{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:20:32Z","timestamp":1730215232848,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ecbs.2004.1316696","type":"proceedings-article","created":{"date-parts":[[2004,11,12]],"date-time":"2004-11-12T19:14:14Z","timestamp":1100286854000},"page":"168-177","source":"Crossref","is-referenced-by-count":7,"title":["Non-functional refinement of computer based systems architecture"],"prefix":"10.1109","author":[{"given":"M.","family":"Denford","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J.","family":"Leaney","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"T.","family":"O'Neill","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"journal-title":"IBM Insurance Application Architecture (IAA)","year":"0","key":"19"},{"journal-title":"Strategies for Real-Time System Specification","year":"1987","author":"hatley","key":"17"},{"journal-title":"Putting Systems to Work","year":"1992","author":"hitchins","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1142\/9789812798039_0001"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-2704-5"},{"key":"13","article-title":"Representing Architectural Evolution","author":"erdogmus","year":"1998","journal-title":"Proceedings of the 1998 Conference of the Centre for Advanced Studies on Collaborative Research"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2000.883020"},{"journal-title":"A Worked Example for the Non-Functional Refinement of Computer Based Systems","year":"2003","author":"denford","key":"11"},{"journal-title":"Four Quartets","year":"1968","author":"eliot","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/32.385972"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/32.825767"},{"key":"22","article-title":"Using Composition & Refinement to Support Security Architecture Trade-off Analysis","author":"payne","year":"1999","journal-title":"22nd National Information Systems Security Conference"},{"key":"23","first-page":"96","article-title":"Refinement of pipe-and-filter architectures","volume":"1708","author":"philipps","year":"1999","journal-title":"Fm'99-formal Methods Vol 1708 Lecture Notes in Computer Science"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/10.1.46"},{"journal-title":"Systems Architecting Creating and Building Complex Systems","year":"1991","author":"rechtin","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/372202.372299"},{"journal-title":"Computer Structures Principles and Examples","year":"1982","author":"siewiorek","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/22.4.332"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:20030419"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSD.1996.501142"},{"journal-title":"The Official Handbook of MASCOT Version 3 1 - Issue 1","year":"1987","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2003.1194781"},{"journal-title":"The Official Handbook of MASCOT Version 1 - Issue 1","year":"1978","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2003.1194795"},{"journal-title":"Computer Structures Readings and Examples","year":"1971","author":"bell","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2001.922416"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2002.1115011"},{"journal-title":"Structured Development for Real-Time Systems","year":"1985","author":"ward","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1988.93684"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36557-5_8"},{"key":"8","article-title":"Formal Refinement of Software Architectures Based on Rewriting Logic","author":"bolusset","year":"2002","journal-title":"Proceedings of RCS'02 - International workshop on refinement of critical systems Methods tools and experience"}],"event":{"name":"Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004.","location":"Brno, Czech Republic"},"container-title":["Proceedings. 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9203\/29178\/01316696.pdf?arnumber=1316696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T00:36:42Z","timestamp":1489451802000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1316696\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ecbs.2004.1316696","relation":{},"subject":[]}}