{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T02:02:47Z","timestamp":1692237767020},"reference-count":34,"publisher":"Wiley","issue":"10","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":5875,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw: Pract. Exper."],"published-print":{"date-parts":[[1999,8]]},"DOI":"10.1002\/(sici)1097-024x(199908)29:10<875::aid-spe262>3.0.co;2-w","type":"journal-article","created":{"date-parts":[[2002,9,10]],"date-time":"2002-09-10T22:10:04Z","timestamp":1031695804000},"page":"875-896","source":"Crossref","is-referenced-by-count":24,"title":["Feature-oriented engineering of PBX software for adaptability and reuseability"],"prefix":"10.1002","volume":"29","author":[{"given":"Kyo C.","family":"Kang","sequence":"first","affiliation":[]},{"given":"Sajoong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jaejoon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kwanwoo","family":"Lee","sequence":"additional","affiliation":[]}],"member":"311","reference":[{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB1","volume-title":"Pattern-Oriented Software Architecture: A System of Patterns","author":"Buschmann","year":"1996","unstructured":"and Pattern-Oriented Software Architecture: A System of Patterns, John Wiley & Sons, 1996."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB2","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Design","author":"Gamma","year":"1995","unstructured":"and Design Patterns: Elements of Reusable Object-Oriented Design, Addison-Wesley, 1995."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB3","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/236156.236174","volume":"39","author":"McKenny","year":"1996","journal-title":"Communications of ACM"},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB4","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/141874.141884","volume":"17","author":"Perry","year":"1992","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB5","volume-title":"Software Architecture: Perspectives on an Emerging Discipline","author":"Shaw","year":"1996","unstructured":"and Software Architecture: Perspectives on an Emerging Discipline, Prentice Hall, 1996."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB6","author":"Batory","year":"1995","unstructured":"and ?Creating reference architectures: an example from avionics?, ACM-SIGSOFT Symposium on Software Reusability, Seattle, WA, 1995."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB7","author":"Mettala","year":"1992","unstructured":"and ?The domain-specific software architecture program?, Technical Report CMU\/SEI-92-SR-9, Pittsburgh, PA, Software Engineering Institute, Carnegie Mellon University, June 1992."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB8","author":"Tracz","year":"1993","unstructured":"?LILEANNA: A parameterized programming language?, Proc. Second International Workshop on Software Reuse, pp. 66-78 1993."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB9","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1023\/A:1018980625587","volume":"5","author":"Kang","year":"1998","journal-title":"Annals of Software Engineering"},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB10","author":"Kang","year":"1990","unstructured":"and ?Feature-oriented domain analysis (FODA) feasibility study?, Technical Report CMU\/SEI-90-TR-21, Pittsburgh, PA, Software Engineering Institute, Carnegie Mellon University, 1990."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TSE.1976.233797","volume":"SE-2","author":"Parnas","year":"1976","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB12","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/TSE.1979.234169","volume":"SE-5","author":"Parnas","year":"1979","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB13","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1109\/TSE.1985.231881","volume":"SE-11","author":"Barstow","year":"1985","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB14","author":"Cohen","year":"1992","unstructured":"and ?Application of feature-oriented domain analysis to the army movement control domain?, Technical Report CMU\/SEI-91-TR-28, Pittsburgh, PA, Software Engineering Institute, Carnegie Mellon University, 1992."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB15","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1109\/TSE.1984.5010280","volume":"SE-10","author":"Neighbors","year":"1984","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB16","author":"Prieto-Diaz","year":"1987","unstructured":"?Domain analysis for reusability?, Proc. COMPSAC 87: The Eleventh Annual International Computer Software and Applications Conference, IEEE, October 1987, pp. 23-29."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB17","author":"NIST","year":"1994","unstructured":"NIST, National Institute of Standards and Technology Special Publication 500-222, MD 20899-0001, Gaithersburg, December 1994."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB18","author":"Cohen","year":"1998","unstructured":"and ?Object-oriented technology and domain analysis?, Proc. Fifth International Conference on Software Reuse, June 1998, pp. 86-93."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB19","author":"Gomaa","year":"1994","unstructured":"and ?A prototype domain modeling environment for reusable software architectures?, Proc. Third International Conference on Software Reuse: Advances in Software Reusability, November 1994, pp. 74-83."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB20","author":"Griss","year":"1998","unstructured":"and ?Integrating feature modeling with the RSEB?, Proc. Fifth International Conference on Software Reuse, June 1998, pp. 76-85."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB21","author":"Peterson","year":"1994","unstructured":"and ?Mapping a domain model and architecture to a generic design?, Technical Report CMU\/SEI-94-TR-8, Pittsburgh, PA, Software Engineering Institute, Carnegie Mellon University, 1994."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB22","author":"Simos","year":"1996","unstructured":"et al, ?Software Technology for Adaptable Reliable Systems (STARS) Organization Domain Modeling (ODM) Guidebook Version 2.0?, STARS-VC-A025\/001\/00, Manassas, VA, Lockheed Martin Tactical Defense Systems, 1996."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB23","author":"Vici","year":"1998","unstructured":"and ?FODAcom: An experience with domain analysis in the Italian telecom industry?, Proc. Fifth International Conference on Software Reuse, June 1998, pp. 166-175."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB24","author":"Prieto-Diaz","year":"1991","unstructured":"?Reuse library process model?, STARS Technical Report CDRL 03041-002, STAR Technology Center, Arlington, VA, July 1991."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB25","volume-title":"Software Reuse: Architecture, Process and Organization for Business Success","author":"Jacobson","year":"1997","unstructured":"and Software Reuse: Architecture, Process and Organization for Business Success, Addison-Wesley, 1997."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB26","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1145\/136586.136587","volume":"1","author":"Batory","year":"1992","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB27","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MC.1986.1663146","volume":"19","author":"Goguen","year":"1986","journal-title":"IEEE Computer"},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB28","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MC.1987.1663693","volume":"20","author":"Conklin","year":"1987","journal-title":"IEEE Computer"},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB29","author":"Gomaa","year":"1993","unstructured":"Software Design Methods for Concurrent and Real-Time Systems, Addison-Wesley, 1993."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB30","author":"ITU","year":"1994","unstructured":"ITU, Q.931: Digital subscriber Signaling System No.1 (DSS1)-ISDN user-network interface layer 3 specification for basic call control, ITU-TS, Geneva, 1994."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB31","volume-title":"Framing Software Reuse: Lessons From The Real World","author":"Bassett","year":"1997","unstructured":"Framing Software Reuse: Lessons From The Real World, Prentice Hall, Yourdon Press, 1997."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB32","volume-title":"The Z Notation: A Reference Manual Second Edition","author":"Spivey","year":"1992","unstructured":"The Z Notation: A Reference Manual Second Edition, Prentice Hall, 1992."},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB33","author":"Kang","year":"1998","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W-BIB34","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/0167-6423(87)90035-9","volume":"8","author":"Harel","year":"1987","journal-title":"Science of Programming"}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2F(SICI)1097-024X(199908)29:10%3C875::AID-SPE262%3E3.0.CO;2-W","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/(SICI)1097-024X(199908)29:10%3C875::AID-SPE262%3E3.0.CO;2-W","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T08:45:15Z","timestamp":1625129115000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/(SICI)1097-024X(199908)29:10<875::AID-SPE262>3.0.CO;2-W"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,8]]},"references-count":34,"journal-issue":{"issue":"10","published-print":{"date-parts":[[1999,8]]}},"URL":"https:\/\/doi.org\/10.1002\/(sici)1097-024x(199908)29:10<875::aid-spe262>3.0.co;2-w","relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,8]]}}}