{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T03:58:22Z","timestamp":1768881502874,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,20]],"date-time":"2011-06-20T00:00:00Z","timestamp":1308528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,20]]},"DOI":"10.1145\/2000259.2000267","type":"proceedings-article","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T17:34:50Z","timestamp":1309282490000},"page":"33-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":78,"title":["PerOpteryx"],"prefix":"10.1145","author":[{"given":"Anne","family":"Koziolek","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"given":"Heiko","family":"Koziolek","sequence":"additional","affiliation":[{"name":"ABB Corporate Research, Ladenburg, Germany"}]},{"given":"Ralf","family":"Reussner","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2011,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOMPES.2009.5069138"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.9"},{"key":"e_1_3_2_1_3_1","volume-title":"Software Architecture in Practice","author":"Bass L.","year":"2003","unstructured":"L. Bass , P. Clements , and R. Kazman . Software Architecture in Practice , Second Edition. Addison-Wesley , 2003 . L. Bass, P. Clements, and R. Kazman. Software Architecture in Practice, Second Edition. Addison-Wesley, 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2008.03.066"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068189"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02161-9_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-8352(99)00022-4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11218-8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1007\/3-540-45356-3_83","volume-title":"Parallel Problem Solving from Nature PPSN VI","author":"Deb K.","year":"2000","unstructured":"K. Deb , S. Agrawal , A. Pratap , and T. Meyarivan . A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II . In Parallel Problem Solving from Nature PPSN VI , volume 1917\/2000 , pages 849 -- 858 . Springer , 2000 . K. Deb, S. Agrawal, A. Pratap, and T. Meyarivan. A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II. In Parallel Problem Solving from Nature PPSN VI, volume 1917\/2000, pages 849--858. Springer, 2000."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87879-7_11"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.74"},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","first-page":"188","volume-title":"WADS","author":"Grunske L.","year":"2006","unstructured":"L. Grunske , P. A. Lindsay , E. Bondarev , Y. Papadopoulos , and D. Parker . An outline of an architecture-based method for optimizing dependability attributes of software-intensive systems . In WADS , volume 4615 of LNCS , pages 188 -- 209 . Springer , 2006 . L. Grunske, P. A. Lindsay, E. Bondarev, Y. Papadopoulos, and D. Parker. An outline of an architecture-based method for optimizing dependability attributes of software-intensive systems. In WADS, volume 4615 of LNCS, pages 188--209. Springer, 2006."},{"key":"e_1_3_2_1_13_1","volume-title":"Intel\u00ae processor price list, effective feb 8th","author":"Intel Corporation","year":"2010","unstructured":"Intel Corporation . Intel\u00ae processor price list, effective feb 8th , 2010 . http:\/\/www.intc.com\/priceList.cfm, 2010. last visit March 10th, 2010. Intel Corporation. Intel\u00ae processor price list, effective feb 8th, 2010. http:\/\/www.intc.com\/priceList.cfm, 2010. last visit March 10th, 2010."},{"key":"e_1_3_2_1_14_1","volume-title":"The Art of Computer Systems Performance Analysis","author":"Jain R.","year":"1991","unstructured":"R. Jain . The Art of Computer Systems Performance Analysis . Wiley , 1991 . R. Jain. The Art of Computer Systems Performance Analysis. Wiley, 1991."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/838237.838496"},{"key":"e_1_3_2_1_16_1","first-page":"22","volume-title":"MCDM Techniques Selection Approaches: State of the Art. In IEEE Symp. on Computational Intelligence in Multicriteria Decision Making","author":"Kornyshova E.","year":"2007","unstructured":"E. Kornyshova and C. Salinesi . MCDM Techniques Selection Approaches: State of the Art. In IEEE Symp. on Computational Intelligence in Multicriteria Decision Making , pages 22 -- 29 , April 2007 . E. Kornyshova and C. Salinesi. MCDM Techniques Selection Approaches: State of the Art. In IEEE Symp. on Computational Intelligence in Multicriteria Decision Making, pages 22--29, April 2007."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2009.07.007"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69814-2_6"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87891-9_4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1712605.1712624"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9142-8"},{"key":"e_1_3_2_1_22_1","volume-title":"Performance by Design","author":"Menasc\u00e9 D. A.","year":"2004","unstructured":"D. A. Menasc\u00e9 , V. A. F. Almeida , and L. W. Dowdy . Performance by Design . Prentice Hall , 2004 . D. A. Menasc\u00e9, V. A. F. Almeida, and L. W. Dowdy. Performance by Design. Prentice Hall, 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1712605.1712612"},{"key":"e_1_3_2_1_24_1","volume-title":"Microsoft Press","author":"Cooperation Microsoft","year":"2004","unstructured":"Microsoft Cooperation . Improving . NET Application Performance and Scalability (Patterns and Practices) . Microsoft Press , 2004 . Microsoft Cooperation. Improving .NET Application Performance and Scalability (Patterns and Practices). Microsoft Press, 2004."},{"key":"e_1_3_2_1_25_1","volume-title":"UML Profile for Modeling and Analysis of Real-Time and Embedded systems (MARTE) RFP (realtime\/05-02-06)","author":"Object Management Group (OMG).","year":"2006","unstructured":"Object Management Group (OMG). UML Profile for Modeling and Analysis of Real-Time and Embedded systems (MARTE) RFP (realtime\/05-02-06) , 2006 . Object Management Group (OMG). UML Profile for Modeling and Analysis of Real-Time and Embedded systems (MARTE) RFP (realtime\/05-02-06), 2006."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2008.7.3.a1"},{"key":"e_1_3_2_1_27_1","volume-title":"Performance Solutions","author":"Smith C. U.","year":"2002","unstructured":"C. U. Smith and L. G. Williams . Performance Solutions . Addison-Wesley , 2002 . C. U. Smith and L. G. Williams. Performance Solutions. Addison-Wesley, 2002."},{"key":"e_1_3_2_1_28_1","volume-title":"Software Architecture: Foundations, Theory, and Practice","author":"Taylor R. N.","year":"2009","unstructured":"R. N. Taylor , N. Medvidovic , and E. M. Dashofy . Software Architecture: Foundations, Theory, and Practice . Wiley , 2009 . R. N. Taylor, N. Medvidovic, and E. M. Dashofy. Software Architecture: Foundations, Theory, and Practice. Wiley, 2009."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/974043.974089"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2009.07.004"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2003.810758"}],"event":{"name":"Comparch '11: Federated Events on Component-Based Software Engineering and Software Architecture","location":"Boulder Colorado USA","acronym":"Comparch '11","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS on Quality of software architectures -- QoSA and architecting critical systems -- ISARCS"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000259.2000267","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2000259.2000267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:10Z","timestamp":1750240450000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000259.2000267"}},"subtitle":["automated application of tactics in multi-objective software architecture optimization"],"short-title":[],"issued":{"date-parts":[[2011,6,20]]},"references-count":31,"alternative-id":["10.1145\/2000259.2000267","10.1145\/2000259"],"URL":"https:\/\/doi.org\/10.1145\/2000259.2000267","relation":{},"subject":[],"published":{"date-parts":[[2011,6,20]]},"assertion":[{"value":"2011-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}