{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:21:55Z","timestamp":1761805315922,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/re.2014.6912266","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T20:37:18Z","timestamp":1412109438000},"page":"243-252","source":"Crossref","is-referenced-by-count":30,"title":["Automated support for combinational creativity in requirements engineering"],"prefix":"10.1109","author":[{"given":"Tanmay","family":"Bhowmik","sequence":"first","affiliation":[]},{"given":"Nan","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Anas","family":"Mahmoud","sequence":"additional","affiliation":[]},{"given":"Juha","family":"Savolainen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","article-title":"Mining internet-scale software repositories","author":"linstead","year":"2007","journal-title":"Proceedings of the Neural Information Processing Systems (NIPS)"},{"key":"36","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29807-3","author":"wu","year":"2012","journal-title":"Advances in K-means Clustering A Data Mining Thinking"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401960"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0118-x"},{"key":"39","first-page":"288","article-title":"Reading tea leaves: How humans interpret topic models","volume":"22","author":"chang","year":"2009","journal-title":"Proceedings of the Neural Information Processing Systems (NIPS)"},{"journal-title":"Ucinet for Windows Software for Social Network Analysis","year":"2002","author":"borgatti","key":"37"},{"key":"38","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1609\/icwsm.v3i1.13937","article-title":"Gephi: An open source software for exploring and manipulating networks","author":"bastian","year":"2009","journal-title":"Proceedings of the International Conference on Weblogs and Social Media (ICWSM)"},{"journal-title":"Integrating Natural Language and Program Structure Information to Improve Software Search and Exploration","year":"2010","author":"hill","key":"43"},{"key":"42","first-page":"1","article-title":"The case for case","author":"fillmore","year":"1968","journal-title":"Universals in Linguistic Theory"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.49"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.45"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-006-0039-4"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.36"},{"key":"24","first-page":"174","article-title":"Model checking early requirements specifications in tropos","author":"fuxman","year":"2001","journal-title":"Proceedings of the Int'l Symposium on Requirements Engineering (RE)"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2013.6577678"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.51"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806821"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070505"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070503"},{"key":"3","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1109\/ICSE.2007.24","article-title":"Can requirements be creative? Experiences with an enhanced air space management system","author":"maiden","year":"2007","journal-title":"Proceedings of the International Conference on Software Engineering (ICSE)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.16"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231945"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013132"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806817"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.1331305"},{"journal-title":"The creative mind Myths and Mechanisms","year":"2003","author":"boden","key":"5"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.13"},{"journal-title":"Handbook of Creativity","year":"1999","author":"sternberg","key":"4"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321709"},{"key":"9","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1007\/978-3-642-02050-6_14","article-title":"Inventing requirements with creativity support tools","author":"karlsen","year":"2009","journal-title":"Requirements Engineering Foundation for Software Quality"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.34"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/S0142-694X(99)00034-4"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.3115\/1075527.1075553"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1052898.1052912"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2008.47"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1162\/jmlr.2003.3.4-5.993"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1086\/421787"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518795"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.39"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636697"},{"key":"21","first-page":"3","article-title":"Assessing creativity","author":"ritchie","year":"2001","journal-title":"Proceedings of the AISB-01 Symposium on AI and Creativity in Arts and Science"},{"key":"20","first-page":"147","article-title":"Computational models of surprise in evaluating creative design","author":"maher","year":"2013","journal-title":"Proceedings of the International Conference on Computational Creativity (ICCC)"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345842"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.32"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613828"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0307752101"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985457"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.39"}],"event":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","start":{"date-parts":[[2014,8,25]]},"location":"Karlskrona, Sweden","end":{"date-parts":[[2014,8,29]]}},"container-title":["2014 IEEE 22nd International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6903646\/6912234\/06912266.pdf?arnumber=6912266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T23:01:49Z","timestamp":1689548509000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6912266\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/re.2014.6912266","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}