{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:34:54Z","timestamp":1743035694810,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642210006"},{"type":"electronic","value":"9783642210013"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21001-3_1","type":"book-chapter","created":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T10:06:38Z","timestamp":1312193198000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Introduction: Relating Requirements and Architectures"],"prefix":"10.1007","author":[{"given":"J. G.","family":"Hall","sequence":"first","affiliation":[]},{"given":"J.","family":"Grundy","sequence":"additional","affiliation":[]},{"given":"I.","family":"Mistrik","sequence":"additional","affiliation":[]},{"given":"P.","family":"Lago","sequence":"additional","affiliation":[]},{"given":"P.","family":"Avgeriou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,14]]},"reference":[{"issue":"10","key":"1_CR1","doi-asserted-by":"publisher","first-page":"1568","DOI":"10.1016\/j.jss.2009.03.014","volume":"82","author":"S Ferreira","year":"2009","unstructured":"Ferreira S, Collofello J, Shunk D, Mackulak G (2009) Understanding the effects of requirements volatility in software engineering by using analytical modeling and software process simulation. J Syst Softw 82(10):1568\u20131577, SI: YAU","journal-title":"J Syst Softw"},{"issue":"6","key":"1_CR2","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/6.591665","volume":"34","author":"R Schaller","year":"1997","unstructured":"Schaller R (1997) Moore\u2019s law: past, present and future. IEEE Spectrum 34(6):52\u201359","journal-title":"IEEE Spectrum"},{"key":"1_CR3","unstructured":"Tootill G (1998) The original original program. Resurrection: the computer conservation society, no. 20. ISSN 0958\u20137403"},{"key":"1_CR4","unstructured":"Enticknap N (1998) Computing\u2019s golden jubilee. Resurrection: the computer conservation society, no. 20. ISSN 0958\u20137403"},{"issue":"4","key":"1_CR5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/141874.141884","volume":"17","author":"DE Perry","year":"1992","unstructured":"Perry DE, Wolf AL (1992) Foundations for the study of software architecture. ACM SIGSOFT Software Eng Notes 17(4):40\u201352","journal-title":"ACM SIGSOFT Software Eng Notes"},{"key":"1_CR6","volume-title":"Relating Software Requirements and Architectures","author":"M Shaw","year":"1996","unstructured":"Shaw M, Garlan D (1996) Software architecture: perspectives on an emerging discipline. Prentice Hall, Englewood Cliffs"},{"key":"1_CR7","volume-title":"Software architecture in practice","author":"L Bass","year":"2003","unstructured":"Bass L, Clements P, Kazman R (2003) Software architecture in practice, 2nd edn. Addison-Wesley Longman, Boston","edition":"2"},{"key":"1_CR8","first-page":"1","volume":"26","author":"W Royce","year":"1970","unstructured":"Royce W (1970) Managing the development of large software systems. Proc IEEE WESCON 26:1\u20139","journal-title":"Proc IEEE WESCON"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Cheng B, Atlee J (2007) Research directions in requirements engineering. In: Proceedings of FoSE 2007: future of software engineering. Washington, DC, pp 285\u2013303","DOI":"10.1109\/FOSE.2007.17"},{"key":"1_CR10","volume-title":"LEO: the first business computer","author":"P Bird","year":"1994","unstructured":"Bird P (1994) LEO: the first business computer. Hasler, Workingham"},{"key":"1_CR11","unstructured":"Grant RM (2003) Cases in contemporary strategy analysis. Blackwell, USA\/UK\/Australia\/Germany. ISBN 1405111801"},{"key":"1_CR12","first-page":"1077","volume":"86","author":"WM Turski","year":"1986","unstructured":"Turski WM (1986) And no philosophers\u2019 stone, either. Information processing 86:1077\u20131080","journal-title":"Information processing"},{"key":"1_CR13","unstructured":"McManus J, Wood-Harper T (2008) A study in project failure. Tech rep, Chartered Institute of IT. Last accessed 27 March 2011"}],"container-title":["Relating Software Requirements and Architectures"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21001-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T08:16:27Z","timestamp":1621498587000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-21001-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642210006","9783642210013"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21001-3_1","relation":{},"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"14 July 2011","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}