{"id":"https://openalex.org/W6967402140","doi":"https://doi.org/10.5281/zenodo.10961768","title":"Exploring Architectural Evolution in Microservice Systems using Repository Mining Techniques and Static Code Analysis","display_name":"Exploring Architectural Evolution in Microservice Systems using Repository Mining Techniques and Static Code Analysis","publication_year":2024,"publication_date":"2024-04-11","ids":{"openalex":"https://openalex.org/W6967402140","doi":"https://doi.org/10.5281/zenodo.10961768"},"language":"en","primary_location":{"id":"doi:10.5281/zenodo.10961768","is_oa":true,"landing_page_url":"https://doi.org/10.5281/zenodo.10961768","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"other","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.5281/zenodo.10961768","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Genfer, Patric","orcid":"https://orcid.org/0000-0002-4236-5951"},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Genfer, Patric","raw_affiliation_strings":["University of Vienna, Faculty of Computer Science, Research Group Software Architecture","UniVie Doctoral School Computer Science DoCS, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"University of Vienna, Faculty of Computer Science, Research Group Software Architecture","institution_ids":["https://openalex.org/I129774422"]},{"raw_affiliation_string":"UniVie Doctoral School Computer Science DoCS, Vienna, Austria","institution_ids":["https://openalex.org/I129774422"]}]},{"author_position":"last","author":{"id":null,"display_name":"Zdun, Uwe","orcid":"https://orcid.org/0000-0002-6233-2591"},"institutions":[{"id":"https://openalex.org/I129774422","display_name":"University of Vienna","ror":"https://ror.org/03prydq77","country_code":"AT","type":"education","lineage":["https://openalex.org/I129774422"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Zdun, Uwe","raw_affiliation_strings":["University of Vienna, Faculty of Computer Science, Research Group Software Architecture"],"affiliations":[{"raw_affiliation_string":"University of Vienna, Faculty of Computer Science, Research Group Software Architecture","institution_ids":["https://openalex.org/I129774422"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I129774422"],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":null,"topics":[],"keywords":[{"id":"https://openalex.org/keywords/microservices","display_name":"Microservices","score":0.7562999725341797},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.6326000094413757},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6003999710083008},{"id":"https://openalex.org/keywords/architectural-pattern","display_name":"Architectural pattern","score":0.5867999792098999},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.5307000279426575},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.49559998512268066},{"id":"https://openalex.org/keywords/legacy-system","display_name":"Legacy system","score":0.4952000081539154},{"id":"https://openalex.org/keywords/kpi-driven-code-analysis","display_name":"KPI-driven code analysis","score":0.4830000102519989},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4708999991416931},{"id":"https://openalex.org/keywords/architectural-style","display_name":"Architectural style","score":0.41940000653266907}],"concepts":[{"id":"https://openalex.org/C2778505942","wikidata":"https://www.wikidata.org/wiki/Q18344624","display_name":"Microservices","level":3,"score":0.7562999725341797},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6972000002861023},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.6326000094413757},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6003999710083008},{"id":"https://openalex.org/C72280835","wikidata":"https://www.wikidata.org/wiki/Q635346","display_name":"Architectural pattern","level":5,"score":0.5867999792098999},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.567300021648407},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.5307000279426575},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.49559998512268066},{"id":"https://openalex.org/C105446022","wikidata":"https://www.wikidata.org/wiki/Q445962","display_name":"Legacy system","level":3,"score":0.4952000081539154},{"id":"https://openalex.org/C121957198","wikidata":"https://www.wikidata.org/wiki/Q14365593","display_name":"KPI-driven code analysis","level":5,"score":0.4830000102519989},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4708999991416931},{"id":"https://openalex.org/C2777364373","wikidata":"https://www.wikidata.org/wiki/Q32880","display_name":"Architectural style","level":3,"score":0.41940000653266907},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4147999882698059},{"id":"https://openalex.org/C202105479","wikidata":"https://www.wikidata.org/wiki/Q265013","display_name":"Software evolution","level":5,"score":0.41119998693466187},{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.4066999852657318},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.4041000008583069},{"id":"https://openalex.org/C51929080","wikidata":"https://www.wikidata.org/wiki/Q2425187","display_name":"Codebase","level":3,"score":0.4034999907016754},{"id":"https://openalex.org/C35869016","wikidata":"https://www.wikidata.org/wiki/Q846636","display_name":"Software architecture","level":3,"score":0.3961000144481659},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.39559999108314514},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.39480000734329224},{"id":"https://openalex.org/C101317890","wikidata":"https://www.wikidata.org/wiki/Q940053","display_name":"Software maintenance","level":4,"score":0.35100001096725464},{"id":"https://openalex.org/C2777561058","wikidata":"https://www.wikidata.org/wiki/Q2652119","display_name":"Program comprehension","level":4,"score":0.35030001401901245},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.34619998931884766},{"id":"https://openalex.org/C152752567","wikidata":"https://www.wikidata.org/wiki/Q116877","display_name":"Code refactoring","level":3,"score":0.3452000021934509},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.31049999594688416},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.2946999967098236},{"id":"https://openalex.org/C65399332","wikidata":"https://www.wikidata.org/wiki/Q749568","display_name":"Representational state transfer","level":3,"score":0.2892000079154968},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.2863999903202057},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.28540000319480896},{"id":"https://openalex.org/C199519371","wikidata":"https://www.wikidata.org/wiki/Q942695","display_name":"Source lines of code","level":3,"score":0.2808000147342682},{"id":"https://openalex.org/C85687889","wikidata":"https://www.wikidata.org/wiki/Q445962","display_name":"Legacy code","level":3,"score":0.26989999413490295},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.25209999084472656},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.2515000104904175}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5281/zenodo.10961768","is_oa":true,"landing_page_url":"https://doi.org/10.5281/zenodo.10961768","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.5281/zenodo.10961768","is_oa":true,"landing_page_url":"https://doi.org/10.5281/zenodo.10961768","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Contains":[0],"source":[1,91,96],"code":[2,8,92,97],"repository":[3,98],"mining":[4,99],"technique":[5],"and":[6,24,36,43,50,61,82,138,161,177,197],"static":[7,90],"analysis":[9],"described":[10],"in":[11,17,158],"the":[12,55,59,68,84,188],"paper":[13],"Exploring":[14],"Architectural":[15],"Evolution":[16],"Microservice":[18],"Systems":[19],"using":[20],"Repository":[21],"Mining":[22],"Techniques":[23],"Static":[25],"Code":[26],"Analysis.Abstract:":[27],"Microservices":[28],"have":[29],"gained":[30],"popularity":[31],"for":[32,126],"isolating":[33],"service":[34],"functionality":[35],"mitigating":[37],"issues":[38],"such":[39],"as":[40],"architectural":[41,102,132,180,195],"erosion":[42],"technical":[44],"debt.":[45],"However,":[46],"their":[47],"decentralized":[48],"nature":[49],"rapid":[51],"development":[52,111],"often":[53],"obscure":[54],"holistic":[56],"view":[57],"of":[58,67,86,190],"system":[60,150],"lead":[62],"developers":[63],"to":[64,80,104,175],"lose":[65],"sight":[66],"overarching":[69],"architecture.Our":[70],"work":[71],"addresses":[72],"this":[73],"challenge":[74],"by":[75,129],"proposing":[76],"a":[77,109,116,141,172],"novel":[78],"approach":[79,114],"track":[81],"assess":[83],"evolution":[85,189],"microservice":[87,148],"architectures":[88],"through":[89,140],"analysis.":[93],"We":[94],"combine":[95],"techniques":[100],"with":[101,151,171],"reconstruction":[103],"measure":[105],"various":[106,131],"metrics":[107],"throughout":[108],"system's":[110],"history.":[112],"Our":[113,166],"uses":[115],"formal":[117],"API-based":[118],"decomposition":[119],"model":[120],"that":[121],"can":[122],"easily":[123],"be":[124],"adapted":[125],"different":[127,159],"scenarios":[128],"choosing":[130],"metrics.We":[133],"validated":[134],"our":[135],"method's":[136],"scalability":[137],"robustness":[139],"case":[142],"study":[143],"on":[144],"an":[145],"extensive":[146],"open-source":[147],"reference":[149],"more":[152,162],"than":[153,163],"40":[154],"individual":[155],"services":[156],"written":[157],"languages":[160],"400":[164],"commits.":[165],"research":[167],"provides":[168],"software":[169],"architects":[170],"powerful":[173],"tool":[174],"identify":[176],"monitor":[178],"problematic":[179],"trends":[181],"before":[182],"they":[183],"become":[184],"imminent":[185],"threats,":[186],"enabling":[187],"microservice-based":[191],"systems":[192],"while":[193],"maintaining":[194],"coherence":[196],"integrity.":[198]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
