{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:17:01Z","timestamp":1764937021817,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,17]],"date-time":"2018-09-17T00:00:00Z","timestamp":1537142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004586","name":"Funda\u00e7\u00e3o Carlos Chagas Filho de Amparo \u00e0 Pesquisa do Estado do Rio de Janeiro","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004586","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","award":["88887.165550\/2018-00"],"award-info":[{"award-number":["88887.165550\/2018-00"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,17]]},"DOI":"10.1145\/3266237.3266269","type":"proceedings-article","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T20:59:18Z","timestamp":1538168358000},"page":"102-111","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["NFRfinder"],"prefix":"10.1145","author":[{"given":"Roxana L. Q.","family":"Portugal","sequence":"first","affiliation":[{"name":"PUC-Rio, Brasil"}]},{"given":"Tong","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Technology, China"}]},{"given":"Lyrene","family":"Silva","sequence":"additional","affiliation":[{"name":"DIMAp, UFRN, Brasil"}]},{"given":"Eduardo","family":"Almentero","sequence":"additional","affiliation":[{"name":"UFRRJ, Brasil"}]},{"given":"Julio Cesar S.","family":"do Prado Leite","sequence":"additional","affiliation":[{"name":"PUC-Rio, Brasil"}]}],"member":"320","published-online":{"date-parts":[[2018,9,17]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/s00766-007-0045-1"},{"key":"e_1_3_2_1_2_1","first-page":"190","volume-title":"The Twenty-Third International Conference on Software Engineering and Knowledge Engineering (SEKE 11)","author":"Zhang Wen","year":"2011","unstructured":"Wen Zhang , Yang Ye , Wang Qing , and Shu Fengdi . 2011 . An empirical study on classification of non-functional requirements . In The Twenty-Third International Conference on Software Engineering and Knowledge Engineering (SEKE 11) , pp. 190 -- 195 . 2011. Wen Zhang, Yang Ye, Wang Qing, and Shu Fengdi. 2011. An empirical study on classification of non-functional requirements. In The Twenty-Third International Conference on Software Engineering and Knowledge Engineering (SEKE 11), pp. 190--195. 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/RE.2014.6912267"},{"key":"e_1_3_2_1_4_1","first-page":"506","volume-title":"Requirements Engineering Conference (RE), IEEE 25th International.","author":"Munaiah Nuthan","unstructured":"Nuthan Munaiah , Andrew Meneely , and Pradeep K. Murukannaiah . 2017. A Domain-Independent Model for Identifying Security Requirements . In Requirements Engineering Conference (RE), IEEE 25th International. pp. 506 -- 511 . Nuthan Munaiah, Andrew Meneely, and Pradeep K. Murukannaiah. 2017. A Domain-Independent Model for Identifying Security Requirements. In Requirements Engineering Conference (RE), IEEE 25th International. pp. 506--511."},{"key":"e_1_3_2_1_5_1","first-page":"388","volume-title":"Identifying Security Requirements Based on Linguistic Analysis and Machine Learning. In Asia-Pacific Software Engineering Conference (APSEC), 24th","author":"Li Tong","year":"2017","unstructured":"Tong Li . 2017 . Identifying Security Requirements Based on Linguistic Analysis and Machine Learning. In Asia-Pacific Software Engineering Conference (APSEC), 24th , pp. 388 -- 397 . Tong Li. 2017. Identifying Security Requirements Based on Linguistic Analysis and Machine Learning. In Asia-Pacific Software Engineering Conference (APSEC), 24th, pp. 388--397."},{"key":"e_1_3_2_1_6_1","first-page":"490","volume-title":"Automatically Classifying Functional and Non-functional Requirements Using Supervised Machine Learning. In Requirements Engineering Conference (RE), IEEE 25th International.","author":"Kurtanovi\u0107 Zijad","year":"2017","unstructured":"Zijad Kurtanovi\u0107 , and Walid Maalej . 2017 . Automatically Classifying Functional and Non-functional Requirements Using Supervised Machine Learning. In Requirements Engineering Conference (RE), IEEE 25th International. pp. 490 -- 495 . Zijad Kurtanovi\u0107, and Walid Maalej. 2017. Automatically Classifying Functional and Non-functional Requirements Using Supervised Machine Learning. In Requirements Engineering Conference (RE), IEEE 25th International. pp. 490--495."},{"key":"e_1_3_2_1_7_1","first-page":"152","volume-title":"Requirements Engineering, 1993., Proceedings of IEEE International Symposium.","author":"Goguen Joseph A.","year":"1993","unstructured":"Joseph A. Goguen , and Charlotte Linde . 1993 . Techniques for requirements elicitation . In Requirements Engineering, 1993., Proceedings of IEEE International Symposium. pp. 152 -- 164 . Joseph A. Goguen, and Charlotte Linde. 1993. Techniques for requirements elicitation. In Requirements Engineering, 1993., Proceedings of IEEE International Symposium. pp. 152--164."},{"key":"e_1_3_2_1_8_1","first-page":"239","volume-title":"Engineering Complex Computer Systems. IEEE International Conference.","author":"Boby George","year":"2004","unstructured":"George Boby , A. Bohner Shawn A., and Ruben Prieto-Diaz . 2004 . Software information leaks: a complexity perspective . In Engineering Complex Computer Systems. IEEE International Conference. pp. 239 -- 248 . George Boby, A. Bohner Shawn A., and Ruben Prieto-Diaz. 2004. Software information leaks: a complexity perspective. In Engineering Complex Computer Systems. IEEE International Conference. pp. 239--248."},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Track Data","year":"2018","unstructured":"RE17 Data Track . Dataset : Quality attributes (NFR). 2017 . Retrieved April 22, 2018 from: http:\/\/re2017.org\/downloads\/datasets\/nfr.arff. RE17 Data Track. Dataset: Quality attributes (NFR). 2017. Retrieved April 22, 2018 from: http:\/\/re2017.org\/downloads\/datasets\/nfr.arff."},{"unstructured":"Oliveira Romeu. 2014. A Semi-Automated Method for Elicitation of Web Accessibility Requirements. Master's thesis. DIMAp (UFRN) Natal Brasil.  Oliveira Romeu. 2014. A Semi-Automated Method for Elicitation of Web Accessibility Requirements . Master's thesis. DIMAp (UFRN) Natal Brasil.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","first-page":"107","volume-title":"Workshop on Requirements Engineering WER.","author":"Cysneiros Luiz M.","year":"2007","unstructured":"Luiz M. Cysneiros . 2007 . Evaluating the Effectiveness of Using Catalogs to Elicit Non-Functional Requirements . In Workshop on Requirements Engineering WER. pp. 107 -- 115 . Luiz M. Cysneiros. 2007. Evaluating the Effectiveness of Using Catalogs to Elicit Non-Functional Requirements. In Workshop on Requirements Engineering WER. pp. 107--115."},{"key":"e_1_3_2_1_12_1","volume-title":"Retrieved","author":"Cysneiros Luiz M.","year":"2018","unstructured":"Luiz M. Cysneiros , 2018 . Privacy Catalog - General Approach . Retrieved July 14, 2018 from http:\/\/www.math.yorku.ca\/~cysneiro\/nfrs\/privacy.htm Luiz M. Cysneiros, 2018. Privacy Catalog - General Approach. Retrieved July 14, 2018 from http:\/\/www.math.yorku.ca\/~cysneiro\/nfrs\/privacy.htm"},{"volume-title":"Retrieved","year":"2018","unstructured":"ER-PUC-Rio. 2018 . Transparency Catalog . Retrieved July 14, 2018 from http:\/\/transparencia.inf.puc-rio.br\/wiki\/index.php\/Catalogo_Transparencia. Last Access : 7\/14\/2018. ER-PUC-Rio. 2018. Transparency Catalog. Retrieved July 14, 2018 from http:\/\/transparencia.inf.puc-rio.br\/wiki\/index.php\/Catalogo_Transparencia. Last Access: 7\/14\/2018.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"284","volume-title":"Evaluation of Tools for Hairy Requirements and Software Engineering Tasks. In 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW)","author":"Berry Daniel M.","year":"2017","unstructured":"Daniel M. Berry . 2017 . Evaluation of Tools for Hairy Requirements and Software Engineering Tasks. In 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW) , pp. 284 -- 291 . Daniel M. Berry. 2017. Evaluation of Tools for Hairy Requirements and Software Engineering Tasks. In 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW), pp. 284--291."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/32.106986"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/75577.75587"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1080\/03610927608827447"},{"unstructured":"L. Chung B.A. Nixon E. Yu and J. Mylopoulos. 2012. Non-functional requirements in software engineering (Vol. 5). Springer Science & Business Media.  L. Chung B.A. Nixon E. Yu and J. Mylopoulos. 2012. Non-functional requirements in software engineering (Vol. 5). Springer Science & Business Media.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1007\/978-3-642-02463-4_7"},{"unstructured":"Thesaurus service web. Retrieved Febrary 05 2017 from: http:\/\/www.thesaurus.com  Thesaurus service web. Retrieved Febrary 05 2017 from: http:\/\/www.thesaurus.com","key":"e_1_3_2_1_20_1"},{"unstructured":"Paul Haahr Steven Baker. 2017. System and method for providing search query refinements U.S. Patent US9552388B2.  Paul Haahr Steven Baker. 2017. System and method for providing search query refinements U.S. Patent US9552388B2.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","first-page":"304","volume-title":"Requirements Engineering Conference Workshops (REW), IEEE International.","author":"Portugal R. L. Q.","unstructured":"R. L. Q. Portugal , and J. C. S. do Prado Leite, 2016. Extracting requirements patterns from software repositories . In Requirements Engineering Conference Workshops (REW), IEEE International. pp. 304 -- 307 R. L. Q. Portugal, and J. C. S. do Prado Leite, 2016. Extracting requirements patterns from software repositories. In Requirements Engineering Conference Workshops (REW), IEEE International. pp. 304--307"},{"unstructured":"Part-of-Speech Tutorial. Retrieved April 22 2018 from: https:\/\/sites.google.com\/site\/partofspeechhelp\/home\/jj_vbn.  Part-of-Speech Tutorial. Retrieved April 22 2018 from: https:\/\/sites.google.com\/site\/partofspeechhelp\/home\/jj_vbn.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","volume-title":"Retrieved","author":"Tagging Speech","year":"2014","unstructured":"Part-of- Speech Tagging and Lemmatization Manual . 2014 . Vienna Oxford International Corpus of English . Retrieved April 22, 2018 from: https:\/\/www.univie.ac.at\/voice\/page\/tagging_manual_information Part-of-Speech Tagging and Lemmatization Manual. 2014. Vienna Oxford International Corpus of English. Retrieved April 22, 2018 from: https:\/\/www.univie.ac.at\/voice\/page\/tagging_manual_information"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/3131151.3131155"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/JITRE.2015.7330171"}],"event":{"acronym":"SBES '18","name":"SBES '18: XXXII BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING","location":"Sao Carlos Brazil"},"container-title":["Proceedings of the XXXII Brazilian Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3266237.3266269","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3266237.3266269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:51Z","timestamp":1750278411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3266237.3266269"}},"subtitle":["a knowledge based strategy for mining non-functional requirements"],"short-title":[],"issued":{"date-parts":[[2018,9,17]]},"references-count":26,"alternative-id":["10.1145\/3266237.3266269","10.1145\/3266237"],"URL":"https:\/\/doi.org\/10.1145\/3266237.3266269","relation":{},"subject":[],"published":{"date-parts":[[2018,9,17]]},"assertion":[{"value":"2018-09-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}