{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:41:06Z","timestamp":1729629666268,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/ifsa-nafips.2013.6608501","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T18:39:42Z","timestamp":1380652782000},"page":"789-794","source":"Crossref","is-referenced-by-count":1,"title":["Comparison of fuzzy rules and SVM approach to the value estimation of the use case parameters"],"prefix":"10.1109","author":[{"given":"Jakub","family":"Stolfa","sequence":"first","affiliation":[]},{"given":"Ondrej","family":"Kobersky","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"Kromer","sequence":"additional","affiliation":[]},{"given":"Svatopluk","family":"Stolfa","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Kopka","sequence":"additional","affiliation":[]},{"given":"Vaclav","family":"Snasel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Fuzzy-Systeme","year":"1996","author":"feuring","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/iNCoS.2012.75"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.2200\/S00324ED1V01Y201102AIM010"},{"key":"15","first-page":"25","article-title":"Methodology for estimating working time effort of the software project","author":"s?tolfa","year":"2012","journal-title":"2012 Databases Texts Specifications and Objects (DATESO)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1201\/9781420011326"},{"key":"13","article-title":"Defect inflow prediction in large software projects","volume":"3","author":"staron","year":"2009","journal-title":"e-Informatica Software Engineering Journal"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.10.005"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1016\/0950-5849(92)90068-Z","article-title":"Software cost estimation","volume":"34","author":"heemstra","year":"1992","journal-title":"Information and Software Technology"},{"journal-title":"Software Engineering Economics","year":"1981","author":"boehm","key":"12"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4170.001.0001","author":"herbrich","year":"2001","journal-title":"Learning Kernel Classifiers Theory and Algorithms (Adaptive Computation and Machine Learning)"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1002\/9780470503065"},{"key":"22","article-title":"Tutorial on fuzzy logic","author":"jantzen","year":"1998","journal-title":"Technical Report 98-E-868 (Logic) Technical University of Denmark Dept of Automation"},{"key":"23","first-page":"605","article-title":"Support vector machines an introduction","author":"kecman","year":"0","journal-title":"Support Vector Machines Theory and Applications"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6083684"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73723-0_26"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/2457276.2457305"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1142\/9789814261296_0009","article-title":"Genetic algorithms for query optimization in information retrieval: Relevance feedback","author":"kraft","year":"1997","journal-title":"Genetic Algorithms and Fuzzy Logic Systems"},{"key":"2","article-title":"Fuzzy sets and fuzzy logic","author":"klir","year":"1995","journal-title":"Theory and Applications"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/72.846731"},{"key":"1","first-page":"287","article-title":"Soft information retrieval: Applications of fuzzy set theory and neural networks","author":"crestani","year":"1999","journal-title":"Neuro-Fuzzy Techniques for Intelligent Information Systems"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"6","first-page":"349","article-title":"The evolution of fuzzy classifier for data mining with applications","author":"sna?s?el","year":"2010","journal-title":"SEAL"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19644-7_14"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2011.97"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/5.537105"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/5.58325"}],"event":{"name":"2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA\/NAFIPS)","start":{"date-parts":[[2013,6,24]]},"location":"Edmonton, AB, Canada","end":{"date-parts":[[2013,6,28]]}},"container-title":["2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA\/NAFIPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596206\/6608358\/06608501.pdf?arnumber=6608501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,28]],"date-time":"2019-07-28T02:08:37Z","timestamp":1564279717000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6608501\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ifsa-nafips.2013.6608501","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}