2013.6636708","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}