{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:29Z","timestamp":1750307549886,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,3,22]],"date-time":"2010-03-22T00:00:00Z","timestamp":1269216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,22]]},"DOI":"10.1145\/1774088.1774283","type":"proceedings-article","created":{"date-parts":[[2010,4,27]],"date-time":"2010-04-27T12:45:48Z","timestamp":1272372348000},"page":"938-939","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An approach based upon OWL-S for method fragments documentation and selection"],"prefix":"10.1145","author":[{"given":"Vincent","family":"Hilaire","sequence":"first","affiliation":[{"name":"SeT, UTBM, Belfort, France"}]},{"given":"Nicolas","family":"Gaud","sequence":"additional","affiliation":[{"name":"SeT, UTBM, Belfort, France"}]},{"given":"St\u00e9phane","family":"Galland","sequence":"additional","affiliation":[{"name":"SeT, UTBM, Belfort, France"}]},{"given":"Abderrafiaa","family":"Koukam","sequence":"additional","affiliation":[{"name":"SeT, UTBM, Belfort, France"}]}],"member":"320","published-online":{"date-parts":[[2010,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30578-1_5"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74481-8_23"},{"key":"e_1_3_2_1_3_1","unstructured":"D. Fritsch J. Lehmann K. Lauenroth S. Lohmann and T. Riechert. Requirements ontology. http:\/\/softwiki.de\/RequirementsOntology.  D. Fritsch J. Lehmann K. Lauenroth S. Lohmann and T. Riechert. Requirements ontology. http:\/\/softwiki.de\/RequirementsOntology."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(02)00127-1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30581-1_4"},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science, 2224: 471--??","volume-title":"An approach for method reengineering","author":"Ralyt\u00e9 J.","year":"2001","unstructured":"J. Ralyt\u00e9 and C. Rolland . An approach for method reengineering . Lecture Notes in Computer Science, 2224: 471--?? , 2001 . J. Ralyt\u00e9 and C. Rolland. An approach for method reengineering. Lecture Notes in Computer Science, 2224:471--??, 2001."},{"key":"e_1_3_2_1_7_1","series-title":"CEUR Workshop Proceedings","volume-title":"A comparison of deontic matrices, maps and activity diagrams for the construction of situational methods","author":"Seidita V.","year":"2007","unstructured":"V. Seidita , J. Ralyt\u00e9 , B. Henderson-Sellers , M. Cossentino , and N. Arni-Bloch . A comparison of deontic matrices, maps and activity diagrams for the construction of situational methods . In J. Eder, S. L. Tomassen, A. L. Opdahl, and G. Sindre, editors, CAiSE'07, volume 247 of CEUR Workshop Proceedings . CEUR-WS. org, 2007 . V. Seidita, J. Ralyt\u00e9, B. Henderson-Sellers, M. Cossentino, and N. Arni-Bloch. A comparison of deontic matrices, maps and activity diagrams for the construction of situational methods. In J. Eder, S. L. Tomassen, A. L. Opdahl, and G. Sindre, editors, CAiSE'07, volume 247 of CEUR Workshop Proceedings. CEUR-WS.org, 2007."},{"issue":"4","key":"e_1_3_2_1_8_1","first-page":"401","article-title":"The tropos metamodel and its use","volume":"29","author":"Susi A.","year":"2005","unstructured":"A. Susi , A. Perini , J. Mylopoulos , and P. Giorgini . The tropos metamodel and its use . Informatica (Slovenia) , 29 ( 4 ): 401 -- 408 , 2005 . A. Susi, A. Perini, J. Mylopoulos, and P. Giorgini. The tropos metamodel and its use. Informatica (Slovenia), 29(4):401--408, 2005.","journal-title":"Informatica (Slovenia)"}],"event":{"name":"SAC'10: The 2010 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Sierre Switzerland","acronym":"SAC'10"},"container-title":["Proceedings of the 2010 ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1774088.1774283","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1774088.1774283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:36Z","timestamp":1750249416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1774088.1774283"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,22]]},"references-count":8,"alternative-id":["10.1145\/1774088.1774283","10.1145\/1774088"],"URL":"https:\/\/doi.org\/10.1145\/1774088.1774283","relation":{},"subject":[],"published":{"date-parts":[[2010,3,22]]},"assertion":[{"value":"2010-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}