{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:30Z","timestamp":1750307190012,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,2,22]],"date-time":"2012-02-22T00:00:00Z","timestamp":1329868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,2,22]]},"DOI":"10.1145\/2134254.2134256","type":"proceedings-article","created":{"date-parts":[[2012,2,22]],"date-time":"2012-02-22T18:42:35Z","timestamp":1329936155000},"page":"3-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Creating design from requirements and use cases"],"prefix":"10.1145","author":[{"given":"Santonu","family":"Sarkar","sequence":"first","affiliation":[{"name":"Infosys Labs, Bangalore, India"}]},{"given":"Vibhu Saujanya","family":"Sharma","sequence":"additional","affiliation":[{"name":"Accenture Technology Labs, Bangalore, India"}]},{"given":"Rajiv","family":"Agarwal","sequence":"additional","affiliation":[{"name":"Accenture Technology Labs, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2012,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"IEEE Recommended Practice for Architectural Description of Software-Intensive Systems 2000.  IEEE Recommended Practice for Architectural Description of Software-Intensive Systems 2000."},{"key":"e_1_3_2_1_2_1","unstructured":"IEEE Draft Standard for Information Technology--Systems Design--Software Design Descriptions 2008.  IEEE Draft Standard for Information Technology--Systems Design--Software Design Descriptions 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999390"},{"key":"e_1_3_2_1_4_1","unstructured":"M. Basler S. Brydon D. Nourie and I. Singh. Introducing the Java Pet Store 2.0 Application. http:\/\/java.sun.com\/developer\/technicalArticles\/J2EE\/petstore\/2007.  M. Basler S. Brydon D. Nourie and I. Singh. Introducing the Java Pet Store 2.0 Application. http:\/\/java.sun.com\/developer\/technicalArticles\/J2EE\/petstore\/2007."},{"key":"e_1_3_2_1_5_1","volume-title":"The Unified Modeling Language User Guide","author":"Booch G.","year":"2005","unstructured":"G. Booch , I. Jacobson , and J. Rambaugh . The Unified Modeling Language User Guide . Addison Wesley , 2005 . G. Booch, I. Jacobson, and J. Rambaugh. The Unified Modeling Language User Guide. Addison Wesley, 2005."},{"key":"e_1_3_2_1_6_1","first-page":"54","volume-title":"Intl Workshop From Software Requirements to Architectures","author":"Brandozzi M.","year":"2001","unstructured":"M. Brandozzi and D. Perry . Transforming goal oriented requirement specifications into architectural prescriptions . In Intl Workshop From Software Requirements to Architectures , pages 54 -- 61 , 2001 . M. Brandozzi and D. Perry. Transforming goal oriented requirement specifications into architectural prescriptions. In Intl Workshop From Software Requirements to Architectures, pages 54--61, 2001."},{"key":"e_1_3_2_1_7_1","volume-title":"The Mythical Man Month","author":"Brooks F. P.","year":"1995","unstructured":"F. P. Brooks . The Mythical Man Month . Addison-Wesley , 20th anniversary edition edition, 1995 . F. P. Brooks. The Mythical Man Month. Addison-Wesley, 20th anniversary edition edition, 1995."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.738343"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458225"},{"key":"e_1_3_2_1_10_1","volume-title":"Facts and Fallacies of Software Engineering","author":"Glass R. L.","year":"2003","unstructured":"R. L. Glass . Facts and Fallacies of Software Engineering . Addison Wesley , 2003 . R. L. Glass. Facts and Fallacies of Software Engineering. Addison Wesley, 2003."},{"key":"e_1_3_2_1_11_1","first-page":"202","volume-title":"Reconciling Software Requirements and Architectures: The CBSP Approach. In Fifth IEEE Intl Symposium on Requirements Engineering","author":"Grunbacher P.","year":"2001","unstructured":"P. Grunbacher , A. Egyed , and N. Medvidovic . Reconciling Software Requirements and Architectures: The CBSP Approach. In Fifth IEEE Intl Symposium on Requirements Engineering , pages 202 -- 211 , 2001 . P. Grunbacher, A. Egyed, and N. Medvidovic. Reconciling Software Requirements and Architectures: The CBSP Approach. In Fifth IEEE Intl Symposium on Requirements Engineering, pages 202--211, 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.453.0451"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/647648.731621"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428817_45"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506216.1506224"},{"key":"e_1_3_2_1_16_1","volume-title":"MDA Explained: The Model Driven Architecture: Practice and Promise","author":"Kleppe A.","year":"2003","unstructured":"A. Kleppe , J. Warmer , and W. Bast . MDA Explained: The Model Driven Architecture: Practice and Promise . 2003 . A. Kleppe, J. Warmer, and W. Bast. MDA Explained: The Model Driven Architecture: Practice and Promise. 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.469759"},{"key":"e_1_3_2_1_18_1","series-title":"Object Technology Series","volume-title":"The Rational Unified Process: An Introduction","author":"Kruchten P.","year":"2003","unstructured":"P. Kruchten . The Rational Unified Process: An Introduction . Object Technology Series . Addison-Wesley , 3 edition, 2003 . P. Kruchten. The Rational Unified Process: An Introduction. Object Technology Series. Addison-Wesley, 3 edition, 2003."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370811.1370823"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1123321.1123352"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1383-7621(01)00019-4"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1757898.1758067"},{"key":"e_1_3_2_1_24_1","first-page":"71","volume-title":"Modelling Architectural Design Rules in UML. In EMMSAD'08 Workshop, in conjunction with CAiSE'08","author":"Mattsson A.","year":"2008","unstructured":"A. Mattsson , B. Lundell , and B. Lings . Modelling Architectural Design Rules in UML. In EMMSAD'08 Workshop, in conjunction with CAiSE'08 , pages, 71 -- 79 , 2008 . A. Mattsson, B. Lundell, and B. Lings. Modelling Architectural Design Rules in UML. In EMMSAD'08 Workshop, in conjunction with CAiSE'08, pages, 71--79, 2008."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.87"},{"key":"e_1_3_2_1_26_1","first-page":"321","volume-title":"Proc 3rd Intl Conf. on Data Mining","author":"Mich L.","year":"2002","unstructured":"L. Mich and R. Garigliano . NL-OOPS: a Requirements Analysis Tool based on Natural Language Processing . In Proc 3rd Intl Conf. on Data Mining , pages 321 -- 330 , 2002 . L. Mich and R. Garigliano. NL-OOPS: a Requirements Analysis Tool based on Natural Language Processing. In Proc 3rd Intl Conf. on Data Mining, pages 321--330, 2002."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/381473.381515"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0273-1"},{"key":"e_1_3_2_1_29_1","volume-title":"UML 2.0 in a nutshell. O'Reilly","author":"Pilone D.","year":"2005","unstructured":"D. Pilone and N. Pitman . UML 2.0 in a nutshell. O'Reilly , 2005 . D. Pilone and N. Pitman. UML 2.0 in a nutshell. O'Reilly, 2005."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2007.110"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC-EAST.2004.37"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1730874.1730884"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953355.1953378"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.58"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138670.1138682"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1231146"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2009.63"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.34"},{"key":"e_1_3_2_1_39_1","volume-title":"Morgan Kaufmann","author":"Simsion G. C.","year":"2004","unstructured":"G. C. Simsion and G. C. Witt . Data Modeling Essentials . Morgan Kaufmann , 2004 . G. C. Simsion and G. C. Witt. Data Modeling Essentials. Morgan Kaufmann, 2004."},{"key":"e_1_3_2_1_40_1","volume-title":"EMF: Eclipse Modeling Framework. Eclipse","author":"Steinberg D.","year":"2008","unstructured":"D. Steinberg , F. Budinsky , M. Paternostro , and E. Merks . EMF: Eclipse Modeling Framework. Eclipse . Addison Wesley , 2 nd edition, 2008 . D. Steinberg, F. Budinsky, M. Paternostro, and E. Merks. EMF: Eclipse Modeling Framework. Eclipse. Addison Wesley, 2nd edition, 2008.","edition":"2"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.17"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554844_22"},{"key":"e_1_3_2_1_43_1","volume-title":"Interactive Computation: The New Paradigm","author":"Wegner P.","year":"2006","unstructured":"P. Wegner and D. Goldin . Interactive Computation: The New Paradigm . Springer-Verlag , 2006 . P. Wegner and D. Goldin. Interactive Computation: The New Paradigm. Springer-Verlag, 2006."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.02.010"}],"event":{"name":"ISEC '12: India Software Engineering Conference 2012","sponsor":["IITK Indian Institute of Technology Kanpur","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Kanpur India","acronym":"ISEC '12"},"container-title":["Proceedings of the 5th India Software Engineering Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2134254.2134256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2134254.2134256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:05:53Z","timestamp":1750241153000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2134254.2134256"}},"subtitle":["bridging the gap between requirement and detailed design"],"short-title":[],"issued":{"date-parts":[[2012,2,22]]},"references-count":43,"alternative-id":["10.1145\/2134254.2134256","10.1145\/2134254"],"URL":"https:\/\/doi.org\/10.1145\/2134254.2134256","relation":{},"subject":[],"published":{"date-parts":[[2012,2,22]]},"assertion":[{"value":"2012-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}