{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:33:06Z","timestamp":1743042786936,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319246437"},{"type":"electronic","value":"9783319246444"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24644-4_8","type":"book-chapter","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T05:34:39Z","timestamp":1443072879000},"page":"110-126","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Architecture-Level Configuration of Large-Scale Embedded Software Systems"],"prefix":"10.1007","author":[{"given":"Razieh","family":"Behjati","sequence":"first","affiliation":[]},{"given":"Shiva","family":"Nejati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"8_CR1","unstructured":"Armstrong, A.A., Durfee, E.H.: Dynamic prioritization of complex agents in distributed constraint satisfaction problems. In: AAAI\/IAAI (1997)"},{"key":"8_CR2","unstructured":"Bayardo, R.J., Miranker, D.P.: A complexity analysis of space-bounded learning algorithms for the constraint satisfaction problem. In: AAAI (1996)"},{"key":"8_CR3","unstructured":"Behjati, R., Nejati, S.: Backtrack-free consistent configuration of cyber-physical systems (2014), http:\/\/simula.no\/publications\/Simula.simula.2608"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Behjati, R., Nejati, S., Briand, L.C.: Architecture-level configuration of large-scale embedded software systems. In: Accepted for publication in TOSEM (2014)","DOI":"10.1145\/2581376"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Behjati, R., Yue, T., Briand, L.C., Selic, B.: SimPL: a product-line modeling methodology for families of integrated control systems. In: Information and Software Technology (2013); Special Issue on Software Reuse and Product Lines","DOI":"10.1016\/j.infsof.2012.09.006"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Benavides, D., Segura, S., Ruiz-Cort\u00e9s, A.: Automated analysis of feature models 20 years later: A literature review. In: Inf. Syst. (2010)","DOI":"10.1016\/j.is.2010.01.001"},{"key":"8_CR7","unstructured":"Benavides, D., Segura, S., Trinidad, P., Ruiz Cort\u00e9s, A.: FAMA: tooling a framework for the automated analysis of feature models. In: VaMoS (2007)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Bryant, R.E.: Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput. (1986)","DOI":"10.1109\/TC.1986.1676819"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Carlsson, M., Mildner, P.: SICStus Prolog \u2013 the first 25 years. CoRR (2010)","DOI":"10.1017\/S1471068411000482"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Carlsson, M., Ottosson, G., Carlson, B.: An open-ended finite domain constraint solver. In: Hartel, P.H., Kuchen, H. (eds.) PLILP 1997. LNCS, vol.\u00a01292, pp. 191\u2013206. Springer, Heidelberg (1997)","DOI":"10.1007\/BFb0033845"},{"key":"8_CR11","unstructured":"Czarnecki, K., Kim, P.: Cardinality-Based Feature Modeling and Constraints: A Progress Report. In: Workshop on Software Factories at OOPSLA (2005)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Dechter, R., Frost, D.: Backjump-based backtracking for constraint satisfaction problems. Artif. Intell.\u00a0136(2) (2002)","DOI":"10.1016\/S0004-3702(02)00120-0"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Eames, B.K., Neema, S., Saraswat, R.: DesertFD: a finite-domain constraint based tool for design space exploration. Design Autom. for Emb. Sys.\u00a014(2) (2010)","DOI":"10.1007\/s10617-009-9049-z"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Fonseca, C.M., Fleming, P.J.: An overview of evolutionary algorithms in multiobjective optimization. In: Evolutionary Computation (1995)","DOI":"10.1162\/evco.1995.3.1.1"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Freuder, E.C.: A sufficient condition for backtrack-free search. Journal of the ACM (JACM) (1982)","DOI":"10.1145\/322290.322292"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Glover, F., Taillard, E.D.: A user\u2019s guide to tabu search. In: Annals OR (1993)","DOI":"10.1007\/BF02078647"},{"key":"8_CR17","unstructured":"Hadzic, T., Subbarayan, S., Jensen, R.M., Andersen, H.R., M\u00f8ller, J., Hulgaard, H.: Fast backtrack-free product configuration using a precompiled solution space representation. In: PETO (2004)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Hentenryck, P.V., Saraswat, V.A., Deville, Y.: Design, implementation, and evaluation of the constraint language cc(FD). In: Selected Papers from Constraint Programming: Basics and Trends (1995)","DOI":"10.1007\/3-540-59155-9_15"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Horv\u00e1th, \u00c1., Varr\u00f3, D.: Dynamic constraint satisfaction problems over models. Software and Systems Modeling (2010)","DOI":"10.1007\/s10270-010-0185-5"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Janota, M., Botterweck, G., Grigore, R., Marques-Silva, J.: How to complete an interactive configuration process? In: van Leeuwen, J., Muscholl, A., Peleg, D., Pokorn\u00fd, J., Rumpe, B. (eds.) SOFSEM 2010. LNCS, vol.\u00a05901, pp. 528\u2013539. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-11266-9_44"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Kirkpatrick, S., Gelatt, C.D., Vecchi, M.P.: Optimization by simulated annealing. Science (1983)","DOI":"10.1126\/science.220.4598.671"},{"key":"8_CR22","unstructured":"Linden, F.J., Schmid, K., Rommes, E.: Software Product Lines in Action: The Best Industrial Practice in Product Line Engineering. Springer-Verlag New York, Inc. (2007)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Mazo, R., Salinesi, C., Diaz, D., Lora-Michiels, A.: Transforming attribute and clone-enabled feature models into constraint programs over finite domains. In: ENASE 2011 (2011)","DOI":"10.5220\/0003509301880199"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Montanari, U.: Networks of constraints: Fundamental properties and applications to picture processing. Information Sciences\u00a07, 95\u2013132 (1974)","DOI":"10.1016\/0020-0255(74)90008-5"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Nielsen, J.: Usability Engineering. Morgan Kaufmann Publishers Inc., San Francisco (1993)","DOI":"10.1016\/B978-0-08-052029-2.50009-7"},{"key":"8_CR26","unstructured":"OMG. OMG Object Constraint Language (OMG OCL), Version 2.3.1 (2012)"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Pohl, K., B\u00f6ckle, G., Linden, F.J.: Software Product Line Engineering: Foundations, Principles and Techniques. Springer-Verlag New York, Inc. (2005)","DOI":"10.1007\/3-540-28901-1"},{"key":"8_CR28","unstructured":"Rossi, F., van Beek, P., Walsh, T.: Handbook of Constraint Programming. Elsevier Science Inc., New York (2006)"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Smullyan, R.M.: First-order logic. Springer (1968)","DOI":"10.1007\/978-3-642-86718-7"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"van der Meer, E.R., Wasowski, A., Andersen, H.R.: Efficient interactive configuration of unbounded modular systems. In: SAC (2006)","DOI":"10.1145\/1141277.1141370"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Xiong, Y., Hubaux, A., She, S., Czarnecki, K.: Generating range fixes for software configuration. In: ICSE 2012 (2012)","DOI":"10.1109\/ICSE.2012.6227206"}],"container-title":["Lecture Notes in Computer Science","Fundamentals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24644-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,22]],"date-time":"2022-05-22T05:39:37Z","timestamp":1653197977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24644-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319246437","9783319246444"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24644-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"12 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}