{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:44:35Z","timestamp":1725792275209},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/sysose.2010.5544073","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T16:43:57Z","timestamp":1281458637000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Scenario-based design and evaluation for capability"],"prefix":"10.1109","author":[{"given":"Esmond N.","family":"Urwin","sequence":"first","affiliation":[]},{"given":"Colin C.","family":"Venters","sequence":"additional","affiliation":[]},{"given":"Duncan J.","family":"Russell","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zongyang","family":"Luo","sequence":"additional","affiliation":[]},{"given":"David E.","family":"Webster","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Henshaw","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"19","article-title":"Managing Innovation – A Scenario Based Planning Approach","author":"urwin","year":"2009","journal-title":"The 5th International Conference on Advances in Production Management (APMS2009)"},{"key":"ref11","first-page":"20","article-title":"Collaborative, academic- industry research approach for advancing systems engineering","author":"henshaw","year":"2009","journal-title":"The 7th Annual Conference on Systems Engineering Research (CSER2009)"},{"journal-title":"Fraunhofer Institute for Systems and Innovation Research","article-title":"Delphi Method","year":"0","author":"cuhls","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.9.3.458"},{"journal-title":"Conference on Realising NEC","article-title":"NEC Themes: A Conceptual Analysis and Applied Principles","year":"2008","author":"neaga","key":"ref14"},{"journal-title":"Evaluating Software Architectures Methods and Case Studies","year":"2002","author":"clements","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019479"},{"year":"2001","key":"ref17","article-title":"ISO\/IEC 9126-1:2001: Software Engineering: Product Quality: Part 1: Quality Model"},{"journal-title":"Software systems architecture Working with stakeholders using viewpoints and perspectives","year":"2005","author":"rozanski","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/52.542294"},{"journal-title":"Human-Computer Interaction","year":"1994","author":"preece","key":"ref4"},{"journal-title":"A Software Architecture Primer","year":"2003","author":"reekie","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.45"},{"journal-title":"UK Ministry of Defence","article-title":"Network Enabled Capability","year":"2005","key":"ref5"},{"journal-title":"The Technical Cooperation Program (TTCP) Guide for Understanding and Implementing Defense Experimentation (GUIDEx) 1st Ed","year":"2006","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0953-5438(00)00023-0"},{"journal-title":"Requirements Engineering Processes and Techniques","year":"1998","author":"kotonya","key":"ref2"},{"journal-title":"11th Int Command and Control Technology Symp","article-title":"How do we know that a scenario is ‘appropriate’","year":"2006","author":"whitworth","key":"ref9"},{"journal-title":"Software Engineering","year":"2006","author":"sommerville","key":"ref1"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/ICECCS.1998.706657","article-title":"The Architecture Tradeoff Analysis Method","author":"kazman","year":"1998","journal-title":"ICECCS‘98 Proceedings of the Fourth International Conference on Engineering of Complex Computer Systems Monterey"},{"journal-title":"Proceedings of the Second International ESPRIT ARES Workshop","article-title":"A Software Architecture Evaluation Model","year":"1998","author":"duenas","key":"ref22"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1109\/ICSR.1998.685756","article-title":"Scenario-Based Architecture Reengineering","author":"bengtsson","year":"1998","journal-title":"Proceedings of Fifth International Conference on Software Reuse"},{"journal-title":"RAND","article-title":"Measures of Effectiveness for the Information-Age Navy","year":"2002","author":"perry","key":"ref24"},{"journal-title":"RNEC’08 Realising Network Enabled Capability Leeds UK","article-title":"An Ontology for Evaluation of Network Enabled Capability Architectures","year":"2008","author":"webster","key":"ref23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1986.4309003"}],"event":{"name":"2010 5th International Conference on System of Systems Engineering (SoSE)","start":{"date-parts":[[2010,6,22]]},"location":"Loughborough, United Kingdom","end":{"date-parts":[[2010,6,24]]}},"container-title":["2010 5th International Conference on System of Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5532086\/5543954\/05544073.pdf?arnumber=5544073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T08:24:19Z","timestamp":1497860659000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5544073\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/sysose.2010.5544073","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}