Author of the publication

PURA: A Product-and-User Oriented Approach for Requirement Analysis From Online Reviews.

, , , , , and . IEEE Syst. J., 16 (1): 566-577 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structural robustness of combat networks of weapon system-of-systems based on the operation loop., , , , and . Int. J. Systems Science, 48 (3): 659-674 (2017)A hybrid project portfolio selection procedure with historical performance consideration., , , , and . Expert Syst. Appl., (2020)BRBcast: A new approach to belief rule-based system parameter learning via extended causal strength logic., , , , and . Inf. Sci., (2018)High-end equipment: An improved two-sided based S&M matching and a novel Pareto refining method considering consistency., , , , and . Expert Syst. Appl., (2022)PURA: A Product-and-User Oriented Approach for Requirement Analysis From Online Reviews., , , , , and . IEEE Syst. J., 16 (1): 566-577 (2022)Aspect-based classification method for review spam detection., , , and . Multim. Tools Appl., 83 (7): 20931-20952 (2024)A product requirement development method based on multi-layer heterogeneous networks., , , , , and . Adv. Eng. Informatics, (October 2023)A product requirement influence analysis method based on multilayer dynamic heterogeneous networks., , , , , and . Adv. Eng. Informatics, (2024)A Novel Bi-level Programming Model for Capabilities-based Weapon System of Systems Planning., , , , and . ISCID (1), page 266-269. IEEE Computer Society, (2011)Behavioral Modeling of Attackers Based on Prospect Theory and Corresponding Defenders Strategy., , , , and . GDN, volume 315 of Lecture Notes in Business Information Processing, page 179-189. Springer, (2018)