Computer Science ›› 2020, Vol. 47 ›› Issue (12): 18-24.doi: 10.11896/jsjkx.201200055
Special Issue: Software Engineering & Requirements Engineering for Complex Systems
Previous Articles Next Articles
YANG Jing-wei1, WEI Zi-qi2, LIU Lin2
CLC Number:
[1] ECKERSON W.Predictive Analytics:Extending the Value ofYour Data Warehousing Investment,First Quarter 2007 TDWI Best Practices Report[R].2007.[2020-09-15]. [2] Grand View Research,Inc.,Predictive Analytics Market Size&Share,Industry Report,2019-2025[R].2019.[2020-09-15]. [3] KSHETRI N.Big Data's impact on privacy,security and consumer welfare[J].Telecommunications Policy,2014(38):1134-1145. [4] KING N,JESSEN P.Profiling the mobile customer-Privacy con-cerns when behavioural advertisers target mobile phones-part I[J].Computer Law &Security Review,2010,26(5):455-478. [5] KAMARINOU D,MILLARD C,SINGH J.Machine Learningwith Personal Data[R].Queen Mary School of Law Legal Studies Research paper No:247,2016. [6] ROTHCHILD J.Research Handbook on Electronic CommerceLaw[M].Edward Elgar Publishing,2016. [7] WEINSTEIN A,LEJOYEUX M.Internet addiction or excessive internet use[J].The American Journal of Drug and Alcohol Abuse,2010,36(5):277-283. [8] WANG X,KNEAREM T,GUI F,et al.The Safety Net of Aging in Place:Understanding How Older Adults Construct,Develop,and Maintain Their Social Circles[C]//Proc.12th EAI International Conference on Pervasive Computing Technologies for Healthcare.ACM Press,2018:191-200. [9] MOORE G.Crossing the Chasm,Harper Business Essentials[M].Harper Business Essentials,1991. [10] HAWS K,BEARDEN W.Dynamic pricing and consumer fairness perceptions[J].Journal of Consumer Research,2006,33(3):304-311. [11] EREVELLES S,FUKAWA N,SWAYNE L.Big Data consumer analytics and the transformation of marketing[J].Journal of Business Research,2016,69(2):897-904. [12] JIANG Z,BENBASAT I.Virtual Product Experience:Effects of Visual &Functionality Control of Products on Perceived Diagnosticity in Electronic Shopping[J].Journal of Management Information Systems,2004,21(3):111-147. [13] DAUGHERTY T,LI H,BIOCCA F.Experiential Ecommerce:A Summary of Research Investigating the Impact of Virtual Experience on Consumer Learning[J].Online Consumer Psychology,2005,25(7):568-586. [14] NAWAZ A,VVEINHARDT J,AHMED R.Impact of Word of Mouth on Consumer Buying Decision[J].European Journal of Business and Management,2014,6(31):394-403. [15] AL MANA A,MIRZ A A.The impact of electronic word ofmouth on consumers' purchasing decisions[J].International Journal of Computer Applications,2013,82:23-31. [16] HUANG Z,ZENG D,CHEN H.A comparative study of recommendation algorithms in e-commerce applications[J].IEEE Intelligent Systems,2007,22(5):68-78. [17] LEE J,SUN M,LEBANON G.Prea:Personalized recommendation algorithms toolkit[J].Journal of Machine Learning Research,2012,13:2699-2703. [18] XIE H,YANG J,CHANG C,et al.A Statistical Analysis Approach to Predict User's Changing Requirements for Software Service Evolution[J].Journal of Systems and Software,2017,132:147-164. [19] BHARATI P,CHAUDHURY A.An empirical investigation of decision-making satisfaction in web-based decision support systems[J].Decision Support Systems,2004,37(2):187-197. [20] DELONE W,MCLEAN E.The DeLone and McLean model of information systems success:A ten-year update[J].Journal of Management Information Systems,2003,19:9-30. [21] CHUNG L,NIXON B A,YU E,et al.Non-functional require-ments in software engineering[M].Springer Science+Business Media,2012. [22] ISO/IEC 25010.Systems and software engineering-Systems and software Quality Requirements and Evaluation (SQuaRE)-System and software quality models[S].2011. [23] WATSON H.Tutorial.Big data analytics:Concepts,technolo-gies,and applications[J].Communications of the Association for Information Systems,2014,34(1). [24] BAWDEN D,ROBINSON L.The dark side of information:overload,anxiety and other paradoxes and pathologies[J].Journal of Information Science,2009,35(2):180-191. [25] YU E.Towards modelling and reasoning support for early-phase requirements engineering[C]//3rd IEEE International Symposium on Requirements Engineering.1997. [26] VAN LAMSWEERDE A.Goal-Oriented Requirements Engi-neering:A Guided Tour[C]//5th IEEE International Symposium on Requirements Engineering.2001:249-263. [27] HOSONO S,HARA T,SHIMOMURAY,et al.Prioritizingservice functions with non-functional requirements[C]//CIRP Industrial Product-Service Systems Conference.2010:133-140. [28] PRUITT J,ADLIN T.The persona lifecycle:keeping people in mind throughout product design[M].Morgan Kaufmann Publishers Inc.,2010. [29] KLINE R.Principles and Practice of Structural Equation Modeling[M].Guilford Publications,2015. [30] HAIR J.Multivariate Data Analysis[M].Pearson Education,2010. [31] MYERS L,SIROIS M.Spearman Correlation Coefficients,Differences between[M]//Encyclopedia of Statistical Sciences.John Wiley &Sons Inc,2004. [32] WESTFALL P,YOUNG S.Resampling-based multiple testing:Examples and methods for p-value adjustment[M].Wiley-Interscience,1993. [33] ELAHI G,YU E.Comparing alternatives for analyzing requirements trade-offs-In the absence of numerical data[J].Information and Software Technology ,2012,54(6):517-530. |
[1] | ZHANG Ming-yang, WANG Gang, PENG Qi, ZHANG Yan-feng. Data Analysis of OpenReview [J]. Computer Science, 2021, 48(6): 63-70. |
[2] | DONG Si-qi, LI Hai-long, QU Yu-ben, ZHANG Zhao, HU Lei. Survey of Research on Computation Unloading Strategy in Mobile Edge Computing [J]. Computer Science, 2019, 46(11): 32-40. |
[3] | ZHOU Yang, XU Qing, LUO Xiang-yang, LIU Fen-lin, ZHANG Long and HU Xiao-fei. Research on Definition and Technological System of Cyberspace Surveying and Mapping [J]. Computer Science, 2018, 45(5): 1-4. |
[4] | FANG Chen, WANG Jin-dong and YU Zhi-yong. Web Service Selection Method Based on Dynamic QoS [J]. Computer Science, 2017, 44(5): 245-250. |
[5] | DAI Yi-ling, GU Dong-xiao, LU Wen-xing and LIANG Chang-yong. Hospital Information System Continuous Use of Patients:An Empirical Study Based on TAM and ECT [J]. Computer Science, 2016, 43(7): 240-244. |
[6] | CAO Dong, FU Cheng-yu and JIN Gang. Survey of Target Tracking Algorithms Based on Machine Learning [J]. Computer Science, 2016, 43(12): 1-7. |
[7] | HU Xian-jun, CHEN Jian-xin, ZHOU Sheng-qiang and CHENG Yi. Study on IEEE 802.15.4 Scheduling Algorithms for Real-time Communication [J]. Computer Science, 2015, 42(Z11): 222-226. |
[8] | CHENG Jia-lang,NI Wei,WU Wei-gang,CAO Jian-nong and LI Hong-jian. Survey on Vehicular Ad hoc Network Based Intelligent Transportation System [J]. Computer Science, 2014, 41(Z6): 1-10. |
[9] | KUANG Xiao-hui,XU Fei and LIU Li. Survey on Remote Code Update for Wireless Sensor Networks [J]. Computer Science, 2013, 40(Z6): 255-261. |
[10] | . Ant Colony Algorithm Combined with Survey Propagation for Satisfiability Problem [J]. Computer Science, 2012, 39(4): 227-231. |
[11] | WANG Bo,YE Xiao-hui,ZHAO Yu-ting,YAN Xue-li. Research on Clock Synchronization of Ad Hoc Networks:A Survey [J]. Computer Science, 2010, 37(5): 30-33. |
[12] | ZHANG Guo-yin,SUN Rui-hua,MA Chun-guang,ZHU Hua-min. Survey of Sensor Networks Key Management and Authentication [J]. Computer Science, 2010, 37(2): 1-6. |
[13] | XING Yi,YE Xin-ming,XIE Gao-gang. Conformance Test Selection Based on Availability [J]. Computer Science, 2009, 36(12): 132-137. |
[14] | WANG Heng-jun, WANG Ya-di HAN Ji-hong. Survey of Secure Clustering in Mobile Ad hoc Networks [J]. Computer Science, 2009, 36(10): 38-41. |
[15] | ZHOU Zhi-yu , CHEN Hao. Research and Survey on Algorithms of Blind Signal Separation Technology [J]. Computer Science, 2009, 36(10): 16-20. |
|