{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:49:31Z","timestamp":1761662971914},"reference-count":28,"publisher":"World Scientific Pub Co Pte Lt","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2011,3]]},"abstract":"<jats:p> Requirement engineering is a key issue in the development of a software project. Like any other development activity it is not without risks. This work is about the empirical study of risks of requirements by applying machine learning techniques, specifically Bayesian networks classifiers. We have defined several models to predict the risk level for a given requirement using three dataset that collect metrics taken from the requirement specifications of different projects. The classification accuracy of the Bayesian models obtained is evaluated and compared using several classification performance measures. The results of the experiments show that the Bayesians networks allow obtaining valid predictors. Specifically, a tree augmented network structure shows a competitive experimental performance in all datasets. Besides, the relations established between the variables collected to determine the level of risk in a requirement, match with those set by requirement engineers. We show that Bayesian networks are valid tools for the automation of risks assessment in requirement engineering. <\/jats:p>","DOI":"10.1142\/s0218194011005219","type":"journal-article","created":{"date-parts":[[2011,6,7]],"date-time":"2011-06-07T07:28:30Z","timestamp":1307431710000},"page":"167-190","source":"Crossref","is-referenced-by-count":6,"title":["REQUIREMENT RISK LEVEL FORECAST USING BAYESIAN NETWORKS CLASSIFIERS"],"prefix":"10.1142","volume":"21","author":[{"given":"ISABEL MAR\u00cdA","family":"DEL \u00c1GUILA","sequence":"first","affiliation":[{"name":"Department of Languages and Computation, University of Almer\u00eda, Carretera de la Playa, Almer\u00eda, 04120, Spain"}]},{"given":"JOS\u00c9","family":"DEL SAGRADO","sequence":"additional","affiliation":[{"name":"Department of Languages and Computation, University of Almer\u00eda, Carretera de la Playa, Almer\u00eda, 04120, Spain"}]}],"member":"219","published-online":{"date-parts":[[2011,11,21]]},"reference":[{"key":"rf1","volume-title":"CHAOS Summary 2009","year":"2009"},{"key":"rf3","doi-asserted-by":"publisher","DOI":"10.1109\/52.965804"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1109\/52.62930"},{"key":"rf5","doi-asserted-by":"publisher","DOI":"10.1109\/52.281716"},{"key":"rf6","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1231163"},{"key":"rf8","doi-asserted-by":"crossref","DOI":"10.21236\/ADA319533","volume-title":"Continuous Risk Management Guidebook First Edition","author":"Dorofee A. J.","year":"1996"},{"key":"rf10","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-005-0005-1"},{"key":"rf11","volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference","author":"Pearl J.","year":"1988"},{"key":"rf12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3502-4"},{"key":"rf13","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.09.001"},{"key":"rf14","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.01.003"},{"key":"rf15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.10.040"},{"key":"rf16","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-758-4.ch006"},{"key":"rf18","volume-title":"Software Engineering: (Updated) (8th Edition)","author":"Sommerville I.","year":"2006"},{"key":"rf19","volume-title":"Facts and Fallacies of Software Engineering","author":"Glass R. L.","year":"2002"},{"key":"rf21","volume-title":"Requirements Engineering: Processes and Techniques","author":"Kotonya G.","year":"1998"},{"key":"rf22","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.88"},{"key":"rf24","first-page":"14","author":"Gottesdiener E.","journal-title":"Better Software"},{"key":"rf25","first-page":"14","volume":"23","author":"Chittister C.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"rf26","doi-asserted-by":"publisher","DOI":"10.1145\/287831.287843"},{"key":"rf31","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1993.11518006"},{"key":"rf32","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00035-7"},{"key":"rf34","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9079-3"},{"key":"rf36","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-002-0160-y"},{"key":"rf40","volume-title":"Pattern Classification and Scene Analysis","author":"Duda R. O.","year":"1973"},{"key":"rf41","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007465528199"},{"key":"rf42","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054142"},{"key":"rf46","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194011005219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T12:12:05Z","timestamp":1565179925000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194011005219"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":28,"journal-issue":{"issue":"02","published-online":{"date-parts":[[2011,11,21]]},"published-print":{"date-parts":[[2011,3]]}},"alternative-id":["10.1142\/S0218194011005219"],"URL":"https:\/\/doi.org\/10.1142\/s0218194011005219","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3]]}}}