{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:17Z","timestamp":1772163977238,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T00:00:00Z","timestamp":1348617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UTAustin\/CA\/0056\/2008"],"award-info":[{"award-number":["UTAustin\/CA\/0056\/2008"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["SFRH\/BD\/47800\/2008"],"award-info":[{"award-number":["SFRH\/BD\/47800\/2008"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000082","name":"Division of Graduate Education","doi-asserted-by":"publisher","award":["CCF 0724979CNS 0509338CCF-0917167DGE-1110007"],"award-info":[{"award-number":["CCF 0724979CNS 0509338CCF-0917167DGE-1110007"]}],"id":[{"id":"10.13039\/100000082","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF 0724979CNS 0509338CCF-0917167DGE-1110007"],"award-info":[{"award-number":["CCF 0724979CNS 0509338CCF-0917167DGE-1110007"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CCF 0724979CNS 0509338CCF-0917167DGE-1110007"],"award-info":[{"award-number":["CCF 0724979CNS 0509338CCF-0917167DGE-1110007"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,26]]},"DOI":"10.1145\/2371401.2371415","type":"proceedings-article","created":{"date-parts":[[2012,10,2]],"date-time":"2012-10-02T09:50:06Z","timestamp":1349171406000},"page":"84-92","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Pushouts in software architecture design"],"prefix":"10.1145","author":[{"given":"T. L.","family":"Rich\u00e9","sequence":"first","affiliation":[{"name":"National Instruments, Austin, TX"}]},{"given":"R.","family":"Gon\u00e7alves","sequence":"additional","affiliation":[{"name":"Universidade do Minho, Braga, Portugal"}]},{"given":"B.","family":"Marker","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX"}]},{"given":"D.","family":"Batory","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX"}]}],"member":"320","published-online":{"date-parts":[[2012,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"UML","author":"Abi-Antoun M.","year":"1999","unstructured":"M. Abi-Antoun and N. Medvidovic . Enabling the Refinement of a Software Arch. into a Design . In UML , 1999 . M. Abi-Antoun and N. Medvidovic. Enabling the Refinement of a Software Arch. into a Design. In UML, 1999."},{"key":"e_1_3_2_1_2_1","volume-title":"CMPP","author":"Aldinucci M.","year":"1998","unstructured":"M. Aldinucci , M. Coppola , and M. Danalutto . Rewriting skeleton programs: how to evaluate the data-parallel stream-parallel tradeoff . In CMPP , 1998 . M. Aldinucci, M. Coppola, and M. Danalutto. Rewriting skeleton programs: how to evaluate the data-parallel stream-parallel tradeoff. In CMPP, 1998."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070523"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.04.002"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.23"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/129852.129859"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/322290.322301"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/268999.269004"},{"key":"e_1_3_2_1_10_1","unstructured":"E. Bruneton T. Coupaye and J. Stefani. The Fractal Component Model. http:\/\/fractal.ow2.org 2004.  E. Bruneton T. Coupaye and J. Stefani. The Fractal Component Model. http:\/\/fractal.ow2.org 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68679-8_4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/321992.321996"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629602"},{"key":"e_1_3_2_1_15_1","volume-title":"Algorithmic skeletons: structured management of parallel computation","author":"Cole M.","year":"1989","unstructured":"M. Cole . Algorithmic skeletons: structured management of parallel computation . MIT Press , Cambridge, MA, USA , 1989 . M. Cole. Algorithmic skeletons: structured management of parallel computation. MIT Press, Cambridge, MA, USA, 1989."},{"key":"e_1_3_2_1_16_1","volume-title":"OSDI","author":"Dean J.","year":"2004","unstructured":"J. Dean and S. Ghemawat . MapReduce: Simplified Data Processing on Large Clusters . In OSDI , Dec. 2004 . J. Dean and S. Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. In OSDI, Dec. 2004."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2007.50"},{"key":"e_1_3_2_1_18_1","volume-title":"IWSAPF","author":"Egyed A.","year":"2000","unstructured":"A. Egyed , N. Mehta , and N. Medvidovic . SW Connectors and Refinement in Family Arch . In IWSAPF , 2000 . A. Egyed, N. Mehta, and N. Medvidovic. SW Connectors and Refinement in Family Arch. In IWSAPF, 2000."},{"key":"e_1_3_2_1_19_1","volume-title":"WCRE","author":"Favre J.","year":"2004","unstructured":"J. Favre . Cacophony : Metamodel-driven architecture recovery . In WCRE , 2004 . J. Favre. Cacophony: Metamodel-driven architecture recovery. In WCRE, 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_3_2_1_21_1","unstructured":"Code Generator. http:\/\/code.google.com\/p\/stepwise-ft\/.  Code Generator. http:\/\/code.google.com\/p\/stepwise-ft\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/243327.243607"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/256664.256677"},{"key":"e_1_3_2_1_25_1","unstructured":"Hadoop. http:\/\/hadoop.apache.org\/core\/.  Hadoop. http:\/\/hadoop.apache.org\/core\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31959-7_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/69610.357988"},{"key":"e_1_3_2_1_28_1","volume-title":"Reverse Engineering","author":"Holt R.","year":"2000","unstructured":"R. Holt , A. Winter , and A. Schurr . GXL: Toward a Standard Exchange Format . In Reverse Engineering , Nov. 2000 . R. Holt, A. Winter, and A. Schurr. GXL: Toward a Standard Exchange Format. In Reverse Engineering, Nov. 2000."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA235785","volume-title":"Feature-oriented domain analysis (foda) feasibility study. CMU\/SEI-90-TR-021","author":"Kang K.","year":"1990","unstructured":"K. Kang , S. Cohen , J. Hess , W. Novak , and A. Peterson . Feature-oriented domain analysis (foda) feasibility study. CMU\/SEI-90-TR-021 , 1990 . K. Kang, S. Cohen, J. Hess, W. Novak, and A. Peterson. Feature-oriented domain analysis (foda) feasibility study. CMU\/SEI-90-TR-021, 1990."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368131"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-95888-8_6"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1308172.1308227"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/646355.689287"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70732"},{"key":"e_1_3_2_1_40_1","volume-title":"GraMoT","author":"Mens T.","year":"2005","unstructured":"T. Mens and et al. A Taxonomy of Model Transformations . In GraMoT , 2005 . T. Mens and et al. A Taxonomy of Model Transformations. In GraMoT, 2005."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.708567"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.385972"},{"key":"e_1_3_2_1_43_1","volume-title":"Distributed Systems. Addision-Wesley","author":"Mullender S.","year":"2003","unstructured":"S. Mullender , editor. Distributed Systems. Addision-Wesley , 2 nd edition, 2003 . S. Mullender, editor. Distributed Systems. Addision-Wesley, 2nd edition, 2003.","edition":"2"},{"key":"e_1_3_2_1_44_1","unstructured":"National Instruments LabVIEW 2011. http:\/\/www.ni.com\/labview\/.  National Instruments LabVIEW 2011. http:\/\/www.ni.com\/labview\/."},{"key":"e_1_3_2_1_45_1","volume-title":"http:\/\/www.nitrd.gov\/SUBCOMMITTEE%5Csdp%5Cfoser%5CFOSER%20December%202011.pdf","author":"Software Engineering Research Future","year":"2011","unstructured":"Future of Software Engineering Research . http:\/\/www.nitrd.gov\/SUBCOMMITTEE%5Csdp%5Cfoser%5CFOSER%20December%202011.pdf , 2011 . Future of Software Engineering Research. http:\/\/www.nitrd.gov\/SUBCOMMITTEE%5Csdp%5Cfoser%5CFOSER%20December%202011.pdf, 2011."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/322154.322158"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/119358"},{"key":"e_1_3_2_1_48_1","unstructured":"M. Poppleton. Private Correspondence. Private Correspondence 2010.  M. Poppleton. Private Correspondence. Private Correspondence 2010."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_50_1","volume-title":"Software Architecture: Perspectives on an Emerging Discipline","author":"Shaw M.","year":"1996","unstructured":"M. Shaw and D. Garlan . Software Architecture: Perspectives on an Emerging Discipline . Prentice Hall , 1996 . M. Shaw and D. Garlan. Software Architecture: Perspectives on an Emerging Discipline. Prentice Hall, 1996."},{"key":"e_1_3_2_1_51_1","volume-title":"Proc. of the Marktoberdorf Int. Summer School","author":"Smith D.","year":"1999","unstructured":"D. Smith . Mechanizing the development of software . In Proc. of the Marktoberdorf Int. Summer School , 1999 . D. Smith. Mechanizing the development of software. In Proc. of the Marktoberdorf Int. Summer School, 1999."},{"key":"e_1_3_2_1_52_1","volume-title":"The Z Notation: A Reference Manual","author":"Spivey J.","year":"1989","unstructured":"J. Spivey . The Z Notation: A Reference Manual . Prentice Hall , 1989 . J. Spivey. The Z Notation: A Reference Manual. Prentice Hall, 1989."},{"key":"e_1_3_2_1_53_1","volume-title":"The Z Notation: A Reference Manual","author":"Spivey J. M.","year":"1998","unstructured":"J. M. Spivey . The Z Notation: A Reference Manual , 1998 . J. M. Spivey. The Z Notation: A Reference Manual, 1998."},{"key":"e_1_3_2_1_54_1","volume-title":"MIT","author":"Thies W.","year":"2009","unstructured":"W. Thies . Lang. and Compiler Support for Stream Programs. PhD thesis , MIT , Feb. 2009 . W. Thies. Lang. and Compiler Support for Stream Programs. PhD thesis, MIT, Feb. 2009."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.36"},{"key":"e_1_3_2_1_56_1","volume-title":"CMU","author":"Tseng T.","year":"2004","unstructured":"T. Tseng , J. Aldrich , D. Garlan , and B. Schmerl . Semantic Issues in Arch. Refinement. Technical report , CMU , 2004 . T. Tseng, J. Aldrich, D. Garlan, and B. Schmerl. Semantic Issues in Arch. Refinement. Technical report, CMU, 2004."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPLC.2007.28"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/11783565_7"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/362575.362577"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945470"},{"key":"e_1_3_2_1_61_1","unstructured":"Zookeeper. http:\/\/hadoop.apache.org\/zookeeper.  Zookeeper. http:\/\/hadoop.apache.org\/zookeeper."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12107-4_7"}],"event":{"name":"GPCE'12: Generative Programming and Component Engineering","location":"Dresden Germany","acronym":"GPCE'12","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 11th International Conference on Generative Programming and Component Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2371401.2371415","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2371401.2371415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:21:22Z","timestamp":1750224082000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2371401.2371415"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,26]]},"references-count":57,"alternative-id":["10.1145\/2371401.2371415","10.1145\/2371401"],"URL":"https:\/\/doi.org\/10.1145\/2371401.2371415","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2480361.2371415","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2012,9,26]]},"assertion":[{"value":"2012-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}