[1]
|
F. P. Brooks, “No Silver Bullet: Essence and Accidents of Software Engineering,” IEEE Computer Journal, Vol. 20, No. 1, 1987, pp. 10-19.
|
[2]
|
B. H. C. Cheng and J. M. Atlee, “Research Directions in Requirements Engineering,” Proceedings of the Future of Software Engineering Conference, Minneapolis, IEEE Computer Society, 2007, pp. 285-303.
|
[3]
|
H. Bendjenna, N. Zarour and P. J. Charrel, “MAMIE, A Methodology to Elicit Requirements for an Inter-Com- pany Cooperative Information System,” Proceeding of IEEE Conference on Innovation on Software Engineering (ISE), Vienna, IEEE Computer Society, 2008, pp. 290- 295.
|
[4]
|
H. Bendjenna, N. Zarour and P. J. Charrel, “Enhancing the Elicitation Technique Selection Process in a Cooperative Distributed Environment,” Proceeding of the 14th Requirements Engineering Foundation for Software Quality Conference (REFSQ), Montpellier, Lecture Notes in Computer Science, Vol. 5025, Springer, Heidelberg, 2008, pp. 23-36.
|
[5]
|
H. Bendjenna, M. Amroune, N. Zarour and P. J. Charrel, “Prioritizing Non-functional Concerns in MAMIE Methodology,” Proceeding of the Third International Conference on Knowledge Science, Engineering and Management (KSEM), Vienna, Lecture Notes in Artificial Intelligence, Vol. 5914, Springer, Heidelberg, 2009, pp. 253- 262.
|
[6]
|
L. Chung, B. Nixon, E. Yu and J. Mylopoulos, “Non- Functional Requirements in Software Engineering,” Klu- wer Academic Publishers, New York, 2000.
|
[7]
|
P. J. A. Diaz, F. Trilnik and M. R. Campo, “How to Handle Interaction Concerns?” Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Lan- guages, and Applications OOPSLA’00, Minneapolis, 2000, pp. 32-52.
|
[8]
|
J. Liu, D. Batory and S. Neduniry, “Modelling Interactions in Feature Oriented Software Design,” International Conference on Feature Interactions in Telecommunications and Software Systems (ICFI), Leicester, 2005, pp. 178-197.
|
[9]
|
F. Sanen, E. Truyen, W. Joosen, N. Loughran, A. Rashid, A. Jackson, A. Nedos and S. Clarke, “Study on Interaction Issues,” AOSD-Europe Deliverable, Vol. 44, Leuven, 2006, pp. 1-31.
|
[10]
|
R. Axelrod, “Structure of Decision: The Cognitive Maps of Political Elites,” Princeton University Press, Princeton, 1976.
|
[11]
|
H. J. Zimmermann, “Fuzzy Set Theory and its Applications,” Kluwer Academic Publishers, Dordrecht, 1991.
|
[12]
|
S. Bueno and J. L. Salmeron, “Fuzzy Modeling Enterprise Resource Planning Tool Selection,” Computer Standards & Interfaces, Vol. 30, No. 3, 2008, pp. 137-147.
|
[13]
|
B. Boehm, “Characteristics of Software Quality,” North Holland Press, New York, 1978.
|
[14]
|
N. E. Fenton and S. L. Pfleeger, “Software Metrics: A Rigorous and Practical Approach,” 2nd Edition, International Thomson Computer Press, London, 1997.
|
[15]
|
S. E. Keller, L. G. Khan and R. B. Panara, “Specifying Software Quality Requirements with Metrics,” In: R. H. Thayer and M. Dorfman, Eds., Tutorial: System and Software Requirements Engineering, IEEE Computer Society Press, Piscataway, 1990, pp. 145-163.
|
[16]
|
M. R. Lyu, “Handbook of Software Reliability Engineering,” McGraw-Hill, New York, 1996.
|
[17]
|
B. Boehm and H. In, “Identifying Quality-Requirement Conflicts,” IEEE Software Journal, Vol. 13, No. 2, 1996, pp. 25-35.
|
[18]
|
L. M. Cysneiros, J. C. S. P Leite and J. S. M. Neto, “A Framework for Integrating Non-Functional Requirements into Conceptual Models,” Requirements Engineering Journal, Vol. 6, No. 2, 2001, pp. 97-115.
|
[19]
|
T. G. Kirner and A. M. Davis, “Non-functional Requirements of Real-Time Systems,” Advances in Computers Journal, Vol. 42, No. 1, 1996, pp. 1-37.
|
[20]
|
D. Kardaras and B. Karakostas, “The Use of Fuzzy Cognitive Maps to Simulate the Information Systems Strategic Planning Process,” Information and Software Technology Journal, Vol. 41, No. 1, 1999, pp. 97-210.
|
[21]
|
B. Kosko, “Fuzzy Cognitive Maps,” International Journal on Man-Machine Studies, Vol. 24, No. 1, 1986, pp. 65-75.
|
[22]
|
J. Bezdek, “Fuzzy Models-What Are They, and Why,” IEEE Transactions on Fuzzy Systems, Vol. 1, No. 1, 1993, pp. 1-6.
|
[23]
|
R. Taber, “Knowledge Processing with Fuzzy Cognitive Maps,” Expert Systems with Applications Journal, Vol. 2, No. 1, 1991, pp. 83-87.
|
[24]
|
C. Okoli and S. Pawlowski, “The Delphi Method as a Research Tool: An Example, Design Considerations and Applications,” Information & Management, Vol. 42, No. 1, 2004, pp. 15-29.
|
[25]
|
N. Bryson, A. Mobolurin and A. Joseph, “Generating Consensus Fuzzy Cognitive Maps,” Intelligent Information Systems, Vol. 8, No. 10, 1997, pp. 231-235.
|
[26]
|
N. C. Dalkey and O. Helmer, “An Experimental Application of the Delphi Method to the User of Experts,” Management Science Journal, Vol. 9, No. 3, 1963, pp. 458- 467.
|
[27]
|
W. R. Zhang, S. S. Chen and J. C. Bezdek, “A Generic System for Cognitive Map Development and Decision Analysis,” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 19, No. 1, 1989, pp. 31-39.
|
[28]
|
W. R. Zhang, S. S. Chen, W. Wang and R. King, “A Cognitive-Map-Based Approach to The Coordination of Distributed Cooperative Agents,” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 22, No. 1, 1992, pp. 103-114.
|
[29]
|
G. J. Klir and B. Youan, “Fuzzy Sets and Fuzzy Logic, Theory and Applications,” Prentice Hall, India, 2005.
|