{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:58:28Z","timestamp":1729627108190,"version":"3.28.0"},"reference-count":55,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/re.2016.56","type":"proceedings-article","created":{"date-parts":[[2016,12,5]],"date-time":"2016-12-05T21:59:25Z","timestamp":1480975165000},"page":"371-376","source":"Crossref","is-referenced-by-count":4,"title":["Empowering Requirements Elicitation Interviews with Vocal and Biofeedback Analysis"],"prefix":"10.1109","author":[{"given":"Paola","family":"Spoletini","sequence":"first","affiliation":[]},{"given":"Casey","family":"Brock","sequence":"additional","affiliation":[]},{"given":"Rahat","family":"Shahwar","sequence":"additional","affiliation":[]},{"given":"Alessio","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref39"},{"key":"ref38","article-title":"Lva-technology the illusion of lie detection","author":"lacerda","year":"2009","journal-title":"Proc FONETIK 2009"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24842-2_4"},{"key":"ref32","article-title":"An automatic tool for the analysis of natural language requirements","volume":"20","author":"gnesi","year":"2005","journal-title":"IJCSSE"},{"key":"ref31","first-page":"1","article-title":"On shared understanding in software engineering: an essay","author":"glinz","year":"2014","journal-title":"CSRD"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14192-8_20"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.53"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1037\/10735-001"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1080\/07421222.2004.11045786","article-title":"A unified model of requirements elicitation","volume":"20","author":"hickey","year":"2004","journal-title":"J Manag In! Syst"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-012-0163-2"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"179","DOI":"10.28945\/108","article-title":"Der Poll. Towards a methodology to elicit tacit domain knowledge from users","volume":"2","author":"friedrich","year":"2007","journal-title":"IJIKM"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320405"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobihealth.2014.257418"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s007660200004"},{"key":"ref22","first-page":"131","article-title":"The engagement between knowledge transfer and requirements engineering","volume":"1","author":"distanont","year":"2012","journal-title":"IJKL"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.17"},{"key":"ref24","article-title":"Vocal analysis software for security screening: Validity and deception detection potential","author":"elkins","year":"2012","journal-title":"Homeland Security Affairs Supplement"},{"journal-title":"Implicit and Explicit Affective and Motivational Consequences of Social Ambiguity Among Depressed Individuals with Anxiety","year":"2007","author":"edwards","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/AIRE.2014.6894849"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345803"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.4236\/cn.2013.53B1002"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636709"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0119-y"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2005.1521579"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69369-7_21"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/450\/1\/012053"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1152\/ajplegacy.1928.84.3.490","article-title":"A diencephalic mechanism for the expression of rage with special reference to the central nervous system","author":"bard","year":"1928","journal-title":"Am J Physiol"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.22"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.nurpra.2014.09.002"},{"key":"ref12","article-title":"From contract drafting to software specification","author":"berry","year":"2003","journal-title":"Linguistic sources of ambiguity"},{"key":"ref13","first-page":"223","article-title":"An empirical investigation of user requirements elicitation: Comparing the effectiveness of prompting techniques","volume":"17","author":"browne","year":"2001","journal-title":"JMIS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/1415404"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1037\/h0072957"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.31"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2005.1413722"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-009-0130-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511620539"},{"year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1990.11517884"},{"year":"0","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/AXMEDIS.2008.39"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-006-5468-2"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1561\/1500000011"},{"key":"ref45","first-page":"6","article-title":"Only his only grammarian can only say only what only he only means","volume":"9","author":"neumann","year":"1986","journal-title":"ACM SIGSOFT SE Notes"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6393(02)00084-5"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpsycho.2005.10.024"},{"key":"ref42","first-page":"39","article-title":"Ambiguity measures in requirements engineering","author":"mich","year":"2000","journal-title":"ICS'OO 16th IFIP WCC"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2014.6912250"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.334"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.284"}],"event":{"name":"2016 IEEE 24th International Requirements Engineering Conference (RE)","start":{"date-parts":[[2016,9,12]]},"location":"Beijing, China","end":{"date-parts":[[2016,9,16]]}},"container-title":["2016 IEEE 24th International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7746733\/7765493\/07765546.pdf?arnumber=7765546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T07:47:43Z","timestamp":1568620063000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7765546\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/re.2016.56","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}