{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:22:42Z","timestamp":1753921362068},"reference-count":13,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[1988,11,1]],"date-time":"1988-11-01T00:00:00Z","timestamp":594345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Softw."],"published-print":{"date-parts":[[1988,11]]},"DOI":"10.1109\/52.10002","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T18:46:34Z","timestamp":1030214794000},"page":"37-47","source":"Crossref","is-referenced-by-count":46,"title":["Critiquing software specifications"],"prefix":"10.1109","volume":"5","author":[{"given":"S.","family":"Fickas","sequence":"first","affiliation":[]},{"given":"P.","family":"Nagarajan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"402","article-title":"The Gist Behavior Explainer","author":"swartout","year":"1983","journal-title":"Proc AAAI"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CAIA.1988.196079"},{"key":"ref12","first-page":"334","article-title":"Metaplanning","author":"wilensky","year":"1980","journal-title":"Proc AAAI"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(82)90020-0"},{"key":"ref4","author":"wilbur-ham","year":"1985","journal-title":"Numerical Petri Nets - A Guide"},{"key":"ref3","author":"greenspan","year":"1984","journal-title":"Requirements Modeling A Knowledge Representation Approach to Software Requirements Definition"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231535"},{"key":"ref5","year":"1987","journal-title":"Proc Fourth Int l Workshop Software Design and Specification"},{"key":"ref8","author":"rissland","year":"1986","journal-title":"Dimension-Based Analysis of Hypotheticals from Supreme Court Oral Argument"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/22719.22947"},{"key":"ref2","author":"fickas","year":"1987","journal-title":"Problem acquisition in software analysis a preliminary study"},{"key":"ref1","author":"fickas","year":"1987","journal-title":"Automating the Software Specification Process"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1375","DOI":"10.1109\/TSE.1985.231885","article-title":"the roles of execution and analysis in algorthm design","volume":"se 11","author":"steier","year":"1985","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["IEEE Software"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx1\/52\/511\/00010002.pdf?arnumber=10002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:08:38Z","timestamp":1638216518000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/10002\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,11]]},"references-count":13,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/52.10002","relation":{},"ISSN":["0740-7459"],"issn-type":[{"value":"0740-7459","type":"print"}],"subject":[],"published":{"date-parts":[[1988,11]]}}}