{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:10:18Z","timestamp":1772554218267,"version":"3.50.1"},"publisher-location":"Cham","reference-count":72,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031151156","type":"print"},{"value":"9783031151163","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15116-3_7","type":"book-chapter","created":{"date-parts":[[2022,8,18]],"date-time":"2022-08-18T17:17:53Z","timestamp":1660843073000},"page":"133-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Self-adaptive Machine Learning Systems: Research Challenges and\u00a0Opportunities"],"prefix":"10.1007","author":[{"given":"Maria","family":"Casimiro","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Romano","sequence":"additional","affiliation":[]},{"given":"David","family":"Garlan","sequence":"additional","affiliation":[]},{"given":"Gabriel A.","family":"Moreno","sequence":"additional","affiliation":[]},{"given":"Eunsuk","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Klein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,19]]},"reference":[{"issue":"12","key":"7_CR1","first-page":"19993","volume":"9","author":"Z Abedjan","year":"2016","unstructured":"Abedjan, Z., et al.: Detecting data errors: where are we and what needs to be done? Proc. VLDB 9(12), 19993\u20131004 (2016)","journal-title":"Proc. VLDB"},{"key":"7_CR2","unstructured":"Alipourfard, O., et al.: CherryPick: adaptively unearthing the best cloud configurations for big data analytics. In: Proceedings of NSDI (2017)"},{"key":"7_CR3","unstructured":"Apar\u00edcio, D., et al.: Arms: automated rules management system for fraud detection. arXiv preprint arXiv:2002.06075 (2020)"},{"key":"7_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113816","volume":"165","author":"C Badue","year":"2021","unstructured":"Badue, C., Guidolini, R., et al.: Self-driving cars: a survey. Expert Syst. App. 165, 113816 (2021)","journal-title":"Expert Syst. App."},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Bartocci, E., et al.: Specification-based monitoring of cyber-physical systems: a survey on theory, tools and applications. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 135\u2013175. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_5","DOI":"10.1007\/978-3-319-75632-5_5"},{"key":"7_CR6","unstructured":"Bojarski, M., et al.: End to end learning for self-driving cars. arXiv preprint arXiv:1604.07316 (2016)"},{"issue":"18","key":"7_CR7","doi-asserted-by":"publisher","first-page":"6037","DOI":"10.3390\/s21186037","volume":"21","author":"D Bouchabou","year":"2021","unstructured":"Bouchabou, D., Nguyen, S.M., Lohr, C., LeDuc, B., Kanellos, I.: A survey of human activity recognition in smart homes based on iot sensors algorithms: taxonomies, challenges, and opportunities with deep learning. Sensors 21(18), 6037 (2021)","journal-title":"Sensors"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Branco, B., et al.: Interleaved sequence RNNs for fraud detection. In: Proceedings of KDD (2020)","DOI":"10.1145\/3394486.3403361"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BF00058655","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman, L.: Bagging predictors. Mach. Learn. 24, 123\u2013140 (1996). https:\/\/doi.org\/10.1007\/BF00058655","journal-title":"Mach. Learn."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Bure\u0161, T.: Self-adaptation 2.0. In: 2021 International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS) (2021)","DOI":"10.1109\/SEAMS51251.2021.00046"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.scico.2015.12.006","volume":"127","author":"J C\u00e1mara","year":"2016","unstructured":"C\u00e1mara, J., Lopes, A., Garlan, D., Schmerl, B.: Adaptation impact and environment models for architecture-based self-adaptive systems. Sci. Comput. Program. 127, 50\u201375 (2016)","journal-title":"Sci. Comput. Program."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Cao, Y., Yang, J.: Towards making systems forget with machine unlearning. In: Proceedings of S &P. IEEE (2015)","DOI":"10.1109\/SP.2015.35"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Cao, Y., et al.: Efficient repair of polluted machine learning systems via causal unlearning. In: Proceedings of Asia CCS (2018)","DOI":"10.1145\/3196494.3196517"},{"key":"7_CR14","unstructured":"Casimiro, M., Romano, P., Garlan, D., Moreno, G., Kang, E., Klein, M.: Self-adaptation for machine learning based systems. In: Proceedings of SAML (2021)"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Casimiro, M., Garlan, D., C\u00e1mara, J., Rodrigues, L., Romano, P.: A probabilistic model checking approach to self-adapting machine learning systems. In: Procseedings of ASYDE, Co-located with SEFM 2021 (2021)","DOI":"10.1007\/978-3-031-12429-7_23"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Casimiro, M., et al.: Lynceus: cost-efficient tuning and provisioning of data analytic jobs. In: Proceedings of ICDCS (2020)","DOI":"10.1109\/ICDCS47774.2020.00047"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Chen, T.: All versus one: an empirical comparison on retrained and incremental machine learning for modeling performance of adaptable software. In: Proceedings of SEAMS. IEEE (2019)","DOI":"10.1109\/SEAMS.2019.00029"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Chen, Z., Huang, X.: End-to-end learning for lane keeping of self-driving cars. In: Proceedings of IV (2017)","DOI":"10.1109\/IVS.2017.7995975"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-02161-9_1","volume-title":"Software Engineering for Self-Adaptive Systems","author":"BHC Cheng","year":"2009","unstructured":"Cheng, B.H.C., et al.: Software engineering for self-adaptive systems: a research roadmap. In: Cheng, B.H.C., de Lemos, R., Giese, H., Inverardi, P., Magee, J. (eds.) Software Engineering for Self-Adaptive Systems. LNCS, vol. 5525, pp. 1\u201326. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-02161-9_1"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Cheng, H.T., et al.: Wide & deep learning for recommender systems. In: Proceedings of DLRS (2016)","DOI":"10.1145\/2988450.2988454"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Cheng, S.W., et al.: Evaluating the effectiveness of the rainbow self-adaptive system. In: Proceedings of SEAMS. IEEE (2009)","DOI":"10.1109\/SEAMS.2009.5069082"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Christi, A., et al.: Evaluating fault localization for resource adaptation via test-based software modification. In: Proceedings of QRS (2019)","DOI":"10.1109\/QRS.2019.00017"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Cito, J., Dillig, I., Kim, S., Murali, V., Chandra, S.: Explaining mispredictions of machine learning models using rule induction. In: Proceedings of ESEC\/FSE (2021)","DOI":"10.1145\/3468264.3468614"},{"key":"7_CR24","unstructured":"Cruz, A.F., et al.: A bandit-based algorithm for fairness-aware hyperparameter optimization. CoRR abs\/2010.03665 (2020)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"deGrandis, P., Valetto, G.: Elicitation and utilization of application-level utility functions. In: Proceedings of ICAC (2009)","DOI":"10.1145\/1555228.1555259"},{"issue":"1","key":"7_CR26","first-page":"1997","volume":"20","author":"T Elsken","year":"2019","unstructured":"Elsken, T., Metzen, J.H., Hutter, F.: Neural architecture search: a survey. J. Mach. Learn. Res. 20(1), 1997\u20132017 (2019)","journal-title":"J. Mach. Learn. Res."},{"issue":"2","key":"7_CR27","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1148\/rg.2017160130","volume":"37","author":"BJ Erickson","year":"2017","unstructured":"Erickson, B.J., et al.: Machine learning for medical imaging. Radiographics 37(2), 505 (2017)","journal-title":"Radiographics"},{"key":"7_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.buildenv.2021.107810","volume":"197","author":"M Esrafilian-Najafabadi","year":"2021","unstructured":"Esrafilian-Najafabadi, M., Haghighat, F.: Occupancy-based HVAC control systems in buildings: a state-of-the-art review. Build. Environ. 197, 107810 (2021)","journal-title":"Build. Environ."},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Gao, D., Liu, Y., Huang, A., Ju, C., Yu, H., Yang, Q.: Privacy-preserving heterogeneous federated transfer learning. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 2552\u20132559. IEEE (2019)","DOI":"10.1109\/BigData47090.2019.9005992"},{"issue":"3","key":"7_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3380965","volume":"14","author":"S Ghahremani","year":"2020","unstructured":"Ghahremani, S., Giese, H., Vogel, T.: Improving scalability and reward of utility-driven self-healing for large dynamic architectures. ACM Trans. Auton. Adapt. Syst. 14(3), 1\u201341 (2020)","journal-title":"ACM Trans. Auton. Adapt. Syst."},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Gheibi, O., Weyns, D.: Lifelong self-adaptation: self-adaptation meets lifelong machine learning. In: Proceedings of SEAMS (2022)","DOI":"10.1145\/3524844.3528052"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Gheibi, O., et al.: Applying machine learning in self-adaptive systems: a systematic literature review. arXiv preprint arXiv:2103.04112 (2021)","DOI":"10.1145\/3469440"},{"key":"7_CR33","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu, T., et al.: BadNets: evaluating backdooring attacks on deep neural networks. IEEE Access 7, 47230\u201347244 (2019)","journal-title":"IEEE Access"},{"issue":"3","key":"7_CR34","doi-asserted-by":"publisher","first-page":"402","DOI":"10.3390\/smartcities2030025","volume":"2","author":"X Guo","year":"2019","unstructured":"Guo, X., Shen, Z., Zhang, Y., Wu, T.: Review on the application of artificial intelligence in smart homes. Smart Cities 2(3), 402\u2013420 (2019)","journal-title":"Smart Cities"},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Huang, L., et al.: Adversarial machine learning. In: Proceedings of AISec (2011)","DOI":"10.1145\/2046684.2046692"},{"key":"7_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.buildenv.2019.106177","volume":"160","author":"B Huchuk","year":"2019","unstructured":"Huchuk, B., Sanner, S., O\u2019Brien, W.: Comparison of machine learning models for occupancy prediction in residential buildings using connected thermostat data. Build. Environ. 160, 106177 (2019)","journal-title":"Build. Environ."},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Jamshidi, P., et al.: Machine learning meets quantitative planning: enabling self-adaptation in autonomous robots. In: Proceedings of SEAMS (2019)","DOI":"10.1109\/SEAMS.2019.00015"},{"issue":"1","key":"7_CR38","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"JO Kephart","year":"2003","unstructured":"Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 46\u201350 (2003)","journal-title":"Computer"},{"key":"7_CR39","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.pmcj.2014.09.009","volume":"17","author":"C Krupitzer","year":"2018","unstructured":"Krupitzer, C., et al.: A survey on engineering approaches for self-adaptive systems. Pervasive Mob. Comput. 17, 184\u2013206 (2018)","journal-title":"Pervasive Mob. Comput."},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Langford, M.A., Chan, K.H., Fleck, J.E., McKinley, P.K., Cheng, B.H.: MoDALAS: model-driven assurance for learning-enabled autonomous systems. In: Proceedings of MODELS (2021)","DOI":"10.1109\/MODELS50736.2021.00027"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Liu, B.: Learning on the job: online lifelong and continual learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34 (2020)","DOI":"10.1609\/aaai.v34i09.7079"},{"issue":"4","key":"7_CR42","first-page":"70","volume":"35","author":"Y Liu","year":"2020","unstructured":"Liu, Y., et al.: A secure federated transfer learning framework. Proc. IS 35(4), 70\u201382 (2020)","journal-title":"Proc. IS"},{"key":"7_CR43","unstructured":"Lucas, Y., Jurgovsky, J.: Credit card fraud detection using machine learning: a survey. CoRR abs\/2010.06479 (2020)"},{"key":"7_CR44","doi-asserted-by":"publisher","unstructured":"Mallozzi, P., Pelliccione, P., Knauss, A., Berger, C., Mohammadiha, N.: Autonomous vehicles: state of the art, future trends, and challenges. In: Dajsuren, Y., van den Brand, M. (eds.)Automotive Systems and Software Engineering, pp. 347\u2013367. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-12157-0_16","DOI":"10.1007\/978-3-030-12157-0_16"},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Mendes, P., et al.: TrimTuner: Efficient optimization of machine learning jobs in the cloud via sub-sampling. In: MASCOTS (2020)","DOI":"10.1109\/MASCOTS50786.2020.9285971"},{"key":"7_CR46","doi-asserted-by":"crossref","unstructured":"Miller, B., et al.: Reviewer integration and performance measurement for malware detection. In: Proceedings of DIMVA (2016)","DOI":"10.1007\/978-3-319-40667-1_7"},{"issue":"1","key":"7_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3149180","volume":"13","author":"GA Moreno","year":"2018","unstructured":"Moreno, G.A., et al.: Flexible and efficient decision-making for proactive latency-aware self-adaptation. ACM Trans. Auton. Adapt. Syst. 13(1), 1\u201336 (2018)","journal-title":"ACM Trans. Auton. Adapt. Syst."},{"issue":"1","key":"7_CR48","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1016\/j.patcog.2011.06.019","volume":"45","author":"JG Moreno-Torres","year":"2012","unstructured":"Moreno-Torres, J.G., Raeder, T., Alaiz-Rodr\u00edguez, R., Chawla, N.V., Herrera, F.: A unifying view on dataset shift in classification. Pattern Recogn. 45(1), 521\u2013530 (2012)","journal-title":"Pattern Recogn."},{"key":"7_CR49","unstructured":"Nguyen, C., Hassner, T., Seeger, M., Archambeau, C.: LEEP: a new measure to evaluate transferability of learned representations. In: Proceedings of ICML. PMLR (2020)"},{"key":"7_CR50","unstructured":"Osborne, M.A., et al.: Gaussian processes for global optimization. In: LION (2009)"},{"key":"7_CR51","unstructured":"Ovadia, Y., et al.: Can you trust your model\u2019s uncertainty? evaluating predictive uncertainty under dataset shift. In: Proceedings of NIPS (2019)"},{"issue":"10","key":"7_CR52","first-page":"1345","volume":"22","author":"SJ Pan","year":"2009","unstructured":"Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE TKDE 22(10), 1345\u20134350 (2009)","journal-title":"IEEE TKDE"},{"key":"7_CR53","doi-asserted-by":"crossref","unstructured":"Pandey, A., Moreno, G.A., C\u00e1mara, J., Garlan, D.: Hybrid planning for decision making in self-adaptive systems. In: Proceedings of SASO (2016)","DOI":"10.1109\/SASO.2016.19"},{"key":"7_CR54","doi-asserted-by":"publisher","first-page":"13546","DOI":"10.1109\/ACCESS.2019.2893871","volume":"7","author":"D Papamartzivanos","year":"2019","unstructured":"Papamartzivanos, D., et al.: Introducing deep learning self-adaptive misuse network intrusion detection systems. IEEE Access 7, 13546\u201313560 (2019)","journal-title":"IEEE Access"},{"key":"7_CR55","doi-asserted-by":"crossref","unstructured":"Peng, Z., Yang, J., Chen, T.H., Ma, L.: A first look at the integration of machine learning models in complex autonomous driving systems: a case study on Apollo. In: Proceedings of ESEC\/FSE (2020)","DOI":"10.1145\/3368089.3417063"},{"key":"7_CR56","unstructured":"Pinto, F., et al.: Automatic model monitoring for data streams. arXiv preprint arXiv:1908.04240 (2019)"},{"key":"7_CR57","volume-title":"Dataset Shift in Machine Learning","author":"J Quionero-Candela","year":"2009","unstructured":"Quionero-Candela, J., et al.: Dataset Shift in Machine Learning. The MIT Press, Cambridge (2009)"},{"key":"7_CR58","unstructured":"Rabanser, S., et al.: Failing loudly: an empirical study of methods for detecting dataset shift. In: Proceedings of NIPS (2019)"},{"key":"7_CR59","doi-asserted-by":"publisher","first-page":"205948","DOI":"10.1109\/ACCESS.2020.3036037","volume":"8","author":"TRD Saputri","year":"2020","unstructured":"Saputri, T.R.D., Lee, S.W.: The application of machine learning in self-adaptive systems: a systematic literature review. IEEE Access 8, 205948\u2013205967 (2020)","journal-title":"IEEE Access"},{"key":"7_CR60","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.egypro.2017.03.028","volume":"111","author":"J Shi","year":"2017","unstructured":"Shi, J., Yu, N., Yao, W.: Energy efficient building HVAC control algorithm with real-time occupancy prediction. Energy Proc. 111, 267\u2013276 (2017)","journal-title":"Energy Proc."},{"key":"7_CR61","unstructured":"Silver, D.L., Yang, Q., Li, L.: Lifelong machine learning systems: beyond learning algorithms. In: 2013 AAAI Spring Symposium Series (2013)"},{"key":"7_CR62","doi-asserted-by":"crossref","unstructured":"Singh, A., Sikdar, B.: Adversarial attack for deep learning based IoT appliance classification techniques. In: 2021 IEEE 7th World Forum on Internet of Things (WF-IoT). IEEE (2021)","DOI":"10.1109\/WF-IoT51360.2021.9594946"},{"key":"7_CR63","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.procs.2018.08.198","volume":"135","author":"N Surantha","year":"2018","unstructured":"Surantha, N., Wicaksono, W.R.: Design of smart home security system using object recognition and PIR sensor. Proc. Comput. Sci. 135, 465\u2013472 (2018)","journal-title":"Proc. Comput. Sci."},{"key":"7_CR64","first-page":"1","volume":"26","author":"K Swersky","year":"2013","unstructured":"Swersky, K., et al.: Multi-task Bayesian optimization. Proc. NIPS 26, 1\u20139 (2013)","journal-title":"Proc. NIPS"},{"key":"7_CR65","unstructured":"Wang, Z.J., Choi, D., Xu, S., Yang, D.: Putting humans in the natural language processing loop: a survey. arXiv preprint arXiv:2103.04044 (2021)"},{"issue":"3","key":"7_CR66","first-page":"1","volume":"14","author":"D Wu","year":"2018","unstructured":"Wu, D., et al.: A highly accurate framework for self-labeled semisupervised classification in industrial applications. IEEE TII 14(3), 1\u201312 (2018)","journal-title":"IEEE TII"},{"key":"7_CR67","unstructured":"Wu, Y., et al.: DeltaGrad: rapid retraining of machine learning models. In: Proceedings of ICML (2020)"},{"key":"7_CR68","doi-asserted-by":"crossref","unstructured":"Xiao, Y., et al.: Self-checking deep neural networks in deployment. In: Proceedings of ICSE (2021)","DOI":"10.1109\/ICSE43902.2021.00044"},{"key":"7_CR69","doi-asserted-by":"crossref","unstructured":"Yadwadkar, N.J., Hariharan, B., Gonzalez, J.E., Smith, B., Katz, R.H.: Selecting the $$<$$i$$>$$best$$<$$\/i$$>$$ vm across multiple public clouds: a data-driven performance modeling approach. In: Proceedings of SoCC, pp. 452\u2013465 (2017)","DOI":"10.1145\/3127479.3131614"},{"key":"7_CR70","unstructured":"Yang, J., Zhou, K., Li, Y., Liu, Z.: Generalized out-of-distribution detection: a survey. arXiv preprint arXiv:2110.11334 (2021)"},{"key":"7_CR71","doi-asserted-by":"crossref","unstructured":"Yang, Z., Asyrofi, M.H., Lo, D.: BiasRV: uncovering biased sentiment predictions at runtime. CoRR abs\/2105.14874 (2021)","DOI":"10.1145\/3468264.3473117"},{"key":"7_CR72","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-030-20485-3_17","volume-title":"Business Information Systems","author":"X Zhou","year":"2019","unstructured":"Zhou, X., Lo Faro, W., Zhang, X., Arvapally, R.S.: A framework to monitor machine learning systems using concept drift detection. In: Abramowicz, W., Corchuelo, R. (eds.) BIS 2019. A Framework to Monitor Machine Learning Systems Using Concept Drift Detection, vol. 353, pp. 218\u2013231. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20485-3_17"}],"container-title":["Lecture Notes in Computer Science","Software Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15116-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T06:03:11Z","timestamp":1676440991000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15116-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031151156","9783031151163"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15116-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Software Architecture","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"V\u00e4xj\u00f6","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecsa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/ecsa-2021","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Workshops were held virtually. For the workshop, 17 papers were submitted and 15 papers were selected.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}