{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:02:55Z","timestamp":1762459375423,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":50,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662496640"},{"type":"electronic","value":"9783662496657"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49665-7_8","type":"book-chapter","created":{"date-parts":[[2016,3,21]],"date-time":"2016-03-21T08:09:42Z","timestamp":1458547782000},"page":"122-140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["RuleMerger: Automatic Construction of Variability-Based Model Transformation Rules"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Str\u00fcber","sequence":"first","affiliation":[]},{"given":"Julia","family":"Rubin","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Arendt","sequence":"additional","affiliation":[]},{"given":"Marsha","family":"Chechik","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Taentzer","sequence":"additional","affiliation":[]},{"given":"Jennifer","family":"Pl\u00f6ger","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"8_CR1","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MS.2003.1231150","volume":"20","author":"S Sendall","year":"2003","unstructured":"Sendall, S., Kozaczynski, W.: Model transformation: the heart and soul of model-driven software development. IEEE Softw. 20(5), 42\u201345 (2003)","journal-title":"IEEE Softw."},{"issue":"3","key":"8_CR2","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1147\/sj.453.0621","volume":"45","author":"K Czarnecki","year":"2006","unstructured":"Czarnecki, K., Helsen, S.: Feature-based survey of model transformation approaches. IBM Syst. J. 45(3), 621\u2013646 (2006)","journal-title":"IBM Syst. J."},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-38883-5_4","volume-title":"Theory and Practice of Model Transformations","author":"F Hermann","year":"2013","unstructured":"Hermann, F., Gottmann, S., Nachtigall, N., Braatz, B., Morelli, G., Pierre, A., Engel, T.: On an automated translation of satellite procedures using triple graph grammars. In: Duddy, K., Kappel, G. (eds.) ICMB 2013. LNCS, vol. 7909, pp. 50\u201351. Springer, Heidelberg (2013)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-38883-5_5","volume-title":"Theory and Practice of Model Transformations","author":"M Mann","year":"2013","unstructured":"Mann, M., Ekker, H., Flamm, C.: The graph grammar library - a generic framework for chemical graph rewrite systems. In: Duddy, K., Kappel, G. (eds.) ICMB 2013. LNCS, vol. 7909, pp. 52\u201353. Springer, Heidelberg (2013)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-21155-8_7","volume-title":"Theory and Practice of Model Transformations","author":"M Famelis","year":"2015","unstructured":"Famelis, M., et al.: Migrating automotive product lines: a case study. In: Kolovos, D., Wimmer, M. (eds.) ICMT 2015. LNCS, vol. 9152, pp. 82\u201397. Springer, Heidelberg (2015)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-21155-8_14","volume-title":"Theory and Practice of Model Transformations","author":"E Richa","year":"2015","unstructured":"Richa, E., Borde, E., Pautet, L.: Translating ATL model transformations to algebraic graph transformations. In: Kolovos, D., Wimmer, M. (eds.) ICMT 2015. LNCS, vol. 9152, pp. 183\u2013198. Springer, Heidelberg (2015)"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/s10270-013-0343-7","volume":"14","author":"A Kusel","year":"2013","unstructured":"Kusel, A., Schonbock, J., Kappel, G., Wimmer, M., Retschitzegger, W., Schwinger, W.: Reuse in model-to-model transformation languages: are we there yet? Softw. Syst. Model. 14, 537\u2013572 (2013)","journal-title":"Softw. Syst. Model."},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/978-3-319-08789-4_8","volume-title":"Theory and Practice of Model Transformations","author":"D Blouin","year":"2014","unstructured":"Blouin, D., Plantec, A., Dissaux, P., Singhoff, F., Diguet, J.-P.: Synchronization of models of rich languages with triple graph grammars: an experience report. In: Di Ruscio, D., Varr\u00f3, D. (eds.) ICMT 2014. LNCS, vol. 8568, pp. 106\u2013121. Springer, Heidelberg (2014)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/978-3-662-46675-9_19","volume-title":"Fundamental Approaches to Software Engineering","author":"D Str\u00fcber","year":"2015","unstructured":"Str\u00fcber, D., Rubin, J., Chechik, M., Taentzer, G.: A variability-based approach to reusable and efficient model transformations. In: Egyed, A., Schaefer, I. (eds.) FASE 2015. LNCS, vol. 9033, pp. 283\u2013298. Springer, Heidelberg (2015)"},{"key":"8_CR10","series-title":"Series in Software Engineering","volume-title":"Software Product Lines: Practices and Patterns","author":"P Clements","year":"2001","unstructured":"Clements, P., Northrop, L.: Software Product Lines: Practices and Patterns. Series in Software Engineering. Addison-Wesley, Boston (2001)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/11561347_28","volume-title":"Generative Programming and Component Engineering","author":"K Czarnecki","year":"2005","unstructured":"Czarnecki, K., Antkiewicz, M.: Mapping features to models: a template approach based on superimposed variants. In: Gl\u00fcck, R., Lowry, M. (eds.) GPCE 2005. LNCS, vol. 3676, pp. 422\u2013437. Springer, Heidelberg (2005)"},{"issue":"7","key":"8_CR12","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy, C.K., Cordy, J.R., Koschke, R.: Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Sci. Comput. Program. 74(7), 470\u2013495 (2009)","journal-title":"Sci. Comput. Program."},{"issue":"3","key":"8_CR13","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TNN.2005.845141","volume":"16","author":"R Xu","year":"2005","unstructured":"Xu, R., Wunsch, D., et al.: Survey of clustering algorithms. IEEE Trans. Neural Netw. 16(3), 645\u2013678 (2005)","journal-title":"IEEE Trans. Neural Netw."},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-28872-2_20","volume-title":"Fundamental Approaches to Software Engineering","author":"J Rubin","year":"2012","unstructured":"Rubin, J., Chechik, M.: Combining related products into product lines. In: de Lara, J., Zisman, A. (eds.) Fundamental Approaches to Software Engineering. LNCS, vol. 7212, pp. 285\u2013300. Springer, Heidelberg (2012)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Ziadi, T., Henard, C., Papadakis, M., Ziane, M., Le Traon, Y.: Towards a language-independent approach for reverse-engineering of software product lines. In: SAC 2014, pp. 1064\u20131071. ACM (2014)","DOI":"10.1145\/2554850.2554874"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Ryssel, U., Ploennigs, J., Kabitzsch, K.: Automatic variation-point identification in function-block-based models. In: GPCE 2010, pp. 23\u201332. ACM (2010)","DOI":"10.1145\/1942788.1868299"},{"key":"8_CR17","doi-asserted-by":"publisher","DOI":"10.1145\/581441.581453","volume-title":"Refactoring: Improving the Design of Existing Code","author":"M Fowler","year":"2002","unstructured":"Fowler, M.: Refactoring: Improving the Design of Existing Code. Pearson Education India, New Delhi (2002)"},{"key":"8_CR18","unstructured":"Tichy, M., Krause, C., Liebel, G.: Detecting performance bad smells for Henshin model transformations. In: AMT 2013, vol. 1077 (2013)"},{"key":"8_CR19","unstructured":"Str\u00fcber, D.: Model-driven engineering in the large: refactoring techniques for models and model transformation systems. Ph.D. thesis, Philipps University Marburg pending publication (2016)"},{"key":"8_CR20","unstructured":"Yan, X., Han, J.: gspan: graph-based substructure pattern mining. In: ICDM 2003, pp. 721\u2013724. IEEE (2002)"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Pham, N.H., Nguyen, H.A., Nguyen, T.T., Al-Kofahi, J.M., Nguyen, T.N.: Complete and accurate clone detection in graph-based models. In: ICSE 2009, pp. 276\u2013286. IEEE (2009)","DOI":"10.1109\/ICSE.2009.5070528"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Deissenboeck, F., Hummel, B., Juergens, E., Pfaehler, M., Schaetz, B.: Model clone detection in practice. In: the 4th International Workshop on Software Clones, pp. 57\u201364. ACM (2010)","DOI":"10.1145\/1808901.1808909"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Varr\u00f3, G., Sch\u00fcrr, A., Varr\u00f3, D.: Benchmarking for graph transformation. In: ISVLHCC 2005, pp. 79\u201388. IEEE (2005)","DOI":"10.1109\/VLHCC.2005.23"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"B\u00fcrdek, J., Kehrer, T., Lochau, M., Reuling, D., Kelter, U., Sch\u00fcrr, A.: Reasoning about product-line evolution using complex feature model differences. Autom. Softw. Eng. 1\u201347 (2015). Springer","DOI":"10.1007\/s10515-015-0185-3"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Rudolf, M.: Utilizing constraint satisfaction techniques for efficient graph pattern matching. In: Workshop on Theory and Application of Graph Transformations, p. 238. Springer Science & Business Media (1998)","DOI":"10.1007\/978-3-540-46464-8_17"},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1007\/978-3-319-11653-2_32","volume-title":"Model-Driven Engineering Languages and Systems","author":"H St\u00f6rrle","year":"2014","unstructured":"St\u00f6rrle, H.: On the impact of layout quality to understanding UML diagrams: size matters. In: Dingel, J., Schulte, W., Ramos, I., Abrah\u00e3o, S., Insfran, E. (eds.) MODELS 2014. LNCS, vol. 8767, pp. 518\u2013534. Springer, Heidelberg (2014)"},{"key":"8_CR27","unstructured":"K\u00e4stner, C.: Virtual separation of concerns. Ph.D. thesis, University of Magdeburg (2010)"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Walkingshaw, E., Ostermann, K.: Projectional editing of variational software. In: GPCE 2014, pp. 29\u201338. ACM (2014)","DOI":"10.1145\/2775053.2658766"},{"issue":"6","key":"8_CR29","first-page":"1355","volume":"38","author":"S Nejati","year":"2012","unstructured":"Nejati, S., Sabetzadeh, M., Chechik, M., Easterbrook, S., Zave, P.: Matching and merging of variant feature specifications. IEEE TSE 38(6), 1355\u20131375 (2012)","journal-title":"IEEE TSE"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-37057-1_7","volume-title":"Fundamental Approaches to Software Engineering","author":"J Rubin","year":"2013","unstructured":"Rubin, J., Chechik, M.: Quality of merge-refactorings for product lines. In: Cortellessa, V., Varr\u00f3, D. (eds.) FASE 2013 (ETAPS 2013). LNCS, vol. 7793, pp. 83\u201398. Springer, Heidelberg (2013)"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Wille, D.: Managing lots of models: the famine approach. In: FSE 2014, pp. 817\u2013819. ACM (2014)","DOI":"10.1145\/2635868.2661681"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Holthusen, S., Wille, D., Legat, C., Beddig, S., Schaefer, I., Vogel-Heuser, B.: Family model mining for function block diagrams in automation software. In: SPLC 2014: Workshops, Demonstrations and Tools Companion, pp. 36\u201343. ACM (2014)","DOI":"10.1145\/2647908.2655965"},{"key":"8_CR33","volume-title":"Algorithms and Theory of Computation Handbook","author":"M Atallah","year":"2002","unstructured":"Atallah, M.: Algorithms and Theory of Computation Handbook. CRC, Boca Raton (2002)"},{"key":"8_CR34","first-page":"191","volume":"152","author":"G Varr\u00f3","year":"2006","unstructured":"Varr\u00f3, G., Friedl, K., Varr\u00f3, D.: Adaptive graph pattern matching for model transformations using model-sensitive search plans. ENTCS 152, 191\u2013205 (2006)","journal-title":"ENTCS"},{"key":"8_CR35","first-page":"58","volume":"6","author":"\u00c1 Horv\u00e1th","year":"2007","unstructured":"Horv\u00e1th, \u00c1., Varr\u00f3, G., Varr\u00f3, D.: Generic search plans for matching advanced graph patterns. Elec. Comm. of the EASST 6, 58 (2007)","journal-title":"Elec. Comm. of the EASST"},{"key":"8_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-54804-8_23","volume-title":"Fundamental Approaches to Software Engineering","author":"C Krause","year":"2014","unstructured":"Krause, C., Tichy, M., Giese, H.: Implementing graph transformations in the bulk synchronous parallel model. In: Gnesi, S., Rensink, A. (eds.) FASE 2014 (ETAPS). LNCS, vol. 8411, pp. 325\u2013339. Springer, Heidelberg (2014)"},{"key":"8_CR37","unstructured":"Acretoaie, V., St\u00f6rrle, H.: Efficient model querying with VMQL. In: CMSEBA 2014, pp. 7\u201316. CEUR-WS.org (2015)"},{"issue":"3\u20134","key":"8_CR38","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s10009-010-0151-0","volume":"12","author":"T M\u00e9sz\u00e1ros","year":"2010","unstructured":"M\u00e9sz\u00e1ros, T., Mezei, G., Levendovszky, T., Asztalos, M.: Manual and automated performance optimization of model transformation systems. Int. J. Softw. Tools Technol. Transfer 12(3\u20134), 231\u2013243 (2010)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"8_CR39","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/978-3-642-38883-5_13","volume-title":"Theory and Practice of Model Transformations","author":"Gergely Varr\u00f3","year":"2013","unstructured":"Varr\u00f3, G., Deckwerth, F.: A rete network construction algorithm for incremental pattern matching. In: ICMT 2013, pp. 125\u2013140 (2013)"},{"issue":"1","key":"8_CR40","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/42201.42203","volume":"13","author":"TK Sellis","year":"1988","unstructured":"Sellis, T.K.: Multiple-query optimization. ACM Trans. Database Syst. (TODS) 13(1), 23\u201352 (1988)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"issue":"1\u20132","key":"8_CR41","doi-asserted-by":"publisher","first-page":"340","DOI":"10.14778\/1920841.1920887","volume":"3","author":"P Zhao","year":"2010","unstructured":"Zhao, P., Han, J.: On graph query optimization in large networks. VLDB Endowment 3(1\u20132), 340\u2013351 (2010)","journal-title":"VLDB Endowment"},{"key":"8_CR42","doi-asserted-by":"crossref","unstructured":"Kapser, C., Godfrey, M.W.: \u201ccloning considered harmful\u201d considered harmful. In: Working Conference on Reverse Engineering, pp. 19\u201328. IEEE (2006)","DOI":"10.1109\/WCRE.2006.1"},{"key":"8_CR43","doi-asserted-by":"crossref","unstructured":"Kim, M., Sazawal, V., Notkin, D., Murphy, G.: An empirical study of code clone genealogies. In: ACM SIGSOFT Software Engineering Notes, vol. 30, pp. 187\u2013196. ACM (2005)","DOI":"10.1145\/1095430.1081737"},{"issue":"5","key":"8_CR44","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1109\/TSE.2011.90","volume":"38","author":"HA Nguyen","year":"2012","unstructured":"Nguyen, H.A., Nguyen, T.T., Pham, N.H., Al-Kofahi, J., Nguyen, T.N.: Clone management for evolving software. IEEE Trans. Softw. Eng. 38(5), 1008\u20131026 (2012)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"8_CR45","doi-asserted-by":"crossref","unstructured":"Syriani, E., Gray, J.: Challenges for addressing quality factors in model transformation. In: ICST 2012, pp. 929\u2013937. IEEE (2012)","DOI":"10.1109\/ICST.2012.198"},{"key":"8_CR46","unstructured":"Rentschler, A.: Model transformation languages with modular information hiding. Ph.D. thesis, Karlsruher Institut f\u00fcr Technologie (2015)"},{"key":"8_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1007\/978-3-319-08789-4_14","volume-title":"Theory and Practice of Model Transformations","author":"J S\u00e1nchez Cuadrado","year":"2014","unstructured":"S\u00e1nchez Cuadrado, J., Guerra, E., de Lara, J.: Reverse engineering of model transformations for reusability. In: Di Ruscio, D., Varr\u00f3, D. (eds.) ICMT 2014. LNCS, vol. 8568, pp. 186\u2013201. Springer, Heidelberg (2014)"},{"key":"8_CR48","unstructured":"Balasubramanian, D., Narayanan, A., van Buskirk, C., Karsai, G.: The graph rewriting and transformation language: GReAT. ECEASST 1 (2007)"},{"key":"8_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/11841883_27","volume-title":"Graph Transformations","author":"R Gei\u00df","year":"2006","unstructured":"Gei\u00df, R., Batz, G.V., Grund, D., Hack, S., Szalkowski, A.: GrGen: a fast SPO-based graph rewriting tool. In: Corradini, A., Ehrig, H., Montanari, U., Ribeiro, L., Rozenberg, G. (eds.) ICGT 2006. LNCS, vol. 4178, pp. 383\u2013397. Springer, Heidelberg (2006)"},{"key":"8_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-319-21155-8_10","volume-title":"Theory and Practice of Model Transformations","author":"V Acretoaie","year":"2015","unstructured":"Acretoaie, V., St\u00f6rrle, H., Str\u00fcber, D.: Transparent model transformation: turning your favourite model editor into a transformation tool. In: Kolovos, D., Wimmer, M. (eds.) ICMT 2015. LNCS, vol. 9152, pp. 121\u2013130. Springer, Heidelberg (2015)"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49665-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T21:29:23Z","timestamp":1748813363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49665-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662496640","9783662496657"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49665-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}