{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:58:28Z","timestamp":1765040308416,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,20]],"date-time":"2011-06-20T00:00:00Z","timestamp":1308528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,20]]},"DOI":"10.1145\/2000259.2000275","type":"proceedings-article","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T17:34:50Z","timestamp":1309282490000},"page":"85-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Architecture-based reliability evaluation under uncertainty"],"prefix":"10.1145","author":[{"given":"Indika","family":"Meedeniya","sequence":"first","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, Australia"}]},{"given":"Irene","family":"Moser","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, Australia"}]},{"given":"Aldeida","family":"Aleti","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, Australia"}]},{"given":"Lars","family":"Grunske","sequence":"additional","affiliation":[{"name":"University of Kaiserslautern, Kaiserslautern, Germany"}]}],"member":"320","published-online":{"date-parts":[[2011,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009382.1009749"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.2334-5837.2006.tb02844.x"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.9"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11732242_71"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11786160_10"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"H. Beyer and B. Sendhoff. Robust optimization - A comprehensive survey. Computer Methods in Applied Mechanics and Engineering 196(33--34):3190--3218 2007.  H. Beyer and B. Sendhoff. Robust optimization - A comprehensive survey. Computer Methods in Applied Mechanics and Engineering 196(33--34):3190--3218 2007.","DOI":"10.1016\/j.cma.2007.03.003"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2010.01.106"},{"volume-title":"Springer-Verlag","year":"2010","author":"Birolini A.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.234477"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.833312"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-8352(01)00066-3"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770657.1770670"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Parallel and Distributed Processing","author":"Fiondella L.","year":"2008"},{"key":"e_1_3_2_1_14_1","first-page":"146","volume-title":"Fault Tree Analysis of Software-Controlled Component Systems Based on Second-Order Probabilities. In Int. Symp. on Software Reliability Engineering","author":"F\u00f6rster M.","year":"2009"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(01)00034-7"},{"key":"e_1_3_2_1_16_1","first-page":"64","volume-title":"Int. Sym. on Software Reliability Engineering","author":"Gokhale S.","year":"2003"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.78"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2005.25"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2006.11"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/951952.952354"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1890580.1890601"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2008.32"},{"key":"e_1_3_2_1_23_1","first-page":"111","volume":"2469","author":"Jhumka A.","year":"2002","journal-title":"Component-Based Synthesis of Dependable Embedded Software. Lecture Notes in Computer Science"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"P. Kubat. Assessing reliability of modular software. Operations research letters 8(1):35--41 1989.  P. Kubat. Assessing reliability of modular software. Operations research letters 8(1):35--41 1989.","DOI":"10.1016\/0167-6377(89)90031-X"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2007.03.032"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2005.847279"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13821-8_6"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.01.004"},{"volume-title":"Wiley-India","year":"2007","author":"Montgomery D.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"W. Oberkampf J. Helton C. Joslyn S. Wojtkiewicz and S. Ferson. Challenge problems: uncertainty in system response given uncertain parameters. Reliability Engineering & System Safety 85(1--3):11--19 2004.  W. Oberkampf J. Helton C. Joslyn S. Wojtkiewicz and S. Ferson. Challenge problems: uncertainty in system response given uncertain parameters. Reliability Engineering & System Safety 85(1--3):11--19 2004.","DOI":"10.1016\/j.ress.2004.03.002"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134432"},{"key":"e_1_3_2_1_32_1","first-page":"108","article-title":"A Bayesian Model for Predicting Reliability of Software Systems at the Architectural Level","volume":"4880","author":"Roshandel R.","year":"2007","journal-title":"LNCS"},{"volume-title":"Wiley-interscience","year":"2008","author":"Rubinstein R.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2007.03.022"},{"key":"e_1_3_2_1_35_1","unstructured":"K. Trivedi. Probability & Statistics with Reliability Queuing and Computer Science Applications. Wiley-India 2009.   K. Trivedi. Probability & Statistics with Reliability Queuing and Computer Science Applications. Wiley-India 2009."},{"key":"e_1_3_2_1_36_1","first-page":"143","volume-title":"Dependable Computing, 1999. Proceedings. 1999 Pacific Rim International Symposium on","author":"Wang W.","year":"2002"},{"key":"e_1_3_2_1_37_1","first-page":"395","article-title":"Fault-tolerant embedded system design and optimization considering reliability estimation uncertainty","volume":"92","author":"Wattanapongskorn N.","year":"2007","journal-title":"Rel. Eng."},{"key":"e_1_3_2_1_38_1","first-page":"229","volume-title":"Reliability and Maintainability Symposium","author":"Yin L.","year":"2001"}],"event":{"name":"Comparch '11: Federated Events on Component-Based Software Engineering and Software Architecture","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Boulder Colorado USA","acronym":"Comparch '11"},"container-title":["Proceedings of the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS on Quality of software architectures -- QoSA and architecting critical systems -- ISARCS"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000259.2000275","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2000259.2000275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:00:00Z","timestamp":1750244400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000259.2000275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,20]]},"references-count":38,"alternative-id":["10.1145\/2000259.2000275","10.1145\/2000259"],"URL":"https:\/\/doi.org\/10.1145\/2000259.2000275","relation":{},"subject":[],"published":{"date-parts":[[2011,6,20]]},"assertion":[{"value":"2011-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}