{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T09:01:21Z","timestamp":1775811681685,"version":"3.50.1"},"reference-count":94,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T00:00:00Z","timestamp":1481068800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Islamic Azad University of Sari","award":["Islamic Azad University of Sari"],"award-info":[{"award-number":["Islamic Azad University of Sari"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s00766-016-0262-6","type":"journal-article","created":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T15:51:57Z","timestamp":1481125917000},"page":"169-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["An approach for requirements prioritization based on tensor decomposition"],"prefix":"10.1007","volume":"23","author":[{"given":"Negin","family":"Misaghian","sequence":"first","affiliation":[]},{"given":"Homayun","family":"Motameni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,7]]},"reference":[{"key":"262_CR1","doi-asserted-by":"crossref","DOI":"10.1002\/9780470747278","volume-title":"Nonnegative matrix and tensor factorizations: applications to exploratory multi-way data analysis and blind source separation","author":"A Cichocki","year":"2009","unstructured":"Cichocki A et al (2009) Nonnegative matrix and tensor factorizations: applications to exploratory multi-way data analysis and blind source separation. Wiley, New York"},{"key":"262_CR2","unstructured":"Cichocki A et al (2007) Sparse super symmetric tensor factorization. In: Neural information processing. Springer, Heidelberg, pp 781\u2013790"},{"issue":"11","key":"262_CR3","doi-asserted-by":"crossref","first-page":"5567","DOI":"10.1109\/TSP.2008.926982","volume":"56","author":"D Nion","year":"2008","unstructured":"Nion D, Lathauwer LD (2008) A block component model-based blind DS-CDMA receiver. IEEE Trans Signal Process 56(11):5567\u20135579","journal-title":"IEEE Trans Signal Process"},{"issue":"3","key":"262_CR4","doi-asserted-by":"crossref","first-page":"749","DOI":"10.1016\/j.sigpro.2007.07.024","volume":"88","author":"D Nion","year":"2008","unstructured":"Nion D, De Lathauwer L (2008) An enhanced line search scheme for complex-valued tensor decompositions. Application in DS-CDMA. Signal Process 88(3):749\u2013755","journal-title":"Signal Process"},{"issue":"11","key":"262_CR5","doi-asserted-by":"crossref","first-page":"2006","DOI":"10.1109\/TPAMI.2010.15","volume":"32","author":"Z He","year":"2010","unstructured":"He Z et al (2010) Detecting the number of clusters in n-way probabilistic clustering. IEEE Trans Pattern Anal Mach Intell 32(11):2006\u20132021","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"10","key":"262_CR6","doi-asserted-by":"crossref","first-page":"1700","DOI":"10.1109\/TPAMI.2007.1096","volume":"29","author":"D Tao","year":"2007","unstructured":"Tao D et al (2007) General tensor discriminant analysis and gabor features for gait recognition. IEEE Trans Pattern Anal Mach Intell 29(10):1700\u20131715","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"2","key":"262_CR7","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1016\/j.sigpro.2005.12.016","volume":"87","author":"D Muti","year":"2007","unstructured":"Muti D, Bourennane S (2007) Survey on tensor signal algebraic filtering. Signal Process 87(2):237\u2013249","journal-title":"Signal Process"},{"issue":"12","key":"262_CR8","doi-asserted-by":"crossref","first-page":"2303","DOI":"10.1016\/j.jss.2011.06.057","volume":"84","author":"Y-N Qiao","year":"2011","unstructured":"Qiao Y-N, Yong Q, Di H (2011) Tensor field model for higher-order information retrieval. J Syst Softw 84(12):2303\u20132313","journal-title":"J Syst Softw"},{"key":"262_CR9","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.compchemeng.2013.10.020","volume":"61","author":"A Chaudhury","year":"2014","unstructured":"Chaudhury A, Oseledets I, Ramachandran R (2014) A computationally efficient technique for the solution of multi-dimensional PBMs of granulation via tensor decomposition. Comput Chem Eng 61:234\u2013244","journal-title":"Comput Chem Eng"},{"key":"262_CR10","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.neucom.2014.05.018","volume":"144","author":"T Guo","year":"2014","unstructured":"Guo T et al (2014) A GA-based feature selection and parameter optimization for linear support higher-order tensor machine. Neurocomputing 144:408\u2013416","journal-title":"Neurocomputing"},{"key":"262_CR11","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.neucom.2013.11.020","volume":"133","author":"H Tan","year":"2014","unstructured":"Tan H et al (2014) Tensor completion via a multi-linear low-n-rank factorization model. Neurocomputing 133:161\u2013169","journal-title":"Neurocomputing"},{"key":"262_CR12","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.jneumeth.2015.03.018","volume":"248","author":"F Cong","year":"2015","unstructured":"Cong F et al (2015) Tensor decomposition of EEG signals: a brief review. J Neurosci Methods 248:59\u201369","journal-title":"J Neurosci Methods"},{"key":"262_CR13","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.flowmeasinst.2014.11.001","volume":"41","author":"J Lei","year":"2015","unstructured":"Lei J et al (2015) Dynamic imaging method using the low n-rank tensor for electrical capacitance tomography. Flow Measur Instrum 41:104\u2013114","journal-title":"Flow Measur Instrum"},{"issue":"3","key":"262_CR14","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1587\/transfun.E92.A.708","volume":"92","author":"A Cichocki","year":"2009","unstructured":"Cichocki A, Anh-Huy P (2009) Fast local algorithms for large scale nonnegative matrix and tensor factorizations. IEICE Trans Fundam Electron Commun Comput Sci 92(3):708\u2013721","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"issue":"3","key":"262_CR15","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1016\/j.neuroimage.2005.08.005","volume":"29","author":"M M\u00f8rup","year":"2006","unstructured":"M\u00f8rup M et al (2006) Parallel factor analysis as an exploratory tool for wavelet transformed event-related EEG. NeuroImage 29(3):938\u2013947","journal-title":"NeuroImage"},{"issue":"1","key":"262_CR16","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.chemolab.2010.08.004","volume":"106","author":"E Acar","year":"2011","unstructured":"Acar E et al (2011) Scalable tensor factorizations for incomplete data. Chemometr Intell Lab Syst 106(1):41\u201356","journal-title":"Chemometr Intell Lab Syst"},{"issue":"3","key":"262_CR17","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1016\/j.neuroimage.2004.03.039","volume":"22","author":"F Miwakeichi","year":"2004","unstructured":"Miwakeichi F et al (2004) Decomposing EEG data into space\u2013time\u2013frequency components using parallel factor analysis. NeuroImage 22(3):1035\u20131045","journal-title":"NeuroImage"},{"key":"262_CR18","first-page":"690","volume-title":"The requirements engineering handbook. Artech House technology management and professional development library","author":"RR Young","year":"2003","unstructured":"Young RR (2003) The requirements engineering handbook. Artech House technology management and professional development library. Artech House, Boston, p 690"},{"key":"262_CR19","unstructured":"Gorschek T (2006) Requirements engineering supporting technical product management. In: Blekinge Institute of Technology Doctoral Dissertation Series, Blekinge Institute of Technology, Karlskrona, p 343"},{"key":"262_CR20","volume-title":"Software engineering","author":"I Sommerville","year":"2011","unstructured":"Sommerville I (2011) Software engineering, 9th edn. McGraw-Hill, New York","edition":"9"},{"key":"262_CR21","doi-asserted-by":"crossref","unstructured":"Sadiq M, Jain S (2012) An insight into requirements engineering processes. In: 3rd International Conference on Advances in Communication, Network, and Computing, LNCSIT-Springer, Chennai, February, 2012, India, pp 313\u2013318","DOI":"10.1007\/978-3-642-35615-5_48"},{"key":"262_CR22","doi-asserted-by":"crossref","unstructured":"Sadiq M, Jain S (2013) A fuzzy based approach for requirements prioritization in goal oriented requirements elicitation process. In: International conference of software engineering and knowledge engineering (SEKE)","DOI":"10.1109\/RePriCo.2014.6895219"},{"issue":"3","key":"262_CR23","first-page":"138","volume":"2","author":"M Sadiq","year":"2009","unstructured":"Sadiq M, Shahid M (2009) Elicitation and prioritization of software requirements. Int J Recent Trends Eng 2(3):138\u2013142","journal-title":"Int J Recent Trends Eng"},{"key":"262_CR24","doi-asserted-by":"crossref","unstructured":"Chung L, do Prado Leite JCS (2009) On non-functional requirements in software engineering. In: Conceptual modeling: foundations and applications. Springer, pp 363\u2013379","DOI":"10.1007\/978-3-642-02463-4_19"},{"issue":"4","key":"262_CR25","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00766-011-0137-9","volume":"17","author":"R Capilla","year":"2012","unstructured":"Capilla R, Babar MA, Pastor O (2012) Quality requirements engineering for systems and software architecting: methods, approaches, and tools. Requir Eng 17(4):255\u2013258","journal-title":"Requir Eng"},{"key":"262_CR26","doi-asserted-by":"crossref","DOI":"10.1201\/b15939","volume-title":"Requirements engineering for software and systems","author":"PA Laplante","year":"2013","unstructured":"Laplante PA (2013) Requirements engineering for software and systems. CRC Press, Boca Raton"},{"key":"262_CR27","doi-asserted-by":"crossref","unstructured":"Svensson RB et al (2011) Prioritization of quality requirements: state of practice in eleven companies. In: 2011 19th IEEE international requirements engineering conference (RE). IEEE","DOI":"10.1109\/RE.2011.6051652"},{"issue":"4","key":"262_CR28","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1007\/s11219-012-9188-5","volume":"21","author":"R Thakurta","year":"2013","unstructured":"Thakurta R (2013) A framework for prioritization of quality requirements for inclusion in a software project. Softw Qual J 21(4):573\u2013597","journal-title":"Softw Qual J"},{"issue":"2","key":"262_CR29","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/52.506460","volume":"13","author":"B Boehm","year":"1996","unstructured":"Boehm B, In H (1996) Identifying quality-requirement conflicts. IEEE Softw 13(2):25","journal-title":"IEEE Softw"},{"issue":"1","key":"262_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.7763\/LNSE.2015.V3.154","volume":"3","author":"M Dabbagh","year":"2015","unstructured":"Dabbagh M, Lee SP (2015) An approach for prioritizing NFRs according to their relationship with FRs. Lect Notes Softw Eng 3(1):1","journal-title":"Lect Notes Softw Eng"},{"key":"262_CR31","doi-asserted-by":"crossref","unstructured":"Doerr J et al (2005) Non-functional requirements in industry-three case studies adopting an experience-based NFR method. In: Proceedings of 13th IEEE international conference on requirements engineering, 2005. IEEE","DOI":"10.1109\/RE.2005.47"},{"key":"262_CR32","doi-asserted-by":"crossref","unstructured":"Glinz M (2007) On non-functional requirements. In: RE\u201907. 15th IEEE international requirements engineering conference, 2007. IEEE","DOI":"10.1109\/RE.2007.45"},{"issue":"6","key":"262_CR33","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/32.142871","volume":"18","author":"J Mylopoulos","year":"1992","unstructured":"Mylopoulos J, Chung L, Nixon B (1992) Representing and using nonfunctional requirements: a process-oriented approach. IEEE Trans Softw Eng 18(6):483\u2013497","journal-title":"IEEE Trans Softw Eng"},{"issue":"6","key":"262_CR34","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/52.965804","volume":"18","author":"B Lawrence","year":"2001","unstructured":"Lawrence B, Wiegers K, Ebert C (2001) The top risk of requirements engineering. IEEE Softw 18(6):62\u201363","journal-title":"IEEE Softw"},{"key":"262_CR35","doi-asserted-by":"crossref","unstructured":"Barbacci MR et al (2002) Quality attribute workshops","DOI":"10.21236\/ADA388649"},{"issue":"5","key":"262_CR36","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1109\/TSE.2004.10","volume":"30","author":"LM Cysneiros","year":"2004","unstructured":"Cysneiros LM, Leite JCSP (2004) Nonfunctional requirements: from elicitation to conceptual models. IEEE Trans Softw Eng 30(5):328\u2013350","journal-title":"IEEE Trans Softw Eng"},{"key":"262_CR37","doi-asserted-by":"crossref","unstructured":"Dabbagh M, Lee SP (2013) A consistent approach for prioritizing system quality attributes. In: 2013 14th ACIS international conference on software engineering, artificial intelligence, networking and parallel\/distributed computing (SNPD). IEEE","DOI":"10.1109\/SNPD.2013.9"},{"key":"262_CR38","unstructured":"Berntsson Svensson R et al (2011) Quality requirements in industrial practice-an extended interview study at eleven companies. IEEE transactions on software engineering, preprint 1"},{"issue":"8","key":"262_CR39","doi-asserted-by":"crossref","first-page":"35","DOI":"10.5381\/jot.2004.3.8.c4","volume":"3","author":"D Firesmith","year":"2004","unstructured":"Firesmith D (2004) Prioritizing requirements. J Object Technol 3(8):35\u201348","journal-title":"J Object Technol"},{"key":"262_CR40","unstructured":"Lehtola L (2006) Providing value by prioritizing requirements throughout product development: state of practice and suitability of prioritization methods. Licentiate thesis, HUT\/Department of Computer Science"},{"key":"262_CR41","doi-asserted-by":"crossref","unstructured":"Otero CE et al (2010) A quality-based requirement prioritization framework using binary inputs. In: 2010 Fourth Asia international conference on mathematical\/analytical modelling and computer simulation (AMS). IEEE","DOI":"10.1109\/AMS.2010.48"},{"key":"262_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jss.2014.06.035","volume":"95","author":"M Daneva","year":"2014","unstructured":"Daneva M et al (2014) Empirical research methodologies and studies in requirements engineering: How far did we come? J Syst Softw 95:1\u20139","journal-title":"J Syst Softw"},{"issue":"12","key":"262_CR43","doi-asserted-by":"crossref","first-page":"14428","DOI":"10.1016\/j.eswa.2011.04.103","volume":"38","author":"X-T Wang","year":"2011","unstructured":"Wang X-T, Xiong W (2011) An integrated linguistic-based group decision-making approach for quality function deployment. Expert Syst Appl 38(12):14428\u201314438","journal-title":"Expert Syst Appl"},{"issue":"3","key":"262_CR44","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/0020-0255(75)90036-5","volume":"8","author":"LA Zadeh","year":"1975","unstructured":"Zadeh LA (1975) The concept of a linguistic variable and its application to approximate reasoning\u2014I. Inf Sci 8(3):199\u2013249","journal-title":"Inf Sci"},{"issue":"2","key":"262_CR45","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.cie.2007.06.042","volume":"54","author":"X Lai","year":"2008","unstructured":"Lai X et al (2008) Ranking of customer requirements in a competitive environment. Comput Ind Eng 54(2):202\u2013214","journal-title":"Comput Ind Eng"},{"issue":"6","key":"262_CR46","doi-asserted-by":"crossref","first-page":"1175","DOI":"10.1007\/s11135-009-9304-1","volume":"44","author":"C-H Liu","year":"2010","unstructured":"Liu C-H (2010) A group decision-making method with fuzzy set theory and genetic algorithms in quality function deployment. Qual Quant 44(6):1175\u20131189","journal-title":"Qual Quant"},{"issue":"1","key":"262_CR47","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1002\/sapm19287139","volume":"7","author":"FL Hitchcock","year":"1928","unstructured":"Hitchcock FL (1928) Multiple invariants and generalized rank of a P-way matrix or tensor. J Math Phys 7(1):39\u201379","journal-title":"J Math Phys"},{"key":"262_CR48","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.ins.2011.07.046","volume":"191","author":"M-X Zhu","year":"2012","unstructured":"Zhu M-X et al (2012) A non-functional requirements tradeoff model in trustworthy software. Inf Sci 191:61\u201375","journal-title":"Inf Sci"},{"issue":"4","key":"262_CR49","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.infsof.2003.07.002","volume":"46","author":"D Greer","year":"2004","unstructured":"Greer D, Ruhe G (2004) Software release planning: an evolutionary and iterative approach. Inf Softw Technol 46(4):243\u2013253","journal-title":"Inf Softw Technol"},{"key":"262_CR50","unstructured":"Moisiadis F (2002) The fundamentals of prioritising requirements. In: Proceedings of the systems engineering, test and evaluation conference (SETE\u20192002)"},{"key":"262_CR51","unstructured":"Avesani P et al (2004) Supporting the requirements prioritization process. A machine learning approach. In: SEKE04. Citeseer"},{"key":"262_CR52","doi-asserted-by":"crossref","unstructured":"Bebensee T, van de Weerd I, Brinkkemper S (2010) Binary priority list for prioritizing software requirements. In: Requirements engineering: foundation for software quality. Springer, pp 67\u201378","DOI":"10.1007\/978-3-642-14192-8_8"},{"issue":"4","key":"262_CR53","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/TSE.2012.52","volume":"39","author":"A Perini","year":"2013","unstructured":"Perini A, Susi A, Avesani P (2013) A machine learning approach to software requirements prioritization. IEEE Trans Softw Eng 39(4):445\u2013461","journal-title":"IEEE Trans Softw Eng"},{"key":"262_CR54","doi-asserted-by":"publisher","first-page":"737626\u20131","DOI":"10.1155\/2014\/737626","volume":"2014","author":"M Dabbagh","year":"2014","unstructured":"Dabbagh M, Lee SP (2014) An Approach for Integrating the Prioritization of Functional and Nonfunctional Requirements. Sci World J 2014:737626\u20131\u2013737626-13. doi: 10.1155\/2014\/737626","journal-title":"Sci World J"},{"issue":"11","key":"262_CR55","first-page":"14336","volume":"38","author":"A Ishizaka","year":"2011","unstructured":"Ishizaka A, Labib A (2011) Review of the main developments in the analytic hierarchy process. Expert Syst Appl 38(11):14336\u201314345","journal-title":"Expert Syst Appl"},{"issue":"1","key":"262_CR56","first-page":"83","volume":"1","author":"TL Saaty","year":"2008","unstructured":"Saaty TL (2008) Decision making with the analytic hierarchy process. Int J Serv Sci 1(1):83\u201398","journal-title":"Int J Serv Sci"},{"issue":"1","key":"262_CR57","first-page":"35","volume":"2","author":"E Triantaphyllou","year":"1995","unstructured":"Triantaphyllou E, Mann SH (1995) Using the analytic hierarchy process for decision making in engineering applications: some challenges. Int J Ind Eng Appl Pract 2(1):35\u201344","journal-title":"Int J Ind Eng Appl Pract"},{"issue":"14","key":"262_CR58","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1016\/S0950-5849(97)00053-0","volume":"39","author":"J Karlsson","year":"1998","unstructured":"Karlsson J, Wohlin C, Regnell B (1998) An evaluation of methods for prioritizing software requirements. Inf Softw Technol 39(14):939\u2013947","journal-title":"Inf Softw Technol"},{"key":"262_CR59","doi-asserted-by":"crossref","unstructured":"Sadiq M et al (2010) More on elicitation of software requirements and prioritization using AHP. In: 2010 International conference on data storage and data engineering (DSDE). IEEE","DOI":"10.1109\/DSDE.2010.23"},{"issue":"4","key":"262_CR60","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1007\/s13198-014-0236-3","volume":"5","author":"M Sadiq","year":"2014","unstructured":"Sadiq M, Jain S (2014) Applying fuzzy preference relation for requirements prioritization in goal oriented requirements elicitation process. Int J Syst Assur Eng Manag 5(4):711\u2013723","journal-title":"Int J Syst Assur Eng Manag"},{"key":"262_CR61","doi-asserted-by":"crossref","unstructured":"Kolda TG, Sun J (2008) Scalable tensor decompositions for multi-aspect data mining. In: Proceeding of the 8th IEEE international conference on data mining (ICDM)","DOI":"10.1109\/ICDM.2008.89"},{"issue":"4","key":"262_CR62","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1137\/S0895479896305696","volume":"21","author":"LD Lathauwer","year":"2000","unstructured":"Lathauwer LD, Moor BD, Vandewalle J (2000) A multilinear singular value decomposition. SIAM J Matrix Anal Appl 21(4):1253\u20131278","journal-title":"SIAM J Matrix Anal Appl"},{"issue":"1","key":"262_CR63","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/TKDE.2008.112","volume":"21","author":"E Acar","year":"2009","unstructured":"Acar E, Yener B (2009) Unsupervised multiway data analysis: a literature survey. IEEE Trans Knowl Data Eng 21(1):6\u201320","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"262_CR64","doi-asserted-by":"crossref","unstructured":"Sun J et al (2005) Cubesvd: a novel approach to personalized Web search. In: Proceedings of the 14th international conference on World Wide Web","DOI":"10.1145\/1060745.1060803"},{"issue":"3","key":"262_CR65","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s11263-007-0053-0","volume":"76","author":"H Wang","year":"2008","unstructured":"Wang H, Ahuja N (2008) A tensor approximation approach to dimensionality reduction. Int J Comput Vis 76(3):217\u2013229","journal-title":"Int J Comput Vis"},{"issue":"3","key":"262_CR66","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1137\/07070111X","volume":"51","author":"TG Kolda","year":"2009","unstructured":"Kolda TG, Bader BW (2009) Tensor decompositions and applications. SIAM Rev 51(3):455\u2013500","journal-title":"SIAM Rev"},{"issue":"4","key":"262_CR67","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1137\/1037127","volume":"37","author":"M Berry","year":"1995","unstructured":"Berry M, Dumais S, O\u2019Brien G (1995) Using linear algebra for intelligent information retrieval. SIAM Rev 37(4):573\u2013595","journal-title":"SIAM Rev"},{"key":"262_CR68","doi-asserted-by":"crossref","unstructured":"Saito D, Yamamoto K, Minematsu N, Hirose K (2011) One-to-many voice conversion based on tensor representation of speaker space. In: Interspeech (pp. 653\u2013656), Florence, Italy, 28\u201331 August 2011.","DOI":"10.21437\/Interspeech.2011-268"},{"issue":"4","key":"262_CR69","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/TSMCA.2011.2132708","volume":"41","author":"A Nanopoulos","year":"2011","unstructured":"Nanopoulos A (2011) Item recommendation in collaborative tagging systems. IEEE Trans Syst Man Cybern A Syst Hum 41(4):760\u2013771","journal-title":"IEEE Trans Syst Man Cybern A Syst Hum"},{"issue":"2","key":"262_CR70","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s13198-014-0260-3","volume":"6","author":"M Sadiq","year":"2014","unstructured":"Sadiq M, Jain S (2014) A fuzzy based approach for the selection in goal oriented requirements elicitation process. Int J Syst Assur Eng Manag 6(2):157\u2013164","journal-title":"Int J Syst Assur Eng Manag"},{"key":"262_CR71","doi-asserted-by":"crossref","unstructured":"Sadiq M, Jain S (2014) Stakeholder identification method in goal oriented requirements elicitation process. In: 2014 IEEE 5th international workshop on requirements prioritization and communication (RePriCo). IEEE","DOI":"10.1109\/RePriCo.2014.6895219"},{"key":"262_CR72","doi-asserted-by":"crossref","unstructured":"Furnas G, Deerwester S, Dumais S (1988) Information retrieval using a singular value decomposition model of latent semantic structure. In: Proceedings of the 11th annual international ACM SIGIR conference on research and development in information retrieval","DOI":"10.1145\/62437.62487"},{"key":"262_CR73","doi-asserted-by":"crossref","unstructured":"Sun J, Tao D, Faloutsos C (2006) Beyond streams and graphs: dynamic tensor analysis. In: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining","DOI":"10.1145\/1150402.1150445"},{"issue":"6","key":"262_CR74","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1016\/j.infsof.2008.12.001","volume":"51","author":"A Perini","year":"2009","unstructured":"Perini A, Ricca F, Susi A (2009) Tool-supported requirements prioritization: comparing the AHP and CBRank methods. Inf Softw Technol 51(6):1021\u20131032","journal-title":"Inf Softw Technol"},{"key":"262_CR75","doi-asserted-by":"crossref","unstructured":"Saaty TL (2000) Fundamentals of decision making and priority theory with the analytic hierarchy process, vol 6. Rws Publications, Pittsburgh, PA","DOI":"10.1007\/978-94-015-9799-9_2"},{"issue":"2","key":"262_CR76","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/s00500-013-1058-y","volume":"18","author":"MR Gholamian","year":"2014","unstructured":"Gholamian MR, Ghomi SF, Ghazanfari M (2014) Applying FARSJUM intelligent system to derive priorities in sparse hierarchical problems. Soft Comput 18(2):299\u2013311","journal-title":"Soft Comput"},{"issue":"1","key":"262_CR77","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10664-006-7240-4","volume":"12","author":"L Karlsson","year":"2007","unstructured":"Karlsson L et al (2007) Pair-wise comparisons versus planning game partitioning\u2014experiments on requirements prioritisation techniques. Empir Softw Eng 12(1):3\u201333","journal-title":"Empir Softw Eng"},{"key":"262_CR78","unstructured":"Perini A et al (2007) An empirical study to compare the accuracy of AHP and CBRanking techniques for requirements prioritization. In: CERE\u201907. Fifth international workshop on comparative evaluation in requirements engineering, 2007. IEEE"},{"issue":"4","key":"262_CR79","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/TSE.2012.52","volume":"39","author":"A Perini","year":"2013","unstructured":"Perini A, Susi A, Avesani P (2013) A machine learning approach to software requirements prioritization. IEEE Trans Softw Eng 39(4):445\u2013461","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"262_CR80","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.dss.2010.12.009","volume":"51","author":"RA Ribeiro","year":"2011","unstructured":"Ribeiro RA et al (2011) Hybrid assessment method for software engineering decisions. Decis Support Syst 51(1):208\u2013219","journal-title":"Decis Support Syst"},{"issue":"1","key":"262_CR81","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.infsof.2012.07.003","volume":"55","author":"P Tonella","year":"2013","unstructured":"Tonella P, Susi A, Palma F (2013) Interactive requirements prioritization using a genetic algorithm. Inf Softw Technol 55(1):173\u2013187","journal-title":"Inf Softw Technol"},{"issue":"7","key":"262_CR82","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1016\/j.infsof.2012.01.008","volume":"54","author":"S Barney","year":"2012","unstructured":"Barney S et al (2012) Software quality trade-offs: a systematic map. Inf Softw Technol 54(7):651\u2013662","journal-title":"Inf Softw Technol"},{"key":"262_CR83","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-29044-2","volume-title":"Experimentation in software engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin C et al (2012) Experimentation in software engineering. Springer, Berlin"},{"key":"262_CR84","doi-asserted-by":"crossref","unstructured":"Pergher M, Rossi B (2013) Requirements prioritization in software engineering: a systematic mapping study. In: 2013 3rd International workshop on empirical requirements engineering (EmpiRE). IEEE","DOI":"10.1109\/EmpiRE.2013.6615215"},{"issue":"5","key":"262_CR85","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/52.605933","volume":"14","author":"J Karlsson","year":"1997","unstructured":"Karlsson J, Ryan K (1997) A cost-value approach for prioritizing requirements. IEEE Softw 14(5):67\u201374","journal-title":"IEEE Softw"},{"issue":"140","key":"262_CR86","first-page":"55","volume":"22","author":"R Likert","year":"1932","unstructured":"Likert R (1932) A technique for the measurement of attitudes. Arch Psychol 22(140):55","journal-title":"Arch Psychol"},{"key":"262_CR87","doi-asserted-by":"crossref","unstructured":"Svahnberg M, Aurum A, Wohlin C (2008) Using students as subjects-an empirical evaluation. In: Proceedings of the second ACM-IEEE international symposium on empirical software engineering and measurement. ACM","DOI":"10.1145\/1414004.1414055"},{"key":"262_CR88","doi-asserted-by":"crossref","unstructured":"Berander P (2004) Using students as subjects in requirements prioritization. In: ISESE\u201904. Proceedings of 2004 international symposium on empirical software engineering, 2004. IEEE","DOI":"10.1109\/ISESE.2004.1334904"},{"issue":"4","key":"262_CR89","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1023\/A:1009844119158","volume":"5","author":"WF Tichy","year":"2000","unstructured":"Tichy WF (2000) Hints for reviewing empirical work in software engineering. Empir Softw Eng 5(4):309\u2013312","journal-title":"Empir Softw Eng"},{"key":"262_CR90","doi-asserted-by":"crossref","unstructured":"Danesh AS, Ahmad R (2009) Study of prioritization techniques using students as subjects. In: ICIME\u201909. International conference on information management and engineering. IEEE","DOI":"10.1109\/ICIME.2009.37"},{"key":"262_CR91","unstructured":"Siegel S (1956) Nonparametric statistics for the behavioral sciences. In: McGraw-Hill series in psychology, McGraw-Hill, New York"},{"key":"262_CR92","doi-asserted-by":"crossref","unstructured":"Shin K, Kang U. Distributed methods for high-dimensional and large-scale tensor factorization. In: 2014 IEEE international conference on data mining. IEEE","DOI":"10.1109\/ICDM.2014.78"},{"key":"262_CR93","doi-asserted-by":"crossref","unstructured":"Jeon I et al (2015) Haten2: Billion-scale tensor decompositions. In: 2015 IEEE 31st international conference on data engineering. IEEE","DOI":"10.1109\/ICDE.2015.7113355"},{"issue":"1","key":"262_CR94","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10618-015-0401-6","volume":"30","author":"M Kim","year":"2016","unstructured":"Kim M, Candan KS (2016) Decomposition-by-normalization (DBN): leveraging approximate functional dependencies for efficient CP and tucker decompositions. Data Min Knowl Discov 30(1):1\u201346","journal-title":"Data Min Knowl Discov"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-016-0262-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-016-0262-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-016-0262-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,16]],"date-time":"2022-07-16T14:36:13Z","timestamp":1657982173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-016-0262-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,7]]},"references-count":94,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["262"],"URL":"https:\/\/doi.org\/10.1007\/s00766-016-0262-6","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,7]]}}}