{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T06:28:33Z","timestamp":1753684113402,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,28]],"date-time":"2017-09-28T00:00:00Z","timestamp":1506556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,28]]},"DOI":"10.1145\/3139367.3139430","type":"proceedings-article","created":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T17:01:06Z","timestamp":1512061266000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Using Fuzzy Linguistic 2-Tuples to Collectively Prioritize Software Requirements based on Stakeholders' Evaluations"],"prefix":"10.1145","author":[{"given":"Vassilis C.","family":"Gerogiannis","sequence":"first","affiliation":[{"name":"Dept. of Business Administration, Technological Education Institute of Thessaly, Larissa, Greece"}]},{"given":"Georgios","family":"Tzikas","sequence":"additional","affiliation":[{"name":"School of Science &amp; Technology, Hellenic Open University, Patras, Greece"}]}],"member":"320","published-online":{"date-parts":[[2017,9,28]]},"reference":[{"volume-title":"Requirements Prioritization Introduction","author":"Mead N.R.","key":"e_1_3_2_1_1_1","unstructured":"N.R. Mead . 2006. Requirements Prioritization Introduction . Software Engineering Institute Web Publication, Carnegie Mellon University, Pittsburgh . N.R. Mead. 2006. Requirements Prioritization Introduction. Software Engineering Institute Web Publication, Carnegie Mellon University, Pittsburgh."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.02.001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2011.6051652"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(97)00053-0"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.605933"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Computer Networks and Information Technology (ICCNIT","author":"Babar M.","year":"2011","unstructured":"M. Babar , M. Ramzan , and S. Ghayyur . 2011. Challenges and Future Trends in Software Requirements Prioritization . In Proceedings of the Computer Networks and Information Technology (ICCNIT 2011 ), IEEE, 319--324. M. Babar, M. Ramzan, and S. Ghayyur. 2011. Challenges and Future Trends in Software Requirements Prioritization. In Proceedings of the Computer Networks and Information Technology (ICCNIT 2011), IEEE, 319--324."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"P. Berander and A. Andrews. 2005. Requirements Prioritization. In Engineering and Managing Software Requirements A. Aurum and C. Wohlin (Eds.). Springer 69--94.  P. Berander and A. Andrews. 2005. Requirements Prioritization. In Engineering and Managing Software Requirements A. Aurum and C. Wohlin (Eds.). Springer 69--94.","DOI":"10.1007\/3-540-28244-0_4"},{"key":"e_1_3_2_1_8_1","unstructured":"D. Leffingwell and D. Widrig. 2003. Managing Software Requirements: A Use Case Approach. 2nd ed. Addison-Wesley Boston.   D. Leffingwell and D. Widrig. 2003. Managing Software Requirements: A Use Case Approach. 2nd ed. Addison-Wesley Boston."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"L. Lehtola M. Kauppinen and S. Kujala. 2004. Requirements Prioritization Challenges in Practice. In Product Focused Software Process Improvement. Springer 497--508.  L. Lehtola M. Kauppinen and S. Kujala. 2004. Requirements Prioritization Challenges in Practice. In Product Focused Software Process Improvement. Springer 497--508.","DOI":"10.1007\/978-3-540-24659-6_36"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.36"},{"volume-title":"Proceedings of the Open Systems Conference (ICOS), IEEE, 1--6.","author":"Ejnioui A.","key":"e_1_3_2_1_11_1","unstructured":"A. Ejnioui , C. Otero , and A. Qureshi , 2012. Software Requirement Prioritization Using Fuzzy Multi-Attribute Decision making . In Proceedings of the Open Systems Conference (ICOS), IEEE, 1--6. A. Ejnioui, C. Otero, and A. Qureshi, 2012. Software Requirement Prioritization Using Fuzzy Multi-Attribute Decision making. In Proceedings of the Open Systems Conference (ICOS), IEEE, 1--6."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"D. Lima F. Freitas G. Campos and J. Souza. 2011. A Fuzzy Approach to Requirements Prioritization. In Search Based Software Engineering Springer 64--69.   D. Lima F. Freitas G. Campos and J. Souza. 2011. A Fuzzy Approach to Requirements Prioritization. In Search Based Software Engineering Springer 64--69.","DOI":"10.1007\/978-3-642-23716-4_8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2007.30"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/91.890332"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.04.025"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"K. Schwaber. 2004. Agile Project Management with Scrum. Microsoft Professional.   K. Schwaber. 2004. Agile Project Management with Scrum. Microsoft Professional.","DOI":"10.1007\/11499053_47"},{"volume-title":"The Analytical Hierarchy Process","author":"Saaty T. L.","key":"e_1_3_2_1_17_1","unstructured":"T. L. Saaty . 1980. The Analytical Hierarchy Process , McGraw-Hill . T. L. Saaty. 1980. The Analytical Hierarchy Process, McGraw-Hill."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lrp.2010.08.001"},{"volume-title":"Fundamentals, Principles, and Techniques","author":"Pohl K.","key":"e_1_3_2_1_19_1","unstructured":"K. Pohl . 2010. Requirements Engineering , Fundamentals, Principles, and Techniques . Springer . K. Pohl. 2010. Requirements Engineering, Fundamentals, Principles, and Techniques. Springer."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2003.11.031"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2006.10.005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345819"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"M. Dabbagh and S. P. Lee. 2014. An Approach for Integrating the Prioritization of Functional and Nonfunctional Requirements. The Scientific World Journal article ID 737626 13 pages.  M. Dabbagh and S. P. Lee. 2014. An Approach for Integrating the Prioritization of Functional and Nonfunctional Requirements. The Scientific World Journal article ID 737626 13 pages.","DOI":"10.1155\/2014\/737626"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(84)90024-1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/344684.344694"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 2nd International Workshop on the Requirements Engineering Process, IEEE.","author":"Gruenbacher P.","year":"2000","unstructured":"P. Gruenbacher . 2000 . Collaborative Requirements Negotiation with Easy Win Win . In Proceedings of the 2nd International Workshop on the Requirements Engineering Process, IEEE. P. Gruenbacher. 2000. Collaborative Requirements Negotiation with Easy Win Win. In Proceedings of the 2nd International Workshop on the Requirements Engineering Process, IEEE."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2011.2170076"}],"event":{"name":"PCI 2017: 21st PAN-HELLENIC CONFERENCE ON INFORMATICS","sponsor":["Greek Com Soc Greek Computer Society","University of Thessaly University of Thessaly, Volos, Greece"],"location":"Larissa Greece","acronym":"PCI 2017"},"container-title":["Proceedings of the 21st Pan-Hellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139367.3139430","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139367.3139430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:50Z","timestamp":1750212830000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139367.3139430"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,28]]},"references-count":27,"alternative-id":["10.1145\/3139367.3139430","10.1145\/3139367"],"URL":"https:\/\/doi.org\/10.1145\/3139367.3139430","relation":{},"subject":[],"published":{"date-parts":[[2017,9,28]]},"assertion":[{"value":"2017-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}