{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T14:54:30Z","timestamp":1772463270061,"version":"3.50.1"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000005","name":"Department of Defense","doi-asserted-by":"publisher","award":["FA8721-05-C-0003"],"award-info":[{"award-number":["FA8721-05-C-0003"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007063","name":"Carnegie Mellon University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007063","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Software Engineering Institute"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2016,3,1]]},"DOI":"10.1109\/tse.2015.2465387","type":"journal-article","created":{"date-parts":[[2015,8,31]],"date-time":"2015-08-31T18:31:54Z","timestamp":1441045914000},"page":"220-260","source":"Crossref","is-referenced-by-count":24,"title":["Evaluating the Effects of Architectural Documentation: A Case Study of a Large Scale Open Source Project"],"prefix":"10.1109","volume":"42","author":[{"given":"Rick","family":"Kazman","sequence":"first","affiliation":[]},{"given":"Dennis","family":"Goldenson","sequence":"additional","affiliation":[]},{"given":"Ira","family":"Monarch","sequence":"additional","affiliation":[]},{"given":"William","family":"Nichols","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Valetto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985850"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.16"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13244-5_23"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.98"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227030"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606653"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568241"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/52.469759"},{"key":"ref75","author":"yin","year":"2009","journal-title":"Case Study Research Design and Methods"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226458144.001.0001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2003.09.015"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CGC.2012.50"},{"key":"ref31","author":"harris","year":"1989","journal-title":"The Form of Information in Science Analysis of An Immunology Sublanguage"},{"key":"ref30","author":"halliday","year":"1993","journal-title":"Writing Science Literacy and Discursive Power"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1538788.1538808"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008781513258"},{"key":"ref35","author":"kaplan","year":"1964","journal-title":"The Conduct of Inquiry Methodology for Behavioral Science"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v027.i03"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496972"},{"key":"ref62","year":"2015"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.3758\/BF03192778"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(89)90016-6"},{"key":"ref28","article-title":"Making open source ready for the enterprise: The open source maturity model","year":"2008"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/FLOSS.2009.5071355"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945450"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.10.005"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-72486-7_14"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624039"},{"key":"ref67","author":"taylor","year":"2009","journal-title":"Software Architecture Foundations Theory and Practice"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.06.043"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39031-9_15"},{"key":"ref2","author":"anthonisse","year":"1971","journal-title":"The rush in a graph"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636716"},{"key":"ref20","article-title":"&#x2018;It takes all kinds&#x2019;: A simulation modelling perspective on motivation and coordination in libre software development projects","author":"dalle","year":"2007","journal-title":"Stanford Inst Econ Policy Res"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2014.26"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.01.008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/FLOSS.2007.9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145345"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoecopol.2008.06.002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"ref50","article-title":"The business readiness rating model: an evaluation framework for open source","year":"0","journal-title":"Proceedings of the EFOSS Workshop"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.119"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92966-6_27"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:20020202"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.infoecopol.2008.05.001"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-006-9020-5"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1002\/9781118181034"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39031-9_7"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/235392"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9211-2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-07408-2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF02016546"},{"key":"ref40","year":"2015"},{"key":"ref12","first-page":"11","article-title":"Big data and the collective turn in biomedicine: How should we analyze post-genomic practices?","volume":"5","author":"cambrosio","year":"2014","journal-title":"TECNOSCIENZA Italian J Sci Technol Stud"},{"key":"ref13","author":"campbell","year":"1963","journal-title":"Experimental and Quasi-Experimental Designs for Research"},{"key":"ref14","author":"clements","year":"2002","journal-title":"Documenting Software Architectures Views and Beyond"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(1998)49:13<1206::AID-ASI7>3.0.CO;2-F"},{"key":"ref16","article-title":"Designing and conducting mixed methods research","author":"creswell","year":"2007","journal-title":"Designing and Conducting Mixed Methods Research"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v10i2.1207"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/spip.259"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2089125.2089127"},{"key":"ref4","article-title":"Method for qualification and selection of open source software (QSOS) Version 1.6","year":"2006"},{"key":"ref3","article-title":"HDFS Architecture","year":"2014"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2366.001.0001","author":"baldwin","year":"2000","journal-title":"Design Rules Vol 1 The Power of Modularity"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02374-3"},{"key":"ref8","author":"bass","year":"2013","journal-title":"Software Architecture in Practice"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24418-6_4"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/0165-6074(85)90032-8"},{"key":"ref9","author":"brown","year":"2012","journal-title":"The Architecture of Open Source Applications"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.74"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/27636.27637"},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.21236\/ADA488178","article-title":"Requirements and their impact downstream: Improving causal analysis processes through measurement and analysis of textual information","author":"monarch","year":"2008"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/567793.567795"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2007.05.005"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815355"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1060.0552"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2007040102"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/7432057\/07230299.pdf?arnumber=7230299","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:34:42Z","timestamp":1633919682000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7230299\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,1]]},"references-count":77,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tse.2015.2465387","relation":{},"ISSN":["0098-5589","1939-3520"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,1]]}}}