{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T08:14:13Z","timestamp":1725524053542},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/sds.2018.8370425","type":"proceedings-article","created":{"date-parts":[[2018,6,4]],"date-time":"2018-06-04T23:25:33Z","timestamp":1528154733000},"page":"74-79","source":"Crossref","is-referenced-by-count":1,"title":["Process design of a capability-based weapon equipment requirements analysis system"],"prefix":"10.1109","author":[{"given":"Zhen","family":"Jia","sequence":"first","affiliation":[]},{"given":"Lushun","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Yufang","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14257\/ijunesst.2015.8.12.04"},{"journal-title":"Improving trade visibility and fidelity in defense requirements portfolio management","year":"2014","author":"ahmed","key":"ref11"},{"journal-title":"Information Capture during early front end analysis in the joint capabilities integration and development system (JCIDS)","year":"2016","author":"lee","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2011.5966578"},{"journal-title":"A capabilities based assessment of the United States Air Force critical care air transport team","year":"2013","author":"matsumoto","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2009.101"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2016.5103"},{"key":"ref4","first-page":"107","article-title":"The research of system of systems requirement modelling and toolkits","author":"yang","year":"2011","journal-title":"Proceedings of the 11th International Conference on Computer Modelling and Simulation"},{"journal-title":"The search for suitable strategy Threat-based and capability-based strategies in a complex world","year":"2015","author":"christianson","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICQR2MSE.2012.6246471"},{"key":"ref5","first-page":"33","article-title":"Imprecise domain-specfic modelling for C4ISR capability requirements analysis","author":"wang","year":"2011","journal-title":"Proc of the 2011 International Conference on Information Science and Technology"},{"key":"ref8","first-page":"206","article-title":"Capabilities-based requirement demonstration method for weapon SoS","author":"fan","year":"2014","journal-title":"Proceedings of IEEE 17th International Conference on Intelligent Transportation Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SYSoSE.2012.6384168"},{"journal-title":"An equipment offering degree evaluation method for weapon SoS combat network based on operation loop","year":"2016","author":"chi","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1142\/S1793930516000301"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISCID.2014.267"}],"event":{"name":"2018 Fifth International Conference on Software Defined Systems (SDS)","start":{"date-parts":[[2018,4,23]]},"location":"Barcelona","end":{"date-parts":[[2018,4,26]]}},"container-title":["2018 Fifth International Conference on Software Defined Systems (SDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8362835\/8370402\/08370425.pdf?arnumber=8370425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T06:04:08Z","timestamp":1643177048000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8370425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/sds.2018.8370425","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}