{"id":"https://openalex.org/W1985609173","doi":"https://doi.org/10.1109/icsm.2012.6405244","title":"From off-Line to continuous on-line maintenance","display_name":"From off-Line to continuous on-line maintenance","publication_year":2012,"publication_date":"2012-09-01","ids":{"openalex":"https://openalex.org/W1985609173","doi":"https://doi.org/10.1109/icsm.2012.6405244","mag":"1985609173"},"language":"en","primary_location":{"id":"doi:10.1109/icsm.2012.6405244","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsm.2012.6405244","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 28th IEEE International Conference on Software Maintenance (ICSM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066540482","display_name":"Mauro Pezz\u00e8","orcid":"https://orcid.org/0000-0001-5193-7379"},"institutions":[{"id":"https://openalex.org/I57201433","display_name":"Universit\u00e0 della Svizzera italiana","ror":"https://ror.org/03c4atk17","country_code":"CH","type":"education","lineage":["https://openalex.org/I57201433"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Mauro Pezze","raw_affiliation_strings":["Universita della Svizzera Italiana, Lugano, TI, CH","University of Lugano, Switzerland and University of Milano-bicocca, italy"],"affiliations":[{"raw_affiliation_string":"Universita della Svizzera Italiana, Lugano, TI, CH","institution_ids":["https://openalex.org/I57201433"]},{"raw_affiliation_string":"University of Lugano, Switzerland and University of Milano-bicocca, italy","institution_ids":["https://openalex.org/I57201433"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5066540482"],"corresponding_institution_ids":["https://openalex.org/I57201433"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09948269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.8190528154373169},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.715969443321228},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.5389431715011597},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5253397822380066},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.4990253448486328},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.46988677978515625},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4577031135559082},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4574716091156006},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.4569362699985504},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.45589330792427063},{"id":"https://openalex.org/keywords/high-availability","display_name":"High availability","score":0.42494815587997437},{"id":"https://openalex.org/keywords/software-maintenance","display_name":"Software maintenance","score":0.4215604364871979},{"id":"https://openalex.org/keywords/cornerstone","display_name":"Cornerstone","score":0.410519003868103},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34622499346733093},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1945454478263855},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08683907985687256}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.8190528154373169},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.715969443321228},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.5389431715011597},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5253397822380066},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.4990253448486328},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.46988677978515625},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4577031135559082},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4574716091156006},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4569362699985504},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.45589330792427063},{"id":"https://openalex.org/C65813073","wikidata":"https://www.wikidata.org/wiki/Q1622420","display_name":"High availability","level":2,"score":0.42494815587997437},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.4215604364871979},{"id":"https://openalex.org/C2780616401","wikidata":"https://www.wikidata.org/wiki/Q1133673","display_name":"Cornerstone","level":2,"score":0.410519003868103},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34622499346733093},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1945454478263855},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08683907985687256},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icsm.2012.6405244","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsm.2012.6405244","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 28th IEEE International Conference on Software Maintenance (ICSM)","raw_type":"proceedings-article"},{"id":"pmh:oai:boa.unimib.it:10281/43678","is_oa":false,"landing_page_url":"http://hdl.handle.net/10281/43678","pdf_url":null,"source":{"id":"https://openalex.org/S4306401259","display_name":"BOA (University of Milano-Bicocca)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66752286","host_organization_name":"University of Milano-Bicocca","host_organization_lineage":["https://openalex.org/I66752286"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5299999713897705}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W141121412","https://openalex.org/W1674665495","https://openalex.org/W2007777090","https://openalex.org/W4206186350","https://openalex.org/W4251708180"],"related_works":["https://openalex.org/W2363040373","https://openalex.org/W2103295733","https://openalex.org/W2808531585","https://openalex.org/W4233801908","https://openalex.org/W1538240937","https://openalex.org/W1532689837","https://openalex.org/W2204165862","https://openalex.org/W2049696050","https://openalex.org/W3148047111","https://openalex.org/W2187070056"],"abstract_inverted_index":{"Summary":[0],"form":[1],"only":[2,184],"given.":[3],"Software":[4],"is":[5,82,148,408,647],"the":[6,9,77,83,104,115,120,123,127,136,186,189,220,227,238,262,274,300,350,362,370,392,393,396,400,411,417,424,432,487,491,514,525,536,545,560,571,576,595,611],"cornerstone":[7],"of":[8,43,87,111,129,138,188,265,276,349,480,493,528,552,562,642],"modern":[10,267],"society.":[11],"Many":[12],"human":[13],"activities":[14,292,306,313,318,334,437],"rely":[15,49,250,335],"on":[16,50,251,336,513],"software":[17,47,54,112,130,517,529,553],"systems":[18,28,48,55,154,167,222,234,279,282,431,445,484,518,636],"that":[19,62,91,155,178,196,245,338,388,516,631,637,662],"shall":[20,438,446,459],"operate":[21],"seamlessly":[22],"24/7,":[23],"and":[24,33,60,70,96,125,142,158,164,170,172,182,198,232,249,269,283,304,308,311,323,330,368,374,382,398,415,458,467,523,557,591,603,626,653,673,682,685],"failures":[25],"in":[26,114,224,395,399,486,566,594,610,635],"such":[27,319],"may":[29,179,564,580,588,632],"cause":[30],"severe":[31],"problems":[32],"considerable":[34],"economic":[35],"loss.":[36],"To":[37],"efficiently":[38],"address":[39],"a":[40,215,504],"growing":[41],"variety":[42],"increasingly":[44],"complex":[45],"activities,":[46],"sophisticated":[51],"technologies.":[52],"Most":[53],"are":[56,63,72,107,156,168,173,208,339,345,346,519],"assembled":[57],"from":[58,293,472,555],"modules":[59,177,387],"subsystems":[61],"often":[64],"developed":[65,181],"by":[66,99,290,410,521,678],"third":[67,100],"party":[68,101],"organization,":[69],"sometime":[71],"not":[73,134,211,260,271,347],"even":[74,152],"available":[75,160,341,440,609,634,648],"at":[76,161,331,342,441,468,499,540,651,671],"system":[78,206,351,364,530],"build":[79],"time.":[80],"This":[81,645],"case":[84],"for":[85,153,435,578,649],"example":[86],"many":[88,266],"Web":[89,93,105],"applications":[90,106],"link":[92],"services":[94],"built":[95],"changed":[97],"independently":[98],"organizations":[102],"while":[103,372,502,620],"running.":[108],"The":[109,191,478,549],"progresses":[110],"engineering":[113],"last":[116],"decades":[117],"have":[118,133,229],"increased":[119],"productivity,":[121],"reduced":[122],"costs":[124],"improved":[126],"reliability":[128],"products,":[131],"but":[132,210],"eliminated":[135],"occurrence":[137],"field":[139,200,476],"failures.":[140,477],"Detecting":[141],"removing":[143],"all":[144],"faults":[145,201,228,258],"before":[146,203],"deployment":[147,187],"practically":[149],"too":[150],"expensive":[151,252],"simple":[157],"fully":[159,328],"design":[162,294,303,310,343,500,541,556,577,659],"time,":[163,501],"impossible":[165],"when":[166],"large":[169],"complex,":[171],"dynamically":[174],"linked":[175],"to":[176,213,254,295,316,325,366,384,421,453,462,470,489,496,531,543,569,615,658,667,674],"be":[180,326,439,447,460,497,633,655,664],"distributed":[183],"after":[185],"system.":[190,597],"classic":[192,241,403],"stop-and-go":[193],"maintenance":[194,312,357,376,404,426,436,676],"approaches":[195,244],"locate":[197,367],"fix":[199,369,532],"offline":[202,420],"deploying":[204],"new":[205,233,288,386,592],"versions":[207],"important,":[209],"sufficient":[212],"guarantee":[214],"seamless":[216],"24/7":[217],"behavior,":[218,585],"because":[219],"faulty":[221,669],"remain":[223],"operation":[225],"until":[226],"been":[230],"removed":[231],"redeployed":[235],"[1].":[236],"On":[237],"other":[239],"hand,":[240],"fault":[242,321,683],"tolerant":[243],"constrain":[246],"developers'":[247],"freedom":[248],"mechanisms":[253,661,677],"avoid":[255],"or":[256,573,618,640],"mask":[257],"do":[259,270],"match":[261],"cost":[263],"requirements":[264,397],"systems,":[268,299],"extend":[272],"beyond":[273],"set":[275],"safety":[277],"critical":[278],"[2].":[280],"Self-healing":[281],"autonomic":[284],"computing":[285],"tackle":[286],"these":[287,643],"challenges":[289,479],"moving":[291],"runtime.":[296,332,442],"In":[297,402,428],"self-healing":[298,483,546,660],"borderline":[301],"between":[302],"runtime":[305,352,469],"fades,":[307],"both":[309,657],"must":[314],"change":[315],"enable":[317],"as":[320],"diagnoses":[322],"fixes":[324],"performed":[327],"automatically":[329,466,665],"Maintenance":[333],"information":[337,419,465],"usually":[340],"time":[344,542],"part":[348],"infrastructure.":[353],"For":[354,598],"example,":[355,599],"corrective":[356],"requires":[358,377],"some":[359,378],"knowledge":[360,379,407,433,452,495],"about":[361,380],"expected":[363],"behavior":[365],"faults,":[371,533],"adaptive":[373],"perfective":[375],"libraries":[381,563,600,614],"components":[383],"identify":[385],"better":[389],"cope":[390],"with":[391,423,449,455,583],"changes":[394],"environment.":[401],"approaches,":[405],"this":[406,464],"mastered":[409],"developers,":[412],"who":[413],"gather":[414],"use":[416],"required":[418,434,539],"deal":[422,454],"emerging":[425],"problems.":[427],"self":[429],"healing":[430,444],"Self":[443],"designed":[448],"enough":[450],"embedded":[451],"unplanned":[456],"events,":[457],"able":[461],"exploit":[463],"recover":[471],"unexpected":[473],"situations,":[474],"like":[475,601,623],"designing":[481],"powerful":[482,505],"relies":[485,512],"ability":[488],"minimize":[490],"amount":[492],"extra":[494,537],"provided":[498],"feeding":[503],"automatic":[506],"recovery":[507],"mechanism.":[508],"An":[509],"interesting":[510],"approach":[511],"observation":[515],"redundant":[520],"nature,":[522],"exploits":[524],"intrinsic":[526,550],"redundancy":[527,551,646],"thus":[534],"minimizing":[535],"effort":[538],"feed":[544],"mechanism":[547],"[3].":[548],"stems":[554],"reusability":[558],"practice:":[559],"reuse":[561],"results":[565],"different":[567],"ways":[568],"achieve":[570],"same":[572,596],"similar":[574],"results,":[575],"modularity":[579],"produce":[581],"methods":[582],"equivalent":[584],"backward":[586],"compatibility":[587],"keep":[589],"deprecated":[590],"implementations":[593],"Ant":[602],"Log4J":[604],"implement":[605],"several":[606],"functionalities":[607],"already":[608],"standard":[612],"Java":[613],"improve":[616,675],"efficiency":[617],"usability,":[619],"graphical":[621],"libraries,":[622],"SWT,":[624],"Swing":[625],"AWT,":[627],"provide":[628],"overlapping":[629],"functionality":[630],"include":[638],"two":[639],"more":[641],"libraries.":[644],"free":[650],"runtime,":[652,672],"can":[654,663],"exploited":[656],"activated":[666],"solve":[668],"situations":[670],"facilitating":[679],"failure":[680],"reproduction":[681],"localization":[684],"fixing.":[686]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
