{"id":"https://openalex.org/W2149550606","doi":"https://doi.org/10.1109/icsmc.2003.1244600","title":"Hierarchical process patterns: construct software processes in a stepwise way","display_name":"Hierarchical process patterns: construct software processes in a stepwise way","publication_year":2004,"publication_date":"2004-04-23","ids":{"openalex":"https://openalex.org/W2149550606","doi":"https://doi.org/10.1109/icsmc.2003.1244600","mag":"2149550606"},"language":"en","primary_location":{"id":"doi:10.1109/icsmc.2003.1244600","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsmc.2003.1244600","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109875808","display_name":"Heyuan Huang","orcid":"https://orcid.org/0009-0000-0320-3629"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Heyuan Huang","raw_affiliation_strings":["CIT Lab, Department of Comp. Sci. and Engineering, Shanghai Jiaotong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"CIT Lab, Department of Comp. Sci. and Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077062106","display_name":"Shensheng Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shensheng Zhang","raw_affiliation_strings":["CIT Lab, Department of Comp. Sci. and Engineering, Shanghai Jiaotong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"CIT Lab, Department of Comp. Sci. and Engineering, Shanghai Jiaotong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109875808"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":3.9453,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.94224587,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"1353","last_page":"1358"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7383047342300415},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.6029518842697144},{"id":"https://openalex.org/keywords/goal-driven-software-development-process","display_name":"Goal-Driven Software Development Process","score":0.5968102216720581},{"id":"https://openalex.org/keywords/artifact","display_name":"Artifact (error)","score":0.5377182364463806},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5268351435661316},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4875201880931854},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.48389753699302673},{"id":"https://openalex.org/keywords/software-development-process","display_name":"Software development process","score":0.45821091532707214},{"id":"https://openalex.org/keywords/activity-diagram","display_name":"Activity diagram","score":0.42559802532196045},{"id":"https://openalex.org/keywords/inheritance","display_name":"Inheritance (genetic algorithm)","score":0.4231630563735962},{"id":"https://openalex.org/keywords/software-design-pattern","display_name":"Software design pattern","score":0.41563108563423157},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.39900341629981995},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35921114683151245},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.25550469756126404},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24843642115592957},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.21999073028564453},{"id":"https://openalex.org/keywords/unified-modeling-language","display_name":"Unified Modeling Language","score":0.1752541959285736}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7383047342300415},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.6029518842697144},{"id":"https://openalex.org/C42669973","wikidata":"https://www.wikidata.org/wiki/Q5575145","display_name":"Goal-Driven Software Development Process","level":5,"score":0.5968102216720581},{"id":"https://openalex.org/C2779010991","wikidata":"https://www.wikidata.org/wiki/Q2720909","display_name":"Artifact (error)","level":2,"score":0.5377182364463806},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5268351435661316},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4875201880931854},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.48389753699302673},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.45821091532707214},{"id":"https://openalex.org/C64219723","wikidata":"https://www.wikidata.org/wiki/Q423262","display_name":"Activity diagram","level":4,"score":0.42559802532196045},{"id":"https://openalex.org/C2780902518","wikidata":"https://www.wikidata.org/wiki/Q6033780","display_name":"Inheritance (genetic algorithm)","level":3,"score":0.4231630563735962},{"id":"https://openalex.org/C146054899","wikidata":"https://www.wikidata.org/wiki/Q181156","display_name":"Software design pattern","level":3,"score":0.41563108563423157},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.39900341629981995},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35921114683151245},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.25550469756126404},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24843642115592957},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.21999073028564453},{"id":"https://openalex.org/C145644426","wikidata":"https://www.wikidata.org/wiki/Q169411","display_name":"Unified Modeling Language","level":3,"score":0.1752541959285736},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icsmc.2003.1244600","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsmc.2003.1244600","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1495108710","https://openalex.org/W1499599667","https://openalex.org/W1503483349","https://openalex.org/W1571628554","https://openalex.org/W1598896112","https://openalex.org/W1649645444","https://openalex.org/W2005554351","https://openalex.org/W2023289093","https://openalex.org/W2225834748","https://openalex.org/W6629988786"],"related_works":["https://openalex.org/W1936384520","https://openalex.org/W2122998872","https://openalex.org/W2472680075","https://openalex.org/W2369419463","https://openalex.org/W3149523000","https://openalex.org/W1512360267","https://openalex.org/W2182744907","https://openalex.org/W3105511281","https://openalex.org/W2255025599","https://openalex.org/W1998414856"],"abstract_inverted_index":{"Patterns":[0],"are":[1],"widely":[2],"used":[3,17],"to":[4,18,55,127,130],"capture":[5],"design":[6],"decisions":[7],"and":[8,20,47,57,72,76,81,94,99],"rationale":[9],"of":[10,24,41,69,78,83,91,107,110],"software,":[11],"but":[12],"they":[13],"could":[14],"also":[15],"be":[16],"document":[19],"guide":[21],"the":[22,67,132],"development":[23],"software":[25,59,140],"process.":[26],"This":[27,50],"paper":[28,87,113,123],"proposes":[29],"a":[30,62,89,138],"framework":[31,133],"called":[32],"hierarchical":[33],"process":[34,70],"patterns":[35],"(HPP),":[36],"which":[37,136],"includes":[38],"three":[39],"types":[40],"pattern:":[42],"lifecycle":[43],"pattern,":[44,46],"activity":[45,80,117],"workflow":[48,68,119],"pattern.":[49,120],"division":[51],"makes":[52],"it":[53],"easier":[54],"tailor":[56],"refine":[58],"processes":[60],"in":[61,118,134],"stepwise":[63],"way.":[64],"To":[65,103],"describe":[66],"pattern":[71],"relationships":[73],"between":[74],"roles":[75],"artifacts":[77],"realized":[79],"those":[82],"sub":[84],"activities,":[85,111],"this":[86,112,122],"presents":[88],"set":[90],"representation":[92],"mechanism":[93],"defines":[95],"role":[96],"inheritance":[97],"diagram":[98],"artifact":[100],"decomposition":[101],"diagram.":[102],"support":[104],"variable":[105],"number":[106],"same":[108],"category":[109],"introduce":[114],"parameterized":[115],"compound":[116],"Finally,":[121],"gives":[124],"an":[125],"example":[126],"illustrate":[128],"how":[129],"apply":[131],"SPDM,":[135],"is":[137],"process-centered":[139],"engineering":[141],"environment.":[142]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
