{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:55:20Z","timestamp":1725609320794},"reference-count":95,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFB1003904"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602403"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Research and Development Program of China Railway Corporation","award":["P2018X002"]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2021,7,1]]},"DOI":"10.1109\/tse.2019.2921343","type":"journal-article","created":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T20:20:01Z","timestamp":1559852401000},"page":"1331-1349","source":"Crossref","is-referenced-by-count":30,"title":["What Do Programmers Discuss About Blockchain? A Case Study on the Use of Balanced LDA and the Reference Architecture of a Domain to Capture Online Discussions About Blockchain Platforms Across Stack Exchange Communities"],"prefix":"10.1109","volume":"47","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-7657-6653","authenticated-orcid":false,"given":"Zhiyuan","family":"Wan","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6302-3256","authenticated-orcid":false,"given":"Xin","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351687"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100062"},{"key":"ref71","first-page":"100","article-title":"Automatic evaluation of topic coherence","author":"newman","year":"2010","journal-title":"Proc Annu Conf North Amer Chapter ACL Human Lang Technol"},{"key":"ref70","first-page":"93","article-title":"Analyzing entities and topics in news articles using statistical topic models","author":"newman","year":"2006","journal-title":"Proc Int Conf Intell Secur Informat"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-802117-0.00005-9"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606598"},{"key":"ref74","article-title":"OATH reference architecture","year":"2013"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2016.05.005"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23798-0_42"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2000.891462"},{"key":"ref78","article-title":"The bitcoin lightning network: Scalable off-chain instant payments","author":"poon","year":"2016","journal-title":"Bitcoin Lightning Network White Paper"},{"key":"ref79","article-title":"Exploring the determinants of bitcoin’s price: An application of Bayesian structural time series","author":"poyser","year":"0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100123"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.150288"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117773"},{"key":"ref37","article-title":"SOA reference architecture","author":"group","year":"2011"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.13"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.114.2.211"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134093"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/2752489.2752493","article-title":"A survey on the benefits and drawbacks of autosar","author":"mart\u00ednez-fern\u00e1ndez","year":"2015","journal-title":"Proc 1st Int Workshop Automotive Softw Archit"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2870388"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814313"},{"key":"ref63","first-page":"1","article-title":"Bitcoin spread prediction using social and web search media","author":"matta","year":"2015","journal-title":"Proc User Model Adaptation Personalization Workshops"},{"key":"ref28","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","author":"eyal","year":"2016","journal-title":"Proc 13th Usenix Conf Netw Syst Des Implementation"},{"key":"ref64","article-title":"Towards common blockchain architecture-an “ISO OSI for blockchain","author":"maxim","year":"2017"},{"key":"ref27","first-page":"3","article-title":"A fast and scalable payment network with bitcoin duplex micropayment channels","author":"decker","year":"2015","journal-title":"Proc Symp Self-Stabilizing Systems"},{"key":"ref65","author":"meier","year":"2009","journal-title":"Microsoft Application Architecture Guide Patterns and Practices"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"ref29","article-title":"Using the architecture tradeoff analysis method to evaluate a reference architecture: A case study","author":"gallagher","year":"2000"},{"key":"ref67","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008","journal-title":"Bitcoin white paper"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405249"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.53"},{"key":"ref2","article-title":"Reference architecture of a blockchain","year":"2018"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.02.005"},{"key":"ref20","article-title":"Architecture of the hyperledger blockchain fabric","author":"cachin","year":"0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3048124"},{"key":"ref21","article-title":"Big data and analytics reference architecture","author":"chappelle","year":"2013"},{"key":"ref24","article-title":"Crypto-currency market capitalizations","year":"2018"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1002\/sys.20129","article-title":"The concept of reference architectures","volume":"13","author":"cloutier","year":"2010","journal-title":"Syst Eng"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2307\/2333424"},{"key":"ref25","article-title":"Colored coins","year":"2013"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.10.017"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1672-0"},{"key":"ref94","article-title":"The four layers of the blockchain","author":"xiao","year":"2016"},{"key":"ref93","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.20"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624006"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.59"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39031-9_26"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.33"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-292"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624014"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671289"},{"key":"ref52","first-page":"558","article-title":"Autosar migration from existing automotive software","author":"kum","year":"2008","journal-title":"Proc Int Conf Control Autom Syst"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597083"},{"key":"ref11","author":"ballard","year":"2014","journal-title":"Information Governance Principles and Practices for a Big Data Landscape"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9231-y"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3115\/1219044.1219075"},{"key":"ref14","first-page":"101","article-title":"Topic models","author":"blei","year":"2009"},{"key":"ref15","first-page":"993","article-title":"Latent Dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref82","article-title":"Accelerating bitcoin’s transaction processing","volume":"2013","author":"sompolinsky","year":"2013","journal-title":"Cryptology ePrint Archive"},{"key":"ref16","first-page":"449","article-title":"What does bitcoin look like?","volume":"16","author":"bouoiyour","year":"2015","journal-title":"Annals of Economics & Finance"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9379-3"},{"key":"ref17","author":"bovens","year":"2003","journal-title":"Bayesian Epistemology"},{"key":"ref84","article-title":"The Ashley Madison hack...in 2 minutes","author":"staff","year":"2015"},{"key":"ref18","article-title":"Blockchain basics: Introduction to distributed ledgers","author":"brakeville","year":"2018"},{"key":"ref83","first-page":"1","article-title":"Factors influencing cryptocurrency prices: Evidence from bitcoin, ethereum, dash, litcoin, and monero","volume":"2","author":"sovbetov","year":"2018","journal-title":"Journal of Economics and Financial Analysis"},{"key":"ref19","article-title":"Corda: An introduction","author":"brown","year":"0"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685324"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884800"},{"key":"ref4","first-page":"1","article-title":"Patterns of self-organising in the bitcoin online community: Code forking as organising in digital infrastructure","author":"andersen","year":"2017","journal-title":"Proc Int Conf Inf Syst"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.11.009"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref85","author":"swan","year":"2015","journal-title":"Blockchain Blueprint for a New Economy"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/978-3-662-54455-6_8","article-title":"A survey of attacks on ethereum smart contracts (SoK)","author":"atzei","year":"2017","journal-title":"Proc Int Conf Principles Secur Trust"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.13"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624015"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985467"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985907"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2990497"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2011.23"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.21236\/ADA382629"},{"key":"ref48","first-page":"279","article-title":"Enhancing bitcoin security and performance with strong consistency via collective signing","author":"kogias","year":"2016","journal-title":"Proc 25th USENIX Secur Symp"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0161197"},{"key":"ref42","first-page":"856","article-title":"Online learning for latent dirichlet allocation","author":"hoffman","year":"2010","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref41","first-page":"339","article-title":"What’s hot and what’s not: Windowed developer topic analysis","author":"hindle","year":"2009","journal-title":"Proc IEEE Int Conf Softw Maintenance"},{"key":"ref44","article-title":"Nowcasting the bitcoin market with Twitter signals","author":"kaminski","year":"0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3274348"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9489265\/08732384.pdf?arnumber=8732384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T07:50:42Z","timestamp":1721375442000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8732384\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,1]]},"references-count":95,"journal-issue":{"issue":"7"},"URL":"http:\/\/dx.doi.org\/10.1109\/tse.2019.2921343","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,1]]}}}