{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T04:48:38Z","timestamp":1777610918273,"version":"3.51.4"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[1992,6,1]],"date-time":"1992-06-01T00:00:00Z","timestamp":707356800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[1992,6,1]],"date-time":"1992-06-01T00:00:00Z","timestamp":707356800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[1992,6,1]],"date-time":"1992-06-01T00:00:00Z","timestamp":707356800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[1992,6]]},"DOI":"10.1109\/32.142871","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T23:09:11Z","timestamp":1030230551000},"page":"483-497","source":"Crossref","is-referenced-by-count":573,"title":["Representing and using nonfunctional requirements: a process-oriented approach"],"prefix":"10.1109","volume":"18","author":[{"given":"J.","family":"Mylopoulos","sequence":"first","affiliation":[{"name":"Dept. of Comput. Sci., Toronto Univ., Ont., Canada"}]},{"given":"L.","family":"Chung","sequence":"additional","affiliation":[{"name":"Dept. of Comput. Sci., Toronto Univ., Ont., Canada"}]},{"given":"B.","family":"Nixon","sequence":"additional","affiliation":[{"name":"Dept. of Comput. Sci., Toronto Univ., Ont., Canada"}]}],"member":"263","reference":[{"key":"ref39","author":"reubenstein","year":"1990","journal-title":"Automated Acquisition of Evolving Informal Descriptions"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1988.93722"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/102675.102676"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/320141.320150"},{"key":"ref31","first-page":"44","article-title":"Towards better models of the design process","volume":"6","author":"mostow","year":"1985","journal-title":"AI Magazine"},{"key":"ref30","author":"martin","year":"1973","journal-title":"Security Accuracy and Privacy in Computer Systems"},{"key":"ref37","author":"pfleeger","year":"1989","journal-title":"Security in Computing"},{"key":"ref36","first-page":"149","author":"nixon","year":"1992","journal-title":"Database Programming Languages Bulk Types & Persistent Data"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/38713.38731"},{"key":"ref34","author":"nilsson","year":"1971","journal-title":"Problem-Solving Methods in Artificial Intelligence"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/320434.320440"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1990.63633"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-19074-0_68"},{"key":"ref12","first-page":"5","article-title":"Representation and utilization of nonfunctional requirements for information system design","author":"chung","year":"1991","journal-title":"Proceedings CAiSE'91"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(91)90033-6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/58566.59297"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(86)90080-9"},{"key":"ref16","author":"dimarco","year":"1990","journal-title":"Computational stylistics for natural language translation"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(79)90008-0"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1268","DOI":"10.1109\/TSE.1985.231878","article-title":"automating the transformational development of software","volume":"se 11","author":"fickas","year":"1985","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/32.90449"},{"key":"ref28","first-page":"105","volume":"1","author":"lee","year":"1990","journal-title":"Artificial Intelligence at MIT Expanding Frontiers"},{"key":"ref4","first-page":"126","article-title":"An evaluation model for clustering strategies in the 0<subscript>2<\/subscript> object-oriented database system","author":"benzaken","year":"1990","journal-title":"Proc 3rd Int Conf Database Theory"},{"key":"ref27","author":"lazowska","year":"1984","journal-title":"Quantitative System Performance"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/2.84903"},{"key":"ref6","first-page":"258","article-title":"Support for data-intensive applications: Conceptual design and software development","author":"borgida","year":"1990","journal-title":"Proc 2nd Int Workshop on Database Programming Languages"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1991.130629"},{"key":"ref5","author":"boehm","year":"1978","journal-title":"Characteristics of Software Quality"},{"key":"ref8","first-page":"566","article-title":"Deriving production rules for constraint management","author":"ceri","year":"1990","journal-title":"Proc 16th Int Conf Very Large Data Bases"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.21236\/ADA153988","author":"bowen","year":"1985","journal-title":"Specification of Software Quality Attributes"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231877"},{"key":"ref1","volume":"24","year":"1984","journal-title":"Artif Intell J"},{"key":"ref9","first-page":"122","article-title":"Storage and access structures to support a semantic data model","author":"chan","year":"1982","journal-title":"Proc IEEE 5th Int Conf Very Large Data Bases"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/800191.805538"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/69.87966"},{"key":"ref45","first-page":"605","author":"thayer","year":"1990","journal-title":"Tutorial System and Software Requirements Engineering"},{"key":"ref22","author":"hyslop","year":"1991","journal-title":"?Performance Prediction of Relational Database Management Systems ?"},{"key":"ref21","first-page":"63","article-title":"The house of quality","author":"hauser","year":"1988","journal-title":"Harvard Business Review"},{"key":"ref24","author":"johnson","year":"1991","journal-title":"Representation and presentation of requirements knowledge"},{"key":"ref42","author":"simon","year":"1981","journal-title":"The Sciences of the Artificial"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/128756.128757"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1985.1662861"},{"key":"ref26","first-page":"145","author":"keller","year":"1990","journal-title":"Tutorial System and Software Requirements Engineering"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4980-1_25"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(83)90009-7"},{"key":"ref43","author":"smith","year":"1990","journal-title":"Performance Engineering of Software Systems"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx1\/32\/3831\/00142871.pdf?arnumber=142871","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T18:33:02Z","timestamp":1739817182000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/142871\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,6]]},"references-count":46,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/32.142871","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,6]]}}}