{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T04:04:18Z","timestamp":1751947458933,"version":"3.41.2"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,17]],"date-time":"2018-09-17T00:00:00Z","timestamp":1537142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,17]]},"DOI":"10.1145\/3266237.3266261","type":"proceedings-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T12:54:52Z","timestamp":1536843292000},"page":"22-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Understanding architecture non-conformance"],"prefix":"10.1145","author":[{"given":"Vanius","family":"Zapalowski","sequence":"first","affiliation":[{"name":"Universidade Federal do Rio Grande, do Sul (UFRGS), Porto Alegre, RS"}]},{"given":"Daltro Jos\u00e9","family":"Nunes","sequence":"additional","affiliation":[{"name":"Universidade Federal do Rio Grande, do Sul (UFRGS), Porto Alegre, RS"}]},{"given":"Ingrid","family":"Nunes","sequence":"additional","affiliation":[{"name":"Universidade Federal do Rio Grande, do Sul (UFRGS), Porto Alegre, RS"}]}],"member":"320","published-online":{"date-parts":[[2018,9,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AspectJ Developers Community. {n. d.}. AspectJ Modules. ({n. d.}). http:\/\/git.eclipse.org\/c\/aspectj\/org.aspectj.git\/plain\/docs\/developer\/modules.html AspectJ Developers Community. {n. d.}. AspectJ Modules. ({n. d.}). http:\/\/git.eclipse.org\/c\/aspectj\/org.aspectj.git\/plain\/docs\/developer\/modules.html"},{"key":"e_1_3_2_1_2_1","volume-title":"What Is Software Architecture? In Software Architecture in Practice","author":"Bass Len","unstructured":"Len Bass , Paul Clements , and Rick Kazman . 2012. What Is Software Architecture? In Software Architecture in Practice ( 3 rd ed.). Addison-Wesley Professional , Chapter 1. Len Bass, Paul Clements, and Rick Kazman. 2012. What Is Software Architecture? In Software Architecture in Practice (3rd ed.). Addison-Wesley Professional, Chapter 1.","edition":"3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.19"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.008"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Walter Bischofberger Jan K\u00fchl and Silvio L\u00f6ffler. 2004. Sotograph - A Pragmatic Approach to Source Code Architecture Conformance Checking. In EWSA. 1--9. Walter Bischofberger Jan K\u00fchl and Silvio L\u00f6ffler. 2004. Sotograph - A Pragmatic Approach to Source Code Architecture Conformance Checking. In EWSA . 1--9.","DOI":"10.1007\/978-3-540-24769-2_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00102-8"},{"key":"e_1_3_2_1_7_1","volume-title":"Dalton Serey, and Jorge Figueiredo.","author":"Brunet Jo\u00e3o","year":"2012","unstructured":"Jo\u00e3o Brunet , Roberto Almeida Bittencourt , Dalton Serey, and Jorge Figueiredo. 2012 . On the Evolutionary Nature of Architectural Violations. In WCRE. 1616--1623. Jo\u00e3o Brunet, Roberto Almeida Bittencourt, Dalton Serey, and Jorge Figueiredo. 2012. On the Evolutionary Nature of Architectural Violations. In WCRE. 1616--1623."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465478.2465480"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2973839.2973848"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131151.3131171"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.07.002"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.10.015"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.19"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"J. Garcia I. Krka C. Mattmann and N. Medvidovic. 2013. Obtaining ground-truth software architectures. In ICSE. 901--910. J. Garcia I. Krka C. Mattmann and N. Medvidovic. 2013. Obtaining ground-truth software architectures. In ICSE . 901--910.","DOI":"10.1109\/ICSE.2013.6606639"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.12.042"},{"key":"e_1_3_2_1_17_1","volume-title":"Cinneide","author":"Herold Sebastian","year":"2015","unstructured":"Sebastian Herold , Michael English , Jim Buckley , Steve Counsell , and Mel O . Cinneide . 2015 . Detection of violation causes in reflexion models. In SANER. 565--569. Sebastian Herold, Michael English, Jim Buckley, Steve Counsell, and Mel O. Cinneide. 2015. Detection of violation causes in reflexion models. In SANER. 565--569."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Andre Hora Nicolas Anquetil Stephane Ducasse and Marco T\u00falio Valente. 2013. Mining system specific rules from change patterns. In WCRE. 331--340. Andre Hora Nicolas Anquetil Stephane Ducasse and Marco T\u00falio Valente. 2013. Mining system specific rules from change patterns. In WCRE . 331--340.","DOI":"10.1109\/WCRE.2013.6671308"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368144"},{"key":"e_1_3_2_1_20_1","unstructured":"Institute for Software Research at UCI. 2007. ArchStudio 4. (2007). http:\/\/isr.uci.edu\/projects\/archstudio-4\/www\/archstudio\/ Institute for Software Research at UCI. 2007. ArchStudio 4. (2007). http:\/\/isr.uci.edu\/projects\/archstudio-4\/www\/archstudio\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2005.61"},{"key":"e_1_3_2_1_22_1","unstructured":"Guillaume Boissier Keith Cassell. {n. d.}. Metrics 2 Plugin. ({n. d.}). https:\/\/sourceforge.net\/p\/metrics2\/wiki\/Home\/ Guillaume Boissier Keith Cassell. {n. d.}. Metrics 2 Plugin. ({n. d.}). https:\/\/sourceforge.net\/p\/metrics2\/wiki\/Home\/"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.21"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2007.1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.10.018"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"T. Lutellier D. Chollak J. Garcia L. Tan D. Rayside N. Medvidovic and R. Kroeger. 2015. Comparing Software Architecture Recovery Techniques Using Accurate Dependencies. In ICSE. 69--78. T. Lutellier D. Chollak J. Garcia L. Tan D. Rayside N. Medvidovic and R. Kroeger. 2015. Comparing Software Architecture Recovery Techniques Using Accurate Dependencies. In ICSE . 69--78.","DOI":"10.1109\/ICSE.2015.136"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.03.013"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.825767"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.917525"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/141874.141884"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2421"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13173-017-0061-z"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39031-9_7"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103845.1094824"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Giuseppe Scanniello Anna D'Amico Carmela D'Amico and Teodora D'Amico. {n. d.}. Architectural layer recovery for software system understanding and evolution. Software: Practice and Experience 40 ({n. d.}) 897--916. Giuseppe Scanniello Anna D'Amico Carmela D'Amico and Teodora D'Amico. {n. d.}. Architectural layer recovery for software system understanding and evolution. Software: Practice and Experience 40 ({n. d.}) 897--916.","DOI":"10.1002\/spe.988"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"M. De Silva and I. Perera. 2015. Preventing software architecture erosion through static architecture conformance checking. In ICIIS. 43--48. M. De Silva and I. Perera. 2015. Preventing software architecture erosion through static architecture conformance checking. In ICIIS . 43--48.","DOI":"10.1109\/ICIINFS.2015.7398983"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2005.05.007"},{"volume-title":"Introduction to Data Mining","author":"Tan Pang-Ning","key":"e_1_3_2_1_38_1","unstructured":"Pang-Ning Tan , Michael Steinbach , and Vipin Kumar . 2005. Introduction to Data Mining . Addison-Wesley , Chapter Association Analysis : Basic Concepts and Algorithms . Pang-Ning Tan, Michael Steinbach, and Vipin Kumar. 2005. Introduction to Data Mining. Addison-Wesley, Chapter Association Analysis: Basic Concepts and Algorithms."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1573951.1573954"},{"volume-title":"Goal Question Metric (GQM) Approach","author":"van Solingen Rini","key":"e_1_3_2_1_40_1","unstructured":"Rini van Solingen , Vic Basili , Gianluigi Caldiera , and H. Dieter Rombach . 2002. Goal Question Metric (GQM) Approach . John Wiley & Sons, Inc. Rini van Solingen, Vic Basili, Gianluigi Caldiera, and H. Dieter Rombach. 2002. Goal Question Metric (GQM) Approach. John Wiley & Sons, Inc."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568241"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597156"},{"key":"e_1_3_2_1_43_1","volume-title":"The WGB method to recover implemented architectural rules. Information and Software Technology","author":"Zapalowski Vanius","year":"2018","unstructured":"Vanius Zapalowski , Ingrid Nunes , and Daltro Jos\u00e9 Nunes . 2018. The WGB method to recover implemented architectural rules. Information and Software Technology ( 2018 ). Vanius Zapalowski, Ingrid Nunes, and Daltro Jos\u00e9 Nunes. 2018. The WGB method to recover implemented architectural rules. Information and Software Technology (2018)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Thomas Zimmermann Peter Weisgerber Stephan Diehl and Andreas Zeller. 2004. Mining Version Histories to Guide Software Changes. In ICSE. 563--572. Thomas Zimmermann Peter Weisgerber Stephan Diehl and Andreas Zeller. 2004. Mining Version Histories to Guide Software Changes. In ICSE . 563--572.","DOI":"10.1109\/ICSE.2004.1317478"}],"event":{"name":"SBES '18: XXXII BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING","acronym":"SBES '18","location":"Sao Carlos Brazil"},"container-title":["Proceedings of the XXXII Brazilian Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3266237.3266261","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3266237.3266261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T06:06:36Z","timestamp":1751868396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3266237.3266261"}},"subtitle":["why is there a gap between conceptual architectural rules and source code dependencies?"],"short-title":[],"issued":{"date-parts":[[2018,9,17]]},"references-count":44,"alternative-id":["10.1145\/3266237.3266261","10.1145\/3266237"],"URL":"https:\/\/doi.org\/10.1145\/3266237.3266261","relation":{},"subject":[],"published":{"date-parts":[[2018,9,17]]},"assertion":[{"value":"2018-09-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}