{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T13:54:52Z","timestamp":1769262892707,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T00:00:00Z","timestamp":1550102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science and Engineering Research Board, DST, India","award":["ECR\/2016\/001347"],"award-info":[{"award-number":["ECR\/2016\/001347"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,14]]},"DOI":"10.1145\/3299771.3299774","type":"proceedings-article","created":{"date-parts":[[2019,2,8]],"date-time":"2019-02-08T13:27:45Z","timestamp":1549632465000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["An Approach to Identify Use Case Scenarios from Textual Requirements Specification"],"prefix":"10.1145","author":[{"given":"Saurabh","family":"Tiwari","sequence":"first","affiliation":[{"name":"DA-IICT, Gandhinagar, India and M\u00e4lardalen University, Sweden"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Deepti","family":"Ameta","sequence":"additional","affiliation":[{"name":"DA-IICT, Gandhinagar, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Asim","family":"Banerjee","sequence":"additional","affiliation":[{"name":"DA-IICT, Gandhinagar, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2019,2,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/647646.731122"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.04.005"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-1289-3"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/568760.568785"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646158.680012"},{"key":"e_1_3_2_1_6_1","volume-title":"what, when, where, how, and why: the ingredients in the recipe for a successful Methods section. Clinical chemistry 56, 6","author":"Annesley Thomas M","year":"2010","unstructured":"Thomas M Annesley. 2010. Who, what, when, where, how, and why: the ingredients in the recipe for a successful Methods section. Clinical chemistry 56, 6 (2010), 897--901."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2428709"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320403"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/647157.717265"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/557126"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.506460"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-012-0154-3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.77"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/517669"},{"key":"e_1_3_2_1_15_1","first-page":"211","article-title":"An Experiment in Inspecting the Quality of Use Case Descriptions","volume":"36","author":"Cox Karl","year":"2004","unstructured":"Karl Cox, Aybuke Aurum, and Ross Jeffery. 2004. An Experiment in Inspecting the Quality of Use Case Descriptions. Journal of Research and Practice in Information Technology 36, 4 (2004), 211--229.","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"e_1_3_2_1_16_1","volume-title":"Dekkers","author":"de Bruijn Fabian","year":"2010","unstructured":"Fabian de Bruijn and Hans L. Dekkers. 2010. Ambiguity in Natural Language Software Requirements: A Case Study. Springer Berlin Heidelberg, 233--247."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0135-y"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/209227.209231"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-003-0174-0"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008617922496"},{"key":"e_1_3_2_1_21_1","volume-title":"Anthony Paul Cowie, and J Windsor Lewis","author":"Hornby Albert Sydney","year":"1974","unstructured":"Albert Sydney Hornby, Anthony Paul Cowie, and J Windsor Lewis. 1974. Oxford advanced learner's dictionary of current English. Vol. 4. Oxford university press London."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/107216"},{"key":"e_1_3_2_1_23_1","volume-title":"An automatic tool for the analysis of natural language requirements. Informe t\u00e9cnico","author":"Lami Giuseppe","year":"2004","unstructured":"Giuseppe Lami, Stefania Gnesi, Fabrizio Fabbrini, Mario Fusani, and Gianluca Trentanni. 2004. An automatic tool for the analysis of natural language requirements. Informe t\u00e9cnico, CNR Information Science and Technology Institute, Pisa, Italia, Setiembre (2004)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","unstructured":"Soren Lauesen. 2002. Software requirements: styles and techniques. Pearson Education.","DOI":"10.5555\/773258"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/850944.853124"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-007-9023-6"},{"key":"e_1_3_2_1_27_1","volume-title":"Berry","author":"Popescu Daniel","year":"2008","unstructured":"Daniel Popescu, Spencer Rugaber, Nenad Medvidovic, and Daniel M. Berry. 2008. Innovations for Requirement Analysis. From Stakeholders' Needs to Formal Designs. Springer-Verlag, Chapter Reducing Ambiguities in Requirements Specifications Via Automatically Created Object-Oriented Models, 103--124."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0142-z"},{"key":"e_1_3_2_1_29_1","volume-title":"2016 IEEE 24th International Requirements Engineering Conference (RE). 196--205","author":"Robeer Marcel","unstructured":"Marcel Robeer, Garm Lucassen, Jan Martijn EM van der Werf, Fabiano Dalpiaz, and Sjaak Brinkkemper. 2016. Automated Extraction of Conceptual Models from User Stories via NLP. In 2016 IEEE 24th International Requirements Engineering Conference (RE). 196--205."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(97)86223-4"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.32"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.19"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970323"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590748.2590754"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.06.004"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/3138884.3139033"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2017.39"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.730542"},{"key":"e_1_3_2_1_40_1","volume-title":"Oxford Advanced Learner's Dictionary of Current English: AS Hornby","author":"Wehmeier Sally","unstructured":"Sally Wehmeier. 2005. Oxford Advanced Learner's Dictionary of Current English: AS Hornby. Oxford University."},{"key":"e_1_3_2_1_41_1","first-page":"17","article-title":"Software Requirements Engineering: What, Why, Who, When, and How. Software Quality Professional","volume":"7","author":"Westfall Linda","year":"2005","unstructured":"Linda Westfall. 2005. Software Requirements Engineering: What, Why, Who, When, and How. Software Quality Professional, ASQ 7, 4 (2005), 17--26.","journal-title":"ASQ"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/253228.253258"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430536.2430539"}],"event":{"name":"ISEC'19: 12th Innovations in Software Engineering Conference","location":"Pune India","acronym":"ISEC'19","sponsor":["iSOFT iSOFT","ACM Association for Computing Machinery","Microsoft Microsoft","ACM India ACM India"]},"container-title":["Proceedings of the 12th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299771.3299774","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3299771.3299774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:12Z","timestamp":1750206372000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299771.3299774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,14]]},"references-count":43,"alternative-id":["10.1145\/3299771.3299774","10.1145\/3299771"],"URL":"https:\/\/doi.org\/10.1145\/3299771.3299774","relation":{},"subject":[],"published":{"date-parts":[[2019,2,14]]},"assertion":[{"value":"2019-02-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}