{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T14:10:37Z","timestamp":1738419037310,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":49,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540886426"},{"type":"electronic","value":"9783540886433"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88643-3_2","type":"book-chapter","created":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T03:12:26Z","timestamp":1223349146000},"page":"47-77","source":"Crossref","is-referenced-by-count":1,"title":["Software Reuse beyond Components with XVCL (Tutorial)"],"prefix":"10.1007","author":[{"given":"Stan","family":"Jarzabek","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Basit, A.H., Jarzabek, S.: Detecting Higher-level Similarity Patterns in Programs. In: ESEC-FSE 2005, European Soft. Eng. Conf. and ACM Symp. on the Foundations of Soft. Eng., Lisbon, pp. 156\u2013165 (September 2005)","DOI":"10.1145\/1081706.1081733"},{"key":"2_CR2","unstructured":"Basit, H.A., Rajapakse, D.C., Jarzabek, S.: Beyond Generics: Meta-Level Parameterization For Effective Generic Programming. In: Proc. 17th Int. Conf. on Software Engineering and Knowledge Engineering, SEKE 2005, Taipei (July 2005)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Basit, H.A., Rajapakse, D.C., Jarzabek, S.: Beyond Templates: a Study of Clones in the STL and Some General Implications. In: Proc. Int. Conf. Software Engineering, ICSE 2005, St. Louis, May 2005, pp. 451\u2013459 (2005)","DOI":"10.1145\/1062455.1062537"},{"key":"2_CR4","volume-title":"Framing software reuse - lessons from real world","author":"P. Bassett","year":"1997","unstructured":"Bassett, P.: Framing software reuse - lessons from real world. Yourdon Press, Prentice Hall, Englewood Cliffs (1997)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Batory, D., Singhai, V., Sirkin, M., Thomas, J.: Scalable software libraries. In: ACM SIGSOFT 1993: Symp. on the Foundations of Software Engineering, Los Angeles, California, pp. 191\u2013199 (December 1993)","DOI":"10.1145\/256428.167078"},{"issue":"4","key":"2_CR6","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1145\/136586.136587","volume":"1","author":"D. Batory","year":"1992","unstructured":"Batory, D., O\u2019Malley, S.: The Design and Implementation of Hierarchical Software Systems with Reusable Components. ACM Trans. on Software Engineering and Methodology\u00a01(4), 355\u2013398 (1992)","journal-title":"ACM Trans. on Software Engineering and Methodology"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Batory, D., Sarvela, J.N., Rauschmayer, A.: Scaling Step-Wise Refinement. In: Proc. Int. Conf. on Software Engineering, ICSE 2003, Portland, Oregon, pp. 187\u2013197 (May 2003)","DOI":"10.1109\/ICSE.2003.1201199"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Baxter, I., Yahin, A., Moura, L., Sant\u2019Anna, M., Bier, L.: Clone detection using abstract syntax trees. In: Proc. Int. Conf. on Software Maintenance, pp. 368\u2013377 (1998)","DOI":"10.1109\/ICSM.1998.738528"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Biggerstaff, T.: The library scaling problem and the limits of concrete component reuse. In: 3rd Int. Conf. on Software Reuse, ICSR 1994, pp. 102\u2013109 (1994)","DOI":"10.1109\/ICSR.1994.365806"},{"key":"2_CR10","volume-title":"The Mythical Man-Month","author":"P.B. Brooks","year":"1995","unstructured":"Brooks, P.B.: The Mythical Man-Month. Addison-Wesley, Reading (1995)"},{"key":"2_CR11","unstructured":"Brooks, F.P.: No Silver Bullet, Computer Magazine ( April 1986)"},{"key":"2_CR12","volume-title":"Software Product Lines: Practices and Patterns","author":"P. Clements","year":"2002","unstructured":"Clements, P., Northrop, L.: Software Product Lines: Practices and Patterns. Addison-Wesley, Reading (2002)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Cordy, J.R.: Comprehending Reality: Practical Challenges to Software Maintenance Automation. In: Proc. 11th IEEE Intl. Workshop on Program Comprehension (IWPC 2003), pp. 196\u2013206 (2003)","DOI":"10.1109\/WPC.2003.1199203"},{"key":"2_CR14","volume-title":"Generative Programming: Methods, Tools, and Applications","author":"K. Czarnecki","year":"2000","unstructured":"Czarnecki, K., Eisenecker, U.: Generative Programming: Methods, Tools, and Applications. Addison-Wesley, Reading (2000)"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-540-28630-1_10","volume-title":"Software Product Lines","author":"S. Deelstra","year":"2004","unstructured":"Deelstra, S., Sinnema, M., Bosch, J.: Experiences in Software Product Families: Problems and Issues during Product Derivation. In: Nord, R.L. (ed.) SPLC 2004. LNCS, vol.\u00a03154, pp. 165\u2013182. Springer, Heidelberg (2004)"},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-1-4612-5695-3","volume-title":"On the role of scientific thought, Selected Writings on Computing: A Personal Perspective","author":"E.W. Dijkstra","year":"1982","unstructured":"Dijkstra, E.W.: On the role of scientific thought, Selected Writings on Computing: A Personal Perspective, pp. 60\u201366. Springer, New York (1982)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Ducasse, S., Rieger, M., Demeyer, S.: A language independent approach for detecting duplicated code. In: Int. Conference on Software Maintenance, ICSM 1999, Oxford, UK, pp. 109\u2013118 (September 1999)","DOI":"10.1109\/ICSM.1999.792593"},{"key":"2_CR18","unstructured":"Emrich, M.: Generative Programming Using Frame Technology, Diploma Thesis, University of Applied Sciences Kaiserslautern, Department of Computer Science, and Micro-System Engineering, 29 (July 2003)"},{"key":"2_CR19","volume-title":"Analysis Patterns: Reusable Object Models","author":"M. Fowler","year":"1997","unstructured":"Fowler, M.: Analysis Patterns: Reusable Object Models. Addison-Wesley, Reading (1997)"},{"key":"2_CR20","volume-title":"Refactoring - improving the design of existing code","author":"M. Fowler","year":"1999","unstructured":"Fowler, M.: Refactoring - improving the design of existing code. Addison-Wesley, Reading (1999)"},{"key":"2_CR21","volume-title":"Design Patterns \u2013 Elements of Reusable Object-Oriented Software","author":"E. Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns \u2013 Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading (1995)"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Garcia, R., et al.: A Comparative Study of Language Support for Generic Programming. In: Proc. 18th ACM SIGPLAN Conf. on Object-oriented Programming, Systems, Languages, and Applications, pp. 115\u2013134 (2003)","DOI":"10.1145\/949305.949317"},{"issue":"5","key":"2_CR23","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/TSE.1984.5010277","volume":"SE-10","author":"J.A. Goguen","year":"1984","unstructured":"Goguen, J.A.: Parameterized Programming. IEEE Trans. on Software Engineering\u00a0SE-10(5), 528\u2013543 (1984)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"2_CR24","doi-asserted-by":"publisher","DOI":"10.1201\/9781420013115","volume-title":"Effective Software Maintenance and Evolution: Reused-based Approach","author":"S. Jarzabek","year":"2007","unstructured":"Jarzabek, S.: Effective Software Maintenance and Evolution: Reused-based Approach. CRC Press, Taylor and Francis (2007)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Jarzabek, S.: Genericity - a Missing in Action Key to Software Simplification and Reuse. In: 13th Asia-Pacific Soft. Eng. Conference, APSEC 2006, Bangalore, India, December 6-8, pp. 293\u2013300 (2006)","DOI":"10.1109\/APSEC.2006.37"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Jarzabek, S., Li, S.: Eliminating Redundancies with a Composition with Adaptation Meta-programming Technique. In: Proc. ESEC-FSE 2003, European Soft. Eng. Conf. and ACM Symp. on the Foundations of Soft. Eng., Helsinki, September 2005, pp. 237\u2013246 (2005); extended version: Jarzabek, S., Li, S.: Unifying clones with a generative programming technique: a case study. Journal of Software Maintenance and Evolution: Research and Practice 18(4), 267\u2013292 (2006)","DOI":"10.1145\/949952.940104"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Jensen, P.: Experiences with Product Line Development of Multi-Discipline Analysis Software at Overwatch Textron Systems. In: 11th Int. Software Product Line Conference, SPLC 2007, pp. 35\u201343 (September 2007)","DOI":"10.1109\/SPLINE.2007.25"},{"issue":"7","key":"2_CR28","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSE.2002.1019480","volume":"28","author":"T. Kamiya","year":"2002","unstructured":"Kamiya, T., Kusumoto, S., Inoue, K.: CCFinder: A multi-linguistic token based code clone detection system for large scale source code. IEEE Trans. Software Engineering\u00a028(7), 654\u2013670 (2002)","journal-title":"IEEE Trans. Software Engineering"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Kang, K., et al.: Feature-Oriented Domain Analysis (FODA) Feasibility Study. Technical Report, CMU\/SEI-90-TR-21, Software Engineering Institute, CMU, Pittsburgh (November 1990)","DOI":"10.21236\/ADA235785"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Karhinen, A., Ran, A., Tallgren, T.: Configuring designs for reuse, International Conference on Software Engineering. In: ICSE 1997, Boston, MA, pp. 701\u2013710 (1997)","DOI":"10.1145\/258366.258423"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Kapser, C., Godfrey, M.W.: Cloning Considered Harmful Considered Harmful. In: Proc. 13th Working Conference on Reverse Engineering, pp. 19\u201328 (2006)","DOI":"10.1109\/WCRE.2006.1"},{"key":"2_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume-title":"ECOOP \u201997 - Object-Oriented Programming","author":"G. Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.-M., Irwin, J.: Aspect-Oriented Programming. In: Ak\u015fit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol.\u00a01241, pp. 220\u2013242. Springer, Heidelberg (1997)"},{"key":"2_CR33","first-page":"187","volume-title":"ESEC-FSE 2005, European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering","author":"M. Kim","year":"2005","unstructured":"Kim, M., Sazawai, V., Notkin, D., Murphy, G.: An Ethnographic Study of Code Clone Genealogies. In: ESEC-FSE 2005, European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering, Lisbon, pp. 187\u2013196. ACM Press, New York (2005)"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Mayrand, J., Leblanc, C., Merlo, E.: Experiment on the automatic detection of function clones in a software system using metrics. In: In Proc. Intl. Conference on Software Maintenance (ICSM 1996), pp. 244\u2013254 (1996)","DOI":"10.1109\/ICSM.1996.565012"},{"key":"2_CR35","unstructured":"Northrop, L.: Ultra-Large Scale Systems: The Software Challenge of the Future, Software Engineering Institute (June 2006) ISBN 0-978656-0-7"},{"issue":"12","key":"2_CR36","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1145\/361598.361623","volume":"15","author":"D. Parnas","year":"1972","unstructured":"Parnas, D.: On the Criteria To Be Used in Decomposing Software into Modules. Communications of the ACM\u00a015(12), 1053\u20131058 (1972)","journal-title":"Communications of the ACM"},{"key":"2_CR37","first-page":"326","volume-title":"ESEC-FSE 2005, European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering","author":"U. Pettersson","year":"2005","unstructured":"Pettersson, U., Jarzabek, S.: An Industrial Application of a Reuse Technique to a Web Portal Product Line. In: ESEC-FSE 2005, European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering, Lisbon, [34], pp. 326\u2013335. ACM Press, New York (2005)"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Proofer, C.: Feature-Oriented Programming: A Fresh Look at Objects. In: Proc. Europe. Conf. Object-Oriented Programming (1997)","DOI":"10.1007\/BFb0053389"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Rajapakse, D.C., Jarzabek, S.: Using Server Pages to Unify Clones in Web Applications: A Trade-off Analysis. In: Int. Conf. Software Engineering, ICSE 2007, Minneapolis, USA (May 2007)","DOI":"10.1109\/ICSE.2007.95"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Schmidt, D.: Model-Driven Engineering. IEEE Computer, 25\u201331 (February 2006)","DOI":"10.1109\/MC.2006.58"},{"key":"2_CR41","unstructured":"SGI STL, http:\/\/www.sgi.com\/tech\/stl\/"},{"key":"2_CR42","volume-title":"Software Engineering volume of the Encyclopedia of Electrical and Electronics Engineering","author":"Y. Smaragdakis","year":"2000","unstructured":"Smaragdakis, Y., Batory, D.: Application generators. In: Webster, J. (ed.) Software Engineering volume of the Encyclopedia of Electrical and Electronics Engineering. John Wiley and Sons, Chichester (2000)"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"Tarr, P., Ossher, H., Harrison, W., Sutton, S.: N Degrees of Separation: Multi-Dimensional Separation of Concerns. In: Proc. International Conference on Software Engineering, ICSE 1999, Los Angeles, pp. 107\u2013119 (1999)","DOI":"10.1145\/302405.302457"},{"key":"2_CR44","first-page":"1","volume-title":"Proc. Int. Workshop on Software Configuration Management","author":"W. Tichy","year":"1988","unstructured":"Tichy, W.: Tools for Software Configuration Management. In: Proc. Int. Workshop on Software Configuration Management, pp. 1\u201320. Teubner, Grassau (1988)"},{"key":"2_CR45","unstructured":"XVCL (XML-based Variant Configuration Language) method and tool for managing software changes during evolution and reuse, http:\/\/xvcl.comp.nus.edu.sg"},{"issue":"3","key":"2_CR46","first-page":"255","volume":"53","author":"H. Zhang","year":"2004","unstructured":"Zhang, H., Jarzabek, S.: A Mechanism for Handling Variants in Software Product Lines. special issue on Software Variability Management, Science of Computer Programming\u00a053(3), 255\u2013436 (2004)","journal-title":"special issue on Software Variability Management, Science of Computer Programming"},{"key":"2_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44800-4_4","volume-title":"Generative and Component-Based Software Engineering","author":"H.Y. Zhang","year":"2001","unstructured":"Zhang, H.Y., Jarzabek, S., Soe, M.S.: XVCL Approach to Separating Concerns in Product Family Assets. In: Bosch, J. (ed.) GCSE 2001. LNCS, vol.\u00a02186, pp. 36\u201347. Springer, Heidelberg (2001)"},{"key":"2_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/11554844_7","volume-title":"Software Product Lines","author":"W. Zhang","year":"2005","unstructured":"Zhang, W., Jarzabek, S.: Reuse without Compromising Performance: Experience from RPG Software Product Line for Mobile Devices. In: Obbink, H., Pohl, K. (eds.) SPLC 2005. LNCS, vol.\u00a03714, pp. 57\u201369. Springer, Heidelberg (2005)"},{"key":"2_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/11561347_17","volume-title":"Generative Programming and Component Engineering","author":"J. Yang","year":"2005","unstructured":"Yang, J., Jarzabek, S.: Applying a Generative Technique for Enhanced Reuse on J2EE Platform. In: Gl\u00fcck, R., Lowry, M. (eds.) GPCE 2005. LNCS, vol.\u00a03676, pp. 237\u2013255. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Generative and Transformational Techniques in Software Engineering II"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88643-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T13:28:12Z","timestamp":1738416492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88643-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540886426","9783540886433"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88643-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}