{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:26:22Z","timestamp":1764174382130},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319658308"},{"type":"electronic","value":"9783319658315"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65831-5_14","type":"book-chapter","created":{"date-parts":[[2017,8,14]],"date-time":"2017-08-14T08:03:47Z","timestamp":1502697827000},"page":"191-207","source":"Crossref","is-referenced-by-count":11,"title":["Architectural Assumptions and Their Management in Industry \u2013 An Exploratory Study"],"prefix":"10.1007","author":[{"given":"Chen","family":"Yang","sequence":"first","affiliation":[]},{"given":"Peng","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Paris","family":"Avgeriou","sequence":"additional","affiliation":[]},{"given":"Ulf","family":"Eliasson","sequence":"additional","affiliation":[]},{"given":"Rogardt","family":"Heldal","sequence":"additional","affiliation":[]},{"given":"Patrizio","family":"Pelliccione","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,15]]},"reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/s00766-005-0023-4","volume":"11","author":"CB Haley","year":"2006","unstructured":"Haley, C.B., Laney, R.C., Moffett, J.D., Nuseibeh, B.: Using trust assumptions with security requirements. Requir. Eng. 11(2), 138\u2013151 (2006)","journal-title":"Requir. Eng."},{"issue":"1","key":"14_CR2","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1023\/A:1012535017876","volume":"11","author":"MM Lehman","year":"2001","unstructured":"Lehman, M.M., Ramil, J.F.: Rules and tools for software evolution planning and management. Annal. Soft Eng. 11(1), 15\u201344 (2001)","journal-title":"Annal. Soft Eng."},{"key":"14_CR3","volume-title":"Encyclopedia of Software Engineering","author":"V Basili","year":"1994","unstructured":"Basili, V., Caldiera, G., Rombach, D.: The Goal Question Metric Approach. In: Marciniak, J.J. (ed.) Encyclopedia of Software Engineering. Wiley, New York (1994)"},{"key":"14_CR4","unstructured":"Yang, C., Liang, P., Avgeriou, P.: Assumptions and their management in software development: A systematic mapping study (under review)"},{"issue":"3","key":"14_CR5","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1016\/j.jss.2015.12.016","volume":"113","author":"C Yang","year":"2016","unstructured":"Yang, C., Liang, P., Avgeriou, P.: A survey on software architectural assumptions. J. Syst. Softw. 113(3), 362\u2013380 (2016)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"14_CR6","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Empir. Softw. Eng. 14(2), 131\u2013164 (2009)","journal-title":"Empir. Softw. Eng."},{"key":"14_CR7","volume-title":"The Discovery of Grounded Theory: Strategies for Qualitative Research","author":"BG Glaser","year":"1967","unstructured":"Glaser, B.G., Strauss, A.L.: The Discovery of Grounded Theory: Strategies for Qualitative Research. Aldine Publishing, New York (1967)"},{"key":"14_CR8","doi-asserted-by":"crossref","DOI":"10.1002\/9781118181034","volume-title":"Case Study Research in Software Engineering: Guidelines and Examples","author":"P Runeson","year":"2012","unstructured":"Runeson, P., Host, M., Rainer, A., Regnell, B.: Case Study Research in Software Engineering: Guidelines and Examples. Wiley, New york (2012)"},{"issue":"4","key":"14_CR9","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1016\/j.jss.2005.10.017","volume":"79","author":"R Roeller","year":"2006","unstructured":"Roeller, R., Lago, P., van Vliet, H.: Recovering architectural assumptions. J. Syst. Softw. 79(4), 552\u2013573 (2006)","journal-title":"J. Syst. Softw."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Lago, P., van Vliet, H.: Explicit assumptions enrich architectural models. In: Proceedings of the 27th International Conference on Software Engineering (ICSE), St Louis, Missouri, USA, pp. 206\u2013214 (2005)","DOI":"10.1145\/1062455.1062503"},{"issue":"4","key":"14_CR11","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MS.2009.86","volume":"26","author":"D Garlan","year":"2009","unstructured":"Garlan, D., Allen, R., Ockerbloom, J.: Architectural mismatch: Why reuse is still so hard. IEEE Softw. 26(4), 66\u201369 (2009)","journal-title":"IEEE Softw."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Van Landuyt, D., Truyen, E., Joosen, W.: Documenting early architectural assumptions in scenario-based requirements. In: Proceeding of the Joint Working IEEE\/IFIP Conference on Software Architecture (WICSA) and European Conference on Software Architecture (ECSA), Helsinki, Finland, pp. 329\u2013333 (2012)","DOI":"10.1109\/WICSA-ECSA.212.55"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Van Landuyt, D., Joosen, W.: Modularizing early architectural assumptions in scenario-based requirements. In: Proceedings of the 17th International Conference on Fundamental Approaches to Software Engineering (FASE), Grenoble, France, pp. 170\u2013184 (2014)","DOI":"10.1007\/978-3-642-54804-8_12"},{"key":"14_CR14","unstructured":"Ordibehesht, H.: Explicating critical assumptions in software architectures using AADL. Master thesis, University of Gothenburg (2010)"},{"key":"14_CR15","unstructured":"Mamun, M.A.A., Hansson, J.: Review and challenges of assumptions in software development. In: Proceedings of the 2nd Analytic Virtual Integration of Cyber-Physical Systems Workshop (AVICPS), Vienna, Austria (2011)"},{"key":"14_CR16","unstructured":"Mamun, M.A.A., Tichy, M., Hansson, J.: Towards formalizing assumptions on architectural level: a proof-of-concept. Research report, University of Gothenburg (2012)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Ostacchini, I., Wermelinger, M.: Managing assumptions during agile development. In: Proceedings of the 2009 ICSE Workshop on Sharing and Reusing Architectural Knowledge (SHARK), Vancouver, BC, Canada, pp. 9\u201316 (2009)","DOI":"10.1109\/SHARK.2009.5069110"},{"key":"14_CR18","unstructured":"Yang, C., Liang, P.: Identifying and recording software architectural assumptions in agile development. In: Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering (SEKE), Vancouver, Canada, pp. 308\u2013313 (2014)"}],"container-title":["Lecture Notes in Computer Science","Software Architecture"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65831-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T11:04:49Z","timestamp":1570014289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65831-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319658308","9783319658315"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65831-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}