{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:53:15Z","timestamp":1774417995476,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/repa.2014.6894844","type":"proceedings-article","created":{"date-parts":[[2014,9,16]],"date-time":"2014-09-16T22:12:45Z","timestamp":1410905565000},"page":"47-54","source":"Crossref","is-referenced-by-count":20,"title":["Using non-functional requirements templates for elicitation: A case study"],"prefix":"10.1109","author":[{"given":"Sylwia","family":"Kopczynska","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jerzy","family":"Nawrocki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/3-540-56777-1_15","article-title":"The three dimensions of requirements engineering","volume":"6353","author":"pohl","year":"1993","journal-title":"Advanced Information Systems Engineering"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2001.936219"},{"key":"17","author":"iso","year":"2011"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-007-0058-9"},{"key":"18","first-page":"35","article-title":"Structured meetings for non-functional requirements elicitation","volume":"36","author":"kopczyska","year":"2011","journal-title":"Found Comput Decision Sci"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2000.875141"},{"key":"15","first-page":"5","article-title":"A pattern-based method for building requirements documents in call-for-tender processes","volume":"6","author":"renault","year":"2009","journal-title":"IJCSA"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1997.566843"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.216"},{"key":"39","author":"robertson","year":"2012","journal-title":"Mastering the Requirements Process Getting Requirements Right"},{"key":"13","first-page":"31","article-title":"Us ing grammatical knowledge patterns for structuring requirements specifications","author":"bhatia","year":"2013","journal-title":"IEEE Re Pa"},{"key":"14","author":"withall","year":"2007","journal-title":"Software Requirement Patterns (Developer Best Practices)"},{"key":"37","first-page":"153","article-title":"Can patterns improvei modeling","author":"strohmaier","year":"2008","journal-title":"Two Exploratory Studies REFSQ"},{"key":"11","first-page":"249","article-title":"Goal-oriented requirements engineering: A guided tour","author":"van lamsweerde","year":"2001","journal-title":"Proc of 5th IEEE Intl Symp on RE IEEE"},{"key":"38","first-page":"320","author":"herrmann","year":"2007","journal-title":"Exploring the Characteristics of Nfr Methods-a Dialogue about Two Approaches"},{"key":"12","first-page":"18","author":"cleland-huang","year":"2013","journal-title":"A Persona-based Approach for Exploring Architecturally Significant Requirements in Agile Projects"},{"key":"21","year":"0"},{"key":"20","author":"gottesdiener","year":"2002","journal-title":"Requirements by Collaboration Workshops for Defining Needs"},{"key":"43","first-page":"6","author":"lam","year":"1997","journal-title":"Ten Steps Towards Systematic Requirements Reuse"},{"key":"42","first-page":"179","author":"supakkul","year":"2010","journal-title":"An NFR Pattern Approach to Dealing with NFRs"},{"key":"41","first-page":"42","author":"naish","year":"2011","journal-title":"Towards A Generalised Framework for Classifying and Retrieving Requirem Ents Patterns"},{"key":"40","first-page":"29","author":"riaz","year":"2012","journal-title":"Security Requirements Patterns Understanding the Science behind the Art of Pattern Writing"},{"key":"22","year":"0"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1002\/9781118181034"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/11751113_19"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/EduRex.2012.6225698"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-044-5_2"},{"key":"27","article-title":"Software development studio","author":"wang","year":"2004","journal-title":"The Univ of Texas at Austin Tech Rep"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/CSEET.2008.20"},{"key":"29","article-title":"Requirements elicitation and elicitation technique selection : A model for two knowledge-intensive software development processes unsolved problem software development software solutions","author":"hickey","year":"2002","journal-title":"Proc HICSS'03"},{"key":"3","first-page":"117","article-title":"Scrum development process","author":"schwaber","year":"1995","journal-title":"Proc Annu Conf ACM"},{"key":"2","author":"beck","year":"2004","journal-title":"Extreme Programming Explained Embrace Change"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/32.142871"},{"key":"1","first-page":"1","year":"1998","journal-title":"IEEE Recommended Practice for Software Requirements Specifications"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(02)00014-9"},{"key":"7","author":"boehm","year":"2004","journal-title":"Balancing Agility and Discipline A Guide for the Perplexed"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1997.589224"},{"key":"32","author":"wood","year":"1995","journal-title":"Joint Application Development"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1993.274940"},{"key":"31","author":"sommerville","year":"1997","journal-title":"Requirements Engineering A Good Practice Guide"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.1"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/EmpiRE.2013.6615214"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.64"}],"event":{"name":"2014 IEEE 4th International Workshop on Requirements Patterns (RePa)","location":"Karlskrona","start":{"date-parts":[[2014,8,26]]},"end":{"date-parts":[[2014,8,26]]}},"container-title":["2014 IEEE 4th International Workshop on Requirements Patterns (RePa)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6887461\/6894833\/06894844.pdf?arnumber=6894844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T16:42:52Z","timestamp":1580920972000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6894844\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/repa.2014.6894844","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}