{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:08:52Z","timestamp":1725728932075},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642383137"},{"type":"electronic","value":"9783642383144"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38314-4_16","type":"book-chapter","created":{"date-parts":[[2013,6,4]],"date-time":"2013-06-04T07:16:30Z","timestamp":1370330190000},"page":"223-237","source":"Crossref","is-referenced-by-count":3,"title":["Feature Usage Diagram for Feature Reduction"],"prefix":"10.1007","author":[{"given":"Sarunas","family":"Marciuska","sequence":"first","affiliation":[]},{"given":"Cigdem","family":"Gencel","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Pekka","family":"Abrahamsson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Highsmith, J.A.: Agile software development ecosystems. Addison-Wesley Professional (2002)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Davis, F.D., Venkatesh, V.: Toward preprototype user acceptance testing of new information systems: implications for software project management. IEEE Transactions on Engineering Management (2004)","DOI":"10.1109\/TEM.2003.822468"},{"key":"16_CR3","unstructured":"Senyard, A., Michlmayr, M.: How to have a successful free software project. In: Proceedings of the 11th Asia-Pacific Software Engineering Conference, pp. 84\u201391 (2004)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Xu, G., Mitchell, N., Arnold, M., Rountev, A., Sevitsky, G.: Software bloat analysis: Finding, removing, and preventing performance problems in modern large-scale object-oriented applications. In: Proceedings of the FSE\/SDP Workshop on Future of Software Engineering Research (2010)","DOI":"10.1145\/1882362.1882448"},{"key":"16_CR5","unstructured":"Ries, E.: The Lean Startup: How Today\u2019s Entrepreneurs Use Continuous Innovation to Create Radically Successful Businesses. Journal of Product Innovation Management (2011)"},{"key":"16_CR6","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-16416-3_16","volume-title":"Lean Enterprise Software and Systems","author":"M. Taipale","year":"2010","unstructured":"Taipale, M.: Huitale \u2013 A Story of a Finnish Lean Startup. In: Abrahamsson, P., Oza, N. (eds.) LESS 2010. LNBIP, vol.\u00a065, pp. 111\u2013114. Springer, Heidelberg (2010)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Atterer, R., Wnuk, M., Schmidt, A.: Knowing the user\u2019s every move: user activity tracking for website usability evaluation and implicit interaction. In: Proceedings of the International Conference on World WideWeb (2006)","DOI":"10.1145\/1135777.1135811"},{"key":"16_CR8","unstructured":"Microsoft Spy++, http:\/\/msdn.microsoft.com\/en-us\/library\/aa264396(v=vs.60).aspx (last visited on the November 27, 2012)"},{"key":"16_CR9","unstructured":"OpenSpan Desktop Analytics, \n                    \n                      http:\/\/www.openspan.com\/products\/desktop_analytics\n                    \n                    \n                   (last visited on the November 27, 2012)"},{"key":"16_CR10","unstructured":"Google Analytics, \n                    \n                      http:\/\/www.google.com\/analytics\n                    \n                    \n                   (last visited on the November 27, 2012)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Dit, B., Revelle, M., Gethers, M., Poshyvanyk, D.: Feature Location in Source Code: A Taxonomy and Survey. Journal of Software Maintenance and Evolution: Research and Practice (2011)","DOI":"10.1002\/smr.567"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Eisenbarth, T., Koschke, R., Simon, D.: Locating Features in Source Code. IEEE Computer (2003)","DOI":"10.1109\/TSE.2003.1183929"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Ebert, C., Dumke, R.: Software Measurement. Springer (2007)","DOI":"10.1007\/978-3-540-71649-5"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Ebert, C., Abrahamsson, P., Oza, N.: Lean Software Development. IEEE Software, 22\u201325 (2012)","DOI":"10.1109\/MS.2012.116"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Eisenberg, A.D., De Volder, K.: Dynamic Feature Traces: Finding Features in Unfamiliar Code. In: Proceedings of 21st IEEE International Conference on Software Maintenance, Budapest, Hungary, pp. 337\u2013346 (2005)","DOI":"10.1109\/ICSM.2005.42"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Bohnet, J., Voigt, S., Dollner, J.: Locating and Understanding Features of Complex Software Systems by Synchronizing Time, Collaboration and Code-Focused Views on Execution Traces. In: Proceedings of 16th IEEE International Conference on Program Comprehension, pp. 268\u2013271 (2008)","DOI":"10.1109\/ICPC.2008.21"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Edwards, D., Wilde, N., Simmons, S., Golden, E.: Instrumenting Time-Sensitive Software for Feature Location. In: Proceedings of International Conference on Program Comprehension, pp. 130\u2013137 (2009)","DOI":"10.1109\/ICPC.2009.5090036"},{"key":"16_CR18","unstructured":"Chen, K., Rajlich, V.: Case Study of Feature Location Using Dependence Graph. In: Proceedings of 8th IEEE International Workshop on Program Comprehension, pp. 241\u2013249 (2000)"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Robillard, M.P., Murphy, G.C.: Concern Graphs: Finding and describing concerns using structural program dependencies. In: Proceedings of International Conference on Software Engineering, pp. 406\u2013416 (2002)","DOI":"10.1145\/581339.581390"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Trifu, M.: Using Dataflow Information for Concern Identification in Object-Oriented Software Systems. In: Proceedings of European Conference on Software Maintenance and Reengineering, pp. 193\u2013202 (2008)","DOI":"10.1109\/CSMR.2008.4493314"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Petrenko, M., Rajlich, V., Vanciu, R.: Partial Domain Comprehension in Software Evolution and Maintenance. In: International Conference on Program Comprehension (2008)","DOI":"10.1109\/ICPC.2008.14"},{"key":"16_CR22","unstructured":"Marcus, A., Sergeyev, A., Rajlich, V., Maletic, J.: An Information Retrieval Approach to Concept Location in Source Code. In: Proceedings of 11th IEEE Working Conference on Reverse Engineering, pp. 214-223 (2004)"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Grant, S., Cordy, J.R., Skillicorn, D.B.: Automated Concept Location Using Independent Component Analysis. In: Proceedings of 15th Working Conference on Reverse Engineering, pp. 138\u2013142 (2008)","DOI":"10.1109\/WCRE.2008.49"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Hill, E., Pollock, L., Vijay-Shanker, K.: Automatically Capturing Source Code Context of NL-Queries for Software Maintenance and Reuse. In: Proceedings of 31st IEEE\/ACM International Conference on Software Engineering (2009)","DOI":"10.1109\/ICSE.2009.5070524"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Poshyvanyk, D., Marcus, A.: Combining formal concept analysis with information retrieval for concept location in source code. In: Program Comprehension, pp. 37\u201348 (2007)","DOI":"10.1109\/ICPC.2007.13"},{"key":"16_CR26","unstructured":"Chen, A., Chou, E., Wong, J., Yao, A.Y., Zhang, Q., Zhang, S., Michail, A.: CVSSearch: searching through source code using CVS comments. In: Proceedings of IEEE International Conference on Software Maintenance, pp. 364\u2013373 (2001)"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Ratanotayanon, S., Choi, H.J., Sim, S.E.: Using Transitive changesets to Support Feature Location. In: Proceedings of 25th IEEE\/ACM International Conference on Automated Software Engineering, pp. 341\u2013344 (2010)","DOI":"10.1145\/1858996.1859066"},{"key":"16_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/11431855_34","volume-title":"Advanced Information Systems Engineering","author":"D. Benavides","year":"2005","unstructured":"Benavides, D., Trinidad, P., Ruiz-Cort\u00e9s, A.: Automated reasoning on feature models. In: Pastor, \u00d3., Falc\u00e3o e Cunha, J. (eds.) CAiSE 2005. LNCS, vol.\u00a03520, pp. 491\u2013503. Springer, Heidelberg (2005)"},{"key":"16_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-540-28630-1_17","volume-title":"Software Product Lines","author":"K. Czarnecki","year":"2004","unstructured":"Czarnecki, K., Helsen, S., Eisenecker, U.: Staged configuration using feature models. In: Nord, R.L. (ed.) SPLC 2004. LNCS, vol.\u00a03154, pp. 266\u2013283. Springer, Heidelberg (2004)"},{"key":"16_CR30","unstructured":"Palmer, S.R., Felsing, M.: A practical guide to feature-driven development. Pearson Education (2001)"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Smith, J.B., Colgate, M.: Customer value creation: a practical framework. The Journal of Marketing Theory and Practice, 7\u201323 (2007)","DOI":"10.2753\/MTP1069-6679150101"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Runeson, P., Host, M.: Guidelines for conducting and reporting case study research in software engineering. In: Empirical Software Engineering, pp. 131\u2013164 (2009)","DOI":"10.1007\/s10664-008-9102-8"}],"container-title":["Lecture Notes in Business Information Processing","Agile Processes in Software Engineering and Extreme Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38314-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:13:36Z","timestamp":1558394016000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38314-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642383137","9783642383144"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38314-4_16","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2013]]}}}