{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:42Z","timestamp":1773655902896,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2593882.2593886","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"29-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["Software architecture: a travelogue"],"prefix":"10.1145","author":[{"given":"David","family":"Garlan","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/256428.167055"},{"key":"e_1_3_2_1_2_1","unstructured":"Agile Alliance Manifesto for Agile Software Development June 2001 http:\/\/agilemanifesto.org\/.  Agile Alliance Manifesto for Agile Software Development June 2001 http:\/\/agilemanifesto.org\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/258077.258078"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/257734.257745"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 1998 Spring Simulation Interoperability Workshop","author":"Bachinsky S.","year":"1998"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1965724.1965743"},{"key":"e_1_3_2_1_7_1","volume-title":"Third Edition. Addison Wesley","author":"Bass L.","year":"2012"},{"key":"e_1_3_2_1_8_1","volume-title":"Addison-Wesley\/Pearson Education","author":"Boehm B.","year":"2003"},{"key":"e_1_3_2_1_9_1","volume-title":"2nd Edition. Addison Wesley","author":"Booch G.","year":"2005"},{"key":"e_1_3_2_1_10_1","unstructured":"Bosch J. Design and Use of Software Architectures: Adopting and Evolving a Product-Line Approach. ACM Press\/Addison-Wesley Publ. Co. 2000.   Bosch J. Design and Use of Software Architectures: Adopting and Evolving a Product-Line Approach. ACM Press\/Addison-Wesley Publ. Co. 2000."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1753235.1753251"},{"key":"e_1_3_2_1_12_1","volume-title":"Wiley","author":"Buschmann F.","year":"1996"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02161-9_1"},{"key":"e_1_3_2_1_14_1","volume-title":"Addison-Wesley","author":"Clements P.","year":"2002"},{"key":"e_1_3_2_1_15_1","volume-title":"Second Edition. Addison-Wesley","author":"Clements P.","year":"2011"},{"key":"e_1_3_2_1_16_1","volume-title":"Addison Wesley","author":"Clements P.","year":"2002"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of AGARD'93","author":"Coglianese L.","year":"1993"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/157709.157715"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2001.948416"},{"key":"e_1_3_2_1_20_1","first-page":"1","article-title":"Software engineering for self-adaptive systems: A second research roadmap","volume":"7475","author":"De Lemos R.","year":"2013","journal-title":"Software Engineering for Self-Adaptive Systems II. Lecture Notes in Computer Science"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.1293071"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/363095.363143"},{"key":"e_1_3_2_1_23_1","volume-title":"Marshal and Brainerd","author":"Fairbanks G.","year":"2010"},{"key":"e_1_3_2_1_24_1","volume-title":"Addison-Wesley","author":"Feiler P.","year":"2012"},{"key":"e_1_3_2_1_25_1","volume-title":"Addison-Wesley","author":"Gamma E.","year":"1995"},{"issue":"4","key":"e_1_3_2_1_26_1","article-title":"Introduction to the special issue on software architecture","volume":"21","author":"Garlan D.","year":"1995","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of the 11th Australian Workshop on Safety Related Programmable Systems (SCS'06)","volume":"69","author":"Garlan D.","year":"2006"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336537"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.469757"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.86"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/193173.195404"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2009.5290799"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34059-8_9"},{"key":"e_1_3_2_1_34_1","volume-title":"Foundations of Component-Based Systems, Pages 47-68","author":"Garlan D.","year":"2000"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-89828-5_2"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.1012334"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/648326.754921"},{"key":"e_1_3_2_1_38_1","unstructured":"IEEE Standard 1471-2000. IEEE Recommended Practice for Architectural Description for Software-Intensive Systems. http:\/\/standards.ieee.org\/findstds\/standard\/1471- 2000.html  IEEE Standard 1471-2000. IEEE Recommended Practice for Architectural Description for Software-Intensive Systems. http:\/\/standards.ieee.org\/findstds\/standard\/1471- 2000.html"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.469759"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.167"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.59"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Lattanze A. Architecting Software Intensive Systems: A Practitioners Guide. CRC Press. 2009.   Lattanze A. Architecting Software Intensive Systems: A Practitioners Guide. CRC Press. 2009.","DOI":"10.1201\/9781420045703"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/645385.651497"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2005.28"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.825767"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/239098.239106"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593888"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.234169"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232209"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/141874.141884"},{"key":"e_1_3_2_1_52_1","volume-title":"Prentice Hall","author":"Rechtin E.","year":"1991"},{"key":"e_1_3_2_1_53_1","volume-title":"Wiley","author":"Schmidt D.","year":"2000"},{"key":"e_1_3_2_1_54_1","volume-title":"M. Architectural Requirements for Computing with Coalitions of Resources. In Proceedings of the 1st Working IFIP Conf. on Software Architecture","author":"Shaw","year":"1999"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/645979.676005"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.58"},{"key":"e_1_3_2_1_57_1","volume-title":"Prentice Hall","author":"Shaw M.","year":"1996"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/0169-023X(90)90008-2"},{"key":"e_1_3_2_1_59_1","volume-title":"Real Options and Business Strategy: Applications to Decision Making","author":"Sullivan K. J.","year":"1999"},{"key":"e_1_3_2_1_60_1","volume-title":"Wiley","author":"Taylor R. N.","year":"2009"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","location":"Hyderabad India","acronym":"ICSE '14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Future of Software Engineering Proceedings"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593882.2593886","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2593882.2593886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:54Z","timestamp":1750273434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593882.2593886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":60,"alternative-id":["10.1145\/2593882.2593886","10.1145\/2593882"],"URL":"https:\/\/doi.org\/10.1145\/2593882.2593886","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}