{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T03:54:24Z","timestamp":1763092464077,"version":"3.41.0"},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2017,1,31]],"date-time":"2017-01-31T00:00:00Z","timestamp":1485820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"crossref","award":["D11AP00282"],"award-info":[{"award-number":["D11AP00282"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000180","name":"Department of Homeland Security","doi-asserted-by":"crossref","award":["HSHQDC-14-C-B0040"],"award-info":[{"award-number":["HSHQDC-14-C-B0040"]}],"id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"crossref","award":["W911NF-09-1-0273"],"award-info":[{"award-number":["W911NF-09-1-0273"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1252644, CNS-1629771 and CCF-1618132"],"award-info":[{"award-number":["CCF-1252644, CNS-1629771 and CCF-1618132"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"crossref","award":["FA95501610030"],"award-info":[{"award-number":["FA95501610030"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2017,1,31]]},"abstract":"<jats:p>Dynamic adaptation should not leave a software system in an inconsistent state, as it could lead to failure. Prior research has used inter-component dependency models of a system to determine a safe interval for the adaptation of its components, where the most important tradeoff is between disruption in the operations of the system and reachability of safe intervals. This article presents Savasana, which automatically analyzes a software system\u2019s code to extract both inter- and intra-component dependencies. In this way, Savasana is able to obtain more fine-grained models compared to previous approaches. Savasana then uses the detailed models to find safe adaptation intervals that cannot be determined using techniques from prior research. This allows Savasana to achieve a better tradeoff between disruption and reachability. The article demonstrates how Savasana infers safe adaptation intervals for components of a software system under various use cases and conditions.<\/jats:p>","DOI":"10.1145\/3063385","type":"journal-article","created":{"date-parts":[[2017,5,11]],"date-time":"2017-05-11T12:51:05Z","timestamp":1494507065000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Ensuring the Consistency of Adaptation through Inter- and Intra-Component Dependency Analysis"],"prefix":"10.1145","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5817-3911","authenticated-orcid":false,"given":"Alireza","family":"Sadeghi","sequence":"first","affiliation":[{"name":"University of California, Irvine, CA"}]},{"given":"Naeem","family":"Esfahani","sequence":"additional","affiliation":[{"name":"Google Inc., Amphitheatre Parkway Mountain View, CA"}]},{"given":"Sam","family":"Malek","sequence":"additional","affiliation":[{"name":"University of California, Irvine, CA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1995.497652"},{"key":"e_1_2_1_2_1","volume-title":"Ullman","author":"Aho Alfred V.","year":"1986","unstructured":"Alfred V. Aho , Ravi Sethi , and Jeffrey D . Ullman . 1986 . Compilers, Principles, Techniques . Addison Wesley . Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman. 1986. Compilers, Principles, Techniques. Addison Wesley."},{"key":"e_1_2_1_3_1","volume-title":"Tsitsiklis","author":"Bertsekas Dimitri P.","year":"2008","unstructured":"Dimitri P. Bertsekas and John N . Tsitsiklis . 2008 . Introduction to Probability (2nd ed.). Athena Scientific . Dimitri P. Bertsekas and John N. Tsitsiklis. 2008. Introduction to Probability (2nd ed.). Athena Scientific."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.27"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781153"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393616"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02161-9_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15114-9_38"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.02.001"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2856035"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2012.6224401"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2004.1310692"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380230903"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.485222"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/261640.261644"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/174662.174663"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384635"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378798"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108970.1108971"},{"volume-title":"Professional Java Development with the Spring Framework","author":"Johnson Rod","key":"e_1_2_1_20_1","unstructured":"Rod Johnson , Juergen Hoeller , Alef Arendsen , Thomas Risberg , and Colin Sampaleanu . 2005. Professional Java Development with the Spring Framework . John Wiley 8 Sons. Rod Johnson, Juergen Hoeller, Alef Arendsen, Thomas Risberg, and Colin Sampaleanu. 2005. Professional Java Development with the Spring Framework. John Wiley 8 Sons."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.60317"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.19"},{"volume-title":"Software Engineering for Self-Adaptive Systems II.","author":"de Lemos Rogerio","key":"e_1_2_1_23_1","unstructured":"Rogerio de Lemos , Holger Giese , Hausi A. Muller , Mary Shaw , Jesper Andersson , Luciano Baresi , Basil Becker , Nelly Bencomo , Yuriy Brun , Bojan Cikic , Ron Desmarais , Schahram Dustdar , Gregor Engels , Kurt Geihs , Karl M. Goeschka , Alessandra Gorla , Vincenzo Grassi , Poala Inverardi , Gabor Karsai , Jeff Kramer , Marin Litoiu , Antonia Lopes , Jeff Magee , Sam Malek , Serge Mankovskii , Raffaela Mirandola , John Mylopoulos , Oscar Nierstrasz , Mauro Pezze , Christian Prehofer , Wilhelm Schafer , Wilhelm Schlichting , Bradley Schmerl , Dennis B. Smith , Joao P. Sousa , Gabriel Tamura , Ladan Tahvildari , Norha M. Villegas , Thomas Vogel , Danny Weyns , Kenny Wong , and Jochen Wuttke . 2011. Software engineering for self-adpaptive systems: A second research roadmap . In Software Engineering for Self-Adaptive Systems II. Dagstuhl, Germany , 1--32. Rogerio de Lemos, Holger Giese, Hausi A. Muller, Mary Shaw, Jesper Andersson, Luciano Baresi, Basil Becker, Nelly Bencomo, Yuriy Brun, Bojan Cikic, Ron Desmarais, Schahram Dustdar, Gregor Engels, Kurt Geihs, Karl M. Goeschka, Alessandra Gorla, Vincenzo Grassi, Poala Inverardi, Gabor Karsai, Jeff Kramer, Marin Litoiu, Antonia Lopes, Jeff Magee, Sam Malek, Serge Mankovskii, Raffaela Mirandola, John Mylopoulos, Oscar Nierstrasz, Mauro Pezze, Christian Prehofer, Wilhelm Schafer, Wilhelm Schlichting, Bradley Schmerl, Dennis B. Smith, Joao P. Sousa, Gabriel Tamura, Ladan Tahvildari, Norha M. Villegas, Thomas Vogel, Danny Weyns, Kenny Wong, and Jochen Wuttke. 2011. Software engineering for self-adpaptive systems: A second research roadmap. In Software Engineering for Self-Adaptive Systems II. Dagstuhl, Germany, 1--32."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025148"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.29"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2013.6595493"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328897.1328447"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1998.671114"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22333-4_17"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 5th Workshop on Hot Topics in Software Upgrades (HotSWUp\u201913)","author":"Pina Lu\u00eds","year":"2013","unstructured":"Lu\u00eds Pina and Michael Hicks . 2013 . Rubah: Efficient, general-purpose dynamic software updating for java . In Proceedings of the 5th Workshop on Hot Topics in Software Upgrades (HotSWUp\u201913) . Lu\u00eds Pina and Michael Hicks. 2013. Rubah: Efficient, general-purpose dynamic software updating for java. In Proceedings of the 5th Workshop on Hot Topics in Software Upgrades (HotSWUp\u201913)."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1808984.1808990"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/781995.782008"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70733"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593929.2593934"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3063385","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3063385","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3063385","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:33Z","timestamp":1750217793000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3063385"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,31]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1,31]]}},"alternative-id":["10.1145\/3063385"],"URL":"https:\/\/doi.org\/10.1145\/3063385","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"type":"print","value":"1049-331X"},{"type":"electronic","value":"1557-7392"}],"subject":[],"published":{"date-parts":[[2017,1,31]]},"assertion":[{"value":"2015-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-05-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}