{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:32:42Z","timestamp":1765355562688,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,21]],"date-time":"2010-06-21T00:00:00Z","timestamp":1277078400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["03\/CE2\/I303-1"],"award-info":[{"award-number":["03\/CE2\/I303-1"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,21]]},"DOI":"10.1145\/1961258.1961279","type":"proceedings-article","created":{"date-parts":[[2011,3,22]],"date-time":"2011-03-22T12:25:29Z","timestamp":1300796729000},"page":"93-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Maximizing the value of the software development process by game theoretic analysis"],"prefix":"10.1145","author":[{"given":"Murat","family":"Yilmaz","sequence":"first","affiliation":[{"name":"Dublin City University, Ireland"}]},{"given":"Rory V.","family":"O'Connor","sequence":"additional","affiliation":[{"name":"Dublin City University, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2010,6,21]]},"reference":[{"volume-title":"Inc.","year":"2005","author":"Acuna S. T.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312870"},{"issue":"1","key":"e_1_3_2_1_3_1","first-page":"11","article-title":"The high speed balancing game: How software companies cope with internet speed","volume":"16","author":"Baskerville R. L.","year":"2004","journal-title":"Scandinavian Journal of Information Systems"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.09.004"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1098712"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195300574.001.0001"},{"key":"e_1_3_2_1_7_1","unstructured":"J. Blumen. The prisoner's dilemma in software development. http:\/\/www.spectacle.org\/995\/sw.html.  J. Blumen. The prisoner's dilemma in software development. http:\/\/www.spectacle.org\/995\/sw.html."},{"volume-title":"Prentice Hall","year":"1981","author":"Boehm B.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.59"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/638750.638775"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336584"},{"volume-title":"Addison-Wesley","year":"2007","author":"Cockburn A.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"A. K. Dixit and S. Skeath. Games of Strategy. W. W. Norton &amp; Company June 1999.  A. K. Dixit and S. Skeath. Games of Strategy . W. W. Norton &amp; Company June 1999."},{"volume-title":"Kluwer Academic Publishers","year":"2004","author":"Dyba T.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","first-page":"65","article-title":"Prisoner dilemma in software testing","volume":"1","author":"Feijs L.","year":"2001","journal-title":"Computer Science Reports"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336521"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20040282"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2004.08.007"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11499053_9"},{"volume-title":"Addison-Wesley","year":"1990","author":"Humphrey W.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511754258"},{"key":"e_1_3_2_1_22_1","unstructured":"ISO\/IEC. Amendment to ISO\/IEC 12207--2008 - Systems and software engineering --- Software life cycle processes 2008.  ISO\/IEC. Amendment to ISO\/IEC 12207--2008 - Systems and software engineering --- Software life cycle processes 2008."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIT.2006.262305"},{"volume-title":"Inc.","year":"1987","author":"Levy L. S.","key":"e_1_3_2_1_24_1"},{"volume-title":"Auerbach Publications","year":"2008","author":"Mutafelija B.","key":"e_1_3_2_1_25_1"},{"volume-title":"MIT Press","year":"1994","author":"Osborne M. J.","key":"e_1_3_2_1_26_1"},{"volume-title":"Inc.","year":"2006","author":"Persse J. R.","key":"e_1_3_2_1_27_1"},{"volume-title":"Addison-Wesley Professional","year":"2003","author":"Poppendieck T.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of IEEE Wescon","volume":"26","author":"Royce W.","year":"1970"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2008.05.037"},{"key":"e_1_3_2_1_31_1","unstructured":"K. Sullivan and P. Chalasani. Software design decisions as real options. 1997.  K. Sullivan and P. Chalasani. Software design decisions as real options. 1997."},{"volume-title":"Firewall Media","year":"2005","author":"Tomayko J. E.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506216.1506244"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/253769.253801"},{"volume-title":"Addison Wesley","year":"1998","author":"Zahran S.","key":"e_1_3_2_1_35_1"}],"event":{"name":"Profes '10: International Conference on Product Focused Software","sponsor":["LERO The Irish Software Engineering Research Centre","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Limerick Ireland","acronym":"Profes '10"},"container-title":["Proceedings of the 11th International Conference on Product Focused Software"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1961258.1961279","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1961258.1961279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:50Z","timestamp":1750244390000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1961258.1961279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,21]]},"references-count":35,"alternative-id":["10.1145\/1961258.1961279","10.1145\/1961258"],"URL":"https:\/\/doi.org\/10.1145\/1961258.1961279","relation":{},"subject":[],"published":{"date-parts":[[2010,6,21]]},"assertion":[{"value":"2010-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}