{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T11:43:12Z","timestamp":1770464592951,"version":"3.49.0"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T00:00:00Z","timestamp":1659052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMOD Rec."],"published-print":{"date-parts":[[2022,7,29]]},"abstract":"<jats:p>Implicit Requirements (IMR) identification is part of the Requirements Engineering (RE) phase in Software Engineering during which data is gathered to create SRS (Software Requirements Specifications) documents. As opposed to explicit requirements clearly stated, IMRs constitute subtle data and need to be inferred. Research has shown that IMRs are crucial to the success of software development. Many software systems can encounter failures due to lack of IMR data management. SRS documents are large, often hundreds of pages, due to which manually identifying IMRs by human software engineers is not feasible. Moreover, such data is evergrowing due to the expansion of software systems. It is thus important to address the crucial issue of IMR data management. This article presents a survey on IMRs in SRS documents with the definition and overview of IMR data, detailed taxonomy of IMRs with explanation and examples, practices in managing IMR data, and tools for IMR identification. In addition to reviewing classical and state-of-the-art approaches, we highlight trends and challenges and point out open issues for future research. This survey article is interesting based on data quality, hidden information retrieval, veracity and salience, and knowledge discovery from large textual documents with complex heterogeneous data.<\/jats:p>","DOI":"10.1145\/3552490.3552494","type":"journal-article","created":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T18:51:29Z","timestamp":1659120689000},"page":"18-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Management of Implicit Requirements Data in Large SRS Documents"],"prefix":"10.1145","volume":"51","author":[{"given":"Dev","family":"Dave","sequence":"first","affiliation":[{"name":"Montclair State University, NJ, USA"}]},{"given":"Angelica","family":"Celestino","sequence":"additional","affiliation":[{"name":"Montclair State University, NJ, USA"}]},{"given":"Aparna S.","family":"Varde","sequence":"additional","affiliation":[{"name":"Montclair State University, NJ, USA"}]},{"given":"Vaibhav","family":"Anu","sequence":"additional","affiliation":[{"name":"Montclair State University, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,7,29]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Naming the pain in requirements engineering. Empirical software engineering, 22(5):2298--2338","author":"Fernandez D. M.","year":"2017","unstructured":"D. M. Fernandez , S. Wagner , M. Kalinowski , M. Felderer , P. Mafra , A. Vetro , T. Conte , M.-T. Christiansson , D. Greer , C. Lassenius , Naming the pain in requirements engineering. Empirical software engineering, 22(5):2298--2338 , 2017 . D. M. Fernandez, S. Wagner, M. Kalinowski, M. Felderer, P. Mafra, A. Vetro, T. Conte, M.-T. Christiansson, D. Greer, C. Lassenius, et al. Naming the pain in requirements engineering. Empirical software engineering, 22(5):2298--2338, 2017."},{"key":"e_1_2_1_2_1","first-page":"172","volume-title":"REFSQ","author":"Daramola O.","year":"2012","unstructured":"O. Daramola , T. Moser , G. Sindre , and S. Bi . Managing implicit requirements using semantic casebased reasoning . In REFSQ , Springer LNCS , pages 7915: 172 -- 178 , 03 2012 . O. Daramola, T. Moser, G. Sindre, and S. Bi. Managing implicit requirements using semantic casebased reasoning. In REFSQ, Springer LNCS, pages 7915:172--178, 03 2012."},{"key":"e_1_2_1_3_1","volume-title":"Fulbright Scholarship Program, Dept. of Comp. Sc.","author":"Emebo O.","year":"2016","unstructured":"O. Emebo and A. Varde . Early identification of implicit requirements with the cotir approach using common sense, ontology and text mining. Technical report , Fulbright Scholarship Program, Dept. of Comp. Sc. , Montclair State Univ. , NJ , 2016 . O. Emebo and A. Varde. Early identification of implicit requirements with the cotir approach using common sense, ontology and text mining. Technical report, Fulbright Scholarship Program, Dept. of Comp. Sc., Montclair State Univ., NJ, 2016."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77243-1_8"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/088395196118515"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22714-1_4"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815021.2815032"},{"key":"e_1_2_1_8_1","first-page":"146","volume-title":"CSREA Press Intl. Conf. on Data Mining","author":"Emebo O.","year":"2016","unstructured":"O. Emebo and A. Varde . Common sense knowledge, ontology and text mining for implicit requirements . In CSREA Press Intl. Conf. on Data Mining , pages 146 - 152 , 2016 . O. Emebo and A. Varde. Common sense knowledge, ontology and text mining for implicit requirements. In CSREA Press Intl. Conf. on Data Mining, pages 146- 152, 2016."},{"key":"e_1_2_1_9_1","first-page":"6169","volume-title":"IEEE Intl. Conf. on Big Data","author":"Emebo O.","year":"2019","unstructured":"O. Emebo , V. K. Anu , and A. S. Varde . Identifying implicit requirements in SRS big data . In IEEE Intl. Conf. on Big Data , pages 6169 -- 6171 , 2019 . O. Emebo, V. K. Anu, and A. S. Varde. Identifying implicit requirements in SRS big data. In IEEE Intl. Conf. on Big Data, pages 6169--6171, 2019."},{"key":"e_1_2_1_10_1","volume-title":"Data Science for Business: What you need to know about data mining and dataanalytic thinking","author":"Provost F.","year":"2013","unstructured":"F. Provost and T. Fawcett . Data Science for Business: What you need to know about data mining and dataanalytic thinking . O'Reilly Media, Inc. , 2013 . F. Provost and T. Fawcett. Data Science for Business: What you need to know about data mining and dataanalytic thinking. O'Reilly Media, Inc., 2013."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11322"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11948148_40"},{"issue":"3","key":"e_1_2_1_13_1","first-page":"43","article-title":"Towards a domain independent platform for data cleaning","volume":"34","author":"Arasu A.","year":"2011","unstructured":"A. Arasu , S. Chaudhuri , Z. Chen , K. Ganjam , R. Kaushik , and V. R. Narasayya . Towards a domain independent platform for data cleaning . IEEE Data Eng. Bulletin , 34 ( 3 ): 43 -- 50 , 2011 . A. Arasu, S. Chaudhuri, Z. Chen, K. Ganjam, R. Kaushik, and V. R. Narasayya. Towards a domain independent platform for data cleaning. IEEE Data Eng. Bulletin, 34(3):43--50, 2011.","journal-title":"IEEE Data Eng. Bulletin"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3186967"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1129"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2020.100588"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1951365.1951433"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366424.3383552"},{"issue":"1","key":"e_1_2_1_19_1","first-page":"3","article-title":"Ml-in-databases: Assessment and prognosis","volume":"44","author":"Kraska T.","year":"2021","unstructured":"T. Kraska , U. F. Minhas , T. Neumann , O. Papaemmanouil , J. M. Patel , C. Re , and M. Stonebraker . Ml-in-databases: Assessment and prognosis . IEEE Data Engineering Bulletin , 44 ( 1 ): 3 , 2021 . T. Kraska, U. F. Minhas, T. Neumann, O. Papaemmanouil, J. M. Patel, C. Re, and M. Stonebraker. Ml-in-databases: Assessment and prognosis. IEEE Data Engineering Bulletin, 44(1):3, 2021.","journal-title":"IEEE Data Engineering Bulletin"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01853-4_24"},{"key":"e_1_2_1_21_1","first-page":"01","article-title":"Inadequate requirements engineering process: A key factor for poor software development in developing nations: A case study. International Journal of Computer and Information Engineering","author":"Adu M.","year":"2014","unstructured":"M. Adu . Inadequate requirements engineering process: A key factor for poor software development in developing nations: A case study. International Journal of Computer and Information Engineering , IJCIT , 01 2014 . M. Adu. Inadequate requirements engineering process: A key factor for poor software development in developing nations: A case study. International Journal of Computer and Information Engineering, IJCIT, 01 2014.","journal-title":"IJCIT"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2017.82"},{"key":"e_1_2_1_23_1","volume-title":"ACM-IEEE Intl. Symp. on Empirical Software Engineering & Measurement, ESEM, page.","author":"Riaz M.","unstructured":"M. Riaz , J. Slankas , J. T. King , and L. A. Williams . Using templates to elicit implied security requirements from functional requirements - a controlled experiment . In ACM-IEEE Intl. Symp. on Empirical Software Engineering & Measurement, ESEM, page. M. Riaz, J. Slankas, J. T. King, and L. A. Williams. Using templates to elicit implied security requirements from functional requirements - a controlled experiment. In ACM-IEEE Intl. Symp. on Empirical Software Engineering & Measurement, ESEM, page."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.04.005"},{"key":"e_1_2_1_25_1","volume-title":"JSS","author":"Jie-Cherng Chen S.-J. H.","year":"2019","unstructured":"S.-J. H. Jie-Cherng Chen . An empirical analysis of the impact of software development problem factors on software maintainability. The Journal of Systems and Software , JSS , 2019 . S.-J. H. Jie-Cherng Chen. An empirical analysis of the impact of software development problem factors on software maintainability. The Journal of Systems and Software, JSS, 2019."},{"key":"e_1_2_1_26_1","first-page":"1183","volume-title":"ACM Symp. on Applied Computing, SAC","author":"Penzenstadler B.","year":"2013","unstructured":"B. Penzenstadler . Towards a definition of sustainability in and for software engineering . In ACM Symp. on Applied Computing, SAC , pages 28: 1183 - 1185 , 2013 . B. Penzenstadler. Towards a definition of sustainability in and for software engineering. In ACM Symp. on Applied Computing, SAC, pages 28:1183- 1185, 2013."},{"key":"e_1_2_1_27_1","volume-title":"WCECS Conference","author":"Emebo O.","year":"2018","unstructured":"O. Emebo , O. Daramola , and C. K. Ayo . Promirar: Tool for identifying and managing implicit requirements in SRS documents . In WCECS Conference , 2018 . O. Emebo, O. Daramola, and C. K. Ayo. Promirar: Tool for identifying and managing implicit requirements in SRS documents. In WCECS Conference, 2018."},{"key":"e_1_2_1_28_1","volume-title":"International Journ. of Engineering Education","author":"Hey J.","year":"2008","unstructured":"J. Hey , J. Linsey , A. Agogino , and K. Wood . Analogies and metaphors in creative design . International Journ. of Engineering Education , 2008 . J. Hey, J. Linsey, A. Agogino, and K. Wood. Analogies and metaphors in creative design. International Journ. of Engineering Education, 2008."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/359784.359836"},{"key":"e_1_2_1_30_1","volume-title":"SAFECOMP","author":"Arts T.","year":"2014","unstructured":"T. Arts , M. Dorigatti , and S. Tonetta . Making implicit safety requirements explicit - an autosar safety case . In SAFECOMP , 2014 . T. Arts, M. Dorigatti, and S. Tonetta. Making implicit safety requirements explicit - an autosar safety case. In SAFECOMP, 2014."},{"key":"e_1_2_1_31_1","first-page":"1","volume-title":"IEEE RCIS","author":"Onyeka E.","year":"2013","unstructured":"E. Onyeka . A process framework for managing implicit requirements using analogy-based reasoning . IEEE RCIS , pages 1 -- 5 , 2013 . E. Onyeka. A process framework for managing implicit requirements using analogy-based reasoning. IEEE RCIS, pages 1--5, 2013."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswax.2019.100001"},{"key":"e_1_2_1_33_1","first-page":"935","volume-title":"IEEE Intl. Conf. on Tools with Artificial Intelligence, ICTAI","author":"Emebo O.","year":"2020","unstructured":"O. Emebo , A. Varde , V. Anu , N. Tandon , and O. Daramola . Using commonsense knowledge and text mining for implicit requirements localization . In IEEE Intl. Conf. on Tools with Artificial Intelligence, ICTAI , pages 935 -- 940 , 2020 . O. Emebo, A. Varde, V. Anu, N. Tandon, and O. Daramola. Using commonsense knowledge and text mining for implicit requirements localization. In IEEE Intl. Conf. on Tools with Artificial Intelligence, ICTAI, pages 935--940, 2020."},{"key":"e_1_2_1_34_1","volume-title":"Analysing the assumed benefits of software requirements. arXiv:1305.3853","author":"Ellis-Braithwaite R.","year":"2013","unstructured":"R. Ellis-Braithwaite . Analysing the assumed benefits of software requirements. arXiv:1305.3853 , 2013 . R. Ellis-Braithwaite. Analysing the assumed benefits of software requirements. arXiv:1305.3853, 2013."},{"key":"e_1_2_1_35_1","first-page":"36164","article-title":"Asif, Muhammad, et al","volume":"7","year":"2019","unstructured":"\" Asif, Muhammad, et al . \" Annotation of Software Requirements Specification (SRS), Extractions of Nonfunctional Requirements, and Measurement of Their Tradeoff.\" IEEE Access , vol. 7 , 2019 , pp. 36164 -- 36176 ., doi:10.1109\/access.2019.2903133.\". 10.1109\/access.2019.2903133 \"Asif, Muhammad, et al. \"Annotation of Software Requirements Specification (SRS), Extractions of Nonfunctional Requirements, and Measurement of Their Tradeoff.\" IEEE Access, vol. 7, 2019, pp. 36164--36176., doi:10.1109\/access.2019.2903133.\".","journal-title":"Annotation of Software Requirements Specification (SRS), Extractions of Nonfunctional Requirements, and Measurement of Their Tradeoff.\" IEEE Access"},{"key":"e_1_2_1_36_1","volume-title":"Dept. of Comp. Sc.","author":"Anu V.","year":"2020","unstructured":"V. Anu and A. Varde . Using commonsense knowledge and deep-learning based text mining to identify implicit software requirements. Technical report , Dept. of Comp. Sc. , Montclair State Univ. , NJ , July 2020 . V. Anu and A. Varde. Using commonsense knowledge and deep-learning based text mining to identify implicit software requirements. Technical report, Dept. of Comp. Sc., Montclair State Univ., NJ, July 2020."},{"key":"e_1_2_1_37_1","volume-title":"Department of Computer Science","author":"Varde A.","year":"2021","unstructured":"A. Varde and V. Anu . An integrated architecture of deep learning based approaches to identify implicit requirements during software engineering. Technical report , Department of Computer Science , Montclair State University , April 2021 . A. Varde and V. Anu. An integrated architecture of deep learning based approaches to identify implicit requirements during software engineering. Technical report, Department of Computer Science, Montclair State University, April 2021."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378181"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54623-6_12"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-018-0507-8"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3452822"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3186549.3186562"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441664"}],"container-title":["ACM SIGMOD Record"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3552490.3552494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3552490.3552494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:45:12Z","timestamp":1750268712000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3552490.3552494"}},"subtitle":["Taxonomy and Techniques"],"short-title":[],"issued":{"date-parts":[[2022,7,29]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,7,29]]}},"alternative-id":["10.1145\/3552490.3552494"],"URL":"https:\/\/doi.org\/10.1145\/3552490.3552494","relation":{},"ISSN":["0163-5808"],"issn-type":[{"value":"0163-5808","type":"print"}],"subject":[],"published":{"date-parts":[[2022,7,29]]},"assertion":[{"value":"2022-07-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}