{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:51:11Z","timestamp":1725742271623},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642394812"},{"type":"electronic","value":"9783642394829"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39482-9_41","type":"book-chapter","created":{"date-parts":[[2013,7,23]],"date-time":"2013-07-23T05:49:15Z","timestamp":1374558555000},"page":"353-362","source":"Crossref","is-referenced-by-count":2,"title":["Quantitative Evaluation across Software Development Life Cycle Based on Evidence Theory"],"prefix":"10.1007","author":[{"given":"Weixiang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wenhong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"41_CR1","first-page":"145","volume":"22","author":"K. Liu","year":"2008","unstructured":"Liu, K., Shan, Z., Wang, J.: Overview on major research plan of trustworthy software. Bulletin of National Natural Science Foundation of China\u00a022(3), 145\u2013151 (2008)","journal-title":"Bulletin of National Natural Science Foundation of China"},{"key":"41_CR2","unstructured":"McCall, J.: The Automated Meaz of Software Quality. In: 5th COMMPSAC (1981)"},{"key":"41_CR3","unstructured":"ISO\/IEC 9126 Information Technology\u2014Software Product Evaluation\u2014Quality Characteristics and Guidelines for Their Use, 1st edn. (1991)"},{"key":"41_CR4","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-642-31576-3_39","volume-title":"Intelligent Computing Theories and Applications","author":"W. Zhang","year":"2012","unstructured":"Zhang, W., Liu, W., Du, H.: A software quantitative assessment method based on software testing. In: Huang, D.-S., Ma, J., Jo, K.-H., Gromiha, M.M. (eds.) ICIC 2012. LNCS (LNAI), vol.\u00a07390, pp. 300\u2013307. Springer, Heidelberg (2012)"},{"issue":"4","key":"41_CR5","first-page":"16","volume":"23","author":"S.Z. Wang","year":"2002","unstructured":"Wang, S.Z., Xian, M., Wang, X.S.: Study on synthetic evaluation method of software quality. Computer Engineering and Design\u00a023(4), 16\u201318 (2002) (in Chinese)","journal-title":"Computer Engineering and Design"},{"issue":"1","key":"41_CR6","first-page":"66","volume":"29","author":"J.L. Dong","year":"2007","unstructured":"Dong, J.L., Shi, N.G.: Research and improvement of the fuzzy synthesis evaluation algorithm based on software quality. Computer Engineering and Science\u00a029(1), 66\u201368 (2007) (in Chinese)","journal-title":"Computer Engineering and Science"},{"issue":"7","key":"41_CR7","first-page":"1152","volume":"46","author":"S.L. Yang","year":"2009","unstructured":"Yang, S.L., Ding, S., Chu, W.: Trustworthy Software Evaluation Using Utility Based Evidence Theory. Journal of Computer Research and Development\u00a046(7), 1152\u20131159 (2009) (in Chinese)","journal-title":"Journal of Computer Research and Development"},{"key":"41_CR8","volume-title":"Data Fusion Theory and Application","author":"Y.H. Kang","year":"1997","unstructured":"Kang, Y.H.: Data Fusion Theory and Application. Electronic Technology University Press, Xi\u2019an (1997) (in Chinese)"},{"issue":"4","key":"41_CR9","first-page":"571","volume":"45","author":"Y. Li","year":"2008","unstructured":"Li, Y., Cai, Y., Yin, R.P.: Supprot vector machine ensemble based on evidence theory for multi-class classification. Journal of Computer Research and Development\u00a045(4), 571\u2013578 (2008) (in Chinese)","journal-title":"Journal of Computer Research and Development"},{"key":"41_CR10","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G. Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton U P, Princetion (1976)"},{"issue":"2","key":"41_CR11","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/0020-0255(87)90007-7","volume":"41","author":"R.R. Yager","year":"1987","unstructured":"Yager, R.R.: On the D-S framework and new combination rules. Information Sciences\u00a041(2), 93\u2013138 (1987)","journal-title":"Information Sciences"},{"issue":"8","key":"41_CR12","first-page":"117","volume":"28","author":"Q. Sun","year":"2000","unstructured":"Sun, Q., Ye, X.Q., Gu, W.K.: A New Combination Rules of Evidence Theory. ACTA Electronicia Sinica\u00a028(8), 117\u2013119 (2000)","journal-title":"ACTA Electronicia Sinica"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39482-9_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T23:26:42Z","timestamp":1646177202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39482-9_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642394812","9783642394829"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39482-9_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}