{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T18:54:50Z","timestamp":1773600890060,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,5,10]],"date-time":"2008-05-10T00:00:00Z","timestamp":1210377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,5,10]]},"DOI":"10.1145\/1370175.1370181","type":"proceedings-article","created":{"date-parts":[[2008,5,15]],"date-time":"2008-05-15T14:36:48Z","timestamp":1210862208000},"page":"899-910","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":91,"title":["Runtime software adaptation"],"prefix":"10.1145","author":[{"given":"Peyman","family":"Oreizy","sequence":"first","affiliation":[{"name":"Launch21, Seattle, WA, USA"}]},{"given":"Nenad","family":"Medvidovic","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Richard N.","family":"Taylor","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,5,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"VMware. http:\/\/www.vmware.com\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Xen. http:\/\/xen.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"The Globus Alliance. http:\/\/www.globus.org\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053581"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/581571.581573"},{"key":"e_1_3_2_1_6_1","unstructured":"Baset S.A. and Schulzrinne H. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. Columbia University Report CUCS-039-04 2004."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2007.4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/380749.380767"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1265522"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251264"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287660"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/514183.514185"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1009167"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.1012334"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.175"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/256664.256677"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.385973"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.19"},{"key":"e_1_3_2_1_20_1","volume-title":"Computational Genomics","author":"Larson S.M.","year":"2002","unstructured":"Larson, S.M., Snow, C.D., Shirts, M.R., and Pande, V.S. Folding@Home and Genome@Home: Using distributed computing to tackle previously intractable problems in computational biology. In Computational Genomics. Horizon Press, 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.464548"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/239098.239104"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.708567"},{"key":"e_1_3_2_1_24_1","volume-title":"Microsoft Corporation","author":"MicrosoftTechNet","year":"2008","unstructured":"MicrosoftTechNet. Introduction to Hotpatching. http:\/\/technet2.microsoft.com\/windowsserver\/en\/library\/8bf7c6e4-3175-43bd-a67a-827ff3a586011033.mspx?mfr=true, Microsoft Corporation, 2008."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.825699"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-sen:19982296"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.769885"},{"key":"e_1_3_2_1_28_1","unstructured":"Pingdom. Best and worst US online banks revealed. http:\/\/www.pingdom.com\/_img\/press\/best_and_worst_us_online_banks_revealed.pdf 2006."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.56450"},{"key":"e_1_3_2_1_30_1","volume-title":"Routine Upgrade Blamed for BlackBerry Outage. New York Times","author":"Reuters","year":"2008","unstructured":"Reuters. Routine Upgrade Blamed for BlackBerry Outage. New York Times. 12 February, 2008. http:\/\/www.nytimes.com\/2008\/02\/12\/technology\/12cnd-rim.html?ex=1360558800&en=eceb00610baba273&ei=5124&partner=permalink&exprod=permalink."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.508313"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1538494"},{"key":"e_1_3_2_1_33_1","volume-title":"Simulations of computing by self-assembly of DNA","author":"Winfree E.","year":"1998","unstructured":"Winfree, E. Simulations of computing by self-assembly of DNA. California Institute of Technology, Report CS-TR:1998:22, 1998."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/194467"}],"event":{"name":"ICSE '08: International Conference on Software Engineering","location":"Leipzig Germany","acronym":"ICSE '08","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","ACM Association for Computing Machinery"]},"container-title":["Companion Proceedings of the 30th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1370175.1370181","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1370175.1370181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T18:29:26Z","timestamp":1773599366000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1370175.1370181"}},"subtitle":["framework, approaches, and styles"],"short-title":[],"issued":{"date-parts":[[2008,5,10]]},"references-count":34,"alternative-id":["10.1145\/1370175.1370181","10.1145\/1370175"],"URL":"https:\/\/doi.org\/10.1145\/1370175.1370181","relation":{},"subject":[],"published":{"date-parts":[[2008,5,10]]},"assertion":[{"value":"2008-05-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}