{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:41:43Z","timestamp":1773276103686,"version":"3.50.1"},"publisher-location":"Cham","reference-count":115,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030700058","type":"print"},{"value":"9783030700065","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-70006-5_4","type":"book-chapter","created":{"date-parts":[[2021,2,26]],"date-time":"2021-02-26T07:03:02Z","timestamp":1614322982000},"page":"83-105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Data-Driven Requirements Engineering: A Guided Tour"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9733-8830","authenticated-orcid":false,"given":"Xavier","family":"Franch","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,27]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12578-2","volume-title":"Requirements Engineering: Fundamentals, Principles and Techniques","author":"K Pohl","year":"2010","unstructured":"Pohl, K.: Requirements Engineering: Fundamentals, Principles and Techniques. Springer, Heidelberg (2010)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Ross, D.T. (ed): Special Collection on Requirement Analysis. IEEE Trans. Softw. Eng. SE-3(1), 2\u201384 (1977)","DOI":"10.1109\/TSE.1977.229899"},{"issue":"12","key":"4_CR3","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/TC.1976.1674590","volume":"C-25","author":"B Boehm","year":"1976","unstructured":"Boehm, B.: Software engineering. IEEE Trans. Comput. C-25(12), 1226\u20131241 (1976)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR4","unstructured":"Kuffel, W.: Extra time saves money. Comput. Lang. (1990)"},{"key":"4_CR5","unstructured":"Spinellis, D.: Code Quality \u2013 The Open Source Perspective. Pearson (2006)"},{"key":"4_CR6","unstructured":"PMI: Pulse of the Profession\u00ae In-Depth Report: Requirements Management\u2014A Core Competency for Project and Program Success (2014). https:\/\/www.pmi.org\/-\/media\/pmi\/documents\/public\/pdf\/learning\/thought-leadership\/pulse\/requirements-management.pdf"},{"issue":"1","key":"4_CR7","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MS.2015.153","volume":"33","author":"W Maalej","year":"2016","unstructured":"Maalej, W., Nayebi, M., Johann, T., Ruhe, G.: Toward data-driven requirements engineering. IEEE Softw. 33(1), 48\u201354 (2016)","journal-title":"IEEE Softw."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Lucas, H.C.: A user-oriented approach to systems design. In: Proceedings of the 26th Annual Conference of the Association for Computing Machinery (ACM), pp. 325\u2013338. ACM Press (1971)","DOI":"10.1145\/800184.810503"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Trotter, P.: User feedback and how to get it. In: Proceedings of the 4th Annual Conference on User Services (SIGUCCS), pp. 130\u2013132. ACM Press (1976)","DOI":"10.1145\/584296.584351"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Pagano, D., Maalej, W.: User feedback in the appstore: an empirical study. In: Proceedings of the 21st International Requirements Engineering Conference (RE), pp. 125\u2013134. IEEE Press (2013)","DOI":"10.1109\/RE.2013.6636712"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-319-54045-0_12","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"L Guzm\u00e1n","year":"2017","unstructured":"Guzm\u00e1n, L., Oriol, M., Rodr\u00edguez, P., Franch, X., Jedlitschka, A., Oivo, M.: How can quality awareness support rapid software development? \u2013 A research preview. In: Gr\u00fcnbacher, P., Perini, A. (eds.) REFSQ 2017. LNCS, vol. 10153, pp. 167\u2013173. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54045-0_12"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Franch, X., et al.: Data-driven requirements engineering in agile projects: the Q-rapids approach. In: Proceedings of the 25th International Requirements Engineering Conference Workshops (REW), pp. 411\u2013414. IEEE Computer Society (2017)","DOI":"10.1109\/REW.2017.85"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.jss.2015.06.063","volume":"123","author":"B Fitzgerald","year":"2017","unstructured":"Fitzgerald, B., Stol, K.J.: Continuous software engineering: a roadmap and agenda. J. Syst. Softw. 123, 176\u2013189 (2017)","journal-title":"J. Syst. Softw."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Hosseini, M., Groen, E.C., Shahri, A., Ali, R.: CRAFT: a crowd-annotated feedback technique. In: Proceedings of the IEEE 25th International Requirements Engineering Conference Workshops (REW), pp. 170\u2013175 (2017)","DOI":"10.1109\/REW.2017.27"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1002\/aris.1440370103","volume":"37","author":"G Chowdhury","year":"2003","unstructured":"Chowdhury, G.: Natural language processing. Ann. Rev. Inf. Sci. Technol. 37, 51\u201389 (2003)","journal-title":"Ann. Rev. Inf. Sci. Technol."},{"key":"4_CR16","unstructured":"Zhao, L., et al.: Natural language processing (NLP) for requirements engineering: a systematic mapping study. arXiv:2004.01099v2 [cs.SE] (2020)"},{"issue":"5","key":"4_CR17","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/MS.2018.3571242","volume":"35","author":"F Dalpiaz","year":"2018","unstructured":"Dalpiaz, F., Ferrari, A., Franch, X., Palomares, C.: Natural language processing for requirements engineering; the best is yet to come. IEEE Softw. 35(5), 115\u2013119 (2018)","journal-title":"IEEE Softw."},{"key":"4_CR18","unstructured":"El Shawi, R., Maher, M., Sakr, S.: Automated machine learning: state-of-the-art and open challenges. arXiv:1906.02287v2 [cs.LG] (2019)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Webster, J.J., Kit, C.: Tokenization as the initial phase in NLP. In: Proceedings of the 14th Conference on Computational Linguistics (COLING),vol. 4, pp. 1106\u20131110. ACM Press (1992)","DOI":"10.3115\/992424.992434"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Ladani, D.J., Desai, N.P.: Stopword identification and removal techniques on TC and IR applications: a survey. In: Proceedings of the 6th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 466\u2013472. IEEE Press (2020)","DOI":"10.1109\/ICACCS48705.2020.9074166"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10462-016-9498-2","volume":"48","author":"J Singh","year":"2017","unstructured":"Singh, J., Gupta, V.: A systematic review of text stemming techniques. Artif. Intell. Rev. 48, 157\u2013217 (2017). https:\/\/doi.org\/10.1007\/s10462-016-9498-2","journal-title":"Artif. Intell. Rev."},{"issue":"3","key":"4_CR22","doi-asserted-by":"publisher","first-page":"262","DOI":"10.7763\/LNSE.2014.V2.134","volume":"2","author":"V Balakrishnan","year":"2014","unstructured":"Balakrishnan, V., Lloyd-Yemoh, E.: Stemming and lemmatization: a comparison of retrieval performances. Lect. Notes Softw. Eng. 2(3), 262\u2013267 (2014)","journal-title":"Lect. Notes Softw. Eng."},{"key":"4_CR23","series-title":"Text, Speech and Language Technology","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-94-017-1183-8_4","volume-title":"Corpus-Based Methods in Language and Speech Processing","author":"S Abney","year":"1997","unstructured":"Abney, S.: Part-of-speech tagging and partial parsing. In: Young, S., Bloothooft, G. (eds.) Corpus-Based Methods in Language and Speech Processing. Text, Speech and Language Technology, vol. 2, pp. 118\u2013136. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/978-94-017-1183-8_4"},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.is.2018.08.003","volume":"86","author":"I Morales-Ramirez","year":"2019","unstructured":"Morales-Ramirez, I., Kifetew, F.M., Perini, A.: Speech-acts based analysis for requirements discovery from online discussions. Inf. Syst. 86, 94\u2013112 (2019)","journal-title":"Inf. Syst."},{"key":"4_CR25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139173438","volume-title":"Speech Acts: An Essay in the Philosophy of Language","author":"JR Searle","year":"1969","unstructured":"Searle, J.R.: Speech Acts: An Essay in the Philosophy of Language. Cambridge University Press, Cambridge (1969)"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Guzman, E., Alkadhi, R., Seyff, N.: A needle in a haystack: what do twitter users say about software? In: Proceedings of the 24th International Requirements Engineering Conference (RE), pp. 96\u2013105. IEEE Computer Society (2016)","DOI":"10.1109\/RE.2016.67"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Nasukawa, T., Yi, J.: Sentiment analysis: capturing favorability using natural language processing. In: Proceedings of the 2nd international Conference on Knowledge Capture (K-CAP), pp. 70\u201377. ACM Press (2003)","DOI":"10.1145\/945645.945658"},{"issue":"2","key":"4_CR28","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1162\/COLI_a_00049","volume":"37","author":"M Taboada","year":"2011","unstructured":"Taboada, M., Brooke, J., Tofiloski, M., Voll, K., Stede, M.: Lexicon-based methods for sentiment analysis. Comput. Linguist. 37(2), 267\u2013307 (2011)","journal-title":"Comput. Linguist."},{"issue":"4","key":"4_CR29","doi-asserted-by":"crossref","first-page":"e1253","DOI":"10.1002\/widm.1253","volume":"8","author":"L Zhang","year":"2018","unstructured":"Zhang, L., Wang, S., Liu, B.: Deep learning for sentiment analysis: a survey. Data Min. Knowl. Discov. 8(4), e1253 (2018)","journal-title":"Data Min. Knowl. Discov."},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Guzman, E., Maalej, W.: How do users like this feature? A fine grained sentiment analysis of app reviews. In: Proceedings of the 22nd International Requirements Engineering Conference (RE), pp. 153\u2013162. IEEE Computer Society (2014)","DOI":"10.1109\/RE.2014.6912257"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Wallach, H.M.: Topic modeling: beyond bag-of-words. In: Proceedings of the 23rd International Conference on Machine Learning (ICML), pp. 977\u2013984. ACM Press (2006)","DOI":"10.1145\/1143844.1143967"},{"issue":"1","key":"4_CR32","first-page":"89","volume":"4","author":"C Jacobi","year":"2016","unstructured":"Jacobi, C., van Atteveldt, W., Welbers, K.: Quantitative analysis of large amounts of journalistic texts using topic modelling. Digit. J. 4(1), 89\u2013106 (2016)","journal-title":"Digit. J."},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Abad, Z.S.H., Karras, O., Ghazi, P., Glinz, M., Ruhe, G., Schneider, K.: What works better? A study of classifying requirements. arXiv:1707.02358 [cs.SE] (2017)","DOI":"10.1109\/RE.2017.36"},{"key":"4_CR34","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3, 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"4_CR35","doi-asserted-by":"crossref","unstructured":"Yan, X., Guo, J., Lan, Y., Cheng, X.: A biterm topic model for short texts. In Proceedings of the 22nd International Conference on World Wide Web (WWW), pp. 1445\u20131456. ACM press (2013)","DOI":"10.1145\/2488388.2488514"},{"key":"4_CR36","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-1-4614-3223-4_3","volume-title":"Mining Text Data","author":"A Nenkova","year":"2012","unstructured":"Nenkova, A., McKeown, K.: A survey of text summarization techniques. In: Aggarwal, C., Zhai, C. (eds.) Mining Text Data, pp. 43\u201376. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-1-4614-3223-4_3"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Allahyari, M., et al.: Text summarization techniques: a brief survey. arXiv:1707.02268v3 [cs.CL] (2017)","DOI":"10.14569\/IJACSA.2017.081052"},{"key":"4_CR38","doi-asserted-by":"crossref","unstructured":"Manning, C.D., Surdeanu, M., Bauer, J., Finkel, J., Bethard, S.J., McClosky, D.: The stanford CoreNLP natural language processing toolkit. In: Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations (ACL), pp. 55\u201360 (2014)","DOI":"10.3115\/v1\/P14-5010"},{"issue":"2","key":"4_CR39","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/959258.959260","volume":"37","author":"D Kelly","year":"2003","unstructured":"Kelly, D., Teevan, J.: Implicit feedback for inferring user preference: a bibliography. ACM SIGIR Forum 37(2), 18\u201328 (2003)","journal-title":"ACM SIGIR Forum"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Agichtein, E., Brill, E., Dumais, S.: Improving web search ranking by incorporating user behavior information. In: Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pp. 19\u201326. ACM Press (2006)","DOI":"10.1145\/1148170.1148177"},{"key":"4_CR41","doi-asserted-by":"crossref","unstructured":"Carvalho, V.M., et al.: Tracking the Covid-19 crisis with high-resolution transaction data. CEPR Discussion Paper No. DP14642 (2020)","DOI":"10.1098\/rsos.210218"},{"issue":"1","key":"4_CR42","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/944217.944233","volume":"46","author":"MP Papazoglou","year":"2003","unstructured":"Papazoglou, M.P., Georgakopoulos, D.: Introduction: service-oriented computing. Communun. ACM 46(1), 24\u201328 (2003)","journal-title":"Communun. ACM"},{"key":"4_CR43","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.jss.2014.12.015","volume":"101","author":"A Abdelmaboud","year":"2015","unstructured":"Abdelmaboud, A., Jawawi, D.N.A., Ghani, I., Elsafi, A., Kitchenham, B.: Quality of service approaches in cloud computing: a systematic mapping study. J. Syst. Softw. 101, 159\u2013179 (2015)","journal-title":"J. Syst. Softw."},{"key":"4_CR44","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-319-64161-4_13","volume-title":"Synergies Between Knowledge Engineering and Software Engineering","author":"A Janes","year":"2018","unstructured":"Janes, A.: Non-distracting, continuous collection of software development process data. In: Nalepa, G.J., Baumeister, J. (eds.) Synergies Between Knowledge Engineering and Software Engineering. AISC, vol. 626, pp. 275\u2013294. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-64161-4_13"},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Joachims, T.: Optimizing search engines using clickthrough data. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 133\u2013142. ACM Press (2002)","DOI":"10.1145\/775047.775067"},{"key":"4_CR46","volume-title":"The New Handbook of Methods in Nonverbal Behavior Research","year":"2005","unstructured":"Harrigan, J., Rosenthal, R., Scherer, K. (eds.): The New Handbook of Methods in Nonverbal Behavior Research. Oxford University Press, Oxford (2005)"},{"key":"4_CR47","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.infsof.2015.06.008","volume":"67","author":"Z Sharafi","year":"2015","unstructured":"Sharafi, Z., Soh, Z., Gu\u00e9h\u00e9neuc, Y.-G.: A systematic literature review on the usage of eye-tracking in software engineering. Inf. Softw. Technol. 67, 79\u2013107 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR48","doi-asserted-by":"crossref","unstructured":"Joachims, T., Granka, L., Pan, B., Hembrooke, H., Gay, G.: Accurately interpreting clickthrough data as implicit feedback. In: Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pp. 154\u2013161. ACM Press (2005)","DOI":"10.1145\/1076034.1076063"},{"issue":"4","key":"4_CR49","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1007\/s10723-013-9269-0","volume":"11","author":"A Kertesz","year":"2013","unstructured":"Kertesz, A., et al.: Enhancing federated cloud management with an integrated service monitoring approach. J. Grid Comput. 11(4), 699\u2013720 (2013). https:\/\/doi.org\/10.1007\/s10723-013-9269-0","journal-title":"J. Grid Comput."},{"key":"4_CR50","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.datak.2017.03.008","volume":"110","author":"O Cabrera","year":"2017","unstructured":"Cabrera, O., Franch, X., Marco, J.: Ontology-based context modeling in service-oriented computing: a systematic mapping. Data Knowl. Eng. 110, 24\u201353 (2017)","journal-title":"Data Knowl. Eng."},{"key":"4_CR51","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.infsof.2012.06.013","volume":"55","author":"R Ali","year":"2013","unstructured":"Ali, R., Dalpiaz, F., Giorgini, P.: Reasoning with contextual requirements: detecting inconsistency and conflicts. Inf. Softw. Technol. 55, 35\u201357 (2013)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR52","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.infsof.2015.10.001","volume":"70","author":"A Knauss","year":"2016","unstructured":"Knauss, A., Damian, D.E., Franch, X., Rook, A., M\u00fcller, H.A., Thomo, A.: ACon: a learning-based approach to deal with uncertainty in contextual requirements at runtime. Inf. Softw. Technol. 70, 85\u201399 (2016)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR53","doi-asserted-by":"crossref","unstructured":"Sutcliffe, A., Sawyer, P.: Requirements elicitation: towards the unknown unknowns. In Proceedings of the 21st International Requirements Engineering Conference (RE), pp. 92\u2013104. IEEE Press (2013)","DOI":"10.1109\/RE.2013.6636709"},{"key":"4_CR54","doi-asserted-by":"crossref","unstructured":"Oriol, M., et al.: FAME: supporting continuous requirements elicitation by combining user feedback and monitoring. In: Proceedings of the 26th International Requirements Engineering Conference (RE), pp. 217\u2013227. IEEE Computer Society (2018)","DOI":"10.1109\/RE.2018.00030"},{"key":"4_CR55","doi-asserted-by":"crossref","unstructured":"McDaniel, M., Storey, V.C.: Evaluating domain ontologies: clarification, classification, and challenges. ACM Comput. Surv. 52(4), Article 70 (2019)","DOI":"10.1145\/3329124"},{"issue":"2","key":"4_CR56","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MS.2017.33","volume":"34","author":"EC Groen","year":"2017","unstructured":"Groen, E.C., et al.: The crowd in requirements engineering: the landscape and challenges. IEEE Softw. 34(2), 44\u201352 (2017)","journal-title":"IEEE Softw."},{"key":"4_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-030-15538-4_16","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"D W\u00fcest","year":"2019","unstructured":"W\u00fcest, D., Fotrousi, F., Fricker, S.: Combining monitoring and autonomous feedback requests to elicit actionable knowledge of system use. In: Knauss, E., Goedicke, M. (eds.) REFSQ 2019. LNCS, vol. 11412, pp. 209\u2013225. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-15538-4_16"},{"key":"4_CR58","doi-asserted-by":"crossref","unstructured":"Johanssen, J.O., Kleebaum, A., Bruegge, B., Paech, B.: How do practitioners capture and utilize user feedback during continuous software engineering? In: Proceedings of the 27th International Requirements Engineering Conference (RE), pp. 153\u2013164. IEEE Press (2019)","DOI":"10.1109\/RE.2019.00026"},{"key":"4_CR59","unstructured":"Gall, H., Menzies, T., Williams, L., Zimmermann, T. (eds.): Software development analytics. Dagstuhl Rep. 4(6), 64\u201383 (2014)"},{"key":"4_CR60","doi-asserted-by":"crossref","unstructured":"Buse, R.P.L., Zimmermann, T.: Information needs for software development analytics. In: Proceedings of the 34th International Conference on Software Engineering (ICSE), pp. 987\u2013996. IEEE Press (2012)","DOI":"10.1109\/ICSE.2012.6227122"},{"key":"4_CR61","unstructured":"The ISO Organization: ISO\/IEC 25010:2011 \u2013Systems and Software Engineering\u2014Systems and Software Quality Requirements and Evaluation (SQuaRE)\u2014System and Software Quality Models (2011)"},{"key":"4_CR62","doi-asserted-by":"publisher","first-page":"68219","DOI":"10.1109\/ACCESS.2019.2917403","volume":"7","author":"S Mart\u00ednez-Fern\u00e1ndez","year":"2019","unstructured":"Mart\u00ednez-Fern\u00e1ndez, S., et al.: Continuously assessing and improving software quality with software analytics tools: a case study. IEEE Access 7, 68219\u201368239 (2019)","journal-title":"IEEE Access"},{"key":"4_CR63","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.infsof.2015.02.009","volume":"62","author":"S Wagner","year":"2015","unstructured":"Wagner, S., et al.: Operationalised product quality models and assessment: the quamoco approach. Inf. Softw. Technol. 62, 101\u2013123 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR64","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-030-28957-7_26","volume-title":"Computer Information Systems and Industrial Management","author":"M Chora\u015b","year":"2019","unstructured":"Chora\u015b, M., Kozik, R., Pawlicki, M., Ho\u0142ubowicz, W., Franch, X.: Software development metrics prediction using time series methods. In: Saeed, K., Chaki, R., Janev, V. (eds.) CISIM 2019. LNCS, vol. 11703, pp. 311\u2013323. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-28957-7_26"},{"issue":"3","key":"4_CR65","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1007\/s11219-020-09509-y","volume":"28","author":"M Oriol","year":"2020","unstructured":"Oriol, M., et al.: Data-driven and tool-supported elicitation of quality requirements in agile companies. Softw. Qual. J. 28(3), 931\u2013963 (2020). https:\/\/doi.org\/10.1007\/s11219-020-09509-y. (in press)","journal-title":"Softw. Qual. J."},{"key":"4_CR66","doi-asserted-by":"crossref","unstructured":"Renault, S., Mendez-Bonilla, O., Franch, X., Quer, C.: PABRE: pattern-based requirements elicitation. In: Proceedings of the 3rd International Conference on Research Challenges in Information Science (RCIS), pp. 81\u201392. IEEE Press (2009)","DOI":"10.1109\/RCIS.2009.5089271"},{"key":"4_CR67","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-030-15538-4_4","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"F Dalpiaz","year":"2019","unstructured":"Dalpiaz, F., Parente, M.: RE-SWOT: from user feedback to requirements via competitor analysis. In: Knauss, E., Goedicke, M. (eds.) REFSQ 2019. LNCS, vol. 11412, pp. 55\u201370. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-15538-4_4"},{"issue":"3","key":"4_CR68","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.infsof.2009.11.006","volume":"52","author":"M Svahnberg","year":"2010","unstructured":"Svahnberg, M., Gorschek, T., Feldt, R., Torkar, R., Saleem, S.B., Shafique, M.U.: A systematic review on strategic release planning models. Inf. Softw. Technol. 52(3), 237\u2013248 (2010)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR69","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-319-49094-6_4","volume-title":"Product-Focused Software Process Improvement","author":"D Ameller","year":"2016","unstructured":"Ameller, D., Farr\u00e9, C., Franch, X., Rufian, G.: A survey on software release planning models. In: Abrahamsson, P., Jedlitschka, A., Nguyen Duc, A., Felderer, M., Amasaki, S., Mikkonen, T. (eds.) PROFES 2016. LNCS, vol. 10027, pp. 48\u201365. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49094-6_4"},{"issue":"4","key":"4_CR70","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.infsof.2003.07.002","volume":"46","author":"D Greer","year":"2004","unstructured":"Greer, D., Ruhe, G.: Software release planning: an evolutionary and iterative approach. Inf. Softw. Technol. 46(4), 243\u2013253 (2004)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR71","doi-asserted-by":"crossref","unstructured":"Nayebi, M., Adams, B., Ruhe, G.: Release practices for mobile apps \u2013 what do users and developers think? In: Proceedings of the 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), pp. 552\u2013562 (2016)","DOI":"10.1109\/SANER.2016.116"},{"key":"4_CR72","doi-asserted-by":"crossref","unstructured":"Villarroel, L., Bavota, G., Russo, B., Oliveto, R., di Penta, M.: Release planning of mobile apps based on user reviews. In: Proceedings of the 38th International Conference on Software Engineering (ICSE), pp. 14\u201324. IEEE Computer Society (2016)","DOI":"10.1145\/2884781.2884818"},{"key":"4_CR73","doi-asserted-by":"crossref","unstructured":"Maalej, W., Nayebi, M., Ruhe, G.: Data-driven requirements engineering - an update. In: Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), pp. 289\u2013290 (2019)","DOI":"10.1109\/ICSE-SEIP.2019.00041"},{"key":"4_CR74","doi-asserted-by":"crossref","unstructured":"Kifetew, F.M., et al.: Gamifying collaborative prioritization: does pointsification work? In: Proceedings of the 25th International Requirements Engineering Conference (RE), pp. 322\u2013331. IEEE Press (2017)","DOI":"10.1109\/RE.2017.66"},{"key":"4_CR75","doi-asserted-by":"crossref","unstructured":"Johann, T., Maalej, W.: Democratic mass participation of users in requirements engineering? In: Proceedings of the 23rd International Requirements Engineering Conference (RE), pp. 256\u2013261. IEEE Press (2015)","DOI":"10.1109\/RE.2015.7320433"},{"issue":"5","key":"4_CR76","first-page":"13","volume":"4","author":"C Shearer","year":"2000","unstructured":"Shearer, C.: The CRISP-DM model: the new blueprint for data mining. J. Data Warehous. 4(5), 13\u201322 (2000)","journal-title":"J. Data Warehous."},{"issue":"6","key":"4_CR77","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MS.2019.2933681","volume":"36","author":"C Ebert","year":"2019","unstructured":"Ebert, C., Heidrich, J., Martinez-Fernandez, S., Trendowicz, A.: Data science: technologies for better software. IEEE Softw. 36(6), 66\u201372 (2019)","journal-title":"IEEE Softw."},{"key":"4_CR78","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-030-19034-7_5","volume-title":"Agile Processes in Software Engineering and Extreme Programming","author":"RB Svensson","year":"2019","unstructured":"Svensson, R.B., Feldt, R., Torkar, R.: The unfulfilled potential of data-driven decision making in agile software development. In: Kruchten, P., Fraser, S., Coallier, F. (eds.) XP 2019. LNBIP, vol. 355, pp. 69\u201385. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-19034-7_5"},{"key":"4_CR79","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-030-44429-7_10","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"X Franch","year":"2020","unstructured":"Franch, X., et al.: Towards integrating data-driven requirements engineering into the software development process: a vision paper. In: Madhavji, N., Pasquale, L., Ferrari, A., Gnesi, S. (eds.) REFSQ 2020. LNCS, vol. 12045, pp. 135\u2013142. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44429-7_10"},{"key":"4_CR80","series-title":"Progress in IS","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-45557-0_9","volume-title":"Gamification","author":"F Dalpiaz","year":"2017","unstructured":"Dalpiaz, F., Snijders, R., Brinkkemper, S., Hosseini, M., Shahri, A., Ali, R.: Engaging the crowd of stakeholders in requirements engineering via gamification. In: Stieglitz, S., Lattemann, C., Robra-Bissantz, S., Zarnekow, R., Brockmann, T. (eds.) Gamification. PI, pp. 123\u2013135. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-45557-0_9"},{"key":"4_CR81","doi-asserted-by":"publisher","first-page":"3316","DOI":"10.1007\/s10664-019-09706-9","volume":"24","author":"D Martens","year":"2019","unstructured":"Martens, D., Maalej, W.: Towards detecting and understanding fake reviews in app stores. Empir. Eng. 24, 3316\u20133355 (2019). https:\/\/doi.org\/10.1007\/s10664-019-09706-9","journal-title":"Empir. Eng."},{"key":"4_CR82","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.infsof.2018.08.013","volume":"105","author":"E Zavala","year":"2019","unstructured":"Zavala, E., Franch, X., Marco, J.: Adaptive monitoring: a systematic mapping. Inf. Softw. Technol. 105, 161\u2013189 (2019)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR83","doi-asserted-by":"crossref","unstructured":"Pruitt, J., Grudin, J.: Personas: practice and theory. In: Proceedings of the 2003 Conference on Designing for User Experiences (DUX), pp. 1\u201315. ACM Press (2003)","DOI":"10.1145\/997078.997089"},{"key":"4_CR84","doi-asserted-by":"crossref","unstructured":"Almaliki, M., Ncube, C., Ali, R.: Adaptive software-based feedback acquisition: a persona-based design. In: Proceedings of the 9th International Conference on Research Challenges in Information Science (RCIS), pp. 100\u2013111. IEEE Press (2015)","DOI":"10.1109\/RCIS.2015.7128868"},{"key":"4_CR85","doi-asserted-by":"publisher","first-page":"78452","DOI":"10.1109\/ACCESS.2020.2990117","volume":"8","author":"M Choras","year":"2020","unstructured":"Choras, M., et al.: Measuring and improving agile processes in a small-size software development company. IEEE Access 8, 78452\u201378466 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"4_CR86","doi-asserted-by":"publisher","first-page":"41","DOI":"10.2307\/249021","volume":"1","author":"R Kling","year":"1977","unstructured":"Kling, R.: The organizational context of user-centered software designs. MIS Q. 1(4), 41\u201352 (1977)","journal-title":"MIS Q."},{"key":"4_CR87","unstructured":"Hansen, W.J.: User engineering principles for interactive systems. In: Proceedings of the Fall Joint Computer Conference (AFIPS), pp. 523\u2013532. ACM Press (1971)"},{"key":"4_CR88","doi-asserted-by":"crossref","unstructured":"Cook, J.E., Wolf, A.L.: Automating process discovery through event-data analysis. In: Proceedings of the 17th International Conference on Software Engineering (ICSE), pp. 73\u201382. IEEE Press (1995)","DOI":"10.1145\/225014.225021"},{"key":"4_CR89","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/BFb0101003","volume-title":"Advances in Database Technology \u2014 EDBT\u201998","author":"R Agrawal","year":"1998","unstructured":"Agrawal, R., Gunopulos, D., Leymann, F.: Mining process models from workflow logs. In: Schek, H.-J., Alonso, G., Saltor, F., Ramos, I. (eds.) EDBT 1998. LNCS, vol. 1377, pp. 467\u2013483. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0101003"},{"key":"4_CR90","unstructured":"Wolf, A.L., Rosenblum, D.S.: A study in software process data capture and analysis. In: Proceedings of the 2nd International Conference on the Software Process-Continuous Software Process Improvement (SPCON), pp. 115\u2013124. IEEE Press (1993)"},{"key":"4_CR91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"W van der Aalst","year":"2011","unstructured":"van der Aalst, W.: Process Mining: Discovery, Conformance and Enhancement of Business Processes. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19345-3"},{"issue":"4","key":"4_CR92","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TSC.2012.25","volume":"6","author":"W van der Aalst","year":"2013","unstructured":"van der Aalst, W.: Service mining: using process mining to discover, check, and improve service behavior. IEEE Trans. Serv. Comput. 6(4), 525\u2013535 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"4_CR93","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1016\/j.eswa.2019.05.003","volume":"133","author":"CDS Garcia","year":"2019","unstructured":"Garcia, C.D.S., et al.: Process mining techniques and applications \u2013 a systematic mapping study. Expert Syst. Appl. 133, 260\u2013295 (2019)","journal-title":"Expert Syst. Appl."},{"key":"4_CR94","doi-asserted-by":"crossref","unstructured":"Hassan, A.E.: Mining software repositories to assist developers and support managers. In: Proceedings of the 22nd IEEE International Conference on Software Maintenance (ICSM), pp. 339\u2013342. IEEE Press (2006)","DOI":"10.1109\/ICSM.2006.38"},{"issue":"2","key":"4_CR95","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1002\/smr.344","volume":"19","author":"H Kagdi","year":"2007","unstructured":"Kagdi, H., Collard, M.L., Maletic, J.I.: A survey and taxonomy of approaches for mining software repositories in the context of software evolution. J. Softw. Evol. Process 19(2), 77\u2013131 (2007)","journal-title":"J. Softw. Evol. Process"},{"key":"4_CR96","volume-title":"The Art and Science of Analyzing Software Data","author":"C Bird","year":"2016","unstructured":"Bird, C., Menzies, T., Zimmermann, T.: The Art and Science of Analyzing Software Data. Elsevier, Amsterdam (2016)"},{"issue":"10","key":"4_CR97","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/944217.944233","volume":"46","author":"MP Papazoglou","year":"2003","unstructured":"Papazoglou, M.P., Georgakopoulos, D.: Introduction: service-oriented computing. Commun. ACM 46(10), 24\u201328 (2003)","journal-title":"Commun. ACM"},{"issue":"19","key":"4_CR98","doi-asserted-by":"publisher","first-page":"6507","DOI":"10.1016\/j.eswa.2015.03.027","volume":"42","author":"M Oriol","year":"2015","unstructured":"Oriol, M., Franch, X., Marco, J.: Monitoring the service-based system lifecycle with SALMon. Expert Syst. Appl. 42(19), 6507\u20136521 (2015)","journal-title":"Expert Syst. Appl."},{"key":"4_CR99","doi-asserted-by":"crossref","unstructured":"Comuzzi, M., Kotsokalis, C., Spanoudakis, G., Yahyapour, R.: Establishing and monitoring SLAs in complex service based systems. In: Proceedings of the 2009 IEEE International Conference on Web Services (ICWS), pp. 783\u2013790. IEEE Press (2009)","DOI":"10.1109\/ICWS.2009.47"},{"issue":"2","key":"4_CR100","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/TSC.2013.45","volume":"7","author":"C M\u00fcller","year":"2014","unstructured":"M\u00fcller, C., et al.: Comprehensive explanation of SLA violations at runtime. IEEE Trans. Serv. Comput. 7(2), 168\u2013183 (2014)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"4_CR101","unstructured":"Fickas, S., Feather, M.S.: Requirements monitoring in dynamic environments. In: Proceedings of the 2nd IEEE International Symposium on Requirements Engineering (ISRE), pp. 140\u2013147. IEEE Press (1995)"},{"key":"4_CR102","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.infsof.2016.08.005","volume":"80","author":"M Vierhauser","year":"2016","unstructured":"Vierhauser, M., Rabiser, R., Gr\u00fcnbacher, P.: Requirements monitoring frameworks: a systematic review. Inf. Softw. Technol. 80, 89\u2013109 (2016)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR103","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-642-28714-5_25","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"M Oriol","year":"2012","unstructured":"Oriol, M., Qureshi, N.A., Franch, X., Perini, A., Marco, J.: Requirements monitoring for adaptive service-based applications. In: Regnell, B., Damian, D. (eds.) REFSQ 2012. LNCS, vol. 7195, pp. 280\u2013287. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28714-5_25"},{"key":"4_CR104","doi-asserted-by":"crossref","unstructured":"Cailliau, A., van Lamsweerde, A.: Runtime monitoring and resolution of probabilistic obstacles to system goals. ACM Trans. Auton. Adapt. Syst. 14(1), Article 3 (2019)","DOI":"10.1145\/3337800"},{"issue":"5","key":"4_CR105","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2009.138","volume":"26","author":"WN Robinson","year":"2009","unstructured":"Robinson, W.N.: Seeking quality through user-goal monitoring. IEEE Softw. 26(5), 58\u201365 (2009)","journal-title":"IEEE Softw."},{"key":"4_CR106","doi-asserted-by":"crossref","unstructured":"Kohavi, R., Deng, A., Frasca, B., Walker, T., Xu, Y., Pohlmann, N.: Online controlled experiments at large scale. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 1168\u20131176. ACM Press (2013)","DOI":"10.1145\/2487575.2488217"},{"key":"4_CR107","doi-asserted-by":"publisher","first-page":"e2113","DOI":"10.1002\/smr.2113","volume":"30","author":"A Fabijan","year":"2018","unstructured":"Fabijan, A., Dmitriev, P., McFarland, C., Vermeer, L., Holmstr\u00f6m Olsson, H., Bosch, J.: Experimentation growth: evolving trustworthy A\/B testing capabilities in online software companies. J. Softw. Evol. Process. 30, e2113 (2018)","journal-title":"J. Softw. Evol. Process."},{"key":"4_CR108","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.infsof.2016.04.008","volume":"77","author":"E Lindgren","year":"2016","unstructured":"Lindgren, E., M\u00fcnch, J.: Raising the odds of success: the current state of experimentation in product development. Inf. Softw. Technol. 77, 80\u201391 (2016)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR109","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-030-29852-4_32","volume-title":"Software Technology: Methods and Tools","author":"X Franch","year":"2019","unstructured":"Franch, X., Lopez, L., Mart\u00ednez-Fern\u00e1ndez, S., Oriol, M., Rodr\u00edguez, P., Trendowicz, A.: Quality-aware rapid software development project: the Q-rapids project. In: Mazzara, M., Bruel, J.-M., Meyer, B., Petrenko, A. (eds.) TOOLS 2019. LNCS, vol. 11771, pp. 378\u2013392. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29852-4_32"},{"key":"4_CR110","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-030-11680-4_3","volume-title":"Information Management and Big Data","author":"A Perini","year":"2019","unstructured":"Perini, A.: Data-driven requirements engineering. The SUPERSEDE way. In: Lossio-Ventura, J.A., Mu\u00f1ante, D., Alatrista-Salas, H. (eds.) SIMBig 2018. CCIS, vol. 898, pp. 13\u201318. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11680-4_3"},{"key":"4_CR111","unstructured":"Felfernig, A., Stetinger, M., Falkner, A., Atas, M., Franch, X., Palomares, C.: OpenReq: recommender systems in requirements engineering. In: Proceedings of the International Workshop on Recommender Systems and Social Network Analysis (RS-SNA), pp. 1\u20134. CEUR 2025 (2017)"},{"key":"4_CR112","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41467-1","volume-title":"Situational Method Engineering","author":"B Henderson-Sellers","year":"2014","unstructured":"Henderson-Sellers, B., Ralyt\u00e9, J., \u00c5gerfalk, P., Rossi, M.: Situational Method Engineering. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-41467-1"},{"key":"4_CR113","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/978-3-319-91563-0_37","volume-title":"Advanced Information Systems Engineering","author":"X Franch","year":"2018","unstructured":"Franch, X., et al.: A situational approach for the definition and tailoring of a data-driven software evolution method. In: Krogstie, J., Reijers, H.A. (eds.) CAiSE 2018. LNCS, vol. 10816, pp. 603\u2013618. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91563-0_37"},{"key":"4_CR114","doi-asserted-by":"crossref","unstructured":"Dam, H.K., Tran, T., Ghose, A.: Explainable software analytics. In: Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER), pp. 53\u201356. ACM Press (2018)","DOI":"10.1145\/3183399.3183424"},{"key":"4_CR115","doi-asserted-by":"crossref","unstructured":"Franch, X., Palomares, C., Gorschek, T.: On the requirements engineer role. Commun. ACM (in press). http:\/\/dx.doi.org\/10.1145\/3418292","DOI":"10.1145\/3418292"}],"container-title":["Communications in Computer and Information Science","Evaluation of Novel Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-70006-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,22]],"date-time":"2023-10-22T01:22:07Z","timestamp":1697937727000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-70006-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030700058","9783030700065"],"references-count":115,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-70006-5_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ENASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Evaluation of Novel Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 May 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 May 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"enase2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.enase.org\/?y=2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"96","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}