{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T05:23:28Z","timestamp":1672377808216},"reference-count":24,"publisher":"Association for Computing Machinery (ACM)","issue":"6","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2010,11,27]]},"abstract":"Software Design Notation Storage and Inference Mechanism (DNSIM) is capable of storing software designs by using Design Markup Language (DGML) tags and reusing existing design elements to produce new software designs. This mechanism performs search operations on stored designs. The accuracy of the search results depends upon the correctness of the keywords provided to the search process. The challenge is to input the Software Requirement Specification (SRS) document as a search input to DNSIM and to produce the best possible design from existing design elements. This paper proposes a method to produce requirement specification keywords from the formal representation of the SRS. The DNSIM system uses the keywords produced by our method and shows significant improvements and accuracy in the design search results<\/jats:p>","DOI":"10.1145\/1874391.1874408","type":"journal-article","created":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T20:18:10Z","timestamp":1291234690000},"page":"1-8","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Automatic generation of design search keywords from software specifications to improve design search results"],"prefix":"10.1145","volume":"35","author":[{"given":"P. K.","family":"Suri","sequence":"first","affiliation":[{"name":"Kurukshetra University, Kurukshetra, (Haryana), India"}]},{"given":"Gurdev","family":"Singh","sequence":"additional","affiliation":[{"name":"Kurukshetra University, Kurukshetra, (Haryana), India"}]}],"member":"320","published-online":{"date-parts":[[2010,11,27]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"89","volume-title":"August 2009","volume":"9","author":"Suri P.K."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/850944.853123"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428817_45"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:19970973"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3115\/1072228.1072352"},{"key":"e_1_2_1_6_1","first-page":"113","volume-title":"Computer Software and Applications Conference, 1979. Proceedings. COMPSAC 79","author":"Alex Paul Conn","year":"1979"},{"key":"e_1_2_1_7_1","unstructured":"Stephens Jon \"Using XML in MySQL\" http:\/\/dev.mysql.com\/tech-resources\/articles\/xml-in-mysql5.1-6.0.html#xml- 5.1-exporting. Stephens Jon \"Using XML in MySQL\" http:\/\/dev.mysql.com\/tech-resources\/articles\/xml-in-mysql5.1-6.0.html#xml- 5.1-exporting."},{"key":"e_1_2_1_8_1","first-page":"2","article-title":"Structured prototyping for requirements specification in expert systems and conventional IT projects","volume":"2","author":"Graham I.","year":"1991","journal-title":"Computing & Control Engineering Journal"},{"key":"e_1_2_1_9_1","volume-title":"IEE Proceedings -Volume: 152","author":"Nord"},{"key":"e_1_2_1_10_1","volume-title":"IEE Proceedings - Volume: 146","author":"Russo A."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.896248"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.738341"},{"key":"e_1_2_1_13_1","first-page":"5","article-title":"Abstract Requirements Specification: A New Approach and Its Application","volume":"9","author":"Heitneter C.L.","year":"1983","journal-title":"SoftwareEngineering, IEEE Transactions on"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1988.0024"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1984.233702"},{"key":"e_1_2_1_16_1","first-page":"2","article-title":"Risk assessment of software-system specifications","volume":"50","author":"Ammar H.H.","journal-title":"Reliability, IEEE Transactions on"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/64.21901"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSIE.2009.1000"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.1393"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.90448"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1990.0014"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1982.1654024"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.730543"},{"key":"e_1_2_1_24_1","first-page":"3","article-title":"Representing open requirements with a fragment-based specification Systems, Man and Cybernetics","volume":"23","author":"Blum B.I.","journal-title":"IEEE Transactions on"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1874391.1874408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T18:17:19Z","timestamp":1672337839000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1874391.1874408"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,27]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2010,11,27]]}},"alternative-id":["10.1145\/1874391.1874408"],"URL":"https:\/\/doi.org\/10.1145\/1874391.1874408","relation":{},"ISSN":["0163-5948"],"issn-type":[{"value":"0163-5948","type":"print"}],"subject":[],"published":{"date-parts":[[2010,11,27]]},"assertion":[{"value":"2010-11-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}