{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:54:15Z","timestamp":1750308855087,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,17]],"date-time":"2018-09-17T00:00:00Z","timestamp":1537142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,17]]},"DOI":"10.1145\/3266237.3266245","type":"proceedings-article","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T20:59:18Z","timestamp":1538168358000},"page":"214-219","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Correlations between invisibility and usability in ubicomp and IoT applications"],"prefix":"10.1145","author":[{"given":"Rainara Maia","family":"Carvalho","sequence":"first","affiliation":[{"name":"Universidade Federal do Cear\u00e1 - UFC, Fortaleza, Brasil"}]},{"given":"Rossana M. C.","family":"Andrade","sequence":"additional","affiliation":[{"name":"Universidade Federal do Cear\u00e1 - UFC, Fortaleza, Brasil"}]},{"given":"K\u00e1thia Mar\u00e7al","family":"de Oliveira","sequence":"additional","affiliation":[{"name":"Inform\u00e1ti\u00e7a Industrial e Humana - LAMIH - Universidade de Valenciennes et du Hainaut-Cambresis, Fran\u00e7a"}]}],"member":"320","published-online":{"date-parts":[[2018,9,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58697-7_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33260-9_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.4018\/jismd.2011040101"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2017.51"},{"key":"e_1_3_2_1_5_1","volume-title":"Catalog of Invisibility Requirements for UbiComp and IoT Applications. In 26th IEEE International Requirements Engineering Conference, RE.","author":"Carvalho Rainara M","year":"2018","unstructured":"Rainara M Carvalho , Rossana M. C. Andrade , Kathia Mar\u00e7al Oliveira , and Christophe Kolski . 2018 . Catalog of Invisibility Requirements for UbiComp and IoT Applications. In 26th IEEE International Requirements Engineering Conference, RE. Rainara M Carvalho, Rossana M. C. Andrade, Kathia Mar\u00e7al Oliveira, and Christophe Kolski. 2018. Catalog of Invisibility Requirements for UbiComp and IoT Applications. In 26th IEEE International Requirements Engineering Conference, RE."},{"volume-title":"IEEE International Conference on Research Challenges in Information Science.","author":"Carvalho Rainara Maia","key":"e_1_3_2_1_6_1","unstructured":"Rainara Maia Carvalho , Rossana M. C. Andrade , and K\u00e1thia M. Oliveira . 2018. Towards a Catalog of Conflicts for HCI Quality Characteristics in UbiComp and IoT Applications: Process and First Results . In IEEE International Conference on Research Challenges in Information Science. Rainara Maia Carvalho, Rossana M. C. Andrade, and K\u00e1thia M. Oliveira. 2018. Towards a Catalog of Conflicts for HCI Quality Characteristics in UbiComp and IoT Applications: Process and First Results. In IEEE International Conference on Research Challenges in Information Science."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.022"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-016-9320-z"},{"volume-title":"Non-functional requirements in software engineering","author":"Chung Lawrence","key":"e_1_3_2_1_9_1","unstructured":"Lawrence Chung , Brian A Nixon , Eric Yu , and John Mylopoulos . 2000. Non-functional requirements in software engineering . Springer Science & Business Media . Lawrence Chung, Brian A Nixon, Eric Yu, and John Mylopoulos. 2000. Non-functional requirements in software engineering. Springer Science & Business Media."},{"key":"e_1_3_2_1_10_1","first-page":"107","volume-title":"WER.","author":"Cysneiros Luiz Marcio","unstructured":"Luiz Marcio Cysneiros . 2007. Evaluating the Effectiveness of Using Catalogues to Elicit Non-Functional Requirements . In WER. pp. 107 -- 115 . Luiz Marcio Cysneiros. 2007. Evaluating the Effectiveness of Using Catalogues to Elicit Non-Functional Requirements. In WER. pp. 107--115."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481328"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.40"},{"key":"e_1_3_2_1_13_1","volume-title":"Basics of Qualitative Research: Techniques and procedures for developing grounded theory","author":"Sage Gorbin H.","unstructured":"H. Sage Gorbin , M, Strauss. 2008. Basics of Qualitative Research: Techniques and procedures for developing grounded theory . ( 3 rd ed.). Sage Publications . H.Sage Gorbin, M, Strauss. 2008. Basics of Qualitative Research: Techniques and procedures for developing grounded theory. (3rd ed.). Sage Publications.","edition":"3"},{"key":"e_1_3_2_1_15_1","unstructured":"ISO\/IEC 25010. 2011. Systems and software engineering --- Systems and software Quality Requirements and Evaluation (SQuaRE) --- System and software quality models.  ISO\/IEC 25010. 2011. Systems and software engineering --- Systems and software Quality Requirements and Evaluation (SQuaRE) --- System and software quality models."},{"key":"e_1_3_2_1_16_1","unstructured":"ISO\/IEC 27000. 2016. Information technology --- Security techniques --- Information security management systems --- Overview and vocabulary.  ISO\/IEC 27000. 2016. Information technology --- Security techniques --- Information security management systems --- Overview and vocabulary."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1568199.1568214"},{"key":"e_1_3_2_1_18_1","volume-title":"International Conference on Evaluation of Novel Approaches to Software Engineering.","author":"Mairiza Dewi","year":"2010","unstructured":"Dewi Mairiza and Didar Zowghi . 2010 . Constructing a Catalogue of Conflicts among Non-functional Requirements . In International Conference on Evaluation of Novel Approaches to Software Engineering. Dewi Mairiza and Didar Zowghi. 2010. Constructing a Catalogue of Conflicts among Non-functional Requirements. In International Conference on Evaluation of Novel Approaches to Software Engineering."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2015.7346717"},{"volume-title":"Pervasive computing: A paradigm for the 21st century","author":"Saha Debashis","key":"e_1_3_2_1_20_1","unstructured":"Debashis Saha and Amitava Mukherjee . 2003. Pervasive computing: A paradigm for the 21st century . IEEE Comput. Soc . Debashis Saha and Amitava Mukherjee. 2003. Pervasive computing: A paradigm for the 21st century. IEEE Comput. Soc."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.1316826"},{"key":"e_1_3_2_1_22_1","unstructured":"Milene Serrano. 2013. Ubiquitous Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue Objectives of Research. In ER@ BR.  Milene Serrano. 2013. Ubiquitous Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue Objectives of Research. In ER@ BR."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078833"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.03.005"},{"key":"e_1_3_2_1_25_1","unstructured":"Jean-Philippe Vasseur and Adam Dunkels. 2010. Interconnecting Smart Objects with IP. Morgan Kaufmann.   Jean-Philippe Vasseur and Adam Dunkels. 2010. Interconnecting Smart Objects with IP. Morgan Kaufmann."},{"key":"e_1_3_2_1_26_1","unstructured":"Karl Wiegers and Joy Beatty. 2013. Software requirements. Pearson Education.   Karl Wiegers and Joy Beatty. 2013. Software requirements. Pearson Education."},{"volume-title":"Experimentation in software engineering","author":"Wohlin Claes","key":"e_1_3_2_1_27_1","unstructured":"Claes Wohlin , Per Runeson , Martin H\u00f6st , Magnus C Ohlsson , Bj\u00f6rn Regnell , and Anders Wessl\u00e9n . 2012. Experimentation in software engineering . Springer Science & Business Media . Claes Wohlin, Per Runeson, Martin H\u00f6st, Magnus C Ohlsson, Bj\u00f6rn Regnell, and Anders Wessl\u00e9n. 2012. Experimentation in software engineering. Springer Science & Business Media."},{"key":"e_1_3_2_1_28_1","unstructured":"Google Sign-In. Retrieved February 26 2018 from https:\/\/developers.google.com\/identity\/sign-in\/android\/  Google Sign-In. Retrieved February 26 2018 from https:\/\/developers.google.com\/identity\/sign-in\/android\/"},{"key":"e_1_3_2_1_29_1","unstructured":"Facebook Login & Account Kit. Retrieved February 26 2018 from https:\/\/developers.facebook.com\/products\/account-creation  Facebook Login & Account Kit. Retrieved February 26 2018 from https:\/\/developers.facebook.com\/products\/account-creation"},{"key":"e_1_3_2_1_30_1","unstructured":"Smart Lock for Passwords on Android. Retrieved February 26 2018 from https:\/\/developers.google.com\/identity\/smartlock-passwords\/android\/  Smart Lock for Passwords on Android. Retrieved February 26 2018 from https:\/\/developers.google.com\/identity\/smartlock-passwords\/android\/"}],"event":{"name":"SBES '18: XXXII BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING","acronym":"SBES '18","location":"Sao Carlos Brazil"},"container-title":["Proceedings of the XXXII Brazilian Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3266237.3266245","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3266237.3266245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:14:52Z","timestamp":1750281292000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3266237.3266245"}},"subtitle":["partial results"],"short-title":[],"issued":{"date-parts":[[2018,9,17]]},"references-count":29,"alternative-id":["10.1145\/3266237.3266245","10.1145\/3266237"],"URL":"https:\/\/doi.org\/10.1145\/3266237.3266245","relation":{},"subject":[],"published":{"date-parts":[[2018,9,17]]},"assertion":[{"value":"2018-09-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}