{"nodes": [{"id": "0", "name": "intellectual property"}, {"id": "1", "name": "natural language"}, {"id": "2", "name": "business model"}, {"id": "3", "name": "design patterns"}, {"id": "4", "name": "test report"}, {"id": "5", "name": "software quality assurance"}, {"id": "6", "name": "software engineer"}, {"id": "7", "name": "quality control"}, {"id": "8", "name": "amazon mechanical turk"}, {"id": "9", "name": "data collection"}, {"id": "10", "name": "requirements engineering"}, {"id": "11", "name": "crowdsourced data"}, {"id": "12", "name": "open innovation"}, {"id": "13", "name": "natural language processing"}, {"id": "14", "name": "object oriented"}, {"id": "15", "name": "decision support"}, {"id": "16", "name": "learning environment"}, {"id": "17", "name": "conceptual framework"}, {"id": "18", "name": "computational science"}, {"id": "19", "name": "configuration management"}, {"id": "20", "name": "information technology"}, {"id": "21", "name": "problem solving"}, {"id": "22", "name": "capability maturity model"}, {"id": "23", "name": "cloud based"}, {"id": "24", "name": "requirements analysis"}, {"id": "25", "name": "motivational factors"}, {"id": "26", "name": "business process"}, {"id": "27", "name": "social media"}, {"id": "28", "name": "computing elements"}, {"id": "29", "name": "cloud computing"}, {"id": "30", "name": "end users"}, {"id": "31", "name": "software development"}, {"id": "32", "name": "programming languages"}, {"id": "33", "name": "fundamental principles"}, {"id": "34", "name": "search engines"}, {"id": "35", "name": "multi agent"}, {"id": "36", "name": "open source"}, {"id": "37", "name": "controlled experiments"}, {"id": "38", "name": "systematic literature review"}, {"id": "39", "name": "team members"}, {"id": "40", "name": "knowledge management"}, {"id": "41", "name": "technology transfer"}, {"id": "42", "name": "quality assurance"}, {"id": "43", "name": "bloom's taxonomy"}, {"id": "44", "name": "empirical study"}, {"id": "45", "name": "spatial crowdsourcing"}, {"id": "46", "name": "empirical studies"}, {"id": "47", "name": "software maintenance"}, {"id": "48", "name": "chemical engineering"}, {"id": "49", "name": "cost estimation"}, {"id": "50", "name": "source code"}, {"id": "51", "name": "agile software development"}, {"id": "52", "name": "neural network"}, {"id": "53", "name": "big data"}, {"id": "54", "name": "software quality"}, {"id": "55", "name": "systems engineering"}, {"id": "56", "name": "formal methods"}, {"id": "57", "name": "human intelligence"}, {"id": "58", "name": "user interface"}, {"id": "59", "name": "bug reports"}, {"id": "60", "name": "collective intelligence"}, {"id": "61", "name": "extreme programming"}, {"id": "62", "name": "information processing"}, {"id": "63", "name": "petri nets"}, {"id": "64", "name": "undergraduate degree"}, {"id": "65", "name": "web search"}, {"id": "66", "name": "project management"}, {"id": "67", "name": "machine learning"}, {"id": "68", "name": "service oriented"}, {"id": "69", "name": "computational intelligence"}, {"id": "70", "name": "decision making"}, {"id": "71", "name": "software testing"}, {"id": "72", "name": "reverse engineering"}, {"id": "73", "name": "multi agent systems"}, {"id": "74", "name": "software architecture"}, {"id": "75", "name": "systematic review"}, {"id": "76", "name": "life cycle"}, {"id": "77", "name": "mechanical turk"}, {"id": "78", "name": "process improvement"}, {"id": "79", "name": "data management"}, {"id": "80", "name": "information systems"}, {"id": "81", "name": "carnegie mellon"}, {"id": "82", "name": "social network"}, {"id": "83", "name": "lessons learned"}, {"id": "84", "name": "human computation"}, {"id": "85", "name": "degree programs"}, {"id": "86", "name": "systematic mapping"}, {"id": "87", "name": "domain specific"}, {"id": "88", "name": "organizational learning"}, {"id": "89", "name": "knowledge graph"}, {"id": "90", "name": "incentive mechanism"}, {"id": "91", "name": "software design"}, {"id": "92", "name": "usability engineering"}, {"id": "93", "name": "literature review"}, {"id": "94", "name": "cultural heritage"}, {"id": "95", "name": "human factors"}, {"id": "96", "name": "open source software"}, {"id": "97", "name": "task assignment"}, {"id": "98", "name": "data mining"}, {"id": "99", "name": "requirements elicitation"}, {"id": "100", "name": "artificial intelligence"}, {"id": "101", "name": "software reuse"}, {"id": "102", "name": "product line"}, {"id": "103", "name": "knowledge base"}], "evolve_edges": [{"2000": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 1.0, "year": 2000}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 1.0, "year": 2000}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 1.0, "year": 2000}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2000}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2000}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 1.0, "year": 2000}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2000}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2000}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2000}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2000}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2000}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2000}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 1.0, "year": 2000}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 1.0, "year": 2000}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 1.0, "year": 2000}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 1.0, "year": 2000}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 1.0, "year": 2000}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 1.0, "year": 2000}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 1.0, "year": 2000}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 3.0, "year": 2000}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 1.0, "year": 2000}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 26.0, "year": 2000}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 1.0, "year": 2000}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 1.0, "year": 2000}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 1.0, "year": 2000}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 1.0, "year": 2000}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 1.0, "year": 2000}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 1.0, "year": 2000}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 1.0, "year": 2000}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 1.0, "year": 2000}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 1.0, "year": 2000}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 4.0, "year": 2000}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 2.0, "year": 2000}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 3.0, "year": 2000}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 1.0, "year": 2000}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 1.0, "year": 2000}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 2.0, "year": 2000}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 5.0, "year": 2000}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 2.0, "year": 2000}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 4.0, "year": 2000}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 4.0, "year": 2000}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 1.0, "year": 2000}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 2.0, "year": 2000}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 2.0, "year": 2000}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2000}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 7.0, "year": 2000}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 3.0, "year": 2000}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 3.0, "year": 2000}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 1.0, "year": 2000}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2000}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 1.0, "year": 2000}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2000}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 1.0, "year": 2000}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 1.0, "year": 2000}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2000}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 1.0, "year": 2000}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2000}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 1.0, "year": 2000}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2000}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 1.0, "year": 2000}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 1.0, "year": 2000}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 1.0, "year": 2000}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2000}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 2.0, "year": 2000}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2000}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 1.0, "year": 2000}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 1.0, "year": 2000}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2000}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2000}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2000}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 1.0, "year": 2000}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2000}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 1.0, "year": 2000}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 1.0, "year": 2000}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2000}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 1.0, "year": 2000}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 1.0, "year": 2000}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 1.0, "year": 2000}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2000}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 1.0, "year": 2000}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 1.0, "year": 2000}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 3.0, "year": 2000}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 1.0, "year": 2000}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 1.0, "year": 2000}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 2.0, "year": 2000}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 1.0, "year": 2000}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 3.0, "year": 2000}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 4.0, "year": 2000}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 2.0, "year": 2000}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 1.0, "year": 2000}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 1.0, "year": 2000}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2000}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2000}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2000}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2000}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 1.0, "year": 2000}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 1.0, "year": 2000}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2000}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 1.0, "year": 2000}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 1.0, "year": 2000}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2000}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2000}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 1.0, "year": 2000}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2000}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 1.0, "year": 2000}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2000}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2000}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2000}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2000}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 1.0, "year": 2000}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2000}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 1.0, "year": 2000}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2000}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2000}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 1.0, "year": 2000}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2000}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2000}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2000}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2000}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2000}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 1.0, "year": 2000}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 1.0, "year": 2000}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 1.0, "year": 2000}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 1.0, "year": 2000}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 1.0, "year": 2000}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2000}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2000}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 1.0, "year": 2000}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 1.0, "year": 2000}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 1.0, "year": 2000}]}, {"2001": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 2.0, "year": 2001}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2001}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 1.0, "year": 2001}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 1.0, "year": 2001}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 1.0, "year": 2001}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2001}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2001}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 1.0, "year": 2001}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2001}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2001}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2001}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2001}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2001}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2001}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 1.0, "year": 2001}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 1.0, "year": 2001}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 1.0, "year": 2001}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 2.0, "year": 2001}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 2.0, "year": 2001}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 1.0, "year": 2001}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 4.0, "year": 2001}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 1.0, "year": 2001}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 2.0, "year": 2001}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 6.0, "year": 2001}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 3.0, "year": 2001}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 48.0, "year": 2001}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 1.0, "year": 2001}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 1.0, "year": 2001}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 3.0, "year": 2001}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 1.0, "year": 2001}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 1.0, "year": 2001}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 2.0, "year": 2001}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 1.0, "year": 2001}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 2.0, "year": 2001}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2001}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 1.0, "year": 2001}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 1.0, "year": 2001}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 1.0, "year": 2001}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 1.0, "year": 2001}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 8.0, "year": 2001}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 2.0, "year": 2001}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 3.0, "year": 2001}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 1.0, "year": 2001}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 2.0, "year": 2001}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 1.0, "year": 2001}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 3.0, "year": 2001}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 6.0, "year": 2001}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 1.0, "year": 2001}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 2.0, "year": 2001}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 1.0, "year": 2001}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 6.0, "year": 2001}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 4.0, "year": 2001}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 4.0, "year": 2001}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 1.0, "year": 2001}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 1.0, "year": 2001}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 4.0, "year": 2001}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 3.0, "year": 2001}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 1.0, "year": 2001}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2001}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 8.0, "year": 2001}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 2.0, "year": 2001}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 1.0, "year": 2001}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 1.0, "year": 2001}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 3.0, "year": 2001}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 3.0, "year": 2001}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 2.0, "year": 2001}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2001}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 1.0, "year": 2001}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2001}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2001}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2001}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 1.0, "year": 2001}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2001}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 3.0, "year": 2001}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 1.0, "year": 2001}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2001}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 1.0, "year": 2001}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2001}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 1.0, "year": 2001}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2001}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 1.0, "year": 2001}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 1.0, "year": 2001}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 1.0, "year": 2001}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 2.0, "year": 2001}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2001}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 3.0, "year": 2001}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2001}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 1.0, "year": 2001}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 1.0, "year": 2001}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2001}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2001}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2001}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 1.0, "year": 2001}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2001}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 1.0, "year": 2001}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 1.0, "year": 2001}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2001}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 1.0, "year": 2001}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 1.0, "year": 2001}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 2.0, "year": 2001}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 1.0, "year": 2001}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2001}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 1.0, "year": 2001}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 1.0, "year": 2001}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 3.0, "year": 2001}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 1.0, "year": 2001}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 1.0, "year": 2001}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 1.0, "year": 2001}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 2.0, "year": 2001}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 1.0, "year": 2001}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 1.0, "year": 2001}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 3.0, "year": 2001}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 2.0, "year": 2001}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 1.0, "year": 2001}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 4.0, "year": 2001}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 2.0, "year": 2001}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 1.0, "year": 2001}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 2.0, "year": 2001}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 1.0, "year": 2001}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 1.0, "year": 2001}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 1.0, "year": 2001}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2001}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2001}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2001}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2001}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 1.0, "year": 2001}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 1.0, "year": 2001}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2001}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 1.0, "year": 2001}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 1.0, "year": 2001}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2001}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2001}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 1.0, "year": 2001}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 1.0, "year": 2001}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2001}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 1.0, "year": 2001}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2001}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2001}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2001}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2001}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 1.0, "year": 2001}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2001}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2001}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 2.0, "year": 2001}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 1.0, "year": 2001}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 1.0, "year": 2001}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2001}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2001}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 1.0, "year": 2001}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2001}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2001}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2001}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2001}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2001}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 1.0, "year": 2001}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 1.0, "year": 2001}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 1.0, "year": 2001}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 1.0, "year": 2001}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 1.0, "year": 2001}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2001}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2001}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 1.0, "year": 2001}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 1.0, "year": 2001}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2001}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 1.0, "year": 2001}]}, {"2002": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 2.0, "year": 2002}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2002}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 1.0, "year": 2002}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 1.0, "year": 2002}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 1.0, "year": 2002}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2002}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2002}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 1.0, "year": 2002}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2002}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2002}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2002}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2002}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2002}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2002}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 1.0, "year": 2002}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 1.0, "year": 2002}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 3.0, "year": 2002}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2002}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 1.0, "year": 2002}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2002}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 1.0, "year": 2002}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 1.0, "year": 2002}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2002}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 1.0, "year": 2002}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 1.0, "year": 2002}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 1.0, "year": 2002}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 4.0, "year": 2002}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 2.0, "year": 2002}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 3.0, "year": 2002}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 2.0, "year": 2002}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 1.0, "year": 2002}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 8.0, "year": 2002}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 2.0, "year": 2002}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 3.0, "year": 2002}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 8.0, "year": 2002}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 5.0, "year": 2002}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 1.0, "year": 2002}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 1.0, "year": 2002}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 76.0, "year": 2002}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 4.0, "year": 2002}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 3.0, "year": 2002}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 1.0, "year": 2002}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 3.0, "year": 2002}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 2.0, "year": 2002}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 1.0, "year": 2002}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 2.0, "year": 2002}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 3.0, "year": 2002}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 3.0, "year": 2002}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2002}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 5.0, "year": 2002}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 1.0, "year": 2002}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 2.0, "year": 2002}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 7.0, "year": 2002}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 11.0, "year": 2002}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 4.0, "year": 2002}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 1.0, "year": 2002}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 5.0, "year": 2002}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 4.0, "year": 2002}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 5.0, "year": 2002}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 2.0, "year": 2002}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 4.0, "year": 2002}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 7.0, "year": 2002}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 2.0, "year": 2002}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 1.0, "year": 2002}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 5.0, "year": 2002}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 2.0, "year": 2002}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 10.0, "year": 2002}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 5.0, "year": 2002}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 4.0, "year": 2002}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 1.0, "year": 2002}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 2.0, "year": 2002}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 7.0, "year": 2002}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 5.0, "year": 2002}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 1.0, "year": 2002}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2002}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 10.0, "year": 2002}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 2.0, "year": 2002}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 2.0, "year": 2002}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 1.0, "year": 2002}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 2.0, "year": 2002}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 1.0, "year": 2002}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 5.0, "year": 2002}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 5.0, "year": 2002}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2002}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2002}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 2.0, "year": 2002}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2002}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2002}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 2.0, "year": 2002}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 1.0, "year": 2002}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 2.0, "year": 2002}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2002}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2002}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 2.0, "year": 2002}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2002}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2002}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2002}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2002}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 1.0, "year": 2002}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2002}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 1.0, "year": 2002}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2002}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 1.0, "year": 2002}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2002}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2002}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2002}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2002}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2002}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2002}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 3.0, "year": 2002}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2002}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 2.0, "year": 2002}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2002}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2002}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 1.0, "year": 2002}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2002}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2002}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 1.0, "year": 2002}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2002}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 2.0, "year": 2002}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 3.0, "year": 2002}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 1.0, "year": 2002}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 2.0, "year": 2002}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2002}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 1.0, "year": 2002}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 1.0, "year": 2002}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2002}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 1.0, "year": 2002}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2002}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2002}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2002}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2002}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 1.0, "year": 2002}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2002}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 3.0, "year": 2002}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2002}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 1.0, "year": 2002}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2002}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 1.0, "year": 2002}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 1.0, "year": 2002}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 1.0, "year": 2002}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2002}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2002}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2002}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2002}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 1.0, "year": 2002}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2002}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 2.0, "year": 2002}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 2.0, "year": 2002}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 1.0, "year": 2002}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 1.0, "year": 2002}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2002}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 1.0, "year": 2002}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 1.0, "year": 2002}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 1.0, "year": 2002}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 1.0, "year": 2002}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 1.0, "year": 2002}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 1.0, "year": 2002}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 3.0, "year": 2002}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 1.0, "year": 2002}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 1.0, "year": 2002}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2002}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 3.0, "year": 2002}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 3.0, "year": 2002}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 2.0, "year": 2002}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 1.0, "year": 2002}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 5.0, "year": 2002}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 3.0, "year": 2002}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2002}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 1.0, "year": 2002}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 1.0, "year": 2002}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 2.0, "year": 2002}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2002}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 2.0, "year": 2002}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 2.0, "year": 2002}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 3.0, "year": 2002}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 3.0, "year": 2002}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 1.0, "year": 2002}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 1.0, "year": 2002}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 6.0, "year": 2002}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 2.0, "year": 2002}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 1.0, "year": 2002}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 2.0, "year": 2002}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 1.0, "year": 2002}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 3.0, "year": 2002}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 1.0, "year": 2002}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2002}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2002}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2002}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2002}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2002}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2002}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 1.0, "year": 2002}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 1.0, "year": 2002}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2002}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2002}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2002}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2002}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 1.0, "year": 2002}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 1.0, "year": 2002}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2002}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 1.0, "year": 2002}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2002}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 1.0, "year": 2002}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 1.0, "year": 2002}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2002}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2002}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2002}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2002}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 2.0, "year": 2002}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 2.0, "year": 2002}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 1.0, "year": 2002}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2002}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2002}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2002}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2002}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2002}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 1.0, "year": 2002}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2002}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 1.0, "year": 2002}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2002}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2002}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2002}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2002}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2002}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2002}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2002}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 1.0, "year": 2002}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 1.0, "year": 2002}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2002}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2002}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2002}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 2.0, "year": 2002}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2002}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 2.0, "year": 2002}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2002}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2002}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2002}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 2.0, "year": 2002}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 1.0, "year": 2002}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 1.0, "year": 2002}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 2.0, "year": 2002}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2002}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 1.0, "year": 2002}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 1.0, "year": 2002}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2002}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2002}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2002}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2002}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2002}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2002}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 2.0, "year": 2002}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2002}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 1.0, "year": 2002}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2002}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 1.0, "year": 2002}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2002}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2002}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2002}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2002}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2002}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2002}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 1.0, "year": 2002}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 2.0, "year": 2002}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 1.0, "year": 2002}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2002}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2002}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2002}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 1.0, "year": 2002}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 1.0, "year": 2002}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 2.0, "year": 2002}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 1.0, "year": 2002}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 1.0, "year": 2002}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2002}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2002}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 1.0, "year": 2002}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 1.0, "year": 2002}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2002}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2002}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 2.0, "year": 2002}]}, {"2003": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 2.0, "year": 2003}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2003}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 1.0, "year": 2003}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 1.0, "year": 2003}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 2.0, "year": 2003}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2003}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2003}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 1.0, "year": 2003}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2003}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2003}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2003}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2003}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2003}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2003}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 2.0, "year": 2003}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 2.0, "year": 2003}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 5.0, "year": 2003}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2003}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 1.0, "year": 2003}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2003}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 3.0, "year": 2003}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2003}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 2.0, "year": 2003}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2003}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 2.0, "year": 2003}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 1.0, "year": 2003}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2003}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 4.0, "year": 2003}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 3.0, "year": 2003}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 5.0, "year": 2003}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 2.0, "year": 2003}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 2.0, "year": 2003}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 8.0, "year": 2003}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 4.0, "year": 2003}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 3.0, "year": 2003}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 10.0, "year": 2003}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 8.0, "year": 2003}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 1.0, "year": 2003}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 1.0, "year": 2003}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 103.0, "year": 2003}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 7.0, "year": 2003}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 4.0, "year": 2003}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 2.0, "year": 2003}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 3.0, "year": 2003}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 5.0, "year": 2003}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 2.0, "year": 2003}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 3.0, "year": 2003}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 5.0, "year": 2003}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 7.0, "year": 2003}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2003}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 8.0, "year": 2003}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 3.0, "year": 2003}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 2.0, "year": 2003}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 2.0, "year": 2003}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 13.0, "year": 2003}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 13.0, "year": 2003}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 5.0, "year": 2003}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 1.0, "year": 2003}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 5.0, "year": 2003}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 5.0, "year": 2003}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 5.0, "year": 2003}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 3.0, "year": 2003}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 5.0, "year": 2003}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 9.0, "year": 2003}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 4.0, "year": 2003}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 2.0, "year": 2003}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 6.0, "year": 2003}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 6.0, "year": 2003}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 10.0, "year": 2003}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 6.0, "year": 2003}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 6.0, "year": 2003}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 3.0, "year": 2003}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 4.0, "year": 2003}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 11.0, "year": 2003}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 5.0, "year": 2003}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 1.0, "year": 2003}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2003}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 16.0, "year": 2003}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 4.0, "year": 2003}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 2.0, "year": 2003}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 1.0, "year": 2003}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 1.0, "year": 2003}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 2.0, "year": 2003}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 1.0, "year": 2003}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 7.0, "year": 2003}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 6.0, "year": 2003}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 2.0, "year": 2003}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2003}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2003}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 2.0, "year": 2003}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2003}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2003}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 2.0, "year": 2003}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 1.0, "year": 2003}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 2.0, "year": 2003}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2003}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2003}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 3.0, "year": 2003}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2003}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2003}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2003}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2003}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2003}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 1.0, "year": 2003}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2003}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 1.0, "year": 2003}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2003}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2003}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2003}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2003}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2003}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2003}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 1.0, "year": 2003}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2003}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2003}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2003}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2003}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 1.0, "year": 2003}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2003}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2003}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2003}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 3.0, "year": 2003}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2003}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 2.0, "year": 2003}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2003}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2003}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 1.0, "year": 2003}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2003}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2003}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 1.0, "year": 2003}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2003}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 2.0, "year": 2003}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 3.0, "year": 2003}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 1.0, "year": 2003}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 2.0, "year": 2003}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2003}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 1.0, "year": 2003}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 1.0, "year": 2003}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2003}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 1.0, "year": 2003}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 1.0, "year": 2003}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2003}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2003}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2003}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2003}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 1.0, "year": 2003}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 1.0, "year": 2003}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2003}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 4.0, "year": 2003}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2003}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 1.0, "year": 2003}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2003}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2003}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 1.0, "year": 2003}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 1.0, "year": 2003}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 2.0, "year": 2003}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 4.0, "year": 2003}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2003}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2003}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2003}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2003}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2003}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 1.0, "year": 2003}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2003}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 2.0, "year": 2003}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 2.0, "year": 2003}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 1.0, "year": 2003}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 1.0, "year": 2003}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2003}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 1.0, "year": 2003}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 2.0, "year": 2003}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 1.0, "year": 2003}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 1.0, "year": 2003}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 1.0, "year": 2003}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2003}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2003}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 1.0, "year": 2003}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 3.0, "year": 2003}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 4.0, "year": 2003}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 1.0, "year": 2003}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 3.0, "year": 2003}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2003}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 4.0, "year": 2003}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 3.0, "year": 2003}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 2.0, "year": 2003}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 1.0, "year": 2003}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 5.0, "year": 2003}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 4.0, "year": 2003}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2003}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 1.0, "year": 2003}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 1.0, "year": 2003}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 3.0, "year": 2003}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2003}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 2.0, "year": 2003}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 2.0, "year": 2003}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 3.0, "year": 2003}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 4.0, "year": 2003}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 2.0, "year": 2003}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 2.0, "year": 2003}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 1.0, "year": 2003}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 3.0, "year": 2003}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 9.0, "year": 2003}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 3.0, "year": 2003}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 1.0, "year": 2003}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 1.0, "year": 2003}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 2.0, "year": 2003}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 1.0, "year": 2003}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 3.0, "year": 2003}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 2.0, "year": 2003}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2003}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2003}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2003}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2003}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2003}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2003}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2003}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 1.0, "year": 2003}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2003}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 1.0, "year": 2003}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 1.0, "year": 2003}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2003}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2003}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2003}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2003}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2003}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 1.0, "year": 2003}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 1.0, "year": 2003}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2003}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 1.0, "year": 2003}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2003}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 3.0, "year": 2003}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 2.0, "year": 2003}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2003}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2003}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2003}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2003}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 2.0, "year": 2003}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 5.0, "year": 2003}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 1.0, "year": 2003}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2003}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 1.0, "year": 2003}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2003}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2003}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2003}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2003}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 1.0, "year": 2003}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2003}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 1.0, "year": 2003}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2003}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2003}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2003}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2003}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2003}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2003}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2003}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 4.0, "year": 2003}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2003}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 2.0, "year": 2003}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2003}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 1.0, "year": 2003}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 1.0, "year": 2003}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 1.0, "year": 2003}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2003}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 1.0, "year": 2003}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2003}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 2.0, "year": 2003}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2003}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 1.0, "year": 2003}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 2.0, "year": 2003}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2003}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2003}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2003}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 2.0, "year": 2003}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 1.0, "year": 2003}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 1.0, "year": 2003}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 2.0, "year": 2003}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2003}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2003}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 1.0, "year": 2003}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 1.0, "year": 2003}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2003}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2003}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2003}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2003}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2003}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2003}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 2.0, "year": 2003}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2003}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 1.0, "year": 2003}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2003}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 1.0, "year": 2003}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2003}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2003}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2003}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2003}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2003}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2003}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2003}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2003}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 1.0, "year": 2003}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 2.0, "year": 2003}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2003}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 1.0, "year": 2003}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2003}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2003}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2003}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 1.0, "year": 2003}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 2.0, "year": 2003}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 2.0, "year": 2003}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 1.0, "year": 2003}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 2.0, "year": 2003}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 1.0, "year": 2003}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 1.0, "year": 2003}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 1.0, "year": 2003}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 1.0, "year": 2003}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 1.0, "year": 2003}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 1.0, "year": 2003}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 1.0, "year": 2003}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2003}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2003}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 1.0, "year": 2003}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 1.0, "year": 2003}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2003}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2003}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 2.0, "year": 2003}]}, {"2004": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 2.0, "year": 2004}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2004}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 1.0, "year": 2004}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 1.0, "year": 2004}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 1.0, "year": 2004}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 3.0, "year": 2004}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2004}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2004}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 1.0, "year": 2004}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2004}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2004}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2004}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2004}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2004}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2004}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 2.0, "year": 2004}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 2.0, "year": 2004}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 5.0, "year": 2004}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2004}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 1.0, "year": 2004}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2004}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 3.0, "year": 2004}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2004}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 2.0, "year": 2004}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2004}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 2.0, "year": 2004}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 1.0, "year": 2004}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2004}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 4.0, "year": 2004}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 4.0, "year": 2004}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 7.0, "year": 2004}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 4.0, "year": 2004}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 2.0, "year": 2004}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 8.0, "year": 2004}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 5.0, "year": 2004}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 4.0, "year": 2004}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 10.0, "year": 2004}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 8.0, "year": 2004}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 1.0, "year": 2004}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 1.0, "year": 2004}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 130.0, "year": 2004}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 8.0, "year": 2004}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2004}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 4.0, "year": 2004}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 2.0, "year": 2004}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 4.0, "year": 2004}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 7.0, "year": 2004}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 2.0, "year": 2004}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 5.0, "year": 2004}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 5.0, "year": 2004}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 9.0, "year": 2004}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2004}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 8.0, "year": 2004}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 5.0, "year": 2004}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 2.0, "year": 2004}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 2.0, "year": 2004}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 17.0, "year": 2004}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 14.0, "year": 2004}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 6.0, "year": 2004}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 1.0, "year": 2004}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 6.0, "year": 2004}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 5.0, "year": 2004}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 5.0, "year": 2004}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2004}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 5.0, "year": 2004}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 11.0, "year": 2004}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 1.0, "year": 2004}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 5.0, "year": 2004}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 2.0, "year": 2004}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 6.0, "year": 2004}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 7.0, "year": 2004}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 14.0, "year": 2004}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 9.0, "year": 2004}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 7.0, "year": 2004}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 5.0, "year": 2004}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 4.0, "year": 2004}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 12.0, "year": 2004}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 6.0, "year": 2004}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 2.0, "year": 2004}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2004}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 19.0, "year": 2004}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 4.0, "year": 2004}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 1.0, "year": 2004}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 4.0, "year": 2004}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 1.0, "year": 2004}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 4.0, "year": 2004}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 2.0, "year": 2004}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 3.0, "year": 2004}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 7.0, "year": 2004}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 8.0, "year": 2004}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 4.0, "year": 2004}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2004}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2004}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 2.0, "year": 2004}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2004}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2004}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 2.0, "year": 2004}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 1.0, "year": 2004}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 2.0, "year": 2004}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2004}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2004}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 5.0, "year": 2004}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2004}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2004}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 1.0, "year": 2004}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2004}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2004}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 1.0, "year": 2004}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2004}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2004}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2004}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 2.0, "year": 2004}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2004}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2004}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2004}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2004}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2004}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2004}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2004}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2004}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2004}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 1.0, "year": 2004}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2004}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2004}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2004}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2004}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 1.0, "year": 2004}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2004}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2004}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2004}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 3.0, "year": 2004}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2004}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 2.0, "year": 2004}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2004}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2004}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 1.0, "year": 2004}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2004}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2004}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 1.0, "year": 2004}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2004}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 2.0, "year": 2004}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 3.0, "year": 2004}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 1.0, "year": 2004}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 2.0, "year": 2004}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2004}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 1.0, "year": 2004}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 1.0, "year": 2004}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2004}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 1.0, "year": 2004}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 1.0, "year": 2004}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2004}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2004}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2004}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2004}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2004}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 1.0, "year": 2004}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2004}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 2.0, "year": 2004}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2004}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2004}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 4.0, "year": 2004}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2004}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 1.0, "year": 2004}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2004}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2004}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 1.0, "year": 2004}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 1.0, "year": 2004}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 2.0, "year": 2004}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 4.0, "year": 2004}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2004}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2004}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2004}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2004}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2004}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 1.0, "year": 2004}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2004}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 2.0, "year": 2004}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 2.0, "year": 2004}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 1.0, "year": 2004}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 1.0, "year": 2004}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2004}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 1.0, "year": 2004}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 3.0, "year": 2004}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2004}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 1.0, "year": 2004}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 1.0, "year": 2004}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 2.0, "year": 2004}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2004}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2004}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 2.0, "year": 2004}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 5.0, "year": 2004}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 4.0, "year": 2004}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 2.0, "year": 2004}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 3.0, "year": 2004}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2004}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 7.0, "year": 2004}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 3.0, "year": 2004}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 3.0, "year": 2004}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 1.0, "year": 2004}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 6.0, "year": 2004}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 4.0, "year": 2004}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2004}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2004}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 1.0, "year": 2004}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 3.0, "year": 2004}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2004}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 2.0, "year": 2004}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 2.0, "year": 2004}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 4.0, "year": 2004}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 5.0, "year": 2004}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 3.0, "year": 2004}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 3.0, "year": 2004}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 1.0, "year": 2004}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 3.0, "year": 2004}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 10.0, "year": 2004}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 3.0, "year": 2004}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 1.0, "year": 2004}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 3.0, "year": 2004}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 2.0, "year": 2004}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 2.0, "year": 2004}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 1.0, "year": 2004}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 3.0, "year": 2004}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 3.0, "year": 2004}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2004}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2004}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2004}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2004}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2004}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2004}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2004}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 1.0, "year": 2004}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2004}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 2.0, "year": 2004}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2004}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2004}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2004}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2004}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2004}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2004}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2004}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2004}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 1.0, "year": 2004}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2004}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2004}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 1.0, "year": 2004}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 1.0, "year": 2004}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2004}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 1.0, "year": 2004}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2004}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 4.0, "year": 2004}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 2.0, "year": 2004}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2004}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2004}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2004}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2004}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 2.0, "year": 2004}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 5.0, "year": 2004}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 1.0, "year": 2004}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2004}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 1.0, "year": 2004}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2004}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2004}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2004}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2004}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 1.0, "year": 2004}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2004}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 1.0, "year": 2004}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2004}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2004}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2004}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2004}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2004}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2004}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2004}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 4.0, "year": 2004}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2004}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 2.0, "year": 2004}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2004}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 1.0, "year": 2004}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 1.0, "year": 2004}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 1.0, "year": 2004}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2004}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 1.0, "year": 2004}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 1.0, "year": 2004}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2004}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 2.0, "year": 2004}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2004}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 1.0, "year": 2004}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 2.0, "year": 2004}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2004}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 1.0, "year": 2004}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2004}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2004}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 1.0, "year": 2004}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2004}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 2.0, "year": 2004}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 1.0, "year": 2004}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 2.0, "year": 2004}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 2.0, "year": 2004}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2004}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2004}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 1.0, "year": 2004}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 1.0, "year": 2004}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2004}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2004}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2004}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2004}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2004}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2004}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 2.0, "year": 2004}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2004}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 1.0, "year": 2004}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 2.0, "year": 2004}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2004}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 1.0, "year": 2004}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2004}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2004}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2004}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2004}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2004}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2004}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2004}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2004}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 1.0, "year": 2004}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2004}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 1.0, "year": 2004}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 2.0, "year": 2004}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2004}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 1.0, "year": 2004}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2004}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 1.0, "year": 2004}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 1.0, "year": 2004}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 2.0, "year": 2004}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2004}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2004}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 1.0, "year": 2004}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 2.0, "year": 2004}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 2.0, "year": 2004}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 1.0, "year": 2004}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2004}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 2.0, "year": 2004}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 1.0, "year": 2004}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 1.0, "year": 2004}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 1.0, "year": 2004}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 3.0, "year": 2004}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 1.0, "year": 2004}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 2.0, "year": 2004}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2004}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 1.0, "year": 2004}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2004}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2004}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2004}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2004}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2004}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 1.0, "year": 2004}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 1.0, "year": 2004}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2004}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2004}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2004}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 2.0, "year": 2004}]}, {"2005": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 2.0, "year": 2005}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2005}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2005}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 1.0, "year": 2005}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 2.0, "year": 2005}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 1.0, "year": 2005}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 1.0, "year": 2005}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2005}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 2.0, "year": 2005}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 1.0, "year": 2005}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2005}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2005}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2005}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 3.0, "year": 2005}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2005}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2005}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 1.0, "year": 2005}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2005}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2005}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2005}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2005}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2005}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 2.0, "year": 2005}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 2.0, "year": 2005}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 6.0, "year": 2005}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2005}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 1.0, "year": 2005}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2005}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 3.0, "year": 2005}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2005}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2005}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2005}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 2.0, "year": 2005}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2005}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2005}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 2.0, "year": 2005}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2005}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2005}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2005}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 4.0, "year": 2005}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 2.0, "year": 2005}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 7.0, "year": 2005}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 7.0, "year": 2005}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 4.0, "year": 2005}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 2.0, "year": 2005}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 9.0, "year": 2005}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 7.0, "year": 2005}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 6.0, "year": 2005}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 14.0, "year": 2005}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 10.0, "year": 2005}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 1.0, "year": 2005}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 1.0, "year": 2005}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 155.0, "year": 2005}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 8.0, "year": 2005}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 1.0, "year": 2005}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2005}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 7.0, "year": 2005}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 3.0, "year": 2005}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 5.0, "year": 2005}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 7.0, "year": 2005}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 2.0, "year": 2005}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 5.0, "year": 2005}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 5.0, "year": 2005}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 11.0, "year": 2005}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2005}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 8.0, "year": 2005}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 6.0, "year": 2005}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 4.0, "year": 2005}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2005}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 18.0, "year": 2005}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 18.0, "year": 2005}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 9.0, "year": 2005}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 1.0, "year": 2005}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 7.0, "year": 2005}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 6.0, "year": 2005}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2005}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2005}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 7.0, "year": 2005}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 17.0, "year": 2005}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 2.0, "year": 2005}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2005}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 3.0, "year": 2005}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 9.0, "year": 2005}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 10.0, "year": 2005}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 15.0, "year": 2005}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 14.0, "year": 2005}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 9.0, "year": 2005}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 5.0, "year": 2005}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 7.0, "year": 2005}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 13.0, "year": 2005}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 6.0, "year": 2005}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 2.0, "year": 2005}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2005}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 25.0, "year": 2005}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 5.0, "year": 2005}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 1.0, "year": 2005}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 5.0, "year": 2005}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 2.0, "year": 2005}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 5.0, "year": 2005}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 2.0, "year": 2005}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 5.0, "year": 2005}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 7.0, "year": 2005}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 8.0, "year": 2005}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 4.0, "year": 2005}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2005}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2005}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 2.0, "year": 2005}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2005}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2005}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 2.0, "year": 2005}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 1.0, "year": 2005}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 2.0, "year": 2005}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2005}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2005}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2005}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2005}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2005}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2005}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2005}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2005}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2005}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2005}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 1.0, "year": 2005}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2005}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 6.0, "year": 2005}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2005}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2005}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2005}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 1.0, "year": 2005}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2005}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 1.0, "year": 2005}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2005}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 1.0, "year": 2005}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2005}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 1.0, "year": 2005}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2005}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 1.0, "year": 2005}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2005}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2005}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2005}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 2.0, "year": 2005}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2005}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2005}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2005}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2005}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2005}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2005}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2005}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2005}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2005}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 1.0, "year": 2005}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2005}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2005}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2005}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2005}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 1.0, "year": 2005}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2005}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2005}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2005}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2005}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 3.0, "year": 2005}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2005}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2005}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 2.0, "year": 2005}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2005}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2005}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 1.0, "year": 2005}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2005}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2005}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2005}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2005}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2005}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 3.0, "year": 2005}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 1.0, "year": 2005}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 2.0, "year": 2005}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2005}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 2.0, "year": 2005}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2005}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2005}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 1.0, "year": 2005}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2005}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2005}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2005}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2005}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2005}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2005}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2005}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2005}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2005}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2005}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 4.0, "year": 2005}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 1.0, "year": 2005}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2005}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2005}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2005}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 1.0, "year": 2005}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 1.0, "year": 2005}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 6.0, "year": 2005}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2005}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2005}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2005}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2005}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 1.0, "year": 2005}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2005}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 1.0, "year": 2005}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2005}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2005}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 1.0, "year": 2005}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2005}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2005}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2005}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 4.0, "year": 2005}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2005}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2005}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2005}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2005}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2005}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2005}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2005}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 2.0, "year": 2005}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2005}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2005}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 1.0, "year": 2005}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 1.0, "year": 2005}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2005}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 1.0, "year": 2005}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 3.0, "year": 2005}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2005}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 3.0, "year": 2005}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 1.0, "year": 2005}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 2.0, "year": 2005}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2005}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2005}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 2.0, "year": 2005}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 6.0, "year": 2005}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 4.0, "year": 2005}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 2.0, "year": 2005}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 5.0, "year": 2005}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2005}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 8.0, "year": 2005}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 4.0, "year": 2005}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 5.0, "year": 2005}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 1.0, "year": 2005}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 6.0, "year": 2005}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 4.0, "year": 2005}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2005}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2005}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 1.0, "year": 2005}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 5.0, "year": 2005}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2005}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 2.0, "year": 2005}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 3.0, "year": 2005}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 5.0, "year": 2005}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 8.0, "year": 2005}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 5.0, "year": 2005}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 3.0, "year": 2005}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2005}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 3.0, "year": 2005}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 12.0, "year": 2005}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 4.0, "year": 2005}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 1.0, "year": 2005}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 4.0, "year": 2005}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 1.0, "year": 2005}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 2.0, "year": 2005}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 2.0, "year": 2005}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 2.0, "year": 2005}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 3.0, "year": 2005}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 3.0, "year": 2005}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2005}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2005}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2005}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2005}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2005}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2005}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2005}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2005}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2005}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2005}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 1.0, "year": 2005}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2005}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 2.0, "year": 2005}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2005}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 3.0, "year": 2005}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2005}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2005}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2005}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2005}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2005}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2005}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2005}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2005}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 1.0, "year": 2005}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2005}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2005}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 1.0, "year": 2005}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2005}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 1.0, "year": 2005}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2005}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 4.0, "year": 2005}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 2.0, "year": 2005}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2005}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2005}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2005}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2005}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 2.0, "year": 2005}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 5.0, "year": 2005}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 2.0, "year": 2005}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2005}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 1.0, "year": 2005}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2005}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2005}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2005}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2005}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2005}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 1.0, "year": 2005}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2005}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2005}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2005}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2005}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2005}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2005}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 5.0, "year": 2005}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 2.0, "year": 2005}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2005}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 1.0, "year": 2005}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 2.0, "year": 2005}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2005}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2005}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2005}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 1.0, "year": 2005}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 1.0, "year": 2005}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2005}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 2.0, "year": 2005}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2005}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2005}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2005}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 3.0, "year": 2005}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2005}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 1.0, "year": 2005}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2005}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2005}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 1.0, "year": 2005}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2005}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2005}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2005}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 2.0, "year": 2005}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2005}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 2.0, "year": 2005}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 3.0, "year": 2005}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2005}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 1.0, "year": 2005}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2005}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 2.0, "year": 2005}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2005}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2005}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2005}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2005}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2005}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2005}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2005}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2005}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2005}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 2.0, "year": 2005}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2005}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 1.0, "year": 2005}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2005}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2005}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2005}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2005}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2005}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2005}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 1.0, "year": 2005}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2005}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 1.0, "year": 2005}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 2.0, "year": 2005}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 2.0, "year": 2005}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2005}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2005}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 1.0, "year": 2005}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2005}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2005}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2005}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 1.0, "year": 2005}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 1.0, "year": 2005}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 2.0, "year": 2005}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2005}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2005}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2005}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2005}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2005}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 1.0, "year": 2005}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 2.0, "year": 2005}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2005}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 2.0, "year": 2005}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2005}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 1.0, "year": 2005}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2005}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 2.0, "year": 2005}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2005}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 1.0, "year": 2005}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 1.0, "year": 2005}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 1.0, "year": 2005}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 3.0, "year": 2005}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2005}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 3.0, "year": 2005}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2005}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2005}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2005}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2005}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2005}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2005}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2005}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2005}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2005}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2005}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 1.0, "year": 2005}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 1.0, "year": 2005}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2005}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2005}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2005}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2005}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 2.0, "year": 2005}]}, {"2006": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 2.0, "year": 2006}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2006}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2006}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 1.0, "year": 2006}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 3.0, "year": 2006}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 1.0, "year": 2006}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 1.0, "year": 2006}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2006}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 2.0, "year": 2006}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 1.0, "year": 2006}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2006}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2006}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2006}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 4.0, "year": 2006}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2006}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2006}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 1.0, "year": 2006}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2006}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2006}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2006}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2006}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2006}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 2.0, "year": 2006}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 1.0, "year": 2006}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 3.0, "year": 2006}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 7.0, "year": 2006}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2006}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 1.0, "year": 2006}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2006}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 3.0, "year": 2006}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2006}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 1.0, "year": 2006}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2006}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2006}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 2.0, "year": 2006}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2006}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2006}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 2.0, "year": 2006}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2006}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2006}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2006}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 4.0, "year": 2006}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 2.0, "year": 2006}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 10.0, "year": 2006}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 8.0, "year": 2006}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 4.0, "year": 2006}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 2.0, "year": 2006}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 1.0, "year": 2006}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 11.0, "year": 2006}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 8.0, "year": 2006}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 8.0, "year": 2006}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 14.0, "year": 2006}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 10.0, "year": 2006}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 2.0, "year": 2006}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 1.0, "year": 2006}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 177.0, "year": 2006}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 8.0, "year": 2006}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 2.0, "year": 2006}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2006}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 9.0, "year": 2006}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 3.0, "year": 2006}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 1.0, "year": 2006}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 5.0, "year": 2006}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 7.0, "year": 2006}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 4.0, "year": 2006}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 7.0, "year": 2006}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 1.0, "year": 2006}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 9.0, "year": 2006}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 12.0, "year": 2006}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2006}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 9.0, "year": 2006}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 6.0, "year": 2006}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 5.0, "year": 2006}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2006}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 22.0, "year": 2006}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 20.0, "year": 2006}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 9.0, "year": 2006}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 1.0, "year": 2006}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 7.0, "year": 2006}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 8.0, "year": 2006}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2006}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2006}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 8.0, "year": 2006}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 18.0, "year": 2006}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2006}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2006}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 3.0, "year": 2006}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 10.0, "year": 2006}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 10.0, "year": 2006}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 17.0, "year": 2006}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 15.0, "year": 2006}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 10.0, "year": 2006}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 5.0, "year": 2006}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2006}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 14.0, "year": 2006}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 7.0, "year": 2006}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 3.0, "year": 2006}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2006}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 29.0, "year": 2006}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 5.0, "year": 2006}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 2.0, "year": 2006}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 5.0, "year": 2006}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 5.0, "year": 2006}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 5.0, "year": 2006}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 2.0, "year": 2006}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 7.0, "year": 2006}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 8.0, "year": 2006}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 9.0, "year": 2006}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 4.0, "year": 2006}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2006}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2006}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 2.0, "year": 2006}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2006}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2006}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 2.0, "year": 2006}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 1.0, "year": 2006}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 2.0, "year": 2006}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2006}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2006}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2006}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2006}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2006}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2006}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2006}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2006}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2006}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2006}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2006}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 1.0, "year": 2006}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2006}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 8.0, "year": 2006}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2006}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2006}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2006}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2006}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 2.0, "year": 2006}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 1.0, "year": 2006}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2006}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 1.0, "year": 2006}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2006}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2006}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 1.0, "year": 2006}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 2.0, "year": 2006}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2006}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 1.0, "year": 2006}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2006}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 1.0, "year": 2006}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2006}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2006}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2006}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 3.0, "year": 2006}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2006}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2006}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2006}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2006}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2006}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2006}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2006}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2006}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2006}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2006}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 1.0, "year": 2006}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2006}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2006}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2006}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2006}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 1.0, "year": 2006}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2006}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2006}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2006}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2006}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 3.0, "year": 2006}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2006}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2006}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2006}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2006}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2006}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2006}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2006}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2006}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2006}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2006}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2006}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2006}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 1.0, "year": 2006}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 1.0, "year": 2006}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 3.0, "year": 2006}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2006}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 3.0, "year": 2006}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2006}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2006}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 1.0, "year": 2006}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2006}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2006}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2006}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2006}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2006}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2006}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2006}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2006}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2006}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2006}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 5.0, "year": 2006}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 1.0, "year": 2006}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2006}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2006}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2006}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 1.0, "year": 2006}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 1.0, "year": 2006}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 6.0, "year": 2006}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2006}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2006}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2006}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2006}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 1.0, "year": 2006}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2006}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 1.0, "year": 2006}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2006}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2006}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 1.0, "year": 2006}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2006}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2006}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2006}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 4.0, "year": 2006}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2006}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2006}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2006}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2006}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2006}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2006}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2006}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 2.0, "year": 2006}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2006}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2006}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2006}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 1.0, "year": 2006}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 1.0, "year": 2006}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2006}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 1.0, "year": 2006}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 1.0, "year": 2006}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 3.0, "year": 2006}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2006}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 5.0, "year": 2006}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 1.0, "year": 2006}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 2.0, "year": 2006}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2006}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2006}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 2.0, "year": 2006}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 1.0, "year": 2006}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 6.0, "year": 2006}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 4.0, "year": 2006}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 2.0, "year": 2006}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 5.0, "year": 2006}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2006}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 9.0, "year": 2006}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 4.0, "year": 2006}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 5.0, "year": 2006}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 1.0, "year": 2006}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 6.0, "year": 2006}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 5.0, "year": 2006}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2006}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2006}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 2.0, "year": 2006}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 5.0, "year": 2006}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 1.0, "year": 2006}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2006}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 2.0, "year": 2006}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 3.0, "year": 2006}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 5.0, "year": 2006}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 8.0, "year": 2006}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 6.0, "year": 2006}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 3.0, "year": 2006}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2006}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 3.0, "year": 2006}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 14.0, "year": 2006}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 4.0, "year": 2006}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 1.0, "year": 2006}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 4.0, "year": 2006}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 3.0, "year": 2006}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 2.0, "year": 2006}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 2.0, "year": 2006}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 3.0, "year": 2006}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 3.0, "year": 2006}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 4.0, "year": 2006}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2006}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2006}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2006}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2006}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2006}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2006}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2006}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2006}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2006}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2006}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 1.0, "year": 2006}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2006}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 4.0, "year": 2006}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2006}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 1.0, "year": 2006}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 3.0, "year": 2006}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2006}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2006}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2006}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2006}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2006}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2006}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2006}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2006}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 1.0, "year": 2006}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2006}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2006}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 1.0, "year": 2006}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2006}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2006}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 1.0, "year": 2006}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 1.0, "year": 2006}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2006}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 4.0, "year": 2006}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2006}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2006}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2006}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2006}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2006}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 3.0, "year": 2006}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 5.0, "year": 2006}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2006}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 2.0, "year": 2006}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2006}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2006}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 1.0, "year": 2006}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2006}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2006}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2006}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2006}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2006}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 1.0, "year": 2006}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2006}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2006}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2006}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2006}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2006}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2006}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 5.0, "year": 2006}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2006}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 2.0, "year": 2006}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2006}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 1.0, "year": 2006}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 2.0, "year": 2006}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2006}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2006}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2006}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 1.0, "year": 2006}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 1.0, "year": 2006}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2006}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 2.0, "year": 2006}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2006}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2006}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2006}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 4.0, "year": 2006}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2006}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 1.0, "year": 2006}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2006}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 1.0, "year": 2006}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2006}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2006}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 1.0, "year": 2006}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 2.0, "year": 2006}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2006}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2006}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2006}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2006}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 2.0, "year": 2006}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2006}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 2.0, "year": 2006}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2006}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 3.0, "year": 2006}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2006}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 1.0, "year": 2006}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2006}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 2.0, "year": 2006}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2006}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2006}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2006}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2006}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2006}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2006}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2006}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2006}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2006}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2006}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 2.0, "year": 2006}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2006}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 1.0, "year": 2006}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2006}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 1.0, "year": 2006}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2006}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2006}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2006}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2006}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2006}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2006}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 1.0, "year": 2006}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2006}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 1.0, "year": 2006}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 2.0, "year": 2006}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 2.0, "year": 2006}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2006}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2006}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 1.0, "year": 2006}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2006}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2006}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2006}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 1.0, "year": 2006}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 1.0, "year": 2006}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 2.0, "year": 2006}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2006}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2006}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2006}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2006}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2006}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 1.0, "year": 2006}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2006}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 3.0, "year": 2006}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2006}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 2.0, "year": 2006}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2006}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 1.0, "year": 2006}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2006}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 2.0, "year": 2006}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2006}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 1.0, "year": 2006}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 1.0, "year": 2006}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 1.0, "year": 2006}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 3.0, "year": 2006}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2006}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2006}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2006}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2006}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2006}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2006}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2006}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2006}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2006}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2006}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2006}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2006}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 1.0, "year": 2006}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 1.0, "year": 2006}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2006}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2006}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2006}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2006}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2006}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 2.0, "year": 2006}]}, {"2007": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 3.0, "year": 2007}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2007}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2007}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2007}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 2.0, "year": 2007}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2007}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 3.0, "year": 2007}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 1.0, "year": 2007}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 1.0, "year": 2007}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2007}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 2.0, "year": 2007}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 1.0, "year": 2007}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2007}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2007}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2007}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2007}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 4.0, "year": 2007}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2007}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2007}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 1.0, "year": 2007}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2007}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2007}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2007}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2007}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2007}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 2.0, "year": 2007}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 1.0, "year": 2007}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 3.0, "year": 2007}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2007}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 8.0, "year": 2007}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2007}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2007}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 1.0, "year": 2007}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2007}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 4.0, "year": 2007}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2007}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2007}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2007}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2007}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2007}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2007}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2007}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2007}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2007}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2007}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2007}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2007}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2007}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2007}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2007}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 4.0, "year": 2007}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 2.0, "year": 2007}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 12.0, "year": 2007}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2007}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 6.0, "year": 2007}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 2.0, "year": 2007}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 2.0, "year": 2007}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 11.0, "year": 2007}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 9.0, "year": 2007}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 9.0, "year": 2007}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 16.0, "year": 2007}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 10.0, "year": 2007}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 2.0, "year": 2007}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 3.0, "year": 2007}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 205.0, "year": 2007}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 9.0, "year": 2007}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 3.0, "year": 2007}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2007}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 12.0, "year": 2007}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 3.0, "year": 2007}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 2.0, "year": 2007}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 5.0, "year": 2007}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 8.0, "year": 2007}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 4.0, "year": 2007}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 8.0, "year": 2007}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 1.0, "year": 2007}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 12.0, "year": 2007}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 13.0, "year": 2007}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2007}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 11.0, "year": 2007}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 6.0, "year": 2007}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 7.0, "year": 2007}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2007}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 26.0, "year": 2007}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 21.0, "year": 2007}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 9.0, "year": 2007}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 1.0, "year": 2007}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 8.0, "year": 2007}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 8.0, "year": 2007}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2007}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2007}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 9.0, "year": 2007}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 20.0, "year": 2007}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2007}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2007}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 4.0, "year": 2007}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 11.0, "year": 2007}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 11.0, "year": 2007}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 19.0, "year": 2007}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 20.0, "year": 2007}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 12.0, "year": 2007}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 8.0, "year": 2007}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2007}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 1.0, "year": 2007}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 15.0, "year": 2007}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 8.0, "year": 2007}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 3.0, "year": 2007}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2007}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 35.0, "year": 2007}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2007}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 3.0, "year": 2007}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 5.0, "year": 2007}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 7.0, "year": 2007}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 7.0, "year": 2007}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 3.0, "year": 2007}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 8.0, "year": 2007}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 10.0, "year": 2007}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 10.0, "year": 2007}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 4.0, "year": 2007}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2007}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2007}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 2.0, "year": 2007}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2007}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2007}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 2.0, "year": 2007}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 1.0, "year": 2007}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 2.0, "year": 2007}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2007}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2007}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2007}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2007}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2007}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2007}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2007}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2007}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2007}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2007}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2007}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2007}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2007}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 1.0, "year": 2007}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2007}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 9.0, "year": 2007}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2007}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2007}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 1.0, "year": 2007}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2007}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2007}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2007}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2007}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2007}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 2.0, "year": 2007}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 1.0, "year": 2007}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2007}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 1.0, "year": 2007}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2007}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2007}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 2.0, "year": 2007}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 1.0, "year": 2007}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 3.0, "year": 2007}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 2.0, "year": 2007}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2007}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2007}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 1.0, "year": 2007}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2007}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 2.0, "year": 2007}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2007}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2007}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2007}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 3.0, "year": 2007}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2007}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2007}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2007}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2007}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2007}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2007}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2007}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2007}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2007}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2007}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2007}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2007}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2007}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2007}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 1.0, "year": 2007}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2007}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 1.0, "year": 2007}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2007}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2007}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2007}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2007}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2007}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 3.0, "year": 2007}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2007}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2007}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2007}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2007}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2007}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2007}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2007}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2007}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2007}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2007}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2007}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2007}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 1.0, "year": 2007}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 1.0, "year": 2007}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2007}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 3.0, "year": 2007}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2007}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 4.0, "year": 2007}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 1.0, "year": 2007}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2007}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2007}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 1.0, "year": 2007}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2007}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2007}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2007}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2007}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2007}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2007}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2007}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2007}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2007}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 1.0, "year": 2007}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2007}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2007}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2007}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 5.0, "year": 2007}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 1.0, "year": 2007}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2007}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2007}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 1.0, "year": 2007}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2007}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2007}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 1.0, "year": 2007}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 1.0, "year": 2007}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 8.0, "year": 2007}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2007}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2007}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2007}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2007}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 1.0, "year": 2007}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2007}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 1.0, "year": 2007}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2007}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2007}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 1.0, "year": 2007}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2007}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2007}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2007}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2007}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 4.0, "year": 2007}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2007}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2007}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2007}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2007}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2007}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2007}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2007}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 2.0, "year": 2007}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2007}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2007}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2007}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2007}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 1.0, "year": 2007}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2007}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 1.0, "year": 2007}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2007}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 1.0, "year": 2007}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 1.0, "year": 2007}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2007}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2007}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2007}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 7.0, "year": 2007}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 1.0, "year": 2007}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 2.0, "year": 2007}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2007}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2007}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 4.0, "year": 2007}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 1.0, "year": 2007}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 6.0, "year": 2007}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 5.0, "year": 2007}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 2.0, "year": 2007}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 7.0, "year": 2007}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2007}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 11.0, "year": 2007}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 4.0, "year": 2007}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 5.0, "year": 2007}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 1.0, "year": 2007}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 6.0, "year": 2007}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 5.0, "year": 2007}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2007}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2007}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 2.0, "year": 2007}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 7.0, "year": 2007}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 1.0, "year": 2007}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2007}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 3.0, "year": 2007}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 3.0, "year": 2007}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 6.0, "year": 2007}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 9.0, "year": 2007}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 6.0, "year": 2007}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 4.0, "year": 2007}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2007}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 4.0, "year": 2007}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 17.0, "year": 2007}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2007}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 1.0, "year": 2007}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 4.0, "year": 2007}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 4.0, "year": 2007}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 2.0, "year": 2007}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 3.0, "year": 2007}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 3.0, "year": 2007}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 4.0, "year": 2007}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 4.0, "year": 2007}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2007}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2007}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2007}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2007}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2007}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2007}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2007}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2007}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2007}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2007}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2007}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2007}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 1.0, "year": 2007}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2007}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2007}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2007}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2007}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2007}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 1.0, "year": 2007}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2007}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2007}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 2.0, "year": 2007}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2007}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 6.0, "year": 2007}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 1.0, "year": 2007}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2007}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2007}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 2.0, "year": 2007}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 3.0, "year": 2007}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2007}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2007}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2007}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2007}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2007}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2007}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2007}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2007}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 2.0, "year": 2007}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2007}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2007}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2007}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 2.0, "year": 2007}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2007}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2007}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 2.0, "year": 2007}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2007}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 1.0, "year": 2007}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2007}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2007}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 1.0, "year": 2007}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2007}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 4.0, "year": 2007}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2007}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2007}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2007}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2007}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2007}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 3.0, "year": 2007}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 5.0, "year": 2007}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2007}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2007}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2007}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2007}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 1.0, "year": 2007}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2007}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2007}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2007}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2007}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2007}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2007}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2007}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2007}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2007}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2007}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2007}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2007}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2007}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2007}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2007}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2007}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 6.0, "year": 2007}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2007}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2007}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 2.0, "year": 2007}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2007}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2007}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 1.0, "year": 2007}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 2.0, "year": 2007}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2007}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2007}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2007}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2007}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 1.0, "year": 2007}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 1.0, "year": 2007}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2007}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 2.0, "year": 2007}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2007}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2007}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2007}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 4.0, "year": 2007}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2007}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 2.0, "year": 2007}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2007}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 2.0, "year": 2007}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2007}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2007}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 1.0, "year": 2007}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 2.0, "year": 2007}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2007}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2007}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2007}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2007}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2007}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2007}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2007}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 2.0, "year": 2007}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2007}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 3.0, "year": 2007}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2007}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 1.0, "year": 2007}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2007}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 2.0, "year": 2007}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2007}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2007}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2007}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2007}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2007}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2007}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2007}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2007}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 2.0, "year": 2007}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2007}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 1.0, "year": 2007}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2007}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 1.0, "year": 2007}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2007}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2007}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2007}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2007}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2007}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2007}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2007}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2007}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2007}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 2.0, "year": 2007}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2007}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 1.0, "year": 2007}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 3.0, "year": 2007}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 2.0, "year": 2007}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2007}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2007}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2007}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2007}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2007}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2007}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2007}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 1.0, "year": 2007}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 1.0, "year": 2007}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 2.0, "year": 2007}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2007}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2007}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2007}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2007}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2007}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2007}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 1.0, "year": 2007}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2007}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 4.0, "year": 2007}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2007}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2007}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2007}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2007}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 2.0, "year": 2007}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 1.0, "year": 2007}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2007}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 1.0, "year": 2007}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 2.0, "year": 2007}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2007}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 1.0, "year": 2007}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 3.0, "year": 2007}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2007}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2007}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2007}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2007}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2007}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2007}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2007}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2007}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2007}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2007}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2007}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2007}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2007}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2007}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2007}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2007}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 1.0, "year": 2007}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2007}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2007}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2007}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2007}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2007}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2007}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 2.0, "year": 2007}]}, {"2008": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 3.0, "year": 2008}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2008}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2008}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2008}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 2.0, "year": 2008}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2008}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2008}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2008}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 3.0, "year": 2008}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 1.0, "year": 2008}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 1.0, "year": 2008}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2008}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 2.0, "year": 2008}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 1.0, "year": 2008}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2008}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2008}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2008}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2008}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2008}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2008}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2008}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2008}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2008}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2008}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2008}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2008}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2008}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2008}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2008}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2008}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2008}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2008}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2008}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2008}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 8.0, "year": 2008}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2008}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2008}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 1.0, "year": 2008}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2008}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 4.0, "year": 2008}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2008}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2008}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2008}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2008}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2008}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2008}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2008}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2008}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2008}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2008}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2008}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2008}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2008}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2008}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2008}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 4.0, "year": 2008}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 2.0, "year": 2008}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 16.0, "year": 2008}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2008}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 6.0, "year": 2008}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 2.0, "year": 2008}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 2.0, "year": 2008}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 13.0, "year": 2008}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 11.0, "year": 2008}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 11.0, "year": 2008}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 17.0, "year": 2008}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 11.0, "year": 2008}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2008}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 4.0, "year": 2008}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 223.0, "year": 2008}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 9.0, "year": 2008}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 5.0, "year": 2008}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2008}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 14.0, "year": 2008}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 4.0, "year": 2008}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 3.0, "year": 2008}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 7.0, "year": 2008}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 9.0, "year": 2008}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 4.0, "year": 2008}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 8.0, "year": 2008}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 2.0, "year": 2008}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 14.0, "year": 2008}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 13.0, "year": 2008}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2008}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2008}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 8.0, "year": 2008}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 8.0, "year": 2008}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2008}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 27.0, "year": 2008}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 22.0, "year": 2008}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2008}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 1.0, "year": 2008}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 8.0, "year": 2008}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 11.0, "year": 2008}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2008}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2008}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 9.0, "year": 2008}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 21.0, "year": 2008}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2008}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2008}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2008}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 4.0, "year": 2008}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 12.0, "year": 2008}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 15.0, "year": 2008}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 27.0, "year": 2008}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 2.0, "year": 2008}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 22.0, "year": 2008}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 13.0, "year": 2008}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 10.0, "year": 2008}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2008}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 1.0, "year": 2008}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 15.0, "year": 2008}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 9.0, "year": 2008}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2008}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2008}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 45.0, "year": 2008}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2008}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 4.0, "year": 2008}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 6.0, "year": 2008}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 10.0, "year": 2008}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 7.0, "year": 2008}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 3.0, "year": 2008}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 8.0, "year": 2008}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 11.0, "year": 2008}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 11.0, "year": 2008}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 6.0, "year": 2008}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2008}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2008}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 2.0, "year": 2008}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2008}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2008}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 2.0, "year": 2008}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 1.0, "year": 2008}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 2.0, "year": 2008}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2008}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2008}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2008}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2008}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2008}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2008}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2008}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2008}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2008}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2008}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2008}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2008}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2008}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2008}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 11.0, "year": 2008}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2008}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2008}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 1.0, "year": 2008}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2008}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2008}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2008}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2008}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2008}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 2.0, "year": 2008}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 1.0, "year": 2008}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2008}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 2.0, "year": 2008}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2008}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2008}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 2.0, "year": 2008}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 1.0, "year": 2008}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2008}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 5.0, "year": 2008}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2008}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2008}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 2.0, "year": 2008}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2008}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 4.0, "year": 2008}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2008}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2008}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 3.0, "year": 2008}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2008}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2008}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2008}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2008}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2008}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2008}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2008}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2008}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2008}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2008}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2008}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2008}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2008}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 1.0, "year": 2008}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2008}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 1.0, "year": 2008}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2008}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2008}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2008}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2008}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 3.0, "year": 2008}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2008}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2008}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2008}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2008}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2008}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2008}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2008}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2008}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2008}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2008}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2008}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2008}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2008}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2008}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2008}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2008}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 5.0, "year": 2008}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 1.0, "year": 2008}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2008}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2008}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 1.0, "year": 2008}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2008}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2008}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2008}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2008}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2008}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2008}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2008}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2008}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 1.0, "year": 2008}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2008}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2008}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2008}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 5.0, "year": 2008}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 2.0, "year": 2008}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2008}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2008}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2008}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 1.0, "year": 2008}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2008}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2008}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2008}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 1.0, "year": 2008}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2008}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 9.0, "year": 2008}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2008}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2008}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2008}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2008}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 2.0, "year": 2008}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2008}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2008}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2008}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2008}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2008}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2008}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2008}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2008}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2008}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2008}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 4.0, "year": 2008}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2008}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2008}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2008}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2008}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2008}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2008}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2008}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 2.0, "year": 2008}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2008}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2008}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2008}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2008}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2008}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 1.0, "year": 2008}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2008}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 1.0, "year": 2008}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 1.0, "year": 2008}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 2.0, "year": 2008}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2008}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2008}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2008}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 7.0, "year": 2008}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 2.0, "year": 2008}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 4.0, "year": 2008}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2008}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2008}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 4.0, "year": 2008}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 1.0, "year": 2008}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 6.0, "year": 2008}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2008}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 2.0, "year": 2008}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 8.0, "year": 2008}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2008}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 12.0, "year": 2008}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 4.0, "year": 2008}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2008}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 1.0, "year": 2008}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 6.0, "year": 2008}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 8.0, "year": 2008}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2008}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2008}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 2.0, "year": 2008}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 8.0, "year": 2008}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 1.0, "year": 2008}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2008}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 4.0, "year": 2008}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 3.0, "year": 2008}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 10.0, "year": 2008}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 10.0, "year": 2008}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 6.0, "year": 2008}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2008}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2008}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 4.0, "year": 2008}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 19.0, "year": 2008}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2008}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 1.0, "year": 2008}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 4.0, "year": 2008}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 4.0, "year": 2008}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 2.0, "year": 2008}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 3.0, "year": 2008}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 3.0, "year": 2008}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 5.0, "year": 2008}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 4.0, "year": 2008}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 1.0, "year": 2008}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2008}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2008}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2008}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2008}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2008}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2008}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2008}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2008}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2008}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2008}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2008}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 1.0, "year": 2008}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2008}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 1.0, "year": 2008}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2008}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2008}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2008}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2008}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2008}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2008}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 3.0, "year": 2008}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 8.0, "year": 2008}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 1.0, "year": 2008}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2008}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2008}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 1.0, "year": 2008}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 3.0, "year": 2008}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2008}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2008}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 3.0, "year": 2008}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2008}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2008}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2008}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2008}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2008}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2008}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2008}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2008}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2008}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2008}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2008}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 2.0, "year": 2008}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2008}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2008}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2008}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 2.0, "year": 2008}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2008}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2008}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 2.0, "year": 2008}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2008}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 2.0, "year": 2008}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2008}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2008}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2008}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 1.0, "year": 2008}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2008}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 4.0, "year": 2008}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2008}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2008}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2008}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2008}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2008}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 3.0, "year": 2008}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 5.0, "year": 2008}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2008}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2008}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2008}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2008}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2008}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2008}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2008}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2008}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2008}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2008}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2008}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2008}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2008}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2008}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2008}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2008}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2008}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2008}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2008}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 7.0, "year": 2008}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2008}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 2.0, "year": 2008}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 1.0, "year": 2008}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2008}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2008}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2008}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 2.0, "year": 2008}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2008}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2008}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2008}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2008}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 1.0, "year": 2008}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2008}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2008}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 3.0, "year": 2008}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2008}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2008}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2008}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2008}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2008}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2008}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2008}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 2.0, "year": 2008}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2008}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2008}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 1.0, "year": 2008}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 3.0, "year": 2008}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2008}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2008}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2008}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2008}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2008}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2008}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2008}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 2.0, "year": 2008}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2008}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 3.0, "year": 2008}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2008}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2008}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2008}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2008}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2008}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2008}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2008}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2008}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2008}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2008}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2008}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2008}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2008}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2008}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 2.0, "year": 2008}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2008}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 2.0, "year": 2008}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2008}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2008}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2008}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2008}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2008}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2008}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2008}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2008}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2008}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2008}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2008}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2008}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 2.0, "year": 2008}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2008}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 1.0, "year": 2008}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 3.0, "year": 2008}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 2.0, "year": 2008}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2008}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2008}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2008}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2008}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2008}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2008}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 1.0, "year": 2008}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 1.0, "year": 2008}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 2.0, "year": 2008}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2008}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2008}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2008}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2008}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2008}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 2.0, "year": 2008}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2008}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2008}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2008}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2008}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 2.0, "year": 2008}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2008}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2008}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2008}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2008}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2008}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 1.0, "year": 2008}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 1.0, "year": 2008}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2008}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2008}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 2.0, "year": 2008}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 4.0, "year": 2008}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 1.0, "year": 2008}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2008}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2008}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2008}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2008}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2008}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2008}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2008}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2008}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2008}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2008}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2008}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2008}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 1.0, "year": 2008}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2008}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2008}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2008}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2008}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2008}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2008}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2008}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2008}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2008}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 2.0, "year": 2008}]}, {"2009": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 3.0, "year": 2009}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2009}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2009}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2009}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 2.0, "year": 2009}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2009}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2009}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2009}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 3.0, "year": 2009}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 1.0, "year": 2009}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 1.0, "year": 2009}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2009}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 2.0, "year": 2009}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 1.0, "year": 2009}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2009}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2009}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2009}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2009}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2009}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2009}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2009}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2009}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2009}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2009}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2009}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2009}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2009}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2009}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2009}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2009}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2009}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2009}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2009}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2009}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 8.0, "year": 2009}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2009}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2009}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 1.0, "year": 2009}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2009}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 4.0, "year": 2009}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2009}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2009}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2009}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2009}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2009}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2009}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2009}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2009}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2009}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2009}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2009}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2009}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2009}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2009}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2009}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 5.0, "year": 2009}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 2.0, "year": 2009}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 17.0, "year": 2009}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2009}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2009}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 6.0, "year": 2009}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 2.0, "year": 2009}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 5.0, "year": 2009}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 13.0, "year": 2009}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 11.0, "year": 2009}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 12.0, "year": 2009}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 17.0, "year": 2009}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2009}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2009}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 4.0, "year": 2009}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 261.0, "year": 2009}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 9.0, "year": 2009}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 5.0, "year": 2009}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2009}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2009}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 14.0, "year": 2009}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 4.0, "year": 2009}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 4.0, "year": 2009}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 9.0, "year": 2009}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 9.0, "year": 2009}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 4.0, "year": 2009}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 10.0, "year": 2009}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 4.0, "year": 2009}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 14.0, "year": 2009}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 13.0, "year": 2009}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2009}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2009}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 9.0, "year": 2009}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 10.0, "year": 2009}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2009}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 30.0, "year": 2009}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 26.0, "year": 2009}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2009}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 1.0, "year": 2009}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 9.0, "year": 2009}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2009}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2009}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2009}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2009}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 22.0, "year": 2009}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2009}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2009}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2009}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 4.0, "year": 2009}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 12.0, "year": 2009}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 17.0, "year": 2009}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2009}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 29.0, "year": 2009}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 4.0, "year": 2009}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 26.0, "year": 2009}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 15.0, "year": 2009}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 11.0, "year": 2009}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2009}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 1.0, "year": 2009}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 18.0, "year": 2009}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 10.0, "year": 2009}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2009}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2009}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 52.0, "year": 2009}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2009}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 5.0, "year": 2009}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 6.0, "year": 2009}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 10.0, "year": 2009}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 9.0, "year": 2009}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 3.0, "year": 2009}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 9.0, "year": 2009}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 12.0, "year": 2009}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 25.0, "year": 2009}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 7.0, "year": 2009}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2009}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2009}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2009}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 3.0, "year": 2009}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2009}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2009}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 3.0, "year": 2009}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 1.0, "year": 2009}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2009}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2009}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2009}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2009}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2009}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2009}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2009}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2009}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2009}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2009}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2009}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2009}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2009}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2009}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2009}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 11.0, "year": 2009}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2009}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2009}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 1.0, "year": 2009}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2009}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2009}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2009}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2009}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2009}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 2.0, "year": 2009}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 1.0, "year": 2009}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2009}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2009}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2009}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2009}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 2.0, "year": 2009}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 1.0, "year": 2009}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2009}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 5.0, "year": 2009}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2009}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2009}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 2.0, "year": 2009}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2009}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 4.0, "year": 2009}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2009}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2009}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2009}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2009}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 1.0, "year": 2009}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 3.0, "year": 2009}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2009}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2009}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2009}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2009}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2009}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2009}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2009}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2009}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2009}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2009}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2009}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2009}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2009}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2009}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2009}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2009}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 1.0, "year": 2009}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2009}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2009}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2009}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2009}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2009}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2009}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 3.0, "year": 2009}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2009}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2009}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2009}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2009}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2009}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2009}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2009}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2009}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2009}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2009}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2009}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2009}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2009}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2009}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2009}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2009}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 5.0, "year": 2009}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 1.0, "year": 2009}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2009}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2009}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 1.0, "year": 2009}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2009}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2009}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2009}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2009}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2009}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2009}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2009}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2009}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 1.0, "year": 2009}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2009}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2009}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2009}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2009}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 7.0, "year": 2009}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 2.0, "year": 2009}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2009}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2009}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2009}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 1.0, "year": 2009}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2009}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2009}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2009}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 1.0, "year": 2009}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2009}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 9.0, "year": 2009}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2009}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2009}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2009}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2009}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 2.0, "year": 2009}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2009}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2009}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2009}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2009}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2009}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2009}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2009}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2009}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2009}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2009}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2009}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2009}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2009}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2009}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2009}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2009}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2009}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2009}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2009}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2009}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2009}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2009}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2009}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2009}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2009}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2009}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 1.0, "year": 2009}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2009}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 1.0, "year": 2009}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 1.0, "year": 2009}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 1.0, "year": 2009}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 2.0, "year": 2009}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2009}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2009}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2009}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2009}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 7.0, "year": 2009}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 2.0, "year": 2009}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 5.0, "year": 2009}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2009}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2009}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 5.0, "year": 2009}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 1.0, "year": 2009}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 1.0, "year": 2009}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 6.0, "year": 2009}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2009}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 2.0, "year": 2009}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 10.0, "year": 2009}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2009}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 15.0, "year": 2009}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 5.0, "year": 2009}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2009}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 1.0, "year": 2009}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 7.0, "year": 2009}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 10.0, "year": 2009}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2009}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2009}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2009}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 9.0, "year": 2009}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 1.0, "year": 2009}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2009}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 4.0, "year": 2009}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 4.0, "year": 2009}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2009}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 11.0, "year": 2009}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 13.0, "year": 2009}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 7.0, "year": 2009}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2009}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2009}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 5.0, "year": 2009}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2009}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 20.0, "year": 2009}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2009}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 1.0, "year": 2009}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 4.0, "year": 2009}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 4.0, "year": 2009}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 2.0, "year": 2009}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 3.0, "year": 2009}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 4.0, "year": 2009}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 6.0, "year": 2009}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 18.0, "year": 2009}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 2.0, "year": 2009}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2009}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2009}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2009}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2009}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2009}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2009}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2009}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2009}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2009}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2009}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2009}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2009}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2009}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2009}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 1.0, "year": 2009}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2009}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 1.0, "year": 2009}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2009}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2009}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2009}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2009}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2009}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2009}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 3.0, "year": 2009}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 9.0, "year": 2009}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 1.0, "year": 2009}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2009}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2009}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 1.0, "year": 2009}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 4.0, "year": 2009}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2009}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2009}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 3.0, "year": 2009}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2009}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2009}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2009}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2009}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2009}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2009}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2009}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2009}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2009}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2009}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2009}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2009}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2009}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2009}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2009}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2009}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 2.0, "year": 2009}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2009}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2009}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2009}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2009}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 2.0, "year": 2009}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2009}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 1.0, "year": 2009}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2009}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2009}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2009}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 1.0, "year": 2009}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2009}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 4.0, "year": 2009}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2009}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2009}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2009}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2009}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2009}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 3.0, "year": 2009}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 6.0, "year": 2009}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2009}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2009}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2009}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2009}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2009}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2009}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2009}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2009}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2009}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2009}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2009}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2009}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2009}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2009}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2009}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2009}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2009}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2009}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2009}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 7.0, "year": 2009}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2009}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 3.0, "year": 2009}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 1.0, "year": 2009}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2009}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2009}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2009}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 2.0, "year": 2009}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2009}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2009}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2009}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2009}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2009}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2009}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2009}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2009}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2009}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2009}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2009}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2009}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2009}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2009}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2009}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 2.0, "year": 2009}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2009}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2009}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 2.0, "year": 2009}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 3.0, "year": 2009}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2009}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2009}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2009}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2009}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2009}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2009}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2009}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2009}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2009}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2009}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2009}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2009}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2009}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2009}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2009}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2009}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2009}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2009}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2009}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2009}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2009}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2009}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2009}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2009}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2009}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2009}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2009}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 2.0, "year": 2009}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2009}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2009}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 2.0, "year": 2009}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2009}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2009}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2009}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2009}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2009}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2009}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2009}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2009}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2009}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2009}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2009}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2009}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2009}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2009}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 1.0, "year": 2009}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 3.0, "year": 2009}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 2.0, "year": 2009}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2009}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2009}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2009}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2009}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2009}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2009}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 1.0, "year": 2009}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 1.0, "year": 2009}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 2.0, "year": 2009}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2009}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2009}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2009}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2009}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2009}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 2.0, "year": 2009}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2009}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2009}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2009}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2009}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2009}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2009}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2009}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2009}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2009}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2009}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 1.0, "year": 2009}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 1.0, "year": 2009}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2009}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2009}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 3.0, "year": 2009}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2009}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 1.0, "year": 2009}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2009}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2009}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2009}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2009}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2009}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2009}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2009}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2009}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2009}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2009}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2009}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2009}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2009}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2009}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 1.0, "year": 2009}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2009}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2009}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2009}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2009}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2009}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2009}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2009}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2009}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2009}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2009}]}, {"2010": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 3.0, "year": 2010}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2010}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2010}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2010}, {"source": "0", "target": "47", "source_name": "intellectual property", "target_name": "software maintenance", "weight": 1.0, "year": 2010}, {"source": "0", "target": "50", "source_name": "intellectual property", "target_name": "source code", "weight": 1.0, "year": 2010}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 3.0, "year": 2010}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2010}, {"source": "0", "target": "101", "source_name": "intellectual property", "target_name": "software reuse", "weight": 1.0, "year": 2010}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2010}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2010}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 3.0, "year": 2010}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 1.0, "year": 2010}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 2.0, "year": 2010}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2010}, {"source": "2", "target": "29", "source_name": "business model", "target_name": "cloud computing", "weight": 1.0, "year": 2010}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 2.0, "year": 2010}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 1.0, "year": 2010}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2010}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2010}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2010}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2010}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2010}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2010}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2010}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2010}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2010}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2010}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2010}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2010}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2010}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2010}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2010}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2010}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2010}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2010}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2010}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2010}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2010}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2010}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 9.0, "year": 2010}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2010}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2010}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 2.0, "year": 2010}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2010}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 5.0, "year": 2010}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2010}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2010}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2010}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2010}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2010}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2010}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2010}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2010}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2010}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2010}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2010}, {"source": "5", "target": "78", "source_name": "software quality assurance", "target_name": "process improvement", "weight": 1.0, "year": 2010}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2010}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2010}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2010}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2010}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 5.0, "year": 2010}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 2.0, "year": 2010}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 20.0, "year": 2010}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2010}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2010}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 6.0, "year": 2010}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 2.0, "year": 2010}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 5.0, "year": 2010}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 15.0, "year": 2010}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 12.0, "year": 2010}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 13.0, "year": 2010}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 18.0, "year": 2010}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2010}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2010}, {"source": "6", "target": "29", "source_name": "software engineer", "target_name": "cloud computing", "weight": 1.0, "year": 2010}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 4.0, "year": 2010}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 288.0, "year": 2010}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 9.0, "year": 2010}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 8.0, "year": 2010}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2010}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2010}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 14.0, "year": 2010}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 5.0, "year": 2010}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 5.0, "year": 2010}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 9.0, "year": 2010}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 9.0, "year": 2010}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 4.0, "year": 2010}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 10.0, "year": 2010}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 4.0, "year": 2010}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 16.0, "year": 2010}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 13.0, "year": 2010}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2010}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2010}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 10.0, "year": 2010}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 11.0, "year": 2010}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2010}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 32.0, "year": 2010}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 30.0, "year": 2010}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2010}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 2.0, "year": 2010}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 9.0, "year": 2010}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2010}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2010}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2010}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2010}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 27.0, "year": 2010}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2010}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2010}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2010}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 5.0, "year": 2010}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 15.0, "year": 2010}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 17.0, "year": 2010}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2010}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 31.0, "year": 2010}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 5.0, "year": 2010}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 29.0, "year": 2010}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 17.0, "year": 2010}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 12.0, "year": 2010}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2010}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 2.0, "year": 2010}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 18.0, "year": 2010}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 12.0, "year": 2010}, {"source": "6", "target": "86", "source_name": "software engineer", "target_name": "systematic mapping", "weight": 1.0, "year": 2010}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2010}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2010}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 52.0, "year": 2010}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2010}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 5.0, "year": 2010}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 7.0, "year": 2010}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 10.0, "year": 2010}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 10.0, "year": 2010}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 3.0, "year": 2010}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 9.0, "year": 2010}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 14.0, "year": 2010}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 28.0, "year": 2010}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 7.0, "year": 2010}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2010}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2010}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2010}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 3.0, "year": 2010}, {"source": "7", "target": "42", "source_name": "quality control", "target_name": "quality assurance", "weight": 1.0, "year": 2010}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2010}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2010}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 3.0, "year": 2010}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 1.0, "year": 2010}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2010}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2010}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2010}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2010}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2010}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2010}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2010}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2010}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2010}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2010}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2010}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2010}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2010}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2010}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2010}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2010}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 13.0, "year": 2010}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2010}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2010}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 1.0, "year": 2010}, {"source": "10", "target": "37", "source_name": "requirements engineering", "target_name": "controlled experiments", "weight": 1.0, "year": 2010}, {"source": "10", "target": "38", "source_name": "requirements engineering", "target_name": "systematic literature review", "weight": 1.0, "year": 2010}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2010}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2010}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2010}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2010}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2010}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 2.0, "year": 2010}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 1.0, "year": 2010}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2010}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2010}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2010}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2010}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 2.0, "year": 2010}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 1.0, "year": 2010}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2010}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 5.0, "year": 2010}, {"source": "10", "target": "75", "source_name": "requirements engineering", "target_name": "systematic review", "weight": 1.0, "year": 2010}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2010}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2010}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 2.0, "year": 2010}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2010}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 4.0, "year": 2010}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2010}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2010}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2010}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "10", "target": "102", "source_name": "requirements engineering", "target_name": "product line", "weight": 1.0, "year": 2010}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2010}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2010}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 1.0, "year": 2010}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 4.0, "year": 2010}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2010}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2010}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2010}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2010}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2010}, {"source": "14", "target": "61", "source_name": "object oriented", "target_name": "extreme programming", "weight": 1.0, "year": 2010}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2010}, {"source": "14", "target": "71", "source_name": "object oriented", "target_name": "software testing", "weight": 1.0, "year": 2010}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2010}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2010}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2010}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2010}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2010}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2010}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2010}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2010}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2010}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2010}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2010}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 1.0, "year": 2010}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2010}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2010}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2010}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2010}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2010}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2010}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 4.0, "year": 2010}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2010}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2010}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2010}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2010}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2010}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2010}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2010}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2010}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2010}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2010}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2010}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2010}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2010}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2010}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "19", "target": "78", "source_name": "configuration management", "target_name": "process improvement", "weight": 1.0, "year": 2010}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2010}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2010}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 5.0, "year": 2010}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 1.0, "year": 2010}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2010}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2010}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 1.0, "year": 2010}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2010}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2010}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2010}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2010}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2010}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2010}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2010}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2010}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 1.0, "year": 2010}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2010}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2010}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2010}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2010}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 7.0, "year": 2010}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 2.0, "year": 2010}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2010}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2010}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2010}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 1.0, "year": 2010}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2010}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2010}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2010}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 1.0, "year": 2010}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 2.0, "year": 2010}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2010}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 10.0, "year": 2010}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2010}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2010}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2010}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2010}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 3.0, "year": 2010}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2010}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2010}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2010}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2010}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2010}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2010}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2010}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2010}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2010}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2010}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2010}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2010}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2010}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2010}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2010}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2010}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2010}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2010}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2010}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2010}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2010}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2010}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2010}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2010}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2010}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2010}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2010}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2010}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 1.0, "year": 2010}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2010}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 1.0, "year": 2010}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 1.0, "year": 2010}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 2.0, "year": 2010}, {"source": "29", "target": "74", "source_name": "cloud computing", "target_name": "software architecture", "weight": 1.0, "year": 2010}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 2.0, "year": 2010}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2010}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2010}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2010}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2010}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 7.0, "year": 2010}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 3.0, "year": 2010}, {"source": "31", "target": "38", "source_name": "software development", "target_name": "systematic literature review", "weight": 1.0, "year": 2010}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 5.0, "year": 2010}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2010}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2010}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 5.0, "year": 2010}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 1.0, "year": 2010}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 1.0, "year": 2010}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 6.0, "year": 2010}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2010}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 3.0, "year": 2010}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 10.0, "year": 2010}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2010}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 17.0, "year": 2010}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 5.0, "year": 2010}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2010}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 1.0, "year": 2010}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 7.0, "year": 2010}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 11.0, "year": 2010}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2010}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2010}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2010}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 12.0, "year": 2010}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 1.0, "year": 2010}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2010}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 5.0, "year": 2010}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 5.0, "year": 2010}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2010}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 13.0, "year": 2010}, {"source": "31", "target": "75", "source_name": "software development", "target_name": "systematic review", "weight": 1.0, "year": 2010}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 15.0, "year": 2010}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 8.0, "year": 2010}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2010}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2010}, {"source": "31", "target": "82", "source_name": "software development", "target_name": "social network", "weight": 1.0, "year": 2010}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 5.0, "year": 2010}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2010}, {"source": "31", "target": "86", "source_name": "software development", "target_name": "systematic mapping", "weight": 1.0, "year": 2010}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 20.0, "year": 2010}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2010}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 1.0, "year": 2010}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 4.0, "year": 2010}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 4.0, "year": 2010}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 2.0, "year": 2010}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 3.0, "year": 2010}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 4.0, "year": 2010}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 7.0, "year": 2010}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 21.0, "year": 2010}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 2.0, "year": 2010}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2010}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2010}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2010}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2010}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2010}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2010}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2010}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2010}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2010}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2010}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2010}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2010}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2010}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2010}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "34", "target": "77", "source_name": "search engines", "target_name": "mechanical turk", "weight": 1.0, "year": 2010}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2010}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 1.0, "year": 2010}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2010}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 1.0, "year": 2010}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2010}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2010}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2010}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2010}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2010}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2010}, {"source": "36", "target": "82", "source_name": "open source", "target_name": "social network", "weight": 1.0, "year": 2010}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 3.0, "year": 2010}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2010}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 9.0, "year": 2010}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 1.0, "year": 2010}, {"source": "37", "target": "38", "source_name": "controlled experiments", "target_name": "systematic literature review", "weight": 1.0, "year": 2010}, {"source": "37", "target": "75", "source_name": "controlled experiments", "target_name": "systematic review", "weight": 1.0, "year": 2010}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2010}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2010}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 2.0, "year": 2010}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 4.0, "year": 2010}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2010}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2010}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 3.0, "year": 2010}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2010}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2010}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2010}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2010}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2010}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2010}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2010}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2010}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2010}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2010}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2010}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2010}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2010}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2010}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2010}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2010}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 2.0, "year": 2010}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2010}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2010}, {"source": "42", "target": "77", "source_name": "quality assurance", "target_name": "mechanical turk", "weight": 1.0, "year": 2010}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2010}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2010}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 2.0, "year": 2010}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2010}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 1.0, "year": 2010}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2010}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2010}, {"source": "46", "target": "57", "source_name": "empirical studies", "target_name": "human intelligence", "weight": 1.0, "year": 2010}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2010}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2010}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 1.0, "year": 2010}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2010}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2010}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 5.0, "year": 2010}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2010}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2010}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2010}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2010}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2010}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 3.0, "year": 2010}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 7.0, "year": 2010}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2010}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2010}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2010}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2010}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 2.0, "year": 2010}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2010}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2010}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2010}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2010}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2010}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2010}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2010}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2010}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2010}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2010}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2010}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2010}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2010}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2010}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2010}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2010}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 8.0, "year": 2010}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2010}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 3.0, "year": 2010}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 1.0, "year": 2010}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2010}, {"source": "50", "target": "101", "source_name": "source code", "target_name": "software reuse", "weight": 2.0, "year": 2010}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2010}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2010}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 2.0, "year": 2010}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2010}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2010}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2010}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2010}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2010}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2010}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2010}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2010}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2010}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2010}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2010}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2010}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2010}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2010}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2010}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2010}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 2.0, "year": 2010}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2010}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2010}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 2.0, "year": 2010}, {"source": "54", "target": "86", "source_name": "software quality", "target_name": "systematic mapping", "weight": 1.0, "year": 2010}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 3.0, "year": 2010}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2010}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2010}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2010}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2010}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2010}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2010}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2010}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2010}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2010}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2010}, {"source": "55", "target": "85", "source_name": "systems engineering", "target_name": "degree programs", "weight": 2.0, "year": 2010}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2010}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2010}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2010}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2010}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2010}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2010}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2010}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2010}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2010}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2010}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2010}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2010}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2010}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2010}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2010}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2010}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2010}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2010}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2010}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2010}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 2.0, "year": 2010}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2010}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2010}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 3.0, "year": 2010}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2010}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2010}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2010}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2010}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2010}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2010}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2010}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2010}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2010}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2010}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2010}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2010}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2010}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2010}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2010}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 1.0, "year": 2010}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 3.0, "year": 2010}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 2.0, "year": 2010}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2010}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2010}, {"source": "66", "target": "82", "source_name": "project management", "target_name": "social network", "weight": 1.0, "year": 2010}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2010}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2010}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2010}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2010}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2010}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2010}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 1.0, "year": 2010}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 1.0, "year": 2010}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 2.0, "year": 2010}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2010}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2010}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2010}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2010}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2010}, {"source": "70", "target": "98", "source_name": "decision making", "target_name": "data mining", "weight": 1.0, "year": 2010}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2010}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 2.0, "year": 2010}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2010}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2010}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2010}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2010}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 1.0, "year": 2010}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2010}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2010}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2010}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2010}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2010}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2010}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 2.0, "year": 2010}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 2.0, "year": 2010}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2010}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2010}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 3.0, "year": 2010}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2010}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 1.0, "year": 2010}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2010}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2010}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2010}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2010}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2010}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2010}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2010}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2010}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2010}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2010}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2010}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2010}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2010}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2010}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2010}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2010}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 1.0, "year": 2010}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2010}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2010}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2010}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2010}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2010}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2010}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2010}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2010}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2010}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2010}]}, {"2011": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 3.0, "year": 2011}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2011}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2011}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2011}, {"source": "0", "target": "47", "source_name": "intellectual property", "target_name": "software maintenance", "weight": 1.0, "year": 2011}, {"source": "0", "target": "50", "source_name": "intellectual property", "target_name": "source code", "weight": 1.0, "year": 2011}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 3.0, "year": 2011}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2011}, {"source": "0", "target": "101", "source_name": "intellectual property", "target_name": "software reuse", "weight": 1.0, "year": 2011}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2011}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2011}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 3.0, "year": 2011}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 1.0, "year": 2011}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 2.0, "year": 2011}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2011}, {"source": "2", "target": "29", "source_name": "business model", "target_name": "cloud computing", "weight": 1.0, "year": 2011}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 2.0, "year": 2011}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 1.0, "year": 2011}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2011}, {"source": "2", "target": "60", "source_name": "business model", "target_name": "collective intelligence", "weight": 1.0, "year": 2011}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2011}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2011}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2011}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2011}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2011}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2011}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2011}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2011}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2011}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2011}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2011}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2011}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2011}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2011}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2011}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2011}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2011}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2011}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2011}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2011}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 9.0, "year": 2011}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2011}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2011}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 2.0, "year": 2011}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2011}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 5.0, "year": 2011}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2011}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2011}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2011}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2011}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2011}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2011}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2011}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2011}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2011}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2011}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2011}, {"source": "5", "target": "78", "source_name": "software quality assurance", "target_name": "process improvement", "weight": 1.0, "year": 2011}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2011}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2011}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2011}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 6.0, "year": 2011}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 3.0, "year": 2011}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 22.0, "year": 2011}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2011}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2011}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 6.0, "year": 2011}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 3.0, "year": 2011}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 5.0, "year": 2011}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 15.0, "year": 2011}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 12.0, "year": 2011}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 14.0, "year": 2011}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 18.0, "year": 2011}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2011}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2011}, {"source": "6", "target": "29", "source_name": "software engineer", "target_name": "cloud computing", "weight": 4.0, "year": 2011}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 4.0, "year": 2011}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 304.0, "year": 2011}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 9.0, "year": 2011}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 8.0, "year": 2011}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2011}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2011}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 17.0, "year": 2011}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 5.0, "year": 2011}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 5.0, "year": 2011}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 9.0, "year": 2011}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 9.0, "year": 2011}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 5.0, "year": 2011}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 10.0, "year": 2011}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 4.0, "year": 2011}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 16.0, "year": 2011}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 13.0, "year": 2011}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2011}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2011}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 10.0, "year": 2011}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 12.0, "year": 2011}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2011}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 34.0, "year": 2011}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 31.0, "year": 2011}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2011}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 2.0, "year": 2011}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 9.0, "year": 2011}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2011}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2011}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2011}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2011}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 29.0, "year": 2011}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2011}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2011}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2011}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 5.0, "year": 2011}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 15.0, "year": 2011}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 17.0, "year": 2011}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2011}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 32.0, "year": 2011}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 6.0, "year": 2011}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 29.0, "year": 2011}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 18.0, "year": 2011}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 12.0, "year": 2011}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2011}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 3.0, "year": 2011}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 19.0, "year": 2011}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 12.0, "year": 2011}, {"source": "6", "target": "86", "source_name": "software engineer", "target_name": "systematic mapping", "weight": 1.0, "year": 2011}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2011}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2011}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 52.0, "year": 2011}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2011}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 6.0, "year": 2011}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 7.0, "year": 2011}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 12.0, "year": 2011}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 10.0, "year": 2011}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 3.0, "year": 2011}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 9.0, "year": 2011}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 14.0, "year": 2011}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 29.0, "year": 2011}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 8.0, "year": 2011}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2011}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2011}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2011}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 3.0, "year": 2011}, {"source": "7", "target": "42", "source_name": "quality control", "target_name": "quality assurance", "weight": 1.0, "year": 2011}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2011}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2011}, {"source": "7", "target": "51", "source_name": "quality control", "target_name": "agile software development", "weight": 1.0, "year": 2011}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 3.0, "year": 2011}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 2.0, "year": 2011}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2011}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2011}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2011}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2011}, {"source": "7", "target": "84", "source_name": "quality control", "target_name": "human computation", "weight": 1.0, "year": 2011}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "8", "target": "11", "source_name": "amazon mechanical turk", "target_name": "crowdsourced data", "weight": 1.0, "year": 2011}, {"source": "8", "target": "15", "source_name": "amazon mechanical turk", "target_name": "decision support", "weight": 1.0, "year": 2011}, {"source": "8", "target": "34", "source_name": "amazon mechanical turk", "target_name": "search engines", "weight": 1.0, "year": 2011}, {"source": "8", "target": "36", "source_name": "amazon mechanical turk", "target_name": "open source", "weight": 1.0, "year": 2011}, {"source": "8", "target": "58", "source_name": "amazon mechanical turk", "target_name": "user interface", "weight": 1.0, "year": 2011}, {"source": "8", "target": "77", "source_name": "amazon mechanical turk", "target_name": "mechanical turk", "weight": 2.0, "year": 2011}, {"source": "8", "target": "96", "source_name": "amazon mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2011}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2011}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2011}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2011}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2011}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2011}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2011}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2011}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2011}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2011}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2011}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2011}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 14.0, "year": 2011}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2011}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2011}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 1.0, "year": 2011}, {"source": "10", "target": "37", "source_name": "requirements engineering", "target_name": "controlled experiments", "weight": 1.0, "year": 2011}, {"source": "10", "target": "38", "source_name": "requirements engineering", "target_name": "systematic literature review", "weight": 1.0, "year": 2011}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2011}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2011}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2011}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2011}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2011}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 2.0, "year": 2011}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 2.0, "year": 2011}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2011}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2011}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2011}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2011}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 2.0, "year": 2011}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 1.0, "year": 2011}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2011}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 5.0, "year": 2011}, {"source": "10", "target": "75", "source_name": "requirements engineering", "target_name": "systematic review", "weight": 1.0, "year": 2011}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2011}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2011}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 2.0, "year": 2011}, {"source": "10", "target": "82", "source_name": "requirements engineering", "target_name": "social network", "weight": 1.0, "year": 2011}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2011}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 4.0, "year": 2011}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2011}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2011}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2011}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "10", "target": "102", "source_name": "requirements engineering", "target_name": "product line", "weight": 2.0, "year": 2011}, {"source": "11", "target": "34", "source_name": "crowdsourced data", "target_name": "search engines", "weight": 1.0, "year": 2011}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2011}, {"source": "12", "target": "21", "source_name": "open innovation", "target_name": "problem solving", "weight": 1.0, "year": 2011}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2011}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 3.0, "year": 2011}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 4.0, "year": 2011}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2011}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2011}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2011}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2011}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2011}, {"source": "14", "target": "61", "source_name": "object oriented", "target_name": "extreme programming", "weight": 1.0, "year": 2011}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2011}, {"source": "14", "target": "71", "source_name": "object oriented", "target_name": "software testing", "weight": 1.0, "year": 2011}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2011}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2011}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2011}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2011}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2011}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2011}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2011}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2011}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2011}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2011}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2011}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 2.0, "year": 2011}, {"source": "17", "target": "75", "source_name": "conceptual framework", "target_name": "systematic review", "weight": 1.0, "year": 2011}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2011}, {"source": "17", "target": "93", "source_name": "conceptual framework", "target_name": "literature review", "weight": 1.0, "year": 2011}, {"source": "17", "target": "103", "source_name": "conceptual framework", "target_name": "knowledge base", "weight": 1.0, "year": 2011}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2011}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2011}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2011}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2011}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2011}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 4.0, "year": 2011}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2011}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2011}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2011}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2011}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2011}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2011}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2011}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2011}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2011}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2011}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2011}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2011}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2011}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2011}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "19", "target": "78", "source_name": "configuration management", "target_name": "process improvement", "weight": 1.0, "year": 2011}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2011}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2011}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 5.0, "year": 2011}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 1.0, "year": 2011}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2011}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2011}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 1.0, "year": 2011}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2011}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2011}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2011}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2011}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2011}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2011}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2011}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2011}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 1.0, "year": 2011}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2011}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2011}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2011}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 8.0, "year": 2011}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 2.0, "year": 2011}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2011}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2011}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2011}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 1.0, "year": 2011}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2011}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2011}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2011}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 1.0, "year": 2011}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 2.0, "year": 2011}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2011}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 10.0, "year": 2011}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2011}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2011}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2011}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2011}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 3.0, "year": 2011}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2011}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2011}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2011}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2011}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2011}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2011}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2011}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2011}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2011}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2011}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2011}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2011}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2011}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2011}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2011}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2011}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2011}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2011}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2011}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2011}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2011}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2011}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2011}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2011}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2011}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2011}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2011}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 1.0, "year": 2011}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2011}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 1.0, "year": 2011}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 1.0, "year": 2011}, {"source": "27", "target": "31", "source_name": "social media", "target_name": "software development", "weight": 1.0, "year": 2011}, {"source": "27", "target": "53", "source_name": "social media", "target_name": "big data", "weight": 1.0, "year": 2011}, {"source": "27", "target": "60", "source_name": "social media", "target_name": "collective intelligence", "weight": 1.0, "year": 2011}, {"source": "27", "target": "77", "source_name": "social media", "target_name": "mechanical turk", "weight": 2.0, "year": 2011}, {"source": "27", "target": "79", "source_name": "social media", "target_name": "data management", "weight": 1.0, "year": 2011}, {"source": "27", "target": "84", "source_name": "social media", "target_name": "human computation", "weight": 1.0, "year": 2011}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 3.0, "year": 2011}, {"source": "29", "target": "74", "source_name": "cloud computing", "target_name": "software architecture", "weight": 2.0, "year": 2011}, {"source": "29", "target": "83", "source_name": "cloud computing", "target_name": "lessons learned", "weight": 1.0, "year": 2011}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 2.0, "year": 2011}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2011}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2011}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2011}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2011}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 9.0, "year": 2011}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 3.0, "year": 2011}, {"source": "31", "target": "38", "source_name": "software development", "target_name": "systematic literature review", "weight": 1.0, "year": 2011}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 5.0, "year": 2011}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2011}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2011}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 5.0, "year": 2011}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 1.0, "year": 2011}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 1.0, "year": 2011}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 6.0, "year": 2011}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2011}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 3.0, "year": 2011}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 10.0, "year": 2011}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2011}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 18.0, "year": 2011}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 6.0, "year": 2011}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2011}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 1.0, "year": 2011}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 7.0, "year": 2011}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 11.0, "year": 2011}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2011}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2011}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2011}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 15.0, "year": 2011}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 1.0, "year": 2011}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2011}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 5.0, "year": 2011}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 5.0, "year": 2011}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2011}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 13.0, "year": 2011}, {"source": "31", "target": "75", "source_name": "software development", "target_name": "systematic review", "weight": 2.0, "year": 2011}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 15.0, "year": 2011}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 8.0, "year": 2011}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2011}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2011}, {"source": "31", "target": "82", "source_name": "software development", "target_name": "social network", "weight": 1.0, "year": 2011}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 5.0, "year": 2011}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2011}, {"source": "31", "target": "86", "source_name": "software development", "target_name": "systematic mapping", "weight": 1.0, "year": 2011}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 20.0, "year": 2011}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2011}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 2.0, "year": 2011}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 4.0, "year": 2011}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 5.0, "year": 2011}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 2.0, "year": 2011}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 3.0, "year": 2011}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 4.0, "year": 2011}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 7.0, "year": 2011}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 23.0, "year": 2011}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 3.0, "year": 2011}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2011}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2011}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2011}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2011}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2011}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2011}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2011}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2011}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2011}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2011}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2011}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2011}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2011}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "34", "target": "77", "source_name": "search engines", "target_name": "mechanical turk", "weight": 1.0, "year": 2011}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2011}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 1.0, "year": 2011}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2011}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 1.0, "year": 2011}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2011}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2011}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2011}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2011}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2011}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "36", "target": "77", "source_name": "open source", "target_name": "mechanical turk", "weight": 1.0, "year": 2011}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2011}, {"source": "36", "target": "82", "source_name": "open source", "target_name": "social network", "weight": 1.0, "year": 2011}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 3.0, "year": 2011}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2011}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 13.0, "year": 2011}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "37", "target": "38", "source_name": "controlled experiments", "target_name": "systematic literature review", "weight": 1.0, "year": 2011}, {"source": "37", "target": "75", "source_name": "controlled experiments", "target_name": "systematic review", "weight": 1.0, "year": 2011}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2011}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2011}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 2.0, "year": 2011}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 4.0, "year": 2011}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2011}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2011}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 3.0, "year": 2011}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2011}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2011}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2011}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2011}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2011}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2011}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2011}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2011}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2011}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2011}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2011}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2011}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2011}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2011}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2011}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2011}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 2.0, "year": 2011}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2011}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2011}, {"source": "42", "target": "77", "source_name": "quality assurance", "target_name": "mechanical turk", "weight": 1.0, "year": 2011}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2011}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2011}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 2.0, "year": 2011}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2011}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 1.0, "year": 2011}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2011}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2011}, {"source": "46", "target": "57", "source_name": "empirical studies", "target_name": "human intelligence", "weight": 1.0, "year": 2011}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2011}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2011}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 1.0, "year": 2011}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2011}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2011}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 5.0, "year": 2011}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2011}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2011}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2011}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2011}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2011}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 3.0, "year": 2011}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 7.0, "year": 2011}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2011}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2011}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2011}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2011}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 2.0, "year": 2011}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2011}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2011}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2011}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2011}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2011}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2011}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2011}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2011}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2011}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2011}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2011}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2011}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2011}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2011}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2011}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2011}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 8.0, "year": 2011}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2011}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 3.0, "year": 2011}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 1.0, "year": 2011}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "50", "target": "101", "source_name": "source code", "target_name": "software reuse", "weight": 2.0, "year": 2011}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2011}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2011}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 2.0, "year": 2011}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2011}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2011}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2011}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2011}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2011}, {"source": "53", "target": "60", "source_name": "big data", "target_name": "collective intelligence", "weight": 1.0, "year": 2011}, {"source": "53", "target": "77", "source_name": "big data", "target_name": "mechanical turk", "weight": 1.0, "year": 2011}, {"source": "53", "target": "79", "source_name": "big data", "target_name": "data management", "weight": 1.0, "year": 2011}, {"source": "53", "target": "84", "source_name": "big data", "target_name": "human computation", "weight": 1.0, "year": 2011}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2011}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2011}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2011}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2011}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2011}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2011}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2011}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2011}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2011}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2011}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2011}, {"source": "54", "target": "77", "source_name": "software quality", "target_name": "mechanical turk", "weight": 1.0, "year": 2011}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 3.0, "year": 2011}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2011}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2011}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 2.0, "year": 2011}, {"source": "54", "target": "86", "source_name": "software quality", "target_name": "systematic mapping", "weight": 1.0, "year": 2011}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 3.0, "year": 2011}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2011}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2011}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2011}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2011}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2011}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2011}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2011}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2011}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2011}, {"source": "55", "target": "85", "source_name": "systems engineering", "target_name": "degree programs", "weight": 2.0, "year": 2011}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2011}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2011}, {"source": "55", "target": "102", "source_name": "systems engineering", "target_name": "product line", "weight": 1.0, "year": 2011}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2011}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2011}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2011}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2011}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2011}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2011}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2011}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2011}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2011}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2011}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2011}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2011}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2011}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2011}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2011}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2011}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2011}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2011}, {"source": "58", "target": "84", "source_name": "user interface", "target_name": "human computation", "weight": 1.0, "year": 2011}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 2.0, "year": 2011}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2011}, {"source": "60", "target": "77", "source_name": "collective intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2011}, {"source": "60", "target": "79", "source_name": "collective intelligence", "target_name": "data management", "weight": 1.0, "year": 2011}, {"source": "60", "target": "84", "source_name": "collective intelligence", "target_name": "human computation", "weight": 1.0, "year": 2011}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2011}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 3.0, "year": 2011}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2011}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2011}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2011}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2011}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2011}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2011}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2011}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2011}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2011}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2011}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2011}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2011}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2011}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 1.0, "year": 2011}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 3.0, "year": 2011}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 2.0, "year": 2011}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2011}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2011}, {"source": "66", "target": "82", "source_name": "project management", "target_name": "social network", "weight": 1.0, "year": 2011}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2011}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2011}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2011}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2011}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2011}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2011}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 1.0, "year": 2011}, {"source": "67", "target": "82", "source_name": "machine learning", "target_name": "social network", "weight": 1.0, "year": 2011}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 2.0, "year": 2011}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 2.0, "year": 2011}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2011}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2011}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2011}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2011}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2011}, {"source": "70", "target": "98", "source_name": "decision making", "target_name": "data mining", "weight": 1.0, "year": 2011}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2011}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 2.0, "year": 2011}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2011}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2011}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2011}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2011}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 1.0, "year": 2011}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2011}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2011}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2011}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2011}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2011}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2011}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 2.0, "year": 2011}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 2.0, "year": 2011}, {"source": "74", "target": "83", "source_name": "software architecture", "target_name": "lessons learned", "weight": 1.0, "year": 2011}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2011}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 3.0, "year": 2011}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2011}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 2.0, "year": 2011}, {"source": "75", "target": "103", "source_name": "systematic review", "target_name": "knowledge base", "weight": 1.0, "year": 2011}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2011}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2011}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2011}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2011}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2011}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2011}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2011}, {"source": "77", "target": "79", "source_name": "mechanical turk", "target_name": "data management", "weight": 1.0, "year": 2011}, {"source": "77", "target": "84", "source_name": "mechanical turk", "target_name": "human computation", "weight": 2.0, "year": 2011}, {"source": "77", "target": "96", "source_name": "mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2011}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2011}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2011}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2011}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2011}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2011}, {"source": "79", "target": "84", "source_name": "data management", "target_name": "human computation", "weight": 1.0, "year": 2011}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2011}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2011}, {"source": "82", "target": "98", "source_name": "social network", "target_name": "data mining", "weight": 1.0, "year": 2011}, {"source": "82", "target": "99", "source_name": "social network", "target_name": "requirements elicitation", "weight": 1.0, "year": 2011}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2011}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2011}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 1.0, "year": 2011}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2011}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2011}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2011}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2011}, {"source": "93", "target": "103", "source_name": "literature review", "target_name": "knowledge base", "weight": 1.0, "year": 2011}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2011}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2011}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2011}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2011}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2011}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2011}]}, {"2012": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 3.0, "year": 2012}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2012}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2012}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2012}, {"source": "0", "target": "47", "source_name": "intellectual property", "target_name": "software maintenance", "weight": 1.0, "year": 2012}, {"source": "0", "target": "50", "source_name": "intellectual property", "target_name": "source code", "weight": 1.0, "year": 2012}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 3.0, "year": 2012}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2012}, {"source": "0", "target": "101", "source_name": "intellectual property", "target_name": "software reuse", "weight": 1.0, "year": 2012}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2012}, {"source": "1", "target": "13", "source_name": "natural language", "target_name": "natural language processing", "weight": 1.0, "year": 2012}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2012}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 3.0, "year": 2012}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 1.0, "year": 2012}, {"source": "2", "target": "10", "source_name": "business model", "target_name": "requirements engineering", "weight": 1.0, "year": 2012}, {"source": "2", "target": "12", "source_name": "business model", "target_name": "open innovation", "weight": 1.0, "year": 2012}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 2.0, "year": 2012}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2012}, {"source": "2", "target": "29", "source_name": "business model", "target_name": "cloud computing", "weight": 1.0, "year": 2012}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 2.0, "year": 2012}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 1.0, "year": 2012}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2012}, {"source": "2", "target": "60", "source_name": "business model", "target_name": "collective intelligence", "weight": 1.0, "year": 2012}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2012}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2012}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2012}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2012}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2012}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2012}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2012}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2012}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2012}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2012}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2012}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2012}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2012}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2012}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2012}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2012}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2012}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2012}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2012}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2012}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 9.0, "year": 2012}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2012}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2012}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 2.0, "year": 2012}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2012}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 5.0, "year": 2012}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2012}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2012}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2012}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2012}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2012}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2012}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2012}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2012}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2012}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2012}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2012}, {"source": "5", "target": "78", "source_name": "software quality assurance", "target_name": "process improvement", "weight": 1.0, "year": 2012}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2012}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2012}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2012}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 6.0, "year": 2012}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 3.0, "year": 2012}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 22.0, "year": 2012}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2012}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2012}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 6.0, "year": 2012}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 3.0, "year": 2012}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 5.0, "year": 2012}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 15.0, "year": 2012}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 14.0, "year": 2012}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 14.0, "year": 2012}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 18.0, "year": 2012}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2012}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2012}, {"source": "6", "target": "27", "source_name": "software engineer", "target_name": "social media", "weight": 1.0, "year": 2012}, {"source": "6", "target": "29", "source_name": "software engineer", "target_name": "cloud computing", "weight": 6.0, "year": 2012}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 4.0, "year": 2012}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 311.0, "year": 2012}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 9.0, "year": 2012}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 9.0, "year": 2012}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2012}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2012}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 18.0, "year": 2012}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 5.0, "year": 2012}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 5.0, "year": 2012}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 10.0, "year": 2012}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 9.0, "year": 2012}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 5.0, "year": 2012}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 10.0, "year": 2012}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 4.0, "year": 2012}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 16.0, "year": 2012}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 13.0, "year": 2012}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2012}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2012}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 10.0, "year": 2012}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 12.0, "year": 2012}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2012}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 35.0, "year": 2012}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 31.0, "year": 2012}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2012}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 3.0, "year": 2012}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 9.0, "year": 2012}, {"source": "6", "target": "60", "source_name": "software engineer", "target_name": "collective intelligence", "weight": 1.0, "year": 2012}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2012}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2012}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2012}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2012}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 30.0, "year": 2012}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2012}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2012}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2012}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 5.0, "year": 2012}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 15.0, "year": 2012}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 17.0, "year": 2012}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2012}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 32.0, "year": 2012}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 6.0, "year": 2012}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 30.0, "year": 2012}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 18.0, "year": 2012}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 12.0, "year": 2012}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2012}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 4.0, "year": 2012}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 19.0, "year": 2012}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 12.0, "year": 2012}, {"source": "6", "target": "86", "source_name": "software engineer", "target_name": "systematic mapping", "weight": 1.0, "year": 2012}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2012}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2012}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 52.0, "year": 2012}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2012}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 6.0, "year": 2012}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 7.0, "year": 2012}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 13.0, "year": 2012}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 11.0, "year": 2012}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 3.0, "year": 2012}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 9.0, "year": 2012}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 14.0, "year": 2012}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 29.0, "year": 2012}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 8.0, "year": 2012}, {"source": "7", "target": "8", "source_name": "quality control", "target_name": "amazon mechanical turk", "weight": 1.0, "year": 2012}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2012}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2012}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2012}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 3.0, "year": 2012}, {"source": "7", "target": "42", "source_name": "quality control", "target_name": "quality assurance", "weight": 1.0, "year": 2012}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2012}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2012}, {"source": "7", "target": "51", "source_name": "quality control", "target_name": "agile software development", "weight": 1.0, "year": 2012}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 3.0, "year": 2012}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 2.0, "year": 2012}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2012}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2012}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2012}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2012}, {"source": "7", "target": "84", "source_name": "quality control", "target_name": "human computation", "weight": 1.0, "year": 2012}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "8", "target": "11", "source_name": "amazon mechanical turk", "target_name": "crowdsourced data", "weight": 1.0, "year": 2012}, {"source": "8", "target": "15", "source_name": "amazon mechanical turk", "target_name": "decision support", "weight": 1.0, "year": 2012}, {"source": "8", "target": "26", "source_name": "amazon mechanical turk", "target_name": "business process", "weight": 2.0, "year": 2012}, {"source": "8", "target": "34", "source_name": "amazon mechanical turk", "target_name": "search engines", "weight": 1.0, "year": 2012}, {"source": "8", "target": "36", "source_name": "amazon mechanical turk", "target_name": "open source", "weight": 1.0, "year": 2012}, {"source": "8", "target": "58", "source_name": "amazon mechanical turk", "target_name": "user interface", "weight": 1.0, "year": 2012}, {"source": "8", "target": "77", "source_name": "amazon mechanical turk", "target_name": "mechanical turk", "weight": 5.0, "year": 2012}, {"source": "8", "target": "82", "source_name": "amazon mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2012}, {"source": "8", "target": "96", "source_name": "amazon mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2012}, {"source": "9", "target": "11", "source_name": "data collection", "target_name": "crowdsourced data", "weight": 2.0, "year": 2012}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2012}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2012}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2012}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2012}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2012}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2012}, {"source": "9", "target": "75", "source_name": "data collection", "target_name": "systematic review", "weight": 1.0, "year": 2012}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2012}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2012}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2012}, {"source": "10", "target": "20", "source_name": "requirements engineering", "target_name": "information technology", "weight": 1.0, "year": 2012}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2012}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2012}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 14.0, "year": 2012}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2012}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2012}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 1.0, "year": 2012}, {"source": "10", "target": "37", "source_name": "requirements engineering", "target_name": "controlled experiments", "weight": 1.0, "year": 2012}, {"source": "10", "target": "38", "source_name": "requirements engineering", "target_name": "systematic literature review", "weight": 1.0, "year": 2012}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2012}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2012}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2012}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2012}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2012}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 2.0, "year": 2012}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 2.0, "year": 2012}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2012}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2012}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2012}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2012}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 2.0, "year": 2012}, {"source": "10", "target": "70", "source_name": "requirements engineering", "target_name": "decision making", "weight": 1.0, "year": 2012}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 1.0, "year": 2012}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2012}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 5.0, "year": 2012}, {"source": "10", "target": "75", "source_name": "requirements engineering", "target_name": "systematic review", "weight": 1.0, "year": 2012}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2012}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2012}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 2.0, "year": 2012}, {"source": "10", "target": "82", "source_name": "requirements engineering", "target_name": "social network", "weight": 1.0, "year": 2012}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2012}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 4.0, "year": 2012}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2012}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2012}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2012}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "10", "target": "102", "source_name": "requirements engineering", "target_name": "product line", "weight": 2.0, "year": 2012}, {"source": "11", "target": "34", "source_name": "crowdsourced data", "target_name": "search engines", "weight": 1.0, "year": 2012}, {"source": "11", "target": "75", "source_name": "crowdsourced data", "target_name": "systematic review", "weight": 1.0, "year": 2012}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2012}, {"source": "12", "target": "21", "source_name": "open innovation", "target_name": "problem solving", "weight": 1.0, "year": 2012}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2012}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 3.0, "year": 2012}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 4.0, "year": 2012}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2012}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2012}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2012}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2012}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2012}, {"source": "14", "target": "61", "source_name": "object oriented", "target_name": "extreme programming", "weight": 1.0, "year": 2012}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2012}, {"source": "14", "target": "71", "source_name": "object oriented", "target_name": "software testing", "weight": 1.0, "year": 2012}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2012}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2012}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2012}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2012}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2012}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2012}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2012}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2012}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2012}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2012}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2012}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 2.0, "year": 2012}, {"source": "17", "target": "75", "source_name": "conceptual framework", "target_name": "systematic review", "weight": 1.0, "year": 2012}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2012}, {"source": "17", "target": "93", "source_name": "conceptual framework", "target_name": "literature review", "weight": 2.0, "year": 2012}, {"source": "17", "target": "103", "source_name": "conceptual framework", "target_name": "knowledge base", "weight": 1.0, "year": 2012}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2012}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2012}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2012}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2012}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2012}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 4.0, "year": 2012}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2012}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2012}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2012}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2012}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2012}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2012}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2012}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2012}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2012}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2012}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2012}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2012}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2012}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2012}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "19", "target": "78", "source_name": "configuration management", "target_name": "process improvement", "weight": 1.0, "year": 2012}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2012}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2012}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 6.0, "year": 2012}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 2.0, "year": 2012}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2012}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2012}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 2.0, "year": 2012}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2012}, {"source": "20", "target": "57", "source_name": "information technology", "target_name": "human intelligence", "weight": 1.0, "year": 2012}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2012}, {"source": "20", "target": "60", "source_name": "information technology", "target_name": "collective intelligence", "weight": 1.0, "year": 2012}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2012}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2012}, {"source": "20", "target": "70", "source_name": "information technology", "target_name": "decision making", "weight": 1.0, "year": 2012}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2012}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2012}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2012}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2012}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 2.0, "year": 2012}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2012}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2012}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2012}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 8.0, "year": 2012}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 2.0, "year": 2012}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2012}, {"source": "21", "target": "39", "source_name": "problem solving", "target_name": "team members", "weight": 1.0, "year": 2012}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2012}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2012}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 1.0, "year": 2012}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2012}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 2.0, "year": 2012}, {"source": "21", "target": "69", "source_name": "problem solving", "target_name": "computational intelligence", "weight": 1.0, "year": 2012}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2012}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2012}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 1.0, "year": 2012}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 2.0, "year": 2012}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2012}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 10.0, "year": 2012}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2012}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2012}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2012}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2012}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 3.0, "year": 2012}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2012}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2012}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2012}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2012}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2012}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2012}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2012}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2012}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2012}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2012}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2012}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2012}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2012}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2012}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2012}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2012}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2012}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2012}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2012}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2012}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2012}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2012}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2012}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2012}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2012}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2012}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2012}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "25", "target": "46", "source_name": "motivational factors", "target_name": "empirical studies", "weight": 1.0, "year": 2012}, {"source": "25", "target": "93", "source_name": "motivational factors", "target_name": "literature review", "weight": 1.0, "year": 2012}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 1.0, "year": 2012}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2012}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 1.0, "year": 2012}, {"source": "26", "target": "77", "source_name": "business process", "target_name": "mechanical turk", "weight": 1.0, "year": 2012}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 1.0, "year": 2012}, {"source": "27", "target": "31", "source_name": "social media", "target_name": "software development", "weight": 3.0, "year": 2012}, {"source": "27", "target": "36", "source_name": "social media", "target_name": "open source", "weight": 1.0, "year": 2012}, {"source": "27", "target": "38", "source_name": "social media", "target_name": "systematic literature review", "weight": 1.0, "year": 2012}, {"source": "27", "target": "53", "source_name": "social media", "target_name": "big data", "weight": 1.0, "year": 2012}, {"source": "27", "target": "58", "source_name": "social media", "target_name": "user interface", "weight": 1.0, "year": 2012}, {"source": "27", "target": "60", "source_name": "social media", "target_name": "collective intelligence", "weight": 1.0, "year": 2012}, {"source": "27", "target": "77", "source_name": "social media", "target_name": "mechanical turk", "weight": 2.0, "year": 2012}, {"source": "27", "target": "79", "source_name": "social media", "target_name": "data management", "weight": 1.0, "year": 2012}, {"source": "27", "target": "82", "source_name": "social media", "target_name": "social network", "weight": 1.0, "year": 2012}, {"source": "27", "target": "84", "source_name": "social media", "target_name": "human computation", "weight": 1.0, "year": 2012}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 3.0, "year": 2012}, {"source": "29", "target": "42", "source_name": "cloud computing", "target_name": "quality assurance", "weight": 1.0, "year": 2012}, {"source": "29", "target": "71", "source_name": "cloud computing", "target_name": "software testing", "weight": 1.0, "year": 2012}, {"source": "29", "target": "74", "source_name": "cloud computing", "target_name": "software architecture", "weight": 2.0, "year": 2012}, {"source": "29", "target": "83", "source_name": "cloud computing", "target_name": "lessons learned", "weight": 1.0, "year": 2012}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 2.0, "year": 2012}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2012}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2012}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2012}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2012}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 11.0, "year": 2012}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 3.0, "year": 2012}, {"source": "31", "target": "38", "source_name": "software development", "target_name": "systematic literature review", "weight": 1.0, "year": 2012}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 6.0, "year": 2012}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2012}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2012}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 7.0, "year": 2012}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 1.0, "year": 2012}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 1.0, "year": 2012}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 6.0, "year": 2012}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2012}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 3.0, "year": 2012}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 10.0, "year": 2012}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2012}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 20.0, "year": 2012}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 6.0, "year": 2012}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2012}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 2.0, "year": 2012}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 7.0, "year": 2012}, {"source": "31", "target": "60", "source_name": "software development", "target_name": "collective intelligence", "weight": 1.0, "year": 2012}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 11.0, "year": 2012}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2012}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2012}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2012}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 15.0, "year": 2012}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 1.0, "year": 2012}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2012}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 5.0, "year": 2012}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 5.0, "year": 2012}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2012}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 13.0, "year": 2012}, {"source": "31", "target": "75", "source_name": "software development", "target_name": "systematic review", "weight": 2.0, "year": 2012}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 16.0, "year": 2012}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 8.0, "year": 2012}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2012}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2012}, {"source": "31", "target": "82", "source_name": "software development", "target_name": "social network", "weight": 1.0, "year": 2012}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 5.0, "year": 2012}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2012}, {"source": "31", "target": "86", "source_name": "software development", "target_name": "systematic mapping", "weight": 1.0, "year": 2012}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 20.0, "year": 2012}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2012}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 2.0, "year": 2012}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 4.0, "year": 2012}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 6.0, "year": 2012}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 3.0, "year": 2012}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 3.0, "year": 2012}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 4.0, "year": 2012}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 7.0, "year": 2012}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 23.0, "year": 2012}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 3.0, "year": 2012}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2012}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2012}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2012}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2012}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2012}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2012}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2012}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2012}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2012}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2012}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2012}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2012}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2012}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "34", "target": "65", "source_name": "search engines", "target_name": "web search", "weight": 2.0, "year": 2012}, {"source": "34", "target": "77", "source_name": "search engines", "target_name": "mechanical turk", "weight": 1.0, "year": 2012}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2012}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 1.0, "year": 2012}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2012}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 1.0, "year": 2012}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2012}, {"source": "36", "target": "57", "source_name": "open source", "target_name": "human intelligence", "weight": 1.0, "year": 2012}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2012}, {"source": "36", "target": "60", "source_name": "open source", "target_name": "collective intelligence", "weight": 1.0, "year": 2012}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2012}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2012}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2012}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "36", "target": "77", "source_name": "open source", "target_name": "mechanical turk", "weight": 2.0, "year": 2012}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2012}, {"source": "36", "target": "82", "source_name": "open source", "target_name": "social network", "weight": 1.0, "year": 2012}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 3.0, "year": 2012}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2012}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 14.0, "year": 2012}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "37", "target": "38", "source_name": "controlled experiments", "target_name": "systematic literature review", "weight": 1.0, "year": 2012}, {"source": "37", "target": "75", "source_name": "controlled experiments", "target_name": "systematic review", "weight": 1.0, "year": 2012}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2012}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2012}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 2.0, "year": 2012}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 4.0, "year": 2012}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2012}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2012}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 4.0, "year": 2012}, {"source": "39", "target": "69", "source_name": "team members", "target_name": "computational intelligence", "weight": 1.0, "year": 2012}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2012}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2012}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2012}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2012}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2012}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2012}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2012}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2012}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2012}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2012}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2012}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2012}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 5.0, "year": 2012}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2012}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2012}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2012}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2012}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2012}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2012}, {"source": "42", "target": "77", "source_name": "quality assurance", "target_name": "mechanical turk", "weight": 1.0, "year": 2012}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2012}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2012}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 2.0, "year": 2012}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2012}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 1.0, "year": 2012}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2012}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2012}, {"source": "46", "target": "57", "source_name": "empirical studies", "target_name": "human intelligence", "weight": 1.0, "year": 2012}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2012}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2012}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 2.0, "year": 2012}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2012}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2012}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 5.0, "year": 2012}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2012}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2012}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2012}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2012}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2012}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 3.0, "year": 2012}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 7.0, "year": 2012}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2012}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2012}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2012}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2012}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 2.0, "year": 2012}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2012}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2012}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2012}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2012}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2012}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2012}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2012}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2012}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2012}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2012}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2012}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2012}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2012}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2012}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2012}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2012}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 8.0, "year": 2012}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2012}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 3.0, "year": 2012}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 1.0, "year": 2012}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "50", "target": "101", "source_name": "source code", "target_name": "software reuse", "weight": 2.0, "year": 2012}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2012}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2012}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "51", "target": "74", "source_name": "agile software development", "target_name": "software architecture", "weight": 1.0, "year": 2012}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 2.0, "year": 2012}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2012}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2012}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2012}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2012}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2012}, {"source": "53", "target": "60", "source_name": "big data", "target_name": "collective intelligence", "weight": 1.0, "year": 2012}, {"source": "53", "target": "77", "source_name": "big data", "target_name": "mechanical turk", "weight": 1.0, "year": 2012}, {"source": "53", "target": "79", "source_name": "big data", "target_name": "data management", "weight": 1.0, "year": 2012}, {"source": "53", "target": "84", "source_name": "big data", "target_name": "human computation", "weight": 1.0, "year": 2012}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2012}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2012}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2012}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2012}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2012}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2012}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2012}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2012}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2012}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2012}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2012}, {"source": "54", "target": "77", "source_name": "software quality", "target_name": "mechanical turk", "weight": 1.0, "year": 2012}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 3.0, "year": 2012}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2012}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2012}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 2.0, "year": 2012}, {"source": "54", "target": "86", "source_name": "software quality", "target_name": "systematic mapping", "weight": 1.0, "year": 2012}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 3.0, "year": 2012}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2012}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2012}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2012}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2012}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2012}, {"source": "55", "target": "67", "source_name": "systems engineering", "target_name": "machine learning", "weight": 1.0, "year": 2012}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2012}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2012}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2012}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2012}, {"source": "55", "target": "85", "source_name": "systems engineering", "target_name": "degree programs", "weight": 2.0, "year": 2012}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2012}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2012}, {"source": "55", "target": "102", "source_name": "systems engineering", "target_name": "product line", "weight": 1.0, "year": 2012}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2012}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2012}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2012}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2012}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2012}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2012}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2012}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2012}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2012}, {"source": "57", "target": "60", "source_name": "human intelligence", "target_name": "collective intelligence", "weight": 2.0, "year": 2012}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2012}, {"source": "57", "target": "84", "source_name": "human intelligence", "target_name": "human computation", "weight": 1.0, "year": 2012}, {"source": "57", "target": "96", "source_name": "human intelligence", "target_name": "open source software", "weight": 1.0, "year": 2012}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2012}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2012}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2012}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2012}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2012}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2012}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2012}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2012}, {"source": "58", "target": "84", "source_name": "user interface", "target_name": "human computation", "weight": 1.0, "year": 2012}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 2.0, "year": 2012}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2012}, {"source": "60", "target": "77", "source_name": "collective intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2012}, {"source": "60", "target": "79", "source_name": "collective intelligence", "target_name": "data management", "weight": 1.0, "year": 2012}, {"source": "60", "target": "84", "source_name": "collective intelligence", "target_name": "human computation", "weight": 2.0, "year": 2012}, {"source": "60", "target": "96", "source_name": "collective intelligence", "target_name": "open source software", "weight": 1.0, "year": 2012}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2012}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 3.0, "year": 2012}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2012}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2012}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2012}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2012}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2012}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2012}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2012}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2012}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2012}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2012}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2012}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2012}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2012}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 2.0, "year": 2012}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 3.0, "year": 2012}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 2.0, "year": 2012}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2012}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2012}, {"source": "66", "target": "82", "source_name": "project management", "target_name": "social network", "weight": 1.0, "year": 2012}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2012}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2012}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2012}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2012}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2012}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2012}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 1.0, "year": 2012}, {"source": "67", "target": "82", "source_name": "machine learning", "target_name": "social network", "weight": 1.0, "year": 2012}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 2.0, "year": 2012}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 2.0, "year": 2012}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2012}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2012}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2012}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2012}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2012}, {"source": "70", "target": "96", "source_name": "decision making", "target_name": "open source software", "weight": 1.0, "year": 2012}, {"source": "70", "target": "98", "source_name": "decision making", "target_name": "data mining", "weight": 1.0, "year": 2012}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2012}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 2.0, "year": 2012}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2012}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2012}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2012}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2012}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 1.0, "year": 2012}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2012}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2012}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2012}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2012}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2012}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2012}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 2.0, "year": 2012}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 2.0, "year": 2012}, {"source": "74", "target": "83", "source_name": "software architecture", "target_name": "lessons learned", "weight": 1.0, "year": 2012}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2012}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 3.0, "year": 2012}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2012}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 2.0, "year": 2012}, {"source": "75", "target": "103", "source_name": "systematic review", "target_name": "knowledge base", "weight": 1.0, "year": 2012}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2012}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2012}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2012}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2012}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2012}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2012}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2012}, {"source": "77", "target": "79", "source_name": "mechanical turk", "target_name": "data management", "weight": 1.0, "year": 2012}, {"source": "77", "target": "82", "source_name": "mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2012}, {"source": "77", "target": "84", "source_name": "mechanical turk", "target_name": "human computation", "weight": 2.0, "year": 2012}, {"source": "77", "target": "96", "source_name": "mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2012}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2012}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2012}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2012}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2012}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2012}, {"source": "79", "target": "84", "source_name": "data management", "target_name": "human computation", "weight": 1.0, "year": 2012}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2012}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2012}, {"source": "82", "target": "98", "source_name": "social network", "target_name": "data mining", "weight": 1.0, "year": 2012}, {"source": "82", "target": "99", "source_name": "social network", "target_name": "requirements elicitation", "weight": 1.0, "year": 2012}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2012}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2012}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 1.0, "year": 2012}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2012}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2012}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2012}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2012}, {"source": "93", "target": "103", "source_name": "literature review", "target_name": "knowledge base", "weight": 1.0, "year": 2012}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2012}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2012}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2012}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2012}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2012}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2012}]}, {"2013": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 3.0, "year": 2013}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2013}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2013}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2013}, {"source": "0", "target": "47", "source_name": "intellectual property", "target_name": "software maintenance", "weight": 1.0, "year": 2013}, {"source": "0", "target": "50", "source_name": "intellectual property", "target_name": "source code", "weight": 1.0, "year": 2013}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 3.0, "year": 2013}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2013}, {"source": "0", "target": "101", "source_name": "intellectual property", "target_name": "software reuse", "weight": 1.0, "year": 2013}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2013}, {"source": "1", "target": "13", "source_name": "natural language", "target_name": "natural language processing", "weight": 2.0, "year": 2013}, {"source": "1", "target": "27", "source_name": "natural language", "target_name": "social media", "weight": 1.0, "year": 2013}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2013}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 3.0, "year": 2013}, {"source": "2", "target": "7", "source_name": "business model", "target_name": "quality control", "weight": 1.0, "year": 2013}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 1.0, "year": 2013}, {"source": "2", "target": "10", "source_name": "business model", "target_name": "requirements engineering", "weight": 1.0, "year": 2013}, {"source": "2", "target": "12", "source_name": "business model", "target_name": "open innovation", "weight": 2.0, "year": 2013}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 3.0, "year": 2013}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2013}, {"source": "2", "target": "26", "source_name": "business model", "target_name": "business process", "weight": 3.0, "year": 2013}, {"source": "2", "target": "27", "source_name": "business model", "target_name": "social media", "weight": 1.0, "year": 2013}, {"source": "2", "target": "29", "source_name": "business model", "target_name": "cloud computing", "weight": 1.0, "year": 2013}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 2.0, "year": 2013}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 1.0, "year": 2013}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2013}, {"source": "2", "target": "60", "source_name": "business model", "target_name": "collective intelligence", "weight": 4.0, "year": 2013}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "2", "target": "71", "source_name": "business model", "target_name": "software testing", "weight": 3.0, "year": 2013}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2013}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2013}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2013}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2013}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2013}, {"source": "3", "target": "27", "source_name": "design patterns", "target_name": "social media", "weight": 1.0, "year": 2013}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2013}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2013}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2013}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2013}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2013}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2013}, {"source": "3", "target": "57", "source_name": "design patterns", "target_name": "human intelligence", "weight": 1.0, "year": 2013}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2013}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2013}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2013}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2013}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2013}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2013}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2013}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2013}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 9.0, "year": 2013}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2013}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2013}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 2.0, "year": 2013}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2013}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 5.0, "year": 2013}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2013}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2013}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2013}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2013}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2013}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2013}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2013}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2013}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2013}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2013}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2013}, {"source": "5", "target": "78", "source_name": "software quality assurance", "target_name": "process improvement", "weight": 1.0, "year": 2013}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2013}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2013}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2013}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 6.0, "year": 2013}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 3.0, "year": 2013}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 23.0, "year": 2013}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2013}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2013}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 6.0, "year": 2013}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 3.0, "year": 2013}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 5.0, "year": 2013}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 15.0, "year": 2013}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 14.0, "year": 2013}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 14.0, "year": 2013}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 18.0, "year": 2013}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2013}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2013}, {"source": "6", "target": "27", "source_name": "software engineer", "target_name": "social media", "weight": 1.0, "year": 2013}, {"source": "6", "target": "29", "source_name": "software engineer", "target_name": "cloud computing", "weight": 7.0, "year": 2013}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 4.0, "year": 2013}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 315.0, "year": 2013}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 9.0, "year": 2013}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 10.0, "year": 2013}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2013}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2013}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 18.0, "year": 2013}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 5.0, "year": 2013}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 5.0, "year": 2013}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 10.0, "year": 2013}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 9.0, "year": 2013}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 5.0, "year": 2013}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 10.0, "year": 2013}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 4.0, "year": 2013}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 16.0, "year": 2013}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 13.0, "year": 2013}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2013}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2013}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 10.0, "year": 2013}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 12.0, "year": 2013}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2013}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 36.0, "year": 2013}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 32.0, "year": 2013}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2013}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 3.0, "year": 2013}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 9.0, "year": 2013}, {"source": "6", "target": "60", "source_name": "software engineer", "target_name": "collective intelligence", "weight": 1.0, "year": 2013}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2013}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2013}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2013}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2013}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 30.0, "year": 2013}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2013}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2013}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2013}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 5.0, "year": 2013}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 16.0, "year": 2013}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 17.0, "year": 2013}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2013}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 32.0, "year": 2013}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 6.0, "year": 2013}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 30.0, "year": 2013}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 18.0, "year": 2013}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 12.0, "year": 2013}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2013}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 5.0, "year": 2013}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 19.0, "year": 2013}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 12.0, "year": 2013}, {"source": "6", "target": "86", "source_name": "software engineer", "target_name": "systematic mapping", "weight": 1.0, "year": 2013}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2013}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2013}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 53.0, "year": 2013}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2013}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 6.0, "year": 2013}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 7.0, "year": 2013}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 13.0, "year": 2013}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 11.0, "year": 2013}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 3.0, "year": 2013}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 9.0, "year": 2013}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 14.0, "year": 2013}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 29.0, "year": 2013}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 8.0, "year": 2013}, {"source": "7", "target": "8", "source_name": "quality control", "target_name": "amazon mechanical turk", "weight": 1.0, "year": 2013}, {"source": "7", "target": "13", "source_name": "quality control", "target_name": "natural language processing", "weight": 2.0, "year": 2013}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2013}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2013}, {"source": "7", "target": "21", "source_name": "quality control", "target_name": "problem solving", "weight": 1.0, "year": 2013}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2013}, {"source": "7", "target": "26", "source_name": "quality control", "target_name": "business process", "weight": 1.0, "year": 2013}, {"source": "7", "target": "27", "source_name": "quality control", "target_name": "social media", "weight": 1.0, "year": 2013}, {"source": "7", "target": "29", "source_name": "quality control", "target_name": "cloud computing", "weight": 1.0, "year": 2013}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 3.0, "year": 2013}, {"source": "7", "target": "42", "source_name": "quality control", "target_name": "quality assurance", "weight": 1.0, "year": 2013}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2013}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2013}, {"source": "7", "target": "51", "source_name": "quality control", "target_name": "agile software development", "weight": 1.0, "year": 2013}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 3.0, "year": 2013}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 2.0, "year": 2013}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2013}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "7", "target": "67", "source_name": "quality control", "target_name": "machine learning", "weight": 2.0, "year": 2013}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2013}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2013}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2013}, {"source": "7", "target": "84", "source_name": "quality control", "target_name": "human computation", "weight": 3.0, "year": 2013}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "8", "target": "11", "source_name": "amazon mechanical turk", "target_name": "crowdsourced data", "weight": 1.0, "year": 2013}, {"source": "8", "target": "15", "source_name": "amazon mechanical turk", "target_name": "decision support", "weight": 1.0, "year": 2013}, {"source": "8", "target": "26", "source_name": "amazon mechanical turk", "target_name": "business process", "weight": 2.0, "year": 2013}, {"source": "8", "target": "34", "source_name": "amazon mechanical turk", "target_name": "search engines", "weight": 1.0, "year": 2013}, {"source": "8", "target": "36", "source_name": "amazon mechanical turk", "target_name": "open source", "weight": 1.0, "year": 2013}, {"source": "8", "target": "58", "source_name": "amazon mechanical turk", "target_name": "user interface", "weight": 1.0, "year": 2013}, {"source": "8", "target": "77", "source_name": "amazon mechanical turk", "target_name": "mechanical turk", "weight": 5.0, "year": 2013}, {"source": "8", "target": "82", "source_name": "amazon mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2013}, {"source": "8", "target": "96", "source_name": "amazon mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2013}, {"source": "9", "target": "11", "source_name": "data collection", "target_name": "crowdsourced data", "weight": 2.0, "year": 2013}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2013}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2013}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2013}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2013}, {"source": "9", "target": "45", "source_name": "data collection", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2013}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2013}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2013}, {"source": "9", "target": "75", "source_name": "data collection", "target_name": "systematic review", "weight": 1.0, "year": 2013}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2013}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2013}, {"source": "10", "target": "20", "source_name": "requirements engineering", "target_name": "information technology", "weight": 1.0, "year": 2013}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2013}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2013}, {"source": "10", "target": "29", "source_name": "requirements engineering", "target_name": "cloud computing", "weight": 1.0, "year": 2013}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 15.0, "year": 2013}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2013}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2013}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 1.0, "year": 2013}, {"source": "10", "target": "37", "source_name": "requirements engineering", "target_name": "controlled experiments", "weight": 1.0, "year": 2013}, {"source": "10", "target": "38", "source_name": "requirements engineering", "target_name": "systematic literature review", "weight": 1.0, "year": 2013}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2013}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2013}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2013}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2013}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2013}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 2.0, "year": 2013}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 2.0, "year": 2013}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2013}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2013}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2013}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2013}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 2.0, "year": 2013}, {"source": "10", "target": "70", "source_name": "requirements engineering", "target_name": "decision making", "weight": 1.0, "year": 2013}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 1.0, "year": 2013}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2013}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 5.0, "year": 2013}, {"source": "10", "target": "75", "source_name": "requirements engineering", "target_name": "systematic review", "weight": 1.0, "year": 2013}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2013}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2013}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 2.0, "year": 2013}, {"source": "10", "target": "82", "source_name": "requirements engineering", "target_name": "social network", "weight": 2.0, "year": 2013}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2013}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 5.0, "year": 2013}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2013}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2013}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "10", "target": "102", "source_name": "requirements engineering", "target_name": "product line", "weight": 2.0, "year": 2013}, {"source": "11", "target": "34", "source_name": "crowdsourced data", "target_name": "search engines", "weight": 1.0, "year": 2013}, {"source": "11", "target": "53", "source_name": "crowdsourced data", "target_name": "big data", "weight": 1.0, "year": 2013}, {"source": "11", "target": "75", "source_name": "crowdsourced data", "target_name": "systematic review", "weight": 1.0, "year": 2013}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2013}, {"source": "12", "target": "21", "source_name": "open innovation", "target_name": "problem solving", "weight": 1.0, "year": 2013}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2013}, {"source": "12", "target": "93", "source_name": "open innovation", "target_name": "literature review", "weight": 1.0, "year": 2013}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 3.0, "year": 2013}, {"source": "13", "target": "27", "source_name": "natural language processing", "target_name": "social media", "weight": 1.0, "year": 2013}, {"source": "13", "target": "67", "source_name": "natural language processing", "target_name": "machine learning", "weight": 3.0, "year": 2013}, {"source": "13", "target": "84", "source_name": "natural language processing", "target_name": "human computation", "weight": 2.0, "year": 2013}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 4.0, "year": 2013}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2013}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2013}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2013}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2013}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2013}, {"source": "14", "target": "61", "source_name": "object oriented", "target_name": "extreme programming", "weight": 1.0, "year": 2013}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2013}, {"source": "14", "target": "71", "source_name": "object oriented", "target_name": "software testing", "weight": 1.0, "year": 2013}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2013}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2013}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2013}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2013}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2013}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2013}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2013}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2013}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2013}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2013}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2013}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 2.0, "year": 2013}, {"source": "17", "target": "75", "source_name": "conceptual framework", "target_name": "systematic review", "weight": 1.0, "year": 2013}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2013}, {"source": "17", "target": "93", "source_name": "conceptual framework", "target_name": "literature review", "weight": 2.0, "year": 2013}, {"source": "17", "target": "103", "source_name": "conceptual framework", "target_name": "knowledge base", "weight": 1.0, "year": 2013}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2013}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2013}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2013}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2013}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2013}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 4.0, "year": 2013}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2013}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2013}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2013}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2013}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2013}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2013}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2013}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2013}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2013}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2013}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2013}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2013}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2013}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2013}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "19", "target": "78", "source_name": "configuration management", "target_name": "process improvement", "weight": 1.0, "year": 2013}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2013}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2013}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 6.0, "year": 2013}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 2.0, "year": 2013}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2013}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2013}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 2.0, "year": 2013}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2013}, {"source": "20", "target": "57", "source_name": "information technology", "target_name": "human intelligence", "weight": 1.0, "year": 2013}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2013}, {"source": "20", "target": "60", "source_name": "information technology", "target_name": "collective intelligence", "weight": 1.0, "year": 2013}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2013}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2013}, {"source": "20", "target": "70", "source_name": "information technology", "target_name": "decision making", "weight": 1.0, "year": 2013}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2013}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2013}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2013}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2013}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 2.0, "year": 2013}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2013}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2013}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2013}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 8.0, "year": 2013}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 2.0, "year": 2013}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2013}, {"source": "21", "target": "39", "source_name": "problem solving", "target_name": "team members", "weight": 1.0, "year": 2013}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2013}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2013}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 1.0, "year": 2013}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2013}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 2.0, "year": 2013}, {"source": "21", "target": "69", "source_name": "problem solving", "target_name": "computational intelligence", "weight": 1.0, "year": 2013}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2013}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2013}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 1.0, "year": 2013}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 2.0, "year": 2013}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2013}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 10.0, "year": 2013}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2013}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2013}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2013}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2013}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 3.0, "year": 2013}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2013}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2013}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2013}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2013}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2013}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2013}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2013}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2013}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2013}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2013}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2013}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2013}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2013}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2013}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2013}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2013}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2013}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2013}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2013}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2013}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2013}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2013}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2013}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2013}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2013}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2013}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "25", "target": "31", "source_name": "motivational factors", "target_name": "software development", "weight": 1.0, "year": 2013}, {"source": "25", "target": "46", "source_name": "motivational factors", "target_name": "empirical studies", "weight": 1.0, "year": 2013}, {"source": "25", "target": "93", "source_name": "motivational factors", "target_name": "literature review", "weight": 1.0, "year": 2013}, {"source": "26", "target": "29", "source_name": "business process", "target_name": "cloud computing", "weight": 1.0, "year": 2013}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 2.0, "year": 2013}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2013}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 1.0, "year": 2013}, {"source": "26", "target": "58", "source_name": "business process", "target_name": "user interface", "weight": 1.0, "year": 2013}, {"source": "26", "target": "60", "source_name": "business process", "target_name": "collective intelligence", "weight": 3.0, "year": 2013}, {"source": "26", "target": "70", "source_name": "business process", "target_name": "decision making", "weight": 1.0, "year": 2013}, {"source": "26", "target": "71", "source_name": "business process", "target_name": "software testing", "weight": 3.0, "year": 2013}, {"source": "26", "target": "77", "source_name": "business process", "target_name": "mechanical turk", "weight": 1.0, "year": 2013}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 1.0, "year": 2013}, {"source": "26", "target": "93", "source_name": "business process", "target_name": "literature review", "weight": 1.0, "year": 2013}, {"source": "27", "target": "31", "source_name": "social media", "target_name": "software development", "weight": 3.0, "year": 2013}, {"source": "27", "target": "34", "source_name": "social media", "target_name": "search engines", "weight": 1.0, "year": 2013}, {"source": "27", "target": "36", "source_name": "social media", "target_name": "open source", "weight": 1.0, "year": 2013}, {"source": "27", "target": "38", "source_name": "social media", "target_name": "systematic literature review", "weight": 1.0, "year": 2013}, {"source": "27", "target": "53", "source_name": "social media", "target_name": "big data", "weight": 1.0, "year": 2013}, {"source": "27", "target": "57", "source_name": "social media", "target_name": "human intelligence", "weight": 1.0, "year": 2013}, {"source": "27", "target": "58", "source_name": "social media", "target_name": "user interface", "weight": 1.0, "year": 2013}, {"source": "27", "target": "60", "source_name": "social media", "target_name": "collective intelligence", "weight": 1.0, "year": 2013}, {"source": "27", "target": "77", "source_name": "social media", "target_name": "mechanical turk", "weight": 2.0, "year": 2013}, {"source": "27", "target": "79", "source_name": "social media", "target_name": "data management", "weight": 1.0, "year": 2013}, {"source": "27", "target": "82", "source_name": "social media", "target_name": "social network", "weight": 1.0, "year": 2013}, {"source": "27", "target": "84", "source_name": "social media", "target_name": "human computation", "weight": 1.0, "year": 2013}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 4.0, "year": 2013}, {"source": "29", "target": "42", "source_name": "cloud computing", "target_name": "quality assurance", "weight": 1.0, "year": 2013}, {"source": "29", "target": "71", "source_name": "cloud computing", "target_name": "software testing", "weight": 1.0, "year": 2013}, {"source": "29", "target": "74", "source_name": "cloud computing", "target_name": "software architecture", "weight": 2.0, "year": 2013}, {"source": "29", "target": "83", "source_name": "cloud computing", "target_name": "lessons learned", "weight": 1.0, "year": 2013}, {"source": "29", "target": "91", "source_name": "cloud computing", "target_name": "software design", "weight": 1.0, "year": 2013}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 2.0, "year": 2013}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2013}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2013}, {"source": "31", "target": "33", "source_name": "software development", "target_name": "fundamental principles", "weight": 1.0, "year": 2013}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2013}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2013}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 12.0, "year": 2013}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 3.0, "year": 2013}, {"source": "31", "target": "38", "source_name": "software development", "target_name": "systematic literature review", "weight": 1.0, "year": 2013}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 6.0, "year": 2013}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2013}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2013}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 7.0, "year": 2013}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 1.0, "year": 2013}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 1.0, "year": 2013}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 6.0, "year": 2013}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2013}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 3.0, "year": 2013}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 10.0, "year": 2013}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2013}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 21.0, "year": 2013}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 7.0, "year": 2013}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2013}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 2.0, "year": 2013}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 7.0, "year": 2013}, {"source": "31", "target": "60", "source_name": "software development", "target_name": "collective intelligence", "weight": 1.0, "year": 2013}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 11.0, "year": 2013}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2013}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2013}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2013}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 15.0, "year": 2013}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 1.0, "year": 2013}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2013}, {"source": "31", "target": "70", "source_name": "software development", "target_name": "decision making", "weight": 1.0, "year": 2013}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 5.0, "year": 2013}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 5.0, "year": 2013}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2013}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 13.0, "year": 2013}, {"source": "31", "target": "75", "source_name": "software development", "target_name": "systematic review", "weight": 2.0, "year": 2013}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 16.0, "year": 2013}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 8.0, "year": 2013}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2013}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2013}, {"source": "31", "target": "82", "source_name": "software development", "target_name": "social network", "weight": 1.0, "year": 2013}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 6.0, "year": 2013}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2013}, {"source": "31", "target": "86", "source_name": "software development", "target_name": "systematic mapping", "weight": 1.0, "year": 2013}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 21.0, "year": 2013}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2013}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 3.0, "year": 2013}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 4.0, "year": 2013}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 7.0, "year": 2013}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 3.0, "year": 2013}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 3.0, "year": 2013}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 4.0, "year": 2013}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 7.0, "year": 2013}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 23.0, "year": 2013}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 3.0, "year": 2013}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2013}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2013}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2013}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2013}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2013}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2013}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2013}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2013}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2013}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2013}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2013}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2013}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2013}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "34", "target": "65", "source_name": "search engines", "target_name": "web search", "weight": 3.0, "year": 2013}, {"source": "34", "target": "77", "source_name": "search engines", "target_name": "mechanical turk", "weight": 2.0, "year": 2013}, {"source": "34", "target": "95", "source_name": "search engines", "target_name": "human factors", "weight": 2.0, "year": 2013}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2013}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 1.0, "year": 2013}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2013}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 1.0, "year": 2013}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2013}, {"source": "36", "target": "57", "source_name": "open source", "target_name": "human intelligence", "weight": 1.0, "year": 2013}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2013}, {"source": "36", "target": "60", "source_name": "open source", "target_name": "collective intelligence", "weight": 1.0, "year": 2013}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2013}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2013}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2013}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "36", "target": "77", "source_name": "open source", "target_name": "mechanical turk", "weight": 2.0, "year": 2013}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2013}, {"source": "36", "target": "82", "source_name": "open source", "target_name": "social network", "weight": 1.0, "year": 2013}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 3.0, "year": 2013}, {"source": "36", "target": "93", "source_name": "open source", "target_name": "literature review", "weight": 1.0, "year": 2013}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 17.0, "year": 2013}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "37", "target": "38", "source_name": "controlled experiments", "target_name": "systematic literature review", "weight": 1.0, "year": 2013}, {"source": "37", "target": "75", "source_name": "controlled experiments", "target_name": "systematic review", "weight": 1.0, "year": 2013}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2013}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2013}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 2.0, "year": 2013}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 5.0, "year": 2013}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2013}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2013}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 4.0, "year": 2013}, {"source": "39", "target": "69", "source_name": "team members", "target_name": "computational intelligence", "weight": 1.0, "year": 2013}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2013}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2013}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2013}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2013}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2013}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2013}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2013}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2013}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2013}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2013}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2013}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2013}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 5.0, "year": 2013}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2013}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2013}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2013}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2013}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2013}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2013}, {"source": "42", "target": "77", "source_name": "quality assurance", "target_name": "mechanical turk", "weight": 1.0, "year": 2013}, {"source": "42", "target": "84", "source_name": "quality assurance", "target_name": "human computation", "weight": 1.0, "year": 2013}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2013}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2013}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 2.0, "year": 2013}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2013}, {"source": "44", "target": "54", "source_name": "empirical study", "target_name": "software quality", "weight": 1.0, "year": 2013}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 2.0, "year": 2013}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2013}, {"source": "46", "target": "57", "source_name": "empirical studies", "target_name": "human intelligence", "weight": 1.0, "year": 2013}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2013}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2013}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 2.0, "year": 2013}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2013}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 5.0, "year": 2013}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2013}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2013}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2013}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2013}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2013}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 3.0, "year": 2013}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 7.0, "year": 2013}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2013}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2013}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2013}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2013}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 2.0, "year": 2013}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2013}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2013}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2013}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2013}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2013}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2013}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2013}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2013}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2013}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2013}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2013}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2013}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2013}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2013}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2013}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2013}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 8.0, "year": 2013}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2013}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 3.0, "year": 2013}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 1.0, "year": 2013}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "50", "target": "101", "source_name": "source code", "target_name": "software reuse", "weight": 2.0, "year": 2013}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2013}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2013}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "51", "target": "74", "source_name": "agile software development", "target_name": "software architecture", "weight": 1.0, "year": 2013}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 2.0, "year": 2013}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2013}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2013}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2013}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2013}, {"source": "53", "target": "60", "source_name": "big data", "target_name": "collective intelligence", "weight": 1.0, "year": 2013}, {"source": "53", "target": "77", "source_name": "big data", "target_name": "mechanical turk", "weight": 1.0, "year": 2013}, {"source": "53", "target": "79", "source_name": "big data", "target_name": "data management", "weight": 1.0, "year": 2013}, {"source": "53", "target": "84", "source_name": "big data", "target_name": "human computation", "weight": 1.0, "year": 2013}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2013}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2013}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2013}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2013}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2013}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2013}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2013}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2013}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2013}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2013}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2013}, {"source": "54", "target": "77", "source_name": "software quality", "target_name": "mechanical turk", "weight": 1.0, "year": 2013}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 3.0, "year": 2013}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2013}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2013}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 3.0, "year": 2013}, {"source": "54", "target": "86", "source_name": "software quality", "target_name": "systematic mapping", "weight": 1.0, "year": 2013}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 4.0, "year": 2013}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2013}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2013}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2013}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2013}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2013}, {"source": "55", "target": "67", "source_name": "systems engineering", "target_name": "machine learning", "weight": 1.0, "year": 2013}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2013}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2013}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2013}, {"source": "55", "target": "82", "source_name": "systems engineering", "target_name": "social network", "weight": 1.0, "year": 2013}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2013}, {"source": "55", "target": "85", "source_name": "systems engineering", "target_name": "degree programs", "weight": 2.0, "year": 2013}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2013}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2013}, {"source": "55", "target": "102", "source_name": "systems engineering", "target_name": "product line", "weight": 1.0, "year": 2013}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2013}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2013}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2013}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2013}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2013}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2013}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2013}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2013}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2013}, {"source": "57", "target": "60", "source_name": "human intelligence", "target_name": "collective intelligence", "weight": 2.0, "year": 2013}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2013}, {"source": "57", "target": "77", "source_name": "human intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2013}, {"source": "57", "target": "84", "source_name": "human intelligence", "target_name": "human computation", "weight": 1.0, "year": 2013}, {"source": "57", "target": "96", "source_name": "human intelligence", "target_name": "open source software", "weight": 1.0, "year": 2013}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2013}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2013}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2013}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2013}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2013}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2013}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2013}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2013}, {"source": "58", "target": "84", "source_name": "user interface", "target_name": "human computation", "weight": 1.0, "year": 2013}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 2.0, "year": 2013}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2013}, {"source": "60", "target": "71", "source_name": "collective intelligence", "target_name": "software testing", "weight": 3.0, "year": 2013}, {"source": "60", "target": "77", "source_name": "collective intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2013}, {"source": "60", "target": "79", "source_name": "collective intelligence", "target_name": "data management", "weight": 1.0, "year": 2013}, {"source": "60", "target": "84", "source_name": "collective intelligence", "target_name": "human computation", "weight": 2.0, "year": 2013}, {"source": "60", "target": "96", "source_name": "collective intelligence", "target_name": "open source software", "weight": 1.0, "year": 2013}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2013}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 3.0, "year": 2013}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2013}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2013}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2013}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2013}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2013}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2013}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2013}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2013}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2013}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2013}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2013}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2013}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2013}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 2.0, "year": 2013}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 3.0, "year": 2013}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 2.0, "year": 2013}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2013}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2013}, {"source": "66", "target": "80", "source_name": "project management", "target_name": "information systems", "weight": 1.0, "year": 2013}, {"source": "66", "target": "82", "source_name": "project management", "target_name": "social network", "weight": 1.0, "year": 2013}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2013}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2013}, {"source": "66", "target": "93", "source_name": "project management", "target_name": "literature review", "weight": 1.0, "year": 2013}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2013}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2013}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2013}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 1.0, "year": 2013}, {"source": "67", "target": "82", "source_name": "machine learning", "target_name": "social network", "weight": 1.0, "year": 2013}, {"source": "67", "target": "84", "source_name": "machine learning", "target_name": "human computation", "weight": 2.0, "year": 2013}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 2.0, "year": 2013}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 2.0, "year": 2013}, {"source": "68", "target": "84", "source_name": "service oriented", "target_name": "human computation", "weight": 1.0, "year": 2013}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2013}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2013}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2013}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2013}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2013}, {"source": "70", "target": "96", "source_name": "decision making", "target_name": "open source software", "weight": 1.0, "year": 2013}, {"source": "70", "target": "98", "source_name": "decision making", "target_name": "data mining", "weight": 1.0, "year": 2013}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2013}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 2.0, "year": 2013}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2013}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2013}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2013}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2013}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 1.0, "year": 2013}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2013}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2013}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2013}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2013}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2013}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2013}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 2.0, "year": 2013}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 2.0, "year": 2013}, {"source": "74", "target": "83", "source_name": "software architecture", "target_name": "lessons learned", "weight": 1.0, "year": 2013}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2013}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 3.0, "year": 2013}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2013}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 2.0, "year": 2013}, {"source": "75", "target": "103", "source_name": "systematic review", "target_name": "knowledge base", "weight": 1.0, "year": 2013}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2013}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2013}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2013}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2013}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2013}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2013}, {"source": "77", "target": "79", "source_name": "mechanical turk", "target_name": "data management", "weight": 1.0, "year": 2013}, {"source": "77", "target": "82", "source_name": "mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2013}, {"source": "77", "target": "84", "source_name": "mechanical turk", "target_name": "human computation", "weight": 2.0, "year": 2013}, {"source": "77", "target": "95", "source_name": "mechanical turk", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "77", "target": "96", "source_name": "mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2013}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2013}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2013}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2013}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2013}, {"source": "79", "target": "84", "source_name": "data management", "target_name": "human computation", "weight": 1.0, "year": 2013}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2013}, {"source": "80", "target": "93", "source_name": "information systems", "target_name": "literature review", "weight": 2.0, "year": 2013}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2013}, {"source": "82", "target": "98", "source_name": "social network", "target_name": "data mining", "weight": 1.0, "year": 2013}, {"source": "82", "target": "99", "source_name": "social network", "target_name": "requirements elicitation", "weight": 1.0, "year": 2013}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2013}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2013}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 1.0, "year": 2013}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2013}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2013}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2013}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2013}, {"source": "93", "target": "96", "source_name": "literature review", "target_name": "open source software", "weight": 1.0, "year": 2013}, {"source": "93", "target": "103", "source_name": "literature review", "target_name": "knowledge base", "weight": 1.0, "year": 2013}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2013}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2013}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2013}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2013}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2013}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2013}]}, {"2014": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 3.0, "year": 2014}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2014}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2014}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2014}, {"source": "0", "target": "47", "source_name": "intellectual property", "target_name": "software maintenance", "weight": 1.0, "year": 2014}, {"source": "0", "target": "50", "source_name": "intellectual property", "target_name": "source code", "weight": 1.0, "year": 2014}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 3.0, "year": 2014}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2014}, {"source": "0", "target": "101", "source_name": "intellectual property", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2014}, {"source": "1", "target": "7", "source_name": "natural language", "target_name": "quality control", "weight": 1.0, "year": 2014}, {"source": "1", "target": "13", "source_name": "natural language", "target_name": "natural language processing", "weight": 2.0, "year": 2014}, {"source": "1", "target": "27", "source_name": "natural language", "target_name": "social media", "weight": 1.0, "year": 2014}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2014}, {"source": "1", "target": "45", "source_name": "natural language", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2014}, {"source": "1", "target": "97", "source_name": "natural language", "target_name": "task assignment", "weight": 1.0, "year": 2014}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 3.0, "year": 2014}, {"source": "2", "target": "7", "source_name": "business model", "target_name": "quality control", "weight": 1.0, "year": 2014}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 1.0, "year": 2014}, {"source": "2", "target": "10", "source_name": "business model", "target_name": "requirements engineering", "weight": 1.0, "year": 2014}, {"source": "2", "target": "12", "source_name": "business model", "target_name": "open innovation", "weight": 3.0, "year": 2014}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 3.0, "year": 2014}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2014}, {"source": "2", "target": "26", "source_name": "business model", "target_name": "business process", "weight": 3.0, "year": 2014}, {"source": "2", "target": "27", "source_name": "business model", "target_name": "social media", "weight": 1.0, "year": 2014}, {"source": "2", "target": "29", "source_name": "business model", "target_name": "cloud computing", "weight": 1.0, "year": 2014}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 2.0, "year": 2014}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 1.0, "year": 2014}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2014}, {"source": "2", "target": "60", "source_name": "business model", "target_name": "collective intelligence", "weight": 4.0, "year": 2014}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "2", "target": "71", "source_name": "business model", "target_name": "software testing", "weight": 3.0, "year": 2014}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2014}, {"source": "2", "target": "80", "source_name": "business model", "target_name": "information systems", "weight": 1.0, "year": 2014}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2014}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2014}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2014}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2014}, {"source": "3", "target": "27", "source_name": "design patterns", "target_name": "social media", "weight": 1.0, "year": 2014}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2014}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2014}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2014}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2014}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2014}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2014}, {"source": "3", "target": "57", "source_name": "design patterns", "target_name": "human intelligence", "weight": 1.0, "year": 2014}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2014}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2014}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2014}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2014}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2014}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2014}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2014}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 9.0, "year": 2014}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2014}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2014}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 2.0, "year": 2014}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2014}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 5.0, "year": 2014}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2014}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2014}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2014}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2014}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2014}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2014}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2014}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2014}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2014}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2014}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2014}, {"source": "5", "target": "78", "source_name": "software quality assurance", "target_name": "process improvement", "weight": 1.0, "year": 2014}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2014}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2014}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2014}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 6.0, "year": 2014}, {"source": "6", "target": "8", "source_name": "software engineer", "target_name": "amazon mechanical turk", "weight": 2.0, "year": 2014}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 3.0, "year": 2014}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 24.0, "year": 2014}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2014}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2014}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 7.0, "year": 2014}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 4.0, "year": 2014}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 5.0, "year": 2014}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 15.0, "year": 2014}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 14.0, "year": 2014}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 15.0, "year": 2014}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 18.0, "year": 2014}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2014}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2014}, {"source": "6", "target": "27", "source_name": "software engineer", "target_name": "social media", "weight": 2.0, "year": 2014}, {"source": "6", "target": "29", "source_name": "software engineer", "target_name": "cloud computing", "weight": 8.0, "year": 2014}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 5.0, "year": 2014}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 324.0, "year": 2014}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 9.0, "year": 2014}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 10.0, "year": 2014}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2014}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2014}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 19.0, "year": 2014}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 5.0, "year": 2014}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 5.0, "year": 2014}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 10.0, "year": 2014}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 9.0, "year": 2014}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 5.0, "year": 2014}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 10.0, "year": 2014}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 5.0, "year": 2014}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 17.0, "year": 2014}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 13.0, "year": 2014}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2014}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2014}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 11.0, "year": 2014}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 12.0, "year": 2014}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2014}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 37.0, "year": 2014}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 32.0, "year": 2014}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2014}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 3.0, "year": 2014}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 9.0, "year": 2014}, {"source": "6", "target": "60", "source_name": "software engineer", "target_name": "collective intelligence", "weight": 1.0, "year": 2014}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2014}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2014}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2014}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2014}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 31.0, "year": 2014}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2014}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2014}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2014}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 5.0, "year": 2014}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 19.0, "year": 2014}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 17.0, "year": 2014}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2014}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 33.0, "year": 2014}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 6.0, "year": 2014}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 30.0, "year": 2014}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 18.0, "year": 2014}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 12.0, "year": 2014}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2014}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 7.0, "year": 2014}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 19.0, "year": 2014}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 12.0, "year": 2014}, {"source": "6", "target": "86", "source_name": "software engineer", "target_name": "systematic mapping", "weight": 1.0, "year": 2014}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2014}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2014}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 53.0, "year": 2014}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2014}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 6.0, "year": 2014}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 8.0, "year": 2014}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 14.0, "year": 2014}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 11.0, "year": 2014}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 3.0, "year": 2014}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 9.0, "year": 2014}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 15.0, "year": 2014}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 29.0, "year": 2014}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 8.0, "year": 2014}, {"source": "7", "target": "8", "source_name": "quality control", "target_name": "amazon mechanical turk", "weight": 1.0, "year": 2014}, {"source": "7", "target": "11", "source_name": "quality control", "target_name": "crowdsourced data", "weight": 1.0, "year": 2014}, {"source": "7", "target": "13", "source_name": "quality control", "target_name": "natural language processing", "weight": 2.0, "year": 2014}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2014}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2014}, {"source": "7", "target": "21", "source_name": "quality control", "target_name": "problem solving", "weight": 1.0, "year": 2014}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2014}, {"source": "7", "target": "26", "source_name": "quality control", "target_name": "business process", "weight": 1.0, "year": 2014}, {"source": "7", "target": "27", "source_name": "quality control", "target_name": "social media", "weight": 1.0, "year": 2014}, {"source": "7", "target": "29", "source_name": "quality control", "target_name": "cloud computing", "weight": 1.0, "year": 2014}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 3.0, "year": 2014}, {"source": "7", "target": "42", "source_name": "quality control", "target_name": "quality assurance", "weight": 1.0, "year": 2014}, {"source": "7", "target": "44", "source_name": "quality control", "target_name": "empirical study", "weight": 1.0, "year": 2014}, {"source": "7", "target": "45", "source_name": "quality control", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2014}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2014}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2014}, {"source": "7", "target": "51", "source_name": "quality control", "target_name": "agile software development", "weight": 1.0, "year": 2014}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 3.0, "year": 2014}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 2.0, "year": 2014}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2014}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "7", "target": "67", "source_name": "quality control", "target_name": "machine learning", "weight": 2.0, "year": 2014}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2014}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2014}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2014}, {"source": "7", "target": "84", "source_name": "quality control", "target_name": "human computation", "weight": 3.0, "year": 2014}, {"source": "7", "target": "97", "source_name": "quality control", "target_name": "task assignment", "weight": 1.0, "year": 2014}, {"source": "7", "target": "98", "source_name": "quality control", "target_name": "data mining", "weight": 1.0, "year": 2014}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "8", "target": "9", "source_name": "amazon mechanical turk", "target_name": "data collection", "weight": 1.0, "year": 2014}, {"source": "8", "target": "11", "source_name": "amazon mechanical turk", "target_name": "crowdsourced data", "weight": 1.0, "year": 2014}, {"source": "8", "target": "15", "source_name": "amazon mechanical turk", "target_name": "decision support", "weight": 1.0, "year": 2014}, {"source": "8", "target": "26", "source_name": "amazon mechanical turk", "target_name": "business process", "weight": 2.0, "year": 2014}, {"source": "8", "target": "31", "source_name": "amazon mechanical turk", "target_name": "software development", "weight": 1.0, "year": 2014}, {"source": "8", "target": "34", "source_name": "amazon mechanical turk", "target_name": "search engines", "weight": 1.0, "year": 2014}, {"source": "8", "target": "36", "source_name": "amazon mechanical turk", "target_name": "open source", "weight": 1.0, "year": 2014}, {"source": "8", "target": "58", "source_name": "amazon mechanical turk", "target_name": "user interface", "weight": 2.0, "year": 2014}, {"source": "8", "target": "71", "source_name": "amazon mechanical turk", "target_name": "software testing", "weight": 1.0, "year": 2014}, {"source": "8", "target": "77", "source_name": "amazon mechanical turk", "target_name": "mechanical turk", "weight": 7.0, "year": 2014}, {"source": "8", "target": "82", "source_name": "amazon mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2014}, {"source": "8", "target": "84", "source_name": "amazon mechanical turk", "target_name": "human computation", "weight": 1.0, "year": 2014}, {"source": "8", "target": "96", "source_name": "amazon mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2014}, {"source": "9", "target": "11", "source_name": "data collection", "target_name": "crowdsourced data", "weight": 2.0, "year": 2014}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2014}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2014}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2014}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2014}, {"source": "9", "target": "45", "source_name": "data collection", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2014}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2014}, {"source": "9", "target": "58", "source_name": "data collection", "target_name": "user interface", "weight": 1.0, "year": 2014}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2014}, {"source": "9", "target": "75", "source_name": "data collection", "target_name": "systematic review", "weight": 1.0, "year": 2014}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "9", "target": "77", "source_name": "data collection", "target_name": "mechanical turk", "weight": 1.0, "year": 2014}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2014}, {"source": "9", "target": "84", "source_name": "data collection", "target_name": "human computation", "weight": 1.0, "year": 2014}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2014}, {"source": "10", "target": "20", "source_name": "requirements engineering", "target_name": "information technology", "weight": 1.0, "year": 2014}, {"source": "10", "target": "21", "source_name": "requirements engineering", "target_name": "problem solving", "weight": 1.0, "year": 2014}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2014}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2014}, {"source": "10", "target": "29", "source_name": "requirements engineering", "target_name": "cloud computing", "weight": 1.0, "year": 2014}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 16.0, "year": 2014}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2014}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2014}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 1.0, "year": 2014}, {"source": "10", "target": "37", "source_name": "requirements engineering", "target_name": "controlled experiments", "weight": 1.0, "year": 2014}, {"source": "10", "target": "38", "source_name": "requirements engineering", "target_name": "systematic literature review", "weight": 1.0, "year": 2014}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2014}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2014}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2014}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2014}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2014}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 2.0, "year": 2014}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 2.0, "year": 2014}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2014}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2014}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2014}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2014}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 3.0, "year": 2014}, {"source": "10", "target": "70", "source_name": "requirements engineering", "target_name": "decision making", "weight": 1.0, "year": 2014}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 2.0, "year": 2014}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2014}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 6.0, "year": 2014}, {"source": "10", "target": "75", "source_name": "requirements engineering", "target_name": "systematic review", "weight": 1.0, "year": 2014}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2014}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2014}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 2.0, "year": 2014}, {"source": "10", "target": "82", "source_name": "requirements engineering", "target_name": "social network", "weight": 2.0, "year": 2014}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2014}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 5.0, "year": 2014}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2014}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 4.0, "year": 2014}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "10", "target": "101", "source_name": "requirements engineering", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "10", "target": "102", "source_name": "requirements engineering", "target_name": "product line", "weight": 2.0, "year": 2014}, {"source": "11", "target": "34", "source_name": "crowdsourced data", "target_name": "search engines", "weight": 1.0, "year": 2014}, {"source": "11", "target": "44", "source_name": "crowdsourced data", "target_name": "empirical study", "weight": 1.0, "year": 2014}, {"source": "11", "target": "53", "source_name": "crowdsourced data", "target_name": "big data", "weight": 1.0, "year": 2014}, {"source": "11", "target": "75", "source_name": "crowdsourced data", "target_name": "systematic review", "weight": 1.0, "year": 2014}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2014}, {"source": "12", "target": "21", "source_name": "open innovation", "target_name": "problem solving", "weight": 1.0, "year": 2014}, {"source": "12", "target": "31", "source_name": "open innovation", "target_name": "software development", "weight": 1.0, "year": 2014}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2014}, {"source": "12", "target": "93", "source_name": "open innovation", "target_name": "literature review", "weight": 1.0, "year": 2014}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 3.0, "year": 2014}, {"source": "13", "target": "27", "source_name": "natural language processing", "target_name": "social media", "weight": 1.0, "year": 2014}, {"source": "13", "target": "31", "source_name": "natural language processing", "target_name": "software development", "weight": 1.0, "year": 2014}, {"source": "13", "target": "67", "source_name": "natural language processing", "target_name": "machine learning", "weight": 5.0, "year": 2014}, {"source": "13", "target": "84", "source_name": "natural language processing", "target_name": "human computation", "weight": 2.0, "year": 2014}, {"source": "13", "target": "101", "source_name": "natural language processing", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 4.0, "year": 2014}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2014}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2014}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2014}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2014}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2014}, {"source": "14", "target": "61", "source_name": "object oriented", "target_name": "extreme programming", "weight": 1.0, "year": 2014}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2014}, {"source": "14", "target": "71", "source_name": "object oriented", "target_name": "software testing", "weight": 1.0, "year": 2014}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2014}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2014}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2014}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2014}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2014}, {"source": "16", "target": "29", "source_name": "learning environment", "target_name": "cloud computing", "weight": 1.0, "year": 2014}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2014}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2014}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2014}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2014}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2014}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 2.0, "year": 2014}, {"source": "17", "target": "46", "source_name": "conceptual framework", "target_name": "empirical studies", "weight": 1.0, "year": 2014}, {"source": "17", "target": "75", "source_name": "conceptual framework", "target_name": "systematic review", "weight": 1.0, "year": 2014}, {"source": "17", "target": "82", "source_name": "conceptual framework", "target_name": "social network", "weight": 1.0, "year": 2014}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2014}, {"source": "17", "target": "93", "source_name": "conceptual framework", "target_name": "literature review", "weight": 2.0, "year": 2014}, {"source": "17", "target": "103", "source_name": "conceptual framework", "target_name": "knowledge base", "weight": 1.0, "year": 2014}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2014}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2014}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2014}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2014}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2014}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 4.0, "year": 2014}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2014}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2014}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2014}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2014}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2014}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2014}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2014}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2014}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2014}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2014}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2014}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2014}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2014}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2014}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "19", "target": "78", "source_name": "configuration management", "target_name": "process improvement", "weight": 1.0, "year": 2014}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2014}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2014}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 6.0, "year": 2014}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 2.0, "year": 2014}, {"source": "20", "target": "37", "source_name": "information technology", "target_name": "controlled experiments", "weight": 1.0, "year": 2014}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2014}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2014}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 2.0, "year": 2014}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2014}, {"source": "20", "target": "57", "source_name": "information technology", "target_name": "human intelligence", "weight": 1.0, "year": 2014}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2014}, {"source": "20", "target": "60", "source_name": "information technology", "target_name": "collective intelligence", "weight": 1.0, "year": 2014}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2014}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2014}, {"source": "20", "target": "70", "source_name": "information technology", "target_name": "decision making", "weight": 1.0, "year": 2014}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2014}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2014}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2014}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2014}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 2.0, "year": 2014}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2014}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2014}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2014}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 9.0, "year": 2014}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 2.0, "year": 2014}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2014}, {"source": "21", "target": "39", "source_name": "problem solving", "target_name": "team members", "weight": 1.0, "year": 2014}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2014}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2014}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 2.0, "year": 2014}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2014}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 2.0, "year": 2014}, {"source": "21", "target": "69", "source_name": "problem solving", "target_name": "computational intelligence", "weight": 1.0, "year": 2014}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2014}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2014}, {"source": "21", "target": "80", "source_name": "problem solving", "target_name": "information systems", "weight": 1.0, "year": 2014}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 1.0, "year": 2014}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 3.0, "year": 2014}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2014}, {"source": "21", "target": "99", "source_name": "problem solving", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 10.0, "year": 2014}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2014}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2014}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2014}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2014}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 3.0, "year": 2014}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2014}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2014}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2014}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2014}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2014}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2014}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2014}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2014}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2014}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2014}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2014}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2014}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2014}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2014}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2014}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2014}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2014}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2014}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2014}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2014}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2014}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2014}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2014}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2014}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2014}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "25", "target": "31", "source_name": "motivational factors", "target_name": "software development", "weight": 1.0, "year": 2014}, {"source": "25", "target": "46", "source_name": "motivational factors", "target_name": "empirical studies", "weight": 1.0, "year": 2014}, {"source": "25", "target": "93", "source_name": "motivational factors", "target_name": "literature review", "weight": 1.0, "year": 2014}, {"source": "26", "target": "29", "source_name": "business process", "target_name": "cloud computing", "weight": 1.0, "year": 2014}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 2.0, "year": 2014}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2014}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 1.0, "year": 2014}, {"source": "26", "target": "58", "source_name": "business process", "target_name": "user interface", "weight": 1.0, "year": 2014}, {"source": "26", "target": "60", "source_name": "business process", "target_name": "collective intelligence", "weight": 3.0, "year": 2014}, {"source": "26", "target": "70", "source_name": "business process", "target_name": "decision making", "weight": 1.0, "year": 2014}, {"source": "26", "target": "71", "source_name": "business process", "target_name": "software testing", "weight": 3.0, "year": 2014}, {"source": "26", "target": "77", "source_name": "business process", "target_name": "mechanical turk", "weight": 1.0, "year": 2014}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 1.0, "year": 2014}, {"source": "26", "target": "82", "source_name": "business process", "target_name": "social network", "weight": 1.0, "year": 2014}, {"source": "26", "target": "93", "source_name": "business process", "target_name": "literature review", "weight": 2.0, "year": 2014}, {"source": "27", "target": "31", "source_name": "social media", "target_name": "software development", "weight": 3.0, "year": 2014}, {"source": "27", "target": "34", "source_name": "social media", "target_name": "search engines", "weight": 1.0, "year": 2014}, {"source": "27", "target": "36", "source_name": "social media", "target_name": "open source", "weight": 1.0, "year": 2014}, {"source": "27", "target": "38", "source_name": "social media", "target_name": "systematic literature review", "weight": 1.0, "year": 2014}, {"source": "27", "target": "53", "source_name": "social media", "target_name": "big data", "weight": 1.0, "year": 2014}, {"source": "27", "target": "57", "source_name": "social media", "target_name": "human intelligence", "weight": 1.0, "year": 2014}, {"source": "27", "target": "58", "source_name": "social media", "target_name": "user interface", "weight": 1.0, "year": 2014}, {"source": "27", "target": "60", "source_name": "social media", "target_name": "collective intelligence", "weight": 1.0, "year": 2014}, {"source": "27", "target": "77", "source_name": "social media", "target_name": "mechanical turk", "weight": 2.0, "year": 2014}, {"source": "27", "target": "79", "source_name": "social media", "target_name": "data management", "weight": 1.0, "year": 2014}, {"source": "27", "target": "82", "source_name": "social media", "target_name": "social network", "weight": 1.0, "year": 2014}, {"source": "27", "target": "84", "source_name": "social media", "target_name": "human computation", "weight": 1.0, "year": 2014}, {"source": "28", "target": "97", "source_name": "computing elements", "target_name": "task assignment", "weight": 1.0, "year": 2014}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 4.0, "year": 2014}, {"source": "29", "target": "42", "source_name": "cloud computing", "target_name": "quality assurance", "weight": 1.0, "year": 2014}, {"source": "29", "target": "71", "source_name": "cloud computing", "target_name": "software testing", "weight": 2.0, "year": 2014}, {"source": "29", "target": "74", "source_name": "cloud computing", "target_name": "software architecture", "weight": 2.0, "year": 2014}, {"source": "29", "target": "83", "source_name": "cloud computing", "target_name": "lessons learned", "weight": 1.0, "year": 2014}, {"source": "29", "target": "91", "source_name": "cloud computing", "target_name": "software design", "weight": 1.0, "year": 2014}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 2.0, "year": 2014}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2014}, {"source": "30", "target": "96", "source_name": "end users", "target_name": "open source software", "weight": 1.0, "year": 2014}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2014}, {"source": "31", "target": "33", "source_name": "software development", "target_name": "fundamental principles", "weight": 1.0, "year": 2014}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2014}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2014}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 13.0, "year": 2014}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 3.0, "year": 2014}, {"source": "31", "target": "38", "source_name": "software development", "target_name": "systematic literature review", "weight": 1.0, "year": 2014}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 6.0, "year": 2014}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2014}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2014}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 7.0, "year": 2014}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 1.0, "year": 2014}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 2.0, "year": 2014}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 6.0, "year": 2014}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2014}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 5.0, "year": 2014}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 10.0, "year": 2014}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2014}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 23.0, "year": 2014}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 7.0, "year": 2014}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2014}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 2.0, "year": 2014}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 7.0, "year": 2014}, {"source": "31", "target": "60", "source_name": "software development", "target_name": "collective intelligence", "weight": 1.0, "year": 2014}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 11.0, "year": 2014}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2014}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2014}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2014}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 16.0, "year": 2014}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 1.0, "year": 2014}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2014}, {"source": "31", "target": "70", "source_name": "software development", "target_name": "decision making", "weight": 1.0, "year": 2014}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 7.0, "year": 2014}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 5.0, "year": 2014}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2014}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 14.0, "year": 2014}, {"source": "31", "target": "75", "source_name": "software development", "target_name": "systematic review", "weight": 2.0, "year": 2014}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 16.0, "year": 2014}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 8.0, "year": 2014}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2014}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2014}, {"source": "31", "target": "82", "source_name": "software development", "target_name": "social network", "weight": 2.0, "year": 2014}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 6.0, "year": 2014}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2014}, {"source": "31", "target": "86", "source_name": "software development", "target_name": "systematic mapping", "weight": 1.0, "year": 2014}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 21.0, "year": 2014}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2014}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 3.0, "year": 2014}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 5.0, "year": 2014}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 7.0, "year": 2014}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 3.0, "year": 2014}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 3.0, "year": 2014}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 4.0, "year": 2014}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 9.0, "year": 2014}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 23.0, "year": 2014}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 3.0, "year": 2014}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2014}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2014}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2014}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2014}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2014}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2014}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2014}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2014}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2014}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2014}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2014}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2014}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "34", "target": "65", "source_name": "search engines", "target_name": "web search", "weight": 4.0, "year": 2014}, {"source": "34", "target": "77", "source_name": "search engines", "target_name": "mechanical turk", "weight": 2.0, "year": 2014}, {"source": "34", "target": "95", "source_name": "search engines", "target_name": "human factors", "weight": 2.0, "year": 2014}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2014}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 1.0, "year": 2014}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2014}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 1.0, "year": 2014}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2014}, {"source": "36", "target": "57", "source_name": "open source", "target_name": "human intelligence", "weight": 1.0, "year": 2014}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2014}, {"source": "36", "target": "60", "source_name": "open source", "target_name": "collective intelligence", "weight": 1.0, "year": 2014}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2014}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2014}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2014}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "36", "target": "77", "source_name": "open source", "target_name": "mechanical turk", "weight": 2.0, "year": 2014}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2014}, {"source": "36", "target": "82", "source_name": "open source", "target_name": "social network", "weight": 1.0, "year": 2014}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 3.0, "year": 2014}, {"source": "36", "target": "93", "source_name": "open source", "target_name": "literature review", "weight": 1.0, "year": 2014}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 17.0, "year": 2014}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "37", "target": "38", "source_name": "controlled experiments", "target_name": "systematic literature review", "weight": 1.0, "year": 2014}, {"source": "37", "target": "75", "source_name": "controlled experiments", "target_name": "systematic review", "weight": 1.0, "year": 2014}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2014}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2014}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 2.0, "year": 2014}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 5.0, "year": 2014}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2014}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2014}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 4.0, "year": 2014}, {"source": "39", "target": "69", "source_name": "team members", "target_name": "computational intelligence", "weight": 1.0, "year": 2014}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2014}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2014}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2014}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2014}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2014}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2014}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2014}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2014}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2014}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2014}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2014}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2014}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 5.0, "year": 2014}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2014}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2014}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2014}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2014}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2014}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2014}, {"source": "42", "target": "77", "source_name": "quality assurance", "target_name": "mechanical turk", "weight": 1.0, "year": 2014}, {"source": "42", "target": "84", "source_name": "quality assurance", "target_name": "human computation", "weight": 1.0, "year": 2014}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2014}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2014}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 2.0, "year": 2014}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2014}, {"source": "44", "target": "54", "source_name": "empirical study", "target_name": "software quality", "weight": 1.0, "year": 2014}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 2.0, "year": 2014}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "45", "target": "97", "source_name": "spatial crowdsourcing", "target_name": "task assignment", "weight": 1.0, "year": 2014}, {"source": "46", "target": "50", "source_name": "empirical studies", "target_name": "source code", "weight": 1.0, "year": 2014}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2014}, {"source": "46", "target": "57", "source_name": "empirical studies", "target_name": "human intelligence", "weight": 1.0, "year": 2014}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2014}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2014}, {"source": "46", "target": "82", "source_name": "empirical studies", "target_name": "social network", "weight": 1.0, "year": 2014}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 2.0, "year": 2014}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2014}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 5.0, "year": 2014}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2014}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2014}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2014}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2014}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2014}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 3.0, "year": 2014}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 7.0, "year": 2014}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2014}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2014}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2014}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2014}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 2.0, "year": 2014}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2014}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2014}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2014}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2014}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2014}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2014}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2014}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2014}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2014}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2014}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2014}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2014}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2014}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2014}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2014}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 8.0, "year": 2014}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2014}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 3.0, "year": 2014}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 1.0, "year": 2014}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "50", "target": "101", "source_name": "source code", "target_name": "software reuse", "weight": 2.0, "year": 2014}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2014}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2014}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "51", "target": "74", "source_name": "agile software development", "target_name": "software architecture", "weight": 1.0, "year": 2014}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 2.0, "year": 2014}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2014}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2014}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2014}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2014}, {"source": "53", "target": "60", "source_name": "big data", "target_name": "collective intelligence", "weight": 1.0, "year": 2014}, {"source": "53", "target": "77", "source_name": "big data", "target_name": "mechanical turk", "weight": 1.0, "year": 2014}, {"source": "53", "target": "79", "source_name": "big data", "target_name": "data management", "weight": 1.0, "year": 2014}, {"source": "53", "target": "84", "source_name": "big data", "target_name": "human computation", "weight": 1.0, "year": 2014}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2014}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2014}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2014}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2014}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2014}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2014}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2014}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2014}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2014}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2014}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2014}, {"source": "54", "target": "77", "source_name": "software quality", "target_name": "mechanical turk", "weight": 1.0, "year": 2014}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 3.0, "year": 2014}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2014}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2014}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 3.0, "year": 2014}, {"source": "54", "target": "86", "source_name": "software quality", "target_name": "systematic mapping", "weight": 1.0, "year": 2014}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 4.0, "year": 2014}, {"source": "54", "target": "95", "source_name": "software quality", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2014}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2014}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2014}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2014}, {"source": "55", "target": "67", "source_name": "systems engineering", "target_name": "machine learning", "weight": 1.0, "year": 2014}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2014}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2014}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2014}, {"source": "55", "target": "82", "source_name": "systems engineering", "target_name": "social network", "weight": 1.0, "year": 2014}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2014}, {"source": "55", "target": "85", "source_name": "systems engineering", "target_name": "degree programs", "weight": 2.0, "year": 2014}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2014}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2014}, {"source": "55", "target": "102", "source_name": "systems engineering", "target_name": "product line", "weight": 1.0, "year": 2014}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2014}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2014}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2014}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2014}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2014}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2014}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2014}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2014}, {"source": "57", "target": "60", "source_name": "human intelligence", "target_name": "collective intelligence", "weight": 3.0, "year": 2014}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2014}, {"source": "57", "target": "77", "source_name": "human intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2014}, {"source": "57", "target": "84", "source_name": "human intelligence", "target_name": "human computation", "weight": 1.0, "year": 2014}, {"source": "57", "target": "96", "source_name": "human intelligence", "target_name": "open source software", "weight": 1.0, "year": 2014}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2014}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2014}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2014}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2014}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2014}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2014}, {"source": "58", "target": "77", "source_name": "user interface", "target_name": "mechanical turk", "weight": 1.0, "year": 2014}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2014}, {"source": "58", "target": "84", "source_name": "user interface", "target_name": "human computation", "weight": 2.0, "year": 2014}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 2.0, "year": 2014}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2014}, {"source": "59", "target": "67", "source_name": "bug reports", "target_name": "machine learning", "weight": 1.0, "year": 2014}, {"source": "60", "target": "71", "source_name": "collective intelligence", "target_name": "software testing", "weight": 3.0, "year": 2014}, {"source": "60", "target": "77", "source_name": "collective intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2014}, {"source": "60", "target": "79", "source_name": "collective intelligence", "target_name": "data management", "weight": 1.0, "year": 2014}, {"source": "60", "target": "84", "source_name": "collective intelligence", "target_name": "human computation", "weight": 2.0, "year": 2014}, {"source": "60", "target": "96", "source_name": "collective intelligence", "target_name": "open source software", "weight": 1.0, "year": 2014}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2014}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 3.0, "year": 2014}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2014}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2014}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2014}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2014}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2014}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2014}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2014}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2014}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2014}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2014}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2014}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2014}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 2.0, "year": 2014}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 4.0, "year": 2014}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 3.0, "year": 2014}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2014}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2014}, {"source": "66", "target": "80", "source_name": "project management", "target_name": "information systems", "weight": 1.0, "year": 2014}, {"source": "66", "target": "82", "source_name": "project management", "target_name": "social network", "weight": 1.0, "year": 2014}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2014}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2014}, {"source": "66", "target": "93", "source_name": "project management", "target_name": "literature review", "weight": 1.0, "year": 2014}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2014}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "66", "target": "101", "source_name": "project management", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2014}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2014}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 1.0, "year": 2014}, {"source": "67", "target": "82", "source_name": "machine learning", "target_name": "social network", "weight": 1.0, "year": 2014}, {"source": "67", "target": "84", "source_name": "machine learning", "target_name": "human computation", "weight": 2.0, "year": 2014}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 2.0, "year": 2014}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 2.0, "year": 2014}, {"source": "68", "target": "84", "source_name": "service oriented", "target_name": "human computation", "weight": 1.0, "year": 2014}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2014}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2014}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2014}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2014}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2014}, {"source": "70", "target": "96", "source_name": "decision making", "target_name": "open source software", "weight": 1.0, "year": 2014}, {"source": "70", "target": "98", "source_name": "decision making", "target_name": "data mining", "weight": 1.0, "year": 2014}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2014}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 3.0, "year": 2014}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2014}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2014}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2014}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2014}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 2.0, "year": 2014}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2014}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2014}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2014}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2014}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2014}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2014}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 2.0, "year": 2014}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 2.0, "year": 2014}, {"source": "74", "target": "83", "source_name": "software architecture", "target_name": "lessons learned", "weight": 1.0, "year": 2014}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2014}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 4.0, "year": 2014}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2014}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 2.0, "year": 2014}, {"source": "75", "target": "103", "source_name": "systematic review", "target_name": "knowledge base", "weight": 1.0, "year": 2014}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2014}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2014}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2014}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2014}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2014}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2014}, {"source": "77", "target": "79", "source_name": "mechanical turk", "target_name": "data management", "weight": 1.0, "year": 2014}, {"source": "77", "target": "82", "source_name": "mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2014}, {"source": "77", "target": "84", "source_name": "mechanical turk", "target_name": "human computation", "weight": 3.0, "year": 2014}, {"source": "77", "target": "95", "source_name": "mechanical turk", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "77", "target": "96", "source_name": "mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2014}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2014}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2014}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2014}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2014}, {"source": "79", "target": "84", "source_name": "data management", "target_name": "human computation", "weight": 1.0, "year": 2014}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2014}, {"source": "80", "target": "93", "source_name": "information systems", "target_name": "literature review", "weight": 2.0, "year": 2014}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2014}, {"source": "82", "target": "98", "source_name": "social network", "target_name": "data mining", "weight": 1.0, "year": 2014}, {"source": "82", "target": "99", "source_name": "social network", "target_name": "requirements elicitation", "weight": 1.0, "year": 2014}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2014}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2014}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 1.0, "year": 2014}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2014}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2014}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2014}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2014}, {"source": "93", "target": "96", "source_name": "literature review", "target_name": "open source software", "weight": 1.0, "year": 2014}, {"source": "93", "target": "103", "source_name": "literature review", "target_name": "knowledge base", "weight": 1.0, "year": 2014}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2014}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2014}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2014}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2014}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2014}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2014}]}, {"2015": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 3.0, "year": 2015}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2015}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2015}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2015}, {"source": "0", "target": "47", "source_name": "intellectual property", "target_name": "software maintenance", "weight": 1.0, "year": 2015}, {"source": "0", "target": "50", "source_name": "intellectual property", "target_name": "source code", "weight": 1.0, "year": 2015}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 3.0, "year": 2015}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2015}, {"source": "0", "target": "101", "source_name": "intellectual property", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "1", "target": "4", "source_name": "natural language", "target_name": "test report", "weight": 1.0, "year": 2015}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2015}, {"source": "1", "target": "7", "source_name": "natural language", "target_name": "quality control", "weight": 1.0, "year": 2015}, {"source": "1", "target": "13", "source_name": "natural language", "target_name": "natural language processing", "weight": 2.0, "year": 2015}, {"source": "1", "target": "27", "source_name": "natural language", "target_name": "social media", "weight": 1.0, "year": 2015}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2015}, {"source": "1", "target": "44", "source_name": "natural language", "target_name": "empirical study", "weight": 1.0, "year": 2015}, {"source": "1", "target": "45", "source_name": "natural language", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2015}, {"source": "1", "target": "97", "source_name": "natural language", "target_name": "task assignment", "weight": 1.0, "year": 2015}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 4.0, "year": 2015}, {"source": "2", "target": "7", "source_name": "business model", "target_name": "quality control", "weight": 1.0, "year": 2015}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 1.0, "year": 2015}, {"source": "2", "target": "10", "source_name": "business model", "target_name": "requirements engineering", "weight": 1.0, "year": 2015}, {"source": "2", "target": "12", "source_name": "business model", "target_name": "open innovation", "weight": 3.0, "year": 2015}, {"source": "2", "target": "20", "source_name": "business model", "target_name": "information technology", "weight": 1.0, "year": 2015}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 3.0, "year": 2015}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2015}, {"source": "2", "target": "26", "source_name": "business model", "target_name": "business process", "weight": 3.0, "year": 2015}, {"source": "2", "target": "27", "source_name": "business model", "target_name": "social media", "weight": 1.0, "year": 2015}, {"source": "2", "target": "29", "source_name": "business model", "target_name": "cloud computing", "weight": 1.0, "year": 2015}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 2.0, "year": 2015}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 1.0, "year": 2015}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2015}, {"source": "2", "target": "60", "source_name": "business model", "target_name": "collective intelligence", "weight": 4.0, "year": 2015}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "2", "target": "71", "source_name": "business model", "target_name": "software testing", "weight": 3.0, "year": 2015}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2015}, {"source": "2", "target": "80", "source_name": "business model", "target_name": "information systems", "weight": 1.0, "year": 2015}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2015}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2015}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2015}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2015}, {"source": "3", "target": "27", "source_name": "design patterns", "target_name": "social media", "weight": 1.0, "year": 2015}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2015}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2015}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2015}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2015}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2015}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2015}, {"source": "3", "target": "57", "source_name": "design patterns", "target_name": "human intelligence", "weight": 1.0, "year": 2015}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2015}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2015}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2015}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2015}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2015}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2015}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2015}, {"source": "4", "target": "44", "source_name": "test report", "target_name": "empirical study", "weight": 1.0, "year": 2015}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 9.0, "year": 2015}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2015}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2015}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 2.0, "year": 2015}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2015}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 5.0, "year": 2015}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2015}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2015}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2015}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2015}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2015}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2015}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2015}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2015}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2015}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2015}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2015}, {"source": "5", "target": "78", "source_name": "software quality assurance", "target_name": "process improvement", "weight": 1.0, "year": 2015}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2015}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2015}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2015}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 6.0, "year": 2015}, {"source": "6", "target": "8", "source_name": "software engineer", "target_name": "amazon mechanical turk", "weight": 4.0, "year": 2015}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 3.0, "year": 2015}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 24.0, "year": 2015}, {"source": "6", "target": "12", "source_name": "software engineer", "target_name": "open innovation", "weight": 1.0, "year": 2015}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2015}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2015}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 7.0, "year": 2015}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 5.0, "year": 2015}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 5.0, "year": 2015}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 15.0, "year": 2015}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 14.0, "year": 2015}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 15.0, "year": 2015}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 18.0, "year": 2015}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2015}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2015}, {"source": "6", "target": "27", "source_name": "software engineer", "target_name": "social media", "weight": 3.0, "year": 2015}, {"source": "6", "target": "29", "source_name": "software engineer", "target_name": "cloud computing", "weight": 8.0, "year": 2015}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 5.0, "year": 2015}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 329.0, "year": 2015}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 9.0, "year": 2015}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 11.0, "year": 2015}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2015}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2015}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 19.0, "year": 2015}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 5.0, "year": 2015}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 5.0, "year": 2015}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 10.0, "year": 2015}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 9.0, "year": 2015}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 5.0, "year": 2015}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 10.0, "year": 2015}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 5.0, "year": 2015}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 17.0, "year": 2015}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 13.0, "year": 2015}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2015}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2015}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 11.0, "year": 2015}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 12.0, "year": 2015}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2015}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 38.0, "year": 2015}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 32.0, "year": 2015}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2015}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 3.0, "year": 2015}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 10.0, "year": 2015}, {"source": "6", "target": "60", "source_name": "software engineer", "target_name": "collective intelligence", "weight": 1.0, "year": 2015}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2015}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2015}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2015}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2015}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 31.0, "year": 2015}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2015}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2015}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2015}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 5.0, "year": 2015}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 19.0, "year": 2015}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 17.0, "year": 2015}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2015}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 34.0, "year": 2015}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 6.0, "year": 2015}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 30.0, "year": 2015}, {"source": "6", "target": "77", "source_name": "software engineer", "target_name": "mechanical turk", "weight": 2.0, "year": 2015}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 18.0, "year": 2015}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 12.0, "year": 2015}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2015}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 8.0, "year": 2015}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 19.0, "year": 2015}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 12.0, "year": 2015}, {"source": "6", "target": "86", "source_name": "software engineer", "target_name": "systematic mapping", "weight": 1.0, "year": 2015}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2015}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2015}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 54.0, "year": 2015}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2015}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 6.0, "year": 2015}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 8.0, "year": 2015}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 14.0, "year": 2015}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 12.0, "year": 2015}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 3.0, "year": 2015}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 9.0, "year": 2015}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 15.0, "year": 2015}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 29.0, "year": 2015}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 8.0, "year": 2015}, {"source": "7", "target": "8", "source_name": "quality control", "target_name": "amazon mechanical turk", "weight": 1.0, "year": 2015}, {"source": "7", "target": "11", "source_name": "quality control", "target_name": "crowdsourced data", "weight": 1.0, "year": 2015}, {"source": "7", "target": "13", "source_name": "quality control", "target_name": "natural language processing", "weight": 2.0, "year": 2015}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2015}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2015}, {"source": "7", "target": "21", "source_name": "quality control", "target_name": "problem solving", "weight": 1.0, "year": 2015}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2015}, {"source": "7", "target": "26", "source_name": "quality control", "target_name": "business process", "weight": 2.0, "year": 2015}, {"source": "7", "target": "27", "source_name": "quality control", "target_name": "social media", "weight": 1.0, "year": 2015}, {"source": "7", "target": "29", "source_name": "quality control", "target_name": "cloud computing", "weight": 1.0, "year": 2015}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 3.0, "year": 2015}, {"source": "7", "target": "42", "source_name": "quality control", "target_name": "quality assurance", "weight": 1.0, "year": 2015}, {"source": "7", "target": "44", "source_name": "quality control", "target_name": "empirical study", "weight": 1.0, "year": 2015}, {"source": "7", "target": "45", "source_name": "quality control", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2015}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2015}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2015}, {"source": "7", "target": "51", "source_name": "quality control", "target_name": "agile software development", "weight": 1.0, "year": 2015}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 3.0, "year": 2015}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 2.0, "year": 2015}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2015}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "7", "target": "67", "source_name": "quality control", "target_name": "machine learning", "weight": 2.0, "year": 2015}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2015}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2015}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "7", "target": "84", "source_name": "quality control", "target_name": "human computation", "weight": 3.0, "year": 2015}, {"source": "7", "target": "97", "source_name": "quality control", "target_name": "task assignment", "weight": 1.0, "year": 2015}, {"source": "7", "target": "98", "source_name": "quality control", "target_name": "data mining", "weight": 1.0, "year": 2015}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "8", "target": "9", "source_name": "amazon mechanical turk", "target_name": "data collection", "weight": 3.0, "year": 2015}, {"source": "8", "target": "11", "source_name": "amazon mechanical turk", "target_name": "crowdsourced data", "weight": 1.0, "year": 2015}, {"source": "8", "target": "15", "source_name": "amazon mechanical turk", "target_name": "decision support", "weight": 1.0, "year": 2015}, {"source": "8", "target": "26", "source_name": "amazon mechanical turk", "target_name": "business process", "weight": 4.0, "year": 2015}, {"source": "8", "target": "27", "source_name": "amazon mechanical turk", "target_name": "social media", "weight": 1.0, "year": 2015}, {"source": "8", "target": "31", "source_name": "amazon mechanical turk", "target_name": "software development", "weight": 3.0, "year": 2015}, {"source": "8", "target": "34", "source_name": "amazon mechanical turk", "target_name": "search engines", "weight": 2.0, "year": 2015}, {"source": "8", "target": "36", "source_name": "amazon mechanical turk", "target_name": "open source", "weight": 1.0, "year": 2015}, {"source": "8", "target": "54", "source_name": "amazon mechanical turk", "target_name": "software quality", "weight": 1.0, "year": 2015}, {"source": "8", "target": "58", "source_name": "amazon mechanical turk", "target_name": "user interface", "weight": 3.0, "year": 2015}, {"source": "8", "target": "60", "source_name": "amazon mechanical turk", "target_name": "collective intelligence", "weight": 1.0, "year": 2015}, {"source": "8", "target": "71", "source_name": "amazon mechanical turk", "target_name": "software testing", "weight": 1.0, "year": 2015}, {"source": "8", "target": "76", "source_name": "amazon mechanical turk", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "8", "target": "77", "source_name": "amazon mechanical turk", "target_name": "mechanical turk", "weight": 13.0, "year": 2015}, {"source": "8", "target": "80", "source_name": "amazon mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2015}, {"source": "8", "target": "82", "source_name": "amazon mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2015}, {"source": "8", "target": "83", "source_name": "amazon mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "8", "target": "84", "source_name": "amazon mechanical turk", "target_name": "human computation", "weight": 2.0, "year": 2015}, {"source": "8", "target": "91", "source_name": "amazon mechanical turk", "target_name": "software design", "weight": 1.0, "year": 2015}, {"source": "8", "target": "96", "source_name": "amazon mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2015}, {"source": "9", "target": "11", "source_name": "data collection", "target_name": "crowdsourced data", "weight": 2.0, "year": 2015}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2015}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2015}, {"source": "9", "target": "26", "source_name": "data collection", "target_name": "business process", "weight": 1.0, "year": 2015}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2015}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2015}, {"source": "9", "target": "45", "source_name": "data collection", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2015}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2015}, {"source": "9", "target": "58", "source_name": "data collection", "target_name": "user interface", "weight": 1.0, "year": 2015}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2015}, {"source": "9", "target": "75", "source_name": "data collection", "target_name": "systematic review", "weight": 1.0, "year": 2015}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "9", "target": "77", "source_name": "data collection", "target_name": "mechanical turk", "weight": 2.0, "year": 2015}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2015}, {"source": "9", "target": "80", "source_name": "data collection", "target_name": "information systems", "weight": 1.0, "year": 2015}, {"source": "9", "target": "84", "source_name": "data collection", "target_name": "human computation", "weight": 2.0, "year": 2015}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2015}, {"source": "10", "target": "20", "source_name": "requirements engineering", "target_name": "information technology", "weight": 1.0, "year": 2015}, {"source": "10", "target": "21", "source_name": "requirements engineering", "target_name": "problem solving", "weight": 1.0, "year": 2015}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2015}, {"source": "10", "target": "24", "source_name": "requirements engineering", "target_name": "requirements analysis", "weight": 1.0, "year": 2015}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2015}, {"source": "10", "target": "29", "source_name": "requirements engineering", "target_name": "cloud computing", "weight": 1.0, "year": 2015}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 16.0, "year": 2015}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2015}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2015}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 1.0, "year": 2015}, {"source": "10", "target": "37", "source_name": "requirements engineering", "target_name": "controlled experiments", "weight": 1.0, "year": 2015}, {"source": "10", "target": "38", "source_name": "requirements engineering", "target_name": "systematic literature review", "weight": 1.0, "year": 2015}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2015}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2015}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2015}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2015}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2015}, {"source": "10", "target": "53", "source_name": "requirements engineering", "target_name": "big data", "weight": 1.0, "year": 2015}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 2.0, "year": 2015}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 2.0, "year": 2015}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2015}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2015}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2015}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2015}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 3.0, "year": 2015}, {"source": "10", "target": "70", "source_name": "requirements engineering", "target_name": "decision making", "weight": 1.0, "year": 2015}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 2.0, "year": 2015}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2015}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 6.0, "year": 2015}, {"source": "10", "target": "75", "source_name": "requirements engineering", "target_name": "systematic review", "weight": 1.0, "year": 2015}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2015}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2015}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 2.0, "year": 2015}, {"source": "10", "target": "82", "source_name": "requirements engineering", "target_name": "social network", "weight": 2.0, "year": 2015}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2015}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 5.0, "year": 2015}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2015}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 6.0, "year": 2015}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "10", "target": "101", "source_name": "requirements engineering", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "10", "target": "102", "source_name": "requirements engineering", "target_name": "product line", "weight": 2.0, "year": 2015}, {"source": "11", "target": "34", "source_name": "crowdsourced data", "target_name": "search engines", "weight": 2.0, "year": 2015}, {"source": "11", "target": "44", "source_name": "crowdsourced data", "target_name": "empirical study", "weight": 1.0, "year": 2015}, {"source": "11", "target": "53", "source_name": "crowdsourced data", "target_name": "big data", "weight": 1.0, "year": 2015}, {"source": "11", "target": "75", "source_name": "crowdsourced data", "target_name": "systematic review", "weight": 1.0, "year": 2015}, {"source": "11", "target": "77", "source_name": "crowdsourced data", "target_name": "mechanical turk", "weight": 1.0, "year": 2015}, {"source": "11", "target": "79", "source_name": "crowdsourced data", "target_name": "data management", "weight": 1.0, "year": 2015}, {"source": "11", "target": "84", "source_name": "crowdsourced data", "target_name": "human computation", "weight": 1.0, "year": 2015}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2015}, {"source": "12", "target": "21", "source_name": "open innovation", "target_name": "problem solving", "weight": 1.0, "year": 2015}, {"source": "12", "target": "31", "source_name": "open innovation", "target_name": "software development", "weight": 1.0, "year": 2015}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2015}, {"source": "12", "target": "93", "source_name": "open innovation", "target_name": "literature review", "weight": 1.0, "year": 2015}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 3.0, "year": 2015}, {"source": "13", "target": "27", "source_name": "natural language processing", "target_name": "social media", "weight": 1.0, "year": 2015}, {"source": "13", "target": "31", "source_name": "natural language processing", "target_name": "software development", "weight": 1.0, "year": 2015}, {"source": "13", "target": "67", "source_name": "natural language processing", "target_name": "machine learning", "weight": 5.0, "year": 2015}, {"source": "13", "target": "84", "source_name": "natural language processing", "target_name": "human computation", "weight": 2.0, "year": 2015}, {"source": "13", "target": "101", "source_name": "natural language processing", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 4.0, "year": 2015}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2015}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2015}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2015}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2015}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2015}, {"source": "14", "target": "61", "source_name": "object oriented", "target_name": "extreme programming", "weight": 1.0, "year": 2015}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2015}, {"source": "14", "target": "71", "source_name": "object oriented", "target_name": "software testing", "weight": 1.0, "year": 2015}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2015}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2015}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2015}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2015}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2015}, {"source": "16", "target": "29", "source_name": "learning environment", "target_name": "cloud computing", "weight": 1.0, "year": 2015}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2015}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2015}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2015}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2015}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 3.0, "year": 2015}, {"source": "17", "target": "33", "source_name": "conceptual framework", "target_name": "fundamental principles", "weight": 1.0, "year": 2015}, {"source": "17", "target": "46", "source_name": "conceptual framework", "target_name": "empirical studies", "weight": 1.0, "year": 2015}, {"source": "17", "target": "74", "source_name": "conceptual framework", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "17", "target": "75", "source_name": "conceptual framework", "target_name": "systematic review", "weight": 1.0, "year": 2015}, {"source": "17", "target": "82", "source_name": "conceptual framework", "target_name": "social network", "weight": 1.0, "year": 2015}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2015}, {"source": "17", "target": "93", "source_name": "conceptual framework", "target_name": "literature review", "weight": 2.0, "year": 2015}, {"source": "17", "target": "103", "source_name": "conceptual framework", "target_name": "knowledge base", "weight": 1.0, "year": 2015}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2015}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2015}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2015}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2015}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 4.0, "year": 2015}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2015}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2015}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2015}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2015}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2015}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2015}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2015}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2015}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2015}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2015}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2015}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2015}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2015}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2015}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "19", "target": "78", "source_name": "configuration management", "target_name": "process improvement", "weight": 1.0, "year": 2015}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2015}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2015}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 7.0, "year": 2015}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 2.0, "year": 2015}, {"source": "20", "target": "37", "source_name": "information technology", "target_name": "controlled experiments", "weight": 1.0, "year": 2015}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2015}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2015}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 2.0, "year": 2015}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2015}, {"source": "20", "target": "57", "source_name": "information technology", "target_name": "human intelligence", "weight": 1.0, "year": 2015}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2015}, {"source": "20", "target": "60", "source_name": "information technology", "target_name": "collective intelligence", "weight": 1.0, "year": 2015}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2015}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2015}, {"source": "20", "target": "70", "source_name": "information technology", "target_name": "decision making", "weight": 1.0, "year": 2015}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2015}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2015}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2015}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2015}, {"source": "20", "target": "93", "source_name": "information technology", "target_name": "literature review", "weight": 1.0, "year": 2015}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 2.0, "year": 2015}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2015}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2015}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2015}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 10.0, "year": 2015}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 2.0, "year": 2015}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2015}, {"source": "21", "target": "39", "source_name": "problem solving", "target_name": "team members", "weight": 1.0, "year": 2015}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2015}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2015}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 2.0, "year": 2015}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2015}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 2.0, "year": 2015}, {"source": "21", "target": "69", "source_name": "problem solving", "target_name": "computational intelligence", "weight": 1.0, "year": 2015}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2015}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2015}, {"source": "21", "target": "80", "source_name": "problem solving", "target_name": "information systems", "weight": 1.0, "year": 2015}, {"source": "21", "target": "84", "source_name": "problem solving", "target_name": "human computation", "weight": 1.0, "year": 2015}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 1.0, "year": 2015}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 3.0, "year": 2015}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2015}, {"source": "21", "target": "99", "source_name": "problem solving", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 10.0, "year": 2015}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2015}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2015}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2015}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2015}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 3.0, "year": 2015}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2015}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2015}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2015}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2015}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2015}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2015}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2015}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2015}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2015}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2015}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2015}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2015}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2015}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2015}, {"source": "24", "target": "53", "source_name": "requirements analysis", "target_name": "big data", "weight": 1.0, "year": 2015}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2015}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2015}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2015}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2015}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2015}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2015}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2015}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2015}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "25", "target": "31", "source_name": "motivational factors", "target_name": "software development", "weight": 1.0, "year": 2015}, {"source": "25", "target": "46", "source_name": "motivational factors", "target_name": "empirical studies", "weight": 1.0, "year": 2015}, {"source": "25", "target": "93", "source_name": "motivational factors", "target_name": "literature review", "weight": 1.0, "year": 2015}, {"source": "26", "target": "29", "source_name": "business process", "target_name": "cloud computing", "weight": 1.0, "year": 2015}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 3.0, "year": 2015}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2015}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 1.0, "year": 2015}, {"source": "26", "target": "58", "source_name": "business process", "target_name": "user interface", "weight": 1.0, "year": 2015}, {"source": "26", "target": "60", "source_name": "business process", "target_name": "collective intelligence", "weight": 4.0, "year": 2015}, {"source": "26", "target": "70", "source_name": "business process", "target_name": "decision making", "weight": 1.0, "year": 2015}, {"source": "26", "target": "71", "source_name": "business process", "target_name": "software testing", "weight": 3.0, "year": 2015}, {"source": "26", "target": "76", "source_name": "business process", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "26", "target": "77", "source_name": "business process", "target_name": "mechanical turk", "weight": 2.0, "year": 2015}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 2.0, "year": 2015}, {"source": "26", "target": "82", "source_name": "business process", "target_name": "social network", "weight": 1.0, "year": 2015}, {"source": "26", "target": "84", "source_name": "business process", "target_name": "human computation", "weight": 1.0, "year": 2015}, {"source": "26", "target": "93", "source_name": "business process", "target_name": "literature review", "weight": 2.0, "year": 2015}, {"source": "27", "target": "31", "source_name": "social media", "target_name": "software development", "weight": 4.0, "year": 2015}, {"source": "27", "target": "34", "source_name": "social media", "target_name": "search engines", "weight": 2.0, "year": 2015}, {"source": "27", "target": "36", "source_name": "social media", "target_name": "open source", "weight": 1.0, "year": 2015}, {"source": "27", "target": "38", "source_name": "social media", "target_name": "systematic literature review", "weight": 1.0, "year": 2015}, {"source": "27", "target": "53", "source_name": "social media", "target_name": "big data", "weight": 1.0, "year": 2015}, {"source": "27", "target": "57", "source_name": "social media", "target_name": "human intelligence", "weight": 1.0, "year": 2015}, {"source": "27", "target": "58", "source_name": "social media", "target_name": "user interface", "weight": 1.0, "year": 2015}, {"source": "27", "target": "60", "source_name": "social media", "target_name": "collective intelligence", "weight": 1.0, "year": 2015}, {"source": "27", "target": "77", "source_name": "social media", "target_name": "mechanical turk", "weight": 3.0, "year": 2015}, {"source": "27", "target": "79", "source_name": "social media", "target_name": "data management", "weight": 1.0, "year": 2015}, {"source": "27", "target": "82", "source_name": "social media", "target_name": "social network", "weight": 1.0, "year": 2015}, {"source": "27", "target": "84", "source_name": "social media", "target_name": "human computation", "weight": 1.0, "year": 2015}, {"source": "27", "target": "98", "source_name": "social media", "target_name": "data mining", "weight": 1.0, "year": 2015}, {"source": "28", "target": "97", "source_name": "computing elements", "target_name": "task assignment", "weight": 1.0, "year": 2015}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 4.0, "year": 2015}, {"source": "29", "target": "42", "source_name": "cloud computing", "target_name": "quality assurance", "weight": 1.0, "year": 2015}, {"source": "29", "target": "71", "source_name": "cloud computing", "target_name": "software testing", "weight": 2.0, "year": 2015}, {"source": "29", "target": "74", "source_name": "cloud computing", "target_name": "software architecture", "weight": 2.0, "year": 2015}, {"source": "29", "target": "83", "source_name": "cloud computing", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "29", "target": "91", "source_name": "cloud computing", "target_name": "software design", "weight": 1.0, "year": 2015}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 3.0, "year": 2015}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2015}, {"source": "30", "target": "96", "source_name": "end users", "target_name": "open source software", "weight": 1.0, "year": 2015}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2015}, {"source": "31", "target": "33", "source_name": "software development", "target_name": "fundamental principles", "weight": 3.0, "year": 2015}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2015}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2015}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 13.0, "year": 2015}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 3.0, "year": 2015}, {"source": "31", "target": "38", "source_name": "software development", "target_name": "systematic literature review", "weight": 1.0, "year": 2015}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 6.0, "year": 2015}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2015}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2015}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 7.0, "year": 2015}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 2.0, "year": 2015}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 2.0, "year": 2015}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 7.0, "year": 2015}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2015}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 5.0, "year": 2015}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 10.0, "year": 2015}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 1.0, "year": 2015}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 25.0, "year": 2015}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 7.0, "year": 2015}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2015}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 2.0, "year": 2015}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 7.0, "year": 2015}, {"source": "31", "target": "60", "source_name": "software development", "target_name": "collective intelligence", "weight": 2.0, "year": 2015}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 11.0, "year": 2015}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2015}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2015}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2015}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 16.0, "year": 2015}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 1.0, "year": 2015}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2015}, {"source": "31", "target": "70", "source_name": "software development", "target_name": "decision making", "weight": 1.0, "year": 2015}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 8.0, "year": 2015}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 5.0, "year": 2015}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2015}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 15.0, "year": 2015}, {"source": "31", "target": "75", "source_name": "software development", "target_name": "systematic review", "weight": 2.0, "year": 2015}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 17.0, "year": 2015}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 8.0, "year": 2015}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2015}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2015}, {"source": "31", "target": "82", "source_name": "software development", "target_name": "social network", "weight": 2.0, "year": 2015}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 6.0, "year": 2015}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2015}, {"source": "31", "target": "86", "source_name": "software development", "target_name": "systematic mapping", "weight": 1.0, "year": 2015}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 22.0, "year": 2015}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2015}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 4.0, "year": 2015}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 5.0, "year": 2015}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 7.0, "year": 2015}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 4.0, "year": 2015}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 3.0, "year": 2015}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 4.0, "year": 2015}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 9.0, "year": 2015}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 23.0, "year": 2015}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 3.0, "year": 2015}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2015}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2015}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2015}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2015}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2015}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2015}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2015}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2015}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2015}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2015}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "33", "target": "54", "source_name": "fundamental principles", "target_name": "software quality", "weight": 1.0, "year": 2015}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2015}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "33", "target": "74", "source_name": "fundamental principles", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "34", "target": "53", "source_name": "search engines", "target_name": "big data", "weight": 1.0, "year": 2015}, {"source": "34", "target": "65", "source_name": "search engines", "target_name": "web search", "weight": 4.0, "year": 2015}, {"source": "34", "target": "77", "source_name": "search engines", "target_name": "mechanical turk", "weight": 3.0, "year": 2015}, {"source": "34", "target": "95", "source_name": "search engines", "target_name": "human factors", "weight": 2.0, "year": 2015}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2015}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 1.0, "year": 2015}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2015}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 1.0, "year": 2015}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2015}, {"source": "36", "target": "57", "source_name": "open source", "target_name": "human intelligence", "weight": 1.0, "year": 2015}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2015}, {"source": "36", "target": "60", "source_name": "open source", "target_name": "collective intelligence", "weight": 1.0, "year": 2015}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2015}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2015}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2015}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "36", "target": "77", "source_name": "open source", "target_name": "mechanical turk", "weight": 2.0, "year": 2015}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2015}, {"source": "36", "target": "82", "source_name": "open source", "target_name": "social network", "weight": 1.0, "year": 2015}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 3.0, "year": 2015}, {"source": "36", "target": "93", "source_name": "open source", "target_name": "literature review", "weight": 1.0, "year": 2015}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 17.0, "year": 2015}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "37", "target": "38", "source_name": "controlled experiments", "target_name": "systematic literature review", "weight": 1.0, "year": 2015}, {"source": "37", "target": "75", "source_name": "controlled experiments", "target_name": "systematic review", "weight": 1.0, "year": 2015}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2015}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 3.0, "year": 2015}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 6.0, "year": 2015}, {"source": "38", "target": "96", "source_name": "systematic literature review", "target_name": "open source software", "weight": 1.0, "year": 2015}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2015}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2015}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 4.0, "year": 2015}, {"source": "39", "target": "69", "source_name": "team members", "target_name": "computational intelligence", "weight": 1.0, "year": 2015}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2015}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2015}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2015}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2015}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2015}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2015}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2015}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2015}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2015}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2015}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2015}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 5.0, "year": 2015}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2015}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2015}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2015}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2015}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2015}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "42", "target": "77", "source_name": "quality assurance", "target_name": "mechanical turk", "weight": 1.0, "year": 2015}, {"source": "42", "target": "84", "source_name": "quality assurance", "target_name": "human computation", "weight": 1.0, "year": 2015}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2015}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2015}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 2.0, "year": 2015}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2015}, {"source": "44", "target": "54", "source_name": "empirical study", "target_name": "software quality", "weight": 1.0, "year": 2015}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 2.0, "year": 2015}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "45", "target": "97", "source_name": "spatial crowdsourcing", "target_name": "task assignment", "weight": 1.0, "year": 2015}, {"source": "46", "target": "50", "source_name": "empirical studies", "target_name": "source code", "weight": 1.0, "year": 2015}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2015}, {"source": "46", "target": "57", "source_name": "empirical studies", "target_name": "human intelligence", "weight": 1.0, "year": 2015}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2015}, {"source": "46", "target": "82", "source_name": "empirical studies", "target_name": "social network", "weight": 1.0, "year": 2015}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 2.0, "year": 2015}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2015}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 5.0, "year": 2015}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2015}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2015}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2015}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2015}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2015}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 3.0, "year": 2015}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 7.0, "year": 2015}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2015}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2015}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2015}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 2.0, "year": 2015}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2015}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2015}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2015}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2015}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2015}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2015}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2015}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2015}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2015}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2015}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2015}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2015}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2015}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2015}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2015}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 8.0, "year": 2015}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 3.0, "year": 2015}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 1.0, "year": 2015}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "50", "target": "101", "source_name": "source code", "target_name": "software reuse", "weight": 2.0, "year": 2015}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2015}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2015}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "51", "target": "74", "source_name": "agile software development", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 2.0, "year": 2015}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2015}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2015}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2015}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2015}, {"source": "53", "target": "60", "source_name": "big data", "target_name": "collective intelligence", "weight": 1.0, "year": 2015}, {"source": "53", "target": "77", "source_name": "big data", "target_name": "mechanical turk", "weight": 1.0, "year": 2015}, {"source": "53", "target": "79", "source_name": "big data", "target_name": "data management", "weight": 1.0, "year": 2015}, {"source": "53", "target": "84", "source_name": "big data", "target_name": "human computation", "weight": 1.0, "year": 2015}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2015}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2015}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2015}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2015}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2015}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2015}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2015}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2015}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2015}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2015}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2015}, {"source": "54", "target": "77", "source_name": "software quality", "target_name": "mechanical turk", "weight": 1.0, "year": 2015}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 3.0, "year": 2015}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2015}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2015}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 3.0, "year": 2015}, {"source": "54", "target": "86", "source_name": "software quality", "target_name": "systematic mapping", "weight": 1.0, "year": 2015}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 4.0, "year": 2015}, {"source": "54", "target": "95", "source_name": "software quality", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2015}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2015}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2015}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2015}, {"source": "55", "target": "67", "source_name": "systems engineering", "target_name": "machine learning", "weight": 1.0, "year": 2015}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2015}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2015}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2015}, {"source": "55", "target": "82", "source_name": "systems engineering", "target_name": "social network", "weight": 1.0, "year": 2015}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2015}, {"source": "55", "target": "85", "source_name": "systems engineering", "target_name": "degree programs", "weight": 2.0, "year": 2015}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2015}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2015}, {"source": "55", "target": "102", "source_name": "systems engineering", "target_name": "product line", "weight": 1.0, "year": 2015}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2015}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2015}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2015}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2015}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2015}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2015}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2015}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2015}, {"source": "57", "target": "60", "source_name": "human intelligence", "target_name": "collective intelligence", "weight": 3.0, "year": 2015}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2015}, {"source": "57", "target": "77", "source_name": "human intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2015}, {"source": "57", "target": "84", "source_name": "human intelligence", "target_name": "human computation", "weight": 1.0, "year": 2015}, {"source": "57", "target": "96", "source_name": "human intelligence", "target_name": "open source software", "weight": 1.0, "year": 2015}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2015}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2015}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2015}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2015}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2015}, {"source": "58", "target": "77", "source_name": "user interface", "target_name": "mechanical turk", "weight": 2.0, "year": 2015}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "58", "target": "84", "source_name": "user interface", "target_name": "human computation", "weight": 2.0, "year": 2015}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 3.0, "year": 2015}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2015}, {"source": "59", "target": "67", "source_name": "bug reports", "target_name": "machine learning", "weight": 1.0, "year": 2015}, {"source": "60", "target": "71", "source_name": "collective intelligence", "target_name": "software testing", "weight": 3.0, "year": 2015}, {"source": "60", "target": "76", "source_name": "collective intelligence", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "60", "target": "77", "source_name": "collective intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2015}, {"source": "60", "target": "79", "source_name": "collective intelligence", "target_name": "data management", "weight": 1.0, "year": 2015}, {"source": "60", "target": "84", "source_name": "collective intelligence", "target_name": "human computation", "weight": 2.0, "year": 2015}, {"source": "60", "target": "96", "source_name": "collective intelligence", "target_name": "open source software", "weight": 1.0, "year": 2015}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2015}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 3.0, "year": 2015}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2015}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2015}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2015}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2015}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2015}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2015}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2015}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2015}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2015}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2015}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2015}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2015}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 2.0, "year": 2015}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 4.0, "year": 2015}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 3.0, "year": 2015}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2015}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2015}, {"source": "66", "target": "80", "source_name": "project management", "target_name": "information systems", "weight": 1.0, "year": 2015}, {"source": "66", "target": "82", "source_name": "project management", "target_name": "social network", "weight": 1.0, "year": 2015}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2015}, {"source": "66", "target": "93", "source_name": "project management", "target_name": "literature review", "weight": 1.0, "year": 2015}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2015}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "66", "target": "101", "source_name": "project management", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2015}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2015}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 1.0, "year": 2015}, {"source": "67", "target": "82", "source_name": "machine learning", "target_name": "social network", "weight": 1.0, "year": 2015}, {"source": "67", "target": "84", "source_name": "machine learning", "target_name": "human computation", "weight": 3.0, "year": 2015}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 2.0, "year": 2015}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 3.0, "year": 2015}, {"source": "68", "target": "84", "source_name": "service oriented", "target_name": "human computation", "weight": 1.0, "year": 2015}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2015}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2015}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2015}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2015}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2015}, {"source": "70", "target": "96", "source_name": "decision making", "target_name": "open source software", "weight": 1.0, "year": 2015}, {"source": "70", "target": "98", "source_name": "decision making", "target_name": "data mining", "weight": 1.0, "year": 2015}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2015}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 3.0, "year": 2015}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2015}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2015}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2015}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2015}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 2.0, "year": 2015}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2015}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2015}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2015}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2015}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2015}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2015}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 2.0, "year": 2015}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 2.0, "year": 2015}, {"source": "74", "target": "83", "source_name": "software architecture", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2015}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 4.0, "year": 2015}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2015}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 3.0, "year": 2015}, {"source": "75", "target": "96", "source_name": "systematic review", "target_name": "open source software", "weight": 1.0, "year": 2015}, {"source": "75", "target": "103", "source_name": "systematic review", "target_name": "knowledge base", "weight": 1.0, "year": 2015}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2015}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2015}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2015}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2015}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2015}, {"source": "77", "target": "79", "source_name": "mechanical turk", "target_name": "data management", "weight": 2.0, "year": 2015}, {"source": "77", "target": "80", "source_name": "mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2015}, {"source": "77", "target": "82", "source_name": "mechanical turk", "target_name": "social network", "weight": 2.0, "year": 2015}, {"source": "77", "target": "83", "source_name": "mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "77", "target": "84", "source_name": "mechanical turk", "target_name": "human computation", "weight": 5.0, "year": 2015}, {"source": "77", "target": "91", "source_name": "mechanical turk", "target_name": "software design", "weight": 1.0, "year": 2015}, {"source": "77", "target": "95", "source_name": "mechanical turk", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "77", "target": "96", "source_name": "mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2015}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2015}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2015}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2015}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2015}, {"source": "79", "target": "84", "source_name": "data management", "target_name": "human computation", "weight": 2.0, "year": 2015}, {"source": "80", "target": "84", "source_name": "information systems", "target_name": "human computation", "weight": 1.0, "year": 2015}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2015}, {"source": "80", "target": "93", "source_name": "information systems", "target_name": "literature review", "weight": 2.0, "year": 2015}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2015}, {"source": "82", "target": "90", "source_name": "social network", "target_name": "incentive mechanism", "weight": 1.0, "year": 2015}, {"source": "82", "target": "98", "source_name": "social network", "target_name": "data mining", "weight": 1.0, "year": 2015}, {"source": "82", "target": "99", "source_name": "social network", "target_name": "requirements elicitation", "weight": 1.0, "year": 2015}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2015}, {"source": "84", "target": "100", "source_name": "human computation", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2015}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 1.0, "year": 2015}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2015}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2015}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2015}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2015}, {"source": "93", "target": "96", "source_name": "literature review", "target_name": "open source software", "weight": 2.0, "year": 2015}, {"source": "93", "target": "103", "source_name": "literature review", "target_name": "knowledge base", "weight": 1.0, "year": 2015}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2015}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2015}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2015}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2015}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2015}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2015}]}, {"2016": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 3.0, "year": 2016}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2016}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2016}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "0", "target": "47", "source_name": "intellectual property", "target_name": "software maintenance", "weight": 1.0, "year": 2016}, {"source": "0", "target": "50", "source_name": "intellectual property", "target_name": "source code", "weight": 1.0, "year": 2016}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 3.0, "year": 2016}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "0", "target": "101", "source_name": "intellectual property", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "1", "target": "4", "source_name": "natural language", "target_name": "test report", "weight": 1.0, "year": 2016}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2016}, {"source": "1", "target": "7", "source_name": "natural language", "target_name": "quality control", "weight": 1.0, "year": 2016}, {"source": "1", "target": "13", "source_name": "natural language", "target_name": "natural language processing", "weight": 2.0, "year": 2016}, {"source": "1", "target": "27", "source_name": "natural language", "target_name": "social media", "weight": 1.0, "year": 2016}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2016}, {"source": "1", "target": "44", "source_name": "natural language", "target_name": "empirical study", "weight": 1.0, "year": 2016}, {"source": "1", "target": "45", "source_name": "natural language", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2016}, {"source": "1", "target": "97", "source_name": "natural language", "target_name": "task assignment", "weight": 1.0, "year": 2016}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 4.0, "year": 2016}, {"source": "2", "target": "7", "source_name": "business model", "target_name": "quality control", "weight": 2.0, "year": 2016}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 2.0, "year": 2016}, {"source": "2", "target": "10", "source_name": "business model", "target_name": "requirements engineering", "weight": 1.0, "year": 2016}, {"source": "2", "target": "12", "source_name": "business model", "target_name": "open innovation", "weight": 4.0, "year": 2016}, {"source": "2", "target": "20", "source_name": "business model", "target_name": "information technology", "weight": 1.0, "year": 2016}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 3.0, "year": 2016}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2016}, {"source": "2", "target": "26", "source_name": "business model", "target_name": "business process", "weight": 4.0, "year": 2016}, {"source": "2", "target": "27", "source_name": "business model", "target_name": "social media", "weight": 1.0, "year": 2016}, {"source": "2", "target": "29", "source_name": "business model", "target_name": "cloud computing", "weight": 1.0, "year": 2016}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 2.0, "year": 2016}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2016}, {"source": "2", "target": "60", "source_name": "business model", "target_name": "collective intelligence", "weight": 4.0, "year": 2016}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "2", "target": "71", "source_name": "business model", "target_name": "software testing", "weight": 3.0, "year": 2016}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2016}, {"source": "2", "target": "80", "source_name": "business model", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2016}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2016}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2016}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2016}, {"source": "3", "target": "27", "source_name": "design patterns", "target_name": "social media", "weight": 1.0, "year": 2016}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2016}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2016}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2016}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2016}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2016}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2016}, {"source": "3", "target": "57", "source_name": "design patterns", "target_name": "human intelligence", "weight": 1.0, "year": 2016}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2016}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2016}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2016}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2016}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2016}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2016}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2016}, {"source": "4", "target": "44", "source_name": "test report", "target_name": "empirical study", "weight": 1.0, "year": 2016}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 9.0, "year": 2016}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2016}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2016}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 2.0, "year": 2016}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2016}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 5.0, "year": 2016}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2016}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2016}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2016}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2016}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2016}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2016}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2016}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2016}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2016}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2016}, {"source": "5", "target": "78", "source_name": "software quality assurance", "target_name": "process improvement", "weight": 1.0, "year": 2016}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2016}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2016}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2016}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 7.0, "year": 2016}, {"source": "6", "target": "8", "source_name": "software engineer", "target_name": "amazon mechanical turk", "weight": 6.0, "year": 2016}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 3.0, "year": 2016}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 24.0, "year": 2016}, {"source": "6", "target": "12", "source_name": "software engineer", "target_name": "open innovation", "weight": 1.0, "year": 2016}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2016}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2016}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 7.0, "year": 2016}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 5.0, "year": 2016}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 5.0, "year": 2016}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 15.0, "year": 2016}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 14.0, "year": 2016}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 15.0, "year": 2016}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 18.0, "year": 2016}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2016}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2016}, {"source": "6", "target": "27", "source_name": "software engineer", "target_name": "social media", "weight": 3.0, "year": 2016}, {"source": "6", "target": "29", "source_name": "software engineer", "target_name": "cloud computing", "weight": 8.0, "year": 2016}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 5.0, "year": 2016}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 334.0, "year": 2016}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 9.0, "year": 2016}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 11.0, "year": 2016}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2016}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2016}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 20.0, "year": 2016}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 5.0, "year": 2016}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 5.0, "year": 2016}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 10.0, "year": 2016}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 9.0, "year": 2016}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 5.0, "year": 2016}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 10.0, "year": 2016}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 5.0, "year": 2016}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 17.0, "year": 2016}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 13.0, "year": 2016}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2016}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2016}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 11.0, "year": 2016}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 13.0, "year": 2016}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2016}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 38.0, "year": 2016}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 32.0, "year": 2016}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2016}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 3.0, "year": 2016}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 11.0, "year": 2016}, {"source": "6", "target": "60", "source_name": "software engineer", "target_name": "collective intelligence", "weight": 1.0, "year": 2016}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2016}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2016}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2016}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2016}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 31.0, "year": 2016}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2016}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2016}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2016}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 5.0, "year": 2016}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 19.0, "year": 2016}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 17.0, "year": 2016}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2016}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 34.0, "year": 2016}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 6.0, "year": 2016}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 31.0, "year": 2016}, {"source": "6", "target": "77", "source_name": "software engineer", "target_name": "mechanical turk", "weight": 6.0, "year": 2016}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 18.0, "year": 2016}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 12.0, "year": 2016}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2016}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 8.0, "year": 2016}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 20.0, "year": 2016}, {"source": "6", "target": "84", "source_name": "software engineer", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 12.0, "year": 2016}, {"source": "6", "target": "86", "source_name": "software engineer", "target_name": "systematic mapping", "weight": 1.0, "year": 2016}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2016}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2016}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 57.0, "year": 2016}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2016}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 7.0, "year": 2016}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 9.0, "year": 2016}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 14.0, "year": 2016}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 12.0, "year": 2016}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 4.0, "year": 2016}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 10.0, "year": 2016}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 15.0, "year": 2016}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 29.0, "year": 2016}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 8.0, "year": 2016}, {"source": "7", "target": "8", "source_name": "quality control", "target_name": "amazon mechanical turk", "weight": 1.0, "year": 2016}, {"source": "7", "target": "9", "source_name": "quality control", "target_name": "data collection", "weight": 1.0, "year": 2016}, {"source": "7", "target": "11", "source_name": "quality control", "target_name": "crowdsourced data", "weight": 1.0, "year": 2016}, {"source": "7", "target": "13", "source_name": "quality control", "target_name": "natural language processing", "weight": 2.0, "year": 2016}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2016}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2016}, {"source": "7", "target": "21", "source_name": "quality control", "target_name": "problem solving", "weight": 1.0, "year": 2016}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2016}, {"source": "7", "target": "26", "source_name": "quality control", "target_name": "business process", "weight": 2.0, "year": 2016}, {"source": "7", "target": "27", "source_name": "quality control", "target_name": "social media", "weight": 1.0, "year": 2016}, {"source": "7", "target": "29", "source_name": "quality control", "target_name": "cloud computing", "weight": 1.0, "year": 2016}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 3.0, "year": 2016}, {"source": "7", "target": "42", "source_name": "quality control", "target_name": "quality assurance", "weight": 1.0, "year": 2016}, {"source": "7", "target": "44", "source_name": "quality control", "target_name": "empirical study", "weight": 1.0, "year": 2016}, {"source": "7", "target": "45", "source_name": "quality control", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2016}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2016}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2016}, {"source": "7", "target": "51", "source_name": "quality control", "target_name": "agile software development", "weight": 1.0, "year": 2016}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 3.0, "year": 2016}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 2.0, "year": 2016}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2016}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "7", "target": "67", "source_name": "quality control", "target_name": "machine learning", "weight": 2.0, "year": 2016}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2016}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2016}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "7", "target": "77", "source_name": "quality control", "target_name": "mechanical turk", "weight": 1.0, "year": 2016}, {"source": "7", "target": "84", "source_name": "quality control", "target_name": "human computation", "weight": 3.0, "year": 2016}, {"source": "7", "target": "97", "source_name": "quality control", "target_name": "task assignment", "weight": 1.0, "year": 2016}, {"source": "7", "target": "98", "source_name": "quality control", "target_name": "data mining", "weight": 1.0, "year": 2016}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "8", "target": "9", "source_name": "amazon mechanical turk", "target_name": "data collection", "weight": 3.0, "year": 2016}, {"source": "8", "target": "11", "source_name": "amazon mechanical turk", "target_name": "crowdsourced data", "weight": 1.0, "year": 2016}, {"source": "8", "target": "12", "source_name": "amazon mechanical turk", "target_name": "open innovation", "weight": 1.0, "year": 2016}, {"source": "8", "target": "15", "source_name": "amazon mechanical turk", "target_name": "decision support", "weight": 1.0, "year": 2016}, {"source": "8", "target": "26", "source_name": "amazon mechanical turk", "target_name": "business process", "weight": 5.0, "year": 2016}, {"source": "8", "target": "27", "source_name": "amazon mechanical turk", "target_name": "social media", "weight": 1.0, "year": 2016}, {"source": "8", "target": "31", "source_name": "amazon mechanical turk", "target_name": "software development", "weight": 3.0, "year": 2016}, {"source": "8", "target": "34", "source_name": "amazon mechanical turk", "target_name": "search engines", "weight": 2.0, "year": 2016}, {"source": "8", "target": "36", "source_name": "amazon mechanical turk", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "8", "target": "42", "source_name": "amazon mechanical turk", "target_name": "quality assurance", "weight": 1.0, "year": 2016}, {"source": "8", "target": "54", "source_name": "amazon mechanical turk", "target_name": "software quality", "weight": 1.0, "year": 2016}, {"source": "8", "target": "58", "source_name": "amazon mechanical turk", "target_name": "user interface", "weight": 4.0, "year": 2016}, {"source": "8", "target": "60", "source_name": "amazon mechanical turk", "target_name": "collective intelligence", "weight": 1.0, "year": 2016}, {"source": "8", "target": "71", "source_name": "amazon mechanical turk", "target_name": "software testing", "weight": 1.0, "year": 2016}, {"source": "8", "target": "76", "source_name": "amazon mechanical turk", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "8", "target": "77", "source_name": "amazon mechanical turk", "target_name": "mechanical turk", "weight": 18.0, "year": 2016}, {"source": "8", "target": "80", "source_name": "amazon mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "8", "target": "82", "source_name": "amazon mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2016}, {"source": "8", "target": "83", "source_name": "amazon mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "8", "target": "84", "source_name": "amazon mechanical turk", "target_name": "human computation", "weight": 2.0, "year": 2016}, {"source": "8", "target": "91", "source_name": "amazon mechanical turk", "target_name": "software design", "weight": 3.0, "year": 2016}, {"source": "8", "target": "93", "source_name": "amazon mechanical turk", "target_name": "literature review", "weight": 1.0, "year": 2016}, {"source": "8", "target": "96", "source_name": "amazon mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "9", "target": "11", "source_name": "data collection", "target_name": "crowdsourced data", "weight": 2.0, "year": 2016}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2016}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2016}, {"source": "9", "target": "26", "source_name": "data collection", "target_name": "business process", "weight": 1.0, "year": 2016}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2016}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "9", "target": "45", "source_name": "data collection", "target_name": "spatial crowdsourcing", "weight": 3.0, "year": 2016}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2016}, {"source": "9", "target": "58", "source_name": "data collection", "target_name": "user interface", "weight": 1.0, "year": 2016}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2016}, {"source": "9", "target": "75", "source_name": "data collection", "target_name": "systematic review", "weight": 1.0, "year": 2016}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "9", "target": "77", "source_name": "data collection", "target_name": "mechanical turk", "weight": 2.0, "year": 2016}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2016}, {"source": "9", "target": "80", "source_name": "data collection", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "9", "target": "84", "source_name": "data collection", "target_name": "human computation", "weight": 2.0, "year": 2016}, {"source": "9", "target": "90", "source_name": "data collection", "target_name": "incentive mechanism", "weight": 1.0, "year": 2016}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "9", "target": "97", "source_name": "data collection", "target_name": "task assignment", "weight": 1.0, "year": 2016}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2016}, {"source": "10", "target": "20", "source_name": "requirements engineering", "target_name": "information technology", "weight": 1.0, "year": 2016}, {"source": "10", "target": "21", "source_name": "requirements engineering", "target_name": "problem solving", "weight": 1.0, "year": 2016}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2016}, {"source": "10", "target": "24", "source_name": "requirements engineering", "target_name": "requirements analysis", "weight": 1.0, "year": 2016}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2016}, {"source": "10", "target": "29", "source_name": "requirements engineering", "target_name": "cloud computing", "weight": 1.0, "year": 2016}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 16.0, "year": 2016}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2016}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2016}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "10", "target": "37", "source_name": "requirements engineering", "target_name": "controlled experiments", "weight": 1.0, "year": 2016}, {"source": "10", "target": "38", "source_name": "requirements engineering", "target_name": "systematic literature review", "weight": 1.0, "year": 2016}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2016}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2016}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2016}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2016}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2016}, {"source": "10", "target": "53", "source_name": "requirements engineering", "target_name": "big data", "weight": 1.0, "year": 2016}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 2.0, "year": 2016}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 2.0, "year": 2016}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2016}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2016}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2016}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2016}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 3.0, "year": 2016}, {"source": "10", "target": "70", "source_name": "requirements engineering", "target_name": "decision making", "weight": 1.0, "year": 2016}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 2.0, "year": 2016}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2016}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 6.0, "year": 2016}, {"source": "10", "target": "75", "source_name": "requirements engineering", "target_name": "systematic review", "weight": 1.0, "year": 2016}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2016}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2016}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 2.0, "year": 2016}, {"source": "10", "target": "82", "source_name": "requirements engineering", "target_name": "social network", "weight": 2.0, "year": 2016}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2016}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 5.0, "year": 2016}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2016}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 6.0, "year": 2016}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "10", "target": "101", "source_name": "requirements engineering", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "10", "target": "102", "source_name": "requirements engineering", "target_name": "product line", "weight": 2.0, "year": 2016}, {"source": "11", "target": "26", "source_name": "crowdsourced data", "target_name": "business process", "weight": 1.0, "year": 2016}, {"source": "11", "target": "34", "source_name": "crowdsourced data", "target_name": "search engines", "weight": 2.0, "year": 2016}, {"source": "11", "target": "36", "source_name": "crowdsourced data", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "11", "target": "44", "source_name": "crowdsourced data", "target_name": "empirical study", "weight": 1.0, "year": 2016}, {"source": "11", "target": "53", "source_name": "crowdsourced data", "target_name": "big data", "weight": 1.0, "year": 2016}, {"source": "11", "target": "67", "source_name": "crowdsourced data", "target_name": "machine learning", "weight": 1.0, "year": 2016}, {"source": "11", "target": "75", "source_name": "crowdsourced data", "target_name": "systematic review", "weight": 1.0, "year": 2016}, {"source": "11", "target": "77", "source_name": "crowdsourced data", "target_name": "mechanical turk", "weight": 1.0, "year": 2016}, {"source": "11", "target": "79", "source_name": "crowdsourced data", "target_name": "data management", "weight": 2.0, "year": 2016}, {"source": "11", "target": "84", "source_name": "crowdsourced data", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "11", "target": "91", "source_name": "crowdsourced data", "target_name": "software design", "weight": 1.0, "year": 2016}, {"source": "11", "target": "96", "source_name": "crowdsourced data", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2016}, {"source": "12", "target": "21", "source_name": "open innovation", "target_name": "problem solving", "weight": 1.0, "year": 2016}, {"source": "12", "target": "26", "source_name": "open innovation", "target_name": "business process", "weight": 1.0, "year": 2016}, {"source": "12", "target": "31", "source_name": "open innovation", "target_name": "software development", "weight": 1.0, "year": 2016}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "12", "target": "42", "source_name": "open innovation", "target_name": "quality assurance", "weight": 1.0, "year": 2016}, {"source": "12", "target": "77", "source_name": "open innovation", "target_name": "mechanical turk", "weight": 1.0, "year": 2016}, {"source": "12", "target": "93", "source_name": "open innovation", "target_name": "literature review", "weight": 2.0, "year": 2016}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 4.0, "year": 2016}, {"source": "13", "target": "27", "source_name": "natural language processing", "target_name": "social media", "weight": 1.0, "year": 2016}, {"source": "13", "target": "31", "source_name": "natural language processing", "target_name": "software development", "weight": 1.0, "year": 2016}, {"source": "13", "target": "67", "source_name": "natural language processing", "target_name": "machine learning", "weight": 5.0, "year": 2016}, {"source": "13", "target": "84", "source_name": "natural language processing", "target_name": "human computation", "weight": 2.0, "year": 2016}, {"source": "13", "target": "101", "source_name": "natural language processing", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 4.0, "year": 2016}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2016}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2016}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2016}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2016}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2016}, {"source": "14", "target": "61", "source_name": "object oriented", "target_name": "extreme programming", "weight": 1.0, "year": 2016}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2016}, {"source": "14", "target": "71", "source_name": "object oriented", "target_name": "software testing", "weight": 1.0, "year": 2016}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2016}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2016}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2016}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2016}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2016}, {"source": "15", "target": "71", "source_name": "decision support", "target_name": "software testing", "weight": 1.0, "year": 2016}, {"source": "16", "target": "29", "source_name": "learning environment", "target_name": "cloud computing", "weight": 1.0, "year": 2016}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2016}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2016}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2016}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 3.0, "year": 2016}, {"source": "17", "target": "33", "source_name": "conceptual framework", "target_name": "fundamental principles", "weight": 1.0, "year": 2016}, {"source": "17", "target": "46", "source_name": "conceptual framework", "target_name": "empirical studies", "weight": 1.0, "year": 2016}, {"source": "17", "target": "74", "source_name": "conceptual framework", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "17", "target": "75", "source_name": "conceptual framework", "target_name": "systematic review", "weight": 1.0, "year": 2016}, {"source": "17", "target": "80", "source_name": "conceptual framework", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "17", "target": "82", "source_name": "conceptual framework", "target_name": "social network", "weight": 1.0, "year": 2016}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2016}, {"source": "17", "target": "93", "source_name": "conceptual framework", "target_name": "literature review", "weight": 2.0, "year": 2016}, {"source": "17", "target": "103", "source_name": "conceptual framework", "target_name": "knowledge base", "weight": 1.0, "year": 2016}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2016}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2016}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2016}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2016}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 4.0, "year": 2016}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2016}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2016}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2016}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2016}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2016}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2016}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2016}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2016}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2016}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2016}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2016}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2016}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2016}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2016}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "19", "target": "78", "source_name": "configuration management", "target_name": "process improvement", "weight": 1.0, "year": 2016}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2016}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2016}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 7.0, "year": 2016}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 2.0, "year": 2016}, {"source": "20", "target": "37", "source_name": "information technology", "target_name": "controlled experiments", "weight": 1.0, "year": 2016}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2016}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2016}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 2.0, "year": 2016}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2016}, {"source": "20", "target": "57", "source_name": "information technology", "target_name": "human intelligence", "weight": 1.0, "year": 2016}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2016}, {"source": "20", "target": "60", "source_name": "information technology", "target_name": "collective intelligence", "weight": 1.0, "year": 2016}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2016}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2016}, {"source": "20", "target": "70", "source_name": "information technology", "target_name": "decision making", "weight": 1.0, "year": 2016}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2016}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2016}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2016}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2016}, {"source": "20", "target": "93", "source_name": "information technology", "target_name": "literature review", "weight": 1.0, "year": 2016}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 2.0, "year": 2016}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2016}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2016}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2016}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 10.0, "year": 2016}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 2.0, "year": 2016}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2016}, {"source": "21", "target": "39", "source_name": "problem solving", "target_name": "team members", "weight": 1.0, "year": 2016}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2016}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2016}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 2.0, "year": 2016}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2016}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 2.0, "year": 2016}, {"source": "21", "target": "69", "source_name": "problem solving", "target_name": "computational intelligence", "weight": 1.0, "year": 2016}, {"source": "21", "target": "71", "source_name": "problem solving", "target_name": "software testing", "weight": 2.0, "year": 2016}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2016}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2016}, {"source": "21", "target": "80", "source_name": "problem solving", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "21", "target": "84", "source_name": "problem solving", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 1.0, "year": 2016}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 3.0, "year": 2016}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "21", "target": "99", "source_name": "problem solving", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 10.0, "year": 2016}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2016}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2016}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2016}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 3.0, "year": 2016}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2016}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2016}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2016}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2016}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2016}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2016}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2016}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2016}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2016}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2016}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2016}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2016}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2016}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2016}, {"source": "24", "target": "53", "source_name": "requirements analysis", "target_name": "big data", "weight": 1.0, "year": 2016}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2016}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2016}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2016}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2016}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2016}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2016}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2016}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2016}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "25", "target": "31", "source_name": "motivational factors", "target_name": "software development", "weight": 1.0, "year": 2016}, {"source": "25", "target": "46", "source_name": "motivational factors", "target_name": "empirical studies", "weight": 1.0, "year": 2016}, {"source": "25", "target": "93", "source_name": "motivational factors", "target_name": "literature review", "weight": 2.0, "year": 2016}, {"source": "26", "target": "29", "source_name": "business process", "target_name": "cloud computing", "weight": 1.0, "year": 2016}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 3.0, "year": 2016}, {"source": "26", "target": "36", "source_name": "business process", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2016}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 2.0, "year": 2016}, {"source": "26", "target": "58", "source_name": "business process", "target_name": "user interface", "weight": 1.0, "year": 2016}, {"source": "26", "target": "60", "source_name": "business process", "target_name": "collective intelligence", "weight": 4.0, "year": 2016}, {"source": "26", "target": "70", "source_name": "business process", "target_name": "decision making", "weight": 1.0, "year": 2016}, {"source": "26", "target": "71", "source_name": "business process", "target_name": "software testing", "weight": 3.0, "year": 2016}, {"source": "26", "target": "76", "source_name": "business process", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "26", "target": "77", "source_name": "business process", "target_name": "mechanical turk", "weight": 3.0, "year": 2016}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 2.0, "year": 2016}, {"source": "26", "target": "82", "source_name": "business process", "target_name": "social network", "weight": 1.0, "year": 2016}, {"source": "26", "target": "84", "source_name": "business process", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "26", "target": "91", "source_name": "business process", "target_name": "software design", "weight": 1.0, "year": 2016}, {"source": "26", "target": "93", "source_name": "business process", "target_name": "literature review", "weight": 3.0, "year": 2016}, {"source": "26", "target": "96", "source_name": "business process", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "27", "target": "31", "source_name": "social media", "target_name": "software development", "weight": 4.0, "year": 2016}, {"source": "27", "target": "34", "source_name": "social media", "target_name": "search engines", "weight": 2.0, "year": 2016}, {"source": "27", "target": "36", "source_name": "social media", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "27", "target": "38", "source_name": "social media", "target_name": "systematic literature review", "weight": 1.0, "year": 2016}, {"source": "27", "target": "53", "source_name": "social media", "target_name": "big data", "weight": 1.0, "year": 2016}, {"source": "27", "target": "57", "source_name": "social media", "target_name": "human intelligence", "weight": 1.0, "year": 2016}, {"source": "27", "target": "58", "source_name": "social media", "target_name": "user interface", "weight": 1.0, "year": 2016}, {"source": "27", "target": "60", "source_name": "social media", "target_name": "collective intelligence", "weight": 2.0, "year": 2016}, {"source": "27", "target": "77", "source_name": "social media", "target_name": "mechanical turk", "weight": 3.0, "year": 2016}, {"source": "27", "target": "79", "source_name": "social media", "target_name": "data management", "weight": 1.0, "year": 2016}, {"source": "27", "target": "82", "source_name": "social media", "target_name": "social network", "weight": 1.0, "year": 2016}, {"source": "27", "target": "84", "source_name": "social media", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "27", "target": "93", "source_name": "social media", "target_name": "literature review", "weight": 1.0, "year": 2016}, {"source": "27", "target": "98", "source_name": "social media", "target_name": "data mining", "weight": 1.0, "year": 2016}, {"source": "28", "target": "31", "source_name": "computing elements", "target_name": "software development", "weight": 1.0, "year": 2016}, {"source": "28", "target": "60", "source_name": "computing elements", "target_name": "collective intelligence", "weight": 1.0, "year": 2016}, {"source": "28", "target": "76", "source_name": "computing elements", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "28", "target": "97", "source_name": "computing elements", "target_name": "task assignment", "weight": 1.0, "year": 2016}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 4.0, "year": 2016}, {"source": "29", "target": "42", "source_name": "cloud computing", "target_name": "quality assurance", "weight": 1.0, "year": 2016}, {"source": "29", "target": "71", "source_name": "cloud computing", "target_name": "software testing", "weight": 2.0, "year": 2016}, {"source": "29", "target": "74", "source_name": "cloud computing", "target_name": "software architecture", "weight": 2.0, "year": 2016}, {"source": "29", "target": "83", "source_name": "cloud computing", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "29", "target": "91", "source_name": "cloud computing", "target_name": "software design", "weight": 1.0, "year": 2016}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 3.0, "year": 2016}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2016}, {"source": "30", "target": "96", "source_name": "end users", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2016}, {"source": "31", "target": "33", "source_name": "software development", "target_name": "fundamental principles", "weight": 3.0, "year": 2016}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2016}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2016}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 14.0, "year": 2016}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 3.0, "year": 2016}, {"source": "31", "target": "38", "source_name": "software development", "target_name": "systematic literature review", "weight": 1.0, "year": 2016}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 7.0, "year": 2016}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2016}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2016}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 7.0, "year": 2016}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 2.0, "year": 2016}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 2.0, "year": 2016}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 7.0, "year": 2016}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2016}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 5.0, "year": 2016}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 11.0, "year": 2016}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 2.0, "year": 2016}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 25.0, "year": 2016}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 7.0, "year": 2016}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2016}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 2.0, "year": 2016}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 7.0, "year": 2016}, {"source": "31", "target": "60", "source_name": "software development", "target_name": "collective intelligence", "weight": 2.0, "year": 2016}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 11.0, "year": 2016}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2016}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2016}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2016}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 16.0, "year": 2016}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 1.0, "year": 2016}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2016}, {"source": "31", "target": "70", "source_name": "software development", "target_name": "decision making", "weight": 1.0, "year": 2016}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 8.0, "year": 2016}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 5.0, "year": 2016}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2016}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 15.0, "year": 2016}, {"source": "31", "target": "75", "source_name": "software development", "target_name": "systematic review", "weight": 2.0, "year": 2016}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 19.0, "year": 2016}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 8.0, "year": 2016}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2016}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2016}, {"source": "31", "target": "82", "source_name": "software development", "target_name": "social network", "weight": 2.0, "year": 2016}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 6.0, "year": 2016}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2016}, {"source": "31", "target": "86", "source_name": "software development", "target_name": "systematic mapping", "weight": 1.0, "year": 2016}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 23.0, "year": 2016}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2016}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 4.0, "year": 2016}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 5.0, "year": 2016}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 7.0, "year": 2016}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 4.0, "year": 2016}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 4.0, "year": 2016}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 4.0, "year": 2016}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 9.0, "year": 2016}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 23.0, "year": 2016}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 3.0, "year": 2016}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2016}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2016}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2016}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2016}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2016}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2016}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2016}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2016}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2016}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2016}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "33", "target": "54", "source_name": "fundamental principles", "target_name": "software quality", "weight": 1.0, "year": 2016}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2016}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "33", "target": "74", "source_name": "fundamental principles", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "34", "target": "53", "source_name": "search engines", "target_name": "big data", "weight": 1.0, "year": 2016}, {"source": "34", "target": "65", "source_name": "search engines", "target_name": "web search", "weight": 4.0, "year": 2016}, {"source": "34", "target": "67", "source_name": "search engines", "target_name": "machine learning", "weight": 1.0, "year": 2016}, {"source": "34", "target": "77", "source_name": "search engines", "target_name": "mechanical turk", "weight": 3.0, "year": 2016}, {"source": "34", "target": "82", "source_name": "search engines", "target_name": "social network", "weight": 1.0, "year": 2016}, {"source": "34", "target": "84", "source_name": "search engines", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "34", "target": "95", "source_name": "search engines", "target_name": "human factors", "weight": 2.0, "year": 2016}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2016}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 1.0, "year": 2016}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2016}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 1.0, "year": 2016}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2016}, {"source": "36", "target": "57", "source_name": "open source", "target_name": "human intelligence", "weight": 1.0, "year": 2016}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2016}, {"source": "36", "target": "60", "source_name": "open source", "target_name": "collective intelligence", "weight": 1.0, "year": 2016}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2016}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2016}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2016}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "36", "target": "77", "source_name": "open source", "target_name": "mechanical turk", "weight": 3.0, "year": 2016}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2016}, {"source": "36", "target": "82", "source_name": "open source", "target_name": "social network", "weight": 1.0, "year": 2016}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 4.0, "year": 2016}, {"source": "36", "target": "93", "source_name": "open source", "target_name": "literature review", "weight": 1.0, "year": 2016}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 18.0, "year": 2016}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "37", "target": "38", "source_name": "controlled experiments", "target_name": "systematic literature review", "weight": 1.0, "year": 2016}, {"source": "37", "target": "57", "source_name": "controlled experiments", "target_name": "human intelligence", "weight": 1.0, "year": 2016}, {"source": "37", "target": "75", "source_name": "controlled experiments", "target_name": "systematic review", "weight": 1.0, "year": 2016}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2016}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 3.0, "year": 2016}, {"source": "38", "target": "80", "source_name": "systematic literature review", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 7.0, "year": 2016}, {"source": "38", "target": "96", "source_name": "systematic literature review", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2016}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2016}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 4.0, "year": 2016}, {"source": "39", "target": "69", "source_name": "team members", "target_name": "computational intelligence", "weight": 1.0, "year": 2016}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2016}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2016}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2016}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2016}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2016}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2016}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2016}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2016}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2016}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2016}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 5.0, "year": 2016}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2016}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2016}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2016}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2016}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2016}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "42", "target": "77", "source_name": "quality assurance", "target_name": "mechanical turk", "weight": 2.0, "year": 2016}, {"source": "42", "target": "84", "source_name": "quality assurance", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2016}, {"source": "42", "target": "93", "source_name": "quality assurance", "target_name": "literature review", "weight": 1.0, "year": 2016}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2016}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 2.0, "year": 2016}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2016}, {"source": "44", "target": "54", "source_name": "empirical study", "target_name": "software quality", "weight": 1.0, "year": 2016}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 2.0, "year": 2016}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "45", "target": "90", "source_name": "spatial crowdsourcing", "target_name": "incentive mechanism", "weight": 1.0, "year": 2016}, {"source": "45", "target": "97", "source_name": "spatial crowdsourcing", "target_name": "task assignment", "weight": 2.0, "year": 2016}, {"source": "46", "target": "50", "source_name": "empirical studies", "target_name": "source code", "weight": 1.0, "year": 2016}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2016}, {"source": "46", "target": "57", "source_name": "empirical studies", "target_name": "human intelligence", "weight": 1.0, "year": 2016}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2016}, {"source": "46", "target": "82", "source_name": "empirical studies", "target_name": "social network", "weight": 1.0, "year": 2016}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 2.0, "year": 2016}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2016}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 5.0, "year": 2016}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2016}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2016}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2016}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2016}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2016}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 3.0, "year": 2016}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 7.0, "year": 2016}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2016}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2016}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2016}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 2.0, "year": 2016}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2016}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2016}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2016}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2016}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2016}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2016}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2016}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2016}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2016}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2016}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2016}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2016}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2016}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2016}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2016}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 8.0, "year": 2016}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 3.0, "year": 2016}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "50", "target": "101", "source_name": "source code", "target_name": "software reuse", "weight": 2.0, "year": 2016}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2016}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2016}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "51", "target": "74", "source_name": "agile software development", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 3.0, "year": 2016}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2016}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2016}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2016}, {"source": "53", "target": "60", "source_name": "big data", "target_name": "collective intelligence", "weight": 1.0, "year": 2016}, {"source": "53", "target": "77", "source_name": "big data", "target_name": "mechanical turk", "weight": 1.0, "year": 2016}, {"source": "53", "target": "79", "source_name": "big data", "target_name": "data management", "weight": 1.0, "year": 2016}, {"source": "53", "target": "84", "source_name": "big data", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "53", "target": "90", "source_name": "big data", "target_name": "incentive mechanism", "weight": 1.0, "year": 2016}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2016}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2016}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2016}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2016}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2016}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2016}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2016}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2016}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2016}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2016}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2016}, {"source": "54", "target": "77", "source_name": "software quality", "target_name": "mechanical turk", "weight": 1.0, "year": 2016}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 3.0, "year": 2016}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2016}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 3.0, "year": 2016}, {"source": "54", "target": "86", "source_name": "software quality", "target_name": "systematic mapping", "weight": 1.0, "year": 2016}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 4.0, "year": 2016}, {"source": "54", "target": "95", "source_name": "software quality", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2016}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2016}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2016}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2016}, {"source": "55", "target": "67", "source_name": "systems engineering", "target_name": "machine learning", "weight": 1.0, "year": 2016}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2016}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2016}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "55", "target": "82", "source_name": "systems engineering", "target_name": "social network", "weight": 1.0, "year": 2016}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2016}, {"source": "55", "target": "85", "source_name": "systems engineering", "target_name": "degree programs", "weight": 2.0, "year": 2016}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2016}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2016}, {"source": "55", "target": "102", "source_name": "systems engineering", "target_name": "product line", "weight": 1.0, "year": 2016}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2016}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2016}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2016}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2016}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2016}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2016}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2016}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2016}, {"source": "57", "target": "60", "source_name": "human intelligence", "target_name": "collective intelligence", "weight": 3.0, "year": 2016}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2016}, {"source": "57", "target": "77", "source_name": "human intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2016}, {"source": "57", "target": "84", "source_name": "human intelligence", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "57", "target": "96", "source_name": "human intelligence", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2016}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2016}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2016}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2016}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2016}, {"source": "58", "target": "77", "source_name": "user interface", "target_name": "mechanical turk", "weight": 3.0, "year": 2016}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "58", "target": "84", "source_name": "user interface", "target_name": "human computation", "weight": 2.0, "year": 2016}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 4.0, "year": 2016}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2016}, {"source": "59", "target": "67", "source_name": "bug reports", "target_name": "machine learning", "weight": 1.0, "year": 2016}, {"source": "60", "target": "71", "source_name": "collective intelligence", "target_name": "software testing", "weight": 3.0, "year": 2016}, {"source": "60", "target": "76", "source_name": "collective intelligence", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "60", "target": "77", "source_name": "collective intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2016}, {"source": "60", "target": "79", "source_name": "collective intelligence", "target_name": "data management", "weight": 1.0, "year": 2016}, {"source": "60", "target": "84", "source_name": "collective intelligence", "target_name": "human computation", "weight": 2.0, "year": 2016}, {"source": "60", "target": "93", "source_name": "collective intelligence", "target_name": "literature review", "weight": 2.0, "year": 2016}, {"source": "60", "target": "96", "source_name": "collective intelligence", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2016}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 3.0, "year": 2016}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2016}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2016}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2016}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2016}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2016}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2016}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2016}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2016}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2016}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2016}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2016}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 2.0, "year": 2016}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 4.0, "year": 2016}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 3.0, "year": 2016}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2016}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2016}, {"source": "66", "target": "80", "source_name": "project management", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "66", "target": "82", "source_name": "project management", "target_name": "social network", "weight": 1.0, "year": 2016}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2016}, {"source": "66", "target": "93", "source_name": "project management", "target_name": "literature review", "weight": 1.0, "year": 2016}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2016}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "66", "target": "101", "source_name": "project management", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2016}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2016}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 1.0, "year": 2016}, {"source": "67", "target": "79", "source_name": "machine learning", "target_name": "data management", "weight": 1.0, "year": 2016}, {"source": "67", "target": "82", "source_name": "machine learning", "target_name": "social network", "weight": 2.0, "year": 2016}, {"source": "67", "target": "84", "source_name": "machine learning", "target_name": "human computation", "weight": 4.0, "year": 2016}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 2.0, "year": 2016}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 3.0, "year": 2016}, {"source": "68", "target": "84", "source_name": "service oriented", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2016}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2016}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2016}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2016}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2016}, {"source": "70", "target": "96", "source_name": "decision making", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "70", "target": "98", "source_name": "decision making", "target_name": "data mining", "weight": 1.0, "year": 2016}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2016}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 3.0, "year": 2016}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2016}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2016}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2016}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2016}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 2.0, "year": 2016}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2016}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2016}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2016}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2016}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2016}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2016}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 2.0, "year": 2016}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 2.0, "year": 2016}, {"source": "74", "target": "83", "source_name": "software architecture", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2016}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 4.0, "year": 2016}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2016}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 3.0, "year": 2016}, {"source": "75", "target": "96", "source_name": "systematic review", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "75", "target": "103", "source_name": "systematic review", "target_name": "knowledge base", "weight": 1.0, "year": 2016}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2016}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2016}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2016}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2016}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2016}, {"source": "77", "target": "79", "source_name": "mechanical turk", "target_name": "data management", "weight": 2.0, "year": 2016}, {"source": "77", "target": "80", "source_name": "mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "77", "target": "82", "source_name": "mechanical turk", "target_name": "social network", "weight": 2.0, "year": 2016}, {"source": "77", "target": "83", "source_name": "mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "77", "target": "84", "source_name": "mechanical turk", "target_name": "human computation", "weight": 5.0, "year": 2016}, {"source": "77", "target": "91", "source_name": "mechanical turk", "target_name": "software design", "weight": 3.0, "year": 2016}, {"source": "77", "target": "93", "source_name": "mechanical turk", "target_name": "literature review", "weight": 1.0, "year": 2016}, {"source": "77", "target": "95", "source_name": "mechanical turk", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "77", "target": "96", "source_name": "mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2016}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2016}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2016}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2016}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2016}, {"source": "79", "target": "84", "source_name": "data management", "target_name": "human computation", "weight": 2.0, "year": 2016}, {"source": "80", "target": "84", "source_name": "information systems", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2016}, {"source": "80", "target": "93", "source_name": "information systems", "target_name": "literature review", "weight": 3.0, "year": 2016}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2016}, {"source": "82", "target": "84", "source_name": "social network", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "82", "target": "90", "source_name": "social network", "target_name": "incentive mechanism", "weight": 1.0, "year": 2016}, {"source": "82", "target": "98", "source_name": "social network", "target_name": "data mining", "weight": 1.0, "year": 2016}, {"source": "82", "target": "99", "source_name": "social network", "target_name": "requirements elicitation", "weight": 1.0, "year": 2016}, {"source": "83", "target": "84", "source_name": "lessons learned", "target_name": "human computation", "weight": 1.0, "year": 2016}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2016}, {"source": "84", "target": "100", "source_name": "human computation", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "90", "target": "97", "source_name": "incentive mechanism", "target_name": "task assignment", "weight": 1.0, "year": 2016}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2016}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 2.0, "year": 2016}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2016}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2016}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2016}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2016}, {"source": "93", "target": "96", "source_name": "literature review", "target_name": "open source software", "weight": 2.0, "year": 2016}, {"source": "93", "target": "103", "source_name": "literature review", "target_name": "knowledge base", "weight": 1.0, "year": 2016}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2016}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2016}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2016}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2016}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2016}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2016}]}, {"2017": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 5.0, "year": 2017}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2017}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2017}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2017}, {"source": "0", "target": "47", "source_name": "intellectual property", "target_name": "software maintenance", "weight": 1.0, "year": 2017}, {"source": "0", "target": "50", "source_name": "intellectual property", "target_name": "source code", "weight": 1.0, "year": 2017}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 3.0, "year": 2017}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "0", "target": "101", "source_name": "intellectual property", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "1", "target": "4", "source_name": "natural language", "target_name": "test report", "weight": 1.0, "year": 2017}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2017}, {"source": "1", "target": "7", "source_name": "natural language", "target_name": "quality control", "weight": 1.0, "year": 2017}, {"source": "1", "target": "13", "source_name": "natural language", "target_name": "natural language processing", "weight": 2.0, "year": 2017}, {"source": "1", "target": "27", "source_name": "natural language", "target_name": "social media", "weight": 1.0, "year": 2017}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2017}, {"source": "1", "target": "34", "source_name": "natural language", "target_name": "search engines", "weight": 1.0, "year": 2017}, {"source": "1", "target": "44", "source_name": "natural language", "target_name": "empirical study", "weight": 1.0, "year": 2017}, {"source": "1", "target": "45", "source_name": "natural language", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2017}, {"source": "1", "target": "57", "source_name": "natural language", "target_name": "human intelligence", "weight": 1.0, "year": 2017}, {"source": "1", "target": "97", "source_name": "natural language", "target_name": "task assignment", "weight": 1.0, "year": 2017}, {"source": "1", "target": "100", "source_name": "natural language", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 8.0, "year": 2017}, {"source": "2", "target": "7", "source_name": "business model", "target_name": "quality control", "weight": 2.0, "year": 2017}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 2.0, "year": 2017}, {"source": "2", "target": "10", "source_name": "business model", "target_name": "requirements engineering", "weight": 1.0, "year": 2017}, {"source": "2", "target": "12", "source_name": "business model", "target_name": "open innovation", "weight": 4.0, "year": 2017}, {"source": "2", "target": "20", "source_name": "business model", "target_name": "information technology", "weight": 1.0, "year": 2017}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 3.0, "year": 2017}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2017}, {"source": "2", "target": "26", "source_name": "business model", "target_name": "business process", "weight": 4.0, "year": 2017}, {"source": "2", "target": "27", "source_name": "business model", "target_name": "social media", "weight": 1.0, "year": 2017}, {"source": "2", "target": "29", "source_name": "business model", "target_name": "cloud computing", "weight": 1.0, "year": 2017}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 4.0, "year": 2017}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 2.0, "year": 2017}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2017}, {"source": "2", "target": "58", "source_name": "business model", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "2", "target": "60", "source_name": "business model", "target_name": "collective intelligence", "weight": 4.0, "year": 2017}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "2", "target": "71", "source_name": "business model", "target_name": "software testing", "weight": 4.0, "year": 2017}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2017}, {"source": "2", "target": "80", "source_name": "business model", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2017}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2017}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2017}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2017}, {"source": "3", "target": "27", "source_name": "design patterns", "target_name": "social media", "weight": 1.0, "year": 2017}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2017}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2017}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2017}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2017}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2017}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2017}, {"source": "3", "target": "57", "source_name": "design patterns", "target_name": "human intelligence", "weight": 1.0, "year": 2017}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2017}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2017}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2017}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2017}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2017}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2017}, {"source": "4", "target": "44", "source_name": "test report", "target_name": "empirical study", "weight": 1.0, "year": 2017}, {"source": "4", "target": "47", "source_name": "test report", "target_name": "software maintenance", "weight": 1.0, "year": 2017}, {"source": "4", "target": "59", "source_name": "test report", "target_name": "bug reports", "weight": 1.0, "year": 2017}, {"source": "4", "target": "67", "source_name": "test report", "target_name": "machine learning", "weight": 1.0, "year": 2017}, {"source": "4", "target": "71", "source_name": "test report", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 9.0, "year": 2017}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2017}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2017}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 2.0, "year": 2017}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2017}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 5.0, "year": 2017}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2017}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2017}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2017}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2017}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2017}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2017}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2017}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2017}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2017}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2017}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2017}, {"source": "5", "target": "78", "source_name": "software quality assurance", "target_name": "process improvement", "weight": 1.0, "year": 2017}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2017}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2017}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2017}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 7.0, "year": 2017}, {"source": "6", "target": "8", "source_name": "software engineer", "target_name": "amazon mechanical turk", "weight": 6.0, "year": 2017}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 3.0, "year": 2017}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 26.0, "year": 2017}, {"source": "6", "target": "12", "source_name": "software engineer", "target_name": "open innovation", "weight": 1.0, "year": 2017}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2017}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2017}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 7.0, "year": 2017}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 5.0, "year": 2017}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 5.0, "year": 2017}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 15.0, "year": 2017}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 14.0, "year": 2017}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 15.0, "year": 2017}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 18.0, "year": 2017}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2017}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2017}, {"source": "6", "target": "27", "source_name": "software engineer", "target_name": "social media", "weight": 3.0, "year": 2017}, {"source": "6", "target": "29", "source_name": "software engineer", "target_name": "cloud computing", "weight": 8.0, "year": 2017}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 5.0, "year": 2017}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 340.0, "year": 2017}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 10.0, "year": 2017}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 11.0, "year": 2017}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2017}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2017}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 22.0, "year": 2017}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 5.0, "year": 2017}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 5.0, "year": 2017}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 10.0, "year": 2017}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 9.0, "year": 2017}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 5.0, "year": 2017}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 10.0, "year": 2017}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 5.0, "year": 2017}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 19.0, "year": 2017}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 14.0, "year": 2017}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2017}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2017}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 13.0, "year": 2017}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 13.0, "year": 2017}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2017}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 39.0, "year": 2017}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 32.0, "year": 2017}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2017}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 3.0, "year": 2017}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 11.0, "year": 2017}, {"source": "6", "target": "60", "source_name": "software engineer", "target_name": "collective intelligence", "weight": 1.0, "year": 2017}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2017}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2017}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2017}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2017}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 32.0, "year": 2017}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2017}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2017}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2017}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 5.0, "year": 2017}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 22.0, "year": 2017}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 17.0, "year": 2017}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2017}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 34.0, "year": 2017}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 6.0, "year": 2017}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 31.0, "year": 2017}, {"source": "6", "target": "77", "source_name": "software engineer", "target_name": "mechanical turk", "weight": 6.0, "year": 2017}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 18.0, "year": 2017}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 12.0, "year": 2017}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2017}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 8.0, "year": 2017}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 21.0, "year": 2017}, {"source": "6", "target": "84", "source_name": "software engineer", "target_name": "human computation", "weight": 2.0, "year": 2017}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 12.0, "year": 2017}, {"source": "6", "target": "86", "source_name": "software engineer", "target_name": "systematic mapping", "weight": 1.0, "year": 2017}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2017}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2017}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 57.0, "year": 2017}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2017}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 7.0, "year": 2017}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 9.0, "year": 2017}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 14.0, "year": 2017}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 12.0, "year": 2017}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 4.0, "year": 2017}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 10.0, "year": 2017}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 15.0, "year": 2017}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 29.0, "year": 2017}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 8.0, "year": 2017}, {"source": "7", "target": "8", "source_name": "quality control", "target_name": "amazon mechanical turk", "weight": 1.0, "year": 2017}, {"source": "7", "target": "9", "source_name": "quality control", "target_name": "data collection", "weight": 2.0, "year": 2017}, {"source": "7", "target": "10", "source_name": "quality control", "target_name": "requirements engineering", "weight": 1.0, "year": 2017}, {"source": "7", "target": "11", "source_name": "quality control", "target_name": "crowdsourced data", "weight": 3.0, "year": 2017}, {"source": "7", "target": "13", "source_name": "quality control", "target_name": "natural language processing", "weight": 2.0, "year": 2017}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2017}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2017}, {"source": "7", "target": "21", "source_name": "quality control", "target_name": "problem solving", "weight": 1.0, "year": 2017}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2017}, {"source": "7", "target": "26", "source_name": "quality control", "target_name": "business process", "weight": 2.0, "year": 2017}, {"source": "7", "target": "27", "source_name": "quality control", "target_name": "social media", "weight": 1.0, "year": 2017}, {"source": "7", "target": "29", "source_name": "quality control", "target_name": "cloud computing", "weight": 1.0, "year": 2017}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 3.0, "year": 2017}, {"source": "7", "target": "42", "source_name": "quality control", "target_name": "quality assurance", "weight": 1.0, "year": 2017}, {"source": "7", "target": "44", "source_name": "quality control", "target_name": "empirical study", "weight": 1.0, "year": 2017}, {"source": "7", "target": "45", "source_name": "quality control", "target_name": "spatial crowdsourcing", "weight": 3.0, "year": 2017}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2017}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2017}, {"source": "7", "target": "51", "source_name": "quality control", "target_name": "agile software development", "weight": 1.0, "year": 2017}, {"source": "7", "target": "53", "source_name": "quality control", "target_name": "big data", "weight": 1.0, "year": 2017}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 3.0, "year": 2017}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 2.0, "year": 2017}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2017}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "7", "target": "67", "source_name": "quality control", "target_name": "machine learning", "weight": 3.0, "year": 2017}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 1.0, "year": 2017}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "7", "target": "77", "source_name": "quality control", "target_name": "mechanical turk", "weight": 1.0, "year": 2017}, {"source": "7", "target": "79", "source_name": "quality control", "target_name": "data management", "weight": 1.0, "year": 2017}, {"source": "7", "target": "84", "source_name": "quality control", "target_name": "human computation", "weight": 3.0, "year": 2017}, {"source": "7", "target": "90", "source_name": "quality control", "target_name": "incentive mechanism", "weight": 1.0, "year": 2017}, {"source": "7", "target": "97", "source_name": "quality control", "target_name": "task assignment", "weight": 2.0, "year": 2017}, {"source": "7", "target": "98", "source_name": "quality control", "target_name": "data mining", "weight": 1.0, "year": 2017}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "7", "target": "103", "source_name": "quality control", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "8", "target": "9", "source_name": "amazon mechanical turk", "target_name": "data collection", "weight": 4.0, "year": 2017}, {"source": "8", "target": "11", "source_name": "amazon mechanical turk", "target_name": "crowdsourced data", "weight": 1.0, "year": 2017}, {"source": "8", "target": "12", "source_name": "amazon mechanical turk", "target_name": "open innovation", "weight": 1.0, "year": 2017}, {"source": "8", "target": "15", "source_name": "amazon mechanical turk", "target_name": "decision support", "weight": 1.0, "year": 2017}, {"source": "8", "target": "26", "source_name": "amazon mechanical turk", "target_name": "business process", "weight": 5.0, "year": 2017}, {"source": "8", "target": "27", "source_name": "amazon mechanical turk", "target_name": "social media", "weight": 1.0, "year": 2017}, {"source": "8", "target": "31", "source_name": "amazon mechanical turk", "target_name": "software development", "weight": 3.0, "year": 2017}, {"source": "8", "target": "34", "source_name": "amazon mechanical turk", "target_name": "search engines", "weight": 2.0, "year": 2017}, {"source": "8", "target": "36", "source_name": "amazon mechanical turk", "target_name": "open source", "weight": 1.0, "year": 2017}, {"source": "8", "target": "42", "source_name": "amazon mechanical turk", "target_name": "quality assurance", "weight": 1.0, "year": 2017}, {"source": "8", "target": "54", "source_name": "amazon mechanical turk", "target_name": "software quality", "weight": 1.0, "year": 2017}, {"source": "8", "target": "58", "source_name": "amazon mechanical turk", "target_name": "user interface", "weight": 4.0, "year": 2017}, {"source": "8", "target": "60", "source_name": "amazon mechanical turk", "target_name": "collective intelligence", "weight": 1.0, "year": 2017}, {"source": "8", "target": "71", "source_name": "amazon mechanical turk", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "8", "target": "76", "source_name": "amazon mechanical turk", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "8", "target": "77", "source_name": "amazon mechanical turk", "target_name": "mechanical turk", "weight": 19.0, "year": 2017}, {"source": "8", "target": "80", "source_name": "amazon mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "8", "target": "82", "source_name": "amazon mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2017}, {"source": "8", "target": "83", "source_name": "amazon mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "8", "target": "84", "source_name": "amazon mechanical turk", "target_name": "human computation", "weight": 2.0, "year": 2017}, {"source": "8", "target": "91", "source_name": "amazon mechanical turk", "target_name": "software design", "weight": 3.0, "year": 2017}, {"source": "8", "target": "93", "source_name": "amazon mechanical turk", "target_name": "literature review", "weight": 1.0, "year": 2017}, {"source": "8", "target": "96", "source_name": "amazon mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "9", "target": "11", "source_name": "data collection", "target_name": "crowdsourced data", "weight": 3.0, "year": 2017}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2017}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2017}, {"source": "9", "target": "26", "source_name": "data collection", "target_name": "business process", "weight": 1.0, "year": 2017}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2017}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2017}, {"source": "9", "target": "45", "source_name": "data collection", "target_name": "spatial crowdsourcing", "weight": 3.0, "year": 2017}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2017}, {"source": "9", "target": "58", "source_name": "data collection", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2017}, {"source": "9", "target": "75", "source_name": "data collection", "target_name": "systematic review", "weight": 1.0, "year": 2017}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "9", "target": "77", "source_name": "data collection", "target_name": "mechanical turk", "weight": 3.0, "year": 2017}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2017}, {"source": "9", "target": "80", "source_name": "data collection", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "9", "target": "84", "source_name": "data collection", "target_name": "human computation", "weight": 2.0, "year": 2017}, {"source": "9", "target": "90", "source_name": "data collection", "target_name": "incentive mechanism", "weight": 1.0, "year": 2017}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "9", "target": "97", "source_name": "data collection", "target_name": "task assignment", "weight": 1.0, "year": 2017}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2017}, {"source": "10", "target": "20", "source_name": "requirements engineering", "target_name": "information technology", "weight": 1.0, "year": 2017}, {"source": "10", "target": "21", "source_name": "requirements engineering", "target_name": "problem solving", "weight": 1.0, "year": 2017}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2017}, {"source": "10", "target": "24", "source_name": "requirements engineering", "target_name": "requirements analysis", "weight": 1.0, "year": 2017}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2017}, {"source": "10", "target": "29", "source_name": "requirements engineering", "target_name": "cloud computing", "weight": 1.0, "year": 2017}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 17.0, "year": 2017}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2017}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2017}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 1.0, "year": 2017}, {"source": "10", "target": "37", "source_name": "requirements engineering", "target_name": "controlled experiments", "weight": 1.0, "year": 2017}, {"source": "10", "target": "38", "source_name": "requirements engineering", "target_name": "systematic literature review", "weight": 1.0, "year": 2017}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2017}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2017}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2017}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2017}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2017}, {"source": "10", "target": "53", "source_name": "requirements engineering", "target_name": "big data", "weight": 1.0, "year": 2017}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 3.0, "year": 2017}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 2.0, "year": 2017}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2017}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2017}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2017}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2017}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 3.0, "year": 2017}, {"source": "10", "target": "67", "source_name": "requirements engineering", "target_name": "machine learning", "weight": 1.0, "year": 2017}, {"source": "10", "target": "70", "source_name": "requirements engineering", "target_name": "decision making", "weight": 1.0, "year": 2017}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 2.0, "year": 2017}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2017}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 6.0, "year": 2017}, {"source": "10", "target": "75", "source_name": "requirements engineering", "target_name": "systematic review", "weight": 1.0, "year": 2017}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2017}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2017}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 2.0, "year": 2017}, {"source": "10", "target": "82", "source_name": "requirements engineering", "target_name": "social network", "weight": 2.0, "year": 2017}, {"source": "10", "target": "83", "source_name": "requirements engineering", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2017}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 5.0, "year": 2017}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2017}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 8.0, "year": 2017}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "10", "target": "101", "source_name": "requirements engineering", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "10", "target": "102", "source_name": "requirements engineering", "target_name": "product line", "weight": 2.0, "year": 2017}, {"source": "10", "target": "103", "source_name": "requirements engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "11", "target": "26", "source_name": "crowdsourced data", "target_name": "business process", "weight": 1.0, "year": 2017}, {"source": "11", "target": "34", "source_name": "crowdsourced data", "target_name": "search engines", "weight": 2.0, "year": 2017}, {"source": "11", "target": "36", "source_name": "crowdsourced data", "target_name": "open source", "weight": 1.0, "year": 2017}, {"source": "11", "target": "44", "source_name": "crowdsourced data", "target_name": "empirical study", "weight": 1.0, "year": 2017}, {"source": "11", "target": "45", "source_name": "crowdsourced data", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2017}, {"source": "11", "target": "53", "source_name": "crowdsourced data", "target_name": "big data", "weight": 1.0, "year": 2017}, {"source": "11", "target": "67", "source_name": "crowdsourced data", "target_name": "machine learning", "weight": 1.0, "year": 2017}, {"source": "11", "target": "75", "source_name": "crowdsourced data", "target_name": "systematic review", "weight": 1.0, "year": 2017}, {"source": "11", "target": "77", "source_name": "crowdsourced data", "target_name": "mechanical turk", "weight": 1.0, "year": 2017}, {"source": "11", "target": "79", "source_name": "crowdsourced data", "target_name": "data management", "weight": 3.0, "year": 2017}, {"source": "11", "target": "84", "source_name": "crowdsourced data", "target_name": "human computation", "weight": 1.0, "year": 2017}, {"source": "11", "target": "91", "source_name": "crowdsourced data", "target_name": "software design", "weight": 1.0, "year": 2017}, {"source": "11", "target": "96", "source_name": "crowdsourced data", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2017}, {"source": "12", "target": "21", "source_name": "open innovation", "target_name": "problem solving", "weight": 1.0, "year": 2017}, {"source": "12", "target": "26", "source_name": "open innovation", "target_name": "business process", "weight": 1.0, "year": 2017}, {"source": "12", "target": "31", "source_name": "open innovation", "target_name": "software development", "weight": 1.0, "year": 2017}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2017}, {"source": "12", "target": "42", "source_name": "open innovation", "target_name": "quality assurance", "weight": 1.0, "year": 2017}, {"source": "12", "target": "77", "source_name": "open innovation", "target_name": "mechanical turk", "weight": 1.0, "year": 2017}, {"source": "12", "target": "93", "source_name": "open innovation", "target_name": "literature review", "weight": 2.0, "year": 2017}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 4.0, "year": 2017}, {"source": "13", "target": "27", "source_name": "natural language processing", "target_name": "social media", "weight": 1.0, "year": 2017}, {"source": "13", "target": "31", "source_name": "natural language processing", "target_name": "software development", "weight": 1.0, "year": 2017}, {"source": "13", "target": "67", "source_name": "natural language processing", "target_name": "machine learning", "weight": 5.0, "year": 2017}, {"source": "13", "target": "84", "source_name": "natural language processing", "target_name": "human computation", "weight": 2.0, "year": 2017}, {"source": "13", "target": "101", "source_name": "natural language processing", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 4.0, "year": 2017}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2017}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2017}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2017}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2017}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2017}, {"source": "14", "target": "61", "source_name": "object oriented", "target_name": "extreme programming", "weight": 1.0, "year": 2017}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2017}, {"source": "14", "target": "71", "source_name": "object oriented", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2017}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2017}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2017}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2017}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2017}, {"source": "15", "target": "62", "source_name": "decision support", "target_name": "information processing", "weight": 1.0, "year": 2017}, {"source": "15", "target": "67", "source_name": "decision support", "target_name": "machine learning", "weight": 1.0, "year": 2017}, {"source": "15", "target": "71", "source_name": "decision support", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "15", "target": "100", "source_name": "decision support", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "16", "target": "29", "source_name": "learning environment", "target_name": "cloud computing", "weight": 1.0, "year": 2017}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2017}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2017}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2017}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 3.0, "year": 2017}, {"source": "17", "target": "33", "source_name": "conceptual framework", "target_name": "fundamental principles", "weight": 1.0, "year": 2017}, {"source": "17", "target": "38", "source_name": "conceptual framework", "target_name": "systematic literature review", "weight": 1.0, "year": 2017}, {"source": "17", "target": "46", "source_name": "conceptual framework", "target_name": "empirical studies", "weight": 1.0, "year": 2017}, {"source": "17", "target": "74", "source_name": "conceptual framework", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "17", "target": "75", "source_name": "conceptual framework", "target_name": "systematic review", "weight": 1.0, "year": 2017}, {"source": "17", "target": "80", "source_name": "conceptual framework", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "17", "target": "82", "source_name": "conceptual framework", "target_name": "social network", "weight": 1.0, "year": 2017}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2017}, {"source": "17", "target": "93", "source_name": "conceptual framework", "target_name": "literature review", "weight": 3.0, "year": 2017}, {"source": "17", "target": "103", "source_name": "conceptual framework", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2017}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2017}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2017}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2017}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 4.0, "year": 2017}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2017}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2017}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2017}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2017}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2017}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2017}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2017}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2017}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2017}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2017}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2017}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2017}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2017}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2017}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "19", "target": "78", "source_name": "configuration management", "target_name": "process improvement", "weight": 1.0, "year": 2017}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2017}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2017}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 7.0, "year": 2017}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 2.0, "year": 2017}, {"source": "20", "target": "37", "source_name": "information technology", "target_name": "controlled experiments", "weight": 1.0, "year": 2017}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2017}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2017}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 2.0, "year": 2017}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2017}, {"source": "20", "target": "57", "source_name": "information technology", "target_name": "human intelligence", "weight": 1.0, "year": 2017}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "20", "target": "60", "source_name": "information technology", "target_name": "collective intelligence", "weight": 1.0, "year": 2017}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2017}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2017}, {"source": "20", "target": "70", "source_name": "information technology", "target_name": "decision making", "weight": 1.0, "year": 2017}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2017}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2017}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2017}, {"source": "20", "target": "93", "source_name": "information technology", "target_name": "literature review", "weight": 1.0, "year": 2017}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 2.0, "year": 2017}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2017}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2017}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2017}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 12.0, "year": 2017}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 2.0, "year": 2017}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2017}, {"source": "21", "target": "39", "source_name": "problem solving", "target_name": "team members", "weight": 1.0, "year": 2017}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2017}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2017}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 2.0, "year": 2017}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2017}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 2.0, "year": 2017}, {"source": "21", "target": "69", "source_name": "problem solving", "target_name": "computational intelligence", "weight": 1.0, "year": 2017}, {"source": "21", "target": "71", "source_name": "problem solving", "target_name": "software testing", "weight": 2.0, "year": 2017}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2017}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2017}, {"source": "21", "target": "80", "source_name": "problem solving", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "21", "target": "84", "source_name": "problem solving", "target_name": "human computation", "weight": 1.0, "year": 2017}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 1.0, "year": 2017}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 3.0, "year": 2017}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "21", "target": "99", "source_name": "problem solving", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 10.0, "year": 2017}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2017}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2017}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2017}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2017}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 3.0, "year": 2017}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2017}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2017}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2017}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2017}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2017}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2017}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2017}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2017}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2017}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2017}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2017}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2017}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2017}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2017}, {"source": "24", "target": "53", "source_name": "requirements analysis", "target_name": "big data", "weight": 1.0, "year": 2017}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2017}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2017}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2017}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2017}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2017}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2017}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2017}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2017}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "25", "target": "31", "source_name": "motivational factors", "target_name": "software development", "weight": 1.0, "year": 2017}, {"source": "25", "target": "46", "source_name": "motivational factors", "target_name": "empirical studies", "weight": 1.0, "year": 2017}, {"source": "25", "target": "93", "source_name": "motivational factors", "target_name": "literature review", "weight": 2.0, "year": 2017}, {"source": "26", "target": "29", "source_name": "business process", "target_name": "cloud computing", "weight": 1.0, "year": 2017}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 3.0, "year": 2017}, {"source": "26", "target": "36", "source_name": "business process", "target_name": "open source", "weight": 1.0, "year": 2017}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2017}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 2.0, "year": 2017}, {"source": "26", "target": "58", "source_name": "business process", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "26", "target": "60", "source_name": "business process", "target_name": "collective intelligence", "weight": 4.0, "year": 2017}, {"source": "26", "target": "70", "source_name": "business process", "target_name": "decision making", "weight": 1.0, "year": 2017}, {"source": "26", "target": "71", "source_name": "business process", "target_name": "software testing", "weight": 3.0, "year": 2017}, {"source": "26", "target": "76", "source_name": "business process", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "26", "target": "77", "source_name": "business process", "target_name": "mechanical turk", "weight": 3.0, "year": 2017}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 2.0, "year": 2017}, {"source": "26", "target": "82", "source_name": "business process", "target_name": "social network", "weight": 1.0, "year": 2017}, {"source": "26", "target": "84", "source_name": "business process", "target_name": "human computation", "weight": 1.0, "year": 2017}, {"source": "26", "target": "91", "source_name": "business process", "target_name": "software design", "weight": 1.0, "year": 2017}, {"source": "26", "target": "93", "source_name": "business process", "target_name": "literature review", "weight": 3.0, "year": 2017}, {"source": "26", "target": "96", "source_name": "business process", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "26", "target": "103", "source_name": "business process", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "27", "target": "31", "source_name": "social media", "target_name": "software development", "weight": 4.0, "year": 2017}, {"source": "27", "target": "34", "source_name": "social media", "target_name": "search engines", "weight": 2.0, "year": 2017}, {"source": "27", "target": "36", "source_name": "social media", "target_name": "open source", "weight": 1.0, "year": 2017}, {"source": "27", "target": "38", "source_name": "social media", "target_name": "systematic literature review", "weight": 1.0, "year": 2017}, {"source": "27", "target": "53", "source_name": "social media", "target_name": "big data", "weight": 1.0, "year": 2017}, {"source": "27", "target": "57", "source_name": "social media", "target_name": "human intelligence", "weight": 1.0, "year": 2017}, {"source": "27", "target": "58", "source_name": "social media", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "27", "target": "60", "source_name": "social media", "target_name": "collective intelligence", "weight": 2.0, "year": 2017}, {"source": "27", "target": "77", "source_name": "social media", "target_name": "mechanical turk", "weight": 3.0, "year": 2017}, {"source": "27", "target": "79", "source_name": "social media", "target_name": "data management", "weight": 1.0, "year": 2017}, {"source": "27", "target": "82", "source_name": "social media", "target_name": "social network", "weight": 1.0, "year": 2017}, {"source": "27", "target": "84", "source_name": "social media", "target_name": "human computation", "weight": 1.0, "year": 2017}, {"source": "27", "target": "90", "source_name": "social media", "target_name": "incentive mechanism", "weight": 1.0, "year": 2017}, {"source": "27", "target": "93", "source_name": "social media", "target_name": "literature review", "weight": 2.0, "year": 2017}, {"source": "27", "target": "97", "source_name": "social media", "target_name": "task assignment", "weight": 1.0, "year": 2017}, {"source": "27", "target": "98", "source_name": "social media", "target_name": "data mining", "weight": 1.0, "year": 2017}, {"source": "28", "target": "31", "source_name": "computing elements", "target_name": "software development", "weight": 2.0, "year": 2017}, {"source": "28", "target": "60", "source_name": "computing elements", "target_name": "collective intelligence", "weight": 2.0, "year": 2017}, {"source": "28", "target": "76", "source_name": "computing elements", "target_name": "life cycle", "weight": 2.0, "year": 2017}, {"source": "28", "target": "97", "source_name": "computing elements", "target_name": "task assignment", "weight": 1.0, "year": 2017}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 4.0, "year": 2017}, {"source": "29", "target": "42", "source_name": "cloud computing", "target_name": "quality assurance", "weight": 1.0, "year": 2017}, {"source": "29", "target": "71", "source_name": "cloud computing", "target_name": "software testing", "weight": 2.0, "year": 2017}, {"source": "29", "target": "74", "source_name": "cloud computing", "target_name": "software architecture", "weight": 2.0, "year": 2017}, {"source": "29", "target": "83", "source_name": "cloud computing", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "29", "target": "91", "source_name": "cloud computing", "target_name": "software design", "weight": 1.0, "year": 2017}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 3.0, "year": 2017}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "30", "target": "96", "source_name": "end users", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2017}, {"source": "31", "target": "33", "source_name": "software development", "target_name": "fundamental principles", "weight": 3.0, "year": 2017}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2017}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2017}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 15.0, "year": 2017}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 3.0, "year": 2017}, {"source": "31", "target": "38", "source_name": "software development", "target_name": "systematic literature review", "weight": 1.0, "year": 2017}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 7.0, "year": 2017}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 2.0, "year": 2017}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2017}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 7.0, "year": 2017}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 5.0, "year": 2017}, {"source": "31", "target": "45", "source_name": "software development", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2017}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 2.0, "year": 2017}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 7.0, "year": 2017}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2017}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 5.0, "year": 2017}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 11.0, "year": 2017}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 2.0, "year": 2017}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 25.0, "year": 2017}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 7.0, "year": 2017}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2017}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 2.0, "year": 2017}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 7.0, "year": 2017}, {"source": "31", "target": "60", "source_name": "software development", "target_name": "collective intelligence", "weight": 3.0, "year": 2017}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 11.0, "year": 2017}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2017}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2017}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2017}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 18.0, "year": 2017}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 2.0, "year": 2017}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2017}, {"source": "31", "target": "70", "source_name": "software development", "target_name": "decision making", "weight": 1.0, "year": 2017}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 9.0, "year": 2017}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 5.0, "year": 2017}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2017}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 15.0, "year": 2017}, {"source": "31", "target": "75", "source_name": "software development", "target_name": "systematic review", "weight": 3.0, "year": 2017}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 21.0, "year": 2017}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 8.0, "year": 2017}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2017}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2017}, {"source": "31", "target": "82", "source_name": "software development", "target_name": "social network", "weight": 2.0, "year": 2017}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 6.0, "year": 2017}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2017}, {"source": "31", "target": "86", "source_name": "software development", "target_name": "systematic mapping", "weight": 2.0, "year": 2017}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 23.0, "year": 2017}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2017}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 4.0, "year": 2017}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 5.0, "year": 2017}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 7.0, "year": 2017}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 4.0, "year": 2017}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 4.0, "year": 2017}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 4.0, "year": 2017}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 9.0, "year": 2017}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 23.0, "year": 2017}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 3.0, "year": 2017}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2017}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2017}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2017}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2017}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2017}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2017}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2017}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2017}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2017}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "33", "target": "54", "source_name": "fundamental principles", "target_name": "software quality", "weight": 1.0, "year": 2017}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2017}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "33", "target": "74", "source_name": "fundamental principles", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "34", "target": "53", "source_name": "search engines", "target_name": "big data", "weight": 1.0, "year": 2017}, {"source": "34", "target": "57", "source_name": "search engines", "target_name": "human intelligence", "weight": 1.0, "year": 2017}, {"source": "34", "target": "65", "source_name": "search engines", "target_name": "web search", "weight": 4.0, "year": 2017}, {"source": "34", "target": "67", "source_name": "search engines", "target_name": "machine learning", "weight": 1.0, "year": 2017}, {"source": "34", "target": "77", "source_name": "search engines", "target_name": "mechanical turk", "weight": 3.0, "year": 2017}, {"source": "34", "target": "82", "source_name": "search engines", "target_name": "social network", "weight": 1.0, "year": 2017}, {"source": "34", "target": "84", "source_name": "search engines", "target_name": "human computation", "weight": 1.0, "year": 2017}, {"source": "34", "target": "95", "source_name": "search engines", "target_name": "human factors", "weight": 2.0, "year": 2017}, {"source": "34", "target": "100", "source_name": "search engines", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2017}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 1.0, "year": 2017}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2017}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 1.0, "year": 2017}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2017}, {"source": "36", "target": "57", "source_name": "open source", "target_name": "human intelligence", "weight": 1.0, "year": 2017}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "36", "target": "60", "source_name": "open source", "target_name": "collective intelligence", "weight": 1.0, "year": 2017}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2017}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2017}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "36", "target": "77", "source_name": "open source", "target_name": "mechanical turk", "weight": 3.0, "year": 2017}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2017}, {"source": "36", "target": "82", "source_name": "open source", "target_name": "social network", "weight": 1.0, "year": 2017}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 4.0, "year": 2017}, {"source": "36", "target": "93", "source_name": "open source", "target_name": "literature review", "weight": 1.0, "year": 2017}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 18.0, "year": 2017}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "37", "target": "38", "source_name": "controlled experiments", "target_name": "systematic literature review", "weight": 1.0, "year": 2017}, {"source": "37", "target": "57", "source_name": "controlled experiments", "target_name": "human intelligence", "weight": 1.0, "year": 2017}, {"source": "37", "target": "75", "source_name": "controlled experiments", "target_name": "systematic review", "weight": 1.0, "year": 2017}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2017}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 3.0, "year": 2017}, {"source": "38", "target": "80", "source_name": "systematic literature review", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 8.0, "year": 2017}, {"source": "38", "target": "96", "source_name": "systematic literature review", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2017}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2017}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 4.0, "year": 2017}, {"source": "39", "target": "69", "source_name": "team members", "target_name": "computational intelligence", "weight": 1.0, "year": 2017}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2017}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2017}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2017}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2017}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2017}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2017}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2017}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2017}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2017}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 5.0, "year": 2017}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2017}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2017}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2017}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2017}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "42", "target": "77", "source_name": "quality assurance", "target_name": "mechanical turk", "weight": 2.0, "year": 2017}, {"source": "42", "target": "84", "source_name": "quality assurance", "target_name": "human computation", "weight": 1.0, "year": 2017}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2017}, {"source": "42", "target": "93", "source_name": "quality assurance", "target_name": "literature review", "weight": 1.0, "year": 2017}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2017}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 2.0, "year": 2017}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2017}, {"source": "44", "target": "54", "source_name": "empirical study", "target_name": "software quality", "weight": 1.0, "year": 2017}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 2.0, "year": 2017}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "45", "target": "79", "source_name": "spatial crowdsourcing", "target_name": "data management", "weight": 1.0, "year": 2017}, {"source": "45", "target": "90", "source_name": "spatial crowdsourcing", "target_name": "incentive mechanism", "weight": 2.0, "year": 2017}, {"source": "45", "target": "97", "source_name": "spatial crowdsourcing", "target_name": "task assignment", "weight": 3.0, "year": 2017}, {"source": "46", "target": "47", "source_name": "empirical studies", "target_name": "software maintenance", "weight": 1.0, "year": 2017}, {"source": "46", "target": "50", "source_name": "empirical studies", "target_name": "source code", "weight": 2.0, "year": 2017}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2017}, {"source": "46", "target": "57", "source_name": "empirical studies", "target_name": "human intelligence", "weight": 1.0, "year": 2017}, {"source": "46", "target": "71", "source_name": "empirical studies", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2017}, {"source": "46", "target": "82", "source_name": "empirical studies", "target_name": "social network", "weight": 1.0, "year": 2017}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 2.0, "year": 2017}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2017}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 6.0, "year": 2017}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2017}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2017}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2017}, {"source": "47", "target": "59", "source_name": "software maintenance", "target_name": "bug reports", "weight": 1.0, "year": 2017}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2017}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2017}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "47", "target": "67", "source_name": "software maintenance", "target_name": "machine learning", "weight": 1.0, "year": 2017}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 4.0, "year": 2017}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 7.0, "year": 2017}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2017}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2017}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2017}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 2.0, "year": 2017}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2017}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2017}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2017}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2017}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2017}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2017}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2017}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2017}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2017}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2017}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2017}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2017}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 8.0, "year": 2017}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 3.0, "year": 2017}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "50", "target": "101", "source_name": "source code", "target_name": "software reuse", "weight": 2.0, "year": 2017}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2017}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "51", "target": "74", "source_name": "agile software development", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 3.0, "year": 2017}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2017}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2017}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2017}, {"source": "53", "target": "60", "source_name": "big data", "target_name": "collective intelligence", "weight": 1.0, "year": 2017}, {"source": "53", "target": "77", "source_name": "big data", "target_name": "mechanical turk", "weight": 1.0, "year": 2017}, {"source": "53", "target": "79", "source_name": "big data", "target_name": "data management", "weight": 1.0, "year": 2017}, {"source": "53", "target": "84", "source_name": "big data", "target_name": "human computation", "weight": 1.0, "year": 2017}, {"source": "53", "target": "90", "source_name": "big data", "target_name": "incentive mechanism", "weight": 1.0, "year": 2017}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2017}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2017}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2017}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2017}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2017}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2017}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2017}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2017}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2017}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2017}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2017}, {"source": "54", "target": "77", "source_name": "software quality", "target_name": "mechanical turk", "weight": 1.0, "year": 2017}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 3.0, "year": 2017}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2017}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 4.0, "year": 2017}, {"source": "54", "target": "86", "source_name": "software quality", "target_name": "systematic mapping", "weight": 1.0, "year": 2017}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 4.0, "year": 2017}, {"source": "54", "target": "95", "source_name": "software quality", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2017}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2017}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2017}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2017}, {"source": "55", "target": "67", "source_name": "systems engineering", "target_name": "machine learning", "weight": 1.0, "year": 2017}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2017}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2017}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "55", "target": "82", "source_name": "systems engineering", "target_name": "social network", "weight": 1.0, "year": 2017}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2017}, {"source": "55", "target": "85", "source_name": "systems engineering", "target_name": "degree programs", "weight": 2.0, "year": 2017}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2017}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2017}, {"source": "55", "target": "102", "source_name": "systems engineering", "target_name": "product line", "weight": 1.0, "year": 2017}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2017}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2017}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2017}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2017}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2017}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2017}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2017}, {"source": "57", "target": "60", "source_name": "human intelligence", "target_name": "collective intelligence", "weight": 3.0, "year": 2017}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2017}, {"source": "57", "target": "77", "source_name": "human intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2017}, {"source": "57", "target": "84", "source_name": "human intelligence", "target_name": "human computation", "weight": 1.0, "year": 2017}, {"source": "57", "target": "96", "source_name": "human intelligence", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 2.0, "year": 2017}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2017}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2017}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2017}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2017}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2017}, {"source": "58", "target": "77", "source_name": "user interface", "target_name": "mechanical turk", "weight": 3.0, "year": 2017}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "58", "target": "84", "source_name": "user interface", "target_name": "human computation", "weight": 2.0, "year": 2017}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 4.0, "year": 2017}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2017}, {"source": "59", "target": "67", "source_name": "bug reports", "target_name": "machine learning", "weight": 2.0, "year": 2017}, {"source": "59", "target": "71", "source_name": "bug reports", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "60", "target": "71", "source_name": "collective intelligence", "target_name": "software testing", "weight": 3.0, "year": 2017}, {"source": "60", "target": "76", "source_name": "collective intelligence", "target_name": "life cycle", "weight": 2.0, "year": 2017}, {"source": "60", "target": "77", "source_name": "collective intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2017}, {"source": "60", "target": "79", "source_name": "collective intelligence", "target_name": "data management", "weight": 1.0, "year": 2017}, {"source": "60", "target": "84", "source_name": "collective intelligence", "target_name": "human computation", "weight": 2.0, "year": 2017}, {"source": "60", "target": "93", "source_name": "collective intelligence", "target_name": "literature review", "weight": 2.0, "year": 2017}, {"source": "60", "target": "96", "source_name": "collective intelligence", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2017}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 3.0, "year": 2017}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2017}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2017}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2017}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2017}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "62", "target": "67", "source_name": "information processing", "target_name": "machine learning", "weight": 1.0, "year": 2017}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2017}, {"source": "62", "target": "100", "source_name": "information processing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2017}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2017}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2017}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2017}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2017}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 2.0, "year": 2017}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 4.0, "year": 2017}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 3.0, "year": 2017}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2017}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2017}, {"source": "66", "target": "80", "source_name": "project management", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "66", "target": "82", "source_name": "project management", "target_name": "social network", "weight": 1.0, "year": 2017}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "66", "target": "86", "source_name": "project management", "target_name": "systematic mapping", "weight": 1.0, "year": 2017}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2017}, {"source": "66", "target": "93", "source_name": "project management", "target_name": "literature review", "weight": 1.0, "year": 2017}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2017}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "66", "target": "101", "source_name": "project management", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2017}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 2.0, "year": 2017}, {"source": "67", "target": "79", "source_name": "machine learning", "target_name": "data management", "weight": 1.0, "year": 2017}, {"source": "67", "target": "82", "source_name": "machine learning", "target_name": "social network", "weight": 2.0, "year": 2017}, {"source": "67", "target": "84", "source_name": "machine learning", "target_name": "human computation", "weight": 4.0, "year": 2017}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 2.0, "year": 2017}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 4.0, "year": 2017}, {"source": "67", "target": "103", "source_name": "machine learning", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "68", "target": "84", "source_name": "service oriented", "target_name": "human computation", "weight": 1.0, "year": 2017}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2017}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2017}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2017}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2017}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2017}, {"source": "70", "target": "96", "source_name": "decision making", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "70", "target": "98", "source_name": "decision making", "target_name": "data mining", "weight": 1.0, "year": 2017}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2017}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 3.0, "year": 2017}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2017}, {"source": "71", "target": "78", "source_name": "software testing", "target_name": "process improvement", "weight": 1.0, "year": 2017}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2017}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2017}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2017}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 2.0, "year": 2017}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2017}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2017}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2017}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2017}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2017}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2017}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 2.0, "year": 2017}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 2.0, "year": 2017}, {"source": "74", "target": "83", "source_name": "software architecture", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2017}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 4.0, "year": 2017}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2017}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 3.0, "year": 2017}, {"source": "75", "target": "96", "source_name": "systematic review", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "75", "target": "103", "source_name": "systematic review", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2017}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2017}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2017}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2017}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2017}, {"source": "77", "target": "79", "source_name": "mechanical turk", "target_name": "data management", "weight": 2.0, "year": 2017}, {"source": "77", "target": "80", "source_name": "mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "77", "target": "82", "source_name": "mechanical turk", "target_name": "social network", "weight": 2.0, "year": 2017}, {"source": "77", "target": "83", "source_name": "mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "77", "target": "84", "source_name": "mechanical turk", "target_name": "human computation", "weight": 5.0, "year": 2017}, {"source": "77", "target": "91", "source_name": "mechanical turk", "target_name": "software design", "weight": 3.0, "year": 2017}, {"source": "77", "target": "93", "source_name": "mechanical turk", "target_name": "literature review", "weight": 1.0, "year": 2017}, {"source": "77", "target": "95", "source_name": "mechanical turk", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "77", "target": "96", "source_name": "mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2017}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2017}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2017}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2017}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "79", "target": "84", "source_name": "data management", "target_name": "human computation", "weight": 2.0, "year": 2017}, {"source": "80", "target": "84", "source_name": "information systems", "target_name": "human computation", "weight": 1.0, "year": 2017}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2017}, {"source": "80", "target": "93", "source_name": "information systems", "target_name": "literature review", "weight": 3.0, "year": 2017}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2017}, {"source": "82", "target": "84", "source_name": "social network", "target_name": "human computation", "weight": 1.0, "year": 2017}, {"source": "82", "target": "90", "source_name": "social network", "target_name": "incentive mechanism", "weight": 1.0, "year": 2017}, {"source": "82", "target": "98", "source_name": "social network", "target_name": "data mining", "weight": 1.0, "year": 2017}, {"source": "82", "target": "99", "source_name": "social network", "target_name": "requirements elicitation", "weight": 1.0, "year": 2017}, {"source": "83", "target": "84", "source_name": "lessons learned", "target_name": "human computation", "weight": 1.0, "year": 2017}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2017}, {"source": "84", "target": "100", "source_name": "human computation", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "90", "target": "93", "source_name": "incentive mechanism", "target_name": "literature review", "weight": 1.0, "year": 2017}, {"source": "90", "target": "97", "source_name": "incentive mechanism", "target_name": "task assignment", "weight": 3.0, "year": 2017}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2017}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 2.0, "year": 2017}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2017}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2017}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2017}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2017}, {"source": "93", "target": "96", "source_name": "literature review", "target_name": "open source software", "weight": 2.0, "year": 2017}, {"source": "93", "target": "97", "source_name": "literature review", "target_name": "task assignment", "weight": 1.0, "year": 2017}, {"source": "93", "target": "103", "source_name": "literature review", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2017}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2017}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2017}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2017}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2017}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2017}]}, {"2018": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 5.0, "year": 2018}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2018}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 2.0, "year": 2018}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2018}, {"source": "0", "target": "47", "source_name": "intellectual property", "target_name": "software maintenance", "weight": 1.0, "year": 2018}, {"source": "0", "target": "50", "source_name": "intellectual property", "target_name": "source code", "weight": 1.0, "year": 2018}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 3.0, "year": 2018}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "0", "target": "101", "source_name": "intellectual property", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "1", "target": "4", "source_name": "natural language", "target_name": "test report", "weight": 1.0, "year": 2018}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2018}, {"source": "1", "target": "7", "source_name": "natural language", "target_name": "quality control", "weight": 1.0, "year": 2018}, {"source": "1", "target": "13", "source_name": "natural language", "target_name": "natural language processing", "weight": 2.0, "year": 2018}, {"source": "1", "target": "27", "source_name": "natural language", "target_name": "social media", "weight": 1.0, "year": 2018}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2018}, {"source": "1", "target": "34", "source_name": "natural language", "target_name": "search engines", "weight": 2.0, "year": 2018}, {"source": "1", "target": "44", "source_name": "natural language", "target_name": "empirical study", "weight": 1.0, "year": 2018}, {"source": "1", "target": "45", "source_name": "natural language", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2018}, {"source": "1", "target": "57", "source_name": "natural language", "target_name": "human intelligence", "weight": 1.0, "year": 2018}, {"source": "1", "target": "97", "source_name": "natural language", "target_name": "task assignment", "weight": 1.0, "year": 2018}, {"source": "1", "target": "100", "source_name": "natural language", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 8.0, "year": 2018}, {"source": "2", "target": "7", "source_name": "business model", "target_name": "quality control", "weight": 2.0, "year": 2018}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 2.0, "year": 2018}, {"source": "2", "target": "10", "source_name": "business model", "target_name": "requirements engineering", "weight": 1.0, "year": 2018}, {"source": "2", "target": "12", "source_name": "business model", "target_name": "open innovation", "weight": 4.0, "year": 2018}, {"source": "2", "target": "20", "source_name": "business model", "target_name": "information technology", "weight": 1.0, "year": 2018}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 3.0, "year": 2018}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2018}, {"source": "2", "target": "26", "source_name": "business model", "target_name": "business process", "weight": 4.0, "year": 2018}, {"source": "2", "target": "27", "source_name": "business model", "target_name": "social media", "weight": 1.0, "year": 2018}, {"source": "2", "target": "29", "source_name": "business model", "target_name": "cloud computing", "weight": 1.0, "year": 2018}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 5.0, "year": 2018}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 2.0, "year": 2018}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2018}, {"source": "2", "target": "58", "source_name": "business model", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "2", "target": "60", "source_name": "business model", "target_name": "collective intelligence", "weight": 4.0, "year": 2018}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "2", "target": "71", "source_name": "business model", "target_name": "software testing", "weight": 4.0, "year": 2018}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2018}, {"source": "2", "target": "80", "source_name": "business model", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2018}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2018}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2018}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2018}, {"source": "3", "target": "27", "source_name": "design patterns", "target_name": "social media", "weight": 1.0, "year": 2018}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2018}, {"source": "3", "target": "36", "source_name": "design patterns", "target_name": "open source", "weight": 1.0, "year": 2018}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2018}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2018}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2018}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2018}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2018}, {"source": "3", "target": "57", "source_name": "design patterns", "target_name": "human intelligence", "weight": 1.0, "year": 2018}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2018}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2018}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2018}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2018}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2018}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2018}, {"source": "4", "target": "44", "source_name": "test report", "target_name": "empirical study", "weight": 1.0, "year": 2018}, {"source": "4", "target": "47", "source_name": "test report", "target_name": "software maintenance", "weight": 1.0, "year": 2018}, {"source": "4", "target": "59", "source_name": "test report", "target_name": "bug reports", "weight": 1.0, "year": 2018}, {"source": "4", "target": "67", "source_name": "test report", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "4", "target": "71", "source_name": "test report", "target_name": "software testing", "weight": 3.0, "year": 2018}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 9.0, "year": 2018}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2018}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2018}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 2.0, "year": 2018}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2018}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 5.0, "year": 2018}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2018}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2018}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2018}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2018}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2018}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2018}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2018}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2018}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2018}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2018}, {"source": "5", "target": "78", "source_name": "software quality assurance", "target_name": "process improvement", "weight": 1.0, "year": 2018}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2018}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2018}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2018}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 8.0, "year": 2018}, {"source": "6", "target": "8", "source_name": "software engineer", "target_name": "amazon mechanical turk", "weight": 7.0, "year": 2018}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 4.0, "year": 2018}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 26.0, "year": 2018}, {"source": "6", "target": "11", "source_name": "software engineer", "target_name": "crowdsourced data", "weight": 1.0, "year": 2018}, {"source": "6", "target": "12", "source_name": "software engineer", "target_name": "open innovation", "weight": 1.0, "year": 2018}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2018}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2018}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 7.0, "year": 2018}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 5.0, "year": 2018}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 5.0, "year": 2018}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 15.0, "year": 2018}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 14.0, "year": 2018}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 15.0, "year": 2018}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 18.0, "year": 2018}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2018}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2018}, {"source": "6", "target": "27", "source_name": "software engineer", "target_name": "social media", "weight": 5.0, "year": 2018}, {"source": "6", "target": "29", "source_name": "software engineer", "target_name": "cloud computing", "weight": 8.0, "year": 2018}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 5.0, "year": 2018}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 344.0, "year": 2018}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 10.0, "year": 2018}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 11.0, "year": 2018}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2018}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2018}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 22.0, "year": 2018}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 5.0, "year": 2018}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 6.0, "year": 2018}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 10.0, "year": 2018}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 10.0, "year": 2018}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 5.0, "year": 2018}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 10.0, "year": 2018}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 5.0, "year": 2018}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 19.0, "year": 2018}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 15.0, "year": 2018}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2018}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2018}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 15.0, "year": 2018}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 13.0, "year": 2018}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2018}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 39.0, "year": 2018}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 32.0, "year": 2018}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2018}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 3.0, "year": 2018}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 11.0, "year": 2018}, {"source": "6", "target": "59", "source_name": "software engineer", "target_name": "bug reports", "weight": 2.0, "year": 2018}, {"source": "6", "target": "60", "source_name": "software engineer", "target_name": "collective intelligence", "weight": 2.0, "year": 2018}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2018}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2018}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2018}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2018}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 32.0, "year": 2018}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 3.0, "year": 2018}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2018}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2018}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 6.0, "year": 2018}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 23.0, "year": 2018}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 18.0, "year": 2018}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2018}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 35.0, "year": 2018}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 6.0, "year": 2018}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 31.0, "year": 2018}, {"source": "6", "target": "77", "source_name": "software engineer", "target_name": "mechanical turk", "weight": 6.0, "year": 2018}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 18.0, "year": 2018}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 13.0, "year": 2018}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 8.0, "year": 2018}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 8.0, "year": 2018}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 22.0, "year": 2018}, {"source": "6", "target": "84", "source_name": "software engineer", "target_name": "human computation", "weight": 2.0, "year": 2018}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 12.0, "year": 2018}, {"source": "6", "target": "86", "source_name": "software engineer", "target_name": "systematic mapping", "weight": 1.0, "year": 2018}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2018}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2018}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 57.0, "year": 2018}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2018}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 9.0, "year": 2018}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 9.0, "year": 2018}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 14.0, "year": 2018}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 13.0, "year": 2018}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 4.0, "year": 2018}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 11.0, "year": 2018}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 15.0, "year": 2018}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 29.0, "year": 2018}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 8.0, "year": 2018}, {"source": "7", "target": "8", "source_name": "quality control", "target_name": "amazon mechanical turk", "weight": 2.0, "year": 2018}, {"source": "7", "target": "9", "source_name": "quality control", "target_name": "data collection", "weight": 2.0, "year": 2018}, {"source": "7", "target": "10", "source_name": "quality control", "target_name": "requirements engineering", "weight": 1.0, "year": 2018}, {"source": "7", "target": "11", "source_name": "quality control", "target_name": "crowdsourced data", "weight": 3.0, "year": 2018}, {"source": "7", "target": "13", "source_name": "quality control", "target_name": "natural language processing", "weight": 2.0, "year": 2018}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2018}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2018}, {"source": "7", "target": "21", "source_name": "quality control", "target_name": "problem solving", "weight": 1.0, "year": 2018}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2018}, {"source": "7", "target": "26", "source_name": "quality control", "target_name": "business process", "weight": 2.0, "year": 2018}, {"source": "7", "target": "27", "source_name": "quality control", "target_name": "social media", "weight": 1.0, "year": 2018}, {"source": "7", "target": "29", "source_name": "quality control", "target_name": "cloud computing", "weight": 1.0, "year": 2018}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 3.0, "year": 2018}, {"source": "7", "target": "42", "source_name": "quality control", "target_name": "quality assurance", "weight": 1.0, "year": 2018}, {"source": "7", "target": "44", "source_name": "quality control", "target_name": "empirical study", "weight": 1.0, "year": 2018}, {"source": "7", "target": "45", "source_name": "quality control", "target_name": "spatial crowdsourcing", "weight": 4.0, "year": 2018}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2018}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2018}, {"source": "7", "target": "50", "source_name": "quality control", "target_name": "source code", "weight": 1.0, "year": 2018}, {"source": "7", "target": "51", "source_name": "quality control", "target_name": "agile software development", "weight": 1.0, "year": 2018}, {"source": "7", "target": "53", "source_name": "quality control", "target_name": "big data", "weight": 1.0, "year": 2018}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 4.0, "year": 2018}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 2.0, "year": 2018}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2018}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "7", "target": "67", "source_name": "quality control", "target_name": "machine learning", "weight": 3.0, "year": 2018}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 1.0, "year": 2018}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 2.0, "year": 2018}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "7", "target": "77", "source_name": "quality control", "target_name": "mechanical turk", "weight": 2.0, "year": 2018}, {"source": "7", "target": "79", "source_name": "quality control", "target_name": "data management", "weight": 1.0, "year": 2018}, {"source": "7", "target": "84", "source_name": "quality control", "target_name": "human computation", "weight": 3.0, "year": 2018}, {"source": "7", "target": "90", "source_name": "quality control", "target_name": "incentive mechanism", "weight": 1.0, "year": 2018}, {"source": "7", "target": "97", "source_name": "quality control", "target_name": "task assignment", "weight": 2.0, "year": 2018}, {"source": "7", "target": "98", "source_name": "quality control", "target_name": "data mining", "weight": 1.0, "year": 2018}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "7", "target": "103", "source_name": "quality control", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "8", "target": "9", "source_name": "amazon mechanical turk", "target_name": "data collection", "weight": 4.0, "year": 2018}, {"source": "8", "target": "11", "source_name": "amazon mechanical turk", "target_name": "crowdsourced data", "weight": 1.0, "year": 2018}, {"source": "8", "target": "12", "source_name": "amazon mechanical turk", "target_name": "open innovation", "weight": 1.0, "year": 2018}, {"source": "8", "target": "15", "source_name": "amazon mechanical turk", "target_name": "decision support", "weight": 1.0, "year": 2018}, {"source": "8", "target": "26", "source_name": "amazon mechanical turk", "target_name": "business process", "weight": 5.0, "year": 2018}, {"source": "8", "target": "27", "source_name": "amazon mechanical turk", "target_name": "social media", "weight": 1.0, "year": 2018}, {"source": "8", "target": "31", "source_name": "amazon mechanical turk", "target_name": "software development", "weight": 4.0, "year": 2018}, {"source": "8", "target": "34", "source_name": "amazon mechanical turk", "target_name": "search engines", "weight": 2.0, "year": 2018}, {"source": "8", "target": "36", "source_name": "amazon mechanical turk", "target_name": "open source", "weight": 1.0, "year": 2018}, {"source": "8", "target": "42", "source_name": "amazon mechanical turk", "target_name": "quality assurance", "weight": 1.0, "year": 2018}, {"source": "8", "target": "45", "source_name": "amazon mechanical turk", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2018}, {"source": "8", "target": "54", "source_name": "amazon mechanical turk", "target_name": "software quality", "weight": 1.0, "year": 2018}, {"source": "8", "target": "58", "source_name": "amazon mechanical turk", "target_name": "user interface", "weight": 4.0, "year": 2018}, {"source": "8", "target": "60", "source_name": "amazon mechanical turk", "target_name": "collective intelligence", "weight": 1.0, "year": 2018}, {"source": "8", "target": "71", "source_name": "amazon mechanical turk", "target_name": "software testing", "weight": 1.0, "year": 2018}, {"source": "8", "target": "76", "source_name": "amazon mechanical turk", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "8", "target": "77", "source_name": "amazon mechanical turk", "target_name": "mechanical turk", "weight": 20.0, "year": 2018}, {"source": "8", "target": "80", "source_name": "amazon mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "8", "target": "82", "source_name": "amazon mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2018}, {"source": "8", "target": "83", "source_name": "amazon mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "8", "target": "84", "source_name": "amazon mechanical turk", "target_name": "human computation", "weight": 2.0, "year": 2018}, {"source": "8", "target": "91", "source_name": "amazon mechanical turk", "target_name": "software design", "weight": 3.0, "year": 2018}, {"source": "8", "target": "93", "source_name": "amazon mechanical turk", "target_name": "literature review", "weight": 1.0, "year": 2018}, {"source": "8", "target": "96", "source_name": "amazon mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "9", "target": "11", "source_name": "data collection", "target_name": "crowdsourced data", "weight": 4.0, "year": 2018}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2018}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2018}, {"source": "9", "target": "26", "source_name": "data collection", "target_name": "business process", "weight": 1.0, "year": 2018}, {"source": "9", "target": "27", "source_name": "data collection", "target_name": "social media", "weight": 1.0, "year": 2018}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2018}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2018}, {"source": "9", "target": "45", "source_name": "data collection", "target_name": "spatial crowdsourcing", "weight": 3.0, "year": 2018}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2018}, {"source": "9", "target": "58", "source_name": "data collection", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2018}, {"source": "9", "target": "75", "source_name": "data collection", "target_name": "systematic review", "weight": 1.0, "year": 2018}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "9", "target": "77", "source_name": "data collection", "target_name": "mechanical turk", "weight": 3.0, "year": 2018}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2018}, {"source": "9", "target": "80", "source_name": "data collection", "target_name": "information systems", "weight": 2.0, "year": 2018}, {"source": "9", "target": "83", "source_name": "data collection", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "9", "target": "84", "source_name": "data collection", "target_name": "human computation", "weight": 2.0, "year": 2018}, {"source": "9", "target": "90", "source_name": "data collection", "target_name": "incentive mechanism", "weight": 1.0, "year": 2018}, {"source": "9", "target": "94", "source_name": "data collection", "target_name": "cultural heritage", "weight": 1.0, "year": 2018}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "9", "target": "97", "source_name": "data collection", "target_name": "task assignment", "weight": 1.0, "year": 2018}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2018}, {"source": "10", "target": "20", "source_name": "requirements engineering", "target_name": "information technology", "weight": 1.0, "year": 2018}, {"source": "10", "target": "21", "source_name": "requirements engineering", "target_name": "problem solving", "weight": 1.0, "year": 2018}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2018}, {"source": "10", "target": "24", "source_name": "requirements engineering", "target_name": "requirements analysis", "weight": 1.0, "year": 2018}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2018}, {"source": "10", "target": "29", "source_name": "requirements engineering", "target_name": "cloud computing", "weight": 1.0, "year": 2018}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 18.0, "year": 2018}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2018}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2018}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 2.0, "year": 2018}, {"source": "10", "target": "37", "source_name": "requirements engineering", "target_name": "controlled experiments", "weight": 1.0, "year": 2018}, {"source": "10", "target": "38", "source_name": "requirements engineering", "target_name": "systematic literature review", "weight": 1.0, "year": 2018}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2018}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2018}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2018}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2018}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2018}, {"source": "10", "target": "53", "source_name": "requirements engineering", "target_name": "big data", "weight": 1.0, "year": 2018}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 3.0, "year": 2018}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 2.0, "year": 2018}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2018}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2018}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2018}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2018}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 3.0, "year": 2018}, {"source": "10", "target": "67", "source_name": "requirements engineering", "target_name": "machine learning", "weight": 2.0, "year": 2018}, {"source": "10", "target": "70", "source_name": "requirements engineering", "target_name": "decision making", "weight": 1.0, "year": 2018}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 2.0, "year": 2018}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2018}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 6.0, "year": 2018}, {"source": "10", "target": "75", "source_name": "requirements engineering", "target_name": "systematic review", "weight": 1.0, "year": 2018}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2018}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2018}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 2.0, "year": 2018}, {"source": "10", "target": "82", "source_name": "requirements engineering", "target_name": "social network", "weight": 2.0, "year": 2018}, {"source": "10", "target": "83", "source_name": "requirements engineering", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2018}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 6.0, "year": 2018}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2018}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 9.0, "year": 2018}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "10", "target": "101", "source_name": "requirements engineering", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "10", "target": "102", "source_name": "requirements engineering", "target_name": "product line", "weight": 2.0, "year": 2018}, {"source": "10", "target": "103", "source_name": "requirements engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "11", "target": "26", "source_name": "crowdsourced data", "target_name": "business process", "weight": 1.0, "year": 2018}, {"source": "11", "target": "27", "source_name": "crowdsourced data", "target_name": "social media", "weight": 1.0, "year": 2018}, {"source": "11", "target": "34", "source_name": "crowdsourced data", "target_name": "search engines", "weight": 2.0, "year": 2018}, {"source": "11", "target": "36", "source_name": "crowdsourced data", "target_name": "open source", "weight": 1.0, "year": 2018}, {"source": "11", "target": "44", "source_name": "crowdsourced data", "target_name": "empirical study", "weight": 1.0, "year": 2018}, {"source": "11", "target": "45", "source_name": "crowdsourced data", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2018}, {"source": "11", "target": "53", "source_name": "crowdsourced data", "target_name": "big data", "weight": 1.0, "year": 2018}, {"source": "11", "target": "67", "source_name": "crowdsourced data", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "11", "target": "75", "source_name": "crowdsourced data", "target_name": "systematic review", "weight": 1.0, "year": 2018}, {"source": "11", "target": "77", "source_name": "crowdsourced data", "target_name": "mechanical turk", "weight": 1.0, "year": 2018}, {"source": "11", "target": "79", "source_name": "crowdsourced data", "target_name": "data management", "weight": 3.0, "year": 2018}, {"source": "11", "target": "80", "source_name": "crowdsourced data", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "11", "target": "83", "source_name": "crowdsourced data", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "11", "target": "84", "source_name": "crowdsourced data", "target_name": "human computation", "weight": 1.0, "year": 2018}, {"source": "11", "target": "91", "source_name": "crowdsourced data", "target_name": "software design", "weight": 1.0, "year": 2018}, {"source": "11", "target": "96", "source_name": "crowdsourced data", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "11", "target": "98", "source_name": "crowdsourced data", "target_name": "data mining", "weight": 1.0, "year": 2018}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2018}, {"source": "12", "target": "21", "source_name": "open innovation", "target_name": "problem solving", "weight": 1.0, "year": 2018}, {"source": "12", "target": "26", "source_name": "open innovation", "target_name": "business process", "weight": 1.0, "year": 2018}, {"source": "12", "target": "31", "source_name": "open innovation", "target_name": "software development", "weight": 1.0, "year": 2018}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2018}, {"source": "12", "target": "42", "source_name": "open innovation", "target_name": "quality assurance", "weight": 1.0, "year": 2018}, {"source": "12", "target": "77", "source_name": "open innovation", "target_name": "mechanical turk", "weight": 1.0, "year": 2018}, {"source": "12", "target": "93", "source_name": "open innovation", "target_name": "literature review", "weight": 2.0, "year": 2018}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 4.0, "year": 2018}, {"source": "13", "target": "27", "source_name": "natural language processing", "target_name": "social media", "weight": 1.0, "year": 2018}, {"source": "13", "target": "31", "source_name": "natural language processing", "target_name": "software development", "weight": 1.0, "year": 2018}, {"source": "13", "target": "67", "source_name": "natural language processing", "target_name": "machine learning", "weight": 5.0, "year": 2018}, {"source": "13", "target": "84", "source_name": "natural language processing", "target_name": "human computation", "weight": 2.0, "year": 2018}, {"source": "13", "target": "101", "source_name": "natural language processing", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 4.0, "year": 2018}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2018}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2018}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2018}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2018}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2018}, {"source": "14", "target": "61", "source_name": "object oriented", "target_name": "extreme programming", "weight": 1.0, "year": 2018}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2018}, {"source": "14", "target": "71", "source_name": "object oriented", "target_name": "software testing", "weight": 1.0, "year": 2018}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2018}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2018}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "15", "target": "26", "source_name": "decision support", "target_name": "business process", "weight": 1.0, "year": 2018}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2018}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2018}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2018}, {"source": "15", "target": "62", "source_name": "decision support", "target_name": "information processing", "weight": 1.0, "year": 2018}, {"source": "15", "target": "67", "source_name": "decision support", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "15", "target": "71", "source_name": "decision support", "target_name": "software testing", "weight": 1.0, "year": 2018}, {"source": "15", "target": "100", "source_name": "decision support", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "15", "target": "103", "source_name": "decision support", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "16", "target": "29", "source_name": "learning environment", "target_name": "cloud computing", "weight": 1.0, "year": 2018}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2018}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2018}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2018}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 3.0, "year": 2018}, {"source": "17", "target": "33", "source_name": "conceptual framework", "target_name": "fundamental principles", "weight": 1.0, "year": 2018}, {"source": "17", "target": "38", "source_name": "conceptual framework", "target_name": "systematic literature review", "weight": 1.0, "year": 2018}, {"source": "17", "target": "46", "source_name": "conceptual framework", "target_name": "empirical studies", "weight": 1.0, "year": 2018}, {"source": "17", "target": "74", "source_name": "conceptual framework", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "17", "target": "75", "source_name": "conceptual framework", "target_name": "systematic review", "weight": 1.0, "year": 2018}, {"source": "17", "target": "80", "source_name": "conceptual framework", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "17", "target": "82", "source_name": "conceptual framework", "target_name": "social network", "weight": 1.0, "year": 2018}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2018}, {"source": "17", "target": "93", "source_name": "conceptual framework", "target_name": "literature review", "weight": 3.0, "year": 2018}, {"source": "17", "target": "103", "source_name": "conceptual framework", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2018}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2018}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2018}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2018}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 4.0, "year": 2018}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2018}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2018}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2018}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2018}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2018}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2018}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2018}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2018}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2018}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2018}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2018}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2018}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2018}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2018}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "19", "target": "78", "source_name": "configuration management", "target_name": "process improvement", "weight": 1.0, "year": 2018}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2018}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2018}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 7.0, "year": 2018}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 2.0, "year": 2018}, {"source": "20", "target": "37", "source_name": "information technology", "target_name": "controlled experiments", "weight": 1.0, "year": 2018}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2018}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2018}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 2.0, "year": 2018}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2018}, {"source": "20", "target": "57", "source_name": "information technology", "target_name": "human intelligence", "weight": 1.0, "year": 2018}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "20", "target": "60", "source_name": "information technology", "target_name": "collective intelligence", "weight": 1.0, "year": 2018}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2018}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2018}, {"source": "20", "target": "70", "source_name": "information technology", "target_name": "decision making", "weight": 1.0, "year": 2018}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2018}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2018}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2018}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2018}, {"source": "20", "target": "93", "source_name": "information technology", "target_name": "literature review", "weight": 1.0, "year": 2018}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 2.0, "year": 2018}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2018}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2018}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2018}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 12.0, "year": 2018}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 2.0, "year": 2018}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2018}, {"source": "21", "target": "39", "source_name": "problem solving", "target_name": "team members", "weight": 1.0, "year": 2018}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2018}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2018}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 2.0, "year": 2018}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2018}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 2.0, "year": 2018}, {"source": "21", "target": "69", "source_name": "problem solving", "target_name": "computational intelligence", "weight": 1.0, "year": 2018}, {"source": "21", "target": "71", "source_name": "problem solving", "target_name": "software testing", "weight": 2.0, "year": 2018}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2018}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2018}, {"source": "21", "target": "80", "source_name": "problem solving", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "21", "target": "84", "source_name": "problem solving", "target_name": "human computation", "weight": 1.0, "year": 2018}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 1.0, "year": 2018}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 3.0, "year": 2018}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "21", "target": "99", "source_name": "problem solving", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 10.0, "year": 2018}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2018}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2018}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2018}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2018}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 3.0, "year": 2018}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2018}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2018}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2018}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2018}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2018}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2018}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2018}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2018}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2018}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2018}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2018}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2018}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2018}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2018}, {"source": "24", "target": "53", "source_name": "requirements analysis", "target_name": "big data", "weight": 1.0, "year": 2018}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2018}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2018}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2018}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2018}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2018}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2018}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2018}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2018}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "25", "target": "31", "source_name": "motivational factors", "target_name": "software development", "weight": 1.0, "year": 2018}, {"source": "25", "target": "46", "source_name": "motivational factors", "target_name": "empirical studies", "weight": 1.0, "year": 2018}, {"source": "25", "target": "93", "source_name": "motivational factors", "target_name": "literature review", "weight": 2.0, "year": 2018}, {"source": "26", "target": "29", "source_name": "business process", "target_name": "cloud computing", "weight": 1.0, "year": 2018}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 3.0, "year": 2018}, {"source": "26", "target": "36", "source_name": "business process", "target_name": "open source", "weight": 1.0, "year": 2018}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2018}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 2.0, "year": 2018}, {"source": "26", "target": "58", "source_name": "business process", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "26", "target": "60", "source_name": "business process", "target_name": "collective intelligence", "weight": 4.0, "year": 2018}, {"source": "26", "target": "70", "source_name": "business process", "target_name": "decision making", "weight": 1.0, "year": 2018}, {"source": "26", "target": "71", "source_name": "business process", "target_name": "software testing", "weight": 3.0, "year": 2018}, {"source": "26", "target": "76", "source_name": "business process", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "26", "target": "77", "source_name": "business process", "target_name": "mechanical turk", "weight": 3.0, "year": 2018}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 2.0, "year": 2018}, {"source": "26", "target": "82", "source_name": "business process", "target_name": "social network", "weight": 1.0, "year": 2018}, {"source": "26", "target": "84", "source_name": "business process", "target_name": "human computation", "weight": 1.0, "year": 2018}, {"source": "26", "target": "91", "source_name": "business process", "target_name": "software design", "weight": 1.0, "year": 2018}, {"source": "26", "target": "93", "source_name": "business process", "target_name": "literature review", "weight": 3.0, "year": 2018}, {"source": "26", "target": "96", "source_name": "business process", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "26", "target": "103", "source_name": "business process", "target_name": "knowledge base", "weight": 2.0, "year": 2018}, {"source": "27", "target": "31", "source_name": "social media", "target_name": "software development", "weight": 5.0, "year": 2018}, {"source": "27", "target": "34", "source_name": "social media", "target_name": "search engines", "weight": 2.0, "year": 2018}, {"source": "27", "target": "36", "source_name": "social media", "target_name": "open source", "weight": 1.0, "year": 2018}, {"source": "27", "target": "38", "source_name": "social media", "target_name": "systematic literature review", "weight": 1.0, "year": 2018}, {"source": "27", "target": "40", "source_name": "social media", "target_name": "knowledge management", "weight": 1.0, "year": 2018}, {"source": "27", "target": "53", "source_name": "social media", "target_name": "big data", "weight": 1.0, "year": 2018}, {"source": "27", "target": "57", "source_name": "social media", "target_name": "human intelligence", "weight": 1.0, "year": 2018}, {"source": "27", "target": "58", "source_name": "social media", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "27", "target": "60", "source_name": "social media", "target_name": "collective intelligence", "weight": 2.0, "year": 2018}, {"source": "27", "target": "70", "source_name": "social media", "target_name": "decision making", "weight": 1.0, "year": 2018}, {"source": "27", "target": "74", "source_name": "social media", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "27", "target": "77", "source_name": "social media", "target_name": "mechanical turk", "weight": 3.0, "year": 2018}, {"source": "27", "target": "79", "source_name": "social media", "target_name": "data management", "weight": 1.0, "year": 2018}, {"source": "27", "target": "80", "source_name": "social media", "target_name": "information systems", "weight": 2.0, "year": 2018}, {"source": "27", "target": "82", "source_name": "social media", "target_name": "social network", "weight": 1.0, "year": 2018}, {"source": "27", "target": "83", "source_name": "social media", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "27", "target": "84", "source_name": "social media", "target_name": "human computation", "weight": 1.0, "year": 2018}, {"source": "27", "target": "90", "source_name": "social media", "target_name": "incentive mechanism", "weight": 1.0, "year": 2018}, {"source": "27", "target": "93", "source_name": "social media", "target_name": "literature review", "weight": 2.0, "year": 2018}, {"source": "27", "target": "96", "source_name": "social media", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "27", "target": "97", "source_name": "social media", "target_name": "task assignment", "weight": 1.0, "year": 2018}, {"source": "27", "target": "98", "source_name": "social media", "target_name": "data mining", "weight": 2.0, "year": 2018}, {"source": "28", "target": "31", "source_name": "computing elements", "target_name": "software development", "weight": 2.0, "year": 2018}, {"source": "28", "target": "60", "source_name": "computing elements", "target_name": "collective intelligence", "weight": 2.0, "year": 2018}, {"source": "28", "target": "76", "source_name": "computing elements", "target_name": "life cycle", "weight": 2.0, "year": 2018}, {"source": "28", "target": "97", "source_name": "computing elements", "target_name": "task assignment", "weight": 1.0, "year": 2018}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 4.0, "year": 2018}, {"source": "29", "target": "42", "source_name": "cloud computing", "target_name": "quality assurance", "weight": 1.0, "year": 2018}, {"source": "29", "target": "71", "source_name": "cloud computing", "target_name": "software testing", "weight": 2.0, "year": 2018}, {"source": "29", "target": "74", "source_name": "cloud computing", "target_name": "software architecture", "weight": 2.0, "year": 2018}, {"source": "29", "target": "83", "source_name": "cloud computing", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "29", "target": "91", "source_name": "cloud computing", "target_name": "software design", "weight": 1.0, "year": 2018}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 3.0, "year": 2018}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "30", "target": "96", "source_name": "end users", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2018}, {"source": "31", "target": "33", "source_name": "software development", "target_name": "fundamental principles", "weight": 3.0, "year": 2018}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2018}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2018}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 16.0, "year": 2018}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 3.0, "year": 2018}, {"source": "31", "target": "38", "source_name": "software development", "target_name": "systematic literature review", "weight": 1.0, "year": 2018}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 7.0, "year": 2018}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 3.0, "year": 2018}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2018}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 8.0, "year": 2018}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 8.0, "year": 2018}, {"source": "31", "target": "45", "source_name": "software development", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2018}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 3.0, "year": 2018}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 7.0, "year": 2018}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2018}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 6.0, "year": 2018}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 11.0, "year": 2018}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 2.0, "year": 2018}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 26.0, "year": 2018}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 7.0, "year": 2018}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2018}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 2.0, "year": 2018}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 7.0, "year": 2018}, {"source": "31", "target": "60", "source_name": "software development", "target_name": "collective intelligence", "weight": 4.0, "year": 2018}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 11.0, "year": 2018}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2018}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2018}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2018}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 18.0, "year": 2018}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 2.0, "year": 2018}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2018}, {"source": "31", "target": "70", "source_name": "software development", "target_name": "decision making", "weight": 2.0, "year": 2018}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 10.0, "year": 2018}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 5.0, "year": 2018}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2018}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 17.0, "year": 2018}, {"source": "31", "target": "75", "source_name": "software development", "target_name": "systematic review", "weight": 3.0, "year": 2018}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 22.0, "year": 2018}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 8.0, "year": 2018}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2018}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2018}, {"source": "31", "target": "82", "source_name": "software development", "target_name": "social network", "weight": 2.0, "year": 2018}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 6.0, "year": 2018}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2018}, {"source": "31", "target": "86", "source_name": "software development", "target_name": "systematic mapping", "weight": 2.0, "year": 2018}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 25.0, "year": 2018}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2018}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 7.0, "year": 2018}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 5.0, "year": 2018}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 7.0, "year": 2018}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 5.0, "year": 2018}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 4.0, "year": 2018}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 4.0, "year": 2018}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 9.0, "year": 2018}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 23.0, "year": 2018}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 4.0, "year": 2018}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2018}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2018}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2018}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2018}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2018}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2018}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2018}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2018}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2018}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2018}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "33", "target": "54", "source_name": "fundamental principles", "target_name": "software quality", "weight": 1.0, "year": 2018}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2018}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "33", "target": "74", "source_name": "fundamental principles", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "34", "target": "53", "source_name": "search engines", "target_name": "big data", "weight": 1.0, "year": 2018}, {"source": "34", "target": "57", "source_name": "search engines", "target_name": "human intelligence", "weight": 1.0, "year": 2018}, {"source": "34", "target": "65", "source_name": "search engines", "target_name": "web search", "weight": 4.0, "year": 2018}, {"source": "34", "target": "67", "source_name": "search engines", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "34", "target": "77", "source_name": "search engines", "target_name": "mechanical turk", "weight": 3.0, "year": 2018}, {"source": "34", "target": "82", "source_name": "search engines", "target_name": "social network", "weight": 1.0, "year": 2018}, {"source": "34", "target": "84", "source_name": "search engines", "target_name": "human computation", "weight": 1.0, "year": 2018}, {"source": "34", "target": "95", "source_name": "search engines", "target_name": "human factors", "weight": 2.0, "year": 2018}, {"source": "34", "target": "100", "source_name": "search engines", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2018}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 1.0, "year": 2018}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2018}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 2.0, "year": 2018}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 1.0, "year": 2018}, {"source": "36", "target": "57", "source_name": "open source", "target_name": "human intelligence", "weight": 1.0, "year": 2018}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "36", "target": "60", "source_name": "open source", "target_name": "collective intelligence", "weight": 1.0, "year": 2018}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2018}, {"source": "36", "target": "67", "source_name": "open source", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2018}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2018}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "36", "target": "77", "source_name": "open source", "target_name": "mechanical turk", "weight": 3.0, "year": 2018}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2018}, {"source": "36", "target": "82", "source_name": "open source", "target_name": "social network", "weight": 1.0, "year": 2018}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 5.0, "year": 2018}, {"source": "36", "target": "93", "source_name": "open source", "target_name": "literature review", "weight": 1.0, "year": 2018}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 19.0, "year": 2018}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 2.0, "year": 2018}, {"source": "37", "target": "38", "source_name": "controlled experiments", "target_name": "systematic literature review", "weight": 1.0, "year": 2018}, {"source": "37", "target": "57", "source_name": "controlled experiments", "target_name": "human intelligence", "weight": 1.0, "year": 2018}, {"source": "37", "target": "75", "source_name": "controlled experiments", "target_name": "systematic review", "weight": 1.0, "year": 2018}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2018}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 3.0, "year": 2018}, {"source": "38", "target": "80", "source_name": "systematic literature review", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 9.0, "year": 2018}, {"source": "38", "target": "96", "source_name": "systematic literature review", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2018}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2018}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 4.0, "year": 2018}, {"source": "39", "target": "69", "source_name": "team members", "target_name": "computational intelligence", "weight": 1.0, "year": 2018}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2018}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2018}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2018}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2018}, {"source": "40", "target": "70", "source_name": "knowledge management", "target_name": "decision making", "weight": 1.0, "year": 2018}, {"source": "40", "target": "74", "source_name": "knowledge management", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2018}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "40", "target": "98", "source_name": "knowledge management", "target_name": "data mining", "weight": 1.0, "year": 2018}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2018}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2018}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2018}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 6.0, "year": 2018}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2018}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2018}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2018}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2018}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "42", "target": "77", "source_name": "quality assurance", "target_name": "mechanical turk", "weight": 2.0, "year": 2018}, {"source": "42", "target": "84", "source_name": "quality assurance", "target_name": "human computation", "weight": 1.0, "year": 2018}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2018}, {"source": "42", "target": "93", "source_name": "quality assurance", "target_name": "literature review", "weight": 1.0, "year": 2018}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2018}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 3.0, "year": 2018}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2018}, {"source": "44", "target": "54", "source_name": "empirical study", "target_name": "software quality", "weight": 1.0, "year": 2018}, {"source": "44", "target": "82", "source_name": "empirical study", "target_name": "social network", "weight": 1.0, "year": 2018}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 2.0, "year": 2018}, {"source": "44", "target": "93", "source_name": "empirical study", "target_name": "literature review", "weight": 1.0, "year": 2018}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "45", "target": "77", "source_name": "spatial crowdsourcing", "target_name": "mechanical turk", "weight": 1.0, "year": 2018}, {"source": "45", "target": "79", "source_name": "spatial crowdsourcing", "target_name": "data management", "weight": 1.0, "year": 2018}, {"source": "45", "target": "90", "source_name": "spatial crowdsourcing", "target_name": "incentive mechanism", "weight": 2.0, "year": 2018}, {"source": "45", "target": "97", "source_name": "spatial crowdsourcing", "target_name": "task assignment", "weight": 3.0, "year": 2018}, {"source": "46", "target": "47", "source_name": "empirical studies", "target_name": "software maintenance", "weight": 1.0, "year": 2018}, {"source": "46", "target": "50", "source_name": "empirical studies", "target_name": "source code", "weight": 2.0, "year": 2018}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2018}, {"source": "46", "target": "57", "source_name": "empirical studies", "target_name": "human intelligence", "weight": 1.0, "year": 2018}, {"source": "46", "target": "71", "source_name": "empirical studies", "target_name": "software testing", "weight": 1.0, "year": 2018}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2018}, {"source": "46", "target": "82", "source_name": "empirical studies", "target_name": "social network", "weight": 1.0, "year": 2018}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 3.0, "year": 2018}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2018}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 6.0, "year": 2018}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2018}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2018}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2018}, {"source": "47", "target": "59", "source_name": "software maintenance", "target_name": "bug reports", "weight": 2.0, "year": 2018}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2018}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2018}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "47", "target": "67", "source_name": "software maintenance", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 4.0, "year": 2018}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 7.0, "year": 2018}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2018}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2018}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2018}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 2.0, "year": 2018}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2018}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2018}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2018}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2018}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2018}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2018}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2018}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2018}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2018}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2018}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2018}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "50", "target": "59", "source_name": "source code", "target_name": "bug reports", "weight": 1.0, "year": 2018}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2018}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 1.0, "year": 2018}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 9.0, "year": 2018}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 4.0, "year": 2018}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "50", "target": "101", "source_name": "source code", "target_name": "software reuse", "weight": 2.0, "year": 2018}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2018}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "51", "target": "74", "source_name": "agile software development", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 3.0, "year": 2018}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2018}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2018}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2018}, {"source": "53", "target": "60", "source_name": "big data", "target_name": "collective intelligence", "weight": 1.0, "year": 2018}, {"source": "53", "target": "77", "source_name": "big data", "target_name": "mechanical turk", "weight": 1.0, "year": 2018}, {"source": "53", "target": "79", "source_name": "big data", "target_name": "data management", "weight": 1.0, "year": 2018}, {"source": "53", "target": "84", "source_name": "big data", "target_name": "human computation", "weight": 1.0, "year": 2018}, {"source": "53", "target": "90", "source_name": "big data", "target_name": "incentive mechanism", "weight": 1.0, "year": 2018}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2018}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2018}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2018}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2018}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2018}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2018}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2018}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2018}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2018}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2018}, {"source": "54", "target": "77", "source_name": "software quality", "target_name": "mechanical turk", "weight": 1.0, "year": 2018}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 3.0, "year": 2018}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2018}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 4.0, "year": 2018}, {"source": "54", "target": "86", "source_name": "software quality", "target_name": "systematic mapping", "weight": 1.0, "year": 2018}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 4.0, "year": 2018}, {"source": "54", "target": "95", "source_name": "software quality", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2018}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2018}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2018}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2018}, {"source": "55", "target": "67", "source_name": "systems engineering", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2018}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2018}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "55", "target": "82", "source_name": "systems engineering", "target_name": "social network", "weight": 1.0, "year": 2018}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2018}, {"source": "55", "target": "85", "source_name": "systems engineering", "target_name": "degree programs", "weight": 2.0, "year": 2018}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2018}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2018}, {"source": "55", "target": "102", "source_name": "systems engineering", "target_name": "product line", "weight": 1.0, "year": 2018}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2018}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2018}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2018}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2018}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2018}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2018}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2018}, {"source": "57", "target": "60", "source_name": "human intelligence", "target_name": "collective intelligence", "weight": 3.0, "year": 2018}, {"source": "57", "target": "67", "source_name": "human intelligence", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2018}, {"source": "57", "target": "75", "source_name": "human intelligence", "target_name": "systematic review", "weight": 1.0, "year": 2018}, {"source": "57", "target": "77", "source_name": "human intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2018}, {"source": "57", "target": "84", "source_name": "human intelligence", "target_name": "human computation", "weight": 1.0, "year": 2018}, {"source": "57", "target": "96", "source_name": "human intelligence", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 2.0, "year": 2018}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2018}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2018}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2018}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2018}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2018}, {"source": "58", "target": "77", "source_name": "user interface", "target_name": "mechanical turk", "weight": 3.0, "year": 2018}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "58", "target": "84", "source_name": "user interface", "target_name": "human computation", "weight": 2.0, "year": 2018}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 4.0, "year": 2018}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2018}, {"source": "59", "target": "67", "source_name": "bug reports", "target_name": "machine learning", "weight": 2.0, "year": 2018}, {"source": "59", "target": "71", "source_name": "bug reports", "target_name": "software testing", "weight": 1.0, "year": 2018}, {"source": "60", "target": "71", "source_name": "collective intelligence", "target_name": "software testing", "weight": 3.0, "year": 2018}, {"source": "60", "target": "76", "source_name": "collective intelligence", "target_name": "life cycle", "weight": 2.0, "year": 2018}, {"source": "60", "target": "77", "source_name": "collective intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2018}, {"source": "60", "target": "79", "source_name": "collective intelligence", "target_name": "data management", "weight": 1.0, "year": 2018}, {"source": "60", "target": "84", "source_name": "collective intelligence", "target_name": "human computation", "weight": 2.0, "year": 2018}, {"source": "60", "target": "93", "source_name": "collective intelligence", "target_name": "literature review", "weight": 2.0, "year": 2018}, {"source": "60", "target": "96", "source_name": "collective intelligence", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2018}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 3.0, "year": 2018}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2018}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2018}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2018}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2018}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "62", "target": "67", "source_name": "information processing", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2018}, {"source": "62", "target": "100", "source_name": "information processing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2018}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2018}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2018}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2018}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2018}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 2.0, "year": 2018}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 4.0, "year": 2018}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 3.0, "year": 2018}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2018}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2018}, {"source": "66", "target": "80", "source_name": "project management", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "66", "target": "82", "source_name": "project management", "target_name": "social network", "weight": 1.0, "year": 2018}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "66", "target": "86", "source_name": "project management", "target_name": "systematic mapping", "weight": 1.0, "year": 2018}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2018}, {"source": "66", "target": "93", "source_name": "project management", "target_name": "literature review", "weight": 1.0, "year": 2018}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2018}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "66", "target": "101", "source_name": "project management", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2018}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 2.0, "year": 2018}, {"source": "67", "target": "75", "source_name": "machine learning", "target_name": "systematic review", "weight": 1.0, "year": 2018}, {"source": "67", "target": "79", "source_name": "machine learning", "target_name": "data management", "weight": 1.0, "year": 2018}, {"source": "67", "target": "82", "source_name": "machine learning", "target_name": "social network", "weight": 2.0, "year": 2018}, {"source": "67", "target": "84", "source_name": "machine learning", "target_name": "human computation", "weight": 4.0, "year": 2018}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 2.0, "year": 2018}, {"source": "67", "target": "99", "source_name": "machine learning", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 4.0, "year": 2018}, {"source": "67", "target": "103", "source_name": "machine learning", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "68", "target": "84", "source_name": "service oriented", "target_name": "human computation", "weight": 1.0, "year": 2018}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2018}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2018}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2018}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2018}, {"source": "70", "target": "74", "source_name": "decision making", "target_name": "software architecture", "weight": 1.0, "year": 2018}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2018}, {"source": "70", "target": "96", "source_name": "decision making", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "70", "target": "98", "source_name": "decision making", "target_name": "data mining", "weight": 2.0, "year": 2018}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2018}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 3.0, "year": 2018}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2018}, {"source": "71", "target": "78", "source_name": "software testing", "target_name": "process improvement", "weight": 1.0, "year": 2018}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2018}, {"source": "71", "target": "93", "source_name": "software testing", "target_name": "literature review", "weight": 1.0, "year": 2018}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2018}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2018}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 2.0, "year": 2018}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2018}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2018}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2018}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2018}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2018}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2018}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 2.0, "year": 2018}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 2.0, "year": 2018}, {"source": "74", "target": "83", "source_name": "software architecture", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2018}, {"source": "74", "target": "98", "source_name": "software architecture", "target_name": "data mining", "weight": 1.0, "year": 2018}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 4.0, "year": 2018}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2018}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 3.0, "year": 2018}, {"source": "75", "target": "96", "source_name": "systematic review", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "75", "target": "103", "source_name": "systematic review", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2018}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2018}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2018}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2018}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2018}, {"source": "77", "target": "79", "source_name": "mechanical turk", "target_name": "data management", "weight": 2.0, "year": 2018}, {"source": "77", "target": "80", "source_name": "mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "77", "target": "82", "source_name": "mechanical turk", "target_name": "social network", "weight": 2.0, "year": 2018}, {"source": "77", "target": "83", "source_name": "mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "77", "target": "84", "source_name": "mechanical turk", "target_name": "human computation", "weight": 5.0, "year": 2018}, {"source": "77", "target": "91", "source_name": "mechanical turk", "target_name": "software design", "weight": 3.0, "year": 2018}, {"source": "77", "target": "93", "source_name": "mechanical turk", "target_name": "literature review", "weight": 1.0, "year": 2018}, {"source": "77", "target": "95", "source_name": "mechanical turk", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "77", "target": "96", "source_name": "mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2018}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2018}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "79", "target": "84", "source_name": "data management", "target_name": "human computation", "weight": 2.0, "year": 2018}, {"source": "80", "target": "83", "source_name": "information systems", "target_name": "lessons learned", "weight": 1.0, "year": 2018}, {"source": "80", "target": "84", "source_name": "information systems", "target_name": "human computation", "weight": 1.0, "year": 2018}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2018}, {"source": "80", "target": "93", "source_name": "information systems", "target_name": "literature review", "weight": 3.0, "year": 2018}, {"source": "80", "target": "96", "source_name": "information systems", "target_name": "open source software", "weight": 1.0, "year": 2018}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2018}, {"source": "82", "target": "84", "source_name": "social network", "target_name": "human computation", "weight": 1.0, "year": 2018}, {"source": "82", "target": "90", "source_name": "social network", "target_name": "incentive mechanism", "weight": 1.0, "year": 2018}, {"source": "82", "target": "98", "source_name": "social network", "target_name": "data mining", "weight": 1.0, "year": 2018}, {"source": "82", "target": "99", "source_name": "social network", "target_name": "requirements elicitation", "weight": 1.0, "year": 2018}, {"source": "83", "target": "84", "source_name": "lessons learned", "target_name": "human computation", "weight": 1.0, "year": 2018}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2018}, {"source": "84", "target": "100", "source_name": "human computation", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "90", "target": "93", "source_name": "incentive mechanism", "target_name": "literature review", "weight": 1.0, "year": 2018}, {"source": "90", "target": "97", "source_name": "incentive mechanism", "target_name": "task assignment", "weight": 3.0, "year": 2018}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2018}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 2.0, "year": 2018}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2018}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2018}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2018}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2018}, {"source": "93", "target": "96", "source_name": "literature review", "target_name": "open source software", "weight": 2.0, "year": 2018}, {"source": "93", "target": "97", "source_name": "literature review", "target_name": "task assignment", "weight": 1.0, "year": 2018}, {"source": "93", "target": "103", "source_name": "literature review", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2018}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2018}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2018}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2018}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2018}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2018}]}, {"2019": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 5.0, "year": 2019}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2019}, {"source": "0", "target": "29", "source_name": "intellectual property", "target_name": "cloud computing", "weight": 1.0, "year": 2019}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 3.0, "year": 2019}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2019}, {"source": "0", "target": "47", "source_name": "intellectual property", "target_name": "software maintenance", "weight": 1.0, "year": 2019}, {"source": "0", "target": "50", "source_name": "intellectual property", "target_name": "source code", "weight": 1.0, "year": 2019}, {"source": "0", "target": "70", "source_name": "intellectual property", "target_name": "decision making", "weight": 1.0, "year": 2019}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 3.0, "year": 2019}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "0", "target": "101", "source_name": "intellectual property", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "1", "target": "4", "source_name": "natural language", "target_name": "test report", "weight": 2.0, "year": 2019}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2019}, {"source": "1", "target": "7", "source_name": "natural language", "target_name": "quality control", "weight": 1.0, "year": 2019}, {"source": "1", "target": "13", "source_name": "natural language", "target_name": "natural language processing", "weight": 4.0, "year": 2019}, {"source": "1", "target": "27", "source_name": "natural language", "target_name": "social media", "weight": 1.0, "year": 2019}, {"source": "1", "target": "30", "source_name": "natural language", "target_name": "end users", "weight": 1.0, "year": 2019}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2019}, {"source": "1", "target": "34", "source_name": "natural language", "target_name": "search engines", "weight": 2.0, "year": 2019}, {"source": "1", "target": "44", "source_name": "natural language", "target_name": "empirical study", "weight": 1.0, "year": 2019}, {"source": "1", "target": "45", "source_name": "natural language", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2019}, {"source": "1", "target": "57", "source_name": "natural language", "target_name": "human intelligence", "weight": 1.0, "year": 2019}, {"source": "1", "target": "59", "source_name": "natural language", "target_name": "bug reports", "weight": 1.0, "year": 2019}, {"source": "1", "target": "67", "source_name": "natural language", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "1", "target": "71", "source_name": "natural language", "target_name": "software testing", "weight": 1.0, "year": 2019}, {"source": "1", "target": "97", "source_name": "natural language", "target_name": "task assignment", "weight": 1.0, "year": 2019}, {"source": "1", "target": "100", "source_name": "natural language", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 9.0, "year": 2019}, {"source": "2", "target": "7", "source_name": "business model", "target_name": "quality control", "weight": 2.0, "year": 2019}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 2.0, "year": 2019}, {"source": "2", "target": "10", "source_name": "business model", "target_name": "requirements engineering", "weight": 1.0, "year": 2019}, {"source": "2", "target": "12", "source_name": "business model", "target_name": "open innovation", "weight": 4.0, "year": 2019}, {"source": "2", "target": "20", "source_name": "business model", "target_name": "information technology", "weight": 1.0, "year": 2019}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 3.0, "year": 2019}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2019}, {"source": "2", "target": "26", "source_name": "business model", "target_name": "business process", "weight": 4.0, "year": 2019}, {"source": "2", "target": "27", "source_name": "business model", "target_name": "social media", "weight": 1.0, "year": 2019}, {"source": "2", "target": "29", "source_name": "business model", "target_name": "cloud computing", "weight": 1.0, "year": 2019}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 6.0, "year": 2019}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 2.0, "year": 2019}, {"source": "2", "target": "38", "source_name": "business model", "target_name": "systematic literature review", "weight": 1.0, "year": 2019}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2019}, {"source": "2", "target": "53", "source_name": "business model", "target_name": "big data", "weight": 1.0, "year": 2019}, {"source": "2", "target": "58", "source_name": "business model", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "2", "target": "60", "source_name": "business model", "target_name": "collective intelligence", "weight": 4.0, "year": 2019}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "2", "target": "71", "source_name": "business model", "target_name": "software testing", "weight": 4.0, "year": 2019}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2019}, {"source": "2", "target": "80", "source_name": "business model", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "2", "target": "93", "source_name": "business model", "target_name": "literature review", "weight": 1.0, "year": 2019}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2019}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2019}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2019}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2019}, {"source": "3", "target": "27", "source_name": "design patterns", "target_name": "social media", "weight": 1.0, "year": 2019}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2019}, {"source": "3", "target": "36", "source_name": "design patterns", "target_name": "open source", "weight": 1.0, "year": 2019}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2019}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2019}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2019}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2019}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2019}, {"source": "3", "target": "57", "source_name": "design patterns", "target_name": "human intelligence", "weight": 1.0, "year": 2019}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2019}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2019}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2019}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2019}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2019}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2019}, {"source": "4", "target": "6", "source_name": "test report", "target_name": "software engineer", "weight": 1.0, "year": 2019}, {"source": "4", "target": "13", "source_name": "test report", "target_name": "natural language processing", "weight": 1.0, "year": 2019}, {"source": "4", "target": "42", "source_name": "test report", "target_name": "quality assurance", "weight": 1.0, "year": 2019}, {"source": "4", "target": "44", "source_name": "test report", "target_name": "empirical study", "weight": 1.0, "year": 2019}, {"source": "4", "target": "47", "source_name": "test report", "target_name": "software maintenance", "weight": 1.0, "year": 2019}, {"source": "4", "target": "59", "source_name": "test report", "target_name": "bug reports", "weight": 1.0, "year": 2019}, {"source": "4", "target": "67", "source_name": "test report", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "4", "target": "71", "source_name": "test report", "target_name": "software testing", "weight": 5.0, "year": 2019}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 9.0, "year": 2019}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2019}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2019}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 2.0, "year": 2019}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2019}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 5.0, "year": 2019}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2019}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2019}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2019}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2019}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2019}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2019}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2019}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2019}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2019}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2019}, {"source": "5", "target": "78", "source_name": "software quality assurance", "target_name": "process improvement", "weight": 1.0, "year": 2019}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2019}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2019}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 8.0, "year": 2019}, {"source": "6", "target": "8", "source_name": "software engineer", "target_name": "amazon mechanical turk", "weight": 8.0, "year": 2019}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 4.0, "year": 2019}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 26.0, "year": 2019}, {"source": "6", "target": "11", "source_name": "software engineer", "target_name": "crowdsourced data", "weight": 1.0, "year": 2019}, {"source": "6", "target": "12", "source_name": "software engineer", "target_name": "open innovation", "weight": 1.0, "year": 2019}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2019}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2019}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 7.0, "year": 2019}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 5.0, "year": 2019}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 5.0, "year": 2019}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 15.0, "year": 2019}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 14.0, "year": 2019}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 15.0, "year": 2019}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 18.0, "year": 2019}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2019}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2019}, {"source": "6", "target": "27", "source_name": "software engineer", "target_name": "social media", "weight": 5.0, "year": 2019}, {"source": "6", "target": "29", "source_name": "software engineer", "target_name": "cloud computing", "weight": 8.0, "year": 2019}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 6.0, "year": 2019}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 351.0, "year": 2019}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 10.0, "year": 2019}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 11.0, "year": 2019}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2019}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2019}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 23.0, "year": 2019}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 5.0, "year": 2019}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 7.0, "year": 2019}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 10.0, "year": 2019}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 10.0, "year": 2019}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 5.0, "year": 2019}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 12.0, "year": 2019}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 6.0, "year": 2019}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 19.0, "year": 2019}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 18.0, "year": 2019}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2019}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2019}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 15.0, "year": 2019}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 14.0, "year": 2019}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 3.0, "year": 2019}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 39.0, "year": 2019}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 33.0, "year": 2019}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2019}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 3.0, "year": 2019}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 12.0, "year": 2019}, {"source": "6", "target": "59", "source_name": "software engineer", "target_name": "bug reports", "weight": 4.0, "year": 2019}, {"source": "6", "target": "60", "source_name": "software engineer", "target_name": "collective intelligence", "weight": 2.0, "year": 2019}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2019}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2019}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2019}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2019}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 32.0, "year": 2019}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 4.0, "year": 2019}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2019}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2019}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 6.0, "year": 2019}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 23.0, "year": 2019}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 19.0, "year": 2019}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2019}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 36.0, "year": 2019}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 6.0, "year": 2019}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 32.0, "year": 2019}, {"source": "6", "target": "77", "source_name": "software engineer", "target_name": "mechanical turk", "weight": 6.0, "year": 2019}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 18.0, "year": 2019}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 13.0, "year": 2019}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 9.0, "year": 2019}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 8.0, "year": 2019}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 22.0, "year": 2019}, {"source": "6", "target": "84", "source_name": "software engineer", "target_name": "human computation", "weight": 2.0, "year": 2019}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 12.0, "year": 2019}, {"source": "6", "target": "86", "source_name": "software engineer", "target_name": "systematic mapping", "weight": 1.0, "year": 2019}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2019}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2019}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 57.0, "year": 2019}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2019}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 11.0, "year": 2019}, {"source": "6", "target": "94", "source_name": "software engineer", "target_name": "cultural heritage", "weight": 1.0, "year": 2019}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 9.0, "year": 2019}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 15.0, "year": 2019}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 14.0, "year": 2019}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 5.0, "year": 2019}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 11.0, "year": 2019}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 15.0, "year": 2019}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 29.0, "year": 2019}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 8.0, "year": 2019}, {"source": "7", "target": "8", "source_name": "quality control", "target_name": "amazon mechanical turk", "weight": 2.0, "year": 2019}, {"source": "7", "target": "9", "source_name": "quality control", "target_name": "data collection", "weight": 3.0, "year": 2019}, {"source": "7", "target": "10", "source_name": "quality control", "target_name": "requirements engineering", "weight": 1.0, "year": 2019}, {"source": "7", "target": "11", "source_name": "quality control", "target_name": "crowdsourced data", "weight": 3.0, "year": 2019}, {"source": "7", "target": "13", "source_name": "quality control", "target_name": "natural language processing", "weight": 2.0, "year": 2019}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2019}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2019}, {"source": "7", "target": "21", "source_name": "quality control", "target_name": "problem solving", "weight": 1.0, "year": 2019}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2019}, {"source": "7", "target": "26", "source_name": "quality control", "target_name": "business process", "weight": 2.0, "year": 2019}, {"source": "7", "target": "27", "source_name": "quality control", "target_name": "social media", "weight": 1.0, "year": 2019}, {"source": "7", "target": "29", "source_name": "quality control", "target_name": "cloud computing", "weight": 1.0, "year": 2019}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 3.0, "year": 2019}, {"source": "7", "target": "42", "source_name": "quality control", "target_name": "quality assurance", "weight": 1.0, "year": 2019}, {"source": "7", "target": "44", "source_name": "quality control", "target_name": "empirical study", "weight": 1.0, "year": 2019}, {"source": "7", "target": "45", "source_name": "quality control", "target_name": "spatial crowdsourcing", "weight": 5.0, "year": 2019}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2019}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2019}, {"source": "7", "target": "50", "source_name": "quality control", "target_name": "source code", "weight": 1.0, "year": 2019}, {"source": "7", "target": "51", "source_name": "quality control", "target_name": "agile software development", "weight": 1.0, "year": 2019}, {"source": "7", "target": "53", "source_name": "quality control", "target_name": "big data", "weight": 1.0, "year": 2019}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 4.0, "year": 2019}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 2.0, "year": 2019}, {"source": "7", "target": "59", "source_name": "quality control", "target_name": "bug reports", "weight": 1.0, "year": 2019}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2019}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "7", "target": "67", "source_name": "quality control", "target_name": "machine learning", "weight": 3.0, "year": 2019}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 2.0, "year": 2019}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 2.0, "year": 2019}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "7", "target": "75", "source_name": "quality control", "target_name": "systematic review", "weight": 1.0, "year": 2019}, {"source": "7", "target": "77", "source_name": "quality control", "target_name": "mechanical turk", "weight": 2.0, "year": 2019}, {"source": "7", "target": "79", "source_name": "quality control", "target_name": "data management", "weight": 1.0, "year": 2019}, {"source": "7", "target": "84", "source_name": "quality control", "target_name": "human computation", "weight": 3.0, "year": 2019}, {"source": "7", "target": "90", "source_name": "quality control", "target_name": "incentive mechanism", "weight": 2.0, "year": 2019}, {"source": "7", "target": "93", "source_name": "quality control", "target_name": "literature review", "weight": 1.0, "year": 2019}, {"source": "7", "target": "97", "source_name": "quality control", "target_name": "task assignment", "weight": 3.0, "year": 2019}, {"source": "7", "target": "98", "source_name": "quality control", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "7", "target": "103", "source_name": "quality control", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "8", "target": "9", "source_name": "amazon mechanical turk", "target_name": "data collection", "weight": 4.0, "year": 2019}, {"source": "8", "target": "11", "source_name": "amazon mechanical turk", "target_name": "crowdsourced data", "weight": 1.0, "year": 2019}, {"source": "8", "target": "12", "source_name": "amazon mechanical turk", "target_name": "open innovation", "weight": 1.0, "year": 2019}, {"source": "8", "target": "15", "source_name": "amazon mechanical turk", "target_name": "decision support", "weight": 1.0, "year": 2019}, {"source": "8", "target": "26", "source_name": "amazon mechanical turk", "target_name": "business process", "weight": 5.0, "year": 2019}, {"source": "8", "target": "27", "source_name": "amazon mechanical turk", "target_name": "social media", "weight": 1.0, "year": 2019}, {"source": "8", "target": "31", "source_name": "amazon mechanical turk", "target_name": "software development", "weight": 5.0, "year": 2019}, {"source": "8", "target": "34", "source_name": "amazon mechanical turk", "target_name": "search engines", "weight": 2.0, "year": 2019}, {"source": "8", "target": "36", "source_name": "amazon mechanical turk", "target_name": "open source", "weight": 1.0, "year": 2019}, {"source": "8", "target": "42", "source_name": "amazon mechanical turk", "target_name": "quality assurance", "weight": 1.0, "year": 2019}, {"source": "8", "target": "45", "source_name": "amazon mechanical turk", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2019}, {"source": "8", "target": "54", "source_name": "amazon mechanical turk", "target_name": "software quality", "weight": 1.0, "year": 2019}, {"source": "8", "target": "58", "source_name": "amazon mechanical turk", "target_name": "user interface", "weight": 4.0, "year": 2019}, {"source": "8", "target": "60", "source_name": "amazon mechanical turk", "target_name": "collective intelligence", "weight": 1.0, "year": 2019}, {"source": "8", "target": "71", "source_name": "amazon mechanical turk", "target_name": "software testing", "weight": 1.0, "year": 2019}, {"source": "8", "target": "76", "source_name": "amazon mechanical turk", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "8", "target": "77", "source_name": "amazon mechanical turk", "target_name": "mechanical turk", "weight": 21.0, "year": 2019}, {"source": "8", "target": "79", "source_name": "amazon mechanical turk", "target_name": "data management", "weight": 1.0, "year": 2019}, {"source": "8", "target": "80", "source_name": "amazon mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "8", "target": "82", "source_name": "amazon mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2019}, {"source": "8", "target": "83", "source_name": "amazon mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "8", "target": "84", "source_name": "amazon mechanical turk", "target_name": "human computation", "weight": 2.0, "year": 2019}, {"source": "8", "target": "91", "source_name": "amazon mechanical turk", "target_name": "software design", "weight": 3.0, "year": 2019}, {"source": "8", "target": "93", "source_name": "amazon mechanical turk", "target_name": "literature review", "weight": 1.0, "year": 2019}, {"source": "8", "target": "96", "source_name": "amazon mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "8", "target": "97", "source_name": "amazon mechanical turk", "target_name": "task assignment", "weight": 1.0, "year": 2019}, {"source": "9", "target": "11", "source_name": "data collection", "target_name": "crowdsourced data", "weight": 4.0, "year": 2019}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2019}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2019}, {"source": "9", "target": "26", "source_name": "data collection", "target_name": "business process", "weight": 1.0, "year": 2019}, {"source": "9", "target": "27", "source_name": "data collection", "target_name": "social media", "weight": 1.0, "year": 2019}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2019}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2019}, {"source": "9", "target": "45", "source_name": "data collection", "target_name": "spatial crowdsourcing", "weight": 4.0, "year": 2019}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2019}, {"source": "9", "target": "58", "source_name": "data collection", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2019}, {"source": "9", "target": "75", "source_name": "data collection", "target_name": "systematic review", "weight": 2.0, "year": 2019}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "9", "target": "77", "source_name": "data collection", "target_name": "mechanical turk", "weight": 3.0, "year": 2019}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2019}, {"source": "9", "target": "80", "source_name": "data collection", "target_name": "information systems", "weight": 2.0, "year": 2019}, {"source": "9", "target": "83", "source_name": "data collection", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "9", "target": "84", "source_name": "data collection", "target_name": "human computation", "weight": 2.0, "year": 2019}, {"source": "9", "target": "90", "source_name": "data collection", "target_name": "incentive mechanism", "weight": 2.0, "year": 2019}, {"source": "9", "target": "94", "source_name": "data collection", "target_name": "cultural heritage", "weight": 1.0, "year": 2019}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "9", "target": "97", "source_name": "data collection", "target_name": "task assignment", "weight": 2.0, "year": 2019}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2019}, {"source": "10", "target": "20", "source_name": "requirements engineering", "target_name": "information technology", "weight": 1.0, "year": 2019}, {"source": "10", "target": "21", "source_name": "requirements engineering", "target_name": "problem solving", "weight": 1.0, "year": 2019}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2019}, {"source": "10", "target": "24", "source_name": "requirements engineering", "target_name": "requirements analysis", "weight": 1.0, "year": 2019}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2019}, {"source": "10", "target": "29", "source_name": "requirements engineering", "target_name": "cloud computing", "weight": 1.0, "year": 2019}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 18.0, "year": 2019}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2019}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2019}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 2.0, "year": 2019}, {"source": "10", "target": "37", "source_name": "requirements engineering", "target_name": "controlled experiments", "weight": 1.0, "year": 2019}, {"source": "10", "target": "38", "source_name": "requirements engineering", "target_name": "systematic literature review", "weight": 1.0, "year": 2019}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2019}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2019}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2019}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2019}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2019}, {"source": "10", "target": "53", "source_name": "requirements engineering", "target_name": "big data", "weight": 1.0, "year": 2019}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 3.0, "year": 2019}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 2.0, "year": 2019}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2019}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2019}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2019}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2019}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 3.0, "year": 2019}, {"source": "10", "target": "67", "source_name": "requirements engineering", "target_name": "machine learning", "weight": 2.0, "year": 2019}, {"source": "10", "target": "70", "source_name": "requirements engineering", "target_name": "decision making", "weight": 1.0, "year": 2019}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 2.0, "year": 2019}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2019}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 6.0, "year": 2019}, {"source": "10", "target": "75", "source_name": "requirements engineering", "target_name": "systematic review", "weight": 1.0, "year": 2019}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2019}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2019}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 3.0, "year": 2019}, {"source": "10", "target": "82", "source_name": "requirements engineering", "target_name": "social network", "weight": 2.0, "year": 2019}, {"source": "10", "target": "83", "source_name": "requirements engineering", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2019}, {"source": "10", "target": "86", "source_name": "requirements engineering", "target_name": "systematic mapping", "weight": 1.0, "year": 2019}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 6.0, "year": 2019}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2019}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 10.0, "year": 2019}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "10", "target": "101", "source_name": "requirements engineering", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "10", "target": "102", "source_name": "requirements engineering", "target_name": "product line", "weight": 2.0, "year": 2019}, {"source": "10", "target": "103", "source_name": "requirements engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "11", "target": "26", "source_name": "crowdsourced data", "target_name": "business process", "weight": 1.0, "year": 2019}, {"source": "11", "target": "27", "source_name": "crowdsourced data", "target_name": "social media", "weight": 2.0, "year": 2019}, {"source": "11", "target": "31", "source_name": "crowdsourced data", "target_name": "software development", "weight": 1.0, "year": 2019}, {"source": "11", "target": "34", "source_name": "crowdsourced data", "target_name": "search engines", "weight": 2.0, "year": 2019}, {"source": "11", "target": "36", "source_name": "crowdsourced data", "target_name": "open source", "weight": 1.0, "year": 2019}, {"source": "11", "target": "44", "source_name": "crowdsourced data", "target_name": "empirical study", "weight": 1.0, "year": 2019}, {"source": "11", "target": "45", "source_name": "crowdsourced data", "target_name": "spatial crowdsourcing", "weight": 2.0, "year": 2019}, {"source": "11", "target": "53", "source_name": "crowdsourced data", "target_name": "big data", "weight": 2.0, "year": 2019}, {"source": "11", "target": "57", "source_name": "crowdsourced data", "target_name": "human intelligence", "weight": 1.0, "year": 2019}, {"source": "11", "target": "67", "source_name": "crowdsourced data", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "11", "target": "75", "source_name": "crowdsourced data", "target_name": "systematic review", "weight": 1.0, "year": 2019}, {"source": "11", "target": "77", "source_name": "crowdsourced data", "target_name": "mechanical turk", "weight": 1.0, "year": 2019}, {"source": "11", "target": "79", "source_name": "crowdsourced data", "target_name": "data management", "weight": 3.0, "year": 2019}, {"source": "11", "target": "80", "source_name": "crowdsourced data", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "11", "target": "83", "source_name": "crowdsourced data", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "11", "target": "84", "source_name": "crowdsourced data", "target_name": "human computation", "weight": 1.0, "year": 2019}, {"source": "11", "target": "91", "source_name": "crowdsourced data", "target_name": "software design", "weight": 1.0, "year": 2019}, {"source": "11", "target": "96", "source_name": "crowdsourced data", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "11", "target": "98", "source_name": "crowdsourced data", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2019}, {"source": "12", "target": "21", "source_name": "open innovation", "target_name": "problem solving", "weight": 1.0, "year": 2019}, {"source": "12", "target": "26", "source_name": "open innovation", "target_name": "business process", "weight": 1.0, "year": 2019}, {"source": "12", "target": "31", "source_name": "open innovation", "target_name": "software development", "weight": 1.0, "year": 2019}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2019}, {"source": "12", "target": "42", "source_name": "open innovation", "target_name": "quality assurance", "weight": 1.0, "year": 2019}, {"source": "12", "target": "77", "source_name": "open innovation", "target_name": "mechanical turk", "weight": 1.0, "year": 2019}, {"source": "12", "target": "93", "source_name": "open innovation", "target_name": "literature review", "weight": 2.0, "year": 2019}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 4.0, "year": 2019}, {"source": "13", "target": "27", "source_name": "natural language processing", "target_name": "social media", "weight": 1.0, "year": 2019}, {"source": "13", "target": "30", "source_name": "natural language processing", "target_name": "end users", "weight": 1.0, "year": 2019}, {"source": "13", "target": "31", "source_name": "natural language processing", "target_name": "software development", "weight": 1.0, "year": 2019}, {"source": "13", "target": "59", "source_name": "natural language processing", "target_name": "bug reports", "weight": 1.0, "year": 2019}, {"source": "13", "target": "67", "source_name": "natural language processing", "target_name": "machine learning", "weight": 6.0, "year": 2019}, {"source": "13", "target": "71", "source_name": "natural language processing", "target_name": "software testing", "weight": 1.0, "year": 2019}, {"source": "13", "target": "84", "source_name": "natural language processing", "target_name": "human computation", "weight": 2.0, "year": 2019}, {"source": "13", "target": "101", "source_name": "natural language processing", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 4.0, "year": 2019}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2019}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2019}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2019}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2019}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2019}, {"source": "14", "target": "61", "source_name": "object oriented", "target_name": "extreme programming", "weight": 1.0, "year": 2019}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2019}, {"source": "14", "target": "71", "source_name": "object oriented", "target_name": "software testing", "weight": 1.0, "year": 2019}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2019}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2019}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "15", "target": "26", "source_name": "decision support", "target_name": "business process", "weight": 2.0, "year": 2019}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2019}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2019}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2019}, {"source": "15", "target": "62", "source_name": "decision support", "target_name": "information processing", "weight": 1.0, "year": 2019}, {"source": "15", "target": "67", "source_name": "decision support", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "15", "target": "71", "source_name": "decision support", "target_name": "software testing", "weight": 1.0, "year": 2019}, {"source": "15", "target": "100", "source_name": "decision support", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "15", "target": "103", "source_name": "decision support", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "16", "target": "29", "source_name": "learning environment", "target_name": "cloud computing", "weight": 1.0, "year": 2019}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2019}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2019}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2019}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 3.0, "year": 2019}, {"source": "17", "target": "33", "source_name": "conceptual framework", "target_name": "fundamental principles", "weight": 1.0, "year": 2019}, {"source": "17", "target": "38", "source_name": "conceptual framework", "target_name": "systematic literature review", "weight": 1.0, "year": 2019}, {"source": "17", "target": "46", "source_name": "conceptual framework", "target_name": "empirical studies", "weight": 1.0, "year": 2019}, {"source": "17", "target": "74", "source_name": "conceptual framework", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "17", "target": "75", "source_name": "conceptual framework", "target_name": "systematic review", "weight": 1.0, "year": 2019}, {"source": "17", "target": "80", "source_name": "conceptual framework", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "17", "target": "82", "source_name": "conceptual framework", "target_name": "social network", "weight": 1.0, "year": 2019}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2019}, {"source": "17", "target": "93", "source_name": "conceptual framework", "target_name": "literature review", "weight": 3.0, "year": 2019}, {"source": "17", "target": "103", "source_name": "conceptual framework", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2019}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2019}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2019}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2019}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 4.0, "year": 2019}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2019}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2019}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2019}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2019}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2019}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2019}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2019}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2019}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2019}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2019}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2019}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2019}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2019}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2019}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "19", "target": "78", "source_name": "configuration management", "target_name": "process improvement", "weight": 1.0, "year": 2019}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2019}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2019}, {"source": "20", "target": "27", "source_name": "information technology", "target_name": "social media", "weight": 1.0, "year": 2019}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 7.0, "year": 2019}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 2.0, "year": 2019}, {"source": "20", "target": "37", "source_name": "information technology", "target_name": "controlled experiments", "weight": 1.0, "year": 2019}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2019}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2019}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 2.0, "year": 2019}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2019}, {"source": "20", "target": "57", "source_name": "information technology", "target_name": "human intelligence", "weight": 1.0, "year": 2019}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "20", "target": "60", "source_name": "information technology", "target_name": "collective intelligence", "weight": 1.0, "year": 2019}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2019}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2019}, {"source": "20", "target": "70", "source_name": "information technology", "target_name": "decision making", "weight": 1.0, "year": 2019}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2019}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2019}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 2.0, "year": 2019}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2019}, {"source": "20", "target": "93", "source_name": "information technology", "target_name": "literature review", "weight": 1.0, "year": 2019}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 2.0, "year": 2019}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2019}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2019}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 12.0, "year": 2019}, {"source": "21", "target": "34", "source_name": "problem solving", "target_name": "search engines", "weight": 1.0, "year": 2019}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 3.0, "year": 2019}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2019}, {"source": "21", "target": "39", "source_name": "problem solving", "target_name": "team members", "weight": 1.0, "year": 2019}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2019}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2019}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 2.0, "year": 2019}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2019}, {"source": "21", "target": "60", "source_name": "problem solving", "target_name": "collective intelligence", "weight": 1.0, "year": 2019}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 2.0, "year": 2019}, {"source": "21", "target": "69", "source_name": "problem solving", "target_name": "computational intelligence", "weight": 1.0, "year": 2019}, {"source": "21", "target": "71", "source_name": "problem solving", "target_name": "software testing", "weight": 2.0, "year": 2019}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2019}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2019}, {"source": "21", "target": "80", "source_name": "problem solving", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "21", "target": "84", "source_name": "problem solving", "target_name": "human computation", "weight": 1.0, "year": 2019}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 2.0, "year": 2019}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 3.0, "year": 2019}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "21", "target": "99", "source_name": "problem solving", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 10.0, "year": 2019}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2019}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2019}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2019}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2019}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 3.0, "year": 2019}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2019}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2019}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2019}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2019}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2019}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2019}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2019}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2019}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2019}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2019}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2019}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2019}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2019}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2019}, {"source": "24", "target": "53", "source_name": "requirements analysis", "target_name": "big data", "weight": 1.0, "year": 2019}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2019}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2019}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2019}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2019}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2019}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2019}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2019}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2019}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "25", "target": "31", "source_name": "motivational factors", "target_name": "software development", "weight": 1.0, "year": 2019}, {"source": "25", "target": "46", "source_name": "motivational factors", "target_name": "empirical studies", "weight": 1.0, "year": 2019}, {"source": "25", "target": "93", "source_name": "motivational factors", "target_name": "literature review", "weight": 2.0, "year": 2019}, {"source": "26", "target": "29", "source_name": "business process", "target_name": "cloud computing", "weight": 1.0, "year": 2019}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 3.0, "year": 2019}, {"source": "26", "target": "36", "source_name": "business process", "target_name": "open source", "weight": 1.0, "year": 2019}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2019}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 2.0, "year": 2019}, {"source": "26", "target": "58", "source_name": "business process", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "26", "target": "60", "source_name": "business process", "target_name": "collective intelligence", "weight": 4.0, "year": 2019}, {"source": "26", "target": "70", "source_name": "business process", "target_name": "decision making", "weight": 1.0, "year": 2019}, {"source": "26", "target": "71", "source_name": "business process", "target_name": "software testing", "weight": 3.0, "year": 2019}, {"source": "26", "target": "76", "source_name": "business process", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "26", "target": "77", "source_name": "business process", "target_name": "mechanical turk", "weight": 3.0, "year": 2019}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 2.0, "year": 2019}, {"source": "26", "target": "82", "source_name": "business process", "target_name": "social network", "weight": 1.0, "year": 2019}, {"source": "26", "target": "84", "source_name": "business process", "target_name": "human computation", "weight": 1.0, "year": 2019}, {"source": "26", "target": "91", "source_name": "business process", "target_name": "software design", "weight": 1.0, "year": 2019}, {"source": "26", "target": "93", "source_name": "business process", "target_name": "literature review", "weight": 3.0, "year": 2019}, {"source": "26", "target": "96", "source_name": "business process", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "26", "target": "103", "source_name": "business process", "target_name": "knowledge base", "weight": 2.0, "year": 2019}, {"source": "27", "target": "31", "source_name": "social media", "target_name": "software development", "weight": 5.0, "year": 2019}, {"source": "27", "target": "34", "source_name": "social media", "target_name": "search engines", "weight": 2.0, "year": 2019}, {"source": "27", "target": "36", "source_name": "social media", "target_name": "open source", "weight": 1.0, "year": 2019}, {"source": "27", "target": "38", "source_name": "social media", "target_name": "systematic literature review", "weight": 1.0, "year": 2019}, {"source": "27", "target": "40", "source_name": "social media", "target_name": "knowledge management", "weight": 1.0, "year": 2019}, {"source": "27", "target": "53", "source_name": "social media", "target_name": "big data", "weight": 2.0, "year": 2019}, {"source": "27", "target": "57", "source_name": "social media", "target_name": "human intelligence", "weight": 1.0, "year": 2019}, {"source": "27", "target": "58", "source_name": "social media", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "27", "target": "60", "source_name": "social media", "target_name": "collective intelligence", "weight": 2.0, "year": 2019}, {"source": "27", "target": "70", "source_name": "social media", "target_name": "decision making", "weight": 1.0, "year": 2019}, {"source": "27", "target": "74", "source_name": "social media", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "27", "target": "77", "source_name": "social media", "target_name": "mechanical turk", "weight": 3.0, "year": 2019}, {"source": "27", "target": "79", "source_name": "social media", "target_name": "data management", "weight": 1.0, "year": 2019}, {"source": "27", "target": "80", "source_name": "social media", "target_name": "information systems", "weight": 2.0, "year": 2019}, {"source": "27", "target": "82", "source_name": "social media", "target_name": "social network", "weight": 1.0, "year": 2019}, {"source": "27", "target": "83", "source_name": "social media", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "27", "target": "84", "source_name": "social media", "target_name": "human computation", "weight": 1.0, "year": 2019}, {"source": "27", "target": "90", "source_name": "social media", "target_name": "incentive mechanism", "weight": 1.0, "year": 2019}, {"source": "27", "target": "93", "source_name": "social media", "target_name": "literature review", "weight": 2.0, "year": 2019}, {"source": "27", "target": "96", "source_name": "social media", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "27", "target": "97", "source_name": "social media", "target_name": "task assignment", "weight": 1.0, "year": 2019}, {"source": "27", "target": "98", "source_name": "social media", "target_name": "data mining", "weight": 2.0, "year": 2019}, {"source": "28", "target": "31", "source_name": "computing elements", "target_name": "software development", "weight": 2.0, "year": 2019}, {"source": "28", "target": "60", "source_name": "computing elements", "target_name": "collective intelligence", "weight": 2.0, "year": 2019}, {"source": "28", "target": "76", "source_name": "computing elements", "target_name": "life cycle", "weight": 2.0, "year": 2019}, {"source": "28", "target": "97", "source_name": "computing elements", "target_name": "task assignment", "weight": 1.0, "year": 2019}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 5.0, "year": 2019}, {"source": "29", "target": "42", "source_name": "cloud computing", "target_name": "quality assurance", "weight": 1.0, "year": 2019}, {"source": "29", "target": "70", "source_name": "cloud computing", "target_name": "decision making", "weight": 1.0, "year": 2019}, {"source": "29", "target": "71", "source_name": "cloud computing", "target_name": "software testing", "weight": 2.0, "year": 2019}, {"source": "29", "target": "74", "source_name": "cloud computing", "target_name": "software architecture", "weight": 2.0, "year": 2019}, {"source": "29", "target": "83", "source_name": "cloud computing", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "29", "target": "91", "source_name": "cloud computing", "target_name": "software design", "weight": 1.0, "year": 2019}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 3.0, "year": 2019}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "30", "target": "59", "source_name": "end users", "target_name": "bug reports", "weight": 1.0, "year": 2019}, {"source": "30", "target": "67", "source_name": "end users", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "30", "target": "96", "source_name": "end users", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "30", "target": "98", "source_name": "end users", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "30", "target": "99", "source_name": "end users", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2019}, {"source": "31", "target": "33", "source_name": "software development", "target_name": "fundamental principles", "weight": 3.0, "year": 2019}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2019}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2019}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 17.0, "year": 2019}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 3.0, "year": 2019}, {"source": "31", "target": "38", "source_name": "software development", "target_name": "systematic literature review", "weight": 2.0, "year": 2019}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 7.0, "year": 2019}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 3.0, "year": 2019}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2019}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 9.0, "year": 2019}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 9.0, "year": 2019}, {"source": "31", "target": "45", "source_name": "software development", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2019}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 3.0, "year": 2019}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 7.0, "year": 2019}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2019}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 6.0, "year": 2019}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 12.0, "year": 2019}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 2.0, "year": 2019}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 26.0, "year": 2019}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 7.0, "year": 2019}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2019}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 2.0, "year": 2019}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 8.0, "year": 2019}, {"source": "31", "target": "60", "source_name": "software development", "target_name": "collective intelligence", "weight": 5.0, "year": 2019}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 11.0, "year": 2019}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2019}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2019}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2019}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 18.0, "year": 2019}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 3.0, "year": 2019}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2019}, {"source": "31", "target": "70", "source_name": "software development", "target_name": "decision making", "weight": 3.0, "year": 2019}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 10.0, "year": 2019}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 5.0, "year": 2019}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2019}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 17.0, "year": 2019}, {"source": "31", "target": "75", "source_name": "software development", "target_name": "systematic review", "weight": 3.0, "year": 2019}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 23.0, "year": 2019}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 8.0, "year": 2019}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2019}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2019}, {"source": "31", "target": "82", "source_name": "software development", "target_name": "social network", "weight": 2.0, "year": 2019}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 6.0, "year": 2019}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2019}, {"source": "31", "target": "86", "source_name": "software development", "target_name": "systematic mapping", "weight": 2.0, "year": 2019}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 25.0, "year": 2019}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2019}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 8.0, "year": 2019}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 5.0, "year": 2019}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 8.0, "year": 2019}, {"source": "31", "target": "97", "source_name": "software development", "target_name": "task assignment", "weight": 1.0, "year": 2019}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 5.0, "year": 2019}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 4.0, "year": 2019}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 4.0, "year": 2019}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 9.0, "year": 2019}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 23.0, "year": 2019}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 5.0, "year": 2019}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2019}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2019}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2019}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2019}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2019}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2019}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2019}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2019}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2019}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2019}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "33", "target": "54", "source_name": "fundamental principles", "target_name": "software quality", "weight": 1.0, "year": 2019}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2019}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "33", "target": "74", "source_name": "fundamental principles", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "34", "target": "53", "source_name": "search engines", "target_name": "big data", "weight": 1.0, "year": 2019}, {"source": "34", "target": "57", "source_name": "search engines", "target_name": "human intelligence", "weight": 1.0, "year": 2019}, {"source": "34", "target": "65", "source_name": "search engines", "target_name": "web search", "weight": 4.0, "year": 2019}, {"source": "34", "target": "67", "source_name": "search engines", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "34", "target": "77", "source_name": "search engines", "target_name": "mechanical turk", "weight": 3.0, "year": 2019}, {"source": "34", "target": "82", "source_name": "search engines", "target_name": "social network", "weight": 1.0, "year": 2019}, {"source": "34", "target": "84", "source_name": "search engines", "target_name": "human computation", "weight": 1.0, "year": 2019}, {"source": "34", "target": "95", "source_name": "search engines", "target_name": "human factors", "weight": 2.0, "year": 2019}, {"source": "34", "target": "97", "source_name": "search engines", "target_name": "task assignment", "weight": 1.0, "year": 2019}, {"source": "34", "target": "100", "source_name": "search engines", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2019}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 2.0, "year": 2019}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2019}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 2.0, "year": 2019}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 2.0, "year": 2019}, {"source": "36", "target": "57", "source_name": "open source", "target_name": "human intelligence", "weight": 1.0, "year": 2019}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "36", "target": "60", "source_name": "open source", "target_name": "collective intelligence", "weight": 2.0, "year": 2019}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2019}, {"source": "36", "target": "67", "source_name": "open source", "target_name": "machine learning", "weight": 2.0, "year": 2019}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2019}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2019}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 2.0, "year": 2019}, {"source": "36", "target": "77", "source_name": "open source", "target_name": "mechanical turk", "weight": 3.0, "year": 2019}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2019}, {"source": "36", "target": "82", "source_name": "open source", "target_name": "social network", "weight": 1.0, "year": 2019}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 5.0, "year": 2019}, {"source": "36", "target": "93", "source_name": "open source", "target_name": "literature review", "weight": 2.0, "year": 2019}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 20.0, "year": 2019}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 2.0, "year": 2019}, {"source": "37", "target": "38", "source_name": "controlled experiments", "target_name": "systematic literature review", "weight": 1.0, "year": 2019}, {"source": "37", "target": "57", "source_name": "controlled experiments", "target_name": "human intelligence", "weight": 1.0, "year": 2019}, {"source": "37", "target": "75", "source_name": "controlled experiments", "target_name": "systematic review", "weight": 1.0, "year": 2019}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2019}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 3.0, "year": 2019}, {"source": "38", "target": "80", "source_name": "systematic literature review", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 10.0, "year": 2019}, {"source": "38", "target": "96", "source_name": "systematic literature review", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2019}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2019}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 4.0, "year": 2019}, {"source": "39", "target": "69", "source_name": "team members", "target_name": "computational intelligence", "weight": 1.0, "year": 2019}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2019}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2019}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2019}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2019}, {"source": "40", "target": "70", "source_name": "knowledge management", "target_name": "decision making", "weight": 1.0, "year": 2019}, {"source": "40", "target": "74", "source_name": "knowledge management", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2019}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "40", "target": "98", "source_name": "knowledge management", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2019}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2019}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2019}, {"source": "42", "target": "51", "source_name": "quality assurance", "target_name": "agile software development", "weight": 1.0, "year": 2019}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 6.0, "year": 2019}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2019}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2019}, {"source": "42", "target": "67", "source_name": "quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2019}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2019}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "42", "target": "76", "source_name": "quality assurance", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "42", "target": "77", "source_name": "quality assurance", "target_name": "mechanical turk", "weight": 2.0, "year": 2019}, {"source": "42", "target": "84", "source_name": "quality assurance", "target_name": "human computation", "weight": 1.0, "year": 2019}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2019}, {"source": "42", "target": "93", "source_name": "quality assurance", "target_name": "literature review", "weight": 1.0, "year": 2019}, {"source": "42", "target": "96", "source_name": "quality assurance", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2019}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 3.0, "year": 2019}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2019}, {"source": "44", "target": "54", "source_name": "empirical study", "target_name": "software quality", "weight": 1.0, "year": 2019}, {"source": "44", "target": "82", "source_name": "empirical study", "target_name": "social network", "weight": 1.0, "year": 2019}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 2.0, "year": 2019}, {"source": "44", "target": "93", "source_name": "empirical study", "target_name": "literature review", "weight": 1.0, "year": 2019}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "45", "target": "75", "source_name": "spatial crowdsourcing", "target_name": "systematic review", "weight": 1.0, "year": 2019}, {"source": "45", "target": "77", "source_name": "spatial crowdsourcing", "target_name": "mechanical turk", "weight": 1.0, "year": 2019}, {"source": "45", "target": "79", "source_name": "spatial crowdsourcing", "target_name": "data management", "weight": 1.0, "year": 2019}, {"source": "45", "target": "90", "source_name": "spatial crowdsourcing", "target_name": "incentive mechanism", "weight": 3.0, "year": 2019}, {"source": "45", "target": "97", "source_name": "spatial crowdsourcing", "target_name": "task assignment", "weight": 4.0, "year": 2019}, {"source": "46", "target": "47", "source_name": "empirical studies", "target_name": "software maintenance", "weight": 1.0, "year": 2019}, {"source": "46", "target": "50", "source_name": "empirical studies", "target_name": "source code", "weight": 2.0, "year": 2019}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2019}, {"source": "46", "target": "57", "source_name": "empirical studies", "target_name": "human intelligence", "weight": 1.0, "year": 2019}, {"source": "46", "target": "71", "source_name": "empirical studies", "target_name": "software testing", "weight": 1.0, "year": 2019}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2019}, {"source": "46", "target": "82", "source_name": "empirical studies", "target_name": "social network", "weight": 1.0, "year": 2019}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 3.0, "year": 2019}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2019}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 6.0, "year": 2019}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2019}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2019}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2019}, {"source": "47", "target": "59", "source_name": "software maintenance", "target_name": "bug reports", "weight": 4.0, "year": 2019}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2019}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2019}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "47", "target": "67", "source_name": "software maintenance", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 4.0, "year": 2019}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 8.0, "year": 2019}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2019}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2019}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2019}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 2.0, "year": 2019}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2019}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2019}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2019}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2019}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2019}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2019}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2019}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2019}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2019}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2019}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2019}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "50", "target": "59", "source_name": "source code", "target_name": "bug reports", "weight": 1.0, "year": 2019}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2019}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 2.0, "year": 2019}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 9.0, "year": 2019}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 4.0, "year": 2019}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 2.0, "year": 2019}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "50", "target": "101", "source_name": "source code", "target_name": "software reuse", "weight": 2.0, "year": 2019}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2019}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "51", "target": "67", "source_name": "agile software development", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "51", "target": "74", "source_name": "agile software development", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 4.0, "year": 2019}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2019}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2019}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "51", "target": "96", "source_name": "agile software development", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2019}, {"source": "53", "target": "60", "source_name": "big data", "target_name": "collective intelligence", "weight": 1.0, "year": 2019}, {"source": "53", "target": "77", "source_name": "big data", "target_name": "mechanical turk", "weight": 1.0, "year": 2019}, {"source": "53", "target": "79", "source_name": "big data", "target_name": "data management", "weight": 1.0, "year": 2019}, {"source": "53", "target": "84", "source_name": "big data", "target_name": "human computation", "weight": 1.0, "year": 2019}, {"source": "53", "target": "90", "source_name": "big data", "target_name": "incentive mechanism", "weight": 1.0, "year": 2019}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2019}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2019}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2019}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2019}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2019}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2019}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2019}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2019}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2019}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2019}, {"source": "54", "target": "77", "source_name": "software quality", "target_name": "mechanical turk", "weight": 1.0, "year": 2019}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 3.0, "year": 2019}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2019}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 4.0, "year": 2019}, {"source": "54", "target": "86", "source_name": "software quality", "target_name": "systematic mapping", "weight": 1.0, "year": 2019}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 4.0, "year": 2019}, {"source": "54", "target": "95", "source_name": "software quality", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2019}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2019}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2019}, {"source": "55", "target": "67", "source_name": "systems engineering", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2019}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2019}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "55", "target": "82", "source_name": "systems engineering", "target_name": "social network", "weight": 1.0, "year": 2019}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2019}, {"source": "55", "target": "85", "source_name": "systems engineering", "target_name": "degree programs", "weight": 2.0, "year": 2019}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2019}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2019}, {"source": "55", "target": "102", "source_name": "systems engineering", "target_name": "product line", "weight": 1.0, "year": 2019}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2019}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2019}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2019}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2019}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2019}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2019}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2019}, {"source": "57", "target": "60", "source_name": "human intelligence", "target_name": "collective intelligence", "weight": 3.0, "year": 2019}, {"source": "57", "target": "67", "source_name": "human intelligence", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2019}, {"source": "57", "target": "75", "source_name": "human intelligence", "target_name": "systematic review", "weight": 1.0, "year": 2019}, {"source": "57", "target": "77", "source_name": "human intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2019}, {"source": "57", "target": "84", "source_name": "human intelligence", "target_name": "human computation", "weight": 1.0, "year": 2019}, {"source": "57", "target": "96", "source_name": "human intelligence", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 2.0, "year": 2019}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2019}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2019}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2019}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2019}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2019}, {"source": "58", "target": "77", "source_name": "user interface", "target_name": "mechanical turk", "weight": 3.0, "year": 2019}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "58", "target": "84", "source_name": "user interface", "target_name": "human computation", "weight": 2.0, "year": 2019}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 4.0, "year": 2019}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2019}, {"source": "59", "target": "67", "source_name": "bug reports", "target_name": "machine learning", "weight": 3.0, "year": 2019}, {"source": "59", "target": "71", "source_name": "bug reports", "target_name": "software testing", "weight": 2.0, "year": 2019}, {"source": "60", "target": "71", "source_name": "collective intelligence", "target_name": "software testing", "weight": 3.0, "year": 2019}, {"source": "60", "target": "76", "source_name": "collective intelligence", "target_name": "life cycle", "weight": 2.0, "year": 2019}, {"source": "60", "target": "77", "source_name": "collective intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2019}, {"source": "60", "target": "79", "source_name": "collective intelligence", "target_name": "data management", "weight": 1.0, "year": 2019}, {"source": "60", "target": "84", "source_name": "collective intelligence", "target_name": "human computation", "weight": 2.0, "year": 2019}, {"source": "60", "target": "93", "source_name": "collective intelligence", "target_name": "literature review", "weight": 3.0, "year": 2019}, {"source": "60", "target": "96", "source_name": "collective intelligence", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "60", "target": "97", "source_name": "collective intelligence", "target_name": "task assignment", "weight": 1.0, "year": 2019}, {"source": "60", "target": "103", "source_name": "collective intelligence", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2019}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 3.0, "year": 2019}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2019}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2019}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2019}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2019}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "62", "target": "67", "source_name": "information processing", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2019}, {"source": "62", "target": "100", "source_name": "information processing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2019}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2019}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2019}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2019}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2019}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 2.0, "year": 2019}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 4.0, "year": 2019}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 3.0, "year": 2019}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2019}, {"source": "66", "target": "80", "source_name": "project management", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "66", "target": "82", "source_name": "project management", "target_name": "social network", "weight": 1.0, "year": 2019}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "66", "target": "86", "source_name": "project management", "target_name": "systematic mapping", "weight": 1.0, "year": 2019}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2019}, {"source": "66", "target": "93", "source_name": "project management", "target_name": "literature review", "weight": 1.0, "year": 2019}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2019}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "66", "target": "101", "source_name": "project management", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2019}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 2.0, "year": 2019}, {"source": "67", "target": "75", "source_name": "machine learning", "target_name": "systematic review", "weight": 1.0, "year": 2019}, {"source": "67", "target": "76", "source_name": "machine learning", "target_name": "life cycle", "weight": 1.0, "year": 2019}, {"source": "67", "target": "79", "source_name": "machine learning", "target_name": "data management", "weight": 1.0, "year": 2019}, {"source": "67", "target": "82", "source_name": "machine learning", "target_name": "social network", "weight": 2.0, "year": 2019}, {"source": "67", "target": "84", "source_name": "machine learning", "target_name": "human computation", "weight": 4.0, "year": 2019}, {"source": "67", "target": "96", "source_name": "machine learning", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 2.0, "year": 2019}, {"source": "67", "target": "99", "source_name": "machine learning", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 4.0, "year": 2019}, {"source": "67", "target": "103", "source_name": "machine learning", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "68", "target": "84", "source_name": "service oriented", "target_name": "human computation", "weight": 1.0, "year": 2019}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2019}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2019}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2019}, {"source": "70", "target": "74", "source_name": "decision making", "target_name": "software architecture", "weight": 1.0, "year": 2019}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2019}, {"source": "70", "target": "96", "source_name": "decision making", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "70", "target": "98", "source_name": "decision making", "target_name": "data mining", "weight": 2.0, "year": 2019}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2019}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 3.0, "year": 2019}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2019}, {"source": "71", "target": "78", "source_name": "software testing", "target_name": "process improvement", "weight": 1.0, "year": 2019}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2019}, {"source": "71", "target": "93", "source_name": "software testing", "target_name": "literature review", "weight": 1.0, "year": 2019}, {"source": "71", "target": "96", "source_name": "software testing", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2019}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 2.0, "year": 2019}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2019}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2019}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2019}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2019}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2019}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2019}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 2.0, "year": 2019}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 2.0, "year": 2019}, {"source": "74", "target": "83", "source_name": "software architecture", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2019}, {"source": "74", "target": "93", "source_name": "software architecture", "target_name": "literature review", "weight": 1.0, "year": 2019}, {"source": "74", "target": "98", "source_name": "software architecture", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 4.0, "year": 2019}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2019}, {"source": "75", "target": "90", "source_name": "systematic review", "target_name": "incentive mechanism", "weight": 1.0, "year": 2019}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 3.0, "year": 2019}, {"source": "75", "target": "96", "source_name": "systematic review", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "75", "target": "97", "source_name": "systematic review", "target_name": "task assignment", "weight": 1.0, "year": 2019}, {"source": "75", "target": "103", "source_name": "systematic review", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2019}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2019}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2019}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "76", "target": "96", "source_name": "life cycle", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2019}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2019}, {"source": "77", "target": "79", "source_name": "mechanical turk", "target_name": "data management", "weight": 3.0, "year": 2019}, {"source": "77", "target": "80", "source_name": "mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "77", "target": "82", "source_name": "mechanical turk", "target_name": "social network", "weight": 2.0, "year": 2019}, {"source": "77", "target": "83", "source_name": "mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "77", "target": "84", "source_name": "mechanical turk", "target_name": "human computation", "weight": 5.0, "year": 2019}, {"source": "77", "target": "91", "source_name": "mechanical turk", "target_name": "software design", "weight": 3.0, "year": 2019}, {"source": "77", "target": "93", "source_name": "mechanical turk", "target_name": "literature review", "weight": 1.0, "year": 2019}, {"source": "77", "target": "95", "source_name": "mechanical turk", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "77", "target": "96", "source_name": "mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "77", "target": "97", "source_name": "mechanical turk", "target_name": "task assignment", "weight": 1.0, "year": 2019}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2019}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2019}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "79", "target": "84", "source_name": "data management", "target_name": "human computation", "weight": 2.0, "year": 2019}, {"source": "79", "target": "97", "source_name": "data management", "target_name": "task assignment", "weight": 1.0, "year": 2019}, {"source": "80", "target": "83", "source_name": "information systems", "target_name": "lessons learned", "weight": 1.0, "year": 2019}, {"source": "80", "target": "84", "source_name": "information systems", "target_name": "human computation", "weight": 1.0, "year": 2019}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2019}, {"source": "80", "target": "93", "source_name": "information systems", "target_name": "literature review", "weight": 3.0, "year": 2019}, {"source": "80", "target": "96", "source_name": "information systems", "target_name": "open source software", "weight": 1.0, "year": 2019}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "80", "target": "99", "source_name": "information systems", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "82", "target": "84", "source_name": "social network", "target_name": "human computation", "weight": 1.0, "year": 2019}, {"source": "82", "target": "90", "source_name": "social network", "target_name": "incentive mechanism", "weight": 3.0, "year": 2019}, {"source": "82", "target": "98", "source_name": "social network", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "82", "target": "99", "source_name": "social network", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "83", "target": "84", "source_name": "lessons learned", "target_name": "human computation", "weight": 1.0, "year": 2019}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2019}, {"source": "84", "target": "100", "source_name": "human computation", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "90", "target": "93", "source_name": "incentive mechanism", "target_name": "literature review", "weight": 1.0, "year": 2019}, {"source": "90", "target": "97", "source_name": "incentive mechanism", "target_name": "task assignment", "weight": 4.0, "year": 2019}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2019}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 2.0, "year": 2019}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2019}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2019}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2019}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2019}, {"source": "93", "target": "96", "source_name": "literature review", "target_name": "open source software", "weight": 2.0, "year": 2019}, {"source": "93", "target": "97", "source_name": "literature review", "target_name": "task assignment", "weight": 1.0, "year": 2019}, {"source": "93", "target": "103", "source_name": "literature review", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2019}, {"source": "98", "target": "99", "source_name": "data mining", "target_name": "requirements elicitation", "weight": 1.0, "year": 2019}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2019}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2019}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2019}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2019}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2019}]}, {"2020": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 5.0, "year": 2020}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2020}, {"source": "0", "target": "29", "source_name": "intellectual property", "target_name": "cloud computing", "weight": 1.0, "year": 2020}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 3.0, "year": 2020}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2020}, {"source": "0", "target": "47", "source_name": "intellectual property", "target_name": "software maintenance", "weight": 1.0, "year": 2020}, {"source": "0", "target": "50", "source_name": "intellectual property", "target_name": "source code", "weight": 1.0, "year": 2020}, {"source": "0", "target": "70", "source_name": "intellectual property", "target_name": "decision making", "weight": 1.0, "year": 2020}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 3.0, "year": 2020}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "0", "target": "101", "source_name": "intellectual property", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "1", "target": "4", "source_name": "natural language", "target_name": "test report", "weight": 2.0, "year": 2020}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2020}, {"source": "1", "target": "7", "source_name": "natural language", "target_name": "quality control", "weight": 1.0, "year": 2020}, {"source": "1", "target": "13", "source_name": "natural language", "target_name": "natural language processing", "weight": 4.0, "year": 2020}, {"source": "1", "target": "27", "source_name": "natural language", "target_name": "social media", "weight": 1.0, "year": 2020}, {"source": "1", "target": "30", "source_name": "natural language", "target_name": "end users", "weight": 1.0, "year": 2020}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2020}, {"source": "1", "target": "34", "source_name": "natural language", "target_name": "search engines", "weight": 2.0, "year": 2020}, {"source": "1", "target": "44", "source_name": "natural language", "target_name": "empirical study", "weight": 1.0, "year": 2020}, {"source": "1", "target": "45", "source_name": "natural language", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2020}, {"source": "1", "target": "57", "source_name": "natural language", "target_name": "human intelligence", "weight": 1.0, "year": 2020}, {"source": "1", "target": "59", "source_name": "natural language", "target_name": "bug reports", "weight": 1.0, "year": 2020}, {"source": "1", "target": "67", "source_name": "natural language", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "1", "target": "71", "source_name": "natural language", "target_name": "software testing", "weight": 1.0, "year": 2020}, {"source": "1", "target": "97", "source_name": "natural language", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "1", "target": "100", "source_name": "natural language", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 9.0, "year": 2020}, {"source": "2", "target": "7", "source_name": "business model", "target_name": "quality control", "weight": 2.0, "year": 2020}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 2.0, "year": 2020}, {"source": "2", "target": "10", "source_name": "business model", "target_name": "requirements engineering", "weight": 1.0, "year": 2020}, {"source": "2", "target": "12", "source_name": "business model", "target_name": "open innovation", "weight": 4.0, "year": 2020}, {"source": "2", "target": "20", "source_name": "business model", "target_name": "information technology", "weight": 1.0, "year": 2020}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 3.0, "year": 2020}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2020}, {"source": "2", "target": "26", "source_name": "business model", "target_name": "business process", "weight": 4.0, "year": 2020}, {"source": "2", "target": "27", "source_name": "business model", "target_name": "social media", "weight": 1.0, "year": 2020}, {"source": "2", "target": "29", "source_name": "business model", "target_name": "cloud computing", "weight": 1.0, "year": 2020}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 6.0, "year": 2020}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 2.0, "year": 2020}, {"source": "2", "target": "38", "source_name": "business model", "target_name": "systematic literature review", "weight": 1.0, "year": 2020}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2020}, {"source": "2", "target": "53", "source_name": "business model", "target_name": "big data", "weight": 1.0, "year": 2020}, {"source": "2", "target": "58", "source_name": "business model", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "2", "target": "60", "source_name": "business model", "target_name": "collective intelligence", "weight": 4.0, "year": 2020}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "2", "target": "71", "source_name": "business model", "target_name": "software testing", "weight": 4.0, "year": 2020}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2020}, {"source": "2", "target": "80", "source_name": "business model", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "2", "target": "93", "source_name": "business model", "target_name": "literature review", "weight": 1.0, "year": 2020}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2020}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2020}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2020}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2020}, {"source": "3", "target": "27", "source_name": "design patterns", "target_name": "social media", "weight": 1.0, "year": 2020}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2020}, {"source": "3", "target": "36", "source_name": "design patterns", "target_name": "open source", "weight": 1.0, "year": 2020}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2020}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2020}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2020}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2020}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2020}, {"source": "3", "target": "57", "source_name": "design patterns", "target_name": "human intelligence", "weight": 1.0, "year": 2020}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2020}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2020}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2020}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2020}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2020}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2020}, {"source": "4", "target": "6", "source_name": "test report", "target_name": "software engineer", "weight": 1.0, "year": 2020}, {"source": "4", "target": "13", "source_name": "test report", "target_name": "natural language processing", "weight": 2.0, "year": 2020}, {"source": "4", "target": "42", "source_name": "test report", "target_name": "quality assurance", "weight": 1.0, "year": 2020}, {"source": "4", "target": "44", "source_name": "test report", "target_name": "empirical study", "weight": 1.0, "year": 2020}, {"source": "4", "target": "47", "source_name": "test report", "target_name": "software maintenance", "weight": 1.0, "year": 2020}, {"source": "4", "target": "59", "source_name": "test report", "target_name": "bug reports", "weight": 1.0, "year": 2020}, {"source": "4", "target": "60", "source_name": "test report", "target_name": "collective intelligence", "weight": 1.0, "year": 2020}, {"source": "4", "target": "67", "source_name": "test report", "target_name": "machine learning", "weight": 2.0, "year": 2020}, {"source": "4", "target": "71", "source_name": "test report", "target_name": "software testing", "weight": 7.0, "year": 2020}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 9.0, "year": 2020}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2020}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2020}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 2.0, "year": 2020}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2020}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 5.0, "year": 2020}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2020}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2020}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2020}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 2.0, "year": 2020}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2020}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 3.0, "year": 2020}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2020}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2020}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2020}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2020}, {"source": "5", "target": "78", "source_name": "software quality assurance", "target_name": "process improvement", "weight": 1.0, "year": 2020}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 2.0, "year": 2020}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2020}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 9.0, "year": 2020}, {"source": "6", "target": "8", "source_name": "software engineer", "target_name": "amazon mechanical turk", "weight": 8.0, "year": 2020}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 4.0, "year": 2020}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 27.0, "year": 2020}, {"source": "6", "target": "11", "source_name": "software engineer", "target_name": "crowdsourced data", "weight": 1.0, "year": 2020}, {"source": "6", "target": "12", "source_name": "software engineer", "target_name": "open innovation", "weight": 1.0, "year": 2020}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2020}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2020}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 7.0, "year": 2020}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 5.0, "year": 2020}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 6.0, "year": 2020}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 15.0, "year": 2020}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 14.0, "year": 2020}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 15.0, "year": 2020}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 18.0, "year": 2020}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2020}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2020}, {"source": "6", "target": "27", "source_name": "software engineer", "target_name": "social media", "weight": 5.0, "year": 2020}, {"source": "6", "target": "29", "source_name": "software engineer", "target_name": "cloud computing", "weight": 9.0, "year": 2020}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 6.0, "year": 2020}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 358.0, "year": 2020}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 10.0, "year": 2020}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 11.0, "year": 2020}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2020}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2020}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 24.0, "year": 2020}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 5.0, "year": 2020}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 7.0, "year": 2020}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 11.0, "year": 2020}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 10.0, "year": 2020}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 5.0, "year": 2020}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 12.0, "year": 2020}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 7.0, "year": 2020}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 20.0, "year": 2020}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 18.0, "year": 2020}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2020}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2020}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 15.0, "year": 2020}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 15.0, "year": 2020}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 4.0, "year": 2020}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 40.0, "year": 2020}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 33.0, "year": 2020}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2020}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 3.0, "year": 2020}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 12.0, "year": 2020}, {"source": "6", "target": "59", "source_name": "software engineer", "target_name": "bug reports", "weight": 4.0, "year": 2020}, {"source": "6", "target": "60", "source_name": "software engineer", "target_name": "collective intelligence", "weight": 2.0, "year": 2020}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2020}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2020}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2020}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2020}, {"source": "6", "target": "65", "source_name": "software engineer", "target_name": "web search", "weight": 1.0, "year": 2020}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 33.0, "year": 2020}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 7.0, "year": 2020}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2020}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 6.0, "year": 2020}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 6.0, "year": 2020}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 23.0, "year": 2020}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 19.0, "year": 2020}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2020}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 36.0, "year": 2020}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 7.0, "year": 2020}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 34.0, "year": 2020}, {"source": "6", "target": "77", "source_name": "software engineer", "target_name": "mechanical turk", "weight": 6.0, "year": 2020}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 18.0, "year": 2020}, {"source": "6", "target": "79", "source_name": "software engineer", "target_name": "data management", "weight": 1.0, "year": 2020}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 13.0, "year": 2020}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 9.0, "year": 2020}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 8.0, "year": 2020}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 23.0, "year": 2020}, {"source": "6", "target": "84", "source_name": "software engineer", "target_name": "human computation", "weight": 3.0, "year": 2020}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 12.0, "year": 2020}, {"source": "6", "target": "86", "source_name": "software engineer", "target_name": "systematic mapping", "weight": 4.0, "year": 2020}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2020}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2020}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 57.0, "year": 2020}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2020}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 11.0, "year": 2020}, {"source": "6", "target": "94", "source_name": "software engineer", "target_name": "cultural heritage", "weight": 1.0, "year": 2020}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 9.0, "year": 2020}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 15.0, "year": 2020}, {"source": "6", "target": "97", "source_name": "software engineer", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 15.0, "year": 2020}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 5.0, "year": 2020}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 13.0, "year": 2020}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 15.0, "year": 2020}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 29.0, "year": 2020}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 8.0, "year": 2020}, {"source": "7", "target": "8", "source_name": "quality control", "target_name": "amazon mechanical turk", "weight": 2.0, "year": 2020}, {"source": "7", "target": "9", "source_name": "quality control", "target_name": "data collection", "weight": 3.0, "year": 2020}, {"source": "7", "target": "10", "source_name": "quality control", "target_name": "requirements engineering", "weight": 1.0, "year": 2020}, {"source": "7", "target": "11", "source_name": "quality control", "target_name": "crowdsourced data", "weight": 3.0, "year": 2020}, {"source": "7", "target": "13", "source_name": "quality control", "target_name": "natural language processing", "weight": 2.0, "year": 2020}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2020}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2020}, {"source": "7", "target": "21", "source_name": "quality control", "target_name": "problem solving", "weight": 1.0, "year": 2020}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2020}, {"source": "7", "target": "26", "source_name": "quality control", "target_name": "business process", "weight": 2.0, "year": 2020}, {"source": "7", "target": "27", "source_name": "quality control", "target_name": "social media", "weight": 1.0, "year": 2020}, {"source": "7", "target": "29", "source_name": "quality control", "target_name": "cloud computing", "weight": 1.0, "year": 2020}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 4.0, "year": 2020}, {"source": "7", "target": "42", "source_name": "quality control", "target_name": "quality assurance", "weight": 1.0, "year": 2020}, {"source": "7", "target": "44", "source_name": "quality control", "target_name": "empirical study", "weight": 1.0, "year": 2020}, {"source": "7", "target": "45", "source_name": "quality control", "target_name": "spatial crowdsourcing", "weight": 5.0, "year": 2020}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2020}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2020}, {"source": "7", "target": "50", "source_name": "quality control", "target_name": "source code", "weight": 1.0, "year": 2020}, {"source": "7", "target": "51", "source_name": "quality control", "target_name": "agile software development", "weight": 1.0, "year": 2020}, {"source": "7", "target": "53", "source_name": "quality control", "target_name": "big data", "weight": 1.0, "year": 2020}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 4.0, "year": 2020}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 2.0, "year": 2020}, {"source": "7", "target": "59", "source_name": "quality control", "target_name": "bug reports", "weight": 1.0, "year": 2020}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2020}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "7", "target": "67", "source_name": "quality control", "target_name": "machine learning", "weight": 3.0, "year": 2020}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 2.0, "year": 2020}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 2.0, "year": 2020}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "7", "target": "75", "source_name": "quality control", "target_name": "systematic review", "weight": 2.0, "year": 2020}, {"source": "7", "target": "77", "source_name": "quality control", "target_name": "mechanical turk", "weight": 2.0, "year": 2020}, {"source": "7", "target": "79", "source_name": "quality control", "target_name": "data management", "weight": 1.0, "year": 2020}, {"source": "7", "target": "84", "source_name": "quality control", "target_name": "human computation", "weight": 3.0, "year": 2020}, {"source": "7", "target": "86", "source_name": "quality control", "target_name": "systematic mapping", "weight": 1.0, "year": 2020}, {"source": "7", "target": "90", "source_name": "quality control", "target_name": "incentive mechanism", "weight": 2.0, "year": 2020}, {"source": "7", "target": "93", "source_name": "quality control", "target_name": "literature review", "weight": 1.0, "year": 2020}, {"source": "7", "target": "97", "source_name": "quality control", "target_name": "task assignment", "weight": 3.0, "year": 2020}, {"source": "7", "target": "98", "source_name": "quality control", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "7", "target": "103", "source_name": "quality control", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "8", "target": "9", "source_name": "amazon mechanical turk", "target_name": "data collection", "weight": 4.0, "year": 2020}, {"source": "8", "target": "11", "source_name": "amazon mechanical turk", "target_name": "crowdsourced data", "weight": 1.0, "year": 2020}, {"source": "8", "target": "12", "source_name": "amazon mechanical turk", "target_name": "open innovation", "weight": 1.0, "year": 2020}, {"source": "8", "target": "15", "source_name": "amazon mechanical turk", "target_name": "decision support", "weight": 1.0, "year": 2020}, {"source": "8", "target": "26", "source_name": "amazon mechanical turk", "target_name": "business process", "weight": 5.0, "year": 2020}, {"source": "8", "target": "27", "source_name": "amazon mechanical turk", "target_name": "social media", "weight": 1.0, "year": 2020}, {"source": "8", "target": "31", "source_name": "amazon mechanical turk", "target_name": "software development", "weight": 5.0, "year": 2020}, {"source": "8", "target": "34", "source_name": "amazon mechanical turk", "target_name": "search engines", "weight": 2.0, "year": 2020}, {"source": "8", "target": "36", "source_name": "amazon mechanical turk", "target_name": "open source", "weight": 1.0, "year": 2020}, {"source": "8", "target": "42", "source_name": "amazon mechanical turk", "target_name": "quality assurance", "weight": 1.0, "year": 2020}, {"source": "8", "target": "45", "source_name": "amazon mechanical turk", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2020}, {"source": "8", "target": "54", "source_name": "amazon mechanical turk", "target_name": "software quality", "weight": 1.0, "year": 2020}, {"source": "8", "target": "58", "source_name": "amazon mechanical turk", "target_name": "user interface", "weight": 4.0, "year": 2020}, {"source": "8", "target": "60", "source_name": "amazon mechanical turk", "target_name": "collective intelligence", "weight": 1.0, "year": 2020}, {"source": "8", "target": "71", "source_name": "amazon mechanical turk", "target_name": "software testing", "weight": 1.0, "year": 2020}, {"source": "8", "target": "76", "source_name": "amazon mechanical turk", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "8", "target": "77", "source_name": "amazon mechanical turk", "target_name": "mechanical turk", "weight": 22.0, "year": 2020}, {"source": "8", "target": "79", "source_name": "amazon mechanical turk", "target_name": "data management", "weight": 1.0, "year": 2020}, {"source": "8", "target": "80", "source_name": "amazon mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "8", "target": "82", "source_name": "amazon mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2020}, {"source": "8", "target": "83", "source_name": "amazon mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "8", "target": "84", "source_name": "amazon mechanical turk", "target_name": "human computation", "weight": 2.0, "year": 2020}, {"source": "8", "target": "91", "source_name": "amazon mechanical turk", "target_name": "software design", "weight": 3.0, "year": 2020}, {"source": "8", "target": "93", "source_name": "amazon mechanical turk", "target_name": "literature review", "weight": 1.0, "year": 2020}, {"source": "8", "target": "96", "source_name": "amazon mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "8", "target": "97", "source_name": "amazon mechanical turk", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "9", "target": "11", "source_name": "data collection", "target_name": "crowdsourced data", "weight": 4.0, "year": 2020}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2020}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2020}, {"source": "9", "target": "26", "source_name": "data collection", "target_name": "business process", "weight": 1.0, "year": 2020}, {"source": "9", "target": "27", "source_name": "data collection", "target_name": "social media", "weight": 1.0, "year": 2020}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 1.0, "year": 2020}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2020}, {"source": "9", "target": "45", "source_name": "data collection", "target_name": "spatial crowdsourcing", "weight": 5.0, "year": 2020}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2020}, {"source": "9", "target": "58", "source_name": "data collection", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2020}, {"source": "9", "target": "75", "source_name": "data collection", "target_name": "systematic review", "weight": 2.0, "year": 2020}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "9", "target": "77", "source_name": "data collection", "target_name": "mechanical turk", "weight": 3.0, "year": 2020}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2020}, {"source": "9", "target": "80", "source_name": "data collection", "target_name": "information systems", "weight": 2.0, "year": 2020}, {"source": "9", "target": "83", "source_name": "data collection", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "9", "target": "84", "source_name": "data collection", "target_name": "human computation", "weight": 2.0, "year": 2020}, {"source": "9", "target": "88", "source_name": "data collection", "target_name": "organizational learning", "weight": 1.0, "year": 2020}, {"source": "9", "target": "90", "source_name": "data collection", "target_name": "incentive mechanism", "weight": 2.0, "year": 2020}, {"source": "9", "target": "94", "source_name": "data collection", "target_name": "cultural heritage", "weight": 1.0, "year": 2020}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "9", "target": "97", "source_name": "data collection", "target_name": "task assignment", "weight": 2.0, "year": 2020}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2020}, {"source": "10", "target": "20", "source_name": "requirements engineering", "target_name": "information technology", "weight": 1.0, "year": 2020}, {"source": "10", "target": "21", "source_name": "requirements engineering", "target_name": "problem solving", "weight": 1.0, "year": 2020}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2020}, {"source": "10", "target": "24", "source_name": "requirements engineering", "target_name": "requirements analysis", "weight": 1.0, "year": 2020}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2020}, {"source": "10", "target": "29", "source_name": "requirements engineering", "target_name": "cloud computing", "weight": 1.0, "year": 2020}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 19.0, "year": 2020}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2020}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2020}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 2.0, "year": 2020}, {"source": "10", "target": "37", "source_name": "requirements engineering", "target_name": "controlled experiments", "weight": 1.0, "year": 2020}, {"source": "10", "target": "38", "source_name": "requirements engineering", "target_name": "systematic literature review", "weight": 1.0, "year": 2020}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2020}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2020}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2020}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2020}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2020}, {"source": "10", "target": "53", "source_name": "requirements engineering", "target_name": "big data", "weight": 1.0, "year": 2020}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 3.0, "year": 2020}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 2.0, "year": 2020}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2020}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2020}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2020}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2020}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 3.0, "year": 2020}, {"source": "10", "target": "67", "source_name": "requirements engineering", "target_name": "machine learning", "weight": 2.0, "year": 2020}, {"source": "10", "target": "70", "source_name": "requirements engineering", "target_name": "decision making", "weight": 1.0, "year": 2020}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 2.0, "year": 2020}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2020}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 6.0, "year": 2020}, {"source": "10", "target": "75", "source_name": "requirements engineering", "target_name": "systematic review", "weight": 1.0, "year": 2020}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2020}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2020}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 3.0, "year": 2020}, {"source": "10", "target": "82", "source_name": "requirements engineering", "target_name": "social network", "weight": 2.0, "year": 2020}, {"source": "10", "target": "83", "source_name": "requirements engineering", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2020}, {"source": "10", "target": "86", "source_name": "requirements engineering", "target_name": "systematic mapping", "weight": 1.0, "year": 2020}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 6.0, "year": 2020}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2020}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 10.0, "year": 2020}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "10", "target": "101", "source_name": "requirements engineering", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "10", "target": "102", "source_name": "requirements engineering", "target_name": "product line", "weight": 2.0, "year": 2020}, {"source": "10", "target": "103", "source_name": "requirements engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "11", "target": "26", "source_name": "crowdsourced data", "target_name": "business process", "weight": 1.0, "year": 2020}, {"source": "11", "target": "27", "source_name": "crowdsourced data", "target_name": "social media", "weight": 2.0, "year": 2020}, {"source": "11", "target": "31", "source_name": "crowdsourced data", "target_name": "software development", "weight": 1.0, "year": 2020}, {"source": "11", "target": "34", "source_name": "crowdsourced data", "target_name": "search engines", "weight": 2.0, "year": 2020}, {"source": "11", "target": "36", "source_name": "crowdsourced data", "target_name": "open source", "weight": 1.0, "year": 2020}, {"source": "11", "target": "44", "source_name": "crowdsourced data", "target_name": "empirical study", "weight": 1.0, "year": 2020}, {"source": "11", "target": "45", "source_name": "crowdsourced data", "target_name": "spatial crowdsourcing", "weight": 3.0, "year": 2020}, {"source": "11", "target": "53", "source_name": "crowdsourced data", "target_name": "big data", "weight": 2.0, "year": 2020}, {"source": "11", "target": "57", "source_name": "crowdsourced data", "target_name": "human intelligence", "weight": 1.0, "year": 2020}, {"source": "11", "target": "67", "source_name": "crowdsourced data", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "11", "target": "75", "source_name": "crowdsourced data", "target_name": "systematic review", "weight": 1.0, "year": 2020}, {"source": "11", "target": "77", "source_name": "crowdsourced data", "target_name": "mechanical turk", "weight": 1.0, "year": 2020}, {"source": "11", "target": "79", "source_name": "crowdsourced data", "target_name": "data management", "weight": 3.0, "year": 2020}, {"source": "11", "target": "80", "source_name": "crowdsourced data", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "11", "target": "83", "source_name": "crowdsourced data", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "11", "target": "84", "source_name": "crowdsourced data", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "11", "target": "91", "source_name": "crowdsourced data", "target_name": "software design", "weight": 1.0, "year": 2020}, {"source": "11", "target": "96", "source_name": "crowdsourced data", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "11", "target": "98", "source_name": "crowdsourced data", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2020}, {"source": "12", "target": "21", "source_name": "open innovation", "target_name": "problem solving", "weight": 1.0, "year": 2020}, {"source": "12", "target": "26", "source_name": "open innovation", "target_name": "business process", "weight": 1.0, "year": 2020}, {"source": "12", "target": "31", "source_name": "open innovation", "target_name": "software development", "weight": 1.0, "year": 2020}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2020}, {"source": "12", "target": "42", "source_name": "open innovation", "target_name": "quality assurance", "weight": 1.0, "year": 2020}, {"source": "12", "target": "77", "source_name": "open innovation", "target_name": "mechanical turk", "weight": 1.0, "year": 2020}, {"source": "12", "target": "80", "source_name": "open innovation", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "12", "target": "90", "source_name": "open innovation", "target_name": "incentive mechanism", "weight": 1.0, "year": 2020}, {"source": "12", "target": "93", "source_name": "open innovation", "target_name": "literature review", "weight": 2.0, "year": 2020}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 4.0, "year": 2020}, {"source": "12", "target": "97", "source_name": "open innovation", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "13", "target": "27", "source_name": "natural language processing", "target_name": "social media", "weight": 1.0, "year": 2020}, {"source": "13", "target": "30", "source_name": "natural language processing", "target_name": "end users", "weight": 1.0, "year": 2020}, {"source": "13", "target": "31", "source_name": "natural language processing", "target_name": "software development", "weight": 1.0, "year": 2020}, {"source": "13", "target": "59", "source_name": "natural language processing", "target_name": "bug reports", "weight": 1.0, "year": 2020}, {"source": "13", "target": "67", "source_name": "natural language processing", "target_name": "machine learning", "weight": 7.0, "year": 2020}, {"source": "13", "target": "71", "source_name": "natural language processing", "target_name": "software testing", "weight": 2.0, "year": 2020}, {"source": "13", "target": "84", "source_name": "natural language processing", "target_name": "human computation", "weight": 2.0, "year": 2020}, {"source": "13", "target": "101", "source_name": "natural language processing", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 4.0, "year": 2020}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2020}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2020}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2020}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2020}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2020}, {"source": "14", "target": "61", "source_name": "object oriented", "target_name": "extreme programming", "weight": 1.0, "year": 2020}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2020}, {"source": "14", "target": "71", "source_name": "object oriented", "target_name": "software testing", "weight": 1.0, "year": 2020}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2020}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2020}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "15", "target": "26", "source_name": "decision support", "target_name": "business process", "weight": 2.0, "year": 2020}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2020}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2020}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2020}, {"source": "15", "target": "62", "source_name": "decision support", "target_name": "information processing", "weight": 1.0, "year": 2020}, {"source": "15", "target": "67", "source_name": "decision support", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "15", "target": "71", "source_name": "decision support", "target_name": "software testing", "weight": 1.0, "year": 2020}, {"source": "15", "target": "100", "source_name": "decision support", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "15", "target": "103", "source_name": "decision support", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "16", "target": "29", "source_name": "learning environment", "target_name": "cloud computing", "weight": 1.0, "year": 2020}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2020}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2020}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "17", "target": "20", "source_name": "conceptual framework", "target_name": "information technology", "weight": 1.0, "year": 2020}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2020}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 3.0, "year": 2020}, {"source": "17", "target": "33", "source_name": "conceptual framework", "target_name": "fundamental principles", "weight": 1.0, "year": 2020}, {"source": "17", "target": "38", "source_name": "conceptual framework", "target_name": "systematic literature review", "weight": 1.0, "year": 2020}, {"source": "17", "target": "46", "source_name": "conceptual framework", "target_name": "empirical studies", "weight": 1.0, "year": 2020}, {"source": "17", "target": "74", "source_name": "conceptual framework", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "17", "target": "75", "source_name": "conceptual framework", "target_name": "systematic review", "weight": 1.0, "year": 2020}, {"source": "17", "target": "80", "source_name": "conceptual framework", "target_name": "information systems", "weight": 2.0, "year": 2020}, {"source": "17", "target": "82", "source_name": "conceptual framework", "target_name": "social network", "weight": 1.0, "year": 2020}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2020}, {"source": "17", "target": "93", "source_name": "conceptual framework", "target_name": "literature review", "weight": 4.0, "year": 2020}, {"source": "17", "target": "103", "source_name": "conceptual framework", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2020}, {"source": "18", "target": "39", "source_name": "computational science", "target_name": "team members", "weight": 1.0, "year": 2020}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2020}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2020}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2020}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 4.0, "year": 2020}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2020}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2020}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2020}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2020}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2020}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2020}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2020}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2020}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2020}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2020}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2020}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2020}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2020}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2020}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "19", "target": "78", "source_name": "configuration management", "target_name": "process improvement", "weight": 1.0, "year": 2020}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2020}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2020}, {"source": "20", "target": "27", "source_name": "information technology", "target_name": "social media", "weight": 1.0, "year": 2020}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 7.0, "year": 2020}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 2.0, "year": 2020}, {"source": "20", "target": "37", "source_name": "information technology", "target_name": "controlled experiments", "weight": 1.0, "year": 2020}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2020}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2020}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 2.0, "year": 2020}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2020}, {"source": "20", "target": "57", "source_name": "information technology", "target_name": "human intelligence", "weight": 1.0, "year": 2020}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "20", "target": "60", "source_name": "information technology", "target_name": "collective intelligence", "weight": 1.0, "year": 2020}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2020}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2020}, {"source": "20", "target": "70", "source_name": "information technology", "target_name": "decision making", "weight": 1.0, "year": 2020}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2020}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2020}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 3.0, "year": 2020}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2020}, {"source": "20", "target": "93", "source_name": "information technology", "target_name": "literature review", "weight": 2.0, "year": 2020}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 2.0, "year": 2020}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2020}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2020}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 12.0, "year": 2020}, {"source": "21", "target": "34", "source_name": "problem solving", "target_name": "search engines", "weight": 1.0, "year": 2020}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 3.0, "year": 2020}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2020}, {"source": "21", "target": "39", "source_name": "problem solving", "target_name": "team members", "weight": 2.0, "year": 2020}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2020}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2020}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 2.0, "year": 2020}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2020}, {"source": "21", "target": "60", "source_name": "problem solving", "target_name": "collective intelligence", "weight": 1.0, "year": 2020}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 2.0, "year": 2020}, {"source": "21", "target": "69", "source_name": "problem solving", "target_name": "computational intelligence", "weight": 1.0, "year": 2020}, {"source": "21", "target": "71", "source_name": "problem solving", "target_name": "software testing", "weight": 2.0, "year": 2020}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2020}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2020}, {"source": "21", "target": "80", "source_name": "problem solving", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "21", "target": "82", "source_name": "problem solving", "target_name": "social network", "weight": 1.0, "year": 2020}, {"source": "21", "target": "84", "source_name": "problem solving", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 2.0, "year": 2020}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 3.0, "year": 2020}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "21", "target": "99", "source_name": "problem solving", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 10.0, "year": 2020}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2020}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2020}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2020}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2020}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 3.0, "year": 2020}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2020}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2020}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2020}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2020}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2020}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2020}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2020}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2020}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2020}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2020}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2020}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2020}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2020}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2020}, {"source": "24", "target": "53", "source_name": "requirements analysis", "target_name": "big data", "weight": 1.0, "year": 2020}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2020}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2020}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2020}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2020}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2020}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2020}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2020}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2020}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "25", "target": "31", "source_name": "motivational factors", "target_name": "software development", "weight": 1.0, "year": 2020}, {"source": "25", "target": "46", "source_name": "motivational factors", "target_name": "empirical studies", "weight": 1.0, "year": 2020}, {"source": "25", "target": "93", "source_name": "motivational factors", "target_name": "literature review", "weight": 2.0, "year": 2020}, {"source": "26", "target": "29", "source_name": "business process", "target_name": "cloud computing", "weight": 1.0, "year": 2020}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 3.0, "year": 2020}, {"source": "26", "target": "36", "source_name": "business process", "target_name": "open source", "weight": 1.0, "year": 2020}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2020}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 2.0, "year": 2020}, {"source": "26", "target": "58", "source_name": "business process", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "26", "target": "60", "source_name": "business process", "target_name": "collective intelligence", "weight": 4.0, "year": 2020}, {"source": "26", "target": "70", "source_name": "business process", "target_name": "decision making", "weight": 1.0, "year": 2020}, {"source": "26", "target": "71", "source_name": "business process", "target_name": "software testing", "weight": 3.0, "year": 2020}, {"source": "26", "target": "76", "source_name": "business process", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "26", "target": "77", "source_name": "business process", "target_name": "mechanical turk", "weight": 3.0, "year": 2020}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 2.0, "year": 2020}, {"source": "26", "target": "82", "source_name": "business process", "target_name": "social network", "weight": 1.0, "year": 2020}, {"source": "26", "target": "84", "source_name": "business process", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "26", "target": "91", "source_name": "business process", "target_name": "software design", "weight": 1.0, "year": 2020}, {"source": "26", "target": "93", "source_name": "business process", "target_name": "literature review", "weight": 3.0, "year": 2020}, {"source": "26", "target": "96", "source_name": "business process", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "26", "target": "103", "source_name": "business process", "target_name": "knowledge base", "weight": 2.0, "year": 2020}, {"source": "27", "target": "31", "source_name": "social media", "target_name": "software development", "weight": 5.0, "year": 2020}, {"source": "27", "target": "34", "source_name": "social media", "target_name": "search engines", "weight": 2.0, "year": 2020}, {"source": "27", "target": "36", "source_name": "social media", "target_name": "open source", "weight": 1.0, "year": 2020}, {"source": "27", "target": "38", "source_name": "social media", "target_name": "systematic literature review", "weight": 1.0, "year": 2020}, {"source": "27", "target": "40", "source_name": "social media", "target_name": "knowledge management", "weight": 1.0, "year": 2020}, {"source": "27", "target": "53", "source_name": "social media", "target_name": "big data", "weight": 2.0, "year": 2020}, {"source": "27", "target": "57", "source_name": "social media", "target_name": "human intelligence", "weight": 1.0, "year": 2020}, {"source": "27", "target": "58", "source_name": "social media", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "27", "target": "60", "source_name": "social media", "target_name": "collective intelligence", "weight": 2.0, "year": 2020}, {"source": "27", "target": "70", "source_name": "social media", "target_name": "decision making", "weight": 1.0, "year": 2020}, {"source": "27", "target": "74", "source_name": "social media", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "27", "target": "77", "source_name": "social media", "target_name": "mechanical turk", "weight": 3.0, "year": 2020}, {"source": "27", "target": "79", "source_name": "social media", "target_name": "data management", "weight": 1.0, "year": 2020}, {"source": "27", "target": "80", "source_name": "social media", "target_name": "information systems", "weight": 2.0, "year": 2020}, {"source": "27", "target": "82", "source_name": "social media", "target_name": "social network", "weight": 1.0, "year": 2020}, {"source": "27", "target": "83", "source_name": "social media", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "27", "target": "84", "source_name": "social media", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "27", "target": "90", "source_name": "social media", "target_name": "incentive mechanism", "weight": 1.0, "year": 2020}, {"source": "27", "target": "93", "source_name": "social media", "target_name": "literature review", "weight": 2.0, "year": 2020}, {"source": "27", "target": "96", "source_name": "social media", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "27", "target": "97", "source_name": "social media", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "27", "target": "98", "source_name": "social media", "target_name": "data mining", "weight": 2.0, "year": 2020}, {"source": "28", "target": "31", "source_name": "computing elements", "target_name": "software development", "weight": 2.0, "year": 2020}, {"source": "28", "target": "60", "source_name": "computing elements", "target_name": "collective intelligence", "weight": 2.0, "year": 2020}, {"source": "28", "target": "76", "source_name": "computing elements", "target_name": "life cycle", "weight": 2.0, "year": 2020}, {"source": "28", "target": "97", "source_name": "computing elements", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 5.0, "year": 2020}, {"source": "29", "target": "42", "source_name": "cloud computing", "target_name": "quality assurance", "weight": 1.0, "year": 2020}, {"source": "29", "target": "52", "source_name": "cloud computing", "target_name": "neural network", "weight": 1.0, "year": 2020}, {"source": "29", "target": "54", "source_name": "cloud computing", "target_name": "software quality", "weight": 1.0, "year": 2020}, {"source": "29", "target": "70", "source_name": "cloud computing", "target_name": "decision making", "weight": 1.0, "year": 2020}, {"source": "29", "target": "71", "source_name": "cloud computing", "target_name": "software testing", "weight": 2.0, "year": 2020}, {"source": "29", "target": "74", "source_name": "cloud computing", "target_name": "software architecture", "weight": 2.0, "year": 2020}, {"source": "29", "target": "79", "source_name": "cloud computing", "target_name": "data management", "weight": 1.0, "year": 2020}, {"source": "29", "target": "83", "source_name": "cloud computing", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "29", "target": "91", "source_name": "cloud computing", "target_name": "software design", "weight": 1.0, "year": 2020}, {"source": "29", "target": "98", "source_name": "cloud computing", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 3.0, "year": 2020}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "30", "target": "59", "source_name": "end users", "target_name": "bug reports", "weight": 1.0, "year": 2020}, {"source": "30", "target": "67", "source_name": "end users", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "30", "target": "96", "source_name": "end users", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "30", "target": "98", "source_name": "end users", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "30", "target": "99", "source_name": "end users", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2020}, {"source": "31", "target": "33", "source_name": "software development", "target_name": "fundamental principles", "weight": 3.0, "year": 2020}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2020}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2020}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 18.0, "year": 2020}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 3.0, "year": 2020}, {"source": "31", "target": "38", "source_name": "software development", "target_name": "systematic literature review", "weight": 2.0, "year": 2020}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 7.0, "year": 2020}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 3.0, "year": 2020}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2020}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 9.0, "year": 2020}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 9.0, "year": 2020}, {"source": "31", "target": "45", "source_name": "software development", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2020}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 3.0, "year": 2020}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 7.0, "year": 2020}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2020}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 6.0, "year": 2020}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 12.0, "year": 2020}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 3.0, "year": 2020}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 26.0, "year": 2020}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 7.0, "year": 2020}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2020}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 2.0, "year": 2020}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 8.0, "year": 2020}, {"source": "31", "target": "60", "source_name": "software development", "target_name": "collective intelligence", "weight": 5.0, "year": 2020}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 11.0, "year": 2020}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2020}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2020}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2020}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 18.0, "year": 2020}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 4.0, "year": 2020}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 1.0, "year": 2020}, {"source": "31", "target": "70", "source_name": "software development", "target_name": "decision making", "weight": 3.0, "year": 2020}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 10.0, "year": 2020}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 5.0, "year": 2020}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2020}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 17.0, "year": 2020}, {"source": "31", "target": "75", "source_name": "software development", "target_name": "systematic review", "weight": 3.0, "year": 2020}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 25.0, "year": 2020}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 8.0, "year": 2020}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2020}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2020}, {"source": "31", "target": "82", "source_name": "software development", "target_name": "social network", "weight": 2.0, "year": 2020}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 7.0, "year": 2020}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2020}, {"source": "31", "target": "86", "source_name": "software development", "target_name": "systematic mapping", "weight": 3.0, "year": 2020}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 25.0, "year": 2020}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2020}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 8.0, "year": 2020}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 5.0, "year": 2020}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 9.0, "year": 2020}, {"source": "31", "target": "97", "source_name": "software development", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 5.0, "year": 2020}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 4.0, "year": 2020}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 4.0, "year": 2020}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 9.0, "year": 2020}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 23.0, "year": 2020}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 5.0, "year": 2020}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2020}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2020}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2020}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2020}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2020}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2020}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2020}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2020}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2020}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2020}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "33", "target": "54", "source_name": "fundamental principles", "target_name": "software quality", "weight": 1.0, "year": 2020}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2020}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "33", "target": "74", "source_name": "fundamental principles", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "34", "target": "53", "source_name": "search engines", "target_name": "big data", "weight": 1.0, "year": 2020}, {"source": "34", "target": "57", "source_name": "search engines", "target_name": "human intelligence", "weight": 1.0, "year": 2020}, {"source": "34", "target": "65", "source_name": "search engines", "target_name": "web search", "weight": 4.0, "year": 2020}, {"source": "34", "target": "67", "source_name": "search engines", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "34", "target": "77", "source_name": "search engines", "target_name": "mechanical turk", "weight": 3.0, "year": 2020}, {"source": "34", "target": "82", "source_name": "search engines", "target_name": "social network", "weight": 1.0, "year": 2020}, {"source": "34", "target": "84", "source_name": "search engines", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "34", "target": "95", "source_name": "search engines", "target_name": "human factors", "weight": 2.0, "year": 2020}, {"source": "34", "target": "97", "source_name": "search engines", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "34", "target": "100", "source_name": "search engines", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2020}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 2.0, "year": 2020}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2020}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 2.0, "year": 2020}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 2.0, "year": 2020}, {"source": "36", "target": "57", "source_name": "open source", "target_name": "human intelligence", "weight": 1.0, "year": 2020}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "36", "target": "60", "source_name": "open source", "target_name": "collective intelligence", "weight": 2.0, "year": 2020}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2020}, {"source": "36", "target": "67", "source_name": "open source", "target_name": "machine learning", "weight": 3.0, "year": 2020}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2020}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2020}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 2.0, "year": 2020}, {"source": "36", "target": "77", "source_name": "open source", "target_name": "mechanical turk", "weight": 3.0, "year": 2020}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2020}, {"source": "36", "target": "82", "source_name": "open source", "target_name": "social network", "weight": 1.0, "year": 2020}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 5.0, "year": 2020}, {"source": "36", "target": "93", "source_name": "open source", "target_name": "literature review", "weight": 2.0, "year": 2020}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 21.0, "year": 2020}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 2.0, "year": 2020}, {"source": "36", "target": "100", "source_name": "open source", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "37", "target": "38", "source_name": "controlled experiments", "target_name": "systematic literature review", "weight": 1.0, "year": 2020}, {"source": "37", "target": "46", "source_name": "controlled experiments", "target_name": "empirical studies", "weight": 1.0, "year": 2020}, {"source": "37", "target": "57", "source_name": "controlled experiments", "target_name": "human intelligence", "weight": 1.0, "year": 2020}, {"source": "37", "target": "75", "source_name": "controlled experiments", "target_name": "systematic review", "weight": 1.0, "year": 2020}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2020}, {"source": "38", "target": "71", "source_name": "systematic literature review", "target_name": "software testing", "weight": 1.0, "year": 2020}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 3.0, "year": 2020}, {"source": "38", "target": "80", "source_name": "systematic literature review", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 11.0, "year": 2020}, {"source": "38", "target": "96", "source_name": "systematic literature review", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2020}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2020}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 4.0, "year": 2020}, {"source": "39", "target": "69", "source_name": "team members", "target_name": "computational intelligence", "weight": 1.0, "year": 2020}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2020}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "39", "target": "82", "source_name": "team members", "target_name": "social network", "weight": 1.0, "year": 2020}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2020}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2020}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2020}, {"source": "40", "target": "70", "source_name": "knowledge management", "target_name": "decision making", "weight": 1.0, "year": 2020}, {"source": "40", "target": "74", "source_name": "knowledge management", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2020}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "40", "target": "98", "source_name": "knowledge management", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2020}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2020}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2020}, {"source": "42", "target": "51", "source_name": "quality assurance", "target_name": "agile software development", "weight": 1.0, "year": 2020}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 6.0, "year": 2020}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2020}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2020}, {"source": "42", "target": "67", "source_name": "quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2020}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2020}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "42", "target": "76", "source_name": "quality assurance", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "42", "target": "77", "source_name": "quality assurance", "target_name": "mechanical turk", "weight": 2.0, "year": 2020}, {"source": "42", "target": "84", "source_name": "quality assurance", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2020}, {"source": "42", "target": "93", "source_name": "quality assurance", "target_name": "literature review", "weight": 1.0, "year": 2020}, {"source": "42", "target": "96", "source_name": "quality assurance", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2020}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 3.0, "year": 2020}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2020}, {"source": "44", "target": "54", "source_name": "empirical study", "target_name": "software quality", "weight": 1.0, "year": 2020}, {"source": "44", "target": "82", "source_name": "empirical study", "target_name": "social network", "weight": 1.0, "year": 2020}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 2.0, "year": 2020}, {"source": "44", "target": "93", "source_name": "empirical study", "target_name": "literature review", "weight": 1.0, "year": 2020}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "45", "target": "53", "source_name": "spatial crowdsourcing", "target_name": "big data", "weight": 1.0, "year": 2020}, {"source": "45", "target": "75", "source_name": "spatial crowdsourcing", "target_name": "systematic review", "weight": 1.0, "year": 2020}, {"source": "45", "target": "77", "source_name": "spatial crowdsourcing", "target_name": "mechanical turk", "weight": 1.0, "year": 2020}, {"source": "45", "target": "79", "source_name": "spatial crowdsourcing", "target_name": "data management", "weight": 1.0, "year": 2020}, {"source": "45", "target": "90", "source_name": "spatial crowdsourcing", "target_name": "incentive mechanism", "weight": 3.0, "year": 2020}, {"source": "45", "target": "97", "source_name": "spatial crowdsourcing", "target_name": "task assignment", "weight": 6.0, "year": 2020}, {"source": "46", "target": "47", "source_name": "empirical studies", "target_name": "software maintenance", "weight": 1.0, "year": 2020}, {"source": "46", "target": "50", "source_name": "empirical studies", "target_name": "source code", "weight": 2.0, "year": 2020}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2020}, {"source": "46", "target": "57", "source_name": "empirical studies", "target_name": "human intelligence", "weight": 1.0, "year": 2020}, {"source": "46", "target": "71", "source_name": "empirical studies", "target_name": "software testing", "weight": 1.0, "year": 2020}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2020}, {"source": "46", "target": "82", "source_name": "empirical studies", "target_name": "social network", "weight": 1.0, "year": 2020}, {"source": "46", "target": "84", "source_name": "empirical studies", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 3.0, "year": 2020}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2020}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 6.0, "year": 2020}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2020}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2020}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2020}, {"source": "47", "target": "59", "source_name": "software maintenance", "target_name": "bug reports", "weight": 4.0, "year": 2020}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2020}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2020}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "47", "target": "67", "source_name": "software maintenance", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 4.0, "year": 2020}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 8.0, "year": 2020}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2020}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2020}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2020}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 2.0, "year": 2020}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2020}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2020}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2020}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2020}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2020}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2020}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2020}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2020}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2020}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2020}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2020}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "50", "target": "59", "source_name": "source code", "target_name": "bug reports", "weight": 1.0, "year": 2020}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2020}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 2.0, "year": 2020}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 9.0, "year": 2020}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 4.0, "year": 2020}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 2.0, "year": 2020}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "50", "target": "101", "source_name": "source code", "target_name": "software reuse", "weight": 2.0, "year": 2020}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2020}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "51", "target": "67", "source_name": "agile software development", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "51", "target": "74", "source_name": "agile software development", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 4.0, "year": 2020}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2020}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "51", "target": "86", "source_name": "agile software development", "target_name": "systematic mapping", "weight": 1.0, "year": 2020}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2020}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "51", "target": "96", "source_name": "agile software development", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "52", "target": "54", "source_name": "neural network", "target_name": "software quality", "weight": 1.0, "year": 2020}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2020}, {"source": "52", "target": "79", "source_name": "neural network", "target_name": "data management", "weight": 1.0, "year": 2020}, {"source": "52", "target": "98", "source_name": "neural network", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "53", "target": "60", "source_name": "big data", "target_name": "collective intelligence", "weight": 1.0, "year": 2020}, {"source": "53", "target": "77", "source_name": "big data", "target_name": "mechanical turk", "weight": 1.0, "year": 2020}, {"source": "53", "target": "79", "source_name": "big data", "target_name": "data management", "weight": 1.0, "year": 2020}, {"source": "53", "target": "84", "source_name": "big data", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "53", "target": "90", "source_name": "big data", "target_name": "incentive mechanism", "weight": 1.0, "year": 2020}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2020}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2020}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2020}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2020}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2020}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2020}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2020}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2020}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2020}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 3.0, "year": 2020}, {"source": "54", "target": "77", "source_name": "software quality", "target_name": "mechanical turk", "weight": 1.0, "year": 2020}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 3.0, "year": 2020}, {"source": "54", "target": "79", "source_name": "software quality", "target_name": "data management", "weight": 1.0, "year": 2020}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2020}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 4.0, "year": 2020}, {"source": "54", "target": "86", "source_name": "software quality", "target_name": "systematic mapping", "weight": 1.0, "year": 2020}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 4.0, "year": 2020}, {"source": "54", "target": "95", "source_name": "software quality", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 2.0, "year": 2020}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2020}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2020}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2020}, {"source": "55", "target": "67", "source_name": "systems engineering", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2020}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2020}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "55", "target": "82", "source_name": "systems engineering", "target_name": "social network", "weight": 1.0, "year": 2020}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2020}, {"source": "55", "target": "85", "source_name": "systems engineering", "target_name": "degree programs", "weight": 2.0, "year": 2020}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2020}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2020}, {"source": "55", "target": "102", "source_name": "systems engineering", "target_name": "product line", "weight": 1.0, "year": 2020}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2020}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2020}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2020}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2020}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2020}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2020}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2020}, {"source": "57", "target": "60", "source_name": "human intelligence", "target_name": "collective intelligence", "weight": 3.0, "year": 2020}, {"source": "57", "target": "67", "source_name": "human intelligence", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2020}, {"source": "57", "target": "75", "source_name": "human intelligence", "target_name": "systematic review", "weight": 1.0, "year": 2020}, {"source": "57", "target": "77", "source_name": "human intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2020}, {"source": "57", "target": "84", "source_name": "human intelligence", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "57", "target": "96", "source_name": "human intelligence", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 2.0, "year": 2020}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2020}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2020}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2020}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2020}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2020}, {"source": "58", "target": "77", "source_name": "user interface", "target_name": "mechanical turk", "weight": 3.0, "year": 2020}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "58", "target": "84", "source_name": "user interface", "target_name": "human computation", "weight": 2.0, "year": 2020}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 4.0, "year": 2020}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2020}, {"source": "59", "target": "67", "source_name": "bug reports", "target_name": "machine learning", "weight": 3.0, "year": 2020}, {"source": "59", "target": "71", "source_name": "bug reports", "target_name": "software testing", "weight": 2.0, "year": 2020}, {"source": "60", "target": "71", "source_name": "collective intelligence", "target_name": "software testing", "weight": 4.0, "year": 2020}, {"source": "60", "target": "76", "source_name": "collective intelligence", "target_name": "life cycle", "weight": 2.0, "year": 2020}, {"source": "60", "target": "77", "source_name": "collective intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2020}, {"source": "60", "target": "79", "source_name": "collective intelligence", "target_name": "data management", "weight": 1.0, "year": 2020}, {"source": "60", "target": "84", "source_name": "collective intelligence", "target_name": "human computation", "weight": 2.0, "year": 2020}, {"source": "60", "target": "93", "source_name": "collective intelligence", "target_name": "literature review", "weight": 3.0, "year": 2020}, {"source": "60", "target": "96", "source_name": "collective intelligence", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "60", "target": "97", "source_name": "collective intelligence", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "60", "target": "103", "source_name": "collective intelligence", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2020}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 3.0, "year": 2020}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2020}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2020}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2020}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2020}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "62", "target": "67", "source_name": "information processing", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2020}, {"source": "62", "target": "100", "source_name": "information processing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2020}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2020}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2020}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2020}, {"source": "65", "target": "67", "source_name": "web search", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2020}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 2.0, "year": 2020}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 4.0, "year": 2020}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 3.0, "year": 2020}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2020}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2020}, {"source": "66", "target": "80", "source_name": "project management", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "66", "target": "82", "source_name": "project management", "target_name": "social network", "weight": 1.0, "year": 2020}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "66", "target": "86", "source_name": "project management", "target_name": "systematic mapping", "weight": 1.0, "year": 2020}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2020}, {"source": "66", "target": "93", "source_name": "project management", "target_name": "literature review", "weight": 1.0, "year": 2020}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2020}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "66", "target": "101", "source_name": "project management", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 2.0, "year": 2020}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 3.0, "year": 2020}, {"source": "67", "target": "75", "source_name": "machine learning", "target_name": "systematic review", "weight": 1.0, "year": 2020}, {"source": "67", "target": "76", "source_name": "machine learning", "target_name": "life cycle", "weight": 2.0, "year": 2020}, {"source": "67", "target": "79", "source_name": "machine learning", "target_name": "data management", "weight": 1.0, "year": 2020}, {"source": "67", "target": "82", "source_name": "machine learning", "target_name": "social network", "weight": 2.0, "year": 2020}, {"source": "67", "target": "84", "source_name": "machine learning", "target_name": "human computation", "weight": 4.0, "year": 2020}, {"source": "67", "target": "86", "source_name": "machine learning", "target_name": "systematic mapping", "weight": 1.0, "year": 2020}, {"source": "67", "target": "96", "source_name": "machine learning", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 2.0, "year": 2020}, {"source": "67", "target": "99", "source_name": "machine learning", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 5.0, "year": 2020}, {"source": "67", "target": "103", "source_name": "machine learning", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "68", "target": "84", "source_name": "service oriented", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2020}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2020}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2020}, {"source": "70", "target": "74", "source_name": "decision making", "target_name": "software architecture", "weight": 1.0, "year": 2020}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2020}, {"source": "70", "target": "96", "source_name": "decision making", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "70", "target": "98", "source_name": "decision making", "target_name": "data mining", "weight": 2.0, "year": 2020}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2020}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 3.0, "year": 2020}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2020}, {"source": "71", "target": "78", "source_name": "software testing", "target_name": "process improvement", "weight": 1.0, "year": 2020}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2020}, {"source": "71", "target": "93", "source_name": "software testing", "target_name": "literature review", "weight": 2.0, "year": 2020}, {"source": "71", "target": "96", "source_name": "software testing", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2020}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 2.0, "year": 2020}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2020}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2020}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2020}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2020}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2020}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2020}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 2.0, "year": 2020}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 2.0, "year": 2020}, {"source": "74", "target": "83", "source_name": "software architecture", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 6.0, "year": 2020}, {"source": "74", "target": "93", "source_name": "software architecture", "target_name": "literature review", "weight": 1.0, "year": 2020}, {"source": "74", "target": "98", "source_name": "software architecture", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 4.0, "year": 2020}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2020}, {"source": "75", "target": "86", "source_name": "systematic review", "target_name": "systematic mapping", "weight": 1.0, "year": 2020}, {"source": "75", "target": "90", "source_name": "systematic review", "target_name": "incentive mechanism", "weight": 1.0, "year": 2020}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 3.0, "year": 2020}, {"source": "75", "target": "96", "source_name": "systematic review", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "75", "target": "97", "source_name": "systematic review", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "75", "target": "103", "source_name": "systematic review", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 2.0, "year": 2020}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2020}, {"source": "76", "target": "86", "source_name": "life cycle", "target_name": "systematic mapping", "weight": 1.0, "year": 2020}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 4.0, "year": 2020}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "76", "target": "96", "source_name": "life cycle", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2020}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2020}, {"source": "77", "target": "79", "source_name": "mechanical turk", "target_name": "data management", "weight": 3.0, "year": 2020}, {"source": "77", "target": "80", "source_name": "mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "77", "target": "82", "source_name": "mechanical turk", "target_name": "social network", "weight": 2.0, "year": 2020}, {"source": "77", "target": "83", "source_name": "mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "77", "target": "84", "source_name": "mechanical turk", "target_name": "human computation", "weight": 5.0, "year": 2020}, {"source": "77", "target": "91", "source_name": "mechanical turk", "target_name": "software design", "weight": 3.0, "year": 2020}, {"source": "77", "target": "93", "source_name": "mechanical turk", "target_name": "literature review", "weight": 1.0, "year": 2020}, {"source": "77", "target": "95", "source_name": "mechanical turk", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "77", "target": "96", "source_name": "mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "77", "target": "97", "source_name": "mechanical turk", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2020}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2020}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "79", "target": "84", "source_name": "data management", "target_name": "human computation", "weight": 2.0, "year": 2020}, {"source": "79", "target": "97", "source_name": "data management", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "79", "target": "98", "source_name": "data management", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "79", "target": "103", "source_name": "data management", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "80", "target": "83", "source_name": "information systems", "target_name": "lessons learned", "weight": 1.0, "year": 2020}, {"source": "80", "target": "84", "source_name": "information systems", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "80", "target": "90", "source_name": "information systems", "target_name": "incentive mechanism", "weight": 1.0, "year": 2020}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2020}, {"source": "80", "target": "93", "source_name": "information systems", "target_name": "literature review", "weight": 4.0, "year": 2020}, {"source": "80", "target": "96", "source_name": "information systems", "target_name": "open source software", "weight": 1.0, "year": 2020}, {"source": "80", "target": "97", "source_name": "information systems", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "80", "target": "99", "source_name": "information systems", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "82", "target": "84", "source_name": "social network", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "82", "target": "90", "source_name": "social network", "target_name": "incentive mechanism", "weight": 3.0, "year": 2020}, {"source": "82", "target": "98", "source_name": "social network", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "82", "target": "99", "source_name": "social network", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "83", "target": "84", "source_name": "lessons learned", "target_name": "human computation", "weight": 1.0, "year": 2020}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2020}, {"source": "84", "target": "100", "source_name": "human computation", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "90", "target": "93", "source_name": "incentive mechanism", "target_name": "literature review", "weight": 1.0, "year": 2020}, {"source": "90", "target": "97", "source_name": "incentive mechanism", "target_name": "task assignment", "weight": 5.0, "year": 2020}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2020}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 2.0, "year": 2020}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2020}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2020}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2020}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2020}, {"source": "93", "target": "96", "source_name": "literature review", "target_name": "open source software", "weight": 2.0, "year": 2020}, {"source": "93", "target": "97", "source_name": "literature review", "target_name": "task assignment", "weight": 1.0, "year": 2020}, {"source": "93", "target": "103", "source_name": "literature review", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2020}, {"source": "98", "target": "99", "source_name": "data mining", "target_name": "requirements elicitation", "weight": 1.0, "year": 2020}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2020}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2020}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2020}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2020}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2020}]}, {"2021": [{"source": "0", "target": "6", "source_name": "intellectual property", "target_name": "software engineer", "weight": 5.0, "year": 2021}, {"source": "0", "target": "27", "source_name": "intellectual property", "target_name": "social media", "weight": 1.0, "year": 2021}, {"source": "0", "target": "29", "source_name": "intellectual property", "target_name": "cloud computing", "weight": 1.0, "year": 2021}, {"source": "0", "target": "31", "source_name": "intellectual property", "target_name": "software development", "weight": 3.0, "year": 2021}, {"source": "0", "target": "36", "source_name": "intellectual property", "target_name": "open source", "weight": 1.0, "year": 2021}, {"source": "0", "target": "47", "source_name": "intellectual property", "target_name": "software maintenance", "weight": 1.0, "year": 2021}, {"source": "0", "target": "50", "source_name": "intellectual property", "target_name": "source code", "weight": 1.0, "year": 2021}, {"source": "0", "target": "70", "source_name": "intellectual property", "target_name": "decision making", "weight": 1.0, "year": 2021}, {"source": "0", "target": "72", "source_name": "intellectual property", "target_name": "reverse engineering", "weight": 3.0, "year": 2021}, {"source": "0", "target": "96", "source_name": "intellectual property", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "0", "target": "101", "source_name": "intellectual property", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "1", "target": "4", "source_name": "natural language", "target_name": "test report", "weight": 2.0, "year": 2021}, {"source": "1", "target": "6", "source_name": "natural language", "target_name": "software engineer", "weight": 1.0, "year": 2021}, {"source": "1", "target": "7", "source_name": "natural language", "target_name": "quality control", "weight": 1.0, "year": 2021}, {"source": "1", "target": "13", "source_name": "natural language", "target_name": "natural language processing", "weight": 4.0, "year": 2021}, {"source": "1", "target": "27", "source_name": "natural language", "target_name": "social media", "weight": 1.0, "year": 2021}, {"source": "1", "target": "30", "source_name": "natural language", "target_name": "end users", "weight": 1.0, "year": 2021}, {"source": "1", "target": "33", "source_name": "natural language", "target_name": "fundamental principles", "weight": 1.0, "year": 2021}, {"source": "1", "target": "34", "source_name": "natural language", "target_name": "search engines", "weight": 2.0, "year": 2021}, {"source": "1", "target": "44", "source_name": "natural language", "target_name": "empirical study", "weight": 1.0, "year": 2021}, {"source": "1", "target": "45", "source_name": "natural language", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2021}, {"source": "1", "target": "57", "source_name": "natural language", "target_name": "human intelligence", "weight": 1.0, "year": 2021}, {"source": "1", "target": "59", "source_name": "natural language", "target_name": "bug reports", "weight": 1.0, "year": 2021}, {"source": "1", "target": "67", "source_name": "natural language", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "1", "target": "71", "source_name": "natural language", "target_name": "software testing", "weight": 1.0, "year": 2021}, {"source": "1", "target": "97", "source_name": "natural language", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "1", "target": "100", "source_name": "natural language", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "2", "target": "6", "source_name": "business model", "target_name": "software engineer", "weight": 9.0, "year": 2021}, {"source": "2", "target": "7", "source_name": "business model", "target_name": "quality control", "weight": 2.0, "year": 2021}, {"source": "2", "target": "9", "source_name": "business model", "target_name": "data collection", "weight": 2.0, "year": 2021}, {"source": "2", "target": "10", "source_name": "business model", "target_name": "requirements engineering", "weight": 1.0, "year": 2021}, {"source": "2", "target": "12", "source_name": "business model", "target_name": "open innovation", "weight": 4.0, "year": 2021}, {"source": "2", "target": "20", "source_name": "business model", "target_name": "information technology", "weight": 1.0, "year": 2021}, {"source": "2", "target": "21", "source_name": "business model", "target_name": "problem solving", "weight": 3.0, "year": 2021}, {"source": "2", "target": "22", "source_name": "business model", "target_name": "capability maturity model", "weight": 1.0, "year": 2021}, {"source": "2", "target": "26", "source_name": "business model", "target_name": "business process", "weight": 4.0, "year": 2021}, {"source": "2", "target": "27", "source_name": "business model", "target_name": "social media", "weight": 1.0, "year": 2021}, {"source": "2", "target": "29", "source_name": "business model", "target_name": "cloud computing", "weight": 1.0, "year": 2021}, {"source": "2", "target": "31", "source_name": "business model", "target_name": "software development", "weight": 6.0, "year": 2021}, {"source": "2", "target": "36", "source_name": "business model", "target_name": "open source", "weight": 2.0, "year": 2021}, {"source": "2", "target": "38", "source_name": "business model", "target_name": "systematic literature review", "weight": 1.0, "year": 2021}, {"source": "2", "target": "51", "source_name": "business model", "target_name": "agile software development", "weight": 1.0, "year": 2021}, {"source": "2", "target": "53", "source_name": "business model", "target_name": "big data", "weight": 1.0, "year": 2021}, {"source": "2", "target": "58", "source_name": "business model", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "2", "target": "60", "source_name": "business model", "target_name": "collective intelligence", "weight": 4.0, "year": 2021}, {"source": "2", "target": "66", "source_name": "business model", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "2", "target": "71", "source_name": "business model", "target_name": "software testing", "weight": 4.0, "year": 2021}, {"source": "2", "target": "76", "source_name": "business model", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "2", "target": "78", "source_name": "business model", "target_name": "process improvement", "weight": 1.0, "year": 2021}, {"source": "2", "target": "80", "source_name": "business model", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "2", "target": "93", "source_name": "business model", "target_name": "literature review", "weight": 1.0, "year": 2021}, {"source": "2", "target": "95", "source_name": "business model", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "3", "target": "6", "source_name": "design patterns", "target_name": "software engineer", "weight": 6.0, "year": 2021}, {"source": "3", "target": "19", "source_name": "design patterns", "target_name": "configuration management", "weight": 1.0, "year": 2021}, {"source": "3", "target": "22", "source_name": "design patterns", "target_name": "capability maturity model", "weight": 1.0, "year": 2021}, {"source": "3", "target": "24", "source_name": "design patterns", "target_name": "requirements analysis", "weight": 1.0, "year": 2021}, {"source": "3", "target": "27", "source_name": "design patterns", "target_name": "social media", "weight": 1.0, "year": 2021}, {"source": "3", "target": "31", "source_name": "design patterns", "target_name": "software development", "weight": 2.0, "year": 2021}, {"source": "3", "target": "36", "source_name": "design patterns", "target_name": "open source", "weight": 1.0, "year": 2021}, {"source": "3", "target": "42", "source_name": "design patterns", "target_name": "quality assurance", "weight": 1.0, "year": 2021}, {"source": "3", "target": "47", "source_name": "design patterns", "target_name": "software maintenance", "weight": 1.0, "year": 2021}, {"source": "3", "target": "50", "source_name": "design patterns", "target_name": "source code", "weight": 1.0, "year": 2021}, {"source": "3", "target": "54", "source_name": "design patterns", "target_name": "software quality", "weight": 1.0, "year": 2021}, {"source": "3", "target": "56", "source_name": "design patterns", "target_name": "formal methods", "weight": 2.0, "year": 2021}, {"source": "3", "target": "57", "source_name": "design patterns", "target_name": "human intelligence", "weight": 1.0, "year": 2021}, {"source": "3", "target": "58", "source_name": "design patterns", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "3", "target": "61", "source_name": "design patterns", "target_name": "extreme programming", "weight": 1.0, "year": 2021}, {"source": "3", "target": "63", "source_name": "design patterns", "target_name": "petri nets", "weight": 1.0, "year": 2021}, {"source": "3", "target": "66", "source_name": "design patterns", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "3", "target": "71", "source_name": "design patterns", "target_name": "software testing", "weight": 3.0, "year": 2021}, {"source": "3", "target": "74", "source_name": "design patterns", "target_name": "software architecture", "weight": 3.0, "year": 2021}, {"source": "3", "target": "91", "source_name": "design patterns", "target_name": "software design", "weight": 4.0, "year": 2021}, {"source": "3", "target": "99", "source_name": "design patterns", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "3", "target": "101", "source_name": "design patterns", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "3", "target": "102", "source_name": "design patterns", "target_name": "product line", "weight": 1.0, "year": 2021}, {"source": "4", "target": "6", "source_name": "test report", "target_name": "software engineer", "weight": 1.0, "year": 2021}, {"source": "4", "target": "13", "source_name": "test report", "target_name": "natural language processing", "weight": 2.0, "year": 2021}, {"source": "4", "target": "42", "source_name": "test report", "target_name": "quality assurance", "weight": 1.0, "year": 2021}, {"source": "4", "target": "44", "source_name": "test report", "target_name": "empirical study", "weight": 1.0, "year": 2021}, {"source": "4", "target": "47", "source_name": "test report", "target_name": "software maintenance", "weight": 1.0, "year": 2021}, {"source": "4", "target": "59", "source_name": "test report", "target_name": "bug reports", "weight": 1.0, "year": 2021}, {"source": "4", "target": "60", "source_name": "test report", "target_name": "collective intelligence", "weight": 1.0, "year": 2021}, {"source": "4", "target": "67", "source_name": "test report", "target_name": "machine learning", "weight": 2.0, "year": 2021}, {"source": "4", "target": "71", "source_name": "test report", "target_name": "software testing", "weight": 7.0, "year": 2021}, {"source": "5", "target": "6", "source_name": "software quality assurance", "target_name": "software engineer", "weight": 10.0, "year": 2021}, {"source": "5", "target": "10", "source_name": "software quality assurance", "target_name": "requirements engineering", "weight": 1.0, "year": 2021}, {"source": "5", "target": "16", "source_name": "software quality assurance", "target_name": "learning environment", "weight": 1.0, "year": 2021}, {"source": "5", "target": "19", "source_name": "software quality assurance", "target_name": "configuration management", "weight": 2.0, "year": 2021}, {"source": "5", "target": "24", "source_name": "software quality assurance", "target_name": "requirements analysis", "weight": 1.0, "year": 2021}, {"source": "5", "target": "31", "source_name": "software quality assurance", "target_name": "software development", "weight": 6.0, "year": 2021}, {"source": "5", "target": "32", "source_name": "software quality assurance", "target_name": "programming languages", "weight": 1.0, "year": 2021}, {"source": "5", "target": "36", "source_name": "software quality assurance", "target_name": "open source", "weight": 1.0, "year": 2021}, {"source": "5", "target": "40", "source_name": "software quality assurance", "target_name": "knowledge management", "weight": 1.0, "year": 2021}, {"source": "5", "target": "42", "source_name": "software quality assurance", "target_name": "quality assurance", "weight": 4.0, "year": 2021}, {"source": "5", "target": "49", "source_name": "software quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2021}, {"source": "5", "target": "54", "source_name": "software quality assurance", "target_name": "software quality", "weight": 5.0, "year": 2021}, {"source": "5", "target": "56", "source_name": "software quality assurance", "target_name": "formal methods", "weight": 1.0, "year": 2021}, {"source": "5", "target": "66", "source_name": "software quality assurance", "target_name": "project management", "weight": 3.0, "year": 2021}, {"source": "5", "target": "67", "source_name": "software quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "5", "target": "69", "source_name": "software quality assurance", "target_name": "computational intelligence", "weight": 1.0, "year": 2021}, {"source": "5", "target": "71", "source_name": "software quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2021}, {"source": "5", "target": "76", "source_name": "software quality assurance", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "5", "target": "78", "source_name": "software quality assurance", "target_name": "process improvement", "weight": 2.0, "year": 2021}, {"source": "5", "target": "83", "source_name": "software quality assurance", "target_name": "lessons learned", "weight": 3.0, "year": 2021}, {"source": "5", "target": "91", "source_name": "software quality assurance", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "5", "target": "98", "source_name": "software quality assurance", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "5", "target": "99", "source_name": "software quality assurance", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "5", "target": "100", "source_name": "software quality assurance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "6", "target": "7", "source_name": "software engineer", "target_name": "quality control", "weight": 10.0, "year": 2021}, {"source": "6", "target": "8", "source_name": "software engineer", "target_name": "amazon mechanical turk", "weight": 8.0, "year": 2021}, {"source": "6", "target": "9", "source_name": "software engineer", "target_name": "data collection", "weight": 5.0, "year": 2021}, {"source": "6", "target": "10", "source_name": "software engineer", "target_name": "requirements engineering", "weight": 27.0, "year": 2021}, {"source": "6", "target": "11", "source_name": "software engineer", "target_name": "crowdsourced data", "weight": 1.0, "year": 2021}, {"source": "6", "target": "12", "source_name": "software engineer", "target_name": "open innovation", "weight": 1.0, "year": 2021}, {"source": "6", "target": "14", "source_name": "software engineer", "target_name": "object oriented", "weight": 9.0, "year": 2021}, {"source": "6", "target": "15", "source_name": "software engineer", "target_name": "decision support", "weight": 1.0, "year": 2021}, {"source": "6", "target": "16", "source_name": "software engineer", "target_name": "learning environment", "weight": 7.0, "year": 2021}, {"source": "6", "target": "17", "source_name": "software engineer", "target_name": "conceptual framework", "weight": 5.0, "year": 2021}, {"source": "6", "target": "18", "source_name": "software engineer", "target_name": "computational science", "weight": 6.0, "year": 2021}, {"source": "6", "target": "19", "source_name": "software engineer", "target_name": "configuration management", "weight": 15.0, "year": 2021}, {"source": "6", "target": "20", "source_name": "software engineer", "target_name": "information technology", "weight": 14.0, "year": 2021}, {"source": "6", "target": "21", "source_name": "software engineer", "target_name": "problem solving", "weight": 15.0, "year": 2021}, {"source": "6", "target": "22", "source_name": "software engineer", "target_name": "capability maturity model", "weight": 18.0, "year": 2021}, {"source": "6", "target": "24", "source_name": "software engineer", "target_name": "requirements analysis", "weight": 12.0, "year": 2021}, {"source": "6", "target": "26", "source_name": "software engineer", "target_name": "business process", "weight": 3.0, "year": 2021}, {"source": "6", "target": "27", "source_name": "software engineer", "target_name": "social media", "weight": 5.0, "year": 2021}, {"source": "6", "target": "29", "source_name": "software engineer", "target_name": "cloud computing", "weight": 10.0, "year": 2021}, {"source": "6", "target": "30", "source_name": "software engineer", "target_name": "end users", "weight": 6.0, "year": 2021}, {"source": "6", "target": "31", "source_name": "software engineer", "target_name": "software development", "weight": 368.0, "year": 2021}, {"source": "6", "target": "32", "source_name": "software engineer", "target_name": "programming languages", "weight": 10.0, "year": 2021}, {"source": "6", "target": "33", "source_name": "software engineer", "target_name": "fundamental principles", "weight": 11.0, "year": 2021}, {"source": "6", "target": "34", "source_name": "software engineer", "target_name": "search engines", "weight": 1.0, "year": 2021}, {"source": "6", "target": "35", "source_name": "software engineer", "target_name": "multi agent", "weight": 1.0, "year": 2021}, {"source": "6", "target": "36", "source_name": "software engineer", "target_name": "open source", "weight": 24.0, "year": 2021}, {"source": "6", "target": "37", "source_name": "software engineer", "target_name": "controlled experiments", "weight": 5.0, "year": 2021}, {"source": "6", "target": "38", "source_name": "software engineer", "target_name": "systematic literature review", "weight": 10.0, "year": 2021}, {"source": "6", "target": "39", "source_name": "software engineer", "target_name": "team members", "weight": 11.0, "year": 2021}, {"source": "6", "target": "40", "source_name": "software engineer", "target_name": "knowledge management", "weight": 11.0, "year": 2021}, {"source": "6", "target": "41", "source_name": "software engineer", "target_name": "technology transfer", "weight": 5.0, "year": 2021}, {"source": "6", "target": "42", "source_name": "software engineer", "target_name": "quality assurance", "weight": 13.0, "year": 2021}, {"source": "6", "target": "44", "source_name": "software engineer", "target_name": "empirical study", "weight": 7.0, "year": 2021}, {"source": "6", "target": "46", "source_name": "software engineer", "target_name": "empirical studies", "weight": 21.0, "year": 2021}, {"source": "6", "target": "47", "source_name": "software engineer", "target_name": "software maintenance", "weight": 19.0, "year": 2021}, {"source": "6", "target": "48", "source_name": "software engineer", "target_name": "chemical engineering", "weight": 1.0, "year": 2021}, {"source": "6", "target": "49", "source_name": "software engineer", "target_name": "cost estimation", "weight": 13.0, "year": 2021}, {"source": "6", "target": "50", "source_name": "software engineer", "target_name": "source code", "weight": 16.0, "year": 2021}, {"source": "6", "target": "51", "source_name": "software engineer", "target_name": "agile software development", "weight": 15.0, "year": 2021}, {"source": "6", "target": "52", "source_name": "software engineer", "target_name": "neural network", "weight": 4.0, "year": 2021}, {"source": "6", "target": "54", "source_name": "software engineer", "target_name": "software quality", "weight": 41.0, "year": 2021}, {"source": "6", "target": "55", "source_name": "software engineer", "target_name": "systems engineering", "weight": 33.0, "year": 2021}, {"source": "6", "target": "56", "source_name": "software engineer", "target_name": "formal methods", "weight": 13.0, "year": 2021}, {"source": "6", "target": "57", "source_name": "software engineer", "target_name": "human intelligence", "weight": 3.0, "year": 2021}, {"source": "6", "target": "58", "source_name": "software engineer", "target_name": "user interface", "weight": 12.0, "year": 2021}, {"source": "6", "target": "59", "source_name": "software engineer", "target_name": "bug reports", "weight": 4.0, "year": 2021}, {"source": "6", "target": "60", "source_name": "software engineer", "target_name": "collective intelligence", "weight": 2.0, "year": 2021}, {"source": "6", "target": "61", "source_name": "software engineer", "target_name": "extreme programming", "weight": 14.0, "year": 2021}, {"source": "6", "target": "62", "source_name": "software engineer", "target_name": "information processing", "weight": 6.0, "year": 2021}, {"source": "6", "target": "63", "source_name": "software engineer", "target_name": "petri nets", "weight": 4.0, "year": 2021}, {"source": "6", "target": "64", "source_name": "software engineer", "target_name": "undergraduate degree", "weight": 10.0, "year": 2021}, {"source": "6", "target": "65", "source_name": "software engineer", "target_name": "web search", "weight": 1.0, "year": 2021}, {"source": "6", "target": "66", "source_name": "software engineer", "target_name": "project management", "weight": 33.0, "year": 2021}, {"source": "6", "target": "67", "source_name": "software engineer", "target_name": "machine learning", "weight": 10.0, "year": 2021}, {"source": "6", "target": "68", "source_name": "software engineer", "target_name": "service oriented", "weight": 1.0, "year": 2021}, {"source": "6", "target": "69", "source_name": "software engineer", "target_name": "computational intelligence", "weight": 7.0, "year": 2021}, {"source": "6", "target": "70", "source_name": "software engineer", "target_name": "decision making", "weight": 6.0, "year": 2021}, {"source": "6", "target": "71", "source_name": "software engineer", "target_name": "software testing", "weight": 23.0, "year": 2021}, {"source": "6", "target": "72", "source_name": "software engineer", "target_name": "reverse engineering", "weight": 19.0, "year": 2021}, {"source": "6", "target": "73", "source_name": "software engineer", "target_name": "multi agent systems", "weight": 1.0, "year": 2021}, {"source": "6", "target": "74", "source_name": "software engineer", "target_name": "software architecture", "weight": 38.0, "year": 2021}, {"source": "6", "target": "75", "source_name": "software engineer", "target_name": "systematic review", "weight": 7.0, "year": 2021}, {"source": "6", "target": "76", "source_name": "software engineer", "target_name": "life cycle", "weight": 39.0, "year": 2021}, {"source": "6", "target": "77", "source_name": "software engineer", "target_name": "mechanical turk", "weight": 6.0, "year": 2021}, {"source": "6", "target": "78", "source_name": "software engineer", "target_name": "process improvement", "weight": 20.0, "year": 2021}, {"source": "6", "target": "79", "source_name": "software engineer", "target_name": "data management", "weight": 1.0, "year": 2021}, {"source": "6", "target": "80", "source_name": "software engineer", "target_name": "information systems", "weight": 13.0, "year": 2021}, {"source": "6", "target": "81", "source_name": "software engineer", "target_name": "carnegie mellon", "weight": 9.0, "year": 2021}, {"source": "6", "target": "82", "source_name": "software engineer", "target_name": "social network", "weight": 8.0, "year": 2021}, {"source": "6", "target": "83", "source_name": "software engineer", "target_name": "lessons learned", "weight": 24.0, "year": 2021}, {"source": "6", "target": "84", "source_name": "software engineer", "target_name": "human computation", "weight": 3.0, "year": 2021}, {"source": "6", "target": "85", "source_name": "software engineer", "target_name": "degree programs", "weight": 12.0, "year": 2021}, {"source": "6", "target": "86", "source_name": "software engineer", "target_name": "systematic mapping", "weight": 7.0, "year": 2021}, {"source": "6", "target": "87", "source_name": "software engineer", "target_name": "domain specific", "weight": 4.0, "year": 2021}, {"source": "6", "target": "88", "source_name": "software engineer", "target_name": "organizational learning", "weight": 1.0, "year": 2021}, {"source": "6", "target": "91", "source_name": "software engineer", "target_name": "software design", "weight": 62.0, "year": 2021}, {"source": "6", "target": "92", "source_name": "software engineer", "target_name": "usability engineering", "weight": 8.0, "year": 2021}, {"source": "6", "target": "93", "source_name": "software engineer", "target_name": "literature review", "weight": 13.0, "year": 2021}, {"source": "6", "target": "94", "source_name": "software engineer", "target_name": "cultural heritage", "weight": 1.0, "year": 2021}, {"source": "6", "target": "95", "source_name": "software engineer", "target_name": "human factors", "weight": 9.0, "year": 2021}, {"source": "6", "target": "96", "source_name": "software engineer", "target_name": "open source software", "weight": 15.0, "year": 2021}, {"source": "6", "target": "97", "source_name": "software engineer", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "6", "target": "98", "source_name": "software engineer", "target_name": "data mining", "weight": 15.0, "year": 2021}, {"source": "6", "target": "99", "source_name": "software engineer", "target_name": "requirements elicitation", "weight": 5.0, "year": 2021}, {"source": "6", "target": "100", "source_name": "software engineer", "target_name": "artificial intelligence", "weight": 14.0, "year": 2021}, {"source": "6", "target": "101", "source_name": "software engineer", "target_name": "software reuse", "weight": 15.0, "year": 2021}, {"source": "6", "target": "102", "source_name": "software engineer", "target_name": "product line", "weight": 31.0, "year": 2021}, {"source": "6", "target": "103", "source_name": "software engineer", "target_name": "knowledge base", "weight": 8.0, "year": 2021}, {"source": "7", "target": "8", "source_name": "quality control", "target_name": "amazon mechanical turk", "weight": 2.0, "year": 2021}, {"source": "7", "target": "9", "source_name": "quality control", "target_name": "data collection", "weight": 3.0, "year": 2021}, {"source": "7", "target": "10", "source_name": "quality control", "target_name": "requirements engineering", "weight": 1.0, "year": 2021}, {"source": "7", "target": "11", "source_name": "quality control", "target_name": "crowdsourced data", "weight": 3.0, "year": 2021}, {"source": "7", "target": "13", "source_name": "quality control", "target_name": "natural language processing", "weight": 2.0, "year": 2021}, {"source": "7", "target": "19", "source_name": "quality control", "target_name": "configuration management", "weight": 1.0, "year": 2021}, {"source": "7", "target": "20", "source_name": "quality control", "target_name": "information technology", "weight": 1.0, "year": 2021}, {"source": "7", "target": "21", "source_name": "quality control", "target_name": "problem solving", "weight": 1.0, "year": 2021}, {"source": "7", "target": "24", "source_name": "quality control", "target_name": "requirements analysis", "weight": 1.0, "year": 2021}, {"source": "7", "target": "26", "source_name": "quality control", "target_name": "business process", "weight": 2.0, "year": 2021}, {"source": "7", "target": "27", "source_name": "quality control", "target_name": "social media", "weight": 1.0, "year": 2021}, {"source": "7", "target": "29", "source_name": "quality control", "target_name": "cloud computing", "weight": 2.0, "year": 2021}, {"source": "7", "target": "31", "source_name": "quality control", "target_name": "software development", "weight": 5.0, "year": 2021}, {"source": "7", "target": "42", "source_name": "quality control", "target_name": "quality assurance", "weight": 1.0, "year": 2021}, {"source": "7", "target": "44", "source_name": "quality control", "target_name": "empirical study", "weight": 1.0, "year": 2021}, {"source": "7", "target": "45", "source_name": "quality control", "target_name": "spatial crowdsourcing", "weight": 5.0, "year": 2021}, {"source": "7", "target": "47", "source_name": "quality control", "target_name": "software maintenance", "weight": 1.0, "year": 2021}, {"source": "7", "target": "49", "source_name": "quality control", "target_name": "cost estimation", "weight": 1.0, "year": 2021}, {"source": "7", "target": "50", "source_name": "quality control", "target_name": "source code", "weight": 1.0, "year": 2021}, {"source": "7", "target": "51", "source_name": "quality control", "target_name": "agile software development", "weight": 1.0, "year": 2021}, {"source": "7", "target": "53", "source_name": "quality control", "target_name": "big data", "weight": 1.0, "year": 2021}, {"source": "7", "target": "54", "source_name": "quality control", "target_name": "software quality", "weight": 4.0, "year": 2021}, {"source": "7", "target": "58", "source_name": "quality control", "target_name": "user interface", "weight": 2.0, "year": 2021}, {"source": "7", "target": "59", "source_name": "quality control", "target_name": "bug reports", "weight": 1.0, "year": 2021}, {"source": "7", "target": "61", "source_name": "quality control", "target_name": "extreme programming", "weight": 3.0, "year": 2021}, {"source": "7", "target": "66", "source_name": "quality control", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "7", "target": "67", "source_name": "quality control", "target_name": "machine learning", "weight": 3.0, "year": 2021}, {"source": "7", "target": "71", "source_name": "quality control", "target_name": "software testing", "weight": 2.0, "year": 2021}, {"source": "7", "target": "72", "source_name": "quality control", "target_name": "reverse engineering", "weight": 2.0, "year": 2021}, {"source": "7", "target": "74", "source_name": "quality control", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "7", "target": "75", "source_name": "quality control", "target_name": "systematic review", "weight": 2.0, "year": 2021}, {"source": "7", "target": "76", "source_name": "quality control", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "7", "target": "77", "source_name": "quality control", "target_name": "mechanical turk", "weight": 2.0, "year": 2021}, {"source": "7", "target": "79", "source_name": "quality control", "target_name": "data management", "weight": 1.0, "year": 2021}, {"source": "7", "target": "84", "source_name": "quality control", "target_name": "human computation", "weight": 3.0, "year": 2021}, {"source": "7", "target": "86", "source_name": "quality control", "target_name": "systematic mapping", "weight": 1.0, "year": 2021}, {"source": "7", "target": "90", "source_name": "quality control", "target_name": "incentive mechanism", "weight": 2.0, "year": 2021}, {"source": "7", "target": "91", "source_name": "quality control", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "7", "target": "93", "source_name": "quality control", "target_name": "literature review", "weight": 1.0, "year": 2021}, {"source": "7", "target": "97", "source_name": "quality control", "target_name": "task assignment", "weight": 3.0, "year": 2021}, {"source": "7", "target": "98", "source_name": "quality control", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "7", "target": "99", "source_name": "quality control", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "7", "target": "103", "source_name": "quality control", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "8", "target": "9", "source_name": "amazon mechanical turk", "target_name": "data collection", "weight": 4.0, "year": 2021}, {"source": "8", "target": "11", "source_name": "amazon mechanical turk", "target_name": "crowdsourced data", "weight": 1.0, "year": 2021}, {"source": "8", "target": "12", "source_name": "amazon mechanical turk", "target_name": "open innovation", "weight": 1.0, "year": 2021}, {"source": "8", "target": "15", "source_name": "amazon mechanical turk", "target_name": "decision support", "weight": 1.0, "year": 2021}, {"source": "8", "target": "26", "source_name": "amazon mechanical turk", "target_name": "business process", "weight": 5.0, "year": 2021}, {"source": "8", "target": "27", "source_name": "amazon mechanical turk", "target_name": "social media", "weight": 1.0, "year": 2021}, {"source": "8", "target": "31", "source_name": "amazon mechanical turk", "target_name": "software development", "weight": 5.0, "year": 2021}, {"source": "8", "target": "34", "source_name": "amazon mechanical turk", "target_name": "search engines", "weight": 2.0, "year": 2021}, {"source": "8", "target": "36", "source_name": "amazon mechanical turk", "target_name": "open source", "weight": 1.0, "year": 2021}, {"source": "8", "target": "42", "source_name": "amazon mechanical turk", "target_name": "quality assurance", "weight": 1.0, "year": 2021}, {"source": "8", "target": "45", "source_name": "amazon mechanical turk", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2021}, {"source": "8", "target": "54", "source_name": "amazon mechanical turk", "target_name": "software quality", "weight": 1.0, "year": 2021}, {"source": "8", "target": "58", "source_name": "amazon mechanical turk", "target_name": "user interface", "weight": 4.0, "year": 2021}, {"source": "8", "target": "60", "source_name": "amazon mechanical turk", "target_name": "collective intelligence", "weight": 1.0, "year": 2021}, {"source": "8", "target": "71", "source_name": "amazon mechanical turk", "target_name": "software testing", "weight": 1.0, "year": 2021}, {"source": "8", "target": "76", "source_name": "amazon mechanical turk", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "8", "target": "77", "source_name": "amazon mechanical turk", "target_name": "mechanical turk", "weight": 22.0, "year": 2021}, {"source": "8", "target": "79", "source_name": "amazon mechanical turk", "target_name": "data management", "weight": 1.0, "year": 2021}, {"source": "8", "target": "80", "source_name": "amazon mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "8", "target": "82", "source_name": "amazon mechanical turk", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "8", "target": "83", "source_name": "amazon mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "8", "target": "84", "source_name": "amazon mechanical turk", "target_name": "human computation", "weight": 2.0, "year": 2021}, {"source": "8", "target": "91", "source_name": "amazon mechanical turk", "target_name": "software design", "weight": 3.0, "year": 2021}, {"source": "8", "target": "93", "source_name": "amazon mechanical turk", "target_name": "literature review", "weight": 1.0, "year": 2021}, {"source": "8", "target": "96", "source_name": "amazon mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "8", "target": "97", "source_name": "amazon mechanical turk", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "9", "target": "11", "source_name": "data collection", "target_name": "crowdsourced data", "weight": 4.0, "year": 2021}, {"source": "9", "target": "21", "source_name": "data collection", "target_name": "problem solving", "weight": 1.0, "year": 2021}, {"source": "9", "target": "22", "source_name": "data collection", "target_name": "capability maturity model", "weight": 1.0, "year": 2021}, {"source": "9", "target": "26", "source_name": "data collection", "target_name": "business process", "weight": 1.0, "year": 2021}, {"source": "9", "target": "27", "source_name": "data collection", "target_name": "social media", "weight": 1.0, "year": 2021}, {"source": "9", "target": "31", "source_name": "data collection", "target_name": "software development", "weight": 2.0, "year": 2021}, {"source": "9", "target": "36", "source_name": "data collection", "target_name": "open source", "weight": 1.0, "year": 2021}, {"source": "9", "target": "45", "source_name": "data collection", "target_name": "spatial crowdsourcing", "weight": 5.0, "year": 2021}, {"source": "9", "target": "50", "source_name": "data collection", "target_name": "source code", "weight": 1.0, "year": 2021}, {"source": "9", "target": "51", "source_name": "data collection", "target_name": "agile software development", "weight": 1.0, "year": 2021}, {"source": "9", "target": "58", "source_name": "data collection", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "9", "target": "66", "source_name": "data collection", "target_name": "project management", "weight": 2.0, "year": 2021}, {"source": "9", "target": "75", "source_name": "data collection", "target_name": "systematic review", "weight": 2.0, "year": 2021}, {"source": "9", "target": "76", "source_name": "data collection", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "9", "target": "77", "source_name": "data collection", "target_name": "mechanical turk", "weight": 3.0, "year": 2021}, {"source": "9", "target": "78", "source_name": "data collection", "target_name": "process improvement", "weight": 1.0, "year": 2021}, {"source": "9", "target": "80", "source_name": "data collection", "target_name": "information systems", "weight": 2.0, "year": 2021}, {"source": "9", "target": "83", "source_name": "data collection", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "9", "target": "84", "source_name": "data collection", "target_name": "human computation", "weight": 2.0, "year": 2021}, {"source": "9", "target": "88", "source_name": "data collection", "target_name": "organizational learning", "weight": 1.0, "year": 2021}, {"source": "9", "target": "90", "source_name": "data collection", "target_name": "incentive mechanism", "weight": 2.0, "year": 2021}, {"source": "9", "target": "91", "source_name": "data collection", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "9", "target": "94", "source_name": "data collection", "target_name": "cultural heritage", "weight": 1.0, "year": 2021}, {"source": "9", "target": "95", "source_name": "data collection", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "9", "target": "97", "source_name": "data collection", "target_name": "task assignment", "weight": 2.0, "year": 2021}, {"source": "9", "target": "100", "source_name": "data collection", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "10", "target": "19", "source_name": "requirements engineering", "target_name": "configuration management", "weight": 3.0, "year": 2021}, {"source": "10", "target": "20", "source_name": "requirements engineering", "target_name": "information technology", "weight": 1.0, "year": 2021}, {"source": "10", "target": "21", "source_name": "requirements engineering", "target_name": "problem solving", "weight": 1.0, "year": 2021}, {"source": "10", "target": "22", "source_name": "requirements engineering", "target_name": "capability maturity model", "weight": 1.0, "year": 2021}, {"source": "10", "target": "24", "source_name": "requirements engineering", "target_name": "requirements analysis", "weight": 1.0, "year": 2021}, {"source": "10", "target": "26", "source_name": "requirements engineering", "target_name": "business process", "weight": 1.0, "year": 2021}, {"source": "10", "target": "29", "source_name": "requirements engineering", "target_name": "cloud computing", "weight": 1.0, "year": 2021}, {"source": "10", "target": "31", "source_name": "requirements engineering", "target_name": "software development", "weight": 19.0, "year": 2021}, {"source": "10", "target": "32", "source_name": "requirements engineering", "target_name": "programming languages", "weight": 1.0, "year": 2021}, {"source": "10", "target": "33", "source_name": "requirements engineering", "target_name": "fundamental principles", "weight": 1.0, "year": 2021}, {"source": "10", "target": "36", "source_name": "requirements engineering", "target_name": "open source", "weight": 2.0, "year": 2021}, {"source": "10", "target": "37", "source_name": "requirements engineering", "target_name": "controlled experiments", "weight": 1.0, "year": 2021}, {"source": "10", "target": "38", "source_name": "requirements engineering", "target_name": "systematic literature review", "weight": 1.0, "year": 2021}, {"source": "10", "target": "39", "source_name": "requirements engineering", "target_name": "team members", "weight": 1.0, "year": 2021}, {"source": "10", "target": "42", "source_name": "requirements engineering", "target_name": "quality assurance", "weight": 1.0, "year": 2021}, {"source": "10", "target": "46", "source_name": "requirements engineering", "target_name": "empirical studies", "weight": 1.0, "year": 2021}, {"source": "10", "target": "49", "source_name": "requirements engineering", "target_name": "cost estimation", "weight": 1.0, "year": 2021}, {"source": "10", "target": "51", "source_name": "requirements engineering", "target_name": "agile software development", "weight": 1.0, "year": 2021}, {"source": "10", "target": "53", "source_name": "requirements engineering", "target_name": "big data", "weight": 1.0, "year": 2021}, {"source": "10", "target": "54", "source_name": "requirements engineering", "target_name": "software quality", "weight": 3.0, "year": 2021}, {"source": "10", "target": "55", "source_name": "requirements engineering", "target_name": "systems engineering", "weight": 2.0, "year": 2021}, {"source": "10", "target": "56", "source_name": "requirements engineering", "target_name": "formal methods", "weight": 2.0, "year": 2021}, {"source": "10", "target": "61", "source_name": "requirements engineering", "target_name": "extreme programming", "weight": 3.0, "year": 2021}, {"source": "10", "target": "62", "source_name": "requirements engineering", "target_name": "information processing", "weight": 1.0, "year": 2021}, {"source": "10", "target": "64", "source_name": "requirements engineering", "target_name": "undergraduate degree", "weight": 1.0, "year": 2021}, {"source": "10", "target": "66", "source_name": "requirements engineering", "target_name": "project management", "weight": 3.0, "year": 2021}, {"source": "10", "target": "67", "source_name": "requirements engineering", "target_name": "machine learning", "weight": 2.0, "year": 2021}, {"source": "10", "target": "70", "source_name": "requirements engineering", "target_name": "decision making", "weight": 1.0, "year": 2021}, {"source": "10", "target": "71", "source_name": "requirements engineering", "target_name": "software testing", "weight": 2.0, "year": 2021}, {"source": "10", "target": "72", "source_name": "requirements engineering", "target_name": "reverse engineering", "weight": 5.0, "year": 2021}, {"source": "10", "target": "74", "source_name": "requirements engineering", "target_name": "software architecture", "weight": 6.0, "year": 2021}, {"source": "10", "target": "75", "source_name": "requirements engineering", "target_name": "systematic review", "weight": 1.0, "year": 2021}, {"source": "10", "target": "76", "source_name": "requirements engineering", "target_name": "life cycle", "weight": 3.0, "year": 2021}, {"source": "10", "target": "78", "source_name": "requirements engineering", "target_name": "process improvement", "weight": 1.0, "year": 2021}, {"source": "10", "target": "80", "source_name": "requirements engineering", "target_name": "information systems", "weight": 3.0, "year": 2021}, {"source": "10", "target": "82", "source_name": "requirements engineering", "target_name": "social network", "weight": 2.0, "year": 2021}, {"source": "10", "target": "83", "source_name": "requirements engineering", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "10", "target": "85", "source_name": "requirements engineering", "target_name": "degree programs", "weight": 1.0, "year": 2021}, {"source": "10", "target": "86", "source_name": "requirements engineering", "target_name": "systematic mapping", "weight": 1.0, "year": 2021}, {"source": "10", "target": "91", "source_name": "requirements engineering", "target_name": "software design", "weight": 6.0, "year": 2021}, {"source": "10", "target": "92", "source_name": "requirements engineering", "target_name": "usability engineering", "weight": 1.0, "year": 2021}, {"source": "10", "target": "95", "source_name": "requirements engineering", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "10", "target": "99", "source_name": "requirements engineering", "target_name": "requirements elicitation", "weight": 10.0, "year": 2021}, {"source": "10", "target": "100", "source_name": "requirements engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "10", "target": "101", "source_name": "requirements engineering", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "10", "target": "102", "source_name": "requirements engineering", "target_name": "product line", "weight": 2.0, "year": 2021}, {"source": "10", "target": "103", "source_name": "requirements engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "11", "target": "26", "source_name": "crowdsourced data", "target_name": "business process", "weight": 1.0, "year": 2021}, {"source": "11", "target": "27", "source_name": "crowdsourced data", "target_name": "social media", "weight": 2.0, "year": 2021}, {"source": "11", "target": "31", "source_name": "crowdsourced data", "target_name": "software development", "weight": 1.0, "year": 2021}, {"source": "11", "target": "34", "source_name": "crowdsourced data", "target_name": "search engines", "weight": 2.0, "year": 2021}, {"source": "11", "target": "36", "source_name": "crowdsourced data", "target_name": "open source", "weight": 1.0, "year": 2021}, {"source": "11", "target": "44", "source_name": "crowdsourced data", "target_name": "empirical study", "weight": 1.0, "year": 2021}, {"source": "11", "target": "45", "source_name": "crowdsourced data", "target_name": "spatial crowdsourcing", "weight": 3.0, "year": 2021}, {"source": "11", "target": "53", "source_name": "crowdsourced data", "target_name": "big data", "weight": 4.0, "year": 2021}, {"source": "11", "target": "57", "source_name": "crowdsourced data", "target_name": "human intelligence", "weight": 1.0, "year": 2021}, {"source": "11", "target": "67", "source_name": "crowdsourced data", "target_name": "machine learning", "weight": 2.0, "year": 2021}, {"source": "11", "target": "75", "source_name": "crowdsourced data", "target_name": "systematic review", "weight": 1.0, "year": 2021}, {"source": "11", "target": "77", "source_name": "crowdsourced data", "target_name": "mechanical turk", "weight": 1.0, "year": 2021}, {"source": "11", "target": "79", "source_name": "crowdsourced data", "target_name": "data management", "weight": 3.0, "year": 2021}, {"source": "11", "target": "80", "source_name": "crowdsourced data", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "11", "target": "82", "source_name": "crowdsourced data", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "11", "target": "83", "source_name": "crowdsourced data", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "11", "target": "84", "source_name": "crowdsourced data", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "11", "target": "91", "source_name": "crowdsourced data", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "11", "target": "96", "source_name": "crowdsourced data", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "11", "target": "98", "source_name": "crowdsourced data", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "12", "target": "16", "source_name": "open innovation", "target_name": "learning environment", "weight": 1.0, "year": 2021}, {"source": "12", "target": "20", "source_name": "open innovation", "target_name": "information technology", "weight": 1.0, "year": 2021}, {"source": "12", "target": "21", "source_name": "open innovation", "target_name": "problem solving", "weight": 1.0, "year": 2021}, {"source": "12", "target": "26", "source_name": "open innovation", "target_name": "business process", "weight": 1.0, "year": 2021}, {"source": "12", "target": "31", "source_name": "open innovation", "target_name": "software development", "weight": 1.0, "year": 2021}, {"source": "12", "target": "36", "source_name": "open innovation", "target_name": "open source", "weight": 1.0, "year": 2021}, {"source": "12", "target": "42", "source_name": "open innovation", "target_name": "quality assurance", "weight": 1.0, "year": 2021}, {"source": "12", "target": "77", "source_name": "open innovation", "target_name": "mechanical turk", "weight": 1.0, "year": 2021}, {"source": "12", "target": "80", "source_name": "open innovation", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "12", "target": "90", "source_name": "open innovation", "target_name": "incentive mechanism", "weight": 1.0, "year": 2021}, {"source": "12", "target": "93", "source_name": "open innovation", "target_name": "literature review", "weight": 2.0, "year": 2021}, {"source": "12", "target": "96", "source_name": "open innovation", "target_name": "open source software", "weight": 4.0, "year": 2021}, {"source": "12", "target": "97", "source_name": "open innovation", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "13", "target": "27", "source_name": "natural language processing", "target_name": "social media", "weight": 1.0, "year": 2021}, {"source": "13", "target": "30", "source_name": "natural language processing", "target_name": "end users", "weight": 1.0, "year": 2021}, {"source": "13", "target": "31", "source_name": "natural language processing", "target_name": "software development", "weight": 1.0, "year": 2021}, {"source": "13", "target": "59", "source_name": "natural language processing", "target_name": "bug reports", "weight": 1.0, "year": 2021}, {"source": "13", "target": "67", "source_name": "natural language processing", "target_name": "machine learning", "weight": 7.0, "year": 2021}, {"source": "13", "target": "71", "source_name": "natural language processing", "target_name": "software testing", "weight": 2.0, "year": 2021}, {"source": "13", "target": "84", "source_name": "natural language processing", "target_name": "human computation", "weight": 2.0, "year": 2021}, {"source": "13", "target": "101", "source_name": "natural language processing", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "14", "target": "31", "source_name": "object oriented", "target_name": "software development", "weight": 4.0, "year": 2021}, {"source": "14", "target": "42", "source_name": "object oriented", "target_name": "quality assurance", "weight": 1.0, "year": 2021}, {"source": "14", "target": "47", "source_name": "object oriented", "target_name": "software maintenance", "weight": 1.0, "year": 2021}, {"source": "14", "target": "54", "source_name": "object oriented", "target_name": "software quality", "weight": 2.0, "year": 2021}, {"source": "14", "target": "55", "source_name": "object oriented", "target_name": "systems engineering", "weight": 1.0, "year": 2021}, {"source": "14", "target": "56", "source_name": "object oriented", "target_name": "formal methods", "weight": 1.0, "year": 2021}, {"source": "14", "target": "61", "source_name": "object oriented", "target_name": "extreme programming", "weight": 1.0, "year": 2021}, {"source": "14", "target": "69", "source_name": "object oriented", "target_name": "computational intelligence", "weight": 1.0, "year": 2021}, {"source": "14", "target": "71", "source_name": "object oriented", "target_name": "software testing", "weight": 1.0, "year": 2021}, {"source": "14", "target": "72", "source_name": "object oriented", "target_name": "reverse engineering", "weight": 2.0, "year": 2021}, {"source": "14", "target": "91", "source_name": "object oriented", "target_name": "software design", "weight": 2.0, "year": 2021}, {"source": "14", "target": "100", "source_name": "object oriented", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "14", "target": "101", "source_name": "object oriented", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "15", "target": "26", "source_name": "decision support", "target_name": "business process", "weight": 2.0, "year": 2021}, {"source": "15", "target": "31", "source_name": "decision support", "target_name": "software development", "weight": 1.0, "year": 2021}, {"source": "15", "target": "42", "source_name": "decision support", "target_name": "quality assurance", "weight": 1.0, "year": 2021}, {"source": "15", "target": "54", "source_name": "decision support", "target_name": "software quality", "weight": 1.0, "year": 2021}, {"source": "15", "target": "62", "source_name": "decision support", "target_name": "information processing", "weight": 1.0, "year": 2021}, {"source": "15", "target": "67", "source_name": "decision support", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "15", "target": "71", "source_name": "decision support", "target_name": "software testing", "weight": 1.0, "year": 2021}, {"source": "15", "target": "100", "source_name": "decision support", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "15", "target": "103", "source_name": "decision support", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "16", "target": "29", "source_name": "learning environment", "target_name": "cloud computing", "weight": 1.0, "year": 2021}, {"source": "16", "target": "31", "source_name": "learning environment", "target_name": "software development", "weight": 3.0, "year": 2021}, {"source": "16", "target": "36", "source_name": "learning environment", "target_name": "open source", "weight": 1.0, "year": 2021}, {"source": "16", "target": "58", "source_name": "learning environment", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "16", "target": "66", "source_name": "learning environment", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "16", "target": "83", "source_name": "learning environment", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "17", "target": "20", "source_name": "conceptual framework", "target_name": "information technology", "weight": 1.0, "year": 2021}, {"source": "17", "target": "21", "source_name": "conceptual framework", "target_name": "problem solving", "weight": 1.0, "year": 2021}, {"source": "17", "target": "31", "source_name": "conceptual framework", "target_name": "software development", "weight": 3.0, "year": 2021}, {"source": "17", "target": "33", "source_name": "conceptual framework", "target_name": "fundamental principles", "weight": 1.0, "year": 2021}, {"source": "17", "target": "38", "source_name": "conceptual framework", "target_name": "systematic literature review", "weight": 1.0, "year": 2021}, {"source": "17", "target": "46", "source_name": "conceptual framework", "target_name": "empirical studies", "weight": 1.0, "year": 2021}, {"source": "17", "target": "74", "source_name": "conceptual framework", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "17", "target": "75", "source_name": "conceptual framework", "target_name": "systematic review", "weight": 1.0, "year": 2021}, {"source": "17", "target": "80", "source_name": "conceptual framework", "target_name": "information systems", "weight": 2.0, "year": 2021}, {"source": "17", "target": "82", "source_name": "conceptual framework", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "17", "target": "91", "source_name": "conceptual framework", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "17", "target": "93", "source_name": "conceptual framework", "target_name": "literature review", "weight": 4.0, "year": 2021}, {"source": "17", "target": "103", "source_name": "conceptual framework", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "18", "target": "31", "source_name": "computational science", "target_name": "software development", "weight": 2.0, "year": 2021}, {"source": "18", "target": "39", "source_name": "computational science", "target_name": "team members", "weight": 1.0, "year": 2021}, {"source": "18", "target": "76", "source_name": "computational science", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "18", "target": "83", "source_name": "computational science", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "19", "target": "20", "source_name": "configuration management", "target_name": "information technology", "weight": 1.0, "year": 2021}, {"source": "19", "target": "22", "source_name": "configuration management", "target_name": "capability maturity model", "weight": 1.0, "year": 2021}, {"source": "19", "target": "24", "source_name": "configuration management", "target_name": "requirements analysis", "weight": 5.0, "year": 2021}, {"source": "19", "target": "31", "source_name": "configuration management", "target_name": "software development", "weight": 4.0, "year": 2021}, {"source": "19", "target": "33", "source_name": "configuration management", "target_name": "fundamental principles", "weight": 1.0, "year": 2021}, {"source": "19", "target": "42", "source_name": "configuration management", "target_name": "quality assurance", "weight": 1.0, "year": 2021}, {"source": "19", "target": "47", "source_name": "configuration management", "target_name": "software maintenance", "weight": 3.0, "year": 2021}, {"source": "19", "target": "49", "source_name": "configuration management", "target_name": "cost estimation", "weight": 1.0, "year": 2021}, {"source": "19", "target": "50", "source_name": "configuration management", "target_name": "source code", "weight": 1.0, "year": 2021}, {"source": "19", "target": "54", "source_name": "configuration management", "target_name": "software quality", "weight": 2.0, "year": 2021}, {"source": "19", "target": "56", "source_name": "configuration management", "target_name": "formal methods", "weight": 1.0, "year": 2021}, {"source": "19", "target": "58", "source_name": "configuration management", "target_name": "user interface", "weight": 2.0, "year": 2021}, {"source": "19", "target": "61", "source_name": "configuration management", "target_name": "extreme programming", "weight": 2.0, "year": 2021}, {"source": "19", "target": "63", "source_name": "configuration management", "target_name": "petri nets", "weight": 1.0, "year": 2021}, {"source": "19", "target": "66", "source_name": "configuration management", "target_name": "project management", "weight": 3.0, "year": 2021}, {"source": "19", "target": "71", "source_name": "configuration management", "target_name": "software testing", "weight": 4.0, "year": 2021}, {"source": "19", "target": "72", "source_name": "configuration management", "target_name": "reverse engineering", "weight": 3.0, "year": 2021}, {"source": "19", "target": "74", "source_name": "configuration management", "target_name": "software architecture", "weight": 3.0, "year": 2021}, {"source": "19", "target": "76", "source_name": "configuration management", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "19", "target": "78", "source_name": "configuration management", "target_name": "process improvement", "weight": 1.0, "year": 2021}, {"source": "19", "target": "91", "source_name": "configuration management", "target_name": "software design", "weight": 5.0, "year": 2021}, {"source": "19", "target": "99", "source_name": "configuration management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2021}, {"source": "20", "target": "27", "source_name": "information technology", "target_name": "social media", "weight": 1.0, "year": 2021}, {"source": "20", "target": "31", "source_name": "information technology", "target_name": "software development", "weight": 7.0, "year": 2021}, {"source": "20", "target": "36", "source_name": "information technology", "target_name": "open source", "weight": 2.0, "year": 2021}, {"source": "20", "target": "37", "source_name": "information technology", "target_name": "controlled experiments", "weight": 1.0, "year": 2021}, {"source": "20", "target": "47", "source_name": "information technology", "target_name": "software maintenance", "weight": 2.0, "year": 2021}, {"source": "20", "target": "49", "source_name": "information technology", "target_name": "cost estimation", "weight": 1.0, "year": 2021}, {"source": "20", "target": "54", "source_name": "information technology", "target_name": "software quality", "weight": 2.0, "year": 2021}, {"source": "20", "target": "55", "source_name": "information technology", "target_name": "systems engineering", "weight": 2.0, "year": 2021}, {"source": "20", "target": "57", "source_name": "information technology", "target_name": "human intelligence", "weight": 1.0, "year": 2021}, {"source": "20", "target": "58", "source_name": "information technology", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "20", "target": "60", "source_name": "information technology", "target_name": "collective intelligence", "weight": 1.0, "year": 2021}, {"source": "20", "target": "61", "source_name": "information technology", "target_name": "extreme programming", "weight": 1.0, "year": 2021}, {"source": "20", "target": "62", "source_name": "information technology", "target_name": "information processing", "weight": 1.0, "year": 2021}, {"source": "20", "target": "70", "source_name": "information technology", "target_name": "decision making", "weight": 1.0, "year": 2021}, {"source": "20", "target": "71", "source_name": "information technology", "target_name": "software testing", "weight": 1.0, "year": 2021}, {"source": "20", "target": "72", "source_name": "information technology", "target_name": "reverse engineering", "weight": 1.0, "year": 2021}, {"source": "20", "target": "76", "source_name": "information technology", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "20", "target": "80", "source_name": "information technology", "target_name": "information systems", "weight": 3.0, "year": 2021}, {"source": "20", "target": "91", "source_name": "information technology", "target_name": "software design", "weight": 2.0, "year": 2021}, {"source": "20", "target": "93", "source_name": "information technology", "target_name": "literature review", "weight": 2.0, "year": 2021}, {"source": "20", "target": "96", "source_name": "information technology", "target_name": "open source software", "weight": 2.0, "year": 2021}, {"source": "20", "target": "98", "source_name": "information technology", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "20", "target": "99", "source_name": "information technology", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "21", "target": "22", "source_name": "problem solving", "target_name": "capability maturity model", "weight": 1.0, "year": 2021}, {"source": "21", "target": "29", "source_name": "problem solving", "target_name": "cloud computing", "weight": 1.0, "year": 2021}, {"source": "21", "target": "31", "source_name": "problem solving", "target_name": "software development", "weight": 12.0, "year": 2021}, {"source": "21", "target": "34", "source_name": "problem solving", "target_name": "search engines", "weight": 1.0, "year": 2021}, {"source": "21", "target": "36", "source_name": "problem solving", "target_name": "open source", "weight": 3.0, "year": 2021}, {"source": "21", "target": "38", "source_name": "problem solving", "target_name": "systematic literature review", "weight": 1.0, "year": 2021}, {"source": "21", "target": "39", "source_name": "problem solving", "target_name": "team members", "weight": 2.0, "year": 2021}, {"source": "21", "target": "47", "source_name": "problem solving", "target_name": "software maintenance", "weight": 1.0, "year": 2021}, {"source": "21", "target": "51", "source_name": "problem solving", "target_name": "agile software development", "weight": 1.0, "year": 2021}, {"source": "21", "target": "54", "source_name": "problem solving", "target_name": "software quality", "weight": 2.0, "year": 2021}, {"source": "21", "target": "56", "source_name": "problem solving", "target_name": "formal methods", "weight": 1.0, "year": 2021}, {"source": "21", "target": "60", "source_name": "problem solving", "target_name": "collective intelligence", "weight": 1.0, "year": 2021}, {"source": "21", "target": "66", "source_name": "problem solving", "target_name": "project management", "weight": 2.0, "year": 2021}, {"source": "21", "target": "69", "source_name": "problem solving", "target_name": "computational intelligence", "weight": 1.0, "year": 2021}, {"source": "21", "target": "71", "source_name": "problem solving", "target_name": "software testing", "weight": 2.0, "year": 2021}, {"source": "21", "target": "75", "source_name": "problem solving", "target_name": "systematic review", "weight": 1.0, "year": 2021}, {"source": "21", "target": "76", "source_name": "problem solving", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "21", "target": "78", "source_name": "problem solving", "target_name": "process improvement", "weight": 2.0, "year": 2021}, {"source": "21", "target": "80", "source_name": "problem solving", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "21", "target": "82", "source_name": "problem solving", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "21", "target": "84", "source_name": "problem solving", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "21", "target": "93", "source_name": "problem solving", "target_name": "literature review", "weight": 2.0, "year": 2021}, {"source": "21", "target": "95", "source_name": "problem solving", "target_name": "human factors", "weight": 3.0, "year": 2021}, {"source": "21", "target": "96", "source_name": "problem solving", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "21", "target": "99", "source_name": "problem solving", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "22", "target": "31", "source_name": "capability maturity model", "target_name": "software development", "weight": 10.0, "year": 2021}, {"source": "22", "target": "33", "source_name": "capability maturity model", "target_name": "fundamental principles", "weight": 1.0, "year": 2021}, {"source": "22", "target": "36", "source_name": "capability maturity model", "target_name": "open source", "weight": 1.0, "year": 2021}, {"source": "22", "target": "51", "source_name": "capability maturity model", "target_name": "agile software development", "weight": 1.0, "year": 2021}, {"source": "22", "target": "52", "source_name": "capability maturity model", "target_name": "neural network", "weight": 1.0, "year": 2021}, {"source": "22", "target": "54", "source_name": "capability maturity model", "target_name": "software quality", "weight": 3.0, "year": 2021}, {"source": "22", "target": "55", "source_name": "capability maturity model", "target_name": "systems engineering", "weight": 1.0, "year": 2021}, {"source": "22", "target": "56", "source_name": "capability maturity model", "target_name": "formal methods", "weight": 1.0, "year": 2021}, {"source": "22", "target": "61", "source_name": "capability maturity model", "target_name": "extreme programming", "weight": 2.0, "year": 2021}, {"source": "22", "target": "62", "source_name": "capability maturity model", "target_name": "information processing", "weight": 1.0, "year": 2021}, {"source": "22", "target": "66", "source_name": "capability maturity model", "target_name": "project management", "weight": 2.0, "year": 2021}, {"source": "22", "target": "71", "source_name": "capability maturity model", "target_name": "software testing", "weight": 2.0, "year": 2021}, {"source": "22", "target": "74", "source_name": "capability maturity model", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "22", "target": "76", "source_name": "capability maturity model", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "22", "target": "78", "source_name": "capability maturity model", "target_name": "process improvement", "weight": 3.0, "year": 2021}, {"source": "22", "target": "81", "source_name": "capability maturity model", "target_name": "carnegie mellon", "weight": 3.0, "year": 2021}, {"source": "22", "target": "91", "source_name": "capability maturity model", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "22", "target": "95", "source_name": "capability maturity model", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "22", "target": "101", "source_name": "capability maturity model", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "24", "target": "31", "source_name": "requirements analysis", "target_name": "software development", "weight": 5.0, "year": 2021}, {"source": "24", "target": "42", "source_name": "requirements analysis", "target_name": "quality assurance", "weight": 1.0, "year": 2021}, {"source": "24", "target": "47", "source_name": "requirements analysis", "target_name": "software maintenance", "weight": 1.0, "year": 2021}, {"source": "24", "target": "49", "source_name": "requirements analysis", "target_name": "cost estimation", "weight": 3.0, "year": 2021}, {"source": "24", "target": "50", "source_name": "requirements analysis", "target_name": "source code", "weight": 1.0, "year": 2021}, {"source": "24", "target": "53", "source_name": "requirements analysis", "target_name": "big data", "weight": 1.0, "year": 2021}, {"source": "24", "target": "54", "source_name": "requirements analysis", "target_name": "software quality", "weight": 1.0, "year": 2021}, {"source": "24", "target": "56", "source_name": "requirements analysis", "target_name": "formal methods", "weight": 1.0, "year": 2021}, {"source": "24", "target": "58", "source_name": "requirements analysis", "target_name": "user interface", "weight": 2.0, "year": 2021}, {"source": "24", "target": "61", "source_name": "requirements analysis", "target_name": "extreme programming", "weight": 1.0, "year": 2021}, {"source": "24", "target": "63", "source_name": "requirements analysis", "target_name": "petri nets", "weight": 1.0, "year": 2021}, {"source": "24", "target": "66", "source_name": "requirements analysis", "target_name": "project management", "weight": 3.0, "year": 2021}, {"source": "24", "target": "71", "source_name": "requirements analysis", "target_name": "software testing", "weight": 3.0, "year": 2021}, {"source": "24", "target": "74", "source_name": "requirements analysis", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "24", "target": "76", "source_name": "requirements analysis", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "24", "target": "83", "source_name": "requirements analysis", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "24", "target": "91", "source_name": "requirements analysis", "target_name": "software design", "weight": 2.0, "year": 2021}, {"source": "24", "target": "99", "source_name": "requirements analysis", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "25", "target": "31", "source_name": "motivational factors", "target_name": "software development", "weight": 1.0, "year": 2021}, {"source": "25", "target": "46", "source_name": "motivational factors", "target_name": "empirical studies", "weight": 1.0, "year": 2021}, {"source": "25", "target": "93", "source_name": "motivational factors", "target_name": "literature review", "weight": 2.0, "year": 2021}, {"source": "26", "target": "29", "source_name": "business process", "target_name": "cloud computing", "weight": 1.0, "year": 2021}, {"source": "26", "target": "31", "source_name": "business process", "target_name": "software development", "weight": 3.0, "year": 2021}, {"source": "26", "target": "36", "source_name": "business process", "target_name": "open source", "weight": 1.0, "year": 2021}, {"source": "26", "target": "40", "source_name": "business process", "target_name": "knowledge management", "weight": 1.0, "year": 2021}, {"source": "26", "target": "42", "source_name": "business process", "target_name": "quality assurance", "weight": 2.0, "year": 2021}, {"source": "26", "target": "58", "source_name": "business process", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "26", "target": "60", "source_name": "business process", "target_name": "collective intelligence", "weight": 4.0, "year": 2021}, {"source": "26", "target": "70", "source_name": "business process", "target_name": "decision making", "weight": 1.0, "year": 2021}, {"source": "26", "target": "71", "source_name": "business process", "target_name": "software testing", "weight": 3.0, "year": 2021}, {"source": "26", "target": "76", "source_name": "business process", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "26", "target": "77", "source_name": "business process", "target_name": "mechanical turk", "weight": 3.0, "year": 2021}, {"source": "26", "target": "80", "source_name": "business process", "target_name": "information systems", "weight": 2.0, "year": 2021}, {"source": "26", "target": "82", "source_name": "business process", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "26", "target": "84", "source_name": "business process", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "26", "target": "91", "source_name": "business process", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "26", "target": "93", "source_name": "business process", "target_name": "literature review", "weight": 3.0, "year": 2021}, {"source": "26", "target": "96", "source_name": "business process", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "26", "target": "103", "source_name": "business process", "target_name": "knowledge base", "weight": 2.0, "year": 2021}, {"source": "27", "target": "31", "source_name": "social media", "target_name": "software development", "weight": 5.0, "year": 2021}, {"source": "27", "target": "34", "source_name": "social media", "target_name": "search engines", "weight": 2.0, "year": 2021}, {"source": "27", "target": "36", "source_name": "social media", "target_name": "open source", "weight": 1.0, "year": 2021}, {"source": "27", "target": "38", "source_name": "social media", "target_name": "systematic literature review", "weight": 1.0, "year": 2021}, {"source": "27", "target": "40", "source_name": "social media", "target_name": "knowledge management", "weight": 1.0, "year": 2021}, {"source": "27", "target": "53", "source_name": "social media", "target_name": "big data", "weight": 2.0, "year": 2021}, {"source": "27", "target": "57", "source_name": "social media", "target_name": "human intelligence", "weight": 1.0, "year": 2021}, {"source": "27", "target": "58", "source_name": "social media", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "27", "target": "60", "source_name": "social media", "target_name": "collective intelligence", "weight": 2.0, "year": 2021}, {"source": "27", "target": "70", "source_name": "social media", "target_name": "decision making", "weight": 1.0, "year": 2021}, {"source": "27", "target": "74", "source_name": "social media", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "27", "target": "77", "source_name": "social media", "target_name": "mechanical turk", "weight": 3.0, "year": 2021}, {"source": "27", "target": "79", "source_name": "social media", "target_name": "data management", "weight": 1.0, "year": 2021}, {"source": "27", "target": "80", "source_name": "social media", "target_name": "information systems", "weight": 2.0, "year": 2021}, {"source": "27", "target": "82", "source_name": "social media", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "27", "target": "83", "source_name": "social media", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "27", "target": "84", "source_name": "social media", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "27", "target": "90", "source_name": "social media", "target_name": "incentive mechanism", "weight": 1.0, "year": 2021}, {"source": "27", "target": "93", "source_name": "social media", "target_name": "literature review", "weight": 2.0, "year": 2021}, {"source": "27", "target": "96", "source_name": "social media", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "27", "target": "97", "source_name": "social media", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "27", "target": "98", "source_name": "social media", "target_name": "data mining", "weight": 2.0, "year": 2021}, {"source": "28", "target": "31", "source_name": "computing elements", "target_name": "software development", "weight": 2.0, "year": 2021}, {"source": "28", "target": "60", "source_name": "computing elements", "target_name": "collective intelligence", "weight": 2.0, "year": 2021}, {"source": "28", "target": "76", "source_name": "computing elements", "target_name": "life cycle", "weight": 2.0, "year": 2021}, {"source": "28", "target": "97", "source_name": "computing elements", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "29", "target": "31", "source_name": "cloud computing", "target_name": "software development", "weight": 6.0, "year": 2021}, {"source": "29", "target": "42", "source_name": "cloud computing", "target_name": "quality assurance", "weight": 1.0, "year": 2021}, {"source": "29", "target": "52", "source_name": "cloud computing", "target_name": "neural network", "weight": 1.0, "year": 2021}, {"source": "29", "target": "54", "source_name": "cloud computing", "target_name": "software quality", "weight": 1.0, "year": 2021}, {"source": "29", "target": "70", "source_name": "cloud computing", "target_name": "decision making", "weight": 1.0, "year": 2021}, {"source": "29", "target": "71", "source_name": "cloud computing", "target_name": "software testing", "weight": 2.0, "year": 2021}, {"source": "29", "target": "74", "source_name": "cloud computing", "target_name": "software architecture", "weight": 2.0, "year": 2021}, {"source": "29", "target": "76", "source_name": "cloud computing", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "29", "target": "79", "source_name": "cloud computing", "target_name": "data management", "weight": 1.0, "year": 2021}, {"source": "29", "target": "83", "source_name": "cloud computing", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "29", "target": "91", "source_name": "cloud computing", "target_name": "software design", "weight": 2.0, "year": 2021}, {"source": "29", "target": "98", "source_name": "cloud computing", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "30", "target": "31", "source_name": "end users", "target_name": "software development", "weight": 3.0, "year": 2021}, {"source": "30", "target": "58", "source_name": "end users", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "30", "target": "59", "source_name": "end users", "target_name": "bug reports", "weight": 1.0, "year": 2021}, {"source": "30", "target": "67", "source_name": "end users", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "30", "target": "96", "source_name": "end users", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "30", "target": "98", "source_name": "end users", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "30", "target": "99", "source_name": "end users", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "31", "target": "32", "source_name": "software development", "target_name": "programming languages", "weight": 4.0, "year": 2021}, {"source": "31", "target": "33", "source_name": "software development", "target_name": "fundamental principles", "weight": 3.0, "year": 2021}, {"source": "31", "target": "34", "source_name": "software development", "target_name": "search engines", "weight": 1.0, "year": 2021}, {"source": "31", "target": "35", "source_name": "software development", "target_name": "multi agent", "weight": 1.0, "year": 2021}, {"source": "31", "target": "36", "source_name": "software development", "target_name": "open source", "weight": 18.0, "year": 2021}, {"source": "31", "target": "37", "source_name": "software development", "target_name": "controlled experiments", "weight": 3.0, "year": 2021}, {"source": "31", "target": "38", "source_name": "software development", "target_name": "systematic literature review", "weight": 2.0, "year": 2021}, {"source": "31", "target": "39", "source_name": "software development", "target_name": "team members", "weight": 7.0, "year": 2021}, {"source": "31", "target": "40", "source_name": "software development", "target_name": "knowledge management", "weight": 3.0, "year": 2021}, {"source": "31", "target": "41", "source_name": "software development", "target_name": "technology transfer", "weight": 1.0, "year": 2021}, {"source": "31", "target": "42", "source_name": "software development", "target_name": "quality assurance", "weight": 10.0, "year": 2021}, {"source": "31", "target": "44", "source_name": "software development", "target_name": "empirical study", "weight": 9.0, "year": 2021}, {"source": "31", "target": "45", "source_name": "software development", "target_name": "spatial crowdsourcing", "weight": 1.0, "year": 2021}, {"source": "31", "target": "46", "source_name": "software development", "target_name": "empirical studies", "weight": 3.0, "year": 2021}, {"source": "31", "target": "47", "source_name": "software development", "target_name": "software maintenance", "weight": 7.0, "year": 2021}, {"source": "31", "target": "49", "source_name": "software development", "target_name": "cost estimation", "weight": 6.0, "year": 2021}, {"source": "31", "target": "50", "source_name": "software development", "target_name": "source code", "weight": 7.0, "year": 2021}, {"source": "31", "target": "51", "source_name": "software development", "target_name": "agile software development", "weight": 12.0, "year": 2021}, {"source": "31", "target": "52", "source_name": "software development", "target_name": "neural network", "weight": 4.0, "year": 2021}, {"source": "31", "target": "54", "source_name": "software development", "target_name": "software quality", "weight": 27.0, "year": 2021}, {"source": "31", "target": "55", "source_name": "software development", "target_name": "systems engineering", "weight": 7.0, "year": 2021}, {"source": "31", "target": "56", "source_name": "software development", "target_name": "formal methods", "weight": 6.0, "year": 2021}, {"source": "31", "target": "57", "source_name": "software development", "target_name": "human intelligence", "weight": 2.0, "year": 2021}, {"source": "31", "target": "58", "source_name": "software development", "target_name": "user interface", "weight": 8.0, "year": 2021}, {"source": "31", "target": "60", "source_name": "software development", "target_name": "collective intelligence", "weight": 5.0, "year": 2021}, {"source": "31", "target": "61", "source_name": "software development", "target_name": "extreme programming", "weight": 11.0, "year": 2021}, {"source": "31", "target": "62", "source_name": "software development", "target_name": "information processing", "weight": 2.0, "year": 2021}, {"source": "31", "target": "63", "source_name": "software development", "target_name": "petri nets", "weight": 2.0, "year": 2021}, {"source": "31", "target": "64", "source_name": "software development", "target_name": "undergraduate degree", "weight": 3.0, "year": 2021}, {"source": "31", "target": "66", "source_name": "software development", "target_name": "project management", "weight": 18.0, "year": 2021}, {"source": "31", "target": "67", "source_name": "software development", "target_name": "machine learning", "weight": 5.0, "year": 2021}, {"source": "31", "target": "69", "source_name": "software development", "target_name": "computational intelligence", "weight": 2.0, "year": 2021}, {"source": "31", "target": "70", "source_name": "software development", "target_name": "decision making", "weight": 3.0, "year": 2021}, {"source": "31", "target": "71", "source_name": "software development", "target_name": "software testing", "weight": 10.0, "year": 2021}, {"source": "31", "target": "72", "source_name": "software development", "target_name": "reverse engineering", "weight": 5.0, "year": 2021}, {"source": "31", "target": "73", "source_name": "software development", "target_name": "multi agent systems", "weight": 1.0, "year": 2021}, {"source": "31", "target": "74", "source_name": "software development", "target_name": "software architecture", "weight": 17.0, "year": 2021}, {"source": "31", "target": "75", "source_name": "software development", "target_name": "systematic review", "weight": 3.0, "year": 2021}, {"source": "31", "target": "76", "source_name": "software development", "target_name": "life cycle", "weight": 30.0, "year": 2021}, {"source": "31", "target": "78", "source_name": "software development", "target_name": "process improvement", "weight": 8.0, "year": 2021}, {"source": "31", "target": "80", "source_name": "software development", "target_name": "information systems", "weight": 5.0, "year": 2021}, {"source": "31", "target": "81", "source_name": "software development", "target_name": "carnegie mellon", "weight": 2.0, "year": 2021}, {"source": "31", "target": "82", "source_name": "software development", "target_name": "social network", "weight": 2.0, "year": 2021}, {"source": "31", "target": "83", "source_name": "software development", "target_name": "lessons learned", "weight": 7.0, "year": 2021}, {"source": "31", "target": "85", "source_name": "software development", "target_name": "degree programs", "weight": 1.0, "year": 2021}, {"source": "31", "target": "86", "source_name": "software development", "target_name": "systematic mapping", "weight": 4.0, "year": 2021}, {"source": "31", "target": "91", "source_name": "software development", "target_name": "software design", "weight": 27.0, "year": 2021}, {"source": "31", "target": "92", "source_name": "software development", "target_name": "usability engineering", "weight": 7.0, "year": 2021}, {"source": "31", "target": "93", "source_name": "software development", "target_name": "literature review", "weight": 9.0, "year": 2021}, {"source": "31", "target": "95", "source_name": "software development", "target_name": "human factors", "weight": 5.0, "year": 2021}, {"source": "31", "target": "96", "source_name": "software development", "target_name": "open source software", "weight": 9.0, "year": 2021}, {"source": "31", "target": "97", "source_name": "software development", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "31", "target": "98", "source_name": "software development", "target_name": "data mining", "weight": 5.0, "year": 2021}, {"source": "31", "target": "99", "source_name": "software development", "target_name": "requirements elicitation", "weight": 4.0, "year": 2021}, {"source": "31", "target": "100", "source_name": "software development", "target_name": "artificial intelligence", "weight": 5.0, "year": 2021}, {"source": "31", "target": "101", "source_name": "software development", "target_name": "software reuse", "weight": 9.0, "year": 2021}, {"source": "31", "target": "102", "source_name": "software development", "target_name": "product line", "weight": 23.0, "year": 2021}, {"source": "31", "target": "103", "source_name": "software development", "target_name": "knowledge base", "weight": 5.0, "year": 2021}, {"source": "32", "target": "36", "source_name": "programming languages", "target_name": "open source", "weight": 1.0, "year": 2021}, {"source": "32", "target": "42", "source_name": "programming languages", "target_name": "quality assurance", "weight": 1.0, "year": 2021}, {"source": "32", "target": "49", "source_name": "programming languages", "target_name": "cost estimation", "weight": 1.0, "year": 2021}, {"source": "32", "target": "57", "source_name": "programming languages", "target_name": "human intelligence", "weight": 1.0, "year": 2021}, {"source": "32", "target": "63", "source_name": "programming languages", "target_name": "petri nets", "weight": 1.0, "year": 2021}, {"source": "32", "target": "66", "source_name": "programming languages", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "32", "target": "69", "source_name": "programming languages", "target_name": "computational intelligence", "weight": 1.0, "year": 2021}, {"source": "32", "target": "71", "source_name": "programming languages", "target_name": "software testing", "weight": 1.0, "year": 2021}, {"source": "32", "target": "72", "source_name": "programming languages", "target_name": "reverse engineering", "weight": 1.0, "year": 2021}, {"source": "32", "target": "74", "source_name": "programming languages", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "32", "target": "83", "source_name": "programming languages", "target_name": "lessons learned", "weight": 2.0, "year": 2021}, {"source": "32", "target": "91", "source_name": "programming languages", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "32", "target": "99", "source_name": "programming languages", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "32", "target": "100", "source_name": "programming languages", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "32", "target": "101", "source_name": "programming languages", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "33", "target": "54", "source_name": "fundamental principles", "target_name": "software quality", "weight": 1.0, "year": 2021}, {"source": "33", "target": "61", "source_name": "fundamental principles", "target_name": "extreme programming", "weight": 1.0, "year": 2021}, {"source": "33", "target": "66", "source_name": "fundamental principles", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "33", "target": "74", "source_name": "fundamental principles", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "34", "target": "53", "source_name": "search engines", "target_name": "big data", "weight": 1.0, "year": 2021}, {"source": "34", "target": "57", "source_name": "search engines", "target_name": "human intelligence", "weight": 1.0, "year": 2021}, {"source": "34", "target": "65", "source_name": "search engines", "target_name": "web search", "weight": 4.0, "year": 2021}, {"source": "34", "target": "67", "source_name": "search engines", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "34", "target": "77", "source_name": "search engines", "target_name": "mechanical turk", "weight": 3.0, "year": 2021}, {"source": "34", "target": "82", "source_name": "search engines", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "34", "target": "84", "source_name": "search engines", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "34", "target": "95", "source_name": "search engines", "target_name": "human factors", "weight": 2.0, "year": 2021}, {"source": "34", "target": "97", "source_name": "search engines", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "34", "target": "100", "source_name": "search engines", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "35", "target": "73", "source_name": "multi agent", "target_name": "multi agent systems", "weight": 1.0, "year": 2021}, {"source": "35", "target": "100", "source_name": "multi agent", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "36", "target": "42", "source_name": "open source", "target_name": "quality assurance", "weight": 2.0, "year": 2021}, {"source": "36", "target": "49", "source_name": "open source", "target_name": "cost estimation", "weight": 1.0, "year": 2021}, {"source": "36", "target": "50", "source_name": "open source", "target_name": "source code", "weight": 2.0, "year": 2021}, {"source": "36", "target": "51", "source_name": "open source", "target_name": "agile software development", "weight": 2.0, "year": 2021}, {"source": "36", "target": "57", "source_name": "open source", "target_name": "human intelligence", "weight": 1.0, "year": 2021}, {"source": "36", "target": "58", "source_name": "open source", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "36", "target": "60", "source_name": "open source", "target_name": "collective intelligence", "weight": 2.0, "year": 2021}, {"source": "36", "target": "66", "source_name": "open source", "target_name": "project management", "weight": 2.0, "year": 2021}, {"source": "36", "target": "67", "source_name": "open source", "target_name": "machine learning", "weight": 3.0, "year": 2021}, {"source": "36", "target": "71", "source_name": "open source", "target_name": "software testing", "weight": 1.0, "year": 2021}, {"source": "36", "target": "72", "source_name": "open source", "target_name": "reverse engineering", "weight": 2.0, "year": 2021}, {"source": "36", "target": "76", "source_name": "open source", "target_name": "life cycle", "weight": 2.0, "year": 2021}, {"source": "36", "target": "77", "source_name": "open source", "target_name": "mechanical turk", "weight": 3.0, "year": 2021}, {"source": "36", "target": "78", "source_name": "open source", "target_name": "process improvement", "weight": 1.0, "year": 2021}, {"source": "36", "target": "82", "source_name": "open source", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "36", "target": "91", "source_name": "open source", "target_name": "software design", "weight": 5.0, "year": 2021}, {"source": "36", "target": "93", "source_name": "open source", "target_name": "literature review", "weight": 2.0, "year": 2021}, {"source": "36", "target": "95", "source_name": "open source", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "36", "target": "96", "source_name": "open source", "target_name": "open source software", "weight": 21.0, "year": 2021}, {"source": "36", "target": "99", "source_name": "open source", "target_name": "requirements elicitation", "weight": 2.0, "year": 2021}, {"source": "36", "target": "100", "source_name": "open source", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "37", "target": "38", "source_name": "controlled experiments", "target_name": "systematic literature review", "weight": 1.0, "year": 2021}, {"source": "37", "target": "46", "source_name": "controlled experiments", "target_name": "empirical studies", "weight": 1.0, "year": 2021}, {"source": "37", "target": "57", "source_name": "controlled experiments", "target_name": "human intelligence", "weight": 1.0, "year": 2021}, {"source": "37", "target": "75", "source_name": "controlled experiments", "target_name": "systematic review", "weight": 1.0, "year": 2021}, {"source": "37", "target": "83", "source_name": "controlled experiments", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "38", "target": "46", "source_name": "systematic literature review", "target_name": "empirical studies", "weight": 1.0, "year": 2021}, {"source": "38", "target": "67", "source_name": "systematic literature review", "target_name": "machine learning", "weight": 2.0, "year": 2021}, {"source": "38", "target": "71", "source_name": "systematic literature review", "target_name": "software testing", "weight": 1.0, "year": 2021}, {"source": "38", "target": "75", "source_name": "systematic literature review", "target_name": "systematic review", "weight": 3.0, "year": 2021}, {"source": "38", "target": "80", "source_name": "systematic literature review", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "38", "target": "93", "source_name": "systematic literature review", "target_name": "literature review", "weight": 12.0, "year": 2021}, {"source": "38", "target": "96", "source_name": "systematic literature review", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "39", "target": "51", "source_name": "team members", "target_name": "agile software development", "weight": 1.0, "year": 2021}, {"source": "39", "target": "61", "source_name": "team members", "target_name": "extreme programming", "weight": 1.0, "year": 2021}, {"source": "39", "target": "66", "source_name": "team members", "target_name": "project management", "weight": 4.0, "year": 2021}, {"source": "39", "target": "69", "source_name": "team members", "target_name": "computational intelligence", "weight": 1.0, "year": 2021}, {"source": "39", "target": "72", "source_name": "team members", "target_name": "reverse engineering", "weight": 1.0, "year": 2021}, {"source": "39", "target": "80", "source_name": "team members", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "39", "target": "82", "source_name": "team members", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "39", "target": "97", "source_name": "team members", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "40", "target": "46", "source_name": "knowledge management", "target_name": "empirical studies", "weight": 1.0, "year": 2021}, {"source": "40", "target": "66", "source_name": "knowledge management", "target_name": "project management", "weight": 2.0, "year": 2021}, {"source": "40", "target": "67", "source_name": "knowledge management", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "40", "target": "69", "source_name": "knowledge management", "target_name": "computational intelligence", "weight": 1.0, "year": 2021}, {"source": "40", "target": "70", "source_name": "knowledge management", "target_name": "decision making", "weight": 1.0, "year": 2021}, {"source": "40", "target": "74", "source_name": "knowledge management", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "40", "target": "75", "source_name": "knowledge management", "target_name": "systematic review", "weight": 1.0, "year": 2021}, {"source": "40", "target": "83", "source_name": "knowledge management", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "40", "target": "98", "source_name": "knowledge management", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "40", "target": "100", "source_name": "knowledge management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "40", "target": "103", "source_name": "knowledge management", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "42", "target": "47", "source_name": "quality assurance", "target_name": "software maintenance", "weight": 1.0, "year": 2021}, {"source": "42", "target": "49", "source_name": "quality assurance", "target_name": "cost estimation", "weight": 1.0, "year": 2021}, {"source": "42", "target": "50", "source_name": "quality assurance", "target_name": "source code", "weight": 1.0, "year": 2021}, {"source": "42", "target": "51", "source_name": "quality assurance", "target_name": "agile software development", "weight": 1.0, "year": 2021}, {"source": "42", "target": "54", "source_name": "quality assurance", "target_name": "software quality", "weight": 8.0, "year": 2021}, {"source": "42", "target": "58", "source_name": "quality assurance", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "42", "target": "63", "source_name": "quality assurance", "target_name": "petri nets", "weight": 1.0, "year": 2021}, {"source": "42", "target": "66", "source_name": "quality assurance", "target_name": "project management", "weight": 2.0, "year": 2021}, {"source": "42", "target": "67", "source_name": "quality assurance", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "42", "target": "71", "source_name": "quality assurance", "target_name": "software testing", "weight": 3.0, "year": 2021}, {"source": "42", "target": "72", "source_name": "quality assurance", "target_name": "reverse engineering", "weight": 1.0, "year": 2021}, {"source": "42", "target": "74", "source_name": "quality assurance", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "42", "target": "76", "source_name": "quality assurance", "target_name": "life cycle", "weight": 2.0, "year": 2021}, {"source": "42", "target": "77", "source_name": "quality assurance", "target_name": "mechanical turk", "weight": 2.0, "year": 2021}, {"source": "42", "target": "78", "source_name": "quality assurance", "target_name": "process improvement", "weight": 1.0, "year": 2021}, {"source": "42", "target": "83", "source_name": "quality assurance", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "42", "target": "84", "source_name": "quality assurance", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "42", "target": "91", "source_name": "quality assurance", "target_name": "software design", "weight": 3.0, "year": 2021}, {"source": "42", "target": "93", "source_name": "quality assurance", "target_name": "literature review", "weight": 1.0, "year": 2021}, {"source": "42", "target": "96", "source_name": "quality assurance", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "42", "target": "99", "source_name": "quality assurance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2021}, {"source": "44", "target": "46", "source_name": "empirical study", "target_name": "empirical studies", "weight": 3.0, "year": 2021}, {"source": "44", "target": "50", "source_name": "empirical study", "target_name": "source code", "weight": 1.0, "year": 2021}, {"source": "44", "target": "54", "source_name": "empirical study", "target_name": "software quality", "weight": 1.0, "year": 2021}, {"source": "44", "target": "82", "source_name": "empirical study", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "44", "target": "91", "source_name": "empirical study", "target_name": "software design", "weight": 2.0, "year": 2021}, {"source": "44", "target": "93", "source_name": "empirical study", "target_name": "literature review", "weight": 1.0, "year": 2021}, {"source": "44", "target": "95", "source_name": "empirical study", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "45", "target": "53", "source_name": "spatial crowdsourcing", "target_name": "big data", "weight": 1.0, "year": 2021}, {"source": "45", "target": "75", "source_name": "spatial crowdsourcing", "target_name": "systematic review", "weight": 1.0, "year": 2021}, {"source": "45", "target": "77", "source_name": "spatial crowdsourcing", "target_name": "mechanical turk", "weight": 1.0, "year": 2021}, {"source": "45", "target": "79", "source_name": "spatial crowdsourcing", "target_name": "data management", "weight": 1.0, "year": 2021}, {"source": "45", "target": "90", "source_name": "spatial crowdsourcing", "target_name": "incentive mechanism", "weight": 3.0, "year": 2021}, {"source": "45", "target": "97", "source_name": "spatial crowdsourcing", "target_name": "task assignment", "weight": 7.0, "year": 2021}, {"source": "46", "target": "47", "source_name": "empirical studies", "target_name": "software maintenance", "weight": 1.0, "year": 2021}, {"source": "46", "target": "50", "source_name": "empirical studies", "target_name": "source code", "weight": 2.0, "year": 2021}, {"source": "46", "target": "54", "source_name": "empirical studies", "target_name": "software quality", "weight": 1.0, "year": 2021}, {"source": "46", "target": "57", "source_name": "empirical studies", "target_name": "human intelligence", "weight": 1.0, "year": 2021}, {"source": "46", "target": "71", "source_name": "empirical studies", "target_name": "software testing", "weight": 1.0, "year": 2021}, {"source": "46", "target": "74", "source_name": "empirical studies", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "46", "target": "75", "source_name": "empirical studies", "target_name": "systematic review", "weight": 1.0, "year": 2021}, {"source": "46", "target": "82", "source_name": "empirical studies", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "46", "target": "84", "source_name": "empirical studies", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "46", "target": "86", "source_name": "empirical studies", "target_name": "systematic mapping", "weight": 1.0, "year": 2021}, {"source": "46", "target": "93", "source_name": "empirical studies", "target_name": "literature review", "weight": 3.0, "year": 2021}, {"source": "46", "target": "95", "source_name": "empirical studies", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "47", "target": "49", "source_name": "software maintenance", "target_name": "cost estimation", "weight": 1.0, "year": 2021}, {"source": "47", "target": "50", "source_name": "software maintenance", "target_name": "source code", "weight": 6.0, "year": 2021}, {"source": "47", "target": "54", "source_name": "software maintenance", "target_name": "software quality", "weight": 3.0, "year": 2021}, {"source": "47", "target": "55", "source_name": "software maintenance", "target_name": "systems engineering", "weight": 1.0, "year": 2021}, {"source": "47", "target": "58", "source_name": "software maintenance", "target_name": "user interface", "weight": 2.0, "year": 2021}, {"source": "47", "target": "59", "source_name": "software maintenance", "target_name": "bug reports", "weight": 4.0, "year": 2021}, {"source": "47", "target": "61", "source_name": "software maintenance", "target_name": "extreme programming", "weight": 1.0, "year": 2021}, {"source": "47", "target": "63", "source_name": "software maintenance", "target_name": "petri nets", "weight": 1.0, "year": 2021}, {"source": "47", "target": "66", "source_name": "software maintenance", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "47", "target": "67", "source_name": "software maintenance", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "47", "target": "71", "source_name": "software maintenance", "target_name": "software testing", "weight": 4.0, "year": 2021}, {"source": "47", "target": "72", "source_name": "software maintenance", "target_name": "reverse engineering", "weight": 8.0, "year": 2021}, {"source": "47", "target": "74", "source_name": "software maintenance", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "47", "target": "76", "source_name": "software maintenance", "target_name": "life cycle", "weight": 3.0, "year": 2021}, {"source": "47", "target": "91", "source_name": "software maintenance", "target_name": "software design", "weight": 3.0, "year": 2021}, {"source": "47", "target": "99", "source_name": "software maintenance", "target_name": "requirements elicitation", "weight": 2.0, "year": 2021}, {"source": "47", "target": "100", "source_name": "software maintenance", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "47", "target": "101", "source_name": "software maintenance", "target_name": "software reuse", "weight": 2.0, "year": 2021}, {"source": "47", "target": "102", "source_name": "software maintenance", "target_name": "product line", "weight": 1.0, "year": 2021}, {"source": "49", "target": "52", "source_name": "cost estimation", "target_name": "neural network", "weight": 1.0, "year": 2021}, {"source": "49", "target": "54", "source_name": "cost estimation", "target_name": "software quality", "weight": 1.0, "year": 2021}, {"source": "49", "target": "58", "source_name": "cost estimation", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "49", "target": "61", "source_name": "cost estimation", "target_name": "extreme programming", "weight": 1.0, "year": 2021}, {"source": "49", "target": "66", "source_name": "cost estimation", "target_name": "project management", "weight": 2.0, "year": 2021}, {"source": "49", "target": "69", "source_name": "cost estimation", "target_name": "computational intelligence", "weight": 1.0, "year": 2021}, {"source": "49", "target": "71", "source_name": "cost estimation", "target_name": "software testing", "weight": 2.0, "year": 2021}, {"source": "49", "target": "72", "source_name": "cost estimation", "target_name": "reverse engineering", "weight": 1.0, "year": 2021}, {"source": "49", "target": "91", "source_name": "cost estimation", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "49", "target": "99", "source_name": "cost estimation", "target_name": "requirements elicitation", "weight": 2.0, "year": 2021}, {"source": "49", "target": "101", "source_name": "cost estimation", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "49", "target": "102", "source_name": "cost estimation", "target_name": "product line", "weight": 1.0, "year": 2021}, {"source": "50", "target": "58", "source_name": "source code", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "50", "target": "59", "source_name": "source code", "target_name": "bug reports", "weight": 1.0, "year": 2021}, {"source": "50", "target": "63", "source_name": "source code", "target_name": "petri nets", "weight": 1.0, "year": 2021}, {"source": "50", "target": "66", "source_name": "source code", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "50", "target": "71", "source_name": "source code", "target_name": "software testing", "weight": 2.0, "year": 2021}, {"source": "50", "target": "72", "source_name": "source code", "target_name": "reverse engineering", "weight": 9.0, "year": 2021}, {"source": "50", "target": "74", "source_name": "source code", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "50", "target": "76", "source_name": "source code", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "50", "target": "91", "source_name": "source code", "target_name": "software design", "weight": 5.0, "year": 2021}, {"source": "50", "target": "96", "source_name": "source code", "target_name": "open source software", "weight": 2.0, "year": 2021}, {"source": "50", "target": "99", "source_name": "source code", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "50", "target": "100", "source_name": "source code", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "50", "target": "101", "source_name": "source code", "target_name": "software reuse", "weight": 2.0, "year": 2021}, {"source": "50", "target": "103", "source_name": "source code", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "51", "target": "61", "source_name": "agile software development", "target_name": "extreme programming", "weight": 2.0, "year": 2021}, {"source": "51", "target": "66", "source_name": "agile software development", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "51", "target": "67", "source_name": "agile software development", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "51", "target": "74", "source_name": "agile software development", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "51", "target": "76", "source_name": "agile software development", "target_name": "life cycle", "weight": 4.0, "year": 2021}, {"source": "51", "target": "78", "source_name": "agile software development", "target_name": "process improvement", "weight": 2.0, "year": 2021}, {"source": "51", "target": "80", "source_name": "agile software development", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "51", "target": "86", "source_name": "agile software development", "target_name": "systematic mapping", "weight": 1.0, "year": 2021}, {"source": "51", "target": "92", "source_name": "agile software development", "target_name": "usability engineering", "weight": 2.0, "year": 2021}, {"source": "51", "target": "95", "source_name": "agile software development", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "51", "target": "96", "source_name": "agile software development", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "52", "target": "54", "source_name": "neural network", "target_name": "software quality", "weight": 1.0, "year": 2021}, {"source": "52", "target": "69", "source_name": "neural network", "target_name": "computational intelligence", "weight": 1.0, "year": 2021}, {"source": "52", "target": "79", "source_name": "neural network", "target_name": "data management", "weight": 1.0, "year": 2021}, {"source": "52", "target": "98", "source_name": "neural network", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "53", "target": "60", "source_name": "big data", "target_name": "collective intelligence", "weight": 1.0, "year": 2021}, {"source": "53", "target": "67", "source_name": "big data", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "53", "target": "77", "source_name": "big data", "target_name": "mechanical turk", "weight": 1.0, "year": 2021}, {"source": "53", "target": "79", "source_name": "big data", "target_name": "data management", "weight": 1.0, "year": 2021}, {"source": "53", "target": "82", "source_name": "big data", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "53", "target": "84", "source_name": "big data", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "53", "target": "90", "source_name": "big data", "target_name": "incentive mechanism", "weight": 1.0, "year": 2021}, {"source": "54", "target": "55", "source_name": "software quality", "target_name": "systems engineering", "weight": 2.0, "year": 2021}, {"source": "54", "target": "56", "source_name": "software quality", "target_name": "formal methods", "weight": 2.0, "year": 2021}, {"source": "54", "target": "58", "source_name": "software quality", "target_name": "user interface", "weight": 1.0, "year": 2021}, {"source": "54", "target": "61", "source_name": "software quality", "target_name": "extreme programming", "weight": 4.0, "year": 2021}, {"source": "54", "target": "62", "source_name": "software quality", "target_name": "information processing", "weight": 1.0, "year": 2021}, {"source": "54", "target": "66", "source_name": "software quality", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "54", "target": "67", "source_name": "software quality", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "54", "target": "69", "source_name": "software quality", "target_name": "computational intelligence", "weight": 2.0, "year": 2021}, {"source": "54", "target": "71", "source_name": "software quality", "target_name": "software testing", "weight": 5.0, "year": 2021}, {"source": "54", "target": "72", "source_name": "software quality", "target_name": "reverse engineering", "weight": 1.0, "year": 2021}, {"source": "54", "target": "74", "source_name": "software quality", "target_name": "software architecture", "weight": 3.0, "year": 2021}, {"source": "54", "target": "76", "source_name": "software quality", "target_name": "life cycle", "weight": 4.0, "year": 2021}, {"source": "54", "target": "77", "source_name": "software quality", "target_name": "mechanical turk", "weight": 1.0, "year": 2021}, {"source": "54", "target": "78", "source_name": "software quality", "target_name": "process improvement", "weight": 4.0, "year": 2021}, {"source": "54", "target": "79", "source_name": "software quality", "target_name": "data management", "weight": 1.0, "year": 2021}, {"source": "54", "target": "80", "source_name": "software quality", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "54", "target": "81", "source_name": "software quality", "target_name": "carnegie mellon", "weight": 1.0, "year": 2021}, {"source": "54", "target": "83", "source_name": "software quality", "target_name": "lessons learned", "weight": 5.0, "year": 2021}, {"source": "54", "target": "86", "source_name": "software quality", "target_name": "systematic mapping", "weight": 1.0, "year": 2021}, {"source": "54", "target": "91", "source_name": "software quality", "target_name": "software design", "weight": 4.0, "year": 2021}, {"source": "54", "target": "95", "source_name": "software quality", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "54", "target": "98", "source_name": "software quality", "target_name": "data mining", "weight": 2.0, "year": 2021}, {"source": "54", "target": "99", "source_name": "software quality", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "54", "target": "100", "source_name": "software quality", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "54", "target": "101", "source_name": "software quality", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "55", "target": "56", "source_name": "systems engineering", "target_name": "formal methods", "weight": 1.0, "year": 2021}, {"source": "55", "target": "62", "source_name": "systems engineering", "target_name": "information processing", "weight": 1.0, "year": 2021}, {"source": "55", "target": "66", "source_name": "systems engineering", "target_name": "project management", "weight": 3.0, "year": 2021}, {"source": "55", "target": "67", "source_name": "systems engineering", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "55", "target": "76", "source_name": "systems engineering", "target_name": "life cycle", "weight": 3.0, "year": 2021}, {"source": "55", "target": "78", "source_name": "systems engineering", "target_name": "process improvement", "weight": 1.0, "year": 2021}, {"source": "55", "target": "80", "source_name": "systems engineering", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "55", "target": "82", "source_name": "systems engineering", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "55", "target": "83", "source_name": "systems engineering", "target_name": "lessons learned", "weight": 3.0, "year": 2021}, {"source": "55", "target": "85", "source_name": "systems engineering", "target_name": "degree programs", "weight": 2.0, "year": 2021}, {"source": "55", "target": "87", "source_name": "systems engineering", "target_name": "domain specific", "weight": 1.0, "year": 2021}, {"source": "55", "target": "91", "source_name": "systems engineering", "target_name": "software design", "weight": 5.0, "year": 2021}, {"source": "55", "target": "102", "source_name": "systems engineering", "target_name": "product line", "weight": 1.0, "year": 2021}, {"source": "55", "target": "103", "source_name": "systems engineering", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "56", "target": "61", "source_name": "formal methods", "target_name": "extreme programming", "weight": 1.0, "year": 2021}, {"source": "56", "target": "66", "source_name": "formal methods", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "56", "target": "69", "source_name": "formal methods", "target_name": "computational intelligence", "weight": 1.0, "year": 2021}, {"source": "56", "target": "71", "source_name": "formal methods", "target_name": "software testing", "weight": 2.0, "year": 2021}, {"source": "56", "target": "72", "source_name": "formal methods", "target_name": "reverse engineering", "weight": 1.0, "year": 2021}, {"source": "56", "target": "74", "source_name": "formal methods", "target_name": "software architecture", "weight": 2.0, "year": 2021}, {"source": "56", "target": "91", "source_name": "formal methods", "target_name": "software design", "weight": 4.0, "year": 2021}, {"source": "56", "target": "100", "source_name": "formal methods", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "56", "target": "101", "source_name": "formal methods", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "56", "target": "102", "source_name": "formal methods", "target_name": "product line", "weight": 1.0, "year": 2021}, {"source": "57", "target": "60", "source_name": "human intelligence", "target_name": "collective intelligence", "weight": 3.0, "year": 2021}, {"source": "57", "target": "67", "source_name": "human intelligence", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "57", "target": "69", "source_name": "human intelligence", "target_name": "computational intelligence", "weight": 1.0, "year": 2021}, {"source": "57", "target": "75", "source_name": "human intelligence", "target_name": "systematic review", "weight": 1.0, "year": 2021}, {"source": "57", "target": "77", "source_name": "human intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2021}, {"source": "57", "target": "84", "source_name": "human intelligence", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "57", "target": "94", "source_name": "human intelligence", "target_name": "cultural heritage", "weight": 1.0, "year": 2021}, {"source": "57", "target": "96", "source_name": "human intelligence", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "57", "target": "100", "source_name": "human intelligence", "target_name": "artificial intelligence", "weight": 2.0, "year": 2021}, {"source": "57", "target": "101", "source_name": "human intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "58", "target": "61", "source_name": "user interface", "target_name": "extreme programming", "weight": 1.0, "year": 2021}, {"source": "58", "target": "63", "source_name": "user interface", "target_name": "petri nets", "weight": 1.0, "year": 2021}, {"source": "58", "target": "66", "source_name": "user interface", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "58", "target": "71", "source_name": "user interface", "target_name": "software testing", "weight": 3.0, "year": 2021}, {"source": "58", "target": "72", "source_name": "user interface", "target_name": "reverse engineering", "weight": 1.0, "year": 2021}, {"source": "58", "target": "74", "source_name": "user interface", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "58", "target": "76", "source_name": "user interface", "target_name": "life cycle", "weight": 2.0, "year": 2021}, {"source": "58", "target": "77", "source_name": "user interface", "target_name": "mechanical turk", "weight": 3.0, "year": 2021}, {"source": "58", "target": "83", "source_name": "user interface", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "58", "target": "84", "source_name": "user interface", "target_name": "human computation", "weight": 2.0, "year": 2021}, {"source": "58", "target": "91", "source_name": "user interface", "target_name": "software design", "weight": 4.0, "year": 2021}, {"source": "58", "target": "99", "source_name": "user interface", "target_name": "requirements elicitation", "weight": 2.0, "year": 2021}, {"source": "59", "target": "67", "source_name": "bug reports", "target_name": "machine learning", "weight": 3.0, "year": 2021}, {"source": "59", "target": "71", "source_name": "bug reports", "target_name": "software testing", "weight": 2.0, "year": 2021}, {"source": "60", "target": "71", "source_name": "collective intelligence", "target_name": "software testing", "weight": 4.0, "year": 2021}, {"source": "60", "target": "76", "source_name": "collective intelligence", "target_name": "life cycle", "weight": 2.0, "year": 2021}, {"source": "60", "target": "77", "source_name": "collective intelligence", "target_name": "mechanical turk", "weight": 1.0, "year": 2021}, {"source": "60", "target": "79", "source_name": "collective intelligence", "target_name": "data management", "weight": 1.0, "year": 2021}, {"source": "60", "target": "84", "source_name": "collective intelligence", "target_name": "human computation", "weight": 2.0, "year": 2021}, {"source": "60", "target": "93", "source_name": "collective intelligence", "target_name": "literature review", "weight": 3.0, "year": 2021}, {"source": "60", "target": "96", "source_name": "collective intelligence", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "60", "target": "97", "source_name": "collective intelligence", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "60", "target": "103", "source_name": "collective intelligence", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "61", "target": "66", "source_name": "extreme programming", "target_name": "project management", "weight": 2.0, "year": 2021}, {"source": "61", "target": "71", "source_name": "extreme programming", "target_name": "software testing", "weight": 3.0, "year": 2021}, {"source": "61", "target": "72", "source_name": "extreme programming", "target_name": "reverse engineering", "weight": 1.0, "year": 2021}, {"source": "61", "target": "74", "source_name": "extreme programming", "target_name": "software architecture", "weight": 3.0, "year": 2021}, {"source": "61", "target": "76", "source_name": "extreme programming", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "61", "target": "78", "source_name": "extreme programming", "target_name": "process improvement", "weight": 1.0, "year": 2021}, {"source": "61", "target": "80", "source_name": "extreme programming", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "61", "target": "91", "source_name": "extreme programming", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "61", "target": "99", "source_name": "extreme programming", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "61", "target": "101", "source_name": "extreme programming", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "62", "target": "67", "source_name": "information processing", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "62", "target": "81", "source_name": "information processing", "target_name": "carnegie mellon", "weight": 1.0, "year": 2021}, {"source": "62", "target": "100", "source_name": "information processing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "63", "target": "66", "source_name": "petri nets", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "63", "target": "71", "source_name": "petri nets", "target_name": "software testing", "weight": 1.0, "year": 2021}, {"source": "63", "target": "74", "source_name": "petri nets", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "63", "target": "91", "source_name": "petri nets", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "63", "target": "99", "source_name": "petri nets", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "64", "target": "66", "source_name": "undergraduate degree", "target_name": "project management", "weight": 1.0, "year": 2021}, {"source": "64", "target": "76", "source_name": "undergraduate degree", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "64", "target": "85", "source_name": "undergraduate degree", "target_name": "degree programs", "weight": 3.0, "year": 2021}, {"source": "65", "target": "67", "source_name": "web search", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "66", "target": "67", "source_name": "project management", "target_name": "machine learning", "weight": 1.0, "year": 2021}, {"source": "66", "target": "69", "source_name": "project management", "target_name": "computational intelligence", "weight": 2.0, "year": 2021}, {"source": "66", "target": "71", "source_name": "project management", "target_name": "software testing", "weight": 4.0, "year": 2021}, {"source": "66", "target": "74", "source_name": "project management", "target_name": "software architecture", "weight": 3.0, "year": 2021}, {"source": "66", "target": "76", "source_name": "project management", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "66", "target": "78", "source_name": "project management", "target_name": "process improvement", "weight": 1.0, "year": 2021}, {"source": "66", "target": "80", "source_name": "project management", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "66", "target": "82", "source_name": "project management", "target_name": "social network", "weight": 1.0, "year": 2021}, {"source": "66", "target": "83", "source_name": "project management", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "66", "target": "86", "source_name": "project management", "target_name": "systematic mapping", "weight": 1.0, "year": 2021}, {"source": "66", "target": "91", "source_name": "project management", "target_name": "software design", "weight": 2.0, "year": 2021}, {"source": "66", "target": "93", "source_name": "project management", "target_name": "literature review", "weight": 1.0, "year": 2021}, {"source": "66", "target": "95", "source_name": "project management", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "66", "target": "99", "source_name": "project management", "target_name": "requirements elicitation", "weight": 2.0, "year": 2021}, {"source": "66", "target": "100", "source_name": "project management", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "66", "target": "101", "source_name": "project management", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "66", "target": "103", "source_name": "project management", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "67", "target": "69", "source_name": "machine learning", "target_name": "computational intelligence", "weight": 3.0, "year": 2021}, {"source": "67", "target": "71", "source_name": "machine learning", "target_name": "software testing", "weight": 3.0, "year": 2021}, {"source": "67", "target": "75", "source_name": "machine learning", "target_name": "systematic review", "weight": 1.0, "year": 2021}, {"source": "67", "target": "76", "source_name": "machine learning", "target_name": "life cycle", "weight": 3.0, "year": 2021}, {"source": "67", "target": "79", "source_name": "machine learning", "target_name": "data management", "weight": 1.0, "year": 2021}, {"source": "67", "target": "82", "source_name": "machine learning", "target_name": "social network", "weight": 2.0, "year": 2021}, {"source": "67", "target": "84", "source_name": "machine learning", "target_name": "human computation", "weight": 4.0, "year": 2021}, {"source": "67", "target": "86", "source_name": "machine learning", "target_name": "systematic mapping", "weight": 1.0, "year": 2021}, {"source": "67", "target": "93", "source_name": "machine learning", "target_name": "literature review", "weight": 1.0, "year": 2021}, {"source": "67", "target": "96", "source_name": "machine learning", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "67", "target": "98", "source_name": "machine learning", "target_name": "data mining", "weight": 2.0, "year": 2021}, {"source": "67", "target": "99", "source_name": "machine learning", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "67", "target": "100", "source_name": "machine learning", "target_name": "artificial intelligence", "weight": 5.0, "year": 2021}, {"source": "67", "target": "103", "source_name": "machine learning", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "68", "target": "84", "source_name": "service oriented", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "69", "target": "71", "source_name": "computational intelligence", "target_name": "software testing", "weight": 1.0, "year": 2021}, {"source": "69", "target": "76", "source_name": "computational intelligence", "target_name": "life cycle", "weight": 1.0, "year": 2021}, {"source": "69", "target": "93", "source_name": "computational intelligence", "target_name": "literature review", "weight": 1.0, "year": 2021}, {"source": "69", "target": "98", "source_name": "computational intelligence", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "69", "target": "100", "source_name": "computational intelligence", "target_name": "artificial intelligence", "weight": 3.0, "year": 2021}, {"source": "69", "target": "101", "source_name": "computational intelligence", "target_name": "software reuse", "weight": 1.0, "year": 2021}, {"source": "70", "target": "74", "source_name": "decision making", "target_name": "software architecture", "weight": 1.0, "year": 2021}, {"source": "70", "target": "78", "source_name": "decision making", "target_name": "process improvement", "weight": 1.0, "year": 2021}, {"source": "70", "target": "96", "source_name": "decision making", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "70", "target": "98", "source_name": "decision making", "target_name": "data mining", "weight": 2.0, "year": 2021}, {"source": "71", "target": "72", "source_name": "software testing", "target_name": "reverse engineering", "weight": 1.0, "year": 2021}, {"source": "71", "target": "74", "source_name": "software testing", "target_name": "software architecture", "weight": 3.0, "year": 2021}, {"source": "71", "target": "76", "source_name": "software testing", "target_name": "life cycle", "weight": 2.0, "year": 2021}, {"source": "71", "target": "78", "source_name": "software testing", "target_name": "process improvement", "weight": 1.0, "year": 2021}, {"source": "71", "target": "91", "source_name": "software testing", "target_name": "software design", "weight": 5.0, "year": 2021}, {"source": "71", "target": "93", "source_name": "software testing", "target_name": "literature review", "weight": 2.0, "year": 2021}, {"source": "71", "target": "96", "source_name": "software testing", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "71", "target": "98", "source_name": "software testing", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "71", "target": "99", "source_name": "software testing", "target_name": "requirements elicitation", "weight": 3.0, "year": 2021}, {"source": "71", "target": "100", "source_name": "software testing", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "71", "target": "101", "source_name": "software testing", "target_name": "software reuse", "weight": 2.0, "year": 2021}, {"source": "72", "target": "74", "source_name": "reverse engineering", "target_name": "software architecture", "weight": 3.0, "year": 2021}, {"source": "72", "target": "76", "source_name": "reverse engineering", "target_name": "life cycle", "weight": 3.0, "year": 2021}, {"source": "72", "target": "87", "source_name": "reverse engineering", "target_name": "domain specific", "weight": 1.0, "year": 2021}, {"source": "72", "target": "91", "source_name": "reverse engineering", "target_name": "software design", "weight": 5.0, "year": 2021}, {"source": "72", "target": "96", "source_name": "reverse engineering", "target_name": "open source software", "weight": 2.0, "year": 2021}, {"source": "72", "target": "99", "source_name": "reverse engineering", "target_name": "requirements elicitation", "weight": 3.0, "year": 2021}, {"source": "72", "target": "100", "source_name": "reverse engineering", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "72", "target": "101", "source_name": "reverse engineering", "target_name": "software reuse", "weight": 2.0, "year": 2021}, {"source": "73", "target": "100", "source_name": "multi agent systems", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "74", "target": "76", "source_name": "software architecture", "target_name": "life cycle", "weight": 2.0, "year": 2021}, {"source": "74", "target": "83", "source_name": "software architecture", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "74", "target": "91", "source_name": "software architecture", "target_name": "software design", "weight": 7.0, "year": 2021}, {"source": "74", "target": "93", "source_name": "software architecture", "target_name": "literature review", "weight": 1.0, "year": 2021}, {"source": "74", "target": "98", "source_name": "software architecture", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "74", "target": "99", "source_name": "software architecture", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "74", "target": "101", "source_name": "software architecture", "target_name": "software reuse", "weight": 4.0, "year": 2021}, {"source": "74", "target": "102", "source_name": "software architecture", "target_name": "product line", "weight": 5.0, "year": 2021}, {"source": "75", "target": "86", "source_name": "systematic review", "target_name": "systematic mapping", "weight": 1.0, "year": 2021}, {"source": "75", "target": "90", "source_name": "systematic review", "target_name": "incentive mechanism", "weight": 1.0, "year": 2021}, {"source": "75", "target": "93", "source_name": "systematic review", "target_name": "literature review", "weight": 3.0, "year": 2021}, {"source": "75", "target": "96", "source_name": "systematic review", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "75", "target": "97", "source_name": "systematic review", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "75", "target": "103", "source_name": "systematic review", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "76", "target": "78", "source_name": "life cycle", "target_name": "process improvement", "weight": 3.0, "year": 2021}, {"source": "76", "target": "83", "source_name": "life cycle", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "76", "target": "85", "source_name": "life cycle", "target_name": "degree programs", "weight": 1.0, "year": 2021}, {"source": "76", "target": "86", "source_name": "life cycle", "target_name": "systematic mapping", "weight": 2.0, "year": 2021}, {"source": "76", "target": "91", "source_name": "life cycle", "target_name": "software design", "weight": 6.0, "year": 2021}, {"source": "76", "target": "93", "source_name": "life cycle", "target_name": "literature review", "weight": 1.0, "year": 2021}, {"source": "76", "target": "95", "source_name": "life cycle", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "76", "target": "96", "source_name": "life cycle", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "76", "target": "99", "source_name": "life cycle", "target_name": "requirements elicitation", "weight": 2.0, "year": 2021}, {"source": "76", "target": "100", "source_name": "life cycle", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "76", "target": "102", "source_name": "life cycle", "target_name": "product line", "weight": 1.0, "year": 2021}, {"source": "77", "target": "79", "source_name": "mechanical turk", "target_name": "data management", "weight": 3.0, "year": 2021}, {"source": "77", "target": "80", "source_name": "mechanical turk", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "77", "target": "82", "source_name": "mechanical turk", "target_name": "social network", "weight": 2.0, "year": 2021}, {"source": "77", "target": "83", "source_name": "mechanical turk", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "77", "target": "84", "source_name": "mechanical turk", "target_name": "human computation", "weight": 5.0, "year": 2021}, {"source": "77", "target": "91", "source_name": "mechanical turk", "target_name": "software design", "weight": 3.0, "year": 2021}, {"source": "77", "target": "93", "source_name": "mechanical turk", "target_name": "literature review", "weight": 1.0, "year": 2021}, {"source": "77", "target": "95", "source_name": "mechanical turk", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "77", "target": "96", "source_name": "mechanical turk", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "77", "target": "97", "source_name": "mechanical turk", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "78", "target": "80", "source_name": "process improvement", "target_name": "information systems", "weight": 1.0, "year": 2021}, {"source": "78", "target": "81", "source_name": "process improvement", "target_name": "carnegie mellon", "weight": 2.0, "year": 2021}, {"source": "78", "target": "83", "source_name": "process improvement", "target_name": "lessons learned", "weight": 2.0, "year": 2021}, {"source": "78", "target": "91", "source_name": "process improvement", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "78", "target": "95", "source_name": "process improvement", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "78", "target": "103", "source_name": "process improvement", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "79", "target": "84", "source_name": "data management", "target_name": "human computation", "weight": 2.0, "year": 2021}, {"source": "79", "target": "97", "source_name": "data management", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "79", "target": "98", "source_name": "data management", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "79", "target": "103", "source_name": "data management", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "80", "target": "83", "source_name": "information systems", "target_name": "lessons learned", "weight": 1.0, "year": 2021}, {"source": "80", "target": "84", "source_name": "information systems", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "80", "target": "90", "source_name": "information systems", "target_name": "incentive mechanism", "weight": 1.0, "year": 2021}, {"source": "80", "target": "91", "source_name": "information systems", "target_name": "software design", "weight": 1.0, "year": 2021}, {"source": "80", "target": "93", "source_name": "information systems", "target_name": "literature review", "weight": 4.0, "year": 2021}, {"source": "80", "target": "96", "source_name": "information systems", "target_name": "open source software", "weight": 1.0, "year": 2021}, {"source": "80", "target": "97", "source_name": "information systems", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "80", "target": "98", "source_name": "information systems", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "80", "target": "99", "source_name": "information systems", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "82", "target": "84", "source_name": "social network", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "82", "target": "90", "source_name": "social network", "target_name": "incentive mechanism", "weight": 3.0, "year": 2021}, {"source": "82", "target": "97", "source_name": "social network", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "82", "target": "98", "source_name": "social network", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "82", "target": "99", "source_name": "social network", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "83", "target": "84", "source_name": "lessons learned", "target_name": "human computation", "weight": 1.0, "year": 2021}, {"source": "83", "target": "102", "source_name": "lessons learned", "target_name": "product line", "weight": 1.0, "year": 2021}, {"source": "84", "target": "100", "source_name": "human computation", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "90", "target": "93", "source_name": "incentive mechanism", "target_name": "literature review", "weight": 1.0, "year": 2021}, {"source": "90", "target": "97", "source_name": "incentive mechanism", "target_name": "task assignment", "weight": 5.0, "year": 2021}, {"source": "91", "target": "92", "source_name": "software design", "target_name": "usability engineering", "weight": 1.0, "year": 2021}, {"source": "91", "target": "96", "source_name": "software design", "target_name": "open source software", "weight": 2.0, "year": 2021}, {"source": "91", "target": "98", "source_name": "software design", "target_name": "data mining", "weight": 1.0, "year": 2021}, {"source": "91", "target": "99", "source_name": "software design", "target_name": "requirements elicitation", "weight": 2.0, "year": 2021}, {"source": "91", "target": "100", "source_name": "software design", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "91", "target": "101", "source_name": "software design", "target_name": "software reuse", "weight": 2.0, "year": 2021}, {"source": "92", "target": "95", "source_name": "usability engineering", "target_name": "human factors", "weight": 1.0, "year": 2021}, {"source": "93", "target": "96", "source_name": "literature review", "target_name": "open source software", "weight": 2.0, "year": 2021}, {"source": "93", "target": "97", "source_name": "literature review", "target_name": "task assignment", "weight": 1.0, "year": 2021}, {"source": "93", "target": "103", "source_name": "literature review", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "96", "target": "102", "source_name": "open source software", "target_name": "product line", "weight": 1.0, "year": 2021}, {"source": "98", "target": "99", "source_name": "data mining", "target_name": "requirements elicitation", "weight": 1.0, "year": 2021}, {"source": "98", "target": "100", "source_name": "data mining", "target_name": "artificial intelligence", "weight": 1.0, "year": 2021}, {"source": "98", "target": "103", "source_name": "data mining", "target_name": "knowledge base", "weight": 1.0, "year": 2021}, {"source": "100", "target": "101", "source_name": "artificial intelligence", "target_name": "software reuse", "weight": 2.0, "year": 2021}, {"source": "100", "target": "102", "source_name": "artificial intelligence", "target_name": "product line", "weight": 1.0, "year": 2021}, {"source": "101", "target": "102", "source_name": "software reuse", "target_name": "product line", "weight": 3.0, "year": 2021}]}]}