{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:00:09Z","timestamp":1729620009975,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/re.2013.6636718","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:25:31Z","timestamp":1383089131000},"page":"185-194","source":"Crossref","is-referenced-by-count":5,"title":["Can requirements dependency network be used as early indicator of software integration bugs?"],"prefix":"10.1109","author":[{"given":"Junjie","family":"Wang","sequence":"first","affiliation":[]},{"given":"Juan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Da","family":"Yang","sequence":"additional","affiliation":[]},{"given":"He","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mingshu","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/32.135775"},{"key":"17","article-title":"Statistical analysis in public administration","author":"giventer","year":"2007","journal-title":"Jones and Bartlett"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453105"},{"journal-title":"Introduction to social network methods","year":"2005","author":"hanneman","key":"15"},{"journal-title":"Software Metrics A Rigorous and Practical Approach","year":"1998","author":"fenton","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080771"},{"key":"14","article-title":"Ucinet for Windows: Software for social network analysis","author":"borgatti","year":"2002","journal-title":"Analytic Technologies"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01680-6_25"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-012-0150-7"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609560"},{"journal-title":"Multiple Regression A Primer","year":"1999","author":"allison","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.78"},{"journal-title":"Process-Centered Requirements Engineering","year":"1996","author":"pohl","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28244-0_5"},{"key":"25","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/ISRE.2001.948547","article-title":"An industrial survey of requirements interdependencies in software product release planning","author":"carlshamre","year":"2001","journal-title":"Proc IEEE International Symposium on Requirements Engineering (RE 2001)"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.28"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-008-0066-4"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2010.24"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9072-x"},{"key":"3","first-page":"62","article-title":"An initial evaluation of requirements dependency types in change propagation analysis","author":"li","year":"2012","journal-title":"Proceedings of the International Conference on Evaluation & Assessment in Software Engineering (EASE 2012)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0109-5"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-005-0018-1"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1191795"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79588-9_18"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985816"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345817"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.26"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1923947.1923953"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28714-5_6"},{"key":"9","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.1016\/j.infsof.2009.01.004","article-title":"A systematic literature review to identify and classify software requirement errors","volume":"51","author":"walia","year":"2009","journal-title":"Information and Software Technology"},{"journal-title":"Systems and Software Engineering -Software Life Cycle Processes","year":"2008","key":"8"}],"event":{"name":"2013 IEEE 21st International Requirements Engineering Conference (RE)","start":{"date-parts":[[2013,7,15]]},"location":"Rio de Janeiro-RJ, Brazil","end":{"date-parts":[[2013,7,19]]}},"container-title":["2013 21st IEEE International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621629\/6636689\/06636718.pdf?arnumber=6636718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T22:39:53Z","timestamp":1646951993000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6636718\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/re.2013.6636718","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}