{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T05:31:00Z","timestamp":1775194260918,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319094915","type":"print"},{"value":"9783319094922","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09492-2_29","type":"book-chapter","created":{"date-parts":[[2014,7,24]],"date-time":"2014-07-24T11:33:31Z","timestamp":1406201611000},"page":"490-505","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis"],"prefix":"10.1007","author":[{"given":"Felipe","family":"Pinto","sequence":"first","affiliation":[]},{"given":"Uir\u00e1","family":"Kulesza","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Guerra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,25]]},"reference":[{"key":"29_CR1","volume-title":"Evaluating Software Architectures: Methods and Case Studies","author":"P Clements","year":"2002","unstructured":"Clements, P., Kazman, R., Klein, M.: Evaluating Software Architectures: Methods and Case Studies. Addison-Wesley, MA (2002)"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0164-1212(03)00080-3","volume":"69","author":"P Bengtsson","year":"2004","unstructured":"Bengtsson, P., Lassing, N., Bosch, J., Vliet, H.: Architecture-level modifiability analysis (ALMA). J. Syst. Softw. 69, 1\u20132 (2004)","journal-title":"J. Syst. Softw."},{"issue":"6","key":"29_CR3","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/52.542294","volume":"13","author":"R Kazman","year":"1996","unstructured":"Kazman, R., Abowd, G., Bass, L., Clements, P.: Scenario-based analysis of software architecture. IEEE Softw. 13(6), 47\u201355 (1996)","journal-title":"IEEE Softw."},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Kazman, R., Klein, M., Clements, P.: ATAM: Method for Architecture Evaluation. Technical report, CMU\/SEI-2000-TR-004, ESC-TR-2000-004, Software Engineering Institute, August 2000","DOI":"10.21236\/ADA382629"},{"issue":"1","key":"29_CR5","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.jss.2011.07.036","volume":"85","author":"L Silva","year":"2012","unstructured":"Silva, L., Balasubramaniam, D.: Controlling software architecture erosion: a survey. J. Syst. Softw. 85(1), 132\u2013151 (2012)","journal-title":"J. Syst. Softw."},{"key":"29_CR6","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1145\/1639949.1640113","volume":"44","author":"M Abi-Antoun","year":"2009","unstructured":"Abi-Antoun, M., Aldrich, J.: Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations. SIGPLAN Not. 44, 321\u2013340 (2009)","journal-title":"SIGPLAN Not."},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Babar, M.A., Gorton, I.: Comparison of scenario-based software architecture evaluation methods. In: Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC \u201804), pp. 600\u2013607. IEEE Computer Society, Washington, DC (2004)","DOI":"10.1109\/APSEC.2004.38"},{"key":"29_CR8","unstructured":"Wala, T.J.: Watson Libraries for Analysis, September 2013. http:\/\/wala.sourceforge.net"},{"key":"29_CR9","unstructured":"SINFO\/UFRN (Informatics Superintendence), September 2013. http:\/\/www.info.ufrn.br\/wikisistemas"},{"key":"29_CR10","unstructured":"Torres, M.: Systematic Assessment of Product Derivation Approaches. MSc Dissertation, Federal University of Rio Grande do Norte (UFRN), Natal, Brazil (2011) (in Portuguese)"},{"key":"29_CR11","unstructured":"Aquino, H.M.: A Systematic Approach to Software Product Lines Testing. MSc Dissertation, Federal University of Rio Grande do Norte (UFRN), Natal, Brazil (2011) (in Portuguese)"},{"key":"29_CR12","unstructured":"Lau, S.Q.: Domain Analysis of E-Commerce Systems Using Feature-Based Model Templates, MSc Dissertation, University of Waterloo (2006)"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Christensen, H.B., Hansen, K.M.: Towards architectural information in implementation (NIER track). In: Proceedings of the 33rd International Conference on Software Engineering, (ICSE \u201811), pp. 928\u2013931. ACM, New York (2011)","DOI":"10.1145\/1985793.1985948"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Mirakhorli, M., Shin, Y., Cleland-Huang, J., Cinar, M.: A tactic-centric approach for automating traceability of quality concerns. In: Proceedings of the 2012 International Conference on Software Engineering (ICSE 2012), pp. 639\u2013649. IEEE Press, Piscataway (2012)","DOI":"10.1109\/ICSE.2012.6227153"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Holmes, R., Notkin, D.: Identifying program, test, and environmental changes that affect behaviour. In: Proceedings of the 33rd International Conference on Software Engineering (ICSE \u201811), pp. 371\u2013380. ACM, New York (2011)","DOI":"10.1145\/1985793.1985844"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Liu, S. Zhang, J.: Program analysis: from qualitative analysis to quantitative analysis (NIER track). In: Proceedings of the 33rd International Conference on Software Engineering (ICSE \u201811), pp. 956\u2013959. ACM, New York (2011)","DOI":"10.1145\/1985793.1985957"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09492-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T22:44:21Z","timestamp":1746312261000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-09492-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319094915","9783319094922"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09492-2_29","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"25 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}