{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:20:27Z","timestamp":1774948827294,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":109,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2020YFB1005400"],"award-info":[{"award-number":["2020YFB1005400"]}]},{"name":"National Science Foundation of China","award":["62102358"],"award-info":[{"award-number":["62102358"]}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LQ21F020008"],"award-info":[{"award-number":["LQ21F020008"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616367","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"1457-1469","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Software Architecture in Practice: Challenges and Opportunities"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7657-6653","authenticated-orcid":false,"given":"Zhiyuan","family":"Wan","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3394-285X","authenticated-orcid":false,"given":"Yun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hangzhou City University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6302-3256","authenticated-orcid":false,"given":"Xin","family":"Xia","sequence":"additional","affiliation":[{"name":"Huawei, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3267-8318","authenticated-orcid":false,"given":"Yi","family":"Jiang","sequence":"additional","affiliation":[{"name":"Huawei, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4367-7201","authenticated-orcid":false,"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"2019 IEEE\/ACM 41st Int\u2019l Conf. on Software Engineering (ICSE). 1199\u20131210","author":"Aghajani E.","unstructured":"E. Aghajani, C. Nagy, O. L. Vega-M\u00e1rquez, M. Linares-V\u00e1squez, L. Moreno, G. Bavota, and M. Lanza. 2019. Software documentation issues unveiled. In 2019 IEEE\/ACM 41st Int\u2019l Conf. on Software Engineering (ICSE). 1199\u20131210."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.64"},{"key":"e_1_3_2_2_3_1","volume-title":"Proc. of the 11th Int\u2019l ACM SIGSOFT Conf. on Quality of Software Architectures. 11\u201320","author":"Arcelli D.","unstructured":"D. Arcelli, V. Cortellessa, A. Filieri, and A. Leva. 2015. Control theory for model-based performance-driven software adaptation. In Proc. of the 11th Int\u2019l ACM SIGSOFT Conf. on Quality of Software Architectures. 11\u201320."},{"key":"e_1_3_2_2_4_1","volume-title":"Proc. of the 28th Int\u2019l Conf. on Program Comprehension. 14\u201324","author":"Aung T. W. W.","unstructured":"T. W. W. Aung, H. Huo, and Y. Sui. 2020. A literature review of automatic traceability links recovery for software change impact analysis. In Proc. of the 28th Int\u2019l Conf. on Program Comprehension. 14\u201324."},{"key":"e_1_3_2_2_5_1","volume-title":"2019 IEEE\/ACM Int\u2019l Conf. on Technical Debt (TechDebt). 88\u201397","author":"Azadi U.","unstructured":"U. Azadi, F. A. Fontana, and D. Taibi. 2019. Architectural smells detected by tools: a catalogue proposal. In 2019 IEEE\/ACM Int\u2019l Conf. on Technical Debt (TechDebt). 88\u201397."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SHARK-ADI.2007.1"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.233"},{"key":"e_1_3_2_2_8_1","volume-title":"2014 Software Evolution Week-IEEE Conf. on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE). 395\u2013398","author":"Baudry B.","unstructured":"B. Baudry, M. Monperrus, C. Mony, F. Chauvel, F. Fleurey, and S. Clarke. 2014. Diversify: ecology-inspired software evolution for diversity emergence. In 2014 Software Evolution Week-IEEE Conf. on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE). 395\u2013398."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1986003"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2014.03.188"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.03.002"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24769-2_14"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.60"},{"key":"e_1_3_2_2_14_1","volume-title":"2012 19th Working Conf. on reverse engineering. 257\u2013266","author":"Brunet J.","unstructured":"J. Brunet, R. A. Bittencourt, D. Serey, and J. Figueiredo. 2012. On the evolutionary nature of architectural violations. In 2012 19th Working Conf. on reverse engineering. 257\u2013266."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2797899"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.08.054"},{"key":"e_1_3_2_2_17_1","volume-title":"European Conf. on Software Architecture. 374\u2013389","author":"Caracciolo A.","unstructured":"A. Caracciolo, M. F. Lungu, and O. Nierstrasz. 2014. How do software architects specify and validate quality requirements? In European Conf. on Software Architecture. 374\u2013389."},{"key":"e_1_3_2_2_18_1","volume-title":"2017 24th Asia-Pacific Software Engineering Conf. (APSEC). 466\u2013475","author":"Chen R.","unstructured":"R. Chen, S. Li, and Z. Li. 2017. From monolith to microservices: A dataflow-driven approach. In 2017 24th Asia-Pacific Software Engineering Conf. (APSEC). 466\u2013475."},{"key":"e_1_3_2_2_19_1","unstructured":"P. Clements F. Bachmann L. Bass D. Garlan J. Ivers R. Little P. Merson R. Nord and J. Stafford. 2010. Documenting Software Architectures: Views and Beyond. Pearson Education."},{"key":"e_1_3_2_2_20_1","volume-title":"25th Int\u2019l Conf. on Software Engineering, 2003. Proc... 740\u2013741","author":"Clements P.","unstructured":"P. Clements, D. Garlan, R. Little, R. Nord, and J. Stafford. 2003. Documenting software architectures: views and beyond. In 25th Int\u2019l Conf. on Software Engineering, 2003. Proc... 740\u2013741."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"J. F. Cui and H. S. Chae. 2011. Applying agglomerative hierarchical clustering algorithms to component identification for legacy systems. Information and Software technology 53 6 (2011) 601\u2013614.","DOI":"10.1016\/j.infsof.2011.01.006"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2160"},{"key":"e_1_3_2_2_23_1","volume-title":"Conf. on Quality of Software Architectures, QoSA 2007","author":"De Boer R. C.","year":"2007","unstructured":"R. C. De Boer, R. Farenhorst, P. Lago, H. Van Vliet, V. Clerc, and A. Jansen. 2007. Architectural knowledge: Getting to the core. In Software Architectures, Components, and Applications: Third Int\u2019l Conf. on Quality of Software Architectures, QoSA 2007, Medford, MA, USA, July 11-23, 2007, Revised Selected Papers 3. 197\u2013214."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.07.036"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.01.008"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.06.003"},{"key":"e_1_3_2_2_27_1","volume-title":"Proc. Eighth Asia-Pacific Software Engineering Conf.. 427\u2013430","author":"Dutoit A. H.","unstructured":"A. H. Dutoit, J. Johnstone, and B. Bruegge. 2001. Knowledge scouts: Reducing communication barriers in a distributed software development project. In Proc. Eighth Asia-Pacific Software Engineering Conf.. 427\u2013430."},{"key":"e_1_3_2_2_28_1","volume-title":"Proc. of the 10th Joint Meeting on Foundations of Software Engineering. 50\u201360","author":"Ernst N. A.","unstructured":"N. A. Ernst, S. Bellomo, I. Ozkaya, R. L. Nord, and I. Gorton. 2015. Measure it? manage it? ignore it? software practitioners and technical debt. In Proc. of the 10th Joint Meeting on Foundations of Software Engineering. 50\u201360."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"G. Fischer and J. Otswald. 2001. Knowledge management: problems promises realities and challenges. IEEE Intelligent systems 16 1 (2001) 60\u201372.","DOI":"10.1109\/5254.912386"},{"key":"e_1_3_2_2_30_1","volume-title":"2013 28th IEEE\/ACM Int\u2019l Conf. on Automated Software Engineering (ASE). 486\u2013496","author":"Garcia J.","unstructured":"J. Garcia, I. Ivkovic, and N. Medvidovic. 2013. A comparative analysis of software architecture recovery techniques. In 2013 28th IEEE\/ACM Int\u2019l Conf. on Automated Software Engineering (ASE). 486\u2013496."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.01.056"},{"key":"e_1_3_2_2_32_1","volume-title":"Proc. of the 2015 European Conf. on Software Architecture Workshops. 1\u20137.","author":"Greifenberg T.","unstructured":"T. Greifenberg, K. M\u00fcller, and B. Rumpe. 2015. Architectural Consistency Checking in Plugin-Based Software Systems. In Proc. of the 2015 European Conf. on Software Architecture Workshops. 1\u20137."},{"key":"e_1_3_2_2_33_1","volume-title":"2015 12th Working IEEE\/IFIP Conf. on Software Architecture. 11\u201320","author":"Groher I.","unstructured":"I. Groher and R. Weinreich. 2015. A study on architectural decision-making in context. In 2015 12th Working IEEE\/IFIP Conf. on Software Architecture. 11\u201320."},{"key":"e_1_3_2_2_34_1","volume-title":"Proc. of the 14th Int\u2019l Conf. on Modularity. 68\u201380","author":"Guimar\u00e3es E.","unstructured":"E. Guimar\u00e3es, A. Garcia, and Y. Cai. 2015. Architecture-sensitive heuristics for prioritizing critical code anomalies. In Proc. of the 14th Int\u2019l Conf. on Modularity. 68\u201380."},{"key":"e_1_3_2_2_35_1","volume-title":"2016 IEEE Int\u2019l Conf. on Services Computing (SCC). 813\u2013818","author":"Hassan S.","unstructured":"S. Hassan and R. Bahsoon. 2016. Microservices and their design trade-offs: A self-adaptive roadmap. In 2016 IEEE Int\u2019l Conf. on Services Computing (SCC). 813\u2013818."},{"key":"e_1_3_2_2_36_1","volume-title":"Proc. of the 30th ACM Joint European Software Engineering Conf. and Symposium on the Foundations of Software Engineering (ESEC\/FSE","author":"Ivers J.","year":"2022","unstructured":"J. Ivers, R. L. Nord, I. Ozkaya, C. Seifried, C. S. Timperley, and M. Kessentini. 2022. Industry Experiences with Large-Scale Refactoring. In Proc. of the 30th ACM Joint European Software Engineering Conf. and Symposium on the Foundations of Software Engineering (ESEC\/FSE 2022). 1544\u20131554."},{"key":"e_1_3_2_2_37_1","volume-title":"2013 17th European Conf. on Software Maintenance and Reengineering. 15\u201324","author":"Jaafar F.","unstructured":"F. Jaafar, S. Hassaine, Y.-G. Gu\u00e9h\u00e9neuc, S. Hamel, and B. Adams. 2013. On the relationship between program evolution and fault-proneness: An empirical study. In 2013 17th European Conf. on Software Maintenance and Reengineering. 15\u201324."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.04.052"},{"key":"e_1_3_2_2_39_1","volume-title":"5th Working IEEE\/IFIP Conf. on Software Architecture (WICSA\u201905)","author":"Jansen A.","unstructured":"A. Jansen and J. Bosch. 2005. Software architecture as a set of architectural design decisions. In 5th Working IEEE\/IFIP Conf. on Software Architecture (WICSA\u201905). 109\u2013120."},{"key":"e_1_3_2_2_40_1","volume-title":"Proc. of the 18th Int\u2019l Conf. on Evaluation and Assessment in Software Engineering. 1\u201310","author":"Javed M. A.","unstructured":"M. A. Javed and U. Zdun. 2014. A systematic literature review of traceability approaches between software architecture and source code. In Proc. of the 18th Int\u2019l Conf. on Evaluation and Assessment in Software Engineering. 1\u201310."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.03.050"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2465387"},{"key":"e_1_3_2_2_43_1","volume-title":"Proc. of the ACM SIGSOFT 20th Int\u2019l Symposium on the Foundations of Software Engineering. 1\u201311","author":"Kim M.","unstructured":"M. Kim, T. Zimmermann, and N. Nagappan. 2012. A field study of refactoring challenges and benefits. In Proc. of the ACM SIGSOFT 20th Int\u2019l Symposium on the Foundations of Software Engineering. 1\u201311."},{"key":"e_1_3_2_2_44_1","volume-title":"Proc. of the 40th Int\u2019l Conf. on Software Engineering: Software Engineering in Practice. 75\u201384","author":"Klotins E.","unstructured":"E. Klotins, M. Unterkalmsteiner, P. Chatzipetrou, T. Gorschek, R. Prikladnicki, N. Tripathi, and L. B. Pompermaier. 2018. Exploration of technical debt in start-ups. In Proc. of the 40th Int\u2019l Conf. on Software Engineering: Software Engineering in Practice. 75\u201384."},{"key":"e_1_3_2_2_45_1","unstructured":"P. Kruchten R. Nord and I. Ozkaya. 2019. Managing technical debt: Reducing friction in software development. Addison-Wesley Professional."},{"key":"e_1_3_2_2_46_1","volume-title":"Proc. of the 11th European Conf. on Software Architecture: Companion Proc.. 138\u2013144","author":"Lenhard J.","unstructured":"J. Lenhard, M. M. Hassan, M. Blom, and S. Herold. 2017. Are code smell detection tools suitable for detecting architecture degradation? In Proc. of the 11th European Conf. on Software Architecture: Companion Proc.. 138\u2013144."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2423"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.07.008"},{"key":"e_1_3_2_2_49_1","volume-title":"Proc. of the Evaluation and Assessment in Software Engineering. 51\u201360","author":"Li X.","unstructured":"X. Li, P. Liang, and Z. Li. 2020. Automatic identification of decisions from the hibernate developer mailing list. In Proc. of the Evaluation and Assessment in Software Engineering. 51\u201360."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"crossref","unstructured":"Z. Li P. Liang and P. Avgeriou. 2013. Application of knowledge-based approaches in software architecture: A systematic mapping study. Information and Software technology 55 5 (2013) 777\u2013794.","DOI":"10.1016\/j.infsof.2012.11.005"},{"key":"e_1_3_2_2_51_1","volume-title":"2011 18th Asia-Pacific Software Engineering Conf.. 242\u2013249","author":"Li Z.","unstructured":"Z. Li and J. Long. 2011. A case study of measuring degeneration of software architectures from a defect perspective. In 2011 18th Asia-Pacific Software Engineering Conf.. 242\u2013249."},{"key":"e_1_3_2_2_52_1","unstructured":"Q. I. P. Ltd. 2023. NVivo qualitative data analysis software."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00234-6"},{"key":"e_1_3_2_2_54_1","volume-title":"2015 IEEE\/ACM 37th IEEE Int\u2019l Conf. on Software Engineering. 2, 69\u201378","author":"Lutellier T.","unstructured":"T. Lutellier, D. Chollak, J. Garcia, L. Tan, D. Rayside, N. Medvidovic, and R. Kroeger. 2015. Comparing software architecture recovery techniques using accurate dependencies. In 2015 IEEE\/ACM 37th IEEE Int\u2019l Conf. on Software Engineering. 2, 69\u201378."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/581413.581414"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"crossref","unstructured":"I. Macia R. Arcoverde A. Garcia C. Chavez and A. Von Staa. 2012. On the relevance of code anomalies for identifying architecture degradation symptoms. In 2012 16Th european Conf. on software maintenance and reengineering. 277\u2013286.","DOI":"10.1109\/CSMR.2012.35"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162049.2162069"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.825767"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2394802"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"crossref","unstructured":"T. Mens S. Demeyer O. Barais A. F. Le Meur L. Duchien and J. Lawall. 2008. Software architecture evolution. Software Evolution 233\u2013262.","DOI":"10.1007\/978-3-540-76440-3_10"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869542.1869563"},{"key":"e_1_3_2_2_62_1","volume-title":"2011 Ninth Working IEEE\/IFIP Conf. on Software Architecture. 270\u2013279","author":"Miksovic C.","unstructured":"C. Miksovic and O. Zimmermann. 2011. Architecturally significant requirements, reference architecture, and metamodel for knowledge management in information technology services. In 2011 Ninth Working IEEE\/IFIP Conf. on Software Architecture. 270\u2013279."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2479217"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.31"},{"key":"e_1_3_2_2_65_1","volume-title":"Proc. of the 38th Int\u2019l Conf. on Software Engineering. 499\u2013510","author":"Mo R.","unstructured":"R. Mo, Y. Cai, R. Kazman, L. Xiao, and Q. Feng. 2016. Decoupling level: a new metric for architectural maintenance complexity. In Proc. of the 38th Int\u2019l Conf. on Software Engineering. 499\u2013510."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.11.006"},{"key":"e_1_3_2_2_67_1","volume-title":"Proc. of the 36th Int\u2019l Conf. on software engineering. 895\u2013906","author":"Mohanani R.","unstructured":"R. Mohanani, P. Ralph, and B. Shreeve. 2014. Requirements fixation. In Proc. of the 36th Int\u2019l Conf. on software engineering. 895\u2013906."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110885"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.41"},{"key":"e_1_3_2_2_70_1","volume-title":"2022 IEEE 19th Int\u2019l Conf. on Software Architecture (ICSA). 47\u201357","author":"Muszynski M.","unstructured":"M. Muszynski, S. Lugtigheid, F. Castor, and S. Brinkkemper. 2022. A Study on the Software Architecture Documentation Practices and Maturity in Open-Source Software Development. In 2022 IEEE 19th Int\u2019l Conf. on Software Architecture (ICSA). 47\u201357."},{"key":"e_1_3_2_2_71_1","volume-title":"Proc. of the 44th Int\u2019l Conf. on Software Engineering. 413\u2013425","author":"Nahar N.","unstructured":"N. Nahar, S. Zhou, G. Lewis, and C. K\u00e4stner. 2022. Collaboration challenges in building ml-enabled systems: Communication, documentation, engineering, and process. In Proc. of the 44th Int\u2019l Conf. on Software Engineering. 413\u2013425."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.05.003"},{"key":"e_1_3_2_2_73_1","volume-title":"2015 2nd Int\u2019l Conf. on Computing for Sustainable Global Development (INDIACom). 967\u2013972","author":"Patidar A.","unstructured":"A. Patidar and U. Suman. 2015. A survey on software architecture evaluation methods. In 2015 2nd Int\u2019l Conf. on Computing for Sustainable Global Development (INDIACom). 967\u2013972."},{"key":"e_1_3_2_2_74_1","first-page":"1189","article-title":"Enhancing the quality and credibility of qualitative analysis","volume":"34","author":"Patton M.","year":"1999","unstructured":"M. Patton. 1999. Enhancing the quality and credibility of qualitative analysis.. Health Services Research, 34, 5 Pt 2 (1999), 1189\u20131208.","journal-title":"Health Services Research"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2007.4385516"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"crossref","unstructured":"D. E. Perry and A. L. Wolf. 1992. Foundations for the study of software architecture. ACM SIGSOFT Software engineering notes 17 4 (1992) 40\u201352.","DOI":"10.1145\/141874.141884"},{"key":"e_1_3_2_2_77_1","volume-title":"2014 14th Int\u2019l Conf. on Quality Software. 333\u2013342","author":"Pl\u00f6sch R.","unstructured":"R. Pl\u00f6sch, A. Dautovic, and M. Saft. 2014. The value of software documentation quality. In 2014 14th Int\u2019l Conf. on Quality Software. 333\u2013342."},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"crossref","unstructured":"B. Ramesh and M. Jarke. 2001. Toward reference models for requirements traceability. IEEE transactions on software engineering 27 1 (2001) 58\u201393.","DOI":"10.1109\/32.895989"},{"key":"e_1_3_2_2_79_1","volume-title":"2017 IEEE\/ACM 14th Int\u2019l Conf. on Mining Software Repositories (MSR). 475\u2013478","author":"Rebou\u00e7as M.","unstructured":"M. Rebou\u00e7as, R. O. Santos, G. Pinto, and F. Castor. 2017. How does contributors\u2019 involvement influence the build status of an open-source software project? In 2017 IEEE\/ACM 14th Int\u2019l Conf. on Mining Software Repositories (MSR). 475\u2013478."},{"key":"e_1_3_2_2_80_1","volume-title":"2014 IEEE\/IFIP Conf. on Software Architecture. 185\u2013194","author":"Rekhav V. S.","unstructured":"V. S. Rekhav and H. Muccini. 2014. A study on group decision-making in software architecture. In 2014 IEEE\/IFIP Conf. on Software Architecture. 185\u2013194."},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3042553"},{"key":"e_1_3_2_2_82_1","volume-title":"Proc. of the 28th ACM Joint Meeting on European Software Engineering Conf. and Symposium on the Foundations of Software Engineering. 1546\u20131550","author":"Schmitt Laser M.","unstructured":"M. Schmitt Laser, N. Medvidovic, D. M. Le, and J. Garcia. 2020. ARCADE: an extensible workbench for architecture recovery, change, and decay evaluation. In Proc. of the 28th ACM Joint Meeting on European Software Engineering Conf. and Symposium on the Foundations of Software Engineering. 1546\u20131550."},{"key":"e_1_3_2_2_83_1","volume-title":"Agile documentation, anyone? IEEE software, 26, 6","author":"Selic B.","year":"2009","unstructured":"B. Selic. 2009. Agile documentation, anyone? IEEE software, 26, 6 (2009), 11\u201312."},{"key":"e_1_3_2_2_84_1","volume-title":"2009 Joint Working IEEE\/IFIP Conf. on Software Architecture & European Conf. on Software Architecture. 293\u2013296","author":"Shahin M.","unstructured":"M. Shahin, P. Liang, and M. R. Khayyambashi. 2009. Architectural design decision: Existing models and tools. In 2009 Joint Working IEEE\/IFIP Conf. on Software Architecture & European Conf. on Software Architecture. 293\u2013296."},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"crossref","unstructured":"M. Shaw and P. Clements. 2006. The golden age of software architecture. IEEE software 23 2 (2006) 31\u201339.","DOI":"10.1109\/MS.2006.58"},{"key":"e_1_3_2_2_86_1","volume-title":"Mastering Erosion of Software Architecture in Automotive Software Product Lines. In Int\u2019l Conf. on Current Trends in Theory and Practice of Informatics. 491\u2013502","author":"Strasser A.","unstructured":"A. Strasser, B. Cool, C. Gernert, C. Knieke, M. K\u00f6rner, D. Niebuhr, H. Peters, A. Rausch, O. Brox, and S. Jauns-Seyfried. 2014. Mastering Erosion of Software Architecture in Automotive Software Product Lines. In Int\u2019l Conf. on Current Trends in Theory and Practice of Informatics. 491\u2013502."},{"key":"e_1_3_2_2_87_1","unstructured":"A. Strauss and J. Corbin. 1990. Basics of qualitative research: Grounded theory procedures and techniques. Sage."},{"key":"e_1_3_2_2_88_1","unstructured":"A. Strauss and J. Corbin. 1994. Grounded theory methodology: An overview.."},{"key":"e_1_3_2_2_89_1","volume-title":"Purposeful sampling in qualitative research synthesis. Qualitative research journal, 11, 2","author":"Suri H.","year":"2011","unstructured":"H. Suri. 2011. Purposeful sampling in qualitative research synthesis. Qualitative research journal, 11, 2 (2011), 63\u201375."},{"key":"e_1_3_2_2_90_1","volume-title":"2012 Joint Working IEEE\/IFIP Conf. on Software Architecture and European Conf. on Software Architecture. 211\u2013214","author":"Szlenk M.","unstructured":"M. Szlenk, A. Zalewski, and S. Kijas. 2012. Modelling architectural decisions under changing requirements. In 2012 Joint Working IEEE\/IFIP Conf. on Software Architecture and European Conf. on Software Architecture. 211\u2013214."},{"key":"e_1_3_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.5555\/2747015.2747187"},{"key":"e_1_3_2_2_92_1","volume-title":"2011 Ninth Working IEEE\/IFIP Conf. on Software Architecture. 252\u2013255","author":"Tang A.","unstructured":"A. Tang, P. Liang, and H. Van Vliet. 2011. Software architecture documentation: The road ahead. In 2011 Ninth Working IEEE\/IFIP Conf. on Software Architecture. 252\u2013255."},{"key":"e_1_3_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2228"},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.03.009"},{"key":"e_1_3_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.052"},{"key":"e_1_3_2_2_96_1","volume-title":"Proc. of the Conf. on Software Maintenance and Reengineering. 261\u2013270","author":"Tonu S. A.","unstructured":"S. A. Tonu, A. Ashkan, and L. Tahvildari. 2006. Evaluating Architectural Stability Using a Metric-Based Approach. In Proc. of the Conf. on Software Maintenance and Reengineering. 261\u2013270."},{"key":"e_1_3_2_2_97_1","doi-asserted-by":"crossref","unstructured":"J. Tyree and A. Akerman. 2005. Architecture decisions: Demystifying architecture. IEEE software 22 2 (2005) 19\u201327.","DOI":"10.1109\/MS.2005.27"},{"key":"e_1_3_2_2_98_1","volume-title":"2021 IEEE\/ACM 18th Int\u2019l Conf. on Mining Software Repositories (MSR). 471\u2013482","author":"Uch\u00f4a A.","unstructured":"A. Uch\u00f4a, C. Barbosa, D. Coutinho, W. Oizumi, W. K. Assun\u00e7ao, S. R. Vergilio, J. A. Pereira, A. Oliveira, and A. Garcia. 2021. Predicting design impactful changes in modern code review: A large-scale empirical study. In 2021 IEEE\/ACM 18th Int\u2019l Conf. on Mining Software Repositories (MSR). 471\u2013482."},{"key":"e_1_3_2_2_99_1","volume-title":"Proc. of the 34th Int\u2019l Conf. on Software Engineering. 233\u2013243","author":"Vakilian M.","unstructured":"M. Vakilian, N. Chen, S. Negara, B. A. Rajkumar, B. P. Bailey, and R. E. Johnson. 2012. Use, disuse, and misuse of automated refactorings. In Proc. of the 34th Int\u2019l Conf. on Software Engineering. 233\u2013243."},{"key":"e_1_3_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.01.017"},{"key":"e_1_3_2_2_101_1","doi-asserted-by":"crossref","unstructured":"O. Vogel I. Arnold A. Chughtai and T. Kehrer. 2011. Software architecture: a comprehensive framework and guide for practitioners. Springer.","DOI":"10.1007\/978-3-642-19736-9"},{"key":"e_1_3_2_2_102_1","volume-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). 1410\u20131422","author":"Wan Z.","unstructured":"Z. Wan, X. Xia, D. Lo, J. Chen, X. Luo, and X. Yang. 2021. Smart contract security: A practitioners\u2019 perspective. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering (ICSE). 1410\u20131422."},{"key":"e_1_3_2_2_103_1","first-page":"1857","article-title":"How does machine learning change software development practices","volume":"47","author":"Wan Z.","year":"2019","unstructured":"Z. Wan, X. Xia, D. Lo, and G. C. Murphy. 2019. How does machine learning change software development practices? IEEE Transactions on Software Engineering, 47, 9 (2019), 1857\u20131871.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_2_104_1","volume-title":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 132\u2013144","author":"Wan Z.","unstructured":"Z. Wan, X. Xia, Y. Zhang, D. Lo, D. Zhou, Q. Chen, and A. E. Hassan. 2022. What motivates software practitioners to contribute to inner source? In Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 132\u2013144."},{"key":"e_1_3_2_2_105_1","volume-title":"Practice: Challenges and Opportunities. arXiv 2308.09978.","author":"Wan Z.","year":"2023","unstructured":"Z. Wan, Y. Zhang, X. Xia, Y. Jiang, and D. Lo. 2023. Software Architecture in Practice: Challenges and Opportunities. arXiv 2308.09978."},{"key":"e_1_3_2_2_106_1","volume-title":"Proc.. 12th IEEE Int\u2019l Workshop on Program Comprehension","author":"Wen Z.","year":"2004","unstructured":"Z. Wen and V. Tzerpos. 2004. An effectiveness measure for software clustering algorithms. In Proc.. 12th IEEE Int\u2019l Workshop on Program Comprehension, 2004.. 194\u2013203."},{"key":"e_1_3_2_2_107_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9223-y"},{"key":"e_1_3_2_2_108_1","unstructured":"J. Wuttke. 2010. Automatically generated runtime checks for design-level constraints. Ph. D. Dissertation. Universit\u00e0 della Svizzera italiana."},{"key":"e_1_3_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.09.042"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616367","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:11Z","timestamp":1750178171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616367"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":109,"alternative-id":["10.1145\/3611643.3616367","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616367","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}