Evaluation of Software Architectures under Uncertainty A Systematic Literature Review

Context: Evaluating software architectures in uncertain environments raises new challenges, which require continuous approaches. We define continuous evaluation as multiple evaluations of the software architecture that begins at the early stages of the development and is periodically and repeatedly...

Full description

Saved in:
Bibliographic Details
Published inACM transactions on software engineering and methodology Vol. 30; no. 4; pp. 1 - 50
Main Authors Sobhy, Dalia, Bahsoon, Rami, Minku, Leandro, Kazman, Rick
Format Journal Article
LanguageEnglish
Published 01.07.2021
Online AccessGet full text
ISSN1049-331X
1557-7392
DOI10.1145/3464305

Cover

Loading…
Abstract Context: Evaluating software architectures in uncertain environments raises new challenges, which require continuous approaches. We define continuous evaluation as multiple evaluations of the software architecture that begins at the early stages of the development and is periodically and repeatedly performed throughout the lifetime of the software system. Numerous approaches have been developed for continuous evaluation; to handle dynamics and uncertainties at run-time, over the past years, these approaches are still very few, limited, and lack maturity. Objective: This review surveys efforts on architecture evaluation and provides a unified terminology and perspective on the subject. Method: We conducted a systematic literature review to identify and analyse architecture evaluation approaches for uncertainty including continuous and non-continuous, covering work published between 1990–2020. We examined each approach and provided a classification framework for this field. We present an analysis of the results and provide insights regarding open challenges. Major results and conclusions: The survey reveals that most of the existing architecture evaluation approaches typically lack an explicit linkage between design-time and run-time. Additionally, there is a general lack of systematic approaches on how continuous architecture evaluation can be realised or conducted. To remedy this lack, we present a set of necessary requirements for continuous evaluation and describe some examples.
AbstractList Context: Evaluating software architectures in uncertain environments raises new challenges, which require continuous approaches. We define continuous evaluation as multiple evaluations of the software architecture that begins at the early stages of the development and is periodically and repeatedly performed throughout the lifetime of the software system. Numerous approaches have been developed for continuous evaluation; to handle dynamics and uncertainties at run-time, over the past years, these approaches are still very few, limited, and lack maturity. Objective: This review surveys efforts on architecture evaluation and provides a unified terminology and perspective on the subject. Method: We conducted a systematic literature review to identify and analyse architecture evaluation approaches for uncertainty including continuous and non-continuous, covering work published between 1990–2020. We examined each approach and provided a classification framework for this field. We present an analysis of the results and provide insights regarding open challenges. Major results and conclusions: The survey reveals that most of the existing architecture evaluation approaches typically lack an explicit linkage between design-time and run-time. Additionally, there is a general lack of systematic approaches on how continuous architecture evaluation can be realised or conducted. To remedy this lack, we present a set of necessary requirements for continuous evaluation and describe some examples.
Author Bahsoon, Rami
Kazman, Rick
Minku, Leandro
Sobhy, Dalia
Author_xml – sequence: 1
  givenname: Dalia
  orcidid: 0000-0001-9709-7731
  surname: Sobhy
  fullname: Sobhy, Dalia
  organization: Computer Engineering Department, Arab Academy of Science and Technology and Maritime Transport, Egypt
– sequence: 2
  givenname: Rami
  surname: Bahsoon
  fullname: Bahsoon, Rami
  organization: School of Computer Science, University of Birmingham and FRSA, UK
– sequence: 3
  givenname: Leandro
  surname: Minku
  fullname: Minku, Leandro
  organization: School of Computer Science, University of Birmingham, UK
– sequence: 4
  givenname: Rick
  surname: Kazman
  fullname: Kazman, Rick
  organization: Information Technology Management, University of Hawaii and SEI/CMU, USA
BookMark eNplz81KAzEUhuEgFWyreAuzcxXNfzrLUqoVCi604G44zeRgZMxIklF6947ala7OWTx88M7IJPbRE3LJ2TXnSt9IZZRk-oRMudaWWlmLyfgzVVMp-fMZmeX8yhiXTKgpMesP6AYooY9Vj9Vjj-UTkq-Wyb2E4l0Zks_VEFufql10PhUIsRzOySlCl_3F8c7J7nb9tNrQ7cPd_Wq5pU4IXaiRpq0ZttZ4p1BIvkDQ2iur7UJotHyPoOSejQpq1xrJEKxmgMqAQ2fknFz97rrU55w8Nu8pvEE6NJw137nNMXeU9I90ofx0lQSh--e_ABUAV_c
CitedBy_id crossref_primary_10_1145_3579643
crossref_primary_10_1287_isre_2023_1218
crossref_primary_10_56294_dm2025199
crossref_primary_10_1109_ACCESS_2022_3177659
crossref_primary_10_1016_j_infsof_2021_106713
crossref_primary_10_1016_j_jss_2022_111578
crossref_primary_10_1007_s00769_024_01610_0
Cites_doi 10.1145/2168260.2168270
10.1109/ICSA-C.2019.00036
10.1109/WICSA.2011.25
10.1007/978-3-540-87879-7_12
10.1016/j.infsof.2010.03.006
10.1016/0377-2217(90)90118-U
10.1007/978-3-030-29983-5_12
10.1109/TSE.2002.1019479
10.1109/MCI.2015.2471196
10.1145/1809100.1809103
10.1109/ADPRL.2011.5967371
10.1109/ICSA.2018.00013
10.1016/S0164-1212(03)00080-3
10.1145/2379776.2379787
10.1109/52.469759
10.1016/j.infsof.2008.09.009
10.21236/ADA382629
10.1016/j.infsof.2015.03.007
10.1016/j.ress.2004.03.002
10.1145/1062455.1062508
10.1109/ICSE.2001.919103
10.1109/TSC.2017.2711009
10.1109/ICSE.2013.6606550
10.1109/ESC.2007.8
10.1007/978-3-540-24769-2_15
10.1016/j.jss.2006.05.001
10.1145/2889160.2889218
10.1145/3204459
10.5220/0006815404780490
10.1109/TSE.2010.92
10.1145/3183440.3183465
10.1016/j.infsof.2017.03.013
10.1016/j.infsof.2011.06.002
10.1016/j.destud.2010.09.003
10.1109/MS.2004.1293071
10.1016/j.ress.2005.12.011
10.1016/j.jss.2018.12.015
10.5555/2227057.2227071
10.1016/j.jss.2012.04.056
10.1007/s10270-013-0394-9
10.1109/ICSAW.2017.33
10.1145/2000259.2000275
10.1109/APSEC.2004.38
10.5555/1018431.1021454
10.1109/EDOCW.2013.45
10.1109/ICSR.1996.496121
10.1145/1075405.1075411
10.1145/1134285.1134431
10.1145/2000259.2000263
10.1109/WICSA.2008.45
10.1016/S0950-5849(01)00189-6
10.1109/TR.2004.833312
10.1109/ESC.2007.11
10.1016/j.pmcj.2014.09.009
10.1007/978-3-540-24769-2_14
10.1109/SNPD.2007.507
10.1109/ICAC.2016.59
10.1109/ASWEC.2004.1290484
10.1016/j.infsof.2012.08.010
10.1145/1958746.1958823
10.1007/s00158-003-0368-6
10.1109/ICSE.1994.296768
10.1007/s10664-008-9094-4
10.1016/j.jss.2019.110428
10.1109/IoTDI.2015.41
10.1145/2465478.2465487
10.1109/TSE.2012.64
10.1007/s11219-005-4251-0
10.1109/TSE.2013.36
10.1145/503271.503224
10.1109/MIC.2007.21
10.1109/ICSE.2009.5070513
10.1016/j.future.2013.01.010
10.1109/FOSE.2007.19
10.1109/ICSR.1998.685756
10.1007/978-3-642-15114-9_11
10.1016/S0377-2217(03)00272-8
10.1007/s10270-012-0277-5
10.1145/1882291.1882296
10.1109/WICSA.2005.61
10.1145/2897356.2897359
10.1145/2601248.2601268
10.1109/ICSE.2009.5070512
10.5555/2821357.2821384
10.1109/MOMPES.2009.5069138
10.1145/2554850.2555044
10.1007/978-3-319-48992-6_4
10.1057/ejis.2012.26
10.1504/IJSSCI.2008.017590
10.1145/141874.141884
10.1109/TSE.2013.37
10.1109/TSE.2016.2613863
10.1016/j.jss.2008.06.039
10.1109/ECBS.2010.16
10.1145/2025113.2025147
10.1109/SEES.2012.6225486
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1145/3464305
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1557-7392
EndPage 50
ExternalDocumentID 10_1145_3464305
GroupedDBID --Z
-DZ
-~X
.4S
.DC
23M
4.4
5GY
5VS
6J9
8US
AAHTB
AAKMM
AALFJ
AAYFX
AAYXX
ABPEJ
ABPPZ
ACGFO
ACGOD
ACM
ADBCU
ADL
ADMLS
AEBYY
AEFXT
AEJOY
AENEX
AENSD
AETEA
AFWIH
AFWXC
AIAGR
AIKLT
AKRVB
ALMA_UNASSIGNED_HOLDINGS
ARCSS
ASPBG
AVWKF
BDXCO
CCLIF
CITATION
CS3
D0L
EBS
EDO
FEDTE
GUFHI
HGAVV
H~9
I07
LHSKQ
P1C
P2P
PQQKQ
RNS
ROL
TUS
UPT
YR2
ZCA
ID FETCH-LOGICAL-c225t-636d90fd76ec4f2318fa55e4757825f71bfa43b06d9a9cd630fa750af46acfc63
ISSN 1049-331X
IngestDate Thu Jul 03 08:34:28 EDT 2025
Thu Apr 24 23:06:46 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c225t-636d90fd76ec4f2318fa55e4757825f71bfa43b06d9a9cd630fa750af46acfc63
ORCID 0000-0001-9709-7731
PageCount 50
ParticipantIDs crossref_primary_10_1145_3464305
crossref_citationtrail_10_1145_3464305
PublicationCentury 2000
PublicationDate 2021-07-01
PublicationDateYYYYMMDD 2021-07-01
PublicationDate_xml – month: 07
  year: 2021
  text: 2021-07-01
  day: 01
PublicationDecade 2020
PublicationTitle ACM transactions on software engineering and methodology
PublicationYear 2021
References Roy Banani (e_1_2_1_122_1) 2008; 545
Morin Brice (e_1_2_1_107_1) 2009
Boehm Barry W. (e_1_2_1_23_1) 1981
e_1_2_1_111_1
e_1_2_1_115_1
e_1_2_1_138_1
e_1_2_1_89_1
e_1_2_1_62_1
e_1_2_1_141_1
e_1_2_1_85_1
Deswarte Yves (e_1_2_1_51_1) 1998
e_1_2_1_28_1
Sundmaeker Harald (e_1_2_1_130_1) 2010; 3
e_1_2_1_92_1
e_1_2_1_103_1
e_1_2_1_145_1
Fredericks Erik M. (e_1_2_1_67_1)
e_1_2_1_126_1
e_1_2_1_31_1
e_1_2_1_54_1
e_1_2_1_77_1
Berander Patrik (e_1_2_1_21_1) 2005
e_1_2_1_12_1
e_1_2_1_73_1
e_1_2_1_96_1
e_1_2_1_4_1
Software Engineering Standards Committee (e_1_2_1_45_1) 1998
Cheng Betty H. C. (e_1_2_1_39_1) 2014
e_1_2_1_110_1
Calinescu Radu (e_1_2_1_29_1)
Cheng Shang-Wen (e_1_2_1_40_1) 2008
e_1_2_1_58_1
Erdogmus Hakan (e_1_2_1_59_1) 2002
Bass Len (e_1_2_1_17_1)
Jones Lawrence G. (e_1_2_1_81_1) 2001
e_1_2_1_82_1
e_1_2_1_114_1
e_1_2_1_133_1
Heaven William (e_1_2_1_75_1)
e_1_2_1_118_1
e_1_2_1_121_1
e_1_2_1_44_1
e_1_2_1_63_1
e_1_2_1_86_1
e_1_2_1_140_1
Blair Gordon (e_1_2_1_22_1) 2009
e_1_2_1_25_1
e_1_2_1_48_1
Bass Len (e_1_2_1_16_1)
Markowitz Harry (e_1_2_1_100_1) 1981
Samuel (e_1_2_1_119_1) 1985
e_1_2_1_93_1
e_1_2_1_70_1
e_1_2_1_102_1
e_1_2_1_144_1
Fox Craig R. (e_1_2_1_66_1) 2011
e_1_2_1_129_1
e_1_2_1_106_1
e_1_2_1_7_1
e_1_2_1_55_1
e_1_2_1_78_1
e_1_2_1_3_1
Lemos Rogério De (e_1_2_1_47_1) 2013
e_1_2_1_13_1
e_1_2_1_132_1
e_1_2_1_32_1
e_1_2_1_74_1
Amram Martha (e_1_2_1_8_1) 1998
e_1_2_1_36_1
e_1_2_1_136_1
e_1_2_1_60_1
e_1_2_1_113_1
e_1_2_1_117_1
e_1_2_1_41_1
Kiureghian Armen Der (e_1_2_1_50_1) 2009; 31
e_1_2_1_68_1
Trigeorgis Lenos (e_1_2_1_134_1) 1996
e_1_2_1_143_1
e_1_2_1_83_1
e_1_2_1_64_1
e_1_2_1_49_1
e_1_2_1_26_1
Agrawal Amritanshu (e_1_2_1_2_1) 2020; 25
e_1_2_1_109_1
Eloranta Veli-Pekka (e_1_2_1_57_1)
e_1_2_1_101_1
e_1_2_1_71_1
e_1_2_1_90_1
e_1_2_1_105_1
Luehrman Timothy A. (e_1_2_1_97_1) 1998; 76
e_1_2_1_56_1
e_1_2_1_98_1
e_1_2_1_6_1
e_1_2_1_131_1
e_1_2_1_10_1
e_1_2_1_33_1
e_1_2_1_52_1
e_1_2_1_94_1
Cellini Stephanie Riegg (e_1_2_1_34_1) 2015
e_1_2_1_37_1
e_1_2_1_18_1
Baldwin Carliss Young (e_1_2_1_14_1) 2000
e_1_2_1_80_1
e_1_2_1_112_1
e_1_2_1_135_1
e_1_2_1_116_1
Ionita Mugurel T. (e_1_2_1_79_1)
van der Ven Jan Salvador (e_1_2_1_137_1)
Kim Dongsun (e_1_2_1_87_1) 2009
e_1_2_1_42_1
e_1_2_1_65_1
e_1_2_1_88_1
e_1_2_1_46_1
e_1_2_1_61_1
e_1_2_1_84_1
Letier Emmanuel (e_1_2_1_95_1)
Shaw Mary (e_1_2_1_125_1) 1996
e_1_2_1_142_1
e_1_2_1_27_1
Sullivan Kevin J. (e_1_2_1_128_1) 1999; 10
Bennaceur Amel (e_1_2_1_20_1) 2012
e_1_2_1_108_1
e_1_2_1_146_1
Lloyd (e_1_2_1_139_1)
e_1_2_1_91_1
e_1_2_1_123_1
Clements Paul (e_1_2_1_43_1) 2003
Ghezzi Carlo (e_1_2_1_69_1)
e_1_2_1_104_1
e_1_2_1_127_1
e_1_2_1_30_1
Cervantes Humberto (e_1_2_1_35_1)
e_1_2_1_76_1
e_1_2_1_5_1
e_1_2_1_99_1
Barry (e_1_2_1_24_1)
e_1_2_1_72_1
e_1_2_1_1_1
e_1_2_1_11_1
e_1_2_1_53_1
Reussner Ralf H. (e_1_2_1_120_1)
e_1_2_1_38_1
e_1_2_1_15_1
e_1_2_1_19_1
References_xml – volume-title: Clark
  year: 2000
  ident: e_1_2_1_14_1
– ident: e_1_2_1_72_1
  doi: 10.1145/2168260.2168270
– ident: e_1_2_1_28_1
  doi: 10.1109/ICSA-C.2019.00036
– ident: e_1_2_1_64_1
  doi: 10.1109/WICSA.2011.25
– volume-title: Software Engineering for Self-adaptive Systems
  ident: e_1_2_1_75_1
– ident: e_1_2_1_96_1
  doi: 10.1007/978-3-540-87879-7_12
– ident: e_1_2_1_89_1
  doi: 10.1016/j.infsof.2010.03.006
– volume: 31
  start-page: 105
  year: 2009
  ident: e_1_2_1_50_1
  article-title: Aleatory or epistemic? Does it matter?Struct
  publication-title: Saf.
– ident: e_1_2_1_56_1
  doi: 10.1016/0377-2217(90)90118-U
– volume-title: et al
  year: 2013
  ident: e_1_2_1_47_1
– ident: e_1_2_1_48_1
  doi: 10.1007/978-3-030-29983-5_12
– ident: e_1_2_1_53_1
  doi: 10.1109/TSE.2002.1019479
– ident: e_1_2_1_52_1
  doi: 10.1109/MCI.2015.2471196
– volume-title: Lattanze
  year: 2001
  ident: e_1_2_1_81_1
– ident: e_1_2_1_3_1
  doi: 10.1145/1809100.1809103
– ident: e_1_2_1_143_1
  doi: 10.1109/ADPRL.2011.5967371
– ident: e_1_2_1_37_1
  doi: 10.1109/ICSA.2018.00013
– ident: e_1_2_1_19_1
  doi: 10.1016/S0164-1212(03)00080-3
– ident: e_1_2_1_74_1
  doi: 10.1145/2379776.2379787
– ident: e_1_2_1_92_1
  doi: 10.1109/52.469759
– ident: e_1_2_1_88_1
  doi: 10.1016/j.infsof.2008.09.009
– volume-title: et al
  year: 2003
  ident: e_1_2_1_43_1
– ident: e_1_2_1_85_1
  doi: 10.21236/ADA382629
– volume-title: Cowles foundation monograph no. 16
  year: 1981
  ident: e_1_2_1_100_1
– ident: e_1_2_1_116_1
  doi: 10.1016/j.infsof.2015.03.007
– ident: e_1_2_1_111_1
  doi: 10.1016/j.ress.2004.03.002
– ident: e_1_2_1_5_1
  doi: 10.1145/1062455.1062508
– volume-title: Relating System Quality and Software Architecture
  ident: e_1_2_1_57_1
– ident: e_1_2_1_82_1
  doi: 10.1109/ICSE.2001.919103
– ident: e_1_2_1_4_1
  doi: 10.1109/TSC.2017.2711009
– ident: e_1_2_1_63_1
  doi: 10.1109/ICSE.2013.6606550
– ident: e_1_2_1_114_1
  doi: 10.1109/ESC.2007.8
– volume: 10
  start-page: 215
  year: 1999
  ident: e_1_2_1_128_1
  article-title: Software design as an investment activity: A real options perspective
  publication-title: Real Opt. Bus. Strat.: Applic. Decis. Mak.
– ident: e_1_2_1_68_1
  doi: 10.1007/978-3-540-24769-2_15
– ident: e_1_2_1_84_1
  doi: 10.1016/j.jss.2006.05.001
– ident: e_1_2_1_112_1
  doi: 10.1145/2889160.2889218
– ident: e_1_2_1_109_1
  doi: 10.1145/3204459
– ident: e_1_2_1_136_1
  doi: 10.5220/0006815404780490
– ident: e_1_2_1_30_1
  doi: 10.1109/TSE.2010.92
– volume-title: Proceedings of the 4th Working IEEE/IFIP Conference on Software Architecture. IEEE, 277–280
  ident: e_1_2_1_79_1
– ident: e_1_2_1_146_1
  doi: 10.1145/3183440.3183465
– ident: e_1_2_1_98_1
  doi: 10.1016/j.infsof.2017.03.013
– ident: e_1_2_1_27_1
  doi: 10.1016/j.infsof.2011.06.002
– ident: e_1_2_1_15_1
  doi: 10.1016/j.destud.2010.09.003
– volume-title: Software Architecture in Practice
  ident: e_1_2_1_16_1
– ident: e_1_2_1_49_1
  doi: 10.1109/MS.2004.1293071
– volume-title: Real Options: Managerial Flexibility and Strategy in Resource Allocation
  year: 1996
  ident: e_1_2_1_134_1
– ident: e_1_2_1_138_1
  doi: 10.1016/j.ress.2005.12.011
– ident: e_1_2_1_118_1
  doi: 10.1016/j.jss.2018.12.015
– ident: e_1_2_1_142_1
  doi: 10.5555/2227057.2227071
– volume-title: et al
  year: 1981
  ident: e_1_2_1_23_1
– ident: e_1_2_1_103_1
  doi: 10.1016/j.jss.2012.04.056
– ident: e_1_2_1_131_1
  doi: 10.1007/s10270-013-0394-9
– ident: e_1_2_1_77_1
  doi: 10.1109/ICSAW.2017.33
– ident: e_1_2_1_104_1
  doi: 10.1145/2000259.2000275
– ident: e_1_2_1_10_1
  doi: 10.1109/APSEC.2004.38
– volume-title: Rainbow: Cost-effective software architecture-based self-adaptation. ProQuest.
  year: 2008
  ident: e_1_2_1_40_1
– volume-title: Judg. Dec. Mak.
  year: 2011
  ident: e_1_2_1_66_1
– volume-title: et al
  year: 1998
  ident: e_1_2_1_8_1
– ident: e_1_2_1_12_1
  doi: 10.5555/1018431.1021454
– volume-title: Cost-effectiveness and cost-benefit analysis. Handb. Pract. Prog. Eval. 4
  year: 2015
  ident: e_1_2_1_34_1
– ident: e_1_2_1_113_1
  doi: 10.1109/EDOCW.2013.45
– ident: e_1_2_1_65_1
  doi: 10.1109/ICSR.1996.496121
– ident: e_1_2_1_1_1
– ident: e_1_2_1_26_1
  doi: 10.1145/1075405.1075411
– start-page: 1061
  year: 1998
  ident: e_1_2_1_45_1
  article-title: IEEE Standard for a Software Quality Metrics Methodology
  publication-title: Std.
– ident: e_1_2_1_70_1
  doi: 10.1145/1134285.1134431
– volume-title: Designing Software Architectures: A Practical Approach
  ident: e_1_2_1_35_1
– ident: e_1_2_1_90_1
  doi: 10.1145/2000259.2000263
– ident: e_1_2_1_13_1
  doi: 10.1109/WICSA.2008.45
– ident: e_1_2_1_73_1
  doi: 10.1016/S0950-5849(01)00189-6
– ident: e_1_2_1_44_1
  doi: 10.1109/TR.2004.833312
– volume-title: Proceedings of the 3rd International Workshop on Software and Performance. ACM, 179–189
  ident: e_1_2_1_139_1
– ident: e_1_2_1_132_1
  doi: 10.1109/ESC.2007.11
– volume-title: Assurances for Self-Adaptive Systems
  ident: e_1_2_1_29_1
– ident: e_1_2_1_93_1
  doi: 10.1016/j.pmcj.2014.09.009
– volume: 545
  start-page: 82
  year: 2008
  ident: e_1_2_1_122_1
  article-title: Methods for evaluating software architecture: A survey
  publication-title: School Comput. TR
– ident: e_1_2_1_25_1
  doi: 10.1007/978-3-540-24769-2_14
– volume-title: Software Architecture: Perspectives on an Emerging Discipline.
  year: 1996
  ident: e_1_2_1_125_1
– volume-title: Proceedings of the International Workshop on Reuse Economics “Redirecting Reuse Economics” Tuesday.
  year: 2002
  ident: e_1_2_1_59_1
– ident: e_1_2_1_86_1
  doi: 10.1109/SNPD.2007.507
– ident: e_1_2_1_106_1
  doi: 10.1109/ICAC.2016.59
– ident: e_1_2_1_41_1
– volume-title: et al
  year: 2014
  ident: e_1_2_1_39_1
– ident: e_1_2_1_11_1
  doi: 10.1109/ASWEC.2004.1290484
– ident: e_1_2_1_99_1
  doi: 10.1016/j.infsof.2012.08.010
– ident: e_1_2_1_31_1
  doi: 10.1145/1958746.1958823
– ident: e_1_2_1_60_1
– ident: e_1_2_1_101_1
  doi: 10.1007/s00158-003-0368-6
– ident: e_1_2_1_83_1
  doi: 10.1109/ICSE.1994.296768
– volume-title: DevOps: A Software Architect’s Perspective
  ident: e_1_2_1_17_1
– ident: e_1_2_1_94_1
  doi: 10.1007/s10664-008-9094-4
– volume-title: Modeling and Simulating Software Architectures: The Palladio Approach
  ident: e_1_2_1_120_1
– ident: e_1_2_1_127_1
  doi: 10.1016/j.jss.2019.110428
– ident: e_1_2_1_108_1
  doi: 10.1109/IoTDI.2015.41
– volume-title: Dealing with non-functional requirements for adaptive systems via dynamic software product-lines
  ident: e_1_2_1_69_1
– ident: e_1_2_1_121_1
– ident: e_1_2_1_38_1
  doi: 10.1145/3204459
– volume-title: Proceedings of the 36th International Conference on Software Engineering. ACM, 883–894
  ident: e_1_2_1_95_1
– ident: e_1_2_1_135_1
  doi: 10.1145/2465478.2465487
– ident: e_1_2_1_7_1
  doi: 10.1109/TSE.2012.64
– volume-title: Proceedings of the Conference on the Future of Software Engineering. ACM, 319–343
  ident: e_1_2_1_24_1
– ident: e_1_2_1_145_1
  doi: 10.1007/s11219-005-4251-0
– ident: e_1_2_1_46_1
  doi: 10.1109/TSE.2013.36
– ident: e_1_2_1_129_1
  doi: 10.1145/503271.503224
– ident: e_1_2_1_133_1
  doi: 10.1109/MIC.2007.21
– ident: e_1_2_1_58_1
  doi: 10.1109/ICSE.2009.5070513
– ident: e_1_2_1_71_1
  doi: 10.1016/j.future.2013.01.010
– volume: 76
  start-page: 89
  year: 1998
  ident: e_1_2_1_97_1
  article-title: Strategy as a portfolio of real options
  publication-title: Harv. Bus. Rev.
– volume: 25
  start-page: 2099
  year: 2020
  ident: e_1_2_1_2_1
  article-title: Better software analytics via “DUO”: Data mining algorithms using/used-by optimizers.Empir
  publication-title: Softw. Eng.
– volume-title: Rationale Management in Software Engineering
  ident: e_1_2_1_137_1
– ident: e_1_2_1_91_1
  doi: 10.1109/FOSE.2007.19
– ident: e_1_2_1_18_1
  doi: 10.1109/ICSR.1998.685756
– volume-title: France
  year: 2009
  ident: e_1_2_1_22_1
– ident: e_1_2_1_42_1
  doi: 10.1007/978-3-642-15114-9_11
– volume-title: Proceedings of the ICSE Workshop on Software Engineering for Adaptive and Self-managing Systems. IEEE, 76–85
  year: 2009
  ident: e_1_2_1_87_1
– ident: e_1_2_1_144_1
  doi: 10.1016/S0377-2217(03)00272-8
– volume-title: Proceedings of the Conference on Computer Security, Dependability and Assurance. IEEE, 171
  year: 1998
  ident: e_1_2_1_51_1
– ident: e_1_2_1_105_1
  doi: 10.1007/s10270-012-0277-5
– ident: e_1_2_1_55_1
  doi: 10.1145/1882291.1882296
– ident: e_1_2_1_80_1
  doi: 10.1109/WICSA.2005.61
– ident: e_1_2_1_76_1
  doi: 10.1145/2897356.2897359
– ident: e_1_2_1_140_1
  doi: 10.1145/2601248.2601268
– ident: e_1_2_1_32_1
  doi: 10.1109/ICSE.2009.5070512
– volume-title: Proceedings of the International Workshop on Eternal Systems. Springer, 16–29
  year: 2012
  ident: e_1_2_1_20_1
– ident: e_1_2_1_33_1
  doi: 10.5555/2821357.2821384
– volume-title: et al
  year: 2005
  ident: e_1_2_1_21_1
– ident: e_1_2_1_6_1
  doi: 10.1109/MOMPES.2009.5069138
– ident: e_1_2_1_54_1
  doi: 10.1145/2554850.2555044
– ident: e_1_2_1_126_1
  doi: 10.1007/978-3-319-48992-6_4
– ident: e_1_2_1_110_1
  doi: 10.1057/ejis.2012.26
– volume-title: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-managing Systems. ACM, 17–26
  ident: e_1_2_1_67_1
– volume-title: Redwine Jr and William E. Riddle
  year: 1985
  ident: e_1_2_1_119_1
– ident: e_1_2_1_123_1
  doi: 10.1504/IJSSCI.2008.017590
– ident: e_1_2_1_115_1
  doi: 10.1145/141874.141884
– ident: e_1_2_1_61_1
  doi: 10.1109/TSE.2013.37
– ident: e_1_2_1_78_1
  doi: 10.1109/TSE.2016.2613863
– volume: 3
  start-page: 34
  year: 2010
  ident: e_1_2_1_130_1
  article-title: Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things
  publication-title: European Commision
– ident: e_1_2_1_141_1
  doi: 10.1016/j.jss.2008.06.039
– ident: e_1_2_1_117_1
  doi: 10.1109/ECBS.2010.16
– ident: e_1_2_1_62_1
  doi: 10.1145/2025113.2025147
– ident: e_1_2_1_102_1
  doi: 10.1109/SEES.2012.6225486
– volume-title: Computer 42, 10
  year: 2009
  ident: e_1_2_1_107_1
– ident: e_1_2_1_36_1
SSID ssj0013024
Score 2.3908055
SecondaryResourceType review_article
Snippet Context: Evaluating software architectures in uncertain environments raises new challenges, which require continuous approaches. We define continuous...
SourceID crossref
SourceType Enrichment Source
Index Database
StartPage 1
Subtitle A Systematic Literature Review
Title Evaluation of Software Architectures under Uncertainty
Volume 30
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JSwMxFA5aL17cxZ0cxNto2mTSzrFYRcR6cAFvJckkKGgr7Yjgr_dlm5lWweUShiEZmPnevLwl730IHUqaqpSYLJGcdMBBIZYNkJNECGWylsxIS9va4f41v7hnlw_pQ5WKcdUlhTxWH9_WlfwHVbgHuNoq2T8gWz4UbsA14AsjIAzjrzA-K1t1-9oTU7zbg1zdWnJg4ohux2BbKp_8L6byuN3TvmWJiJThLncwic_RVa9Cl2PwbNNTcfjbkfQw9Wy8pAqLPk5GoXBfvDyVoILf--YCAVrYPgmlshcfIQ57E3v0hzhEq1meWY2qE3yNhFJHgAM7S1CnaTtp02xK34Y8zFM9mOCUZ7O2C_tutF_1O7OtMCjjtlNZtYXFtP3MzlaeN_TV1-kgLJxHCy3wKkCPL3R7_avbKu1EPAtyfBVfZW2XnoSlNfOlZofcraCl4EDgrpeGVTSnh2toOZJz4KCr1xGvhAOPDI7CgaeEAzvhwDXh2ED352d3pxdJIMlIFKjiIuGU5xkxeZtrxQxY6x0j0lQzx1OQmnZTGsGoJDBLZCrnlBgBVqIwjMPvqDjdRI3haKi3EBZUiLxJpQaXlDGwZDtcwSqZ0w7NM2q20VF894EKHeQtkcnzYOb7biNcTnz1TVNmp-z8PGUXLVZytocaxfhN74MFWMiDgNsn1vxeDw
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Evaluation+of+Software+Architectures+under+Uncertainty&rft.jtitle=ACM+transactions+on+software+engineering+and+methodology&rft.au=Sobhy%2C+Dalia&rft.au=Bahsoon%2C+Rami&rft.au=Minku%2C+Leandro&rft.au=Kazman%2C+Rick&rft.date=2021-07-01&rft.issn=1049-331X&rft.eissn=1557-7392&rft.volume=30&rft.issue=4&rft.spage=1&rft.epage=50&rft_id=info:doi/10.1145%2F3464305&rft.externalDBID=n%2Fa&rft.externalDocID=10_1145_3464305
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1049-331X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1049-331X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1049-331X&client=summon