{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:10:44Z","timestamp":1725786644235},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409688","type":"proceedings-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:37:56Z","timestamp":1607647076000},"page":"269-280","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Beware the evolving \u2018intelligent\u2019 web service! an integration architecture tactic to guard AI-first components"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7878-6283","authenticated-orcid":false,"given":"Alex","family":"Cummaudo","sequence":"first","affiliation":[{"name":"Deakin University, Australia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3187-4937","authenticated-orcid":false,"given":"Scott","family":"Barnett","sequence":"additional","affiliation":[{"name":"Deakin University, Australia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4805-1467","authenticated-orcid":false,"given":"Rajesh","family":"Vasa","sequence":"additional","affiliation":[{"name":"Deakin University, Australia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4928-7076","authenticated-orcid":false,"given":"John","family":"Grundy","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3812-9785","authenticated-orcid":false,"given":"Mohamed","family":"Abdelrazek","sequence":"additional","affiliation":[{"name":"Deakin University, Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Extracting technical domain knowledge to improve software architecture","author":"Barnett Scott","year":"2018","unstructured":"Scott Barnett . 2018. Extracting technical domain knowledge to improve software architecture . Melbourne, Australia : Swinburne University of Technology ( 2018 ). Scott Barnett. 2018. Extracting technical domain knowledge to improve software architecture. Melbourne, Australia: Swinburne University of Technology ( 2018 )."},{"key":"e_1_3_2_2_2_1","volume-title":"Software Architecture in Practice","author":"Bass Len","unstructured":"Len Bass , Paul Clements , and Rick Kazman . 2003. Software Architecture in Practice ( 2 nd ed.). Addison-Wesley . 560 pages. Len Bass, Paul Clements, and Rick Kazman. 2003. Software Architecture in Practice (2nd ed.). Addison-Wesley. 560 pages.","edition":"2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_3_1","DOI":"10.1145\/1168987.1169018"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_4_1","DOI":"10.1145\/1368044.1368060"},{"unstructured":"Pierre Bourque and Richard E Fairley (Eds.). 2014. Guide to the Software Engineering Body of Knowledge (3rd ed.). IEEE Washington DC USA. 346 pages. Pierre Bourque and Richard E Fairley (Eds.). 2014. Guide to the Software Engineering Body of Knowledge (3rd ed.). IEEE Washington DC USA. 346 pages.","key":"e_1_3_2_2_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_6_1","DOI":"10.1109\/MS.2010.60"},{"volume-title":"The Free Encyclopedia. https:\/\/bit.ly\/3cZgwLb","author":"Wikipedia","unstructured":"Wikipedia contributors. 2020. List of datasets for machine-learning research \u00d0 Wikipedia , The Free Encyclopedia. https:\/\/bit.ly\/3cZgwLb Wikipedia contributors. 2020. List of datasets for machine-learning research \u00d0 Wikipedia, The Free Encyclopedia. https:\/\/bit.ly\/3cZgwLb","key":"e_1_3_2_2_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_8_1","DOI":"10.1145\/3368089.3417919"},{"key":"e_1_3_2_2_9_1","volume-title":"Proceedings of the 42nd International Conference on Software Engineering. IEEE","author":"Cummaudo Alex","year":"2020","unstructured":"Alex Cummaudo , Rajesh Vasa , Scott Barnett , John Grundy , and Mohamed Abdelrazek . 2020 . Interpreting Cloud Computer Vision Pain-Points: A Mining Study of Stack Overflow . In Proceedings of the 42nd International Conference on Software Engineering. IEEE , Seoul, Republic of Korea. Alex Cummaudo, Rajesh Vasa, Scott Barnett, John Grundy, and Mohamed Abdelrazek. 2020. Interpreting Cloud Computer Vision Pain-Points: A Mining Study of Stack Overflow. In Proceedings of the 42nd International Conference on Software Engineering. IEEE, Seoul, Republic of Korea."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_10_1","DOI":"10.1109\/ESEM.2019.8870148"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1109\/ICSME.2019.00051"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_12_1","DOI":"10.20897\/jisem.201709"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.1109\/ISSRE.2018.00012"},{"volume-title":"Advances in Data Mining","author":"Elgendy Nada","unstructured":"Nada Elgendy and Ahmed Elragal . 2014. Big Data Analytics: A Literature Review Paper . In Advances in Data Mining . Applications and Theoretical Aspects, Petra Perner (Ed.). Springer International Publishing , Cham , 214\u015b227. Nada Elgendy and Ahmed Elragal. 2014. Big Data Analytics: A Literature Review Paper. In Advances in Data Mining. Applications and Theoretical Aspects, Petra Perner (Ed.). Springer International Publishing, Cham, 214\u015b227.","key":"e_1_3_2_2_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_15_1","DOI":"10.1109\/CVPR.2018.00175"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_16_1","DOI":"10.1007\/978-3-319-46487-9_6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_17_1","DOI":"10.1109\/ICMLA.2017.0-172arXiv:1704.05051"},{"volume-title":"Software Architect's Handbook: Become a Successful Software Architect by Implementing Efective Architecture Concepts","author":"Ingeno Joseph","unstructured":"Joseph Ingeno . 2018. Software Architect's Handbook: Become a Successful Software Architect by Implementing Efective Architecture Concepts . Packt Publishing, Ltd. , Birmingham, England, UK. Joseph Ingeno. 2018. Software Architect's Handbook: Become a Successful Software Architect by Implementing Efective Architecture Concepts. Packt Publishing, Ltd., Birmingham, England, UK.","key":"e_1_3_2_2_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.21236\/ADA382629"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_20_1","DOI":"10.1007\/978-3-319-33762-3_7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.1109\/5.726791"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1007\/978-3-319-10602-1_48arXiv:1405.0312"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1007\/978-3-030-19274-7_28"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_24_1","DOI":"10.1145\/3299887.3299891"},{"key":"e_1_3_2_2_25_1","volume-title":"Data Preparation for Data Mining","author":"Pyle Dorian","unstructured":"Dorian Pyle . 1994. Data Preparation for Data Mining ( 1 st ed.). Morgan Kaufmann . 560 pages. Dorian Pyle. 1994. Data Preparation for Data Mining (1st ed.). Morgan Kaufmann. 560 pages.","edition":"1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_26_1","DOI":"10.1007\/978-3-319-77712-2_17"},{"key":"e_1_3_2_2_28_1","volume-title":"The Elephant in the Room. arXiv preprint arXiv","author":"Rosenfeld Amir","year":"1808","unstructured":"Amir Rosenfeld , Richard Zemel , and John K Tsotsos . 2018. The Elephant in the Room. arXiv preprint arXiv : 1808 . 03305 ( 2018 ). arXiv: 1808.03305 https:\/\/arxiv. org\/abs\/ 1808.03305 Amir Rosenfeld, Richard Zemel, and John K Tsotsos. 2018. The Elephant in the Room. arXiv preprint arXiv: 1808. 03305 ( 2018 ). arXiv: 1808.03305 https:\/\/arxiv. org\/abs\/ 1808.03305"},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings of the 29th Conference on Neural Information Processing Systems. Montreal, QC, Canada, 2503\u015b2511","author":"Sculley D","year":"2015","unstructured":"D Sculley , Gary Holt , Daniel Golovin , Eugene Davydov , Todd Phillips , Dietmar Ebner , Vinay Chaudhary , Michael Young , Jean Fran\u00e7ois Crespo , and Dan Dennison . 2015 . Hidden technical debt in machine learning systems . In Proceedings of the 29th Conference on Neural Information Processing Systems. Montreal, QC, Canada, 2503\u015b2511 . D Sculley, Gary Holt, Daniel Golovin, Eugene Davydov, Todd Phillips, Dietmar Ebner, Vinay Chaudhary, Michael Young, Jean Fran\u00e7ois Crespo, and Dan Dennison. 2015. Hidden technical debt in machine learning systems. In Proceedings of the 29th Conference on Neural Information Processing Systems. Montreal, QC, Canada, 2503\u015b2511."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_30_1","DOI":"10.1145\/354324.354371"},{"key":"e_1_3_2_2_32_1","volume-title":"Proceedings of the 27th USENIX Security Symposium. USENIX Association","author":"Wang Bolun","year":"2018","unstructured":"Bolun Wang , Yuanshun Yao , Bimal Viswanath , Haitao Zheng , and Ben Y Zhao . 2018 . With great training comes great vulnerability: Practical attacks against transfer learning . In Proceedings of the 27th USENIX Security Symposium. USENIX Association , Baltimore, MD, USA, 1281\u015b1297. Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, and Ben Y Zhao. 2018. With great training comes great vulnerability: Practical attacks against transfer learning. In Proceedings of the 27th USENIX Security Symposium. USENIX Association, Baltimore, MD, USA, 1281\u015b1297."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_33_1","DOI":"10.1145\/3025453.3025846"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"acronym":"ESEC\/FSE '20","name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA"},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409688","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T18:19:10Z","timestamp":1673115550000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409688"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":31,"alternative-id":["10.1145\/3368089.3409688","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409688","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}