{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:56Z","timestamp":1750220576293,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"KASTEL"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.1145\/3463274.3463357","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T23:43:11Z","timestamp":1624059791000},"page":"340-346","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Classification for Managing Software Engineering Knowledge"],"prefix":"10.1145","author":[{"given":"Angelika","family":"Kaplan","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"given":"Maximilian","family":"Walter","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"given":"Robert","family":"Heinrich","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"12","article-title":". IEEE Standard Glossary of Software Engineering Terminology","volume":"610","year":"1990","unstructured":"1990 . IEEE Standard Glossary of Software Engineering Terminology . IEEE Std 610 . 12 - 1990 (Dec 1990), 1\u201384. https:\/\/doi.org\/10.1109\/IEEESTD.1990.101064 10.1109\/IEEESTD.1990.101064 1990. IEEE Standard Glossary of Software Engineering Terminology. IEEE Std 610.12-1990 (Dec 1990), 1\u201384. https:\/\/doi.org\/10.1109\/IEEESTD.1990.101064","journal-title":"IEEE Std"},{"key":"e_1_3_2_1_2_1","unstructured":"2012. ACM Computing Classification System (CCS). https:\/\/www.acm.org\/publications\/class-2012 visited on 19.03.2021.  2012. ACM Computing Classification System (CCS). https:\/\/www.acm.org\/publications\/class-2012 visited on 19.03.2021."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. ACM CSS Artifact Review and Badging Initiative. https:\/\/www.acm.org\/publications\/policies\/artifact-review-and-badging-current visited on 19.03.2021.  2020. ACM CSS Artifact Review and Badging Initiative. https:\/\/www.acm.org\/publications\/policies\/artifact-review-and-badging-current visited on 19.03.2021."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. MathSciNet - Mathematical reviews on the Web. https:\/\/mathscinet.ams.org\/msnhtml\/msc2020.pdf\/ visited on 19.03.2021.  2020. MathSciNet - Mathematical reviews on the Web. https:\/\/mathscinet.ams.org\/msnhtml\/msc2020.pdf\/ visited on 19.03.2021."},{"volume-title":"A Guided Tour of Artificial Intelligence Research","author":"Aussenac-Gilles Nathalie","key":"e_1_3_2_1_5_1","unstructured":"Nathalie Aussenac-Gilles , Jean Charlet , and Chantal Reynaud . 2020. Knowledge Engineering . In A Guided Tour of Artificial Intelligence Research . Springer , 733\u2013768. Nathalie Aussenac-Gilles, Jean Charlet, and Chantal Reynaud. 2020. Knowledge Engineering. In A Guided Tour of Artificial Intelligence Research. Springer, 733\u2013768."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.11.048"},{"key":"e_1_3_2_1_7_1","volume-title":"Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 -","author":"B\u00f6hme Rainer","year":"2005","unstructured":"Rainer B\u00f6hme and Ralf\u00a0 H. Reussner . 2005. Validation of Predictions with Measurements . In Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005 ](Lecture Notes in Computer Science, Vol.\u00a04909), Irene Eusgeld, Felix\u00a0C. Freiling, and Ralf\u00a0H. Reussner (Eds.). Springer , 14\u201318. https:\/\/doi.org\/10.1007\/978-3-540-68947-8_3 10.1007\/978-3-540-68947-8_3 Rainer B\u00f6hme and Ralf\u00a0H. Reussner. 2005. Validation of Predictions with Measurements. In Dependability Metrics: Advanced Lectures [result from a Dagstuhl seminar, October 30 - November 1, 2005](Lecture Notes in Computer Science, Vol.\u00a04909), Irene Eusgeld, Felix\u00a0C. Freiling, and Ralf\u00a0H. Reussner (Eds.). Springer, 14\u201318. https:\/\/doi.org\/10.1007\/978-3-540-68947-8_3"},{"key":"e_1_3_2_1_8_1","volume-title":"Context-Based Confidentiality Analysis for Industrial IoT. In 46th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2020","author":"Boltz Nicolas","year":"2020","unstructured":"Nicolas Boltz , Maximilian Walter , and Robert Heinrich . 2020 . Context-Based Confidentiality Analysis for Industrial IoT. In 46th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2020 , Portoroz, Slovenia , August 26-28, 2020. IEEE, 589\u2013596. https:\/\/doi.org\/10.1109\/SEAA51224.2020.00096 10.1109\/SEAA51224.2020.00096 Nicolas Boltz, Maximilian Walter, and Robert Heinrich. 2020. Context-Based Confidentiality Analysis for Industrial IoT. In 46th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2020, Portoroz, Slovenia, August 26-28, 2020. IEEE, 589\u2013596. https:\/\/doi.org\/10.1109\/SEAA51224.2020.00096"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"e_1_3_2_1_10_1","volume-title":"As We May Think. The atlantic monthly 176, 1","author":"Bush Vannevar","year":"1945","unstructured":"Vannevar Bush . 1945. As We May Think. The atlantic monthly 176, 1 ( 1945 ), 101\u2013108. http:\/\/www.theatlantic.com\/unbound\/flashbks\/computer\/bushf.htm Vannevar Bush. 1945. As We May Think. The atlantic monthly 176, 1 (1945), 101\u2013108. http:\/\/www.theatlantic.com\/unbound\/flashbks\/computer\/bushf.htm"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9091-7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/112629.112643"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.11.003"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(02)00049-6"},{"key":"e_1_3_2_1_15_1","volume-title":"Meta-research: Why research on research matters. PLoS biology 16, 3","author":"Ioannidis PA","year":"2018","unstructured":"John\u00a0 PA Ioannidis . 2018 . Meta-research: Why research on research matters. PLoS biology 16, 3 (2018), e2005468. John\u00a0PA Ioannidis. 2018. Meta-research: Why research on research matters. PLoS biology 16, 3 (2018), e2005468."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.311048"},{"key":"e_1_3_2_1_18_1","volume-title":"Joint Symposia and Workshops: Improving the Software Process and Competitive Position, Vol.\u00a029","author":"Margano Johan","year":"1991","unstructured":"Johan Margano and Lynn Lindsey . 1991 . Software reuse in the air traffic control advanced automation system . In Joint Symposia and Workshops: Improving the Software Process and Competitive Position, Vol.\u00a029 . Johan Margano and Lynn Lindsey. 1991. Software reuse in the air traffic control advanced automation system. In Joint Symposia and Workshops: Improving the Software Process and Competitive Position, Vol.\u00a029."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/143062.143151"},{"key":"e_1_3_2_1_20_1","volume-title":"Data-Driven Software Architecture for Analyzing Confidentiality. In IEEE International Conference on Software Architecture, ICSA 2019","author":"Seifermann Stephan","year":"2019","unstructured":"Stephan Seifermann , Robert Heinrich , and Ralf\u00a0 H. Reussner . 2019 . Data-Driven Software Architecture for Analyzing Confidentiality. In IEEE International Conference on Software Architecture, ICSA 2019 , Hamburg, Germany , March 25-29, 2019. IEEE, 1\u201310. https:\/\/doi.org\/10.1109\/ICSA.2019.00009 10.1109\/ICSA.2019.00009 Stephan Seifermann, Robert Heinrich, and Ralf\u00a0H. Reussner. 2019. Data-Driven Software Architecture for Analyzing Confidentiality. In IEEE International Conference on Software Architecture, ICSA 2019, Hamburg, Germany, March 25-29, 2019. IEEE, 1\u201310. https:\/\/doi.org\/10.1109\/ICSA.2019.00009"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776925"},{"key":"e_1_3_2_1_22_1","volume-title":"Guide to the Software Engineering Body of Knowledge (SWEBOK(R)): Version 3.0","author":"IEEE\u00a0Computer Society","unstructured":"IEEE\u00a0Computer Society , Pierre Bourque , and Richard\u00a0 E. Fairley . 2014. Guide to the Software Engineering Body of Knowledge (SWEBOK(R)): Version 3.0 ( 3 rd ed.). IEEE Computer Society Press , Los Alamitos, CA, USA . IEEE\u00a0Computer Society, Pierre Bourque, and Richard\u00a0E. Fairley. 2014. Guide to the Software Engineering Body of Knowledge (SWEBOK(R)): Version 3.0 (3rd ed.). IEEE Computer Society Press, Los Alamitos, CA, USA.","edition":"3"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"H. Stachowiak. 1973. Allgemeine Modelltheorie. Springer-Verlag.  H. Stachowiak. 1973. Allgemeine Modelltheorie. Springer-Verlag.","DOI":"10.1007\/978-3-7091-8327-4"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149485.3149496"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.01.006"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-005-0021-6"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(97)00025-6"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9217-9"}],"event":{"name":"EASE 2021: Evaluation and Assessment in Software Engineering","acronym":"EASE 2021","location":"Trondheim Norway"},"container-title":["Evaluation and Assessment in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463274.3463357","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3463274.3463357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:27Z","timestamp":1750195887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3463274.3463357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":28,"alternative-id":["10.1145\/3463274.3463357","10.1145\/3463274"],"URL":"https:\/\/doi.org\/10.1145\/3463274.3463357","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"2021-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}