Evaluation of Software Architectures under Uncertainty A Systematic Literature Review
Context: Evaluating software architectures in uncertain environments raises new challenges, which require continuous approaches. We define continuous evaluation as multiple evaluations of the software architecture that begins at the early stages of the development and is periodically and repeatedly...
Saved in:
Published in | ACM transactions on software engineering and methodology Vol. 30; no. 4; pp. 1 - 50 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
01.07.2021
|
Online Access | Get full text |
ISSN | 1049-331X 1557-7392 |
DOI | 10.1145/3464305 |
Cover
Loading…
Abstract | Context: Evaluating software architectures in uncertain environments raises new challenges, which require continuous approaches. We define continuous evaluation as multiple evaluations of the software architecture that begins at the early stages of the development and is periodically and repeatedly performed throughout the lifetime of the software system. Numerous approaches have been developed for continuous evaluation; to handle dynamics and uncertainties at run-time, over the past years, these approaches are still very few, limited, and lack maturity. Objective: This review surveys efforts on architecture evaluation and provides a unified terminology and perspective on the subject. Method: We conducted a systematic literature review to identify and analyse architecture evaluation approaches for uncertainty including continuous and non-continuous, covering work published between 1990–2020. We examined each approach and provided a classification framework for this field. We present an analysis of the results and provide insights regarding open challenges. Major results and conclusions: The survey reveals that most of the existing architecture evaluation approaches typically lack an explicit linkage between design-time and run-time. Additionally, there is a general lack of systematic approaches on how continuous architecture evaluation can be realised or conducted. To remedy this lack, we present a set of necessary requirements for continuous evaluation and describe some examples. |
---|---|
AbstractList | Context: Evaluating software architectures in uncertain environments raises new challenges, which require continuous approaches. We define continuous evaluation as multiple evaluations of the software architecture that begins at the early stages of the development and is periodically and repeatedly performed throughout the lifetime of the software system. Numerous approaches have been developed for continuous evaluation; to handle dynamics and uncertainties at run-time, over the past years, these approaches are still very few, limited, and lack maturity. Objective: This review surveys efforts on architecture evaluation and provides a unified terminology and perspective on the subject. Method: We conducted a systematic literature review to identify and analyse architecture evaluation approaches for uncertainty including continuous and non-continuous, covering work published between 1990–2020. We examined each approach and provided a classification framework for this field. We present an analysis of the results and provide insights regarding open challenges. Major results and conclusions: The survey reveals that most of the existing architecture evaluation approaches typically lack an explicit linkage between design-time and run-time. Additionally, there is a general lack of systematic approaches on how continuous architecture evaluation can be realised or conducted. To remedy this lack, we present a set of necessary requirements for continuous evaluation and describe some examples. |
Author | Bahsoon, Rami Kazman, Rick Minku, Leandro Sobhy, Dalia |
Author_xml | – sequence: 1 givenname: Dalia orcidid: 0000-0001-9709-7731 surname: Sobhy fullname: Sobhy, Dalia organization: Computer Engineering Department, Arab Academy of Science and Technology and Maritime Transport, Egypt – sequence: 2 givenname: Rami surname: Bahsoon fullname: Bahsoon, Rami organization: School of Computer Science, University of Birmingham and FRSA, UK – sequence: 3 givenname: Leandro surname: Minku fullname: Minku, Leandro organization: School of Computer Science, University of Birmingham, UK – sequence: 4 givenname: Rick surname: Kazman fullname: Kazman, Rick organization: Information Technology Management, University of Hawaii and SEI/CMU, USA |
BookMark | eNplz81KAzEUhuEgFWyreAuzcxXNfzrLUqoVCi604G44zeRgZMxIklF6947ala7OWTx88M7IJPbRE3LJ2TXnSt9IZZRk-oRMudaWWlmLyfgzVVMp-fMZmeX8yhiXTKgpMesP6AYooY9Vj9Vjj-UTkq-Wyb2E4l0Zks_VEFufql10PhUIsRzOySlCl_3F8c7J7nb9tNrQ7cPd_Wq5pU4IXaiRpq0ZttZ4p1BIvkDQ2iur7UJotHyPoOSejQpq1xrJEKxmgMqAQ2fknFz97rrU55w8Nu8pvEE6NJw137nNMXeU9I90ofx0lQSh--e_ABUAV_c |
CitedBy_id | crossref_primary_10_1145_3579643 crossref_primary_10_1287_isre_2023_1218 crossref_primary_10_56294_dm2025199 crossref_primary_10_1109_ACCESS_2022_3177659 crossref_primary_10_1016_j_infsof_2021_106713 crossref_primary_10_1016_j_jss_2022_111578 crossref_primary_10_1007_s00769_024_01610_0 |
Cites_doi | 10.1145/2168260.2168270 10.1109/ICSA-C.2019.00036 10.1109/WICSA.2011.25 10.1007/978-3-540-87879-7_12 10.1016/j.infsof.2010.03.006 10.1016/0377-2217(90)90118-U 10.1007/978-3-030-29983-5_12 10.1109/TSE.2002.1019479 10.1109/MCI.2015.2471196 10.1145/1809100.1809103 10.1109/ADPRL.2011.5967371 10.1109/ICSA.2018.00013 10.1016/S0164-1212(03)00080-3 10.1145/2379776.2379787 10.1109/52.469759 10.1016/j.infsof.2008.09.009 10.21236/ADA382629 10.1016/j.infsof.2015.03.007 10.1016/j.ress.2004.03.002 10.1145/1062455.1062508 10.1109/ICSE.2001.919103 10.1109/TSC.2017.2711009 10.1109/ICSE.2013.6606550 10.1109/ESC.2007.8 10.1007/978-3-540-24769-2_15 10.1016/j.jss.2006.05.001 10.1145/2889160.2889218 10.1145/3204459 10.5220/0006815404780490 10.1109/TSE.2010.92 10.1145/3183440.3183465 10.1016/j.infsof.2017.03.013 10.1016/j.infsof.2011.06.002 10.1016/j.destud.2010.09.003 10.1109/MS.2004.1293071 10.1016/j.ress.2005.12.011 10.1016/j.jss.2018.12.015 10.5555/2227057.2227071 10.1016/j.jss.2012.04.056 10.1007/s10270-013-0394-9 10.1109/ICSAW.2017.33 10.1145/2000259.2000275 10.1109/APSEC.2004.38 10.5555/1018431.1021454 10.1109/EDOCW.2013.45 10.1109/ICSR.1996.496121 10.1145/1075405.1075411 10.1145/1134285.1134431 10.1145/2000259.2000263 10.1109/WICSA.2008.45 10.1016/S0950-5849(01)00189-6 10.1109/TR.2004.833312 10.1109/ESC.2007.11 10.1016/j.pmcj.2014.09.009 10.1007/978-3-540-24769-2_14 10.1109/SNPD.2007.507 10.1109/ICAC.2016.59 10.1109/ASWEC.2004.1290484 10.1016/j.infsof.2012.08.010 10.1145/1958746.1958823 10.1007/s00158-003-0368-6 10.1109/ICSE.1994.296768 10.1007/s10664-008-9094-4 10.1016/j.jss.2019.110428 10.1109/IoTDI.2015.41 10.1145/2465478.2465487 10.1109/TSE.2012.64 10.1007/s11219-005-4251-0 10.1109/TSE.2013.36 10.1145/503271.503224 10.1109/MIC.2007.21 10.1109/ICSE.2009.5070513 10.1016/j.future.2013.01.010 10.1109/FOSE.2007.19 10.1109/ICSR.1998.685756 10.1007/978-3-642-15114-9_11 10.1016/S0377-2217(03)00272-8 10.1007/s10270-012-0277-5 10.1145/1882291.1882296 10.1109/WICSA.2005.61 10.1145/2897356.2897359 10.1145/2601248.2601268 10.1109/ICSE.2009.5070512 10.5555/2821357.2821384 10.1109/MOMPES.2009.5069138 10.1145/2554850.2555044 10.1007/978-3-319-48992-6_4 10.1057/ejis.2012.26 10.1504/IJSSCI.2008.017590 10.1145/141874.141884 10.1109/TSE.2013.37 10.1109/TSE.2016.2613863 10.1016/j.jss.2008.06.039 10.1109/ECBS.2010.16 10.1145/2025113.2025147 10.1109/SEES.2012.6225486 |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.1145/3464305 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1557-7392 |
EndPage | 50 |
ExternalDocumentID | 10_1145_3464305 |
GroupedDBID | --Z -DZ -~X .4S .DC 23M 4.4 5GY 5VS 6J9 8US AAHTB AAKMM AALFJ AAYFX AAYXX ABPEJ ABPPZ ACGFO ACGOD ACM ADBCU ADL ADMLS AEBYY AEFXT AEJOY AENEX AENSD AETEA AFWIH AFWXC AIAGR AIKLT AKRVB ALMA_UNASSIGNED_HOLDINGS ARCSS ASPBG AVWKF BDXCO CCLIF CITATION CS3 D0L EBS EDO FEDTE GUFHI HGAVV H~9 I07 LHSKQ P1C P2P PQQKQ RNS ROL TUS UPT YR2 ZCA |
ID | FETCH-LOGICAL-c225t-636d90fd76ec4f2318fa55e4757825f71bfa43b06d9a9cd630fa750af46acfc63 |
ISSN | 1049-331X |
IngestDate | Thu Jul 03 08:34:28 EDT 2025 Thu Apr 24 23:06:46 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c225t-636d90fd76ec4f2318fa55e4757825f71bfa43b06d9a9cd630fa750af46acfc63 |
ORCID | 0000-0001-9709-7731 |
PageCount | 50 |
ParticipantIDs | crossref_primary_10_1145_3464305 crossref_citationtrail_10_1145_3464305 |
PublicationCentury | 2000 |
PublicationDate | 2021-07-01 |
PublicationDateYYYYMMDD | 2021-07-01 |
PublicationDate_xml | – month: 07 year: 2021 text: 2021-07-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | ACM transactions on software engineering and methodology |
PublicationYear | 2021 |
References | Roy Banani (e_1_2_1_122_1) 2008; 545 Morin Brice (e_1_2_1_107_1) 2009 Boehm Barry W. (e_1_2_1_23_1) 1981 e_1_2_1_111_1 e_1_2_1_115_1 e_1_2_1_138_1 e_1_2_1_89_1 e_1_2_1_62_1 e_1_2_1_141_1 e_1_2_1_85_1 Deswarte Yves (e_1_2_1_51_1) 1998 e_1_2_1_28_1 Sundmaeker Harald (e_1_2_1_130_1) 2010; 3 e_1_2_1_92_1 e_1_2_1_103_1 e_1_2_1_145_1 Fredericks Erik M. (e_1_2_1_67_1) e_1_2_1_126_1 e_1_2_1_31_1 e_1_2_1_54_1 e_1_2_1_77_1 Berander Patrik (e_1_2_1_21_1) 2005 e_1_2_1_12_1 e_1_2_1_73_1 e_1_2_1_96_1 e_1_2_1_4_1 Software Engineering Standards Committee (e_1_2_1_45_1) 1998 Cheng Betty H. C. (e_1_2_1_39_1) 2014 e_1_2_1_110_1 Calinescu Radu (e_1_2_1_29_1) Cheng Shang-Wen (e_1_2_1_40_1) 2008 e_1_2_1_58_1 Erdogmus Hakan (e_1_2_1_59_1) 2002 Bass Len (e_1_2_1_17_1) Jones Lawrence G. (e_1_2_1_81_1) 2001 e_1_2_1_82_1 e_1_2_1_114_1 e_1_2_1_133_1 Heaven William (e_1_2_1_75_1) e_1_2_1_118_1 e_1_2_1_121_1 e_1_2_1_44_1 e_1_2_1_63_1 e_1_2_1_86_1 e_1_2_1_140_1 Blair Gordon (e_1_2_1_22_1) 2009 e_1_2_1_25_1 e_1_2_1_48_1 Bass Len (e_1_2_1_16_1) Markowitz Harry (e_1_2_1_100_1) 1981 Samuel (e_1_2_1_119_1) 1985 e_1_2_1_93_1 e_1_2_1_70_1 e_1_2_1_102_1 e_1_2_1_144_1 Fox Craig R. (e_1_2_1_66_1) 2011 e_1_2_1_129_1 e_1_2_1_106_1 e_1_2_1_7_1 e_1_2_1_55_1 e_1_2_1_78_1 e_1_2_1_3_1 Lemos Rogério De (e_1_2_1_47_1) 2013 e_1_2_1_13_1 e_1_2_1_132_1 e_1_2_1_32_1 e_1_2_1_74_1 Amram Martha (e_1_2_1_8_1) 1998 e_1_2_1_36_1 e_1_2_1_136_1 e_1_2_1_60_1 e_1_2_1_113_1 e_1_2_1_117_1 e_1_2_1_41_1 Kiureghian Armen Der (e_1_2_1_50_1) 2009; 31 e_1_2_1_68_1 Trigeorgis Lenos (e_1_2_1_134_1) 1996 e_1_2_1_143_1 e_1_2_1_83_1 e_1_2_1_64_1 e_1_2_1_49_1 e_1_2_1_26_1 Agrawal Amritanshu (e_1_2_1_2_1) 2020; 25 e_1_2_1_109_1 Eloranta Veli-Pekka (e_1_2_1_57_1) e_1_2_1_101_1 e_1_2_1_71_1 e_1_2_1_90_1 e_1_2_1_105_1 Luehrman Timothy A. (e_1_2_1_97_1) 1998; 76 e_1_2_1_56_1 e_1_2_1_98_1 e_1_2_1_6_1 e_1_2_1_131_1 e_1_2_1_10_1 e_1_2_1_33_1 e_1_2_1_52_1 e_1_2_1_94_1 Cellini Stephanie Riegg (e_1_2_1_34_1) 2015 e_1_2_1_37_1 e_1_2_1_18_1 Baldwin Carliss Young (e_1_2_1_14_1) 2000 e_1_2_1_80_1 e_1_2_1_112_1 e_1_2_1_135_1 e_1_2_1_116_1 Ionita Mugurel T. (e_1_2_1_79_1) van der Ven Jan Salvador (e_1_2_1_137_1) Kim Dongsun (e_1_2_1_87_1) 2009 e_1_2_1_42_1 e_1_2_1_65_1 e_1_2_1_88_1 e_1_2_1_46_1 e_1_2_1_61_1 e_1_2_1_84_1 Letier Emmanuel (e_1_2_1_95_1) Shaw Mary (e_1_2_1_125_1) 1996 e_1_2_1_142_1 e_1_2_1_27_1 Sullivan Kevin J. (e_1_2_1_128_1) 1999; 10 Bennaceur Amel (e_1_2_1_20_1) 2012 e_1_2_1_108_1 e_1_2_1_146_1 Lloyd (e_1_2_1_139_1) e_1_2_1_91_1 e_1_2_1_123_1 Clements Paul (e_1_2_1_43_1) 2003 Ghezzi Carlo (e_1_2_1_69_1) e_1_2_1_104_1 e_1_2_1_127_1 e_1_2_1_30_1 Cervantes Humberto (e_1_2_1_35_1) e_1_2_1_76_1 e_1_2_1_5_1 e_1_2_1_99_1 Barry (e_1_2_1_24_1) e_1_2_1_72_1 e_1_2_1_1_1 e_1_2_1_11_1 e_1_2_1_53_1 Reussner Ralf H. (e_1_2_1_120_1) e_1_2_1_38_1 e_1_2_1_15_1 e_1_2_1_19_1 |
References_xml | – volume-title: Clark year: 2000 ident: e_1_2_1_14_1 – ident: e_1_2_1_72_1 doi: 10.1145/2168260.2168270 – ident: e_1_2_1_28_1 doi: 10.1109/ICSA-C.2019.00036 – ident: e_1_2_1_64_1 doi: 10.1109/WICSA.2011.25 – volume-title: Software Engineering for Self-adaptive Systems ident: e_1_2_1_75_1 – ident: e_1_2_1_96_1 doi: 10.1007/978-3-540-87879-7_12 – ident: e_1_2_1_89_1 doi: 10.1016/j.infsof.2010.03.006 – volume: 31 start-page: 105 year: 2009 ident: e_1_2_1_50_1 article-title: Aleatory or epistemic? Does it matter?Struct publication-title: Saf. – ident: e_1_2_1_56_1 doi: 10.1016/0377-2217(90)90118-U – volume-title: et al year: 2013 ident: e_1_2_1_47_1 – ident: e_1_2_1_48_1 doi: 10.1007/978-3-030-29983-5_12 – ident: e_1_2_1_53_1 doi: 10.1109/TSE.2002.1019479 – ident: e_1_2_1_52_1 doi: 10.1109/MCI.2015.2471196 – volume-title: Lattanze year: 2001 ident: e_1_2_1_81_1 – ident: e_1_2_1_3_1 doi: 10.1145/1809100.1809103 – ident: e_1_2_1_143_1 doi: 10.1109/ADPRL.2011.5967371 – ident: e_1_2_1_37_1 doi: 10.1109/ICSA.2018.00013 – ident: e_1_2_1_19_1 doi: 10.1016/S0164-1212(03)00080-3 – ident: e_1_2_1_74_1 doi: 10.1145/2379776.2379787 – ident: e_1_2_1_92_1 doi: 10.1109/52.469759 – ident: e_1_2_1_88_1 doi: 10.1016/j.infsof.2008.09.009 – volume-title: et al year: 2003 ident: e_1_2_1_43_1 – ident: e_1_2_1_85_1 doi: 10.21236/ADA382629 – volume-title: Cowles foundation monograph no. 16 year: 1981 ident: e_1_2_1_100_1 – ident: e_1_2_1_116_1 doi: 10.1016/j.infsof.2015.03.007 – ident: e_1_2_1_111_1 doi: 10.1016/j.ress.2004.03.002 – ident: e_1_2_1_5_1 doi: 10.1145/1062455.1062508 – volume-title: Relating System Quality and Software Architecture ident: e_1_2_1_57_1 – ident: e_1_2_1_82_1 doi: 10.1109/ICSE.2001.919103 – ident: e_1_2_1_4_1 doi: 10.1109/TSC.2017.2711009 – ident: e_1_2_1_63_1 doi: 10.1109/ICSE.2013.6606550 – ident: e_1_2_1_114_1 doi: 10.1109/ESC.2007.8 – volume: 10 start-page: 215 year: 1999 ident: e_1_2_1_128_1 article-title: Software design as an investment activity: A real options perspective publication-title: Real Opt. Bus. Strat.: Applic. Decis. Mak. – ident: e_1_2_1_68_1 doi: 10.1007/978-3-540-24769-2_15 – ident: e_1_2_1_84_1 doi: 10.1016/j.jss.2006.05.001 – ident: e_1_2_1_112_1 doi: 10.1145/2889160.2889218 – ident: e_1_2_1_109_1 doi: 10.1145/3204459 – ident: e_1_2_1_136_1 doi: 10.5220/0006815404780490 – ident: e_1_2_1_30_1 doi: 10.1109/TSE.2010.92 – volume-title: Proceedings of the 4th Working IEEE/IFIP Conference on Software Architecture. IEEE, 277–280 ident: e_1_2_1_79_1 – ident: e_1_2_1_146_1 doi: 10.1145/3183440.3183465 – ident: e_1_2_1_98_1 doi: 10.1016/j.infsof.2017.03.013 – ident: e_1_2_1_27_1 doi: 10.1016/j.infsof.2011.06.002 – ident: e_1_2_1_15_1 doi: 10.1016/j.destud.2010.09.003 – volume-title: Software Architecture in Practice ident: e_1_2_1_16_1 – ident: e_1_2_1_49_1 doi: 10.1109/MS.2004.1293071 – volume-title: Real Options: Managerial Flexibility and Strategy in Resource Allocation year: 1996 ident: e_1_2_1_134_1 – ident: e_1_2_1_138_1 doi: 10.1016/j.ress.2005.12.011 – ident: e_1_2_1_118_1 doi: 10.1016/j.jss.2018.12.015 – ident: e_1_2_1_142_1 doi: 10.5555/2227057.2227071 – volume-title: et al year: 1981 ident: e_1_2_1_23_1 – ident: e_1_2_1_103_1 doi: 10.1016/j.jss.2012.04.056 – ident: e_1_2_1_131_1 doi: 10.1007/s10270-013-0394-9 – ident: e_1_2_1_77_1 doi: 10.1109/ICSAW.2017.33 – ident: e_1_2_1_104_1 doi: 10.1145/2000259.2000275 – ident: e_1_2_1_10_1 doi: 10.1109/APSEC.2004.38 – volume-title: Rainbow: Cost-effective software architecture-based self-adaptation. ProQuest. year: 2008 ident: e_1_2_1_40_1 – volume-title: Judg. Dec. Mak. year: 2011 ident: e_1_2_1_66_1 – volume-title: et al year: 1998 ident: e_1_2_1_8_1 – ident: e_1_2_1_12_1 doi: 10.5555/1018431.1021454 – volume-title: Cost-effectiveness and cost-benefit analysis. Handb. Pract. Prog. Eval. 4 year: 2015 ident: e_1_2_1_34_1 – ident: e_1_2_1_113_1 doi: 10.1109/EDOCW.2013.45 – ident: e_1_2_1_65_1 doi: 10.1109/ICSR.1996.496121 – ident: e_1_2_1_1_1 – ident: e_1_2_1_26_1 doi: 10.1145/1075405.1075411 – start-page: 1061 year: 1998 ident: e_1_2_1_45_1 article-title: IEEE Standard for a Software Quality Metrics Methodology publication-title: Std. – ident: e_1_2_1_70_1 doi: 10.1145/1134285.1134431 – volume-title: Designing Software Architectures: A Practical Approach ident: e_1_2_1_35_1 – ident: e_1_2_1_90_1 doi: 10.1145/2000259.2000263 – ident: e_1_2_1_13_1 doi: 10.1109/WICSA.2008.45 – ident: e_1_2_1_73_1 doi: 10.1016/S0950-5849(01)00189-6 – ident: e_1_2_1_44_1 doi: 10.1109/TR.2004.833312 – volume-title: Proceedings of the 3rd International Workshop on Software and Performance. ACM, 179–189 ident: e_1_2_1_139_1 – ident: e_1_2_1_132_1 doi: 10.1109/ESC.2007.11 – volume-title: Assurances for Self-Adaptive Systems ident: e_1_2_1_29_1 – ident: e_1_2_1_93_1 doi: 10.1016/j.pmcj.2014.09.009 – volume: 545 start-page: 82 year: 2008 ident: e_1_2_1_122_1 article-title: Methods for evaluating software architecture: A survey publication-title: School Comput. TR – ident: e_1_2_1_25_1 doi: 10.1007/978-3-540-24769-2_14 – volume-title: Software Architecture: Perspectives on an Emerging Discipline. year: 1996 ident: e_1_2_1_125_1 – volume-title: Proceedings of the International Workshop on Reuse Economics “Redirecting Reuse Economics” Tuesday. year: 2002 ident: e_1_2_1_59_1 – ident: e_1_2_1_86_1 doi: 10.1109/SNPD.2007.507 – ident: e_1_2_1_106_1 doi: 10.1109/ICAC.2016.59 – ident: e_1_2_1_41_1 – volume-title: et al year: 2014 ident: e_1_2_1_39_1 – ident: e_1_2_1_11_1 doi: 10.1109/ASWEC.2004.1290484 – ident: e_1_2_1_99_1 doi: 10.1016/j.infsof.2012.08.010 – ident: e_1_2_1_31_1 doi: 10.1145/1958746.1958823 – ident: e_1_2_1_60_1 – ident: e_1_2_1_101_1 doi: 10.1007/s00158-003-0368-6 – ident: e_1_2_1_83_1 doi: 10.1109/ICSE.1994.296768 – volume-title: DevOps: A Software Architect’s Perspective ident: e_1_2_1_17_1 – ident: e_1_2_1_94_1 doi: 10.1007/s10664-008-9094-4 – volume-title: Modeling and Simulating Software Architectures: The Palladio Approach ident: e_1_2_1_120_1 – ident: e_1_2_1_127_1 doi: 10.1016/j.jss.2019.110428 – ident: e_1_2_1_108_1 doi: 10.1109/IoTDI.2015.41 – volume-title: Dealing with non-functional requirements for adaptive systems via dynamic software product-lines ident: e_1_2_1_69_1 – ident: e_1_2_1_121_1 – ident: e_1_2_1_38_1 doi: 10.1145/3204459 – volume-title: Proceedings of the 36th International Conference on Software Engineering. ACM, 883–894 ident: e_1_2_1_95_1 – ident: e_1_2_1_135_1 doi: 10.1145/2465478.2465487 – ident: e_1_2_1_7_1 doi: 10.1109/TSE.2012.64 – volume-title: Proceedings of the Conference on the Future of Software Engineering. ACM, 319–343 ident: e_1_2_1_24_1 – ident: e_1_2_1_145_1 doi: 10.1007/s11219-005-4251-0 – ident: e_1_2_1_46_1 doi: 10.1109/TSE.2013.36 – ident: e_1_2_1_129_1 doi: 10.1145/503271.503224 – ident: e_1_2_1_133_1 doi: 10.1109/MIC.2007.21 – ident: e_1_2_1_58_1 doi: 10.1109/ICSE.2009.5070513 – ident: e_1_2_1_71_1 doi: 10.1016/j.future.2013.01.010 – volume: 76 start-page: 89 year: 1998 ident: e_1_2_1_97_1 article-title: Strategy as a portfolio of real options publication-title: Harv. Bus. Rev. – volume: 25 start-page: 2099 year: 2020 ident: e_1_2_1_2_1 article-title: Better software analytics via “DUO”: Data mining algorithms using/used-by optimizers.Empir publication-title: Softw. Eng. – volume-title: Rationale Management in Software Engineering ident: e_1_2_1_137_1 – ident: e_1_2_1_91_1 doi: 10.1109/FOSE.2007.19 – ident: e_1_2_1_18_1 doi: 10.1109/ICSR.1998.685756 – volume-title: France year: 2009 ident: e_1_2_1_22_1 – ident: e_1_2_1_42_1 doi: 10.1007/978-3-642-15114-9_11 – volume-title: Proceedings of the ICSE Workshop on Software Engineering for Adaptive and Self-managing Systems. IEEE, 76–85 year: 2009 ident: e_1_2_1_87_1 – ident: e_1_2_1_144_1 doi: 10.1016/S0377-2217(03)00272-8 – volume-title: Proceedings of the Conference on Computer Security, Dependability and Assurance. IEEE, 171 year: 1998 ident: e_1_2_1_51_1 – ident: e_1_2_1_105_1 doi: 10.1007/s10270-012-0277-5 – ident: e_1_2_1_55_1 doi: 10.1145/1882291.1882296 – ident: e_1_2_1_80_1 doi: 10.1109/WICSA.2005.61 – ident: e_1_2_1_76_1 doi: 10.1145/2897356.2897359 – ident: e_1_2_1_140_1 doi: 10.1145/2601248.2601268 – ident: e_1_2_1_32_1 doi: 10.1109/ICSE.2009.5070512 – volume-title: Proceedings of the International Workshop on Eternal Systems. Springer, 16–29 year: 2012 ident: e_1_2_1_20_1 – ident: e_1_2_1_33_1 doi: 10.5555/2821357.2821384 – volume-title: et al year: 2005 ident: e_1_2_1_21_1 – ident: e_1_2_1_6_1 doi: 10.1109/MOMPES.2009.5069138 – ident: e_1_2_1_54_1 doi: 10.1145/2554850.2555044 – ident: e_1_2_1_126_1 doi: 10.1007/978-3-319-48992-6_4 – ident: e_1_2_1_110_1 doi: 10.1057/ejis.2012.26 – volume-title: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-managing Systems. ACM, 17–26 ident: e_1_2_1_67_1 – volume-title: Redwine Jr and William E. Riddle year: 1985 ident: e_1_2_1_119_1 – ident: e_1_2_1_123_1 doi: 10.1504/IJSSCI.2008.017590 – ident: e_1_2_1_115_1 doi: 10.1145/141874.141884 – ident: e_1_2_1_61_1 doi: 10.1109/TSE.2013.37 – ident: e_1_2_1_78_1 doi: 10.1109/TSE.2016.2613863 – volume: 3 start-page: 34 year: 2010 ident: e_1_2_1_130_1 article-title: Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things publication-title: European Commision – ident: e_1_2_1_141_1 doi: 10.1016/j.jss.2008.06.039 – ident: e_1_2_1_117_1 doi: 10.1109/ECBS.2010.16 – ident: e_1_2_1_62_1 doi: 10.1145/2025113.2025147 – ident: e_1_2_1_102_1 doi: 10.1109/SEES.2012.6225486 – volume-title: Computer 42, 10 year: 2009 ident: e_1_2_1_107_1 – ident: e_1_2_1_36_1 |
SSID | ssj0013024 |
Score | 2.3908055 |
SecondaryResourceType | review_article |
Snippet | Context: Evaluating software architectures in uncertain environments raises new challenges, which require continuous approaches. We define continuous... |
SourceID | crossref |
SourceType | Enrichment Source Index Database |
StartPage | 1 |
Subtitle | A Systematic Literature Review |
Title | Evaluation of Software Architectures under Uncertainty |
Volume | 30 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JSwMxFA5aL17cxZ0cxNto2mTSzrFYRcR6cAFvJckkKGgr7Yjgr_dlm5lWweUShiEZmPnevLwl730IHUqaqpSYLJGcdMBBIZYNkJNECGWylsxIS9va4f41v7hnlw_pQ5WKcdUlhTxWH9_WlfwHVbgHuNoq2T8gWz4UbsA14AsjIAzjrzA-K1t1-9oTU7zbg1zdWnJg4ohux2BbKp_8L6byuN3TvmWJiJThLncwic_RVa9Cl2PwbNNTcfjbkfQw9Wy8pAqLPk5GoXBfvDyVoILf--YCAVrYPgmlshcfIQ57E3v0hzhEq1meWY2qE3yNhFJHgAM7S1CnaTtp02xK34Y8zFM9mOCUZ7O2C_tutF_1O7OtMCjjtlNZtYXFtP3MzlaeN_TV1-kgLJxHCy3wKkCPL3R7_avbKu1EPAtyfBVfZW2XnoSlNfOlZofcraCl4EDgrpeGVTSnh2toOZJz4KCr1xGvhAOPDI7CgaeEAzvhwDXh2ED352d3pxdJIMlIFKjiIuGU5xkxeZtrxQxY6x0j0lQzx1OQmnZTGsGoJDBLZCrnlBgBVqIwjMPvqDjdRI3haKi3EBZUiLxJpQaXlDGwZDtcwSqZ0w7NM2q20VF894EKHeQtkcnzYOb7biNcTnz1TVNmp-z8PGUXLVZytocaxfhN74MFWMiDgNsn1vxeDw |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Evaluation+of+Software+Architectures+under+Uncertainty&rft.jtitle=ACM+transactions+on+software+engineering+and+methodology&rft.au=Sobhy%2C+Dalia&rft.au=Bahsoon%2C+Rami&rft.au=Minku%2C+Leandro&rft.au=Kazman%2C+Rick&rft.date=2021-07-01&rft.issn=1049-331X&rft.eissn=1557-7392&rft.volume=30&rft.issue=4&rft.spage=1&rft.epage=50&rft_id=info:doi/10.1145%2F3464305&rft.externalDBID=n%2Fa&rft.externalDocID=10_1145_3464305 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1049-331X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1049-331X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1049-331X&client=summon |