{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:20:37Z","timestamp":1771514437522,"version":"3.50.1"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T00:00:00Z","timestamp":1431043200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s00766-015-0225-3","type":"journal-article","created":{"date-parts":[[2015,5,7]],"date-time":"2015-05-07T11:44:20Z","timestamp":1430999060000},"page":"461-480","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Bayesian networks for enhancement of requirements engineering: a literature review"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9896-7196","authenticated-orcid":false,"given":"Isabel M.","family":"del \u00c1guila","sequence":"first","affiliation":[]},{"given":"Jos\u00e9","family":"del Sagrado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,8]]},"reference":[{"key":"225_CR1","volume-title":"Guide to the software engineering body of knowledge","author":"A Abran","year":"2004","unstructured":"Abran A, Moore J, Bourque P, Dupuis R, Tripp L (2004) Guide to the software engineering body of knowledge. IEEE Computer Society, Los Alamitos"},{"issue":"4","key":"225_CR2","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s00766-008-0068-2","volume":"13","author":"B Alenljung","year":"2008","unstructured":"Alenljung B, Persson A (2008) Portraying the practice of decision-making in requirements engineering: a case of large scale bespoke development. Requir Eng 13(4):257\u2013279. doi: 10.1007\/s00766-008-0068-2","journal-title":"Requir Eng"},{"key":"225_CR3","volume-title":"Discovering requirements. How to specify products and services","author":"I Alexander","year":"2009","unstructured":"Alexander I, Beus-Dukic L (2009) Discovering requirements. How to specify products and services. Wiley, New York"},{"issue":"6","key":"225_CR4","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1109\/TSE.2009.52","volume":"36","author":"S Ali","year":"2010","unstructured":"Ali S, Briand LC, Hemmati H, Panesar-Walawege RK (2010) A systematic review of the application and empirical investigation of search-based test case generation. IEEE Trans Softw Eng 36(6):742\u2013762. doi: 10.1109\/TSE.2009.52","journal-title":"IEEE Trans Softw Eng"},{"issue":"8","key":"225_CR5","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1016\/j.infsof.2010.03.014","volume":"52","author":"V Alves","year":"2010","unstructured":"Alves V, Niu N, Alves C, Valena G (2010) Requirements engineering for software product lines: a systematic literature review. Inf Softw Technol 52(8):806\u2013820. doi: 10.1016\/j.infsof.2010.03.014","journal-title":"Inf Softw Technol"},{"issue":"14","key":"225_CR6","doi-asserted-by":"publisher","first-page":"945","DOI":"10.1016\/S0950-5849(03)00096-X","volume":"45","author":"A Aurum","year":"2003","unstructured":"Aurum A, Wohlin C (2003) The fundamental nature of requirements engineering activities as a decision-making process. Inf Softw Technol 45(14):945\u2013954. doi: 10.1016\/S0950-5849(03)00096-X","journal-title":"Inf Softw Technol"},{"issue":"2","key":"225_CR7","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.jss.2004.11.034","volume":"77","author":"CG Bai","year":"2005","unstructured":"Bai CG (2005) Bayesian network based software reliability prediction with an operational profile. J Syst Softw 77(2):103\u2013112. doi: 10.1016\/j.jss.2004.11.034","journal-title":"J Syst Softw"},{"key":"225_CR8","unstructured":"Barry PS, Laskey KB (1999) An application of uncertain reasoning to requirements engineering. In: Proceedings of the 15th conference on uncertainty in artificial intelligence, pp 41\u201348. Morgan Kaufman"},{"key":"225_CR9","doi-asserted-by":"publisher","unstructured":"Brito M, May J (2006) Gaining confidence in the software development process using expert systems. In: Garski J (ed) Computer safety, reliability, and security, lecture notes in computer science, vol 4166. Springer, Berlin, pp 113\u2013126. doi: 10.1007\/11875567_9","DOI":"10.1007\/11875567_9"},{"issue":"2","key":"225_CR10","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/69.494161","volume":"8","author":"W Buntine","year":"1996","unstructured":"Buntine W (1996) A guide to the literature on learning probabilistic networks from data. IEEE Trans Knowl Data Eng 8(2):195\u2013210. doi: 10.1109\/69.494161","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"225_CR11","doi-asserted-by":"publisher","unstructured":"Cheng BHC, Atlee JM (2007) Research directions in requirements engineering. In: Briand A, Wolf LC (eds) FOSE, pp 285\u2013303 . doi: 10.1145\/1253532.1254725","DOI":"10.1145\/1253532.1254725"},{"issue":"4","key":"225_CR12","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/BF00994110","volume":"9","author":"G Cooper","year":"1992","unstructured":"Cooper G, Herskovits E (1992) A Bayesian method for the induction of probabilistic networks from data. Mach Learn 9(4):309\u2013347. doi: 10.1007\/BF00994110","journal-title":"Mach Learn"},{"issue":"2","key":"225_CR13","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1016\/j.eswa.2006.10.040","volume":"34","author":"AC Melo de","year":"2008","unstructured":"de Melo AC, Sanchez AJ (2008) Software maintenance project delays prediction using Bayesian networks. Expert Syst Appl 34(2):908\u2013919. doi: 10.1016\/j.eswa.2006.10.040","journal-title":"Expert Syst Appl"},{"issue":"2","key":"225_CR14","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1142\/S0218194011005219","volume":"21","author":"IM \u00c1guila del","year":"2011","unstructured":"del \u00c1guila IM, del Sagrado J (2011) Requirement risk level forecast using Bayesian networks classifiers. Int J Softw Eng Knowl Eng 21(2):167\u2013190. doi: 10.1142\/S0218194011005219","journal-title":"Int J Softw Eng Knowl Eng"},{"key":"225_CR15","unstructured":"del \u00c1guila IM, del Sagrado J (2012) Metamodelling of Bayesian networks for decision-support system development. In: Proceedings of 8th workshop on knowledge engineering and software engineering (KESE8 2012)"},{"key":"225_CR16","doi-asserted-by":"crossref","unstructured":"del Sagrado J, del Aguila IM (2010) A Bayesian network for predicting the need for a requirements review. In: Meziane F, Vadera S (eds) Artificial Intelligence Applications for Improved Software Engineering Development: New Prospects. Information Science Reference, Hershey, pp 106\u2013128","DOI":"10.4018\/978-1-60566-758-4.ch006"},{"key":"225_CR17","doi-asserted-by":"publisher","unstructured":"del Sagrado J, del \u00c1guila IM, Orellana FJ (2011) Architecture for the use of synergies between knowledge engineering and requirements engineering. In: Lozano JA, G\u00e1mez JA, Moreno JA (eds) CAEPIA, lecture notes in computer science, vol 7023. Springer, New York, pp 213\u2013222. doi: 10.1007\/978-3-642-25274-7_22","DOI":"10.1007\/978-3-642-25274-7_22"},{"issue":"2","key":"225_CR18","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/TSE.2010.33","volume":"37","author":"O Dieste","year":"2011","unstructured":"Dieste O, Juristo N (2011) Systematic review and aggregation of empirical studies on elicitation techniques. IEEE Trans Softw Eng 37(2):283\u2013304. doi: 10.1109\/TSE.2010.33","journal-title":"IEEE Trans Softw Eng"},{"key":"225_CR19","doi-asserted-by":"publisher","unstructured":"Donohue S, Dugan J (2003) Modeling the \u201cgood enough to release\u201d decision using V & IV preference structures and Bayesian belief networks. In: Annual reliability and maintainability symposium, 2003, pp 568\u2013573. doi: 10.1109\/RAMS.2003.1182051","DOI":"10.1109\/RAMS.2003.1182051"},{"key":"225_CR20","doi-asserted-by":"publisher","unstructured":"Donohue S, Dugan J (2005) Is my software \u201cgood enough\u201d to release? A probabilistic assessment. In: 29th annual IEEE\/NASA Software engineering workshop, 2005, pp 5\u201313. doi: 10.1109\/SEW.2005.30","DOI":"10.1109\/SEW.2005.30"},{"key":"225_CR21","first-page":"120","volume-title":"Encyclopedia of library and information science","author":"MJ Druzdzel","year":"2000","unstructured":"Druzdzel MJ, Flynn RR (2000) Decision support systems. In: Kent A (ed) Encyclopedia of library and information science, vol 67. Marcel Dekker Inc, New York, pp 120\u2013133"},{"issue":"9\u201310","key":"225_CR22","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/j.infsof.2008.01.006","volume":"50","author":"T Dyb\u00e5","year":"2008","unstructured":"Dyb\u00e5 T, Dings\u00f8yr T (2008) Empirical studies of agile software development: a systematic review. Inf Softw Technol 50(9\u201310):833\u2013859. doi: 10.1016\/j.infsof.2008.01.006","journal-title":"Inf Softw Technol"},{"issue":"1","key":"225_CR23","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2005.6","volume":"22","author":"T Dyb\u00e5","year":"2005","unstructured":"Dyb\u00e5 T, Kitchenham B, Jorgensen M (2005) Evidence-based software engineering for practitioners. IEEE Softw 22(1):58\u201365. doi: 10.1109\/MS.2005.6","journal-title":"IEEE Softw"},{"issue":"5","key":"225_CR24","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MS.2008.107","volume":"25","author":"K Emam El","year":"2008","unstructured":"El Emam K, Koru A (2008) A replicated survey of it software project failures. IEEE Softw 25(5):84\u201390. doi: 10.1109\/MS.2008.107","journal-title":"IEEE Softw"},{"issue":"4","key":"225_CR25","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MS.2002.1020298","volume":"19","author":"N Fenton","year":"2002","unstructured":"Fenton N, Krause P, Neil M (2002) Software measurement: uncertainty and causal modeling. IEEE Softw 19(4):116\u2013122. doi: 10.1109\/MS.2002.1020298","journal-title":"IEEE Softw"},{"issue":"1","key":"225_CR26","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.infsof.2006.09.001","volume":"49","author":"N Fenton","year":"2007","unstructured":"Fenton N, Neil M, Marsh W, Hearty P, Marquez D, Krause P, Mishra R (2007) Predicting software defects in varying development lifecycles using Bayesian nets. Inf Softw Technol 49(1):32\u201343. doi: 10.1016\/j.infsof.2006.09.001","journal-title":"Inf Softw Technol"},{"issue":"2","key":"225_CR27","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MS.2014.32","volume":"31","author":"NE Fenton","year":"2014","unstructured":"Fenton NE, Neil M (2014) Decision support software for probabilistic risk assessment using Bayesian networks. IEEE Softw 31(2):21\u201326. doi: 10.1109\/MS.2014.32","journal-title":"IEEE Softw"},{"issue":"4","key":"225_CR28","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1145\/331490.331493","volume":"6","author":"J Galliers","year":"1999","unstructured":"Galliers J, Sutcliffe A, Minocha S (1999) An impact analysis method for safety\u2013critical user interface design. ACM Trans Comput Hum Interact 6(4):341\u2013369. doi: 10.1145\/331490.331493","journal-title":"ACM Trans Comput Hum Interact"},{"key":"225_CR29","unstructured":"Ganesh J. Pai, J.B.D., Leteef K (2006) Analyses of milestone readiness levels in software IV&V. In: Proceedings of international symposium on software reliability engineering (ISSRE), workshop on software assessment"},{"key":"225_CR30","volume-title":"Software engineering: facts and fallacies","author":"RL Glass","year":"2002","unstructured":"Glass RL (2002) Software engineering: facts and fallacies. Addison-Wesley Longman, Boston"},{"issue":"5","key":"225_CR31","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/TSE.2005.59","volume":"31","author":"A Gregoriades","year":"2005","unstructured":"Gregoriades A, Sutcliffe AG (2005) Scenario-based assessment of nonfunctional requirements. IEEE Trans Softw Eng 31(5):392\u2013409. doi: 10.1109\/TSE.2005.59","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"225_CR32","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s00766-004-0200-x","volume":"10","author":"A Gregoriades","year":"2005","unstructured":"Gregoriades A, Sutcliffe AG (2005) The system reliability analyser tool. Requir Eng 10(1):63\u201380. doi: 10.1007\/s00766-004-0200-x","journal-title":"Requir Eng"},{"issue":"5","key":"225_CR33","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2347696.2347697","volume":"37","author":"R Harrison","year":"2012","unstructured":"Harrison R, da Cruz D, Henriques P, Pereira MJV, Liu SH, Menzies T, Mernik M, Rodriguez D (2012) Report from the first international workshop on realizing artificial intelligence synergies in software engineering (raise 2012). SIGSOFT Softw Eng Notes 37(5):34\u201335. doi: 10.1145\/2347696.2347697","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"225_CR34","doi-asserted-by":"publisher","first-page":"17","DOI":"10.4018\/jitwe.2006070102","volume":"1","author":"J Howison","year":"2006","unstructured":"Howison J, Conklin M, Crowston K (2006) Flossmole: a collaborative repository for floss research data and analyses. Int J Inf Technol Web Eng 1:17\u201326. doi: 10.4018\/jitwe.2006070102","journal-title":"Int J Inf Technol Web Eng"},{"key":"225_CR35","doi-asserted-by":"publisher","unstructured":"Hui B, Boutilier C (2006) Who\u2019s asking for help? A Bayesian approach to intelligent assistance. In: Proceedings of the 11th international conference on intelligent user interfaces, IUI \u201906. ACM, New York, NY, USA, pp 186\u2013193. doi: 10.1145\/1111449.1111491","DOI":"10.1145\/1111449.1111491"},{"key":"225_CR36","unstructured":"IEEE I (1998) IEEE recommended practice for software requirements specifications. Tech. rep. http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=720574"},{"key":"225_CR37","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-68282-2","volume-title":"Bayesian networks and decision graphs","author":"FV Jensen","year":"2007","unstructured":"Jensen FV, Nielsen TD (2007) Bayesian networks and decision graphs, 2nd edn. Springer, New York","edition":"2"},{"issue":"1","key":"225_CR38","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s00766-012-0157-0","volume":"19","author":"PF Katina","year":"2014","unstructured":"Katina PF, Keating CB, Jaradat RM (2014) System requirements engineering in complex situations. Requir Eng 19(1):45\u201362. doi: 10.1007\/s00766-012-0157-0","journal-title":"Requir Eng"},{"issue":"12","key":"225_CR39","doi-asserted-by":"publisher","first-page":"2049","DOI":"10.1016\/j.infsof.2013.07.010","volume":"55","author":"B Kitchenham","year":"2013","unstructured":"Kitchenham B, Brereton P (2013) A systematic review of systematic review process research in software engineering. Inf Softw Technol 55(12):2049\u20132075. doi: 10.1016\/j.infsof.2013.07.010","journal-title":"Inf Softw Technol"},{"issue":"1","key":"225_CR40","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham B, Brereton P, Budgen D, Turner M, Bailey J, Linkman SG (2009) Systematic literature reviews in software engineering\u2014a systematic literature review. Inf Softw Technol 51(1):7\u201315. doi: 10.1016\/j.infsof.2008.09.009","journal-title":"Inf Softw Technol"},{"key":"225_CR41","unstructured":"Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Tech. Rep. EBSE 2007\u2013001, Keele University and Durham University Joint Report"},{"key":"225_CR42","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-74101-7","volume-title":"Bayesian networks and influence diagrams","author":"UB Kjrulff","year":"2008","unstructured":"Kjrulff UB, Madsen AL (2008) Bayesian networks and influence diagrams. Springer, New York"},{"key":"225_CR43","doi-asserted-by":"crossref","DOI":"10.1201\/b10391","volume-title":"Bayesian artificial intelligence","author":"K Korb","year":"2010","unstructured":"Korb K, Nicholson A (2010) Bayesian artificial intelligence, 2nd edn. Chapman and Hall, London","edition":"2"},{"key":"225_CR44","unstructured":"Laskey KB, Barry P, Brouse P (2000) Breaking the knowledge bottleneck for Bayesian networks using language (UML) artifacts. In: 2nd international conference on software engineering and knowledge engineering, Chicago, IL"},{"key":"225_CR45","unstructured":"Laskey KB, Barry PS (2000) Development of Bayesian networks from unified modeling language artifacts. In: Proceedings of the twelfth software engineering\/knowledge engineering 2000 conference"},{"issue":"3","key":"225_CR46","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.1016\/j.dss.2006.01.003","volume":"42","author":"EJM Laur\u00eda","year":"2006","unstructured":"Laur\u00eda EJM, Duchessi PJ (2006) A Bayesian belief network for it implementation decision support. Decis Support Syst 42(3):1573\u20131588. doi: 10.1016\/j.dss.2006.01.003","journal-title":"Decis Support Syst"},{"key":"225_CR47","doi-asserted-by":"publisher","unstructured":"Lee S (2011) Probabilistic risk assessment for security requirements: a preliminary study. In: 2011 fifth international conference on secure software integration and reliability improvement (SSIRI), pp 11\u201320. doi: 10.1109\/SSIRI.2011.12","DOI":"10.1109\/SSIRI.2011.12"},{"issue":"12","key":"225_CR48","doi-asserted-by":"publisher","first-page":"1631","DOI":"10.1016\/j.infsof.2009.04.009","volume":"51","author":"FJ Lucas","year":"2009","unstructured":"Lucas FJ, Molina F, Toval A (2009) A systematic review of UML model consistency management. Inf Softw Technol 51(12):1631\u20131645. doi: 10.1016\/j.infsof.2009.04.009","journal-title":"Inf Softw Technol"},{"key":"225_CR49","unstructured":"Menzies T (2006) Improving IV&V techniques through the analysis of project anomalies: Bayes networks\u2014preliminary report. Tech. rep., West Virginia University. http:\/\/menzies.us\/pdf\/06anomalies-bayes0.pdf"},{"key":"225_CR50","doi-asserted-by":"publisher","unstructured":"Nagy A, Njima M, Mkrtchyan L (2010) A Bayesian based method for agile software development release planning and project health monitoring. In: 2010 2nd international conference on intelligent networking and collaborative systems (INCOS), pp 192\u2013199. doi: 10.1109\/INCOS.2010.99","DOI":"10.1109\/INCOS.2010.99"},{"key":"225_CR51","unstructured":"Nalepa GJ, Nadas JC, Baumeister J (eds) Proceedings of 8th workshop on knowledge engineering and software engineering (KESE8) at the 20th Biennial European conference on artificial intelligence (ECAI 2012) Montpellier, France, August 28, 2011, CEUR workshop proceedings, vol 949. CEUR-WS.org (2011)"},{"key":"225_CR52","volume-title":"Learning Bayesian networks, illustrated","author":"RE Neapolitan","year":"2003","unstructured":"Neapolitan RE (2003) Learning Bayesian networks, illustrated, edition edn. Prentice Hall, Upper Saddle River","edition":"edition"},{"key":"225_CR53","doi-asserted-by":"publisher","unstructured":"Nuseibeh B, Easterbrook S (2000) Requirements engineering: a roadmap. In: Proceedings of the conference on the future of software engineering, ICSE \u201900. ACM, New York, NY, USA, pp 35\u201346. doi: 10.1145\/336512.336523","DOI":"10.1145\/336512.336523"},{"key":"225_CR54","doi-asserted-by":"publisher","unstructured":"Olson J, Rozenblit J (1998) Framework for hardware\/software partitioning utilizing bayesian belief networks. In: 1998 IEEE international conference on systems, man, and cybernetics, 1998, vol 4, pp 3983\u20133988. doi: 10.1109\/ICSMC.1998.726711","DOI":"10.1109\/ICSMC.1998.726711"},{"issue":"8","key":"225_CR55","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1016\/j.infsof.2011.03.001","volume":"53","author":"I Omoronyia","year":"2011","unstructured":"Omoronyia I, Sindre G, St\u00e5lhane T (2011) Exploring a Bayesian and linear approach to requirements traceability. Inf Softw Technol 53(8):851\u2013871. doi: 10.1016\/j.infsof.2011.03.001","journal-title":"Inf Softw Technol"},{"key":"225_CR56","doi-asserted-by":"publisher","unstructured":"Pai G, Bechta-Dugan J, Lateef K (2005) Bayesian networks applied to software IV & V. In: Proceedings of the 29th annual NASA\/IEEE software engineering workshop, pp 293\u2013304. doi: 10.1109\/SEW.2005.20","DOI":"10.1109\/SEW.2005.20"},{"issue":"4","key":"225_CR57","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1136\/ebm.9.4.101","volume":"9","author":"M Pai","year":"2004","unstructured":"Pai M, McCulloch M, Enanoria W, Colford J (2004) Systematic reviews of diagnostic test evaluations: what\u2019s behind the scenes? Evid Based Med 9(4):101\u2013103. doi: 10.1136\/ebm.9.4.101","journal-title":"Evid Based Med"},{"key":"225_CR58","volume-title":"Probabilistic reasoning in intelligent systems: networks of plausible inference","author":"J Pearl","year":"1988","unstructured":"Pearl J (1988) Probabilistic reasoning in intelligent systems: networks of plausible inference. Morgan Kaufmann, San Francisco"},{"issue":"7","key":"225_CR59","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/TSE.2005.75","volume":"31","author":"P Pendharkar","year":"2005","unstructured":"Pendharkar P, Subramanian G, Rodger J (2005) A probabilistic model for predicting software development effort. IEEE Trans Softw Eng 31(7):615\u2013624. doi: 10.1109\/TSE.2005.75","journal-title":"IEEE Trans Softw Eng"},{"key":"225_CR60","doi-asserted-by":"publisher","unstructured":"Punter T, Trendowicz A, Kaiser P (2002) Evaluating evolutionary software systems. In: 4th international conference on product focused software process improvement PROFES 2002. doi: 10.1007\/3-540-36209-6_23","DOI":"10.1007\/3-540-36209-6_23"},{"key":"225_CR61","doi-asserted-by":"publisher","unstructured":"Radlinski L (2011) A framework for integrated software quality prediction using Bayesian nets. In: Murgante B, Gervasi O, Iglesias A, Taniar D, Apduhan B (eds) Computational science and its applications\u2014ICCSA 2011, lecture notes in computer science, vol 6786. Springer, Berlin, pp 310\u2013325. doi: 10.1007\/978-3-642-21934-4_26","DOI":"10.1007\/978-3-642-21934-4_26"},{"issue":"6","key":"225_CR62","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MS.2005.164","volume":"22","author":"G Ruhe","year":"2005","unstructured":"Ruhe G, Saliu MO (2005) The art and science of software release planning. IEEE Softw 22(6):47\u201353. doi: 10.1109\/MS.2005.164","journal-title":"IEEE Softw"},{"key":"225_CR63","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.jss.2013.08.035","volume":"89","author":"G Si","year":"2014","unstructured":"Si G, Xu J, Yang J, Wen S (2014) An evaluation model for dependability of internet-scale software on basis of Bayesian networks and trustworthiness. J Syst Softw 89:63\u201375. doi: 10.1016\/j.jss.2013.08.035","journal-title":"J Syst Softw"},{"key":"225_CR64","doi-asserted-by":"publisher","unstructured":"Sutcliffe A, Galliers J, Minocha S (1999) Human errors and system requirements. In: Proceedings of the IEEE international symposium on requirements engineering, 1999, pp 23\u201330. doi: 10.1109\/ISRE.1999.777982","DOI":"10.1109\/ISRE.1999.777982"},{"key":"225_CR65","doi-asserted-by":"publisher","unstructured":"Sutcliffe A, Gregoriades A (2002) Validating functional system requirements with scenarios. In: Proceedings of the IEEE joint international conference on requirements engineering, 2002, pp 181\u2013188. doi: 10.1109\/ICRE.2002.1048521","DOI":"10.1109\/ICRE.2002.1048521"},{"key":"225_CR66","doi-asserted-by":"publisher","unstructured":"Tang Y, Feng K (2009) An expert system based approach to modeling and selecting requirement engineering techniques. In: Liu W, Luo X, Wang F, Lei J (eds) Web information systems and mining, lecture notes in computer science, vol 5854. Springer, Berlin, pp 19\u201330. doi: 10.1007\/978-3-642-05250-7_3","DOI":"10.1007\/978-3-642-05250-7_3"},{"key":"225_CR67","doi-asserted-by":"publisher","unstructured":"Tang Y, Feng K, Cooper K, Cangussu J (2009) Requirement engineering techniques selection and modeling an expert system based approach. In: International conference on machine learning and applications, 2009, ICMLA \u201909, pp 705\u2013709. doi: 10.1109\/ICMLA.2009.102","DOI":"10.1109\/ICMLA.2009.102"},{"key":"225_CR68","doi-asserted-by":"publisher","unstructured":"Wang J, Wang Q (2014) Analyzing and predicting software integration bugs using network analysis on requirements dependency network. Requir Eng 1\u201324. doi: 10.1007\/s00766-014-0215-x","DOI":"10.1007\/s00766-014-0215-x"},{"issue":"1","key":"225_CR69","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.infsof.2011.09.002","volume":"54","author":"J Wen","year":"2012","unstructured":"Wen J, Li S, Lin Z, Hu Y, Huang C (2012) Systematic literature review of machine learning based software development effort estimation models. Inf Softw Technol 54(1):41\u201359. doi: 10.1016\/j.infsof.2011.09.002","journal-title":"Inf Softw Technol"},{"key":"225_CR70","volume-title":"Software requirements: practical techniques for gathering and managing requirements throughout the product development cycle. Pro-best practices","author":"K Wiegers","year":"2003","unstructured":"Wiegers K (2003) Software requirements: practical techniques for gathering and managing requirements throughout the product development cycle. Pro-best practices. Microsoft Press, New York"},{"key":"225_CR71","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-4625-2","volume-title":"Experimentation in software engineering: an introduction","author":"C Wohlin","year":"2000","unstructured":"Wohlin C, Runeson P, Host M, Ohlsson M, Regnell B, Wesslen A (2000) Experimentation in software engineering: an introduction. Kluwer Academic, London"},{"issue":"5","key":"225_CR72","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/TSE.2002.1000453","volume":"28","author":"D Wooff","year":"2002","unstructured":"Wooff D, Goldstein M, Coolen F (2002) Bayesian graphical models for software testing. IEEE Trans Softw Eng 28(5):510\u2013525. doi: 10.1109\/TSE.2002.1000453","journal-title":"IEEE Trans Softw Eng"},{"key":"225_CR73","doi-asserted-by":"publisher","unstructured":"Wu H, Liu L, Ma W (2010) Optimizing requirements elicitation with an i* and Bayesian network integrated modelling approach. In: 2010 IEEE 34th annual computer software and applications conference workshops (COMPSACW), pp 182\u2013188. doi: 10.1109\/COMPSACW.2010.40","DOI":"10.1109\/COMPSACW.2010.40"},{"key":"225_CR74","doi-asserted-by":"publisher","unstructured":"Zhang J, Zhang X, Lin KJ (2011) An efficient Bayesian diagnosis for QOS management in service-oriented architecture. In: 2011 IEEE international conference on service-oriented computing and applications (SOCA), pp 1\u20138. doi: 10.1109\/SOCA.2011.6166214","DOI":"10.1109\/SOCA.2011.6166214"},{"key":"225_CR75","doi-asserted-by":"publisher","unstructured":"Zhang Z, Liu Y (2012) Application of active learning strategy and formalization method in requirement analysis. In: 2012 IEEE symposium on robotics and applications (ISRA), pp 958\u2013960. doi: 10.1109\/ISRA.2012.6219353","DOI":"10.1109\/ISRA.2012.6219353"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-015-0225-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-015-0225-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-015-0225-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-015-0225-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T22:42:43Z","timestamp":1599000163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-015-0225-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,8]]},"references-count":75,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["225"],"URL":"https:\/\/doi.org\/10.1007\/s00766-015-0225-3","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,8]]}}}