{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T19:43:51Z","timestamp":1726083831822},"publisher-location":"Singapore","reference-count":53,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811552311"},{"type":"electronic","value":"9789811552328"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-5232-8_31","type":"book-chapter","created":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T12:02:53Z","timestamp":1588939373000},"page":"357-371","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-aspects Intelligent Requirements Prioritization Technique for Value Based Software Systems"],"prefix":"10.1007","author":[{"given":"Falak","family":"Sher","sequence":"first","affiliation":[]},{"given":"Dayang N. A.","family":"Jawawi","sequence":"additional","affiliation":[]},{"given":"Radziah","family":"Mohammad","sequence":"additional","affiliation":[]},{"given":"Muhammad Imran","family":"Babar","sequence":"additional","affiliation":[]},{"given":"Rafaqat","family":"Kazmi","sequence":"additional","affiliation":[]},{"given":"Muhammad Arif","family":"Shah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,9]]},"reference":[{"key":"31_CR1","unstructured":"Brooks, F., Kugler, H.: No silver bullet, April 1987"},{"key":"31_CR2","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/267580.267581","volume":"29","author":"P Zave","year":"1997","unstructured":"Zave, P.: Classification of research efforts in requirements engineering. ACM Comput. Surv. (CSUR) 29, 315\u2013321 (1997)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"31_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/638750.638775","volume":"28","author":"B Boehm","year":"2003","unstructured":"Boehm, B.: Value-based software engineering: reinventing. ACM SIGSOFT Softw. Eng. Notes 28, 3 (2003)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"31_CR4","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MC.2003.1185215","volume":"36","author":"B Boehm","year":"2003","unstructured":"Boehm, B., Huang, L.G.: Value-based software engineering: a case study. Computer 36, 33\u201341 (2003)","journal-title":"Computer"},{"key":"31_CR5","first-page":"359","volume":"55","author":"MI Babar","year":"2013","unstructured":"Babar, M.I., Ghazali, M., Jawawi, D.N.: Software quality enhancement for value based systems through stakeholders quantification. J. Theor. Appl. Inf. Technol. 55, 359\u2013371 (2013)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/3-540-29263-2_1","volume-title":"Value-Based Software Engineering","author":"BW Boehm","year":"2006","unstructured":"Boehm, B.W.: Value-based software engineering: overview and agenda. In: Biffl, S., Aurum, A., Boehm, B., Erdogmus, H., Gr\u00fcnbacher, P. (eds.) Value-Based Software Engineering, pp. 3\u201314. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/3-540-29263-2_1"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Grube, P.P., Schmid, K.: Selecting creativity techniques for innovative requirements engineering. In: 2008 Third International Workshop on Multimedia and Enjoyable Requirements Engineering-Beyond Mere Descriptions and with More Fun and Games, MERE 2008, pp. 32\u201336 (2008)","DOI":"10.1109\/MERE.2008.6"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Van Lamsweerde, A.: Requirements engineering in the year 00: a research perspective. In: Proceedings of the 22nd International Conference on Software Engineering, pp. 5\u201319 (2000)","DOI":"10.1145\/337180.337184"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Nuseibeh, B., Easterbrook, S.: Requirements engineering: a roadmap. In: Proceedings of the Conference on the Future of Software Engineering, pp. 35\u201346 (2000)","DOI":"10.1145\/336512.336523"},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.5539\/mas.v12n2p62","volume":"12","author":"A Hudaib","year":"2018","unstructured":"Hudaib, A., Masadeh, R., Qasem, M.H., Alzaqebah, A.: Requirements prioritization techniques comparison. Mod. Appl. Sci. 12, 62 (2018)","journal-title":"Mod. Appl. Sci."},{"key":"31_CR11","unstructured":"Kitchenham, B.: Procedures for performing systematic reviews. Keele University, Keele, UK, vol. 33, p. 2004 (2004)"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Chatzipetrou, P., Angelis, L., Rovegard, P., Wohlin, C.: Prioritization of issues and requirements by cumulative voting: a compositional data analysis framework. In: 2010 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), pp. 361\u2013370 (2010)","DOI":"10.1109\/SEAA.2010.35"},{"key":"31_CR13","series-title":"Advanced Applications in Pattern Recognition","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1","volume-title":"Pattern Recognition with Fuzzy Objective Function Algorithms","author":"JC Bezdek","year":"1981","unstructured":"Bezdek, J.C.: Pattern Recognition with Fuzzy Objective Function Algorithms. AAPR. Springer, Boston (1981). \nhttps:\/\/doi.org\/10.1007\/978-1-4757-0450-1"},{"key":"31_CR14","first-page":"11","volume":"4","author":"Y Yong","year":"2004","unstructured":"Yong, Y., Chongxun, Z., Pan, L.: A novel fuzzy c-means clustering algorithm for image thresholding. Measur. Sci. Rev. 4, 11\u201319 (2004)","journal-title":"Measur. Sci. Rev."},{"key":"31_CR15","first-page":"145","volume":"1","author":"VS Rao","year":"2010","unstructured":"Rao, V.S., Vidyavathi, D.S.: Comparative investigations and performance analysis of FCM and MFPCM algorithms on iris data. Indian J. Comput. Sci. Eng. 1, 145\u2013151 (2010)","journal-title":"Indian J. Comput. Sci. Eng."},{"key":"31_CR16","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1016\/S0950-5849(97)00053-0","volume":"39","author":"J Karlsson","year":"1998","unstructured":"Karlsson, J., Wohlin, C., Regnell, B.: An evaluation of methods for prioritizing software requirements. Inf. Softw. Technol. 39, 939\u2013947 (1998)","journal-title":"Inf. Softw. Technol."},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Laurent, P., Cleland-Huang, J., Duan, C.: Towards automated requirements triage. In: 2007 15th IEEE International Requirements Engineering Conference, RE 2007, pp. 131\u2013140 (2007)","DOI":"10.1109\/RE.2007.63"},{"key":"31_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-540-30181-3_15","volume-title":"Software Process Improvement","author":"L Lehtola","year":"2004","unstructured":"Lehtola, L., Kauppinen, M.: Empirical evaluation of two requirements prioritization methods in product development projects. In: Dings\u00f8yr, T. (ed.) EuroSPI 2004. LNCS, vol. 3281, pp. 161\u2013170. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-30181-3_15"},{"key":"31_CR19","unstructured":"Khan, K.A.: A systematic review of software requirements prioritization. Unpublished master\u2019s thesis, Blekinge Institute of Technology, Ronneby, Sweden (2006)"},{"key":"31_CR20","unstructured":"Ahl, V.: An experimental comparison of five prioritization methods. Master\u2019s thesis, School of Engineering, Blekinge Institute of Technology, Ronneby, Sweden (2005)"},{"key":"31_CR21","unstructured":"Berander, P.: Prioritization of stakeholder needs in software engineering. Understanding and evaluation. Licenciate thesis, Blekinge Institute of Technology, Sweden, Licentiate Series, p. 12 (2004)"},{"key":"31_CR22","volume-title":"The Analytic Hierarchy Process: Planning, Priority Setting","author":"TL Saaty","year":"1980","unstructured":"Saaty, T.L.: The Analytic Hierarchy Process: Planning, Priority Setting. Resources Allocation. McGraw-Hill, New York (1980)"},{"key":"31_CR23","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/52.605933","volume":"14","author":"J Karlsson","year":"1997","unstructured":"Karlsson, J., Ryan, K.: A cost-value approach for prioritizing requirements. Softw. IEEE 14, 67\u201374 (1997)","journal-title":"Softw. IEEE"},{"key":"31_CR24","volume-title":"Managing Software Requirements: A Unified Approach","author":"D Leffingwell","year":"2000","unstructured":"Leffingwell, D., Widrig, D.: Managing Software Requirements: A Unified Approach. Addison-Wesley Professional, Boston (2000)"},{"key":"31_CR25","first-page":"18","volume":"6","author":"P Berander","year":"2006","unstructured":"Berander, P., Khan, K.A., Lehtola, L.: Towards a research framework on requirements prioritization. SERPS 6, 18\u201319 (2006)","journal-title":"SERPS"},{"key":"31_CR26","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1109\/32.29489","volume":"15","author":"BW Boehm","year":"1989","unstructured":"Boehm, B.W., Ross, R.: Theory-w software project management principles and examples. IEEE Trans. Softw. Eng. 15, 902\u2013916 (1989)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"31_CR27","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1016\/j.infsof.2014.02.001","volume":"56","author":"P Achimugu","year":"2014","unstructured":"Achimugu, P., Selamat, A., Ibrahim, R., Mahrin, M.N.R.: A systematic literature review of software requirements prioritization research. Inf. Softw. Technol. 56, 568\u2013585 (2014)","journal-title":"Inf. Softw. Technol."},{"key":"31_CR28","doi-asserted-by":"crossref","unstructured":"Beg, R., Abbas, Q., Verma, R.P.: An approach for requirement prioritization using b-tree. In: 2008 First International Conference on Emerging Trends in Engineering and Technology, ICETET 2008, pp. 1216\u20131221 (2008)","DOI":"10.1109\/ICETET.2008.158"},{"key":"31_CR29","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1142\/S0218194006003026","volume":"16","author":"P Berander","year":"2006","unstructured":"Berander, P., J\u00f6nsson, P.: Hierarchical cumulative voting (HCV)\u2014prioritization of requirements in hierarchies. Int. J. Software Eng. Knowl. Eng. 16, 819\u2013849 (2006)","journal-title":"Int. J. Software Eng. Knowl. Eng."},{"key":"31_CR30","doi-asserted-by":"crossref","unstructured":"Tonella, P., Susi, A., Palma, F.: Using interactive GA for requirements prioritization. In: Proceedings of the 2nd International Symposium on Search Based Software Engineering (SSBSE 2010), pp. 57\u201366 (2010)","DOI":"10.1109\/SSBSE.2010.17"},{"key":"31_CR31","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.infsof.2012.07.003","volume":"55","author":"P Tonella","year":"2013","unstructured":"Tonella, P., Susi, A., Palma, F.: Interactive requirements prioritization using a genetic algorithm. Inf. Softw. Technol. 55, 173\u2013187 (2013)","journal-title":"Inf. Softw. Technol."},{"key":"31_CR32","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1109\/TSE.2011.47","volume":"38","author":"RB Svensson","year":"2012","unstructured":"Svensson, R.B., Gorschek, T., Regnell, B., Torkar, R., Shahrokni, A., Feldt, R.: Quality requirements in industrial practice\u2014an extended interview study at eleven companies. IEEE Trans. Software Eng. 38, 923\u2013935 (2012)","journal-title":"IEEE Trans. Software Eng."},{"key":"31_CR33","doi-asserted-by":"crossref","unstructured":"Babar, M.I., Ramzan, M., Ghayyur, S.: Challenges and future trends in software requirements prioritization. In: 2011 International Conference on Computer Networks and Information Technology (ICCNIT), pp. 319\u2013324 (2011)","DOI":"10.1109\/ICCNIT.2011.6020888"},{"key":"31_CR34","volume-title":"Fundamentals of Neural Networks: Architectures, Algorithms, and Applications","author":"L Fausett","year":"1994","unstructured":"Fausett, L., Fausett, L.: Fundamentals of Neural Networks: Architectures, Algorithms, and Applications. Prentice-Hall, Upper Saddle River (1994)"},{"key":"31_CR35","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.knosys.2015.04.010","volume":"84","author":"MI Babar","year":"2015","unstructured":"Babar, M.I., Ghazali, M., Jawawi, D.N., Shamsuddin, S.M., Ibrahim, N.: PHandler: An expert system for a scalable software requirements prioritization process. Knowl.-Based Syst. 84, 179\u2013202 (2015)","journal-title":"Knowl.-Based Syst."},{"key":"31_CR36","unstructured":"Vestola, M.: A comparison of nine basic techniques for requirements prioritization (2010)"},{"key":"31_CR37","unstructured":"Dos Santos, J.R.F., Albuquerque, A.B., Pinheiro, P.R.: Requirements prioritization in market-driven software: a survey based on large numbers of stakeholders and requirements. In: 2016 10th International Conference on the Quality of Information and Communications Technology (QUATIC), pp. 67\u201372 (2016)"},{"key":"31_CR38","first-page":"303","volume":"8","author":"AR Asghar","year":"2017","unstructured":"Asghar, A.R., Tabassum, A., Bhatti, S.N., Shah, S., Ali, A.: The impact of analytical assessment of requirements prioritization models: an empirical study. Int. J. Adv. Comput. Sci. Appl. 8, 303\u2013313 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"31_CR39","first-page":"1017","volume":"7","author":"M Ramzan","year":"2011","unstructured":"Ramzan, M., Jaffar, M.A., Shahid, A.A.: Value based intelligent requirement prioritization (VIRP): expert driven fuzzy logic based prioritization technique. Int. J. Innov. Comput. Inf. Control (IJICIC) 7, 1017\u20131038 (2011)","journal-title":"Int. J. Innov. Comput. Inf. Control (IJICIC)"},{"key":"31_CR40","unstructured":"Karlsson, L.: Requirements prioritisation and retrospective analysis for release planning process improvement (2006)"},{"key":"31_CR41","unstructured":"Perini, A., Susi, A., Ricca, F., Bazzanella, C.: An empirical study to compare the accuracy of AHP and CBRanking techniques for requirements prioritization. In: 2007 Fifth International Workshop on Comparative Evaluation in Requirements Engineering, CERE 2007, pp. 23\u201335 (2007)"},{"key":"31_CR42","doi-asserted-by":"crossref","unstructured":"Dabbagh, M., Lee, S.P., Parizi, R.M.: Application of hybrid assessment method for priority assessment of functional and non-functional requirements. In: 2014 International Conference on Information Science and Applications (ICISA), pp. 1\u20134 (2014)","DOI":"10.1109\/ICISA.2014.6847365"},{"key":"31_CR43","doi-asserted-by":"publisher","first-page":"71497","DOI":"10.1109\/ACCESS.2018.2881755","volume":"6","author":"F Hujainah","year":"2018","unstructured":"Hujainah, F., Bakar, R.B.A., Abdulgabber, M.A., Zamli, K.Z.: Software requirements prioritisation: a systematic literature review on significance, stakeholders, techniques and challenges. IEEE Access 6, 71497\u201371523 (2018)","journal-title":"IEEE Access"},{"key":"31_CR44","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.jss.2016.09.043","volume":"126","author":"F Shao","year":"2017","unstructured":"Shao, F., Peng, R., Lai, H., Wang, B.: DRank: a semi-automated requirements prioritization method based on preferences and dependencies. J. Syst. Softw. 126, 141\u2013156 (2017)","journal-title":"J. Syst. Softw."},{"key":"31_CR45","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-319-54978-1_59","volume-title":"Information Technology - New Generations","author":"L Alawneh","year":"2018","unstructured":"Alawneh, L.: Requirements prioritization using hierarchical dependencies. In: Latifi, S. (ed.) Information Technology - New Generations. AISC, vol. 558, pp. 459\u2013464. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-54978-1_59"},{"key":"31_CR46","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.compeleceng.2017.06.022","volume":"61","author":"RV Anand","year":"2017","unstructured":"Anand, R.V., Dinakaran, M.: Handling stakeholder conflict by agile requirement prioritization using Apriori technique. Comput. Electr. Eng. 61, 126\u2013136 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"31_CR47","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1016\/j.procs.2016.07.109","volume":"91","author":"R Santos","year":"2016","unstructured":"Santos, R., Albuquerque, A., Pinheiro, P.R.: Towards the applied hybrid model in requirements prioritization. Procedia Comput. Sci. 91, 909\u2013918 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"31_CR48","doi-asserted-by":"crossref","unstructured":"Sher, F., Jawawi, D.N., Mohamad, R., Babar, M.I.: Multi-aspects based requirements priortization technique for value-based software developments. In: 2014 International Conference on Emerging Technologies (ICET), pp. 1\u20136 (2014)","DOI":"10.1109\/ICET.2014.7021007"},{"key":"31_CR49","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/TPAMI.1986.4767778","volume":"2","author":"RL Cannon","year":"1986","unstructured":"Cannon, R.L., Dave, J.V., Bezdek, J.C.: Efficient implementation of the fuzzy c-means clustering algorithms. IEEE Trans. Pattern Anal. Mach. 2, 248\u2013255 (1986)","journal-title":"IEEE Trans. Pattern Anal. Mach."},{"key":"31_CR50","doi-asserted-by":"crossref","unstructured":"Dunn, J.C.:A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters (1973)","DOI":"10.1080\/01969727308546046"},{"key":"31_CR51","doi-asserted-by":"crossref","unstructured":"Achimugu, P., Selamat, A., Ibrahim, R.: A clustering based technique for large scale prioritization during requirements elicitation. In: Recent Advances on Soft Computing and Data Mining, Springer, pp. 623\u2013632 (2014)","DOI":"10.1007\/978-3-319-07692-8_59"},{"key":"31_CR52","doi-asserted-by":"crossref","unstructured":"Achimugu, P., Selamat, A., Ibrahim, R.: ReproTizer: A fully implemented software requirements prioritization tool. In: Transactions on Computational Collective Intelligence XXII, Springer, pp. 80\u2013105 (2016)","DOI":"10.1007\/978-3-662-49619-0_5"},{"key":"31_CR53","unstructured":"Babar, M.I., Ghazali, M., Jawawi, D.N.: A bi-metric and fuzzy c-means based intelligent stakeholder quantification system for value-based software. SoMeT, pp. 295\u2013309 (2014)"}],"container-title":["Communications in Computer and Information Science","Intelligent Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5232-8_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T12:08:51Z","timestamp":1588939731000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5232-8_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811552311","9789811552328"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5232-8_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"9 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Technologies and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bahawalpur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pakistan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intap2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/jdconline.net\/intap\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"224","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1 Invited Paper","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}