{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T18:04:49Z","timestamp":1648663489638},"reference-count":16,"publisher":"International Academy Publishing (IAP)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"DOI":"10.4304\/jsw.8.4.10031010","type":"journal-article","created":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T17:39:22Z","timestamp":1364837962000},"source":"Crossref","is-referenced-by-count":0,"title":["Complex Learning System for Behavior Factor based Data Analysis"],"prefix":"10.17706","volume":"8","author":[{"given":"Wei","family":"Guan","sequence":"first","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,4,1]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1093\/combul\/42.1.24","volume-title":"Applied Software Measurement Assuring Productivity and Quality","author":"Jones","year":"2009","unstructured":"[1] C. Jones, \"Applied Software Measurement: Assuring, Productivity and Quality\", 2nd Edition, McGraw-Hill, New York, 2009."},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/combul\/42.1.24"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/32.841112"},{"key":"ref2","volume-title":"Corporate Social and Management Effectiveness","author":"Denison","year":"2010","unstructured":"[7] D. R. Denison, Corporate Social and Management Effectiveness, John Wiley & Sons, New York, 2010."},{"issue":"No. 5","key":"ref3","first-page":"38","article-title":"Project Leadership","volume":"18","author":"Radcliffe","year":"2008","unstructured":"[9] D. Radcliffe, \"Project Leadership\", Software Magazine, Vol. 18, No. 5, pp. 38-44, 2008.","journal-title":"Software Magazine"},{"issue":"No. 2","key":"ref4","first-page":"1991","article-title":"Software Development Projects: Risk Reasons and Occurrences","volume":"2","author":"Arshad","year":"2009","unstructured":"[10] N. H. Arshad, A. Mohamed and Z. Matnor, \"Software Development Projects: Risk Reasons and Occurrences\", WSEAS Transactions on Computer Research, Vol. 2, No. 2, pp. 1991-8755, 2009.","journal-title":"WSEAS Transactions on Computer Research"},{"key":"ref5","first-page":"128","article-title":"Controlling Software Project Risks\u2014An Empirical Study of Methods Used by Experienced Project Managers","volume-title":"Proceedings of SAICSIT","author":"Addison","year":"2008","unstructured":"[11] T. Addison and S. Vallabh, \"Controlling Software Project Risks\u2014An Empirical Study of Methods Used by Experienced Project Managers\", Proceedings of SAICSIT, pp. 128-140, 2008."},{"key":"ref6","first-page":"402","article-title":"Abduction in logic programming.","volume-title":"Computational Logic Logic Programming and Beyond Part I number 2407 in LNAI","author":"Kakas","year":"2010","unstructured":"[12] A. Kakas and M. Denecker. Abduction in logic programming. In A. Kakas and F. Sadri, editors, Computational Logic: Logic Programming and Beyond. Part I, number 2407 in LNAI, pp. 402-436. Springer, 2010."},{"key":"ref7","article-title":"Ontology-based reasoning techniques for multimedia transformation and finding.","volume-title":"Semantic Multimedia and Ontologies","author":"Moller","year":"2007","unstructured":"[14] R. Moller and B. Neumann. Ontology-based reasoning techniques for multimedia transformation and finding.In Semantic Multimedia and Ontologies: Theory and Applications. 2007. To appear."},{"key":"ref8","first-page":"247","article-title":"On Scene Transformation with Description Logics.","volume-title":"Cognitive Vision Systems Sampling the Spectrum of Approaches number 3948 in LNCS","author":"Neumann","year":"2009","unstructured":"[15] B. Neumann and R. Moller. On Scene Transformation with Description Logics. In H. Christensen and H.-H.Nagel, editors, Cognitive Vision Systems: Sampling the Spectrum of Approaches, number 3948 in LNCS, pp. 247-278. Springer, 2009."},{"key":"ref9","volume-title":"International Workshop on Description Logics","author":"Peraldi","year":"2007","unstructured":"[16] S. E. Peraldi, A. Kaya, S. Melzer, R. Moller, and M. Wessel. Multimedia Transformation as Abduction. In Proc. DL-2007: International Workshop on Description Logics, 2007."},{"key":"ref9","unstructured":"[2] W. Gibbs, \"Software's Chronic Crisis\", Scientific American, September, Vol. 167, No. 4, 2009, pp. 468-473."},{"key":"ref9","unstructured":"[3] Standish group, extreme chaos, Standish group international. http:\/\/www.standishgroup.com, 2010"},{"key":"ref9","unstructured":"[4] L. J. May, \"Major Causes of Software Project Failures\", 2009. http:\/\/stsc.hill.af.mil\/crosstalk\/1998\/jul\/causes.asp"},{"key":"ref9","unstructured":"[8] F. J. Heemstra and R. J. Kusters, \"Dealing with Risk: A Practical Approach\", Journal of Information Technology, Vol. 11, pp. 333-346. doi: 10.1057, jit, 2011"},{"key":"ref9","unstructured":"[13] R. Moller, V. Haarslev, and B. Neumann. Concepts based information finding. In Proc. IT&KNOWS-98: International Conference on Information Technology and Knowledge Systems, 31. August- 4. September, Vienna, Budapest, pp. 49 (6), 2008."}],"container-title":["Journal of Software"],"original-title":[],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T06:24:33Z","timestamp":1498026273000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jsw\/article\/view\/9463"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,1]]},"references-count":16,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2013,4,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jsw.8.4.10031010","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,4,1]]}}}