Abstract is missing.
- Software architecture and reference architecture of software-intensive systems and systems-of-systems: contributions to the state of the artElisa Yumi Nakagawa, Ana Allian, Brauner R. N. Oliveira, Bruno Sena, Carlos Paes, Cristiane Lana, Daniel Feitosa, Daniel Soares Santos, Dênis Zaniro, Diogenes Dias, Flávio Eduardo Aoki Horita, Frank José Affonso, Gabriel Abdalla, Isabella Vicente, Leonardo Simas Duarte, Katia Romero Felizardo, Lina Maria Garcés Rodriguez, Lucas Bueno Ruas de Oliveira, Marcelo Benites Gonçalves, Maria Gabriela Morais, Milena Guessi, Nilson Silva, Thiago Bianchi, Tiago Volpato, Valdemar Vicente Graciano Neto, Vinícius Augusto Tagliatti Zani, Wallace Manzano. 4-11 [doi]
- The female contribution in architecting a set of tools for a formal method: role of women in software architecture (short paper)Silvia Bonfanti, Valentina Centurelli, Elvinia Riccobene, Patrizia Scandurra. 12-15 [doi]
- A domain model for self-adaptive software systemsFahimeh Alizadeh Moghaddam, Robert Deckers, Giuseppe Procaccianti, Paola Grosso, Patricia Lago. 16-22 [doi]
- Evaluation of self-adaptive systems: a women perspectiveClaudia Raibulet, Francesca Arcelli Fontana. 23-30 [doi]
- Role of women in software architecture: an attempt at a systematic literature reviewMaria Spichkova, Heinz W. Schmidt, Catia Trubiani. 31-34 [doi]
- Towards a reference software architecture for improving the accessibility and usability of open course wareGermania Rodriguez Morales, Jennifer Pérez Benedí. 35-38 [doi]
- Taming missions and architecture in software intensive systems-of-systemsEduardo Silva. 39-43 [doi]
- Architecture analysis to predict project risks: using containers to aid risk assessmentAndrew Leigh. 44-47 [doi]
- Towards a framework for managing architectural design decisionsManoj Bhat, Klym Shumaiev, Florian Matthes. 48-51 [doi]
- Software architecture reconstruction research support as provided by HUSACCTLeo Pruijt, Wiebe Wiersema, Jan Martijn van der Werf. 52-55 [doi]
- CAPSim: simulation and code generation based on the CAPSMohammad Sharaf, Moamin Abughazala, Henry Muccini, Mai Abusair. 56-60 [doi]
- MAGMA: build management-based generation of microservice infrastructuresPhilip Wizenty, Jonas Sorgalla, Florian Rademacher, Sabine Sachweh. 61-65 [doi]
- Simulating architectures of situational-aware cyber-physical spaceMohammad Sharaf, Moamin Abughazala, Henry Muccini, Mai Abusair. 66-67 [doi]
- Autonomic component ensembles for dynamic evolving architectures of context-aware smart systems: invited talk abstractTomás Bures. 70 [doi]
- An empirical approach for determining context of mobile systemsMai Abusair, Antinisca Di Marco, Paola Inverardi. 71-77 [doi]
- Adaptation for situational-aware cyber-physical systems driven by energy consumption and human safetyMai Abusair, Mohammad Sharaf, Henry Muccini, Paola Inverardi. 78-84 [doi]
- An open architecture approach: towards common design principles for an IoT architectureBahtijar Vogel, Dimitrios Gkouskos. 85-88 [doi]
- Towards context aware computations offloading in 5GAnna Reale, Melinda Tóth, Zoltán Horváth. 89-92 [doi]
- A study on cybersecurity industrial end-user perspectives in FinlandTeemu Kanstrén, Pekka Savolainen, Petteri Heino, Kaisu Kanstrén. 95-101 [doi]
- Risk-based adaptive authentication for internet of things in smart home eHealthMattias T. Gebrie, Habtamu Abie. 102-108 [doi]
- Communication-efficient privacy-preserving smart meteringSigurd Eskeland. 109-114 [doi]
- The relationship between the cost of cybercrime and web security posture: a case study on Belgian companiesPing Chen, Jonas Visschers, Cedric Verstraete, Letizia Paoli, Christophe Huygens, Lieven Desmet, Wouter Joosen. 115-120 [doi]
- Current level of cybersecurity competence and future development: case FinlandReijo M. Savola. 121-124 [doi]
- Categorization of cyber security deception events for measuring the severity level of advanced targeted breachesTeemu Väisänen. 125-131 [doi]
- Measuring the value of privacy and the efficacy of PETsKimmo Halunen, Anni Karinsalo. 132-135 [doi]
- Are code smell detection tools suitable for detecting architecture degradation?Jörg Lenhard, Mohammad Mahdi Hassan, Martin Blom, Sebastian Herold. 138-144 [doi]
- Software architecture reconstruction and compliance checking: a case studyLeo Pruijt, Wiebe Wiersema. 145-151 [doi]
- The relationship of code churn and architectural violations in the open source software JabRefTobias Olsson, Morgan Ericsson, Anna Wingkvist. 152-158 [doi]
- Evaluating software architecture erosion for PL/SQL programsMetin Altinisik, Ersin Ersoy, Hasan Sözer. 159-165 [doi]
- Architecture conformance checking with description logicsSandra Schröder, Matthias Riebisch. 166-172 [doi]
- Towards a well-formed software architecture analysisNajd Altoyan, Dewayne E. Perry. 173-179 [doi]
- Modeling embedded systems using a tailored view framework and architecture modeling constraintsAndreas Morgenstern, Pablo Oliveira Antonino, Thomas Kuhn, Patrick Pschorn, Benno Kallweit. 180-186 [doi]
- Two perspectives on reference architecture sustainabilityTiago Volpato, Brauner R. N. Oliveira, Lina Maria Garcés Rodriguez, Rafael Capilla, Elisa Yumi Nakagawa. 188-194 [doi]
- Towards a practical maintainability quality model for service-and microservice-based systemsJustus Bogner, Stefan Wagner 0001, Alfred Zimmermann. 195-198 [doi]
- Green architecture for sustainable eLearning systemsAhmed D. Alharthi, Maria Spichkova. 199-204 [doi]
- Green software development and research with the HADAS toolkitDaniel-Jesus Munoz, Mónica Pinto, Lidia Fuentes. 205-211 [doi]