<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0122-3461</journal-id>
<journal-title><![CDATA[Ingeniería y Desarrollo]]></journal-title>
<abbrev-journal-title><![CDATA[Ing. Desarro.]]></abbrev-journal-title>
<issn>0122-3461</issn>
<publisher>
<publisher-name><![CDATA[Fundación Universidad del Norte]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0122-34612019000200327</article-id>
<article-id pub-id-type="doi">10.14482/inde.37.2.1053</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Requerimientos de software: prototipado, software heredado y análisis de documentos]]></article-title>
<article-title xml:lang="en"><![CDATA[Software requirements: prototyping, legacy software, and document analysis]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Medina Cruz]]></surname>
<given-names><![CDATA[Javier]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Pineda Ballesteros]]></surname>
<given-names><![CDATA[Eliécer]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Téllez Acuña]]></surname>
<given-names><![CDATA[Freddy Reynaldo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Nacional Abierta y a Distancia - UNAD  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Nacional Abierta y a Distancia - UNAD  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad Nacional Abierta y a Distancia - UNAD  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2019</year>
</pub-date>
<volume>37</volume>
<numero>2</numero>
<fpage>327</fpage>
<lpage>345</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0122-34612019000200327&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0122-34612019000200327&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0122-34612019000200327&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Este artículo presenta un rastreo bibliográfico sobre alternativas poco usuales para el levantamiento de requisitos en proyectos de desarrollo de software. La búsqueda bibliográfica parte de un principio fundamental, recabar información sobre métodos de levantamiento de requisitos que no requieran de un alto porcentaje de interacción con los usuarios o clientes. Esta situación obedece a que usualmente los usuarios o clientes no disponen del tiempo requerido, como ocurre cuando se usan métodos tradicionales. La búsqueda de información se realizó teniendo como clave principal la baja interacción con el usuario o cliente, y en este orden de ideas, hubo necesidad de ampliar el horizonte temporal de búsqueda hasta el año 2000 e incluir textos clásicos en el área de estudio. Los resultados de la búsqueda arrojaron luces sobre las técnicas de la Ingeniería de Requisitos, cuya característica principal es la minimizar la interacción con los usuarios, siendo el prototipado, el análisis de documentos y el software heredado las que más se aproximan a la condición de búsqueda.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This paper presents a literature review about alternatives for determination of requirements in software development projects. The literature searching begins from a fundamental principle, request information about methods of determination of requirements that do not need a high percentage of interaction with users or customers. This usually happens because users or customers don't have time as it happens when traditional methods are used. The search for information was made taking into account the low interaction with the user or customer and in this vein, it was needed to expand the search horizon until 2000 and it includes classic texts in the study area. The search results provided insights about the techniques of requirements engineering, whose main characteristic is to minimize the interaction with users, such as, prototyping, document analysis and legacy software which are the closest ones to the search condition.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[análisis de documentos]]></kwd>
<kwd lng="es"><![CDATA[ingeniería de requisitos]]></kwd>
<kwd lng="es"><![CDATA[lenguaje natural]]></kwd>
<kwd lng="es"><![CDATA[prototipos]]></kwd>
<kwd lng="es"><![CDATA[software heredado]]></kwd>
<kwd lng="en"><![CDATA[document analysis]]></kwd>
<kwd lng="en"><![CDATA[legacy software]]></kwd>
<kwd lng="en"><![CDATA[natural language]]></kwd>
<kwd lng="en"><![CDATA[prototype]]></kwd>
<kwd lng="en"><![CDATA[requirements engineering]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>[1]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Salamando]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Valencia]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Levantamiento de requerimientos basados en el conocimiento del proceso"]]></article-title>
<source><![CDATA[Revista Científica]]></source>
<year>2012</year>
<page-range>42-51</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>[2]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martínez]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Calidad en el levantamiento de requerimientos"]]></article-title>
<source><![CDATA[Contactos]]></source>
<year>2008</year>
<page-range>40-2</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>[3]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gómez]]></surname>
<given-names><![CDATA[M. d. C]]></given-names>
</name>
</person-group>
<source><![CDATA[Material didáctico: Notas del curso Análisis de Requerimientos]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Ciudad de México ]]></publisher-loc>
<publisher-name><![CDATA[Publidisa Mexicana S. A. de C.V]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>[4]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arias]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["La ingeniería de requerimientos y su importancia en el desarrollo de proyectos de software"]]></article-title>
<source><![CDATA[Inter Sedes]]></source>
<year>2006</year>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>[5]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guan]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["A Software Prototyping Framework and Methods for Supporting Human's Software Development Activities"]]></article-title>
<source><![CDATA[Bridging the Gaps Between Software Engineering and Human-Computer Interaction]]></source>
<year>2003</year>
<publisher-loc><![CDATA[Portland, Oregon ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B6">
<label>[6]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rajendra]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Dani]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Comparative Study of Prototype Model For Software Engineering With System Development Life Cycle"]]></article-title>
<source><![CDATA[IOSR Journal of Engineering]]></source>
<year>2012</year>
<page-range>21-4</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>[7]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suaza]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Serna]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA["La importancia de documentar la Elicitación de Requisitos"]]></source>
<year>2014</year>
<conf-name><![CDATA[ 7Congreso Internacional en Ciencias Computacionales Cicomp]]></conf-name>
<conf-loc>México </conf-loc>
</nlm-citation>
</ref>
<ref id="B8">
<label>[8]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[White]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[From Comfort Zone to Performance Management]]></source>
<year>2009</year>
<page-range>20</page-range><publisher-name><![CDATA[W. a. M. publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<label>[9]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vizcaíno]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Soto]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Ruiz]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Piattini]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Aplicando Gestión del Conocimiento en el Proceso de Mantenimiento del Software"]]></article-title>
<source><![CDATA[Revista Iberoamericana de Inteligencia Artificial]]></source>
<year>2006</year>
<page-range>91-8</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>[10]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jatain]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Gaur]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Reengineering Techniques for Object Oriented Legacy Systems"]]></article-title>
<source><![CDATA[International Journal of Software Engineering and Its Applications]]></source>
<year>2015</year>
<page-range>35-52</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>[11]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Antonelli]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Oliveros]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA["Fuentes utilizadas por desarrolladores de software en Argentina para elicitar requerimientos"]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B12">
<label>[12]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tiwari]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Rathore]]></surname>
<given-names><![CDATA[S. S]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA["Selecting requirement elicitation techniques for software projects"]]></source>
<year>2012</year>
<conf-name><![CDATA[ SixthInternational Conference on Software Engineering (CONSEG)]]></conf-name>
<conf-loc>Indore, India </conf-loc>
</nlm-citation>
</ref>
<ref id="B13">
<label>[13]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Besrour]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Rahim]]></surname>
<given-names><![CDATA[L. B]]></given-names>
</name>
<name>
<surname><![CDATA[Dominic]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA["Investigating Requirement Engineering Techniques in The Context of Small and Medium Software Enterprises"]]></source>
<year>2016</year>
<conf-name><![CDATA[ 3rdInternational Conference On Computer And Information Sciences]]></conf-name>
<conf-loc>Kuala, Lumpur </conf-loc>
</nlm-citation>
</ref>
<ref id="B14">
<label>[14]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Christel]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Kang]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA["Issues in Requirements Elicitation"]]></source>
<year>1992</year>
<publisher-loc><![CDATA[Hanscom ]]></publisher-loc>
<publisher-name><![CDATA[Carnegie Mellon University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<label>[15]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hsia]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Davis]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Kung]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Status report: requirements engineering"]]></article-title>
<source><![CDATA[IEEE Software]]></source>
<year>1993</year>
<page-range>75-9</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>[16]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Doe]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA["Recommended Practice for Software Requirements Specifications (IEEE)"]]></source>
<year>2011</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<label>[17]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sommerville]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<source><![CDATA[Software Engineering]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Nueva Jersey ]]></publisher-loc>
<publisher-name><![CDATA[Addison-Wesley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>[18]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quintero]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Anaya]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["MDA y el papel de los modelos en el proceso de desarrollo de software"]]></article-title>
<source><![CDATA[revista EIA]]></source>
<year>2007</year>
<page-range>131-46</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>[19]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gervasi]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA["The CICO domain-based parser"]]></source>
<year>2001</year>
<publisher-loc><![CDATA[Pisa ]]></publisher-loc>
<publisher-name><![CDATA[Departamento de Informática, Universidad de Pisa]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<label>[20]</label><nlm-citation citation-type="book">
<collab>IEEE</collab>
<source><![CDATA["Especificaciones de los Requisitos del Software IEEE-STD-830-1998"]]></source>
<year>1998</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<label>[21]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blain]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA["Ten Requirements Gathering Techniques"]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B22">
<label>[22]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<source><![CDATA["RETR: Reverse Engineering To Requirements"]]></source>
<year>2005</year>
<conf-name><![CDATA[ Proceedings of the 12th Working Conference on Reverse Engineering]]></conf-name>
<conf-loc>Pittsburgh </conf-loc>
</nlm-citation>
</ref>
<ref id="B23">
<label>[23]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rosziati]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Yong]]></surname>
<given-names><![CDATA[T. K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["ReSeT: Reverse Engineering System Requirements Tool"]]></article-title>
<source><![CDATA[International Journal of Computer, Electrical, Automation, Control and Information Engineering]]></source>
<year>2008</year>
<page-range>1877-80</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>[24]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[El-Ramly]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Stroulia]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Sorenso]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA["Recovering software requirements from system-user interaction traces"]]></source>
<year>2002</year>
<publisher-loc><![CDATA[Alberta ]]></publisher-loc>
<publisher-name><![CDATA[Department of Computing Science - University of Alberta]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<label>[25]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lloyd]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<source><![CDATA["Tools and Techniques for Effective Distributed Requirements Engineering: An Empirical Study"]]></source>
<year>2001</year>
<publisher-loc><![CDATA[Blacksburg ]]></publisher-loc>
<publisher-name><![CDATA[Faculty of the Virginia Polytechnic Institute and State University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<label>[26]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hickey]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Davis]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA["Requirements Elicitation and Elicitation Technique Selection: A Model for Two Knowledge-Intensive Software Development Processes"]]></source>
<year>2003</year>
<conf-name><![CDATA[ Proceedings of the36th Hawaii International Conference on System Sciences]]></conf-name>
<conf-loc>Washington </conf-loc>
</nlm-citation>
</ref>
<ref id="B27">
<label>[27]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Manies]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Nikual]]></surname>
<given-names><![CDATA[U]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["La elicitacoión de requisitos en el contexto de un proyecto software"]]></article-title>
<source><![CDATA[Ing. USBMed]]></source>
<year>2011</year>
<page-range>25-9</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>[28]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brogneaux]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA["Deriving User-requirements From Human-Computer Interfaces,"]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B29">
<label>[29]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[English]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Business modeling with UML: Understanding the similarities and differences between business use cases and system use cases"]]></article-title>
<source><![CDATA[IBM Developer Works/ Rational]]></source>
<year>2007</year>
</nlm-citation>
</ref>
<ref id="B30">
<label>[30]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Luedke]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA["Requirements gathering with storyboards"]]></source>
<year>2008</year>
<publisher-name><![CDATA[IBM developer Works]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<label>[31]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Landay]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Myers]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA["Sketching Storyboards to Illustrate Interface Behaviors"]]></source>
<year>1997</year>
<conf-name><![CDATA[ Conference Companion on Human Factors in Computing System]]></conf-name>
<conf-loc>New York </conf-loc>
</nlm-citation>
</ref>
<ref id="B32">
<label>[32]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Granollers]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA["MPIu+a. Una metodología que integra la ingeniería del software, la interacción persona-ordenador y la accesibilidad en el contexto de equipos de desarrollo multidisciplinares"]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Lleida ]]></publisher-loc>
<publisher-name><![CDATA[Universitat de Lleida. Departament d'Informàtica i Enginyeria Industrial]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<label>[33]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pichler]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Rumetshofer]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA["Business Process-based Requirements Modeling and Management"]]></source>
<year>2006</year>
<conf-name><![CDATA[ First International Workshop on Requirements Engineering Visualization]]></conf-name>
<conf-loc>Minneapolis </conf-loc>
</nlm-citation>
</ref>
<ref id="B34">
<label>[34]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fillmore]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["The case for Case"]]></article-title>
<source><![CDATA[Universals in Linguistic Theory]]></source>
<year>1977</year>
<page-range>59-81</page-range><publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Bach and Harms]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<label>[35]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martínez]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA["From Early Requirements to User Interface Prototyping: A methodological approach"]]></source>
<year>2002</year>
<conf-name><![CDATA[ 1fhIEEE International Conference on Automated Software Engineering]]></conf-name>
<conf-loc>Edinburgh </conf-loc>
</nlm-citation>
</ref>
<ref id="B36">
<label>[36]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nuseibeh]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Easterbrook]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA["Requirements Engineering: A Roadmap"]]></source>
<year>2000</year>
<conf-name><![CDATA[ 22ndInternational Conference on Software Engineering]]></conf-name>
<conf-loc>Limerick </conf-loc>
</nlm-citation>
</ref>
<ref id="B37">
<label>[37]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ryan]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Doubleday]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA["Evaluating 'Throw Away' Prototyping for Requirements Capture"]]></source>
<year>2000</year>
</nlm-citation>
</ref>
<ref id="B38">
<label>[38]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moore]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Shipman]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<source><![CDATA["A Comparison of Questionnaire-Based and GUI-Based Requirements Gathering"]]></source>
<year>2000</year>
<conf-name><![CDATA[ IEEE Conference Publications]]></conf-name>
<conf-loc>Grenoble </conf-loc>
</nlm-citation>
</ref>
<ref id="B39">
<label>[39]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ibrahim]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Yong]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA["ReSeT: Reverse Engineering System Requirements Tool"]]></source>
<year>2008</year>
<conf-name><![CDATA[ International Journal of Computer, Electrical, Automation, Control and Information Engineering]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1877-80</page-range></nlm-citation>
</ref>
<ref id="B40">
<label>[40]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rajlich]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA["Comprehension and Evolution of Legacy Software"]]></source>
<year>1997</year>
<conf-name><![CDATA[ 19International Conference on]]></conf-name>
<conf-loc>Boston </conf-loc>
</nlm-citation>
</ref>
<ref id="B41">
<label>[41]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Canfora]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Di Penta]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["New Frontiers of Reverse Engineering"]]></article-title>
<source><![CDATA[Future of Software Engineering, 2007. FOSE '07]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Minneapolis ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B42">
<label>[42]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weide]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Heym]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Hollingsworth]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA["Reverse Engineering of Legacy Code Exposed"]]></source>
<year>1995</year>
<conf-name><![CDATA[ 7thInternational Conference on Software Engineering (ICSE'95)]]></conf-name>
<conf-loc>Ohio </conf-loc>
</nlm-citation>
</ref>
<ref id="B43">
<label>[43]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Moore]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA["Communicating Requirements Using End-User GUI Constructions with Argumentation"]]></source>
<year>2003</year>
<conf-name><![CDATA[ 18thIEEE International Conference on Automated Software Engineering]]></conf-name>
<conf-loc>Montreal </conf-loc>
</nlm-citation>
</ref>
<ref id="B44">
<label>[44]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Staiger]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA["Reverse Engineering of Graphical User Interfaces Using Static Analyses"]]></source>
<year>2007</year>
<conf-name><![CDATA[ 14thWorking Conference on Reverse Engineering (WCRE2007)]]></conf-name>
<conf-loc>Vancouver </conf-loc>
</nlm-citation>
</ref>
<ref id="B45">
<label>[45]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Siochi]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Ehrich]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA["Computer analysis of User interfaces Based on Repetition in Transcripts of User Sessions"]]></source>
<year>1991</year>
<page-range>309-35</page-range><publisher-name><![CDATA[ACM Transactions on Information Systems]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<label>[46]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stroulia]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[El-Ramly]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Kong]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Sorenson]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Matichuk]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA["Reverse Engineering Legacy Interfaces: An Interaction-Driven Approach"]]></source>
<year>1999</year>
<conf-name><![CDATA[ Reverse Engineering, 1999. Proceedings. Sixth Working Conference on]]></conf-name>
<conf-loc>Atlanta </conf-loc>
</nlm-citation>
</ref>
<ref id="B47">
<label>[47]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sorenson]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[El-Ramly]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Stroulia]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA["Mining System-User Interaction Traces for Use Case Models"]]></source>
<year>2002</year>
<conf-name><![CDATA[ 10thInternational Workshop on Program Comprehension]]></conf-name>
<conf-loc>Paris </conf-loc>
</nlm-citation>
</ref>
<ref id="B48">
<label>[48]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Choobineh]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Mannino]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Tseng]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["A form-based approach for database analysis and design"]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>1992</year>
<page-range>108-20</page-range></nlm-citation>
</ref>
<ref id="B49">
<label>[49]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Yoo]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["A form driven object-oriented reverse engineering methodology"]]></article-title>
<source><![CDATA[Information System]]></source>
<year>2000</year>
<page-range>235-59</page-range></nlm-citation>
</ref>
<ref id="B50">
<label>[50]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zaidman]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Calders]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Demeyer]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Paredaens]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA["Applying Webmining Techniques to Execution Traces to Support the Program Comprehension Process"]]></source>
<year>2005</year>
<conf-name><![CDATA[ Ninth European Conference on Software Maintenance and Reengineering]]></conf-name>
<conf-loc>Washington </conf-loc>
</nlm-citation>
</ref>
<ref id="B51">
<label>[51]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["De los Procesos del Negocio a los Casos de Uso"]]></article-title>
<source><![CDATA[Técnica Administrativa]]></source>
<year>2007</year>
<volume>6</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B52">
<label>[52]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Dulloo]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Verma]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Systematic Review of Requirement Elicitation Techniques"]]></article-title>
<source><![CDATA[International Journal of Information and Computation Technology]]></source>
<year>2014</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>133-8</page-range></nlm-citation>
</ref>
<ref id="B53">
<label>[53]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tiwari]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Rathore]]></surname>
<given-names><![CDATA[S. S]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA["Selecting requirement elicitation techniques for software projects"]]></source>
<year>2012</year>
<conf-name><![CDATA[ CSI Sixth International Conference on Software Engineering (CONSEG)]]></conf-name>
<conf-loc>Indore, India </conf-loc>
</nlm-citation>
</ref>
<ref id="B54">
<label>[54]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fitzgerald]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Software Crisis 2.0"]]></article-title>
<source><![CDATA[Computer]]></source>
<year>2012</year>
<volume>45</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>89-91</page-range></nlm-citation>
</ref>
<ref id="B55">
<label>[55]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zapata]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Arango]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Los modelos verbales en lenguaje natural y su utilización en la elaboración de esquemas conceptuales para el desarrollo de software: Una revisión crítica"]]></article-title>
<source><![CDATA[Revista EAFIT]]></source>
<year>2006</year>
<page-range>77-95</page-range></nlm-citation>
</ref>
<ref id="B56">
<label>[56]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Buchholz]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Düsterhöft]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Using Natural Language for Database Design"]]></article-title>
<source><![CDATA[Proceedings Deutsche Jahrestagung für KI1994 - Workshop "Reasoning about Structured Objects: Knowledge Representation meets Databases]]></source>
<year>1994</year>
</nlm-citation>
</ref>
<ref id="B57">
<label>[57]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krebs]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA["Form feeds function: The role of storyboards in requirements elicitation"]]></source>
<year>2005</year>
<publisher-name><![CDATA[The Rational Edge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B58">
<label>[58]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cyre]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["A requirements sublanguage for automated analysis, International Journal of Intelligent Systems"]]></article-title>
<source><![CDATA[Journal of intelligent systems]]></source>
<year>1995</year>
<page-range>665-89</page-range></nlm-citation>
</ref>
<ref id="B59">
<label>[59]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Garigliano]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Mich]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA["NL-OOPS: A Requirements Analysis tool based on Natural Language Processing"]]></source>
<year>2002</year>
<conf-name><![CDATA[ 3rdInternational Conference on Data Mining]]></conf-name>
<conf-loc>Wessex </conf-loc>
</nlm-citation>
</ref>
<ref id="B60">
<label>[60]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ambriola]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Gervasi]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["On the parallel refinement of NL requirements an UML diagrams"]]></article-title>
<source><![CDATA[2001 Workshop on Trasformations in UML]]></source>
<year>2001</year>
<publisher-loc><![CDATA[Génova ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B61">
<label>[61]</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mich]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["NL-OOPS: from natural language to object oriented requirements using the natural language processing system LOLITA"]]></article-title>
<source><![CDATA[Natural Language Engineering]]></source>
<year>1996</year>
<page-range>161187</page-range></nlm-citation>
</ref>
<ref id="B62">
<label>[62]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dardenne]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Lamsweerde]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Fickas]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA["Goal-directed requirements acquisition"]]></source>
<year>1993</year>
<page-range>3-50</page-range><publisher-name><![CDATA[Science of Computer Programming]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B63">
<label>[63]</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lamsweerde]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Letie]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA["Integrating Obstacles in Goal-Driven Requirements Engineering"]]></source>
<year>1998</year>
<conf-name><![CDATA[ The 1998 International Conference on Software Engineering]]></conf-name>
<conf-loc>Kioto </conf-loc>
</nlm-citation>
</ref>
<ref id="B64">
<label>[64]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salton]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Lesk]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Computer Evaluation of Indexing and Text Processing"]]></article-title>
<source><![CDATA[Journal of the ACM]]></source>
<year>1968</year>
<page-range>8-36</page-range></nlm-citation>
</ref>
<ref id="B65">
<label>[65]</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salton]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[The SMART Retrieval System - Experiments in Automatic Document Processing]]></source>
<year>1971</year>
<publisher-loc><![CDATA[Upper Saddle River ]]></publisher-loc>
<publisher-name><![CDATA[Prentice-Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B66">
<label>[66]</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Codina]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Teoría de recuperación de información: modelos fundamentales y aplicaciones a la gestión documental"]]></article-title>
<source><![CDATA[Revista internacional de Información y Comunicación]]></source>
<year>1995</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
