callback( { "result":{ "query":":facetid:toc:\"db/conf/wicsa/wicsa2012.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"65.94" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"49", "@dc":"49", "@oc":"49", "@id":"43431719", "text":":facetid:toc:db/conf/wicsa/wicsa2012.bht" } }, "hits":{ "@total":"49", "@computed":"49", "@sent":"49", "@first":"0", "hit":[{ "@score":"1", "@id":"4508154", "info":{"authors":{"author":[{"@pid":"121/1895","text":"Sarah Al-Azzani"},{"@pid":"61/4460","text":"Rami Bahsoon"}]},"title":"SecArch: Architecture-level Evaluation and Testing for Security.","venue":"WICSA/ECSA","pages":"51-60","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/Al-AzzaniB12","doi":"10.1109/WICSA-ECSA.212.13","ee":"https://doi.org/10.1109/WICSA-ECSA.212.13","url":"https://dblp.org/rec/conf/wicsa/Al-AzzaniB12"}, "url":"URL#4508154" }, { "@score":"1", "@id":"4508155", "info":{"authors":{"author":[{"@pid":"121/1928","text":"Merve Astekin"},{"@pid":"98/2704","text":"Hasan Sözer"}]},"title":"Utilizing Clone Detection for Domain Analysis of Simulation Systems.","venue":"WICSA/ECSA","pages":"287-291","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/AstekinS12","doi":"10.1109/WICSA-ECSA.212.47","ee":"https://doi.org/10.1109/WICSA-ECSA.212.47","url":"https://dblp.org/rec/conf/wicsa/AstekinS12"}, "url":"URL#4508155" }, { "@score":"1", "@id":"4508157", "info":{"authors":{"author":[{"@pid":"85/10893","text":"Warren Baelen"},{"@pid":"45/6816","text":"Yuanfang Cai"}]},"title":"Simulating Structural Design Evolution of Software.","venue":"WICSA/ECSA","pages":"258-261","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/BaelenC12","doi":"10.1109/WICSA-ECSA.212.41","ee":"https://doi.org/10.1109/WICSA-ECSA.212.41","url":"https://dblp.org/rec/conf/wicsa/BaelenC12"}, "url":"URL#4508157" }, { "@score":"1", "@id":"4508158", "info":{"authors":{"author":[{"@pid":"b/LeonardJBass","text":"Len Bass"},{"@pid":"40/3241","text":"Robert L. Nord"}]},"title":"Understanding the Context of Architecture Evaluation Methods.","venue":"WICSA/ECSA","pages":"277-281","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/BassN12","doi":"10.1109/WICSA-ECSA.212.45","ee":"https://doi.org/10.1109/WICSA-ECSA.212.45","url":"https://dblp.org/rec/conf/wicsa/BassN12"}, "url":"URL#4508158" }, { "@score":"1", "@id":"4508161", "info":{"authors":{"author":[{"@pid":"121/1958","text":"Edmon Begoli"},{"@pid":"88/9024","text":"James L. Horey"}]},"title":"Design Principles for Effective Knowledge Discovery from Big Data.","venue":"WICSA/ECSA","pages":"215-218","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/BegoliH12","doi":"10.1109/WICSA-ECSA.212.32","ee":"https://doi.org/10.1109/WICSA-ECSA.212.32","url":"https://dblp.org/rec/conf/wicsa/BegoliH12"}, "url":"URL#4508161" }, { "@score":"1", "@id":"4508163", "info":{"authors":{"author":[{"@pid":"c/HenrickBaerbakChristensen","text":"Henrik Bærbak Christensen"},{"@pid":"01/4173","text":"Klaus Marius Hansen"}]},"title":"Net4Care: Towards a Mission-Critical Software Ecosystem.","venue":"WICSA/ECSA","pages":"224-228","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/ChristensenH12","doi":"10.1109/WICSA-ECSA.212.34","ee":"https://doi.org/10.1109/WICSA-ECSA.212.34","url":"https://dblp.org/rec/conf/wicsa/ChristensenH12"}, "url":"URL#4508163" }, { "@score":"1", "@id":"4508164", "info":{"authors":{"author":[{"@pid":"c/VittorioCortellessa","text":"Vittorio Cortellessa"},{"@pid":"121/1954","text":"Martina De Sanctis"},{"@pid":"m/AntiniscaDiMarco","text":"Antinisca Di Marco"},{"@pid":"05/410","text":"Catia Trubiani"}]},"title":"Enabling Performance Antipatterns to Arise from an ADL-based Software Architecture.","venue":"WICSA/ECSA","pages":"310-314","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/CortellessaSMT12","doi":"10.1109/WICSA-ECSA.212.51","ee":"https://doi.org/10.1109/WICSA-ECSA.212.51","url":"https://dblp.org/rec/conf/wicsa/CortellessaSMT12"}, "url":"URL#4508164" }, { "@score":"1", "@id":"4508165", "info":{"authors":{"author":[{"@pid":"75/3094","text":"George Edwards"},{"@pid":"51/1518","text":"Yuriy Brun"},{"@pid":"65/1728","text":"Nenad Medvidovic"}]},"title":"Automated Analysis and Code Generation for Domain-Specific Models.","venue":"WICSA/ECSA","pages":"161-170","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/EdwardsBM12","doi":"10.1109/WICSA-ECSA.212.24","ee":"https://doi.org/10.1109/WICSA-ECSA.212.24","url":"https://dblp.org/rec/conf/wicsa/EdwardsBM12"}, "url":"URL#4508165" }, { "@score":"1", "@id":"4508166", "info":{"authors":{"author":[{"@pid":"57/403","text":"Ulrik Eklund"},{"@pid":"60/6845","text":"Jan Bosch"}]},"title":"Architecture for Large-Scale Innovation Experiment Systems.","venue":"WICSA/ECSA","pages":"244-248","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/EklundB12","doi":"10.1109/WICSA-ECSA.212.38","ee":"https://doi.org/10.1109/WICSA-ECSA.212.38","url":"https://dblp.org/rec/conf/wicsa/EklundB12"}, "url":"URL#4508166" }, { "@score":"1", "@id":"4508168", "info":{"authors":{"author":[{"@pid":"84/8383","text":"Veli-Pekka Eloranta"},{"@pid":"121/1891","text":"Otto Hylli"},{"@pid":"81/5833","text":"Timo Vepsäläinen"},{"@pid":"60/3159","text":"Kai Koskimies"}]},"title":"TopDocs: Using Software Architecture Knowledge Base for Generating Topical Documents.","venue":"WICSA/ECSA","pages":"191-195","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/ElorantaHVK12","doi":"10.1109/WICSA-ECSA.212.27","ee":"https://doi.org/10.1109/WICSA-ECSA.212.27","url":"https://dblp.org/rec/conf/wicsa/ElorantaHVK12"}, "url":"URL#4508168" }, { "@score":"1", "@id":"4508170", "info":{"authors":{"author":[{"@pid":"156/3840","text":"João Miguel Franco"},{"@pid":"19/5720","text":"Raul Barbosa"},{"@pid":"37/2644","text":"Mário Zenha Rela"}]},"title":"Automated Reliability Prediction from Formal Architectural Descriptions.","venue":"WICSA/ECSA","pages":"302-309","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/FrancoBR12","doi":"10.1109/WICSA-ECSA.212.50","ee":"https://doi.org/10.1109/WICSA-ECSA.212.50","url":"https://dblp.org/rec/conf/wicsa/FrancoBR12"}, "url":"URL#4508170" }, { "@score":"1", "@id":"4508171", "info":{"authors":{"author":[{"@pid":"19/654","text":"Matthias Galster"},{"@pid":"30/3651","text":"Paris Avgeriou"}]},"title":"A Variability Viewpoint for Enterprise Software Systems.","venue":"WICSA/ECSA","pages":"267-271","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/GalsterA12","doi":"10.1109/WICSA-ECSA.212.43","ee":"https://doi.org/10.1109/WICSA-ECSA.212.43","url":"https://dblp.org/rec/conf/wicsa/GalsterA12"}, "url":"URL#4508171" }, { "@score":"1", "@id":"4508173", "info":{"authors":{"author":[{"@pid":"06/6932","text":"Joshua Garcia"},{"@pid":"78/7055","text":"Ivo Krka"},{"@pid":"65/1728","text":"Nenad Medvidovic"},{"@pid":"20/11411","text":"Chris Douglas"}]},"title":"A Framework for Obtaining the Ground-Truth in Architectural Recovery.","venue":"WICSA/ECSA","pages":"292-296","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/GarciaKMD12","doi":"10.1109/WICSA-ECSA.212.48","ee":"https://doi.org/10.1109/WICSA-ECSA.212.48","url":"https://dblp.org/rec/conf/wicsa/GarciaKMD12"}, "url":"URL#4508173" }, { "@score":"1", "@id":"4508174", "info":{"authors":{"author":[{"@pid":"90/9840","text":"Achraf Ghabi"},{"@pid":"20/5529","text":"Alexander Egyed"}]},"title":"Exploiting Traceability Uncertainty between Architectural Models and Code.","venue":"WICSA/ECSA","pages":"171-180","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/GhabiE12","doi":"10.1109/WICSA-ECSA.212.25","ee":"https://doi.org/10.1109/WICSA-ECSA.212.25","url":"https://dblp.org/rec/conf/wicsa/GhabiE12"}, "url":"URL#4508174" }, { "@score":"1", "@id":"4508175", "info":{"authors":{"author":[{"@pid":"199/7857","text":"Michael Martin Gorlick"},{"@pid":"49/10322","text":"Kyle Strasser"},{"@pid":"t/RichardNTaylor","text":"Richard N. Taylor"}]},"title":"COAST: An Architectural Style for Decentralized On-Demand Tailored Services.","venue":"WICSA/ECSA","pages":"71-80","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/GorlickST12","doi":"10.1109/WICSA-ECSA.212.15","ee":"https://doi.org/10.1109/WICSA-ECSA.212.15","url":"https://dblp.org/rec/conf/wicsa/GorlickST12"}, "url":"URL#4508175" }, { "@score":"1", "@id":"4508176", "info":{"authors":{"author":[{"@pid":"20/11059","text":"Klaas Andries de Graaf"},{"@pid":"97/2801","text":"Antony Tang"},{"@pid":"57/3505-1","text":"Peng Liang 0001"},{"@pid":"v/HansvanVliet","text":"Hans van Vliet"}]},"title":"Ontology-based Software Architecture Documentation.","venue":"WICSA/ECSA","pages":"121-130","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/GraafTLV12","doi":"10.1109/WICSA-ECSA.212.20","ee":"https://doi.org/10.1109/WICSA-ECSA.212.20","url":"https://dblp.org/rec/conf/wicsa/GraafTLV12"}, "url":"URL#4508176" }, { "@score":"1", "@id":"4508177", "info":{"authors":{"author":[{"@pid":"77/6138","text":"Iris Groher"},{"@pid":"w/RainerWeinreich","text":"Rainer Weinreich"}]},"title":"Integrating Variability Management and Software Architecture.","venue":"WICSA/ECSA","pages":"262-266","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/GroherW12","doi":"10.1109/WICSA-ECSA.212.42","ee":"https://doi.org/10.1109/WICSA-ECSA.212.42","url":"https://dblp.org/rec/conf/wicsa/GroherW12"}, "url":"URL#4508177" }, { "@score":"1", "@id":"4508178", "info":{"authors":{"author":[{"@pid":"25/8385","text":"Uwe van Heesch"},{"@pid":"30/3651","text":"Paris Avgeriou"},{"@pid":"25/4088","text":"Rich Hilliard"}]},"title":"Forces on Architecture Decisions - A Viewpoint.","venue":"WICSA/ECSA","pages":"101-110","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/HeeschAH12","doi":"10.1109/WICSA-ECSA.212.18","ee":"https://doi.org/10.1109/WICSA-ECSA.212.18","url":"https://dblp.org/rec/conf/wicsa/HeeschAH12"}, "url":"URL#4508178" }, { "@score":"1", "@id":"4508179", "info":{"authors":{"author":[{"@pid":"37/7630","text":"Wolfgang Heider"},{"@pid":"15/8191","text":"Michael Vierhauser"},{"@pid":"07/9990","text":"Daniela Lettner"},{"@pid":"g/PGrunbacher","text":"Paul Grünbacher"}]},"title":"A Case Study on the Evolution of a Component-based Product Line.","venue":"WICSA/ECSA","pages":"1-10","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/HeiderVLG12","doi":"10.1109/WICSA-ECSA.212.8","ee":"https://doi.org/10.1109/WICSA-ECSA.212.8","url":"https://dblp.org/rec/conf/wicsa/HeiderVLG12"}, "url":"URL#4508179" }, { "@score":"1", "@id":"4508180", "info":{"authors":{"author":[{"@pid":"12/10165","text":"Philipp Herzig"},{"@pid":"96/2790","text":"Michael Ameling"},{"@pid":"51/3949","text":"Alexander Schill"}]},"title":"A Generic Platform for Enterprise Gamification.","venue":"WICSA/ECSA","pages":"219-223","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/HerzigAS12","doi":"10.1109/WICSA-ECSA.212.33","ee":"https://doi.org/10.1109/WICSA-ECSA.212.33","url":"https://dblp.org/rec/conf/wicsa/HerzigAS12"}, "url":"URL#4508180" }, { "@score":"1", "@id":"4508181", "info":{"authors":{"author":[{"@pid":"58/6613","text":"Thomas Heyman"},{"@pid":"82/5205","text":"Riccardo Scandariato"},{"@pid":"13/86","text":"Wouter Joosen"}]},"title":"Reusable Formal Models for Secure Software Architectures.","venue":"WICSA/ECSA","pages":"41-50","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/HeymanSJ12","doi":"10.1109/WICSA-ECSA.212.12","ee":"https://doi.org/10.1109/WICSA-ECSA.212.12","url":"https://dblp.org/rec/conf/wicsa/HeymanSJ12"}, "url":"URL#4508181" }, { "@score":"1", "@id":"4508182", "info":{"authors":{"author":[{"@pid":"25/4088","text":"Rich Hilliard"},{"@pid":"35/1083","text":"Ivano Malavolta"},{"@pid":"m/HenryMuccini","text":"Henry Muccini"},{"@pid":"p/PatrizioPelliccione","text":"Patrizio Pelliccione"}]},"title":"On the Composition and Reuse of Viewpoints across Architecture Frameworks.","venue":"WICSA/ECSA","pages":"131-140","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/HilliardMMP12","doi":"10.1109/WICSA-ECSA.212.21","ee":"https://doi.org/10.1109/WICSA-ECSA.212.21","url":"https://dblp.org/rec/conf/wicsa/HilliardMMP12"}, "url":"URL#4508182" }, { "@score":"1", "@id":"4508183", "info":{"authors":{"author":[{"@pid":"27/7908-1","text":"Markus Jahn 0001"},{"@pid":"r/RickRabister","text":"Rick Rabiser"},{"@pid":"g/PGrunbacher","text":"Paul Grünbacher"},{"@pid":"36/6471","text":"Markus Löberbauer"},{"@pid":"72/3833","text":"Reinhard Wolfinger"},{"@pid":"m/HMossenbock","text":"Hanspeter Mössenböck"}]},"title":"Supporting Model Maintenance in Component-based Product Lines.","venue":"WICSA/ECSA","pages":"21-30","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/JahnRGLWM12","doi":"10.1109/WICSA-ECSA.212.10","ee":"https://doi.org/10.1109/WICSA-ECSA.212.10","url":"https://dblp.org/rec/conf/wicsa/JahnRGLWM12"}, "url":"URL#4508183" }, { "@score":"1", "@id":"4508185", "info":{"authors":{"author":[{"@pid":"119/6379","text":"Selim Kebir"},{"@pid":"s/AbdelhakDjamelSeriai","text":"Abdelhak-Djamel Seriai"},{"@pid":"55/1473","text":"Sylvain Chardigny"},{"@pid":"32/2524","text":"Allaoua Chaoui"}]},"title":"Quality-Centric Approach for Software Component Identification from Object-Oriented Code.","venue":"WICSA/ECSA","pages":"181-190","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/KebirSCC12","doi":"10.1109/WICSA-ECSA.212.26","ee":"https://doi.org/10.1109/WICSA-ECSA.212.26","url":"https://dblp.org/rec/conf/wicsa/KebirSCC12"}, "url":"URL#4508185" }, { "@score":"1", "@id":"4508187", "info":{"authors":{"author":[{"@pid":"26/6077","text":"Thorsten Keuler"},{"@pid":"94/3371","text":"Jens Knodel"},{"@pid":"77/5061","text":"Matthias Naab"},{"@pid":"06/3032","text":"Dominik Rost"}]},"title":"Architecture Engagement Purposes: Towards a Framework for Planning "Just Enough"-Architecting in Software Engineering.","venue":"WICSA/ECSA","pages":"234-238","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/KeulerKNR12","doi":"10.1109/WICSA-ECSA.212.36","ee":"https://doi.org/10.1109/WICSA-ECSA.212.36","url":"https://dblp.org/rec/conf/wicsa/KeulerKNR12"}, "url":"URL#4508187" }, { "@score":"1", "@id":"4508188", "info":{"authors":{"author":[{"@pid":"26/6077","text":"Thorsten Keuler"},{"@pid":"w/StefanWagner7","text":"Stefan Wagner 0007"},{"@pid":"121/1902","text":"Bernhard Winkler"}]},"title":"Architecture-aware Programming in Agile Environments.","venue":"WICSA/ECSA","pages":"229-233","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/KeulerWW12","doi":"10.1109/WICSA-ECSA.212.35","ee":"https://doi.org/10.1109/WICSA-ECSA.212.35","url":"https://dblp.org/rec/conf/wicsa/KeulerWW12"}, "url":"URL#4508188" }, { "@score":"1", "@id":"4508189", "info":{"authors":{"author":[{"@pid":"20/10404","text":"Jaroslav Keznikl"},{"@pid":"38/1502","text":"Tomás Bures"},{"@pid":"02/5377","text":"Frantisek Plásil"},{"@pid":"121/1926","text":"Michal Kit"}]},"title":"Towards Dependable Emergent Ensembles of Components: The DEECo Component Model.","venue":"WICSA/ECSA","pages":"249-252","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/KezniklBPK12","doi":"10.1109/WICSA-ECSA.212.39","ee":"https://doi.org/10.1109/WICSA-ECSA.212.39","url":"https://dblp.org/rec/conf/wicsa/KezniklBPK12"}, "url":"URL#4508189" }, { "@score":"1", "@id":"4508190", "info":{"authors":{"author":[{"@pid":"65/1171","text":"Heiko Koziolek"},{"@pid":"81/4994","text":"Dominik Domis"},{"@pid":"31/27","text":"Thomas Goldschmidt"},{"@pid":"12/94","text":"Philipp Vorst"},{"@pid":"w/RolandJWeiss","text":"Roland J. Weiss"}]},"title":"MORPHOSIS: A Lightweight Method Facilitating Sustainable Software Architectures.","venue":"WICSA/ECSA","pages":"253-257","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/KoziolekDGVW12","doi":"10.1109/WICSA-ECSA.212.40","ee":"https://doi.org/10.1109/WICSA-ECSA.212.40","url":"https://dblp.org/rec/conf/wicsa/KoziolekDGVW12"}, "url":"URL#4508190" }, { "@score":"1", "@id":"4508193", "info":{"authors":{"author":[{"@pid":"28/6197","text":"Ihor Kuz"},{"@pid":"52/4318-1","text":"Liming Zhu 0001"},{"@pid":"b/LeonardJBass","text":"Len Bass"},{"@pid":"s/MarkStaples","text":"Mark Staples"},{"@pid":"47/3196-1","text":"Xiwei Xu 0001"}]},"title":"An Architectural Approach for Cost Effective Trustworthy Systems.","venue":"WICSA/ECSA","pages":"325-328","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/KuzZBSX12","doi":"10.1109/WICSA-ECSA.212.54","ee":"https://doi.org/10.1109/WICSA-ECSA.212.54","url":"https://dblp.org/rec/conf/wicsa/KuzZBSX12"}, "url":"URL#4508193" }, { "@score":"1", "@id":"4508194", "info":{"authors":{"author":[{"@pid":"20/6363","text":"Dimitri Van Landuyt"},{"@pid":"43/5593","text":"Eddy Truyen"},{"@pid":"13/86","text":"Wouter Joosen"}]},"title":"Documenting Early Architectural Assumptions in Scenario-Based Requirements.","venue":"WICSA/ECSA","pages":"329-333","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/LanduytTJ12","doi":"10.1109/WICSA-ECSA.212.55","ee":"https://doi.org/10.1109/WICSA-ECSA.212.55","url":"https://dblp.org/rec/conf/wicsa/LanduytTJ12"}, "url":"URL#4508194" }, { "@score":"1", "@id":"4508196", "info":{"authors":{"author":[{"@pid":"l/VLopezJaquero","text":"Víctor López-Jaquero"},{"@pid":"89/5013","text":"Francisco Montero Simarro"},{"@pid":"52/5696","text":"Elena Navarro 0001"},{"@pid":"121/1921","text":"Antonio Esparcia"},{"@pid":"121/1937","text":"José Antonio Catalán"}]},"title":"Supporting ARINC 653-based Dynamic Reconfiguration.","venue":"WICSA/ECSA","pages":"11-20","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/Lopez-JaqueroMNEC12","doi":"10.1109/WICSA-ECSA.212.9","ee":"https://doi.org/10.1109/WICSA-ECSA.212.9","url":"https://dblp.org/rec/conf/wicsa/Lopez-JaqueroMNEC12"}, "url":"URL#4508196" }, { "@score":"1", "@id":"4508197", "info":{"authors":{"author":[{"@pid":"59/11177","text":"Ioanna Lytra"},{"@pid":"35/820","text":"Stefan Sobernig"},{"@pid":"00/6127","text":"Uwe Zdun"}]},"title":"Architectural Decision Making for Service-Based Platform Integration: A Qualitative Multi-Method Study.","venue":"WICSA/ECSA","pages":"111-120","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/LytraSZ12","doi":"10.1109/WICSA-ECSA.212.19","ee":"https://doi.org/10.1109/WICSA-ECSA.212.19","url":"https://dblp.org/rec/conf/wicsa/LytraSZ12"}, "url":"URL#4508197" }, { "@score":"1", "@id":"4508198", "info":{"authors":{"author":[{"@pid":"121/1915","text":"Cornelia Miesbauer"},{"@pid":"w/RainerWeinreich","text":"Rainer Weinreich"}]},"title":"Capturing and Maintaining Architectural Knowledge Using Context Information.","venue":"WICSA/ECSA","pages":"206-210","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/MiesbauerW12","doi":"10.1109/WICSA-ECSA.212.30","ee":"https://doi.org/10.1109/WICSA-ECSA.212.30","url":"https://dblp.org/rec/conf/wicsa/MiesbauerW12"}, "url":"URL#4508198" }, { "@score":"1", "@id":"4508206", "info":{"authors":{"author":[{"@pid":"67/5214","text":"Elisa Yumi Nakagawa"},{"@pid":"32/153","text":"Flávio Oquendo"},{"@pid":"21/3320-2","text":"Martin Becker 0002"}]},"title":"RAModel: A Reference Model for Reference Architectures.","venue":"WICSA/ECSA","pages":"297-301","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/NakagawaOB12","doi":"10.1109/WICSA-ECSA.212.49","ee":"https://doi.org/10.1109/WICSA-ECSA.212.49","url":"https://dblp.org/rec/conf/wicsa/NakagawaOB12"}, "url":"URL#4508206" }, { "@score":"1", "@id":"4508208", "info":{"authors":{"author":[{"@pid":"26/3310","text":"Peter Newman"},{"@pid":"29/2969","text":"Gerald Kotonya"}]},"title":"A Runtime Resource-aware Architecture for Service-oriented Embedded Systems.","venue":"WICSA/ECSA","pages":"61-70","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/NewmanK12","doi":"10.1109/WICSA-ECSA.212.14","ee":"https://doi.org/10.1109/WICSA-ECSA.212.14","url":"https://dblp.org/rec/conf/wicsa/NewmanK12"}, "url":"URL#4508208" }, { "@score":"1", "@id":"4508209", "info":{"authors":{"author":[{"@pid":"40/3241","text":"Robert L. Nord"},{"@pid":"86/5769","text":"Ipek Ozkaya"},{"@pid":"k/PhilippeKruchten","text":"Philippe Kruchten"},{"@pid":"121/1951","text":"Marco Gonzalez-Rojas"}]},"title":"In Search of a Metric for Managing Architectural Technical Debt.","venue":"WICSA/ECSA","pages":"91-100","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/NordOKG12","doi":"10.1109/WICSA-ECSA.212.17","ee":"https://doi.org/10.1109/WICSA-ECSA.212.17","url":"https://dblp.org/rec/conf/wicsa/NordOKG12"}, "url":"URL#4508209" }, { "@score":"1", "@id":"4508214", "info":{"authors":{"author":[{"@pid":"05/5479","text":"Eltjo R. Poort"},{"@pid":"61/127","text":"Andrew Key"},{"@pid":"w/PeterHNdeWith","text":"Peter H. N. de With"},{"@pid":"v/HansvanVliet","text":"Hans van Vliet"}]},"title":"Issues Dealing with Non-Functional Requirements across the Contractual Divide.","venue":"WICSA/ECSA","pages":"315-319","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/PoortKWV12","doi":"10.1109/WICSA-ECSA.212.52","ee":"https://doi.org/10.1109/WICSA-ECSA.212.52","url":"https://dblp.org/rec/conf/wicsa/PoortKWV12"}, "url":"URL#4508214" }, { "@score":"1", "@id":"4508215", "info":{"authors":{"author":[{"@pid":"84/6777","text":"Christoph Rathfelder"},{"@pid":"62/7091","text":"Stefan Becker"},{"@pid":"32/6737","text":"Klaus Krogmann"},{"@pid":"r/RalfReussner","text":"Ralf H. Reussner"}]},"title":"Workload-aware System Monitoring Using Performance Predictions Applied to a Large-scale E-Mail System.","venue":"WICSA/ECSA","pages":"31-40","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/RathfelderBKR12","doi":"10.1109/WICSA-ECSA.212.11","ee":"https://doi.org/10.1109/WICSA-ECSA.212.11","url":"https://dblp.org/rec/conf/wicsa/RathfelderBKR12"}, "url":"URL#4508215" }, { "@score":"1", "@id":"4508216", "info":{"authors":{"author":[{"@pid":"92/2497","text":"Maryam Razavian"},{"@pid":"40/5357","text":"Patricia Lago"}]},"title":"A Viewpoint for Dealing with Change in Migration to Services.","venue":"WICSA/ECSA","pages":"201-205","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/RazavianL12","doi":"10.1109/WICSA-ECSA.212.29","ee":"https://doi.org/10.1109/WICSA-ECSA.212.29","url":"https://dblp.org/rec/conf/wicsa/RazavianL12"}, "url":"URL#4508216" }, { "@score":"1", "@id":"4508218", "info":{"authors":{"author":[{"@pid":"09/3678","text":"Soumya Simanta"},{"@pid":"51/1171","text":"Grace A. Lewis"},{"@pid":"47/2573","text":"Edwin J. Morris"},{"@pid":"01/4626","text":"Kiryong Ha"},{"@pid":"s/MahadevSatyanarayanan","text":"Mahadev Satyanarayanan"}]},"title":"A Reference Architecture for Mobile Code Offload in Hostile Environments.","venue":"WICSA/ECSA","pages":"282-286","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/SimantaLMHS12","doi":"10.1109/WICSA-ECSA.212.46","ee":"https://doi.org/10.1109/WICSA-ECSA.212.46","url":"https://dblp.org/rec/conf/wicsa/SimantaLMHS12"}, "url":"URL#4508218" }, { "@score":"1", "@id":"4508219", "info":{"authors":{"author":[{"@pid":"78/7880","text":"Moon Ting Su"},{"@pid":"t/EwanDTempero","text":"Ewan D. Tempero"},{"@pid":"h/JohnGHosking","text":"John G. Hosking"},{"@pid":"g/JohnCGrundy","text":"John C. Grundy"}]},"title":"A Study of Architectural Information Foraging in Software Architecture Documents.","venue":"WICSA/ECSA","pages":"141-150","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/SuTHG12","doi":"10.1109/WICSA-ECSA.212.22","ee":"https://doi.org/10.1109/WICSA-ECSA.212.22","url":"https://dblp.org/rec/conf/wicsa/SuTHG12"}, "url":"URL#4508219" }, { "@score":"1", "@id":"4508220", "info":{"authors":{"author":[{"@pid":"64/8384","text":"Guoxin Su"},{"@pid":"13/6525","text":"Mingsheng Ying"},{"@pid":"71/964","text":"Chengqi Zhang"}]},"title":"Semantic Analysis of Component-aspect Dynamism for Connector-based Architecture Styles.","venue":"WICSA/ECSA","pages":"151-160","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/SuYZ12","doi":"10.1109/WICSA-ECSA.212.23","ee":"https://doi.org/10.1109/WICSA-ECSA.212.23","url":"https://dblp.org/rec/conf/wicsa/SuYZ12"}, "url":"URL#4508220" }, { "@score":"1", "@id":"4508221", "info":{"authors":{"author":[{"@pid":"77/5781","text":"Marcin Szlenk"},{"@pid":"03/6007","text":"Andrzej Zalewski"},{"@pid":"27/8385","text":"Szymon Kijas"}]},"title":"Modelling Architectural Decisions under Changing Requirements.","venue":"WICSA/ECSA","pages":"211-214","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/SzlenkZK12","doi":"10.1109/WICSA-ECSA.212.31","ee":"https://doi.org/10.1109/WICSA-ECSA.212.31","url":"https://dblp.org/rec/conf/wicsa/SzlenkZK12"}, "url":"URL#4508221" }, { "@score":"1", "@id":"4508222", "info":{"authors":{"author":[{"@pid":"89/10578","text":"Norbert Tausch"},{"@pid":"93/1672","text":"Michael Philippsen"},{"@pid":"97/9325","text":"Josef Adersberger"}]},"title":"TracQL: A Domain-Specific Language for Traceability Analysis.","venue":"WICSA/ECSA","pages":"320-324","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/TauschPA12","doi":"10.1109/WICSA-ECSA.212.53","ee":"https://doi.org/10.1109/WICSA-ECSA.212.53","url":"https://dblp.org/rec/conf/wicsa/TauschPA12"}, "url":"URL#4508222" }, { "@score":"1", "@id":"4508224", "info":{"authors":{"author":[{"@pid":"63/10780","text":"Minh Tu Ton That"},{"@pid":"76/2342","text":"Salah Sadou"},{"@pid":"32/153","text":"Flávio Oquendo"}]},"title":"Using Architectural Patterns to Define Architectural Decisions.","venue":"WICSA/ECSA","pages":"196-200","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/ThatSO12","doi":"10.1109/WICSA-ECSA.212.28","ee":"https://doi.org/10.1109/WICSA-ECSA.212.28","url":"https://dblp.org/rec/conf/wicsa/ThatSO12"}, "url":"URL#4508224" }, { "@score":"1", "@id":"4508228", "info":{"authors":{"author":[{"@pid":"w/RainerWeinreich","text":"Rainer Weinreich"},{"@pid":"121/1915","text":"Cornelia Miesbauer"},{"@pid":"18/1855","text":"Georg Buchgeher"},{"@pid":"121/1923","text":"Thomas Kriechbaum"}]},"title":"Extracting and Facilitating Architecture in Service-Oriented Software Systems.","venue":"WICSA/ECSA","pages":"81-90","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/WeinreichMBK12","doi":"10.1109/WICSA-ECSA.212.16","ee":"https://doi.org/10.1109/WICSA-ECSA.212.16","url":"https://dblp.org/rec/conf/wicsa/WeinreichMBK12"}, "url":"URL#4508228" }, { "@score":"1", "@id":"4508229", "info":{"authors":{"author":[{"@pid":"75/3848","text":"Eoin Woods"},{"@pid":"97/2590","text":"Rabih Bashroush"}]},"title":"Using an Architecture Description Language to Model a Large-Scale Information System - An Industrial Experience Report.","venue":"WICSA/ECSA","pages":"239-243","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/WoodsB12","doi":"10.1109/WICSA-ECSA.212.37","ee":"https://doi.org/10.1109/WICSA-ECSA.212.37","url":"https://dblp.org/rec/conf/wicsa/WoodsB12"}, "url":"URL#4508229" }, { "@score":"1", "@id":"4508231", "info":{"authors":{"author":[{"@pid":"67/7136","text":"Huaxi (Yulin) Zhang"},{"@pid":"u/ChristelleUrtado","text":"Christelle Urtado"},{"@pid":"v/SylvainVauttier","text":"Sylvain Vauttier"},{"@pid":"97/8704-200","text":"Lei Zhang 0200"},{"@pid":"h/MarianneHuchard","text":"Marianne Huchard"},{"@pid":"09/3729","text":"Bernard Coulette"}]},"title":"Dedal-CDL: Modeling First-class Architectural Changes in Dedal.","venue":"WICSA/ECSA","pages":"272-276","year":"2012","type":"Conference and Workshop Papers","access":"closed","key":"conf/wicsa/ZhangUVZHC12","doi":"10.1109/WICSA-ECSA.212.44","ee":"https://doi.org/10.1109/WICSA-ECSA.212.44","url":"https://dblp.org/rec/conf/wicsa/ZhangUVZHC12"}, "url":"URL#4508231" }, { "@score":"1", "@id":"4517060", "info":{"title":"2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture, WICSA/ECSA 2012, Helsinki, Finland, August 20-24, 2012","venue":"WICSA/ECSA","publisher":"IEEE","year":"2012","type":"Editorship","key":"conf/wicsa/2012","ee":"https://ieeexplore.ieee.org/xpl/conhome/6336551/proceeding","url":"https://dblp.org/rec/conf/wicsa/2012"}, "url":"URL#4517060" } ] } } } )