{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T02:51:28Z","timestamp":1774579888154,"version":"3.50.1"},"reference-count":18,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T00:00:00Z","timestamp":1410912000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2014,9,17]]},"abstract":"<jats:p>Two requirements specifications were analyzed using three requirements analysis tools: a reconstruction of NASA's ARM tool, TIGER Pro 2.0, and a new tool. The new tool being beta-tested reported many more true positives than TIGER Pro 2.0, which in turn reported many more true positives than the ARM reconstruction. However, using its default settings, the new tool raised many false positives, which resulted in unacceptably low values for precision. Feedback has been provided to the company developing the new tool. Lessons learned about beta-testing and requirements analysis tools are described.<\/jats:p>","DOI":"10.1145\/2659118.2659128","type":"journal-article","created":{"date-parts":[[2014,9,19]],"date-time":"2014-09-19T12:27:17Z","timestamp":1411129637000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Beta-testing a requirements analysis tool"],"prefix":"10.1145","volume":"39","author":[{"given":"Andrew","family":"Brooks","sequence":"first","affiliation":[{"name":"University of Minnesota Duluth, Duluth, MN"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Laura","family":"Krebs","sequence":"additional","affiliation":[{"name":"University of Minnesota Duluth, Duluth, MN"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Brandon","family":"Paulsen","sequence":"additional","affiliation":[{"name":"University of Minnesota Duluth, Duluth, MN"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2014,9,17]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Computer Hope online dictionary. http:\/\/www.computerhope.com\/jargon\/b\/beta.htm. Accessed July 16 2014.  Computer Hope online dictionary. http:\/\/www.computerhope.com\/jargon\/b\/beta.htm. Accessed July 16 2014."},{"key":"e_1_2_1_2_1","unstructured":"Guide to the Software Engineering Body of Knowledge (SWEBOK) CHAPTER 11 SOFTWARE QUALITY. http:\/\/www.computer.org\/portal\/web\/swebok\/html\/ch11. Accessed July 16 2014.  Guide to the Software Engineering Body of Knowledge (SWEBOK) CHAPTER 11 SOFTWARE QUALITY. http:\/\/www.computer.org\/portal\/web\/swebok\/html\/ch11. Accessed July 16 2014."},{"key":"e_1_2_1_3_1","unstructured":"Guide to the Software Engineering Body of Knowledge (SWEBOK) CHAPTER 5 SOFTWARE TESTING. http:\/\/www.computer.org\/portal\/web\/swebok\/html\/ch5. Accessed July 16 2014.  Guide to the Software Engineering Body of Knowledge (SWEBOK) CHAPTER 5 SOFTWARE TESTING. http:\/\/www.computer.org\/portal\/web\/swebok\/html\/ch5. Accessed July 16 2014."},{"key":"e_1_2_1_4_1","unstructured":"The NLRP Benchmark Homepage. http:\/\/nlrp.ipd.kit.edu\/index.php\/Main_Page. Accessed July 16 2014.  The NLRP Benchmark Homepage. http:\/\/nlrp.ipd.kit.edu\/index.php\/Main_Page. Accessed July 16 2014."},{"key":"e_1_2_1_5_1","unstructured":"QuARS Quality Analyzer for Requirement Specifications Version 4.1. http:\/\/quars.isti.cnr.it\/index.html. Accessed July 16 2014.  QuARS Quality Analyzer for Requirement Specifications Version 4.1. http:\/\/quars.isti.cnr.it\/index.html. Accessed July 16 2014."},{"key":"e_1_2_1_6_1","unstructured":"Reconstructed ARM tool. http:\/\/www.kuwatche.com\/ARM.html. Accessed July 16 2014.  Reconstructed ARM tool. http:\/\/www.kuwatche.com\/ARM.html. Accessed July 16 2014."},{"key":"e_1_2_1_7_1","unstructured":"Stylewriter version 4. http:\/\/www.stylewriter-usa.com\/. Accessed July 16 2014.  Stylewriter version 4. http:\/\/www.stylewriter-usa.com\/. Accessed July 16 2014."},{"key":"e_1_2_1_8_1","unstructured":"Tiger Pro:- Tool to Ingest and Elucidate Requirements. http:\/\/www.therightrequirement.com  Tiger Pro:- Tool to Ingest and Elucidate Requirements. http:\/\/www.therightrequirement.com"},{"key":"e_1_2_1_9_1","unstructured":"Volere's list of requirements management tools. http:\/\/www.volere.co.uk\/tools.htm. Accessed July 16 2014.  Volere's list of requirements management tools. http:\/\/www.volere.co.uk\/tools.htm. Accessed July 16 2014."},{"key":"e_1_2_1_10_1","unstructured":"warc-tools Legacy code for handling ISO WARC files. https:\/\/code.google.com\/p\/warc-tools\/. Accessed July 16 2014.  warc-tools Legacy code for handling ISO WARC files. https:\/\/code.google.com\/p\/warc-tools\/. Accessed July 16 2014."},{"key":"e_1_2_1_11_1","unstructured":"D. M. Berry E. Kamsties and M. M. Krieger. From contract drafting to software specification: Linguistic sources of ambiguity. https:\/\/cs.uwaterloo.ca\/~dberry\/handbook\/ambiguityHandbook.pdf 2003. Accessed July 16 2014.  D. M. Berry E. Kamsties and M. M. Krieger. From contract drafting to software specification: Linguistic sources of ambiguity. https:\/\/cs.uwaterloo.ca\/~dberry\/handbook\/ambiguityHandbook.pdf 2003. Accessed July 16 2014."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646374"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-013-0225-8"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-007-9045-3"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0195-3"},{"key":"e_1_2_1_16_1","volume-title":"University of Nottingham","author":"Tjong S. F.","year":"2006"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37422-7_6"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/253228.253258"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659118.2659128","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2659118.2659128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:26Z","timestamp":1750227206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659118.2659128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,17]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,9,17]]}},"alternative-id":["10.1145\/2659118.2659128"],"URL":"https:\/\/doi.org\/10.1145\/2659118.2659128","relation":{},"ISSN":["0163-5948"],"issn-type":[{"value":"0163-5948","type":"print"}],"subject":[],"published":{"date-parts":[[2014,9,17]]},"assertion":[{"value":"2014-09-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}