{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:08Z","timestamp":1750308728800,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,23]],"date-time":"2013-10-23T00:00:00Z","timestamp":1382486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272163, 91318301"],"award-info":[{"award-number":["61272163, 91318301"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2009CB320701"],"award-info":[{"award-number":["2009CB320701"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,23]]},"DOI":"10.1145\/2532443.2532448","type":"proceedings-article","created":{"date-parts":[[2013,12,3]],"date-time":"2013-12-03T14:37:29Z","timestamp":1386081449000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A preliminary study on requirements modeling methods for self-adaptive software systems"],"prefix":"10.1145","author":[{"given":"Tianqi","family":"Zhao","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Haiyan","family":"Zhao","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2013,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Motivation of internetware. 2013. DOI=http:\/\/www.nudt.edu.cn\/internetware2013\/  Motivation of internetware. 2013. DOI=http:\/\/www.nudt.edu.cn\/internetware2013\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Jesper Andersson1 Luciano Baresi Nelly Bencomo Rog'erio de Lemos Alessandra Gorla Paola Inverardi and Thomas Vogel. 2010. Software Engineering Processes for Self-Adaptive Systems. International Seminar Dagstuhl Castle Germany  Jesper Andersson1 Luciano Baresi Nelly Bencomo Rog'erio de Lemos Alessandra Gorla Paola Inverardi and Thomas Vogel. 2010. Software Engineering Processes for Self-Adaptive Systems. International Seminar Dagstuhl Castle Germany"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04425-0_36"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810329"},{"volume-title":"Software Engineering for Self-Adaptive Systems II (pp. 108--132)","author":"Tamura G.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988496"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Cheng B. H. de Lemos R. Giese H. Inverardi P. Magee J. Andersson J. & Whittle J. 2009. Software engineering for self-adaptive systems: A research roadmap (pp. 1--26). Springer Berlin Heidelberg.   Cheng B. H. de Lemos R. Giese H. Inverardi P. Magee J. Andersson J. & Whittle J. 2009. Software engineering for self-adaptive systems: A research roadmap (pp. 1--26). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-02161-9"},{"volume-title":"Software Engineering for Self-Adaptive Systems II (pp. 1--32)","author":"De Lemos R.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2008.67"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Marler R. T. & Arora J. S. 2004. Survey of multi-objective optimization methods for engineering. Structural and multidisciplinary optimization 26(6) 369--395.  Marler R. T. & Arora J. S. 2004. Survey of multi-objective optimization methods for engineering. Structural and multidisciplinary optimization 26(6) 369--395.","DOI":"10.1007\/s00158-003-0368-6"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186778.1186782"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02161-9_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.19"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.769885"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/827255.827807"},{"volume-title":"InProceedings of the 25th International Conference on Software Engineering(pp. 744--745)","year":"2003","author":"vanLamsweerde A.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87875-9_54"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134337"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2008.22"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1188966.1188976"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(93)90021-G"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04425-0_36"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2008.67"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.83"},{"volume-title":"11th International Workshop on Requirements Engineering Foundation for Software Quality (REFSQ) (p. 5).","year":"2005","author":"Berry D. M.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOCCER.2008.1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.36"},{"volume-title":"Software Engineering for Self-Adaptive Systems II (pp. 162--190)","author":"Rosa L.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Ghezzi C. & Sharifloo A. M. 2013. Dealing with Non-Functional Requirements for Adaptive Systems via Dynamic Software Product-Lines. InSoftware Engineering for Self-Adaptive Systems II (pp. 191--213). Springer Berlin Heidelberg.  Ghezzi C. & Sharifloo A. M. 2013. Dealing with Non-Functional Requirements for Adaptive Systems via Dynamic Software Product-Lines. InSoftware Engineering for Self-Adaptive Systems II (pp. 191--213). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-642-35813-5_8"},{"volume-title":"Dependable Computer Systems(pp. 47--62)","author":"Ghezzi C.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/827254.827800"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-005-0016-3"},{"volume-title":"Software Engineering for Self-Adaptive Systems II (pp. 108--132)","author":"Tamura G.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","unstructured":"Subramanian N. Drager S. & McKeever W. Engineering a Trustworthy Software System Using the NFR Approach.  Subramanian N. Drager S. & McKeever W. Engineering a Trustworthy Software System Using the NFR Approach."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.34"},{"volume-title":"Advanced Information Systems Engineering (pp. 20--35)","author":"Sebastiani R.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070514"},{"key":"e_1_3_2_1_38_1","unstructured":"Filman R. Elrad T. & Clarke S. 2004. Aspect-oriented software development. Addison-Wesley Profession   Filman R. Elrad T. & Clarke S. 2004. Aspect-oriented software development. Addison-Wesley Profession"}],"event":{"name":"Internetware '13: The Fifth Asia-Pacific Symposium on Internetware","sponsor":["NJU Nanjing University","CCF China Computer Federation","Chinese Academy of Sciences"],"location":"Changsha China","acronym":"Internetware '13"},"container-title":["Proceedings of the 5th Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2532443.2532448","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2532443.2532448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:51Z","timestamp":1750277691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2532443.2532448"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,23]]},"references-count":38,"alternative-id":["10.1145\/2532443.2532448","10.1145\/2532443"],"URL":"https:\/\/doi.org\/10.1145\/2532443.2532448","relation":{},"subject":[],"published":{"date-parts":[[2013,10,23]]},"assertion":[{"value":"2013-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}