{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:32:47Z","timestamp":1742916767677,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031081286"},{"type":"electronic","value":"9783031081293"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08129-3_3","type":"book-chapter","created":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T14:34:11Z","timestamp":1655130851000},"page":"41-58","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Scratching the\u00a0Surface of\u00a0.\/configure: Learning the\u00a0Effects of\u00a0Compile-Time Options on\u00a0Binary Size and\u00a0Gadgets"],"prefix":"10.1007","author":[{"given":"Xhevahire","family":"T\u00ebrnava","sequence":"first","affiliation":[]},{"given":"Mathieu","family":"Acher","sequence":"additional","affiliation":[]},{"given":"Luc","family":"Lesoil","sequence":"additional","affiliation":[]},{"given":"Arnaud","family":"Blouin","sequence":"additional","affiliation":[]},{"given":"Jean-Marc","family":"J\u00e9z\u00e9quel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,10]]},"reference":[{"issue":"6","key":"3_CR1","doi-asserted-by":"publisher","first-page":"2972","DOI":"10.1007\/s10664-017-9499-z","volume":"22","author":"WKG Assun\u00e7\u00e3o","year":"2017","unstructured":"Assun\u00e7\u00e3o, W.K.G., Lopez-Herrejon, R.E., Linsbauer, L., Vergilio, S.R., Egyed, A.: Reengineering legacy applications into software product lines: a systematic mapping. Empir. Softw. Eng. 22(6), 2972\u20133016 (2017). https:\/\/doi.org\/10.1007\/s10664-017-9499-z","journal-title":"Empir. Softw. Eng."},{"issue":"4","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1794","DOI":"10.1007\/s10664-014-9357-1","volume":"21","author":"G B\u00e9can","year":"2015","unstructured":"B\u00e9can, G., Acher, M., Baudry, B., Nasr, S.B.: Breathing ontological knowledge into feature model synthesis: an empirical study. Empir. Softw. Eng. 21(4), 1794\u20131841 (2015). https:\/\/doi.org\/10.1007\/s10664-014-9357-1","journal-title":"Empir. Softw. Eng."},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Brown, M.D., Pande, S.: CARVE: practical security-focused software debloating using simple feature set mappings. In: Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation, pp. 1\u20137 (2019). https:\/\/doi.org\/10.1145\/3338502.3359764","DOI":"10.1145\/3338502.3359764"},{"key":"3_CR4","unstructured":"Brown, M.D., Pande, S.: Is less really more? Towards better metrics for measuring security improvements realized through software debloating. In: 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19) (2019). https:\/\/www.usenix.org\/system\/files\/cset19-paper_brown.pdf"},{"key":"3_CR5","unstructured":"GNU: Autoconf - GNU Project. https:\/\/www.gnu.org\/software\/autoconf\/"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Guo, J., Czarnecki, K., Apel, S., Siegmund, N., W\u0105sowski, A.: Variability-aware performance prediction: a statistical learning approach. In: 2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 301\u2013311. IEEE (2013). https:\/\/doi.org\/10.1109\/ASE.2013.6693089","DOI":"10.1109\/ASE.2013.6693089"},{"issue":"2","key":"3_CR7","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1007\/s10664-018-9635-4","volume":"24","author":"A Halin","year":"2018","unstructured":"Halin, A., Nuttinck, A., Acher, M., Devroey, X., Perrouin, G., Baudry, B.: Test them all, is it worth it? Assessing configuration sampling on the JHipster Web development stack. Empir. Softw. Eng. 24(2), 674\u2013717 (2018). https:\/\/doi.org\/10.1007\/s10664-018-9635-4","journal-title":"Empir. Softw. Eng."},{"key":"3_CR8","unstructured":"Hampel, F.R., Ronchetti, E.M., Rousseeuw, P.J., Stahel, W.A.: Robust Statistics: The Approach Based on Influence Functions, vol. 196. Wiley (2011)"},{"key":"3_CR9","unstructured":"Herodotou, H., Lim, H., Luo, G., Borisov, N., Dong, L., Cetin, F.B., Babu, S.: Starfish: a self-tuning system for big data analytics. In: CIDR, vol. 11, pp. 261\u2013272 (2011)"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Jamshidi, P., Siegmund, N., Velez, M., K\u00e4stner, C., Patel, A., Agarwal, Y.: Transfer learning for performance modeling of configurable systems: an exploratory analysis. In: 2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 497\u2013508. IEEE (2017). https:\/\/doi.org\/10.1109\/ASE.2017.8115661","DOI":"10.1109\/ASE.2017.8115661"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Jiang, Y., Bao, Q., Wang, S., Liu, X., Wu, D.: RedDroid: android application redundancy customization based on static analysis. In: 2018 IEEE 29th International Symposium on Software Reliability Engineering (ISSRE), pp. 189\u2013199. IEEE (2018). https:\/\/doi.org\/10.1109\/ISSRE.2018.00029","DOI":"10.1109\/ISSRE.2018.00029"},{"key":"3_CR12","volume-title":"Rank Correlation Methods","author":"MG Kendall","year":"1948","unstructured":"Kendall, M.G.: Rank Correlation Methods. Harvard Book, Harvard (1948)"},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Lesoil, L., Acher, M., T\u00ebrnava, X.H., Blouin, A., J\u00e9z\u00e9quel, J.M.: The interplay of compile-time and run-time options for performance prediction. In: Proceedings of the 25th ACM International Systems and Software Product Line Conference-Volume A, pp. 100\u2013111 (2021). https:\/\/doi.org\/10.1145\/3461001.3471149","DOI":"10.1145\/3461001.3471149"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"McGrenere, J., Moore, G.: Are we all in the same \u201cbloat\u201d? In: Proceedings of the Graphics Interface 2000 Conference, May 15\u201317, 2000, Montr\u2019eal, Qu\u2019ebec, Canada, pp. 187\u2013196, May 2000. https:\/\/doi.org\/10.20380\/GI2000.25","DOI":"10.20380\/GI2000.25"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Meinicke, J., Wong, C.P., Vasilescu, B., K\u00e4stner, C.: Exploring differences and commonalities between feature flags and configuration options. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: Software Engineering in Practice, pp. 233\u2013242 (2020). https:\/\/doi.org\/10.1145\/3377813.3381366","DOI":"10.1145\/3377813.3381366"},{"key":"3_CR16","unstructured":"Molnar, C.: Interpretable Machine Learning (2020). Lulu.com"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Nadi, S., Holt, R.: The Linux Kernel: a case study of build system variability. J. Softw. Evol. Process 26(8), 730\u2013746 (2014). https:\/\/doi.org\/10.1002\/smr.1595","DOI":"10.1002\/smr.1595"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Pereira, J.A., Acher, M., Martin, H., J\u00e9z\u00e9quel, J.M., Botterweck, G., Ventresque, A.: Learning software configuration spaces: a systematic literature review (2021). https:\/\/doi.org\/10.1016\/j.jss.2021.111044","DOI":"10.1016\/j.jss.2021.111044"},{"issue":"6","key":"3_CR19","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1109\/TSE.2018.2867847","volume":"46","author":"M Sayagh","year":"2018","unstructured":"Sayagh, M., Kerzazi, N., Adams, B., Petrillo, F.: Software configuration engineering in practice interviews, survey, and systematic literature review. IEEE Trans. Softw. Eng. 46(6), 646\u2013673 (2018). https:\/\/doi.org\/10.1109\/TSE.2018.2867847","journal-title":"IEEE Trans. Softw. Eng."},{"key":"3_CR20","doi-asserted-by":"publisher","unstructured":"Schlie, A., Kn\u00fcppel, A., Seidl, C., Schaefer, I.: Incremental feature model synthesis for clone-and-own software systems in MATLAB\/Simulink. In: Proceedings of the 24th ACM Conference on Systems and Software Product Line: Volume A-Volume A, pp. 1\u201312 (2020). https:\/\/doi.org\/10.1145\/3382025.3414973","DOI":"10.1145\/3382025.3414973"},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Sharif, H., Abubakar, M., Gehani, A., Zaffar, F.: TRIMMER: application specialization for code debloating. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 329\u2013339 (2018). https:\/\/doi.org\/10.1145\/3238147.3238160","DOI":"10.1145\/3238147.3238160"},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"She, S., Lotufo, R., Berger, T., W\u0105sowski, A., Czarnecki, K.: Reverse engineering feature models. In: Proceedings of the 33rd International Conference on Software Engineering, pp. 461\u2013470 (2011). https:\/\/doi.org\/10.1145\/1985793.1985856","DOI":"10.1145\/1985793.1985856"},{"key":"3_CR23","doi-asserted-by":"publisher","unstructured":"Siegmund, N., Grebhahn, A., Apel, S., K\u00e4stner, C.: Performance-influence models for highly configurable systems. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, pp. 284\u2013294 (2015). https:\/\/doi.org\/10.1145\/2786805.2786845","DOI":"10.1145\/2786805.2786845"},{"issue":"3","key":"3_CR24","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.infsof.2012.07.020","volume":"55","author":"N Siegmund","year":"2013","unstructured":"Siegmund, N., Rosenm\u00fcller, M., K\u00e4stner, C., Giarrusso, P.G., Apel, S., Kolesnikov, S.S.: Scalable prediction of non-functional properties in software product lines: footprint and memory consumption. Inf. Softw. Technol. 55(3), 491\u2013507 (2013). https:\/\/doi.org\/10.1016\/j.infsof.2012.07.020","journal-title":"Inf. Softw. Technol."},{"issue":"3","key":"3_CR25","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s11219-011-9152-9","volume":"20","author":"N Siegmund","year":"2012","unstructured":"Siegmund, N., Rosenm\u00fcller, M., Kuhlemann, M., K\u00e4stner, C., Apel, S., Saake, G.: SPL conqueror: toward optimization of non-functional properties in software product lines. Softw. Qual. J. 20(3), 487\u2013517 (2012). https:\/\/doi.org\/10.1007\/s11219-011-9152-9","journal-title":"Softw. Qual. J."},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Siegmund, N., Rosenm\u00fcller, M., Kuhlemann, M., K\u00e4stner, C., Saake, G.: Measuring non-functional properties in software product line for product derivation. In: 2008 15th Asia-Pacific Software Engineering Conference, pp. 187\u2013194. IEEE (2008). https:\/\/doi.org\/10.1109\/APSEC.2008.45","DOI":"10.1109\/APSEC.2008.45"},{"key":"3_CR27","doi-asserted-by":"publisher","unstructured":"Temple, P., Galindo, J.A., Acher, M., J\u00e9z\u00e9quel, J.M.: Using machine learning to infer constraints for product lines. In: Proceedings of the 20th International Systems and Software Product Line Conference, pp. 209\u2013218 (2016). https:\/\/doi.org\/10.1145\/2934466.2934472","DOI":"10.1145\/2934466.2934472"},{"key":"3_CR28","doi-asserted-by":"publisher","unstructured":"Xu, T., Jin, L., Fan, X., Zhou, Y., Pasupathy, S., Talwadker, R.: Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, pp. 307\u2013319 (2015). https:\/\/doi.org\/10.1145\/2786805.2786852","DOI":"10.1145\/2786805.2786852"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Yin, Z., Ma, X., Zheng, J., Zhou, Y., Bairavasundaram, L.N., Pasupathy, S.: An empirical study on configuration errors in commercial and open source systems. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pp. 159\u2013172 (2011). https:\/\/doi.org\/10.1145\/2043556.2043572","DOI":"10.1145\/2043556.2043572"},{"key":"3_CR30","doi-asserted-by":"publisher","unstructured":"Zhou, S., Al-Kofahi, J., Nguyen, T.N., K\u00e4stner, C., Nadi, S.: Extracting configuration knowledge from build files with symbolic analysis. In: 2015 IEEE\/ACM 3rd International Workshop on Release Engineering, pp. 20\u201323. IEEE (2015). https:\/\/doi.org\/10.1109\/RELENG.2015.15","DOI":"10.1109\/RELENG.2015.15"},{"key":"3_CR31","doi-asserted-by":"publisher","unstructured":"Ziadi, T., Frias, L., da Silva, M.A.A., Ziane, M.: Feature identification from the source code of product variants. In: 2012 16th European Conference on Software Maintenance and Reengineering, pp. 417\u2013422. IEEE (2012). https:\/\/doi.org\/10.1109\/CSMR.2012.52","DOI":"10.1109\/CSMR.2012.52"}],"container-title":["Lecture Notes in Computer Science","Reuse and Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08129-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T14:35:09Z","timestamp":1655130909000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08129-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031081286","9783031081293"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08129-3_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software and Software Reuse","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montpellier","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsr2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icsr2022.wp.imt.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held virtually","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}