{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:19:48Z","timestamp":1740097188368,"version":"3.37.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319351216"},{"type":"electronic","value":"9783319351223"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-35122-3_15","type":"book-chapter","created":{"date-parts":[[2016,5,9]],"date-time":"2016-05-09T08:40:26Z","timestamp":1462783226000},"page":"215-230","source":"Crossref","is-referenced-by-count":4,"title":["Leveraging Feature Location to Extract the Clone-and-Own Relationships of a Family of Software Products"],"prefix":"10.1007","author":[{"given":"Manuel","family":"Ballarin","sequence":"first","affiliation":[]},{"given":"Ra\u00fal","family":"Lape\u00f1a","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Cetina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,10]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1002\/smr.567","volume":"25","author":"B Dit","year":"2013","unstructured":"Dit, B., Revelle, M., Gethers, M., Poshyvanyk, D.: Feature location in source code: a taxonomy and survey. J. Softw. Evol. Proc. 25, 53\u201395 (2013). doi:\n                      10.1002\/smr.567","journal-title":"J. Softw. Evol. Proc."},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Eaddy, M., Aho, A.V., Antoniol, G., Gu\u00e9h\u00e9neuc, Y.G.: CERBERUS: tracing requirements to source code using information retrieval, dynamic analysis, and program analysis. In: Krikhaar, R.L., L\u00e4mmel, R., Verhoef, C. (eds.) The 16th IEEE International Conference on Program Comprehension, ICPC, Amsterdam, The Netherlands, 10\u201313 June 2008, pp. 53\u201362. IEEE Computer Society (2008)","DOI":"10.1109\/ICPC.2008.39"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Czarnecki, K., Wasowski, A.: Feature diagrams and logics: there and back again. In: Software Product Lines, 11th International Conference, SPLC, Proceedings, Kyoto, Japan, 10\u201314 Sept 2007. IEEE Computer Society (2007)","DOI":"10.1109\/SPLINE.2007.24"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Font, J., Ballar\u00edn, M., Haugen, \u00d8., Cetina, C.: Automating the variability formalization of a model family by means of common variability language. In: Schmidt, D.C. (ed.) Proceedings of the 19th International Conference on Software Product Line, SPLC 2015, Nashville, USA, 20\u201324 July 2015, pp. 411\u2013418. ACM (2015)","DOI":"10.1145\/2791060.2793678"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-28872-2_20","volume-title":"Fundamental Approaches to Software Engineering","author":"J Rubin","year":"2012","unstructured":"Rubin, J., Chechik, M.: Combining related products into product lines. In: de Lara, J., Zisman, A. (eds.) Fundamental Approaches to Software Engineering. LNCS, vol. 7212, pp. 285\u2013300. Springer, Heidelberg (2012)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Martinez, J., Ziadi, T., Bissyand\u00e9, T.F., Klein, J., Traon, Y.L.: Bottom-up adoption of software product lines: a generic and extensible approach. In: Schmidt, D.C. (ed.) Proceedings of the 19th International Conference on Software Product Line, SPLC 2015, Nashville, TN, USA, 20\u201324 July 2015. ACM (2015)","DOI":"10.1145\/2791060.2791086"},{"issue":"5","key":"15_CR7","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MS.2003.1231146","volume":"20","author":"B Selic","year":"2003","unstructured":"Selic, B.: The pragmatics of model-driven development. IEEE Softw. 20(5), 19\u201325 (2003). \n                      http:\/\/dx.doi.org\/10.1109\/MS.2003.1231146","journal-title":"IEEE Softw."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, X., Haugen, \u00d8., M\u00f8ller-Pedersen, B.: Model comparison to synthesize a model-driven software product line. In: de Almeida, E.S., Kishi, T., Schwanninger, C., John, I., Schmid, K. (eds.) Software Product Lines - 15th International Conference, SPLC, Munich, Germany, 22\u201326 Aug 2011, pp. 90\u201399. IEEE (2011)","DOI":"10.1109\/SPLC.2011.24"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Font, J., Arcega, L., Haugen, O., Cetina, C.: Building software product lines from conceptualized model patterns. In: Proceedings of the 19th International Conference on Software Product Line, SPLC 2015. ACM, New York (2015)","DOI":"10.1145\/2791060.2791085"},{"issue":"7","key":"15_CR10","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T Kamiya","year":"2002","unstructured":"Kamiya, T., Kusumoto, S., Inoue, K.: CCFinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Software Eng. 28(7), 654\u2013670 (2002)","journal-title":"IEEE Trans. Software Eng."},{"issue":"3","key":"15_CR11","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TSE.2006.28","volume":"32","author":"Z Li","year":"2006","unstructured":"Li, Z., Lu, S., Myagmar, S., Zhou, Y.: CP-Miner: finding copy-paste and related bugs in large-scale software code. IEEE Trans. Softw. Eng. 32(3), 176\u2013192 (2006)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"K\u00e4stner, C., Giarrusso, P.G., Rendel, T., Erdweg, S., Ostermann, K., Berger, T.: Variability-aware parsing in the presence of lexical macros and conditional compilation. In: Proceedings of the 2011 ACM International Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2011, pp. 805\u2013824. ACM, New York (2011). \n                      http:\/\/dx.doi.org\/10.1145\/2048066.2048128","DOI":"10.1145\/2048066.2048128"},{"key":"15_CR13","unstructured":"K\u00e4stner, C., Giarrusso, P.G., Rendel, T., Erdweg, S., Ostermann, K., Berger, T.: Variability-aware parsing in the presence of lexical macros and conditional compilation. In: Lopes, C.V., Fisher, K. (eds.) Proceedings of the 26th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, 2011. ACM (2011)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"K\u00e4stner, C., Ostermann, K., Erdweg, S.: A variability-aware module system. In: Leavens, G.T., Dwyer, M.B. (eds.) Proceedings of the 27th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, USA, 21\u201325 Oct 2012. ACM (2012)","DOI":"10.1145\/2384616.2384673"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Landauer, T.K., Psotka, J.: Simulating text understanding for educational applications with latent semantic analysis: introduction to LSA. Interact. Learn. Environ. (2000)","DOI":"10.1076\/1049-4820(200008)8:2;1-B;FT073"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Asadi, F., Penta, M.D., Antoniol, G., Gu\u00e9h\u00e9neuc, Y.G.: A heuristic-based approach to identify concepts in execution traces. In: Capilla, R., Ferenc, R., Due\u00f1as, J.C. (eds.) 14th European Conference on Software Maintenance and Reengineering, CSMR, March 2010, Madrid, Spain. IEEE Computer Society (2010)","DOI":"10.1109\/CSMR.2010.17"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"She, S., Lotufo, R., Berger, T., Wasowski, A., Czarnecki, K.: Reverse engineering feature models. In: Taylor, R.N., Gall, H.C., Medvidovic, N. (eds.) Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, Waikiki, Honolulu, HI, USA, 21\u201328 May 2011. ACM (2011)","DOI":"10.1145\/1985793.1985856"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Nadi, S., Berger, T., K\u00e4stner, C., Czarnecki, K.: Mining configuration constraints: static analyses and empirical results. In: Jalote, P., Briand, L.C., van der Hoek, A. (eds.) 36th International Conference on Software Engineering, ICSE 14, Hyderabad, India, 31 May \u2013 07 June 2014, pp. 140\u2013151. ACM (2014)","DOI":"10.1145\/2568225.2568283"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Walkinshaw, N., Roper, M., Wood, M.: Feature location and extraction using landmarks and barriers. In: 23rd IEEE International Conference on Software Maintenance (ICSM 2007), Paris, France, 2\u20135 Oct 2007. IEEE (2007)","DOI":"10.1109\/ICSM.2007.4362618"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Trifu, M.: Improving the dataflow-based concern identification approach. In: Winter, A., Ferenc, R., Knodel, J. (eds.) 13th European Conference on Software Maintenance and Reengineering, CSMR 2009, Architecture-Centric Maintenance of Large-SCale Software Systems, Kaiserslautern, Germany, 24\u201327 Mar 2009. IEEE Computer Society (2009)","DOI":"10.1109\/CSMR.2009.34"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Eisenberg, A.D., Volder, K.D.: Dynamic feature traces: finding features in unfamiliar code. In: 21st IEEE International Conference on Software Maintenance (ICSM), Budapest, Hungary, 25\u201330 Sept 2005, pp. 337\u2013346. IEEE Computer Society (2005)","DOI":"10.1109\/ICSM.2005.42"},{"issue":"6","key":"15_CR22","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/TSE.2007.1016","volume":"33","author":"D Poshyvanyk","year":"2007","unstructured":"Poshyvanyk, D., Gu\u00e9h\u00e9neuc, Y.G., Marcus, A., Antoniol, G., Rajlich, V.: Feature location using probabilistic ranking of methods based on execution scenarios and information retrieval. IEEE Trans. Softw. Eng. 33(6), 420\u2013432 (2007). doi:\n                      10.1109\/TSE.2007.1016","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Haugen, \u00d8., M\u00f8ller-Pedersen, B., Oldevik, J., Olsen, G.K., Svendsen, A.: Adding standardized variability to domain specific languages. In: Software Product Lines, 12th International Conference, SPLC 2008, Proceedings, Limerick, Ireland, 8\u201312 Sept 2008, pp. 139\u2013148. IEEE Computer Society (2008)","DOI":"10.1109\/SPLC.2008.25"},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-15579-6_8","volume-title":"Software Product Lines: Going Beyond","author":"A Svendsen","year":"2010","unstructured":"Svendsen, A., Zhang, X., Lind-Tviberg, R., Fleurey, F., Haugen, \u00d8., M\u00f8ller-Pedersen, B., Olsen, G.K.: Developing a software product line for train control: a case study of CVL. In: Bosch, J., Lee, J. (eds.) SPLC 2010. LNCS, vol. 6287, pp. 106\u2013120. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Software Reuse: Bridging with Social-Awareness"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-35122-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T23:14:26Z","timestamp":1559430866000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-35122-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319351216","9783319351223"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-35122-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}