{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:43:49Z","timestamp":1730292229417,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/re.2017.32","type":"proceedings-article","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T20:22:47Z","timestamp":1506370967000},"page":"520-525","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Bayesian Decision Model for Release Planning in Incremental Development"],"prefix":"10.1109","author":[{"given":"Olawole","family":"Oni","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"36","author":"oni","year":"2016","journal-title":"Requirements Engineering Foundation for Software Quality 22nd International Working Conference REFSQ 2016 Gothenburg Sweden March 14–17 2016 Proceedings"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/int.20358"},{"key":"ref33","article-title":"Eliciting univariate probability distributions","author":"oakley","year":"2010","journal-title":"Rethinking risk measurement and reporting"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/0470033312"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2576768.2598334"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73460-4_28"},{"journal-title":"SPEA2 Improving the strength Pareto evolutionary algorithm","year":"2001","author":"zitzler","key":"ref37"},{"journal-title":"Requirements Engineering From System Goals to UML Models to Software Specifications","year":"2009","author":"van lamsweerde","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029905"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.57"},{"key":"ref10","article-title":"Planning poker","author":"grenning","year":"2002","journal-title":"Renaissance Software Consulting"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985901"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24659-6_18"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COGINF.2004.1327472"},{"key":"ref14","first-page":"168","article-title":"Release planning under fuzzy effort constraints","author":"ruhe","year":"2004","journal-title":"Proceedings of the Third IEEE International Conference on Cognitive Informatics 2004"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277179"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568239"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570126"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.2005.1452434"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.09.039"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2003.07.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00194-X"},{"key":"ref27","first-page":"1147","article-title":"A statistical approach for the maximization of the financial benefits yielded by a large set of MMFs and AEs","volume":"32","author":"alencar","year":"2013","journal-title":"Computing and Informatics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.164"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/spip.336"},{"key":"ref5","first-page":"15","article-title":"Disciplined Learning-The Successor to Risk Management","volume":"27","author":"cockburn","year":"2014","journal-title":"Crosstalk J of Defense Software Eng"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1142\/9789812775245_0013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.11.006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SEW.2005.42"},{"key":"ref9","first-page":"85","article-title":"Extreme Programming Explained","author":"beck","year":"2005","journal-title":"Writing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25734-6_119"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884822"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2465478.2465492"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2003.1237987"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1994.350037"},{"key":"ref26","first-page":"1435","article-title":"Applying Game Theory to the Incremental Funding Method in Software Projects","volume":"9","author":"da","year":"2014","journal-title":"Journal of Software"},{"journal-title":"Software by Numbers","year":"2004","author":"denne","key":"ref25"}],"event":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","start":{"date-parts":[[2017,9,4]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 IEEE 25th International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8048783\/8048874\/08049177.pdf?arnumber=8049177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T21:51:21Z","timestamp":1509141081000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8049177\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/re.2017.32","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}