{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T05:28:52Z","timestamp":1771478932324,"version":"3.50.1"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319076911","type":"print"},{"value":"9783319076928","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07692-8_59","type":"book-chapter","created":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T16:19:57Z","timestamp":1401380397000},"page":"623-632","source":"Crossref","is-referenced-by-count":17,"title":["A Clustering Based Technique for Large Scale Prioritization during Requirements Elicitation"],"prefix":"10.1007","author":[{"given":"Philip","family":"Achimugu","sequence":"first","affiliation":[]},{"given":"Ali","family":"Selamat","sequence":"additional","affiliation":[]},{"given":"Roliana","family":"Ibrahim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"59_CR1","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TSE.2012.52","volume":"39","author":"A. Perini","year":"2013","unstructured":"Perini, A., Susi, A., Avesani, P.: A machine learning approach to software requirements prioritization. IEEE Transactions on Software Engineering\u00a039(4), 445\u2013461 (2013)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"59_CR2","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.infsof.2012.07.003","volume":"55","author":"P. Tonella","year":"2013","unstructured":"Tonella, P., Susi, A., Palma, F.: Interactive requirements prioritization using a genetic algorithm. Information and Software Technology\u00a055(1), 173\u2013187 (2013)","journal-title":"Information and Software Technology"},{"key":"59_CR3","unstructured":"Ahl, V.: An experimental comparison of five prioritization methods. Master\u2019s Thesis, School of Engineering, Blekinge Institute of Technology, Ronneby, Sweden (2005)"},{"key":"59_CR4","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-28244-0_4","volume-title":"Engineering and Managing Software Requirements","author":"P. Berander","year":"2005","unstructured":"Berander, P., Andrews, A.: Requirements prioritization. In: Engineering and Managing Software Requirements, pp. 69\u201394. Springer, Heidelberg (2005)"},{"key":"59_CR5","doi-asserted-by":"crossref","unstructured":"Kobayashi, A., Maekawa, M.: Need-based requirements change management. In: Proceedings of the Eighth Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, ECBS 2001, pp. 171\u2013178. IEEE (2001)","DOI":"10.1109\/ECBS.2001.922419"},{"key":"59_CR6","unstructured":"Kassel, N.W., Malloy, B.A.: An approach to automate requirements elicitation and specification. In: International Conference on Software Engineering and Applications (2003)"},{"issue":"6","key":"59_CR7","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1016\/j.infsof.2008.12.001","volume":"51","author":"A. Perini","year":"2009","unstructured":"Perini, A., Ricca, F., Susi, A.: Tool-supported requirements prioritization: Comparing the AHP and CBRank methods. Information and Software Technology\u00a051(6), 1021\u20131032 (2009)","journal-title":"Information and Software Technology"},{"key":"59_CR8","doi-asserted-by":"crossref","unstructured":"Racheva, Z., Daneva, M., Herrmann, A., Wieringa, R.J.: A conceptual model and process for client-driven agile requirements prioritization. In: 2010 Fourth International Conference on Research Challenges in Information Science (RCIS), pp. 287\u2013298. IEEE (2010)","DOI":"10.1109\/RCIS.2010.5507388"},{"key":"59_CR9","first-page":"18","volume":"6","author":"P. Berander","year":"2006","unstructured":"Berander, P., Khan, K.A., Lehtola, L.: Towards a research framework on requirements prioritization. SERPS\u00a06, 18\u201319 (2006)","journal-title":"SERPS"},{"key":"59_CR10","doi-asserted-by":"crossref","unstructured":"Achimugu, P., Selamat, A., Ibrahim, R., Mahrin, M.N.R.: A systematic literature review of software requirements prioritization research. Information and Software Technology (2014)","DOI":"10.1016\/j.infsof.2014.02.001"},{"key":"59_CR11","unstructured":"Kaur, J., Gupta, S., Kundra, S.: A kmeans clustering based approach for evaluation of success of software reuse. In: Proceedings of International Conference on Intelligent Computational Systems, ICICS 2011 (2011)"},{"issue":"3","key":"59_CR12","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TSE.2011.36","volume":"38","author":"S.L. Lim","year":"2012","unstructured":"Lim, S.L., Finkelstein, A.: StakeRare: using social networks and collaborative filtering for large-scale requirements elicitation. IEEE Transactions on Software Engineering\u00a038(3), 707\u2013735 (2012)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"59_CR13","doi-asserted-by":"crossref","unstructured":"Lim, S.L., Harman, M., Susi, A.: Using Genetic Algorithms to Search for Key Stakeholders in Large-Scale Software Projects. In: Aligning Enterprise, System, and Software Architectures, pp. 118\u2013134 (2013)","DOI":"10.4018\/978-1-4666-2199-2.ch007"}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances on Soft Computing and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07692-8_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:57:28Z","timestamp":1746248248000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07692-8_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076911","9783319076928"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07692-8_59","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}