{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T17:04:51Z","timestamp":1748365491039},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319099699"},{"type":"electronic","value":"9783319099705"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09970-5_26","type":"book-chapter","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T02:02:38Z","timestamp":1407808958000},"page":"300-307","source":"Crossref","is-referenced-by-count":3,"title":["Effort Estimation for Architectural Refactoring to Introduce Module Isolation"],"prefix":"10.1007","author":[{"given":"Fatih","family":"\u00d6zt\u00fcrk","sequence":"first","affiliation":[]},{"given":"Erdem","family":"Sar\u0131l\u0131","sequence":"additional","affiliation":[]},{"given":"Hasan","family":"S\u00f6zer","sequence":"additional","affiliation":[]},{"given":"Bar\u0131\u015f","family":"Aktemur","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"26_CR1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.2498\/cit.1002133","volume":"21","author":"I. Alsmadi","year":"2013","unstructured":"Alsmadi, I., Nuser, M.: Evaluation of cost estimation metrics: Towards a unified terminology. Journal of Computing and Information Technology\u00a021(1), 23\u201334 (2013)","journal-title":"Journal of Computing and Information Technology"},{"issue":"1","key":"26_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing\u00a01(1), 11\u201333 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-540-74035-3_8","volume-title":"Architecting Dependable Systems IV","author":"R. Buskens","year":"2007","unstructured":"Buskens, R., Gonzalez, O.: Model-centric development of highly available software systems. In: de Lemos, R., Gacek, C., Romanovsky, A. (eds.) Architecting Dependable Systems IV. LNCS, vol.\u00a04615, pp. 163\u2013187. Springer, Heidelberg (2007)"},{"key":"26_CR4","first-page":"67","volume-title":"9th Workshop on Hot Topics in Operating Systems (HotOS)","author":"G. Candea","year":"2003","unstructured":"Candea, G., Fox, A.: Crash-only software. In: 9th Workshop on Hot Topics in Operating Systems (HotOS), pp. 67\u201372. USENIX Assoc., Berkeley (2003)"},{"key":"26_CR5","unstructured":"Clements, P.C., Bachmann, F., Bass, L., Garlan, D., Ivers, J., Little, R., Merson, P., Nord, R., Stafford, J.A.: Documenting Software Architectures: Views and Beyond, 2nd edn. Addison-Wesley (2010)"},{"key":"26_CR6","unstructured":"Fenton, N., Pfleeger, S.: Software Metrics: A Rigorous and Practical Approach, 2nd edn. Thomson Learning Inc. (2002)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Herder, J.N., Bos, H., Gras, B., Homburg, P., Tanenbaum, A.S.: Failure resilience for device drivers. In: 37th IEEE\/IFIP International Conference on Dependable Systems and Networks, Edinburgh, UK, pp. 41\u201350 (2007)","DOI":"10.1109\/DSN.2007.46"},{"key":"26_CR8","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1145\/2457317.2457351","volume-title":"EDBT\/ICDT 2013 Workshops","author":"F. Holzschuher","year":"2013","unstructured":"Holzschuher, F., Peinl, R.: Performance of Graph Query Languages: Comparison of Cypher, Gremlin and Native Access in Neo4J. In: EDBT\/ICDT 2013 Workshops, pp. 195\u2013204. ACM, New York (2013)"},{"issue":"3","key":"26_CR9","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1145\/1272998.1273032","volume":"41","author":"G. Hunt","year":"2007","unstructured":"Hunt, G., Aiken, M., F\u00e4hndrich, M., Hawblitzel, C., Hodson, O., Larus, J., Levi, S., Steensgaard, B., Tarditi, D., Wobber, T.: Sealing OS processes to improve dependability and safety. SIGOPS Oper. Syst. Rev.\u00a041(3), 341\u2013354 (2007)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"26_CR10","first-page":"75","volume-title":"Int. Symposium on Code Generation and Optimization (CGO)","author":"C. Lattner","year":"2004","unstructured":"Lattner, C., Adve, V.: LLVM: A compilation framework for lifelong program analysis & transformation. In: Int. Symposium on Code Generation and Optimization (CGO), pp. 75\u201387. IEEE Computer Society, San Jose (2004)"},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/2451436.2451448","volume-title":"12th Int. Conference on Aspect-oriented Software Development (AOSD)","author":"R. Mitschke","year":"2013","unstructured":"Mitschke, R., Eichberg, M., Mezini, M., Garcia, A., Macia, I.: Modular specification and checking of structural dependencies. In: 12th Int. Conference on Aspect-oriented Software Development (AOSD), pp. 85\u201396. ACM, New York (2013)"},{"issue":"12","key":"26_CR12","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1145\/361598.361623","volume":"15","author":"D.L. Parnas","year":"1972","unstructured":"Parnas, D.L.: On the criteria to be used in decomposing systems into modules. Communications of the ACM\u00a015(12), 1053\u20131058 (1972)","journal-title":"Communications of the ACM"},{"issue":"10","key":"26_CR13","first-page":"869","volume":"39","author":"H. Sozer","year":"2009","unstructured":"Sozer, H., Tekinerdogan, B., Aksit, M.: Flora: A framework for decomposing software architecture to introduce local recovery. Software: Practice and Experience\u00a039(10), 869\u2013889 (2009)","journal-title":"Software: Practice and Experience"},{"issue":"2","key":"26_CR14","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s11219-011-9171-6","volume":"21","author":"H. Sozer","year":"2013","unstructured":"Sozer, H., Tekinerdogan, B., Aksit, M.: Optimizing decomposition of software architecture for local recovery. Software Quality Journal\u00a021(2), 203\u2013240 (2013)","journal-title":"Software Quality Journal"},{"issue":"5","key":"26_CR15","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1145\/173668.168635","volume":"27","author":"R. Wahbe","year":"1993","unstructured":"Wahbe, R., Lucco, S., Anderson, T., Graham, S.L.: Efficient software-based fault isolation. SIGOPS Operating Systems Review\u00a027(5), 203\u2013216 (1993)","journal-title":"SIGOPS Operating Systems Review"}],"container-title":["Lecture Notes in Computer Science","Software Architecture"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09970-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T10:56:02Z","timestamp":1558954562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09970-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319099699","9783319099705"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09970-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}