{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T05:31:01Z","timestamp":1775194261656,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T00:00:00Z","timestamp":1527724800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10270-018-0684-3","type":"journal-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T04:18:50Z","timestamp":1527740330000},"page":"2609-2632","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["SQME: a framework for modeling and evaluation of software architecture quality attributes"],"prefix":"10.1007","volume":"18","author":[{"given":"Ali","family":"Sedaghatbaf","sequence":"first","affiliation":[]},{"given":"Mohammad Abdollahi","family":"Azgomi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,31]]},"reference":[{"key":"684_CR1","unstructured":"Becker, S., Kapova, L.H.: Towards a methodology driven by relationships of quality attributes for QoS-based analysis. In: Proceedings of the 4th ACM\/SPEC International Conference on Performance Engineering, 2013, pp. 311\u2013314"},{"key":"684_CR2","unstructured":"Martens, A., Koziolek, H., Becker, S., Reussner, R.: Automatically improve software architecture models for performance, reliability, and cost using evolutionary algorithms. In: Proceedings of the First Joint WOSP\/SIPEW International Conference on Performance Engineering, 2010, pp. 105\u2013116"},{"key":"684_CR3","unstructured":"Trubiani, C., Meedeniya, I., Cortellessa, V., Aleti, A., Grunske, L.: Model-based performance analysis of software architectures under uncertainty. In: Proceedings of the 9th International ACM Sigsoft Conference on Quality of Software Architectures, 2013, pp. 69\u201378"},{"key":"684_CR4","unstructured":"Autili, M., Cortellessa, V., Di Ruscio, D., Inverardi, P., Pelliccione, P., Tivoli, M.: EAGLE: engineering software in the ubiquitous globe by leveraging uncertainty. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, 2011, pp. 488\u2013491"},{"issue":"8","key":"684_CR5","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1016\/j.peva.2009.11.003","volume":"69","author":"J Xu","year":"2012","unstructured":"Xu, J.: Rule-based automatic software performance diagnosis and improvement. Perform. Eval. 69(8), 525\u2013550 (2012)","journal-title":"Perform. Eval."},{"key":"684_CR6","unstructured":"Esfahani, N., Malek, S., Razavi, K.: GuideArch: guiding the exploration of architectural solution space under uncertainty. In: Proceedings of the International Conference on Software Engineering, 2013, pp. 43\u201352"},{"issue":"1","key":"684_CR7","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.csda.2006.04.015","volume":"51","author":"D Dubois","year":"2006","unstructured":"Dubois, D.: Possibility theory and statistical reasoning. Comput. Stat. Data Anal. 51(1), 47\u201369 (2006)","journal-title":"Comput. Stat. Data Anal."},{"key":"684_CR8","unstructured":"Shafer, G.: The Dempster\u2013Shafer Theory. Encycl. Artif. Intell. 2nd edn., pp. 330\u2013331 (2008)"},{"issue":"2","key":"684_CR9","first-page":"137","volume":"8","author":"A Sedaghatbaf","year":"2016","unstructured":"Sedaghatbaf, A., Azgomi, M.A.: Quantitative evaluation of software security: an approach based on UML\/SecAM and evidence theory. ISC. Int. J. Inf. Secur. 8(2), 137\u2013149 (2016)","journal-title":"ISC. Int. J. Inf. Secur."},{"key":"684_CR10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2017.0077","author":"A Sedaghatbaf","year":"2018","unstructured":"Sedaghatbaf, A., Azgomi, M.A.: Reliability evaluation of UML-DAM models under unertainty. IET Softw. (2018). https:\/\/doi.org\/10.1049\/iet-sen.2017.0077","journal-title":"IET Softw."},{"key":"684_CR11","unstructured":"Group, O.M.: UML Profile for MARTE: Modeling and Analysis of Real-Time Embedded Systems v.1.0 (2009)"},{"issue":"3","key":"684_CR12","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s10270-009-0128-1","volume":"10","author":"S Bernardi","year":"2011","unstructured":"Bernardi, S., Merseguer, J., Petriu, D.C.: A dependability profile within MARTE. Softw. Syst. Model. 10(3), 313\u2013336 (2011)","journal-title":"Softw. Syst. Model."},{"key":"684_CR13","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)"},{"key":"684_CR14","unstructured":"Petriu, D.C., Alhaj, M., Tawhid, R.: Software performance modeling. In: Proceedings of the 12th International Conference on Formal Methods for the Design of Computer, Communication, and Software Systems: Formal Methods for Model-driven Engineering, 2012, pp. 219\u2013262"},{"issue":"1","key":"684_CR15","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TSE.2010.10","volume":"37","author":"S Distefano","year":"2011","unstructured":"Distefano, S., Scarpa, M., Puliafito, A.: From UML to Petri nets: the PCM-based methodology. IEEE Trans. Softw. Eng. 37(1), 65\u201379 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"6","key":"684_CR16","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1109\/TSE.2011.94","volume":"38","author":"F Brosch","year":"2012","unstructured":"Brosch, F., Koziolek, H., Buhnova, B., Reussner, R.: Architecture-based reliability prediction with the palladio component model. IEEE Trans. Softw. Eng. 38(6), 1319\u20131339 (2012)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"684_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jss.2008.03.066","volume":"82","author":"S Becker","year":"2009","unstructured":"Becker, S., Koziolek, H., Reussner, R.: The palladio component model for model-driven performance prediction. J. Syst. Softw. 82(1), 3\u201322 (2009)","journal-title":"J. Syst. Softw."},{"key":"684_CR18","first-page":"1","volume":"2012","author":"S Bernardi","year":"2012","unstructured":"Bernardi, S., Merseguer, J., Petriu, D.C.: Dependability modeling and assessment in UML-based software development. Sci. World J. 2012, 1\u201311 (2012)","journal-title":"Sci. World J."},{"issue":"1","key":"684_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2379776.2379778","volume":"45","author":"S Bernardi","year":"2012","unstructured":"Bernardi, S., Merseguer, J., Petriu, D.C.: Dependability modeling and analysis of software systems specified with UML. ACM Comput. Surv. 45(1), 1\u201348 (2012)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"684_CR20","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.cosrev.2010.06.001","volume":"4","author":"O R\u00e4ih\u00e4","year":"2010","unstructured":"R\u00e4ih\u00e4, O.: A survey on search-based software design. Comput. Sci. Rev. 4(4), 203\u2013249 (2010)","journal-title":"Comput. Sci. Rev."},{"issue":"5","key":"684_CR21","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/TSE.2012.64","volume":"39","author":"A Aleti","year":"2013","unstructured":"Aleti, A., Buhnova, B., Grunske, L., Koziolek, A., Meedeniya, I.: Software architecture optimization methods: a systematic literature review. IEEE Trans. Softw. Eng. 39(5), 658\u2013683 (2013)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"10","key":"684_CR22","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1016\/j.jss.2013.04.001","volume":"86","author":"M Walker","year":"2013","unstructured":"Walker, M., Reiser, M.O., Tucci-Piergiovanni, S., Papadopoulos, Y., L\u00f6nn, H., Mraidha, C., Parker, D., Chen, D., Servat, D.: Automatic optimisation of system architectures using EAST-ADL. J. Syst. Softw. 86(10), 2467\u20132487 (2013)","journal-title":"J. Syst. Softw."},{"key":"684_CR23","unstructured":"Cuenot, P., Chen, D., G\u00e9rard, S., L\u00f6nn, H., Reiser, M.O., Servat, D., Sj\u00f6stedt, C.J., Kolagari, R.T., T\u00f6rngren, M., Weber, M.: Managing complexity of automotive electronics using the EAST-ADL. In: Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS, 2007, pp. 353\u2013358"},{"key":"684_CR24","unstructured":"Deb, K., Agrawal, S., Pratap, A., Meyarivan, T.: A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II. In: Parallel Problem Solving from Nature, 2000, pp. 849\u2013858"},{"issue":"10","key":"684_CR25","doi-asserted-by":"publisher","first-page":"2542","DOI":"10.1016\/j.jss.2013.03.081","volume":"86","author":"A Koziolek","year":"2013","unstructured":"Koziolek, A., Ardagna, D., Mirandola, R.: Hybrid multi-attribute QoS optimization in component based software systems. J. Syst. Softw. 86(10), 2542\u20132558 (2013)","journal-title":"J. Syst. Softw."},{"key":"684_CR26","unstructured":"Koziolek, A., Koziolek, H., Reussner, R.: PerOpteryx: automated application of tactics in multi-objective software architecture optimization. In: Proceedings of the Joint ACM SIGSOFT Conference and ACM SIGSOFT Symposium on Quality of Software Architectures and Architecting Critical Systems, 2011, pp. 33\u201342"},{"key":"684_CR27","unstructured":"Meedeniya, I., Moser, I., Aleti, A., Grunske, L.: Architecture-based reliability evaluation under uncertainty. In: Proceedings of the Joint ACM SIGSOFT Conference and ACM SIGSOFT Symposium on Quality of Software Architectures and Architecting Critical Systems, 2011, pp. 85\u201394"},{"issue":"10","key":"684_CR28","doi-asserted-by":"publisher","first-page":"2340","DOI":"10.1016\/j.jss.2012.04.056","volume":"85","author":"I Meedeniya","year":"2012","unstructured":"Meedeniya, I., Aleti, A., Grunske, L.: Architecture-driven reliability optimization with uncertain model parameters. J. Syst. Softw. 85(10), 2340\u20132355 (2012)","journal-title":"J. Syst. Softw."},{"key":"684_CR29","unstructured":"Meedeniya, I., Aleti, A., Avazpour, I., Amin, A.: Robust ArcheOpterix: architecture optimization of embedded systems under uncertainty. In: Proceedings of 2012 2nd International Workshop on Software Engineering for Embedded Systems, 2012, pp. 23\u201329"},{"key":"684_CR30","doi-asserted-by":"crossref","unstructured":"Filieri, A., Ghezzi, C., Grassi, V., Mirandola, R.: Reliability analysis of component-based systems with multiple failure modes. In: Grunske, L., Reussner, R., Plasil, F. (eds.) Component-Based Software Engineering, pp. 1\u201320. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-13238-4_1"},{"issue":"3","key":"684_CR31","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TDSC.2007.70240","volume":"5","author":"ST Halkidis","year":"2008","unstructured":"Halkidis, S.T., Tsantalis, N., Chatzigeorgiou, A., Stephanides, G.: Architectural risk analysis of software systems based on security patterns. Dependable Secur. Comput. IEEE Trans. 5(3), 129\u2013142 (2008)","journal-title":"Dependable Secur. Comput. IEEE Trans."},{"key":"684_CR32","unstructured":"Kazman, R., Klein, M., Barbacci, M., Longstaff, T., Lipson, H., Carriere, J.: The architecture tradeoff analysis method. In: Proceedings of the Fourth IEEE International Conference on Engineering of Complex Computer Systems, 1998, pp. 68\u201378"},{"key":"684_CR33","unstructured":"Kazman, R., Asundi, J., Klein, M.: Quantifying the costs and benefits of architectural decisions. In: Proceedings of the International Conference on Software Engineering, 2001, pp. 297\u2013306"},{"key":"684_CR34","unstructured":"Al-Naeem, T., Gorton, I., Babar, M.a., Rabhi, F., Benatallah, B.: A quality-driven systematic approach for architecting distributed software applications. In: Proceedings of the 27th International Conference on Software Engineering, 2005, pp. 244\u2013253"},{"key":"684_CR35","volume-title":"The Analytic Hierarchy Process","author":"TL Saaty","year":"1980","unstructured":"Saaty, T.L.: The Analytic Hierarchy Process. Applications and Studies, Berlin (1980)"},{"key":"684_CR36","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.asoc.2014.03.014","volume":"21","author":"FR Lima Junior","year":"2014","unstructured":"Lima Junior, F.R., Osiro, L., Carpinetti, L.C.R.: A comparison between fuzzy AHP and fuzzy TOPSIS methods to supplier selection. Appl. Soft Comput. 21, 194\u2013209 (2014)","journal-title":"Appl. Soft Comput."},{"issue":"7\u20138","key":"684_CR37","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/s00170-007-1249-8","volume":"39","author":"I Ertugrul","year":"2008","unstructured":"Ertugrul, I., Karaka\u015foglu, N.: Comparison of fuzzy AHP and fuzzy TOPSIS methods for facility location selection. Int. J. Adv. Manuf. Technol. 39(7\u20138), 783\u2013795 (2008)","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"684_CR38","doi-asserted-by":"publisher","DOI":"10.2172\/800792","volume-title":"Combination of Evidence in Dempster\u2013Shafer Theory","author":"K Sentz","year":"2002","unstructured":"Sentz, K., Ferson, S.: Combination of Evidence in Dempster\u2013Shafer Theory, vol. 835. Sandia National Laboratories, Albuquerque (2002)"},{"issue":"9","key":"684_CR39","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1109\/TCOM.1976.1093424","volume":"24","author":"PM Merlin","year":"1976","unstructured":"Merlin, P.M., Farber, D.J.: Recoverability of communication protocols: implications of a theoretical study. IEEE Trans. Commun. 24(9), 1036\u20131043 (1976)","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"684_CR40","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/TII.2009.2017201","volume":"5","author":"S Bernardi","year":"2009","unstructured":"Bernardi, S., Campos, J.: Computation of performance bounds for real-time systems using time Petri nets. IEEE Trans. Ind. Informatics 5(2), 168\u2013180 (2009)","journal-title":"IEEE Trans. Ind. Informatics"},{"key":"684_CR41","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T Murata","year":"1989","unstructured":"Murata, T.: Petri nets: properties, analysis and applications. Proc. IEEE 77, 541\u2013580 (1989)","journal-title":"Proc. IEEE"},{"key":"684_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-11218-8_1","volume":"272","author":"CA Coello Coello","year":"2010","unstructured":"Coello Coello, C.A., Dhaenens, C., Jourdan, L.: Multi-objective combinatorial optimization: problematic and context. Stud. Comput. Intell. 272, 1\u201321 (2010)","journal-title":"Stud. Comput. Intell."},{"key":"684_CR43","unstructured":"Etemaadi, R., Emmerich, M.T.M., Chaudron, M.R.V.: Problem-specific search operators for metaheuristic software architecture design. In: International Symposium on Search Based Software Engineering, 2012, pp. 267\u2013272"},{"key":"684_CR44","unstructured":"Sedaghatbaf, A.: SQME Tool Web Page (2018). [Online]. Available: http:\/\/webpages.iust.ac.ir\/azgomi\/TwCL\/sqme.htm"},{"key":"684_CR45","doi-asserted-by":"crossref","unstructured":"G\u00e9rard, S., Dumoulin, C., Tessier, P., Selic, B.: 19 Papyrus: a UML2 tool for domain-specific language modeling. In: Model-Based Engineering of Embedded Real-Time Systems, pp. 361\u2013368. Springer, Berlin Heidelberg (2010)","DOI":"10.1007\/978-3-642-16277-0_19"},{"key":"684_CR46","unstructured":"DICE Profiles 2016. [Online]. Available: http:\/\/dice-project.github.io\/DICE-Profiles\/"},{"key":"684_CR47","unstructured":"MOEA Framework. [Online]. Available: http:\/\/moeaframework.org\/"},{"issue":"2","key":"684_CR48","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10270-006-0026-8","volume":"6","author":"DB Petriu","year":"2007","unstructured":"Petriu, D.B., Woodside, M.: An intermediate metamodel with scenarios and resources for generating performance models from UML designs. Softw. Syst. Model. 6(2), 163\u2013184 (2007)","journal-title":"Softw. Syst. Model."}],"container-title":["Software &amp; Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-018-0684-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10270-018-0684-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-018-0684-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T19:36:45Z","timestamp":1661369805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10270-018-0684-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,31]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["684"],"URL":"https:\/\/doi.org\/10.1007\/s10270-018-0684-3","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"value":"1619-1366","type":"print"},{"value":"1619-1374","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,31]]},"assertion":[{"value":"21 July 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 May 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}