{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:50:08Z","timestamp":1729666208909,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/re.2015.7320418","type":"proceedings-article","created":{"date-parts":[[2015,11,5]],"date-time":"2015-11-05T22:57:15Z","timestamp":1446764235000},"page":"156-165","source":"Crossref","is-referenced-by-count":31,"title":["Resolving goal conflicts via argumentation-based analysis of competing hypotheses"],"prefix":"10.1109","author":[{"given":"Pradeep K.","family":"Murukannaiah","sequence":"first","affiliation":[]},{"given":"Anup K.","family":"Kalia","sequence":"additional","affiliation":[]},{"given":"Pankaj R.","family":"Telangy","sequence":"additional","affiliation":[]},{"given":"Munindar P.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","first-page":"1551","article-title":"Formal trust model for multiagent systems","author":"wang","year":"2007","journal-title":"Proc IJCAI"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1609\/aaai.v27i1.8552","article-title":"Hypothesis exploration for malware detection using planning","author":"sohrabi","year":"2013","journal-title":"Proc AAAI"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-010-9154-1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511802034"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"journal-title":"PARC AI Team","article-title":"ACH1.1: A tool for analyzing competing hypotheses","year":"2005","key":"ref13"},{"article-title":"Carneades tools for argument (re)construction, evaluation, mapping and interchange","year":"2014","author":"gordon","key":"ref14"},{"article-title":"Mathematical Models in Social Sciences","year":"1972","author":"kemeny","key":"ref15"},{"key":"ref16","first-page":"337","article-title":"Detecting conflicts between functional and security requirements with secure Tropos: John Rusnak and the Allied Irish Bank","author":"massacci","year":"2011","journal-title":"Social Modeling for Requirements Engineering"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75563-0_26"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-007-0056-y"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.24"},{"key":"ref28","article-title":"Extending Heuer's analysis of competing hypotheses method to support complex decision analysis","author":"valtorta","year":"2005","journal-title":"Proceedings of the International Conference on Intelligence Analysis"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/225014.225037"},{"key":"ref27","first-page":"12","article-title":"Structured analysis of competing hypotheses: Improving a tested intelligence methodology","volume":"9","author":"wheaton","year":"2006","journal-title":"Competitive Intelligence Magazine"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1990.63633"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11229-006-9156-3"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10849-005-9010-x"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1145\/75200.75232","article-title":"Integrating multiple specifications using domain goals","volume":"14","author":"robinson","year":"1989","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-008-9080-9"},{"article-title":"Structured Analytic Techniques for Intelligence Analysis","year":"2014","author":"heuer","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1998.671112"},{"article-title":"Engineering Psychology and Human Performance","year":"2000","author":"wickens","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/32.730542"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2012.12.004"},{"key":"ref22","first-page":"245","article-title":"Resolving goal conflicts via negotiation","author":"sycara","year":"1988","journal-title":"Proc AAAI"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.14"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1145\/860575.860717","article-title":"Argumentation based decision making for autonomous agents","author":"kakas","year":"2003","journal-title":"Proc AAMAS"},{"key":"ref23","first-page":"309","article-title":"Xipho: Extending Tropos to engineer context-aware personal agents","author":"murukannaiah","year":"2014","journal-title":"Proc AAMAS"},{"key":"ref26","first-page":"126","article-title":"Analysis of competing hypotheses using subjective logic","author":"pope","year":"2005","journal-title":"Proc of ICCRTS"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31724-8_50"}],"event":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","start":{"date-parts":[[2015,8,24]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2015,8,28]]}},"container-title":["2015 IEEE 23rd International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7310793\/7320393\/07320418.pdf?arnumber=7320418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T07:51:06Z","timestamp":1718178666000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7320418\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/re.2015.7320418","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}