{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:41:15Z","timestamp":1725522075619},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/repa.2012.6359975","type":"proceedings-article","created":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T02:14:14Z","timestamp":1354328054000},"page":"41-47","source":"Crossref","is-referenced-by-count":3,"title":["Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns"],"prefix":"10.1109","author":[{"given":"Travis D.","family":"Breaux","sequence":"first","affiliation":[]},{"given":"Hanan","family":"Hibshi","sequence":"additional","affiliation":[]},{"given":"Ashwini","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Jean-Michel","family":"Lehker","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Problem Frames Analysing and Structuring Software Development Problems","year":"2001","author":"jackson","key":"19"},{"journal-title":"Software Architecture Perspectives on an Emerging Discipline","year":"1996","author":"shaw","key":"35"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2004.1335667"},{"key":"36","article-title":"Card processor: Hackers stole account numbers","author":"sidel","year":"2012","journal-title":"Wall Street Journal"},{"key":"18","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1145\/225014.225041","article-title":"the world and the machine","author":"jackson","year":"1995","journal-title":"1995 17th International Conference on Software Engineering icse"},{"key":"33","first-page":"27","article-title":"Principles of Categorization","author":"rosch","year":"1978","journal-title":"Cognition and Categorization"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1998.667824"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1996.491442"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.43"},{"journal-title":"The Psychology of So-called Processes of Abstraction","year":"1927","author":"weigl","key":"39"},{"journal-title":"Creating Significant Learning Experiences An Integrated Approach to Designing College Courses","year":"2003","author":"fink","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1037\/h0093097"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.31"},{"key":"11","first-page":"209","article-title":"Modeling interactions using roledriven patterns","author":"diaz","year":"2005","journal-title":"IEEE Int'l Conf Req'ts Engr"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/32.879820"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(93)90021-G"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1211541"},{"key":"20","first-page":"91","article-title":"Value-based design of networked enterprises using e3 control patterns","author":"kartseva","year":"2007","journal-title":"IEEE Int'l Conf Req'ts Engr"},{"key":"40","article-title":"How digital detectives deciphered Stuxnet, the most menacing malware in history","author":"zetter","year":"2011","journal-title":"Wired Magazine"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.29"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1207\/s15430421tip4104_2"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.32"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232735"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/32.142871"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2011.6051643"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.26"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1997.566836"},{"key":"3","article-title":"Deriving architectural tactics: A step toward methodical architectural design","author":"bachmann","year":"2003","journal-title":"Software Engineering Institute Technical Report #CMU\/SEI-2003-TR-004"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2004.1335664"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.51"},{"journal-title":"A Pattern Language","year":"1977","author":"alexander","key":"1"},{"journal-title":"Qualitative Research and Evaluation Methods","year":"2002","author":"patton","key":"30"},{"key":"7","article-title":"RSA finally comes clean: SecurID is compromised","author":"bright","year":"2011","journal-title":"ArsTechnia"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.11.003"},{"key":"32","first-page":"120","article-title":"Domain independent regularities in scenarios","author":"ridao","year":"2001","journal-title":"5rd IEEE Int'l Symp Req'ts Engr"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.36"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1996.491430"},{"journal-title":"Evaluating the Quality of Learning The SOLO Taxonomy (Structure of the Observed Learning Outcome)","year":"1982","author":"biggs","key":"4"},{"key":"9","first-page":"212","article-title":"Requirements-based dynamic metrics in object-oriented systems","author":"cleland-huang","year":"2001","journal-title":"2nd IEEE Int'l Symp on Req'ts Engr"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/15248371003700015"}],"event":{"name":"2012 IEEE Second International Workshop on Requirements Patterns (RePa)","start":{"date-parts":[[2012,9,24]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2012,9,24]]}},"container-title":["2012 Second IEEE International Workshop on Requirements Patterns (RePa)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6338383\/6359964\/06359975.pdf?arnumber=6359975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T03:23:08Z","timestamp":1498015388000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6359975\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/repa.2012.6359975","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}