{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T08:01:07Z","timestamp":1774080067835,"version":"3.50.1"},"reference-count":184,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T00:00:00Z","timestamp":1774051200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T00:00:00Z","timestamp":1774051200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2026,12]]},"DOI":"10.1007\/s10515-026-00594-0","type":"journal-article","created":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:28:51Z","timestamp":1774074531000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Community-driven variability: characterizing a new software variability paradigm"],"prefix":"10.1007","volume":"33","author":[{"given":"Roman","family":"B\u00f6gli","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Boll","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Schulthei\u00df","sequence":"additional","affiliation":[]},{"given":"Timo","family":"Kehrer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,21]]},"reference":[{"issue":"3","key":"594_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/3149119","volume":"26","author":"I Abal","year":"2018","unstructured":"Abal, I., Melo, J., St\u0103nciulescu, \u015e, Brabrand, C., Ribeiro, M., Wasowski, A.: Variability Bugs in Highly Configurable Systems: A Qualitative Analysis. Trans. Softw. Eng. Methodol. (TOSEM) 26(3), 10\u201311034 (2018). https:\/\/doi.org\/10.1145\/3149119","journal-title":"Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"594_CR2","doi-asserted-by":"publisher","unstructured":"Abbas, M., Jongeling, R., Lindskog, C., Enoiu, E.P., Saadatmand, M., Sundmark, D.: Product line adoption in industry: an experience report from the railway domain. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 3\u20131311. ACM (2020). https:\/\/doi.org\/10.1145\/3382025.3414953","DOI":"10.1145\/3382025.3414953"},{"key":"594_CR3","unstructured":"About the Python Software Foundation. Python.org. https:\/\/www.python.org\/psf\/about\/ Accessed 18-July-2025"},{"key":"594_CR4","unstructured":"ACINQ\/Eclair. https:\/\/github.com\/ACINQ\/eclair Accessed 15-July-2025"},{"issue":"6","key":"594_CR5","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/S10664-024-10516-X","volume":"29","author":"H Agh","year":"2024","unstructured":"Agh, H., Azamnouri, A., Wagner, S.: Software product line testing: a systematic literature review. Empir. Softw. Eng. (EMSE) 29(6), 146 (2024). https:\/\/doi.org\/10.1007\/S10664-024-10516-X","journal-title":"Empir. Softw. Eng. (EMSE)"},{"key":"594_CR6","doi-asserted-by":"publisher","unstructured":"Ahmed, F., Capretz, L.F., Babar, M.A.: A Model of Open Source Software-Based Product Line Development. In: Proc. on Computer Software and Applications Conf. (COMPSAC), pp. 1215\u20131220. IEEE (2008). https:\/\/doi.org\/10.1109\/COMPSAC.2008.126","DOI":"10.1109\/COMPSAC.2008.126"},{"key":"594_CR7","unstructured":"AISBL, E.F.: Eclipse. Website: https:\/\/www.eclipse.org\/home\/whatis\/. Accessed: 12-July-2025"},{"key":"594_CR8","doi-asserted-by":"publisher","unstructured":"\u00c5kesson, J., Nilsson, S., Kr\u00fcger, J., Berger, T.: Migrating the Android Apo-Games Into an Annotation-Based Software Product Line. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 103\u2013107. ACM (2019). https:\/\/doi.org\/10.1145\/3336294.3342362","DOI":"10.1145\/3336294.3342362"},{"key":"594_CR9","unstructured":"aljazceru\/Awesome-Nostr. https:\/\/github.com\/aljazceru\/awesome-nostr Accessed 14-July-2025"},{"key":"594_CR10","unstructured":"Amichateur: [Awareness\/Proposal] The Multitude of Different \"Derivation Paths\" in BIP32 Bitcoin Wallets Causes Incompatibility All Around When It Comes to Wallet Seed Restore Operation for Non-Tech-Savy Users. r\/Bitcoin. https:\/\/www.reddit.com\/r\/Bitcoin\/comments\/qeu3j7\/awarenessproposal_the_multitude_of_different\/ Accessed 16-Jan-2025"},{"key":"594_CR11","unstructured":"Amick, S.: Understanding Taproot In A Simple Way. https:\/\/bitcoinmagazine.com\/technical\/understanding-taproot-in-a-simple-way Accessed 18-July-2025"},{"issue":"5","key":"594_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/S10664-021-10097-Z","volume":"27","author":"S Ananieva","year":"2022","unstructured":"Ananieva, S., Greiner, S., Kehrer, T., Kr\u00fcger, J., K\u00fchn, T., Linsbauer, L., Gr\u00fcner, S., Koziolek, A., L\u00f6nn, H., Ramesh, S., Reussner, R.H.: A conceptual model for unifying variability in space and time: Rationale, validation, and illustrative applications. Empir. Softw. Eng. (EMSE) 27(5), 101 (2022). https:\/\/doi.org\/10.1007\/S10664-021-10097-Z","journal-title":"Empir. Softw. Eng. (EMSE)"},{"key":"594_CR13","unstructured":"Andersen, E., Vlasenko, D., et al.: BusyBox: The Swiss Army Knife of Embedded Linux. Website: https:\/\/busybox.net\/about.html. Accessed: 12-July-2025"},{"key":"594_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37521-7","author":"S Apel","year":"2013","unstructured":"Apel, S., Batory, D.S., K\u00e4stner, C., Saake, G.: Feature-Oriented Software Product Lines - Concepts and Implementation. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-642-37521-7","journal-title":"Springer"},{"key":"594_CR15","unstructured":"Aporius, D.: Apo-Games. Website: https:\/\/www.apo-games.de\/. Accessed: 12-July-2025"},{"key":"594_CR16","unstructured":"Argentieri, M.: NIP46 Nostr Remote Signing. https:\/\/github.com\/nostr-protocol\/nips\/blob\/master\/46.md Accessed 02-Sept-2025"},{"key":"594_CR17","unstructured":"Basis of Lightning Technology (BOLT). https:\/\/github.com\/lightning\/bolts Accessed 16-Jan-2025"},{"key":"594_CR18","doi-asserted-by":"publisher","unstructured":"Batory, D.S.: Feature Models, Grammars, and Propositional Formulas. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), vol. 3714, pp. 7\u201320. Springer (2005). https:\/\/doi.org\/10.1007\/11554844_3","DOI":"10.1007\/11554844_3"},{"issue":"6","key":"594_CR19","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/TSE.2004.23","volume":"30","author":"DS Batory","year":"2004","unstructured":"Batory, D.S., Sarvela, J.N., Rauschmayer, A.: Scaling step-wise refinement. IEEE Trans. Softw. Eng. (TSE) 30(6), 355\u2013371 (2004). https:\/\/doi.org\/10.1109\/TSE.2004.23","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"key":"594_CR20","unstructured":"Bech32 Adoption. Bitcoin Wiki. https:\/\/en.bitcoin.it\/wiki\/Bech32_adoption"},{"key":"594_CR21","doi-asserted-by":"publisher","unstructured":"Benavides, D., Sundermann, C., Feichtinger, K., Galindo, J.A., Rabiser, R., Th\u00fcm, T.: UVL: Feature modelling with the Universal Variability Language. J. Syst. Softw. (JSS) 225, 112326 (2025). https:\/\/doi.org\/10.1016\/J.JSS.2024.112326","DOI":"10.1016\/J.JSS.2024.112326"},{"key":"594_CR22","doi-asserted-by":"publisher","unstructured":"Benet, J.: IPFS - Content Addressed, Versioned, P2P File System (2014). https:\/\/doi.org\/10.48550\/arXiv.1407.3561","DOI":"10.48550\/arXiv.1407.3561"},{"issue":"5","key":"594_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4230\/DAGREP.9.5.1","volume":"9","author":"T Berger","year":"2019","unstructured":"Berger, T., Chechik, M., Kehrer, T., Wimmer, M.: Software Evolution in Time and Space: Unifying Version and Variability Management (Dagstuhl Seminar 19191). Dagstuhl Reports 9(5), 1\u201330 (2019). https:\/\/doi.org\/10.4230\/DAGREP.9.5.1","journal-title":"Dagstuhl Reports"},{"key":"594_CR24","unstructured":"Bertrand, J.: The Hidden World of Bitcoin Invalid Blocks: Insights And Implications. D-Central. https:\/\/d-central.tech\/the-hidden-world-of-bitcoin-invalid-blocks-insights-and-implications Accessed 16-Jan-2025"},{"key":"594_CR25","unstructured":"Bier, J.: The Blocksize War: The Battle over Who Controls Bitcoin\u2019s Protocol Rules. Independently published (2021)"},{"key":"594_CR26","unstructured":"Bitcoin Improvement Proposals (BIPs). https:\/\/github.com\/bitcoin\/bips Accessed 16-Jan-2025"},{"key":"594_CR27","unstructured":"Bitcoin Lightning Improvement Proposals (bLIPs). https:\/\/github.com\/lightning\/blips Accessed 16-Jan-2025"},{"key":"594_CR28","unstructured":"Bitcoin Optech: Compatibility Matrix. https:\/\/bitcoinops.org\/en\/compatibility Accessed 16-Jan-2025"},{"key":"594_CR29","doi-asserted-by":"publisher","unstructured":"B\u00f6gli, R., Boll, A., Schulthei\u00df, A., Kehrer, T.: Beyond Software Families: Community-Driven Variability. In: Companion Proc. Foundations of Software Engineering (FSE), pp. 571\u2013575. ACM (2025). https:\/\/doi.org\/10.1145\/3696630.3728501","DOI":"10.1145\/3696630.3728501"},{"key":"594_CR30","unstructured":"B\u00f6gli, R.: A Security Focused Outline on Bitcoin Wallets. Eastern Switzerland University of Applied Science (OST) (2023). https:\/\/eprints.ost.ch\/id\/eprint\/1103\/"},{"key":"594_CR31","unstructured":"BOLT9: Assigned Feature Flags. https:\/\/github.com\/lightning\/bolts\/blob\/master\/09-features.md Accessed 16-Jan-2025"},{"key":"594_CR32","doi-asserted-by":"publisher","unstructured":"Bombarda, A., Gargantini, A.: On the Use of Multi-valued Decision Diagrams to Count Valid Configurations of Feature Models. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 96\u2013106. ACM (2024). https:\/\/doi.org\/10.1145\/3646548.3672594","DOI":"10.1145\/3646548.3672594"},{"key":"594_CR33","unstructured":"Breivold, H.P., Crnkovic, I., Eriksson, P.: Evaluating Software Evolvability. Softw. Eng. Res. Pract. Sweden 96 (2007)"},{"issue":"6","key":"594_CR34","doi-asserted-by":"publisher","first-page":"4052","DOI":"10.1109\/TEM.2019.2922103","volume":"69","author":"F Burzlaff","year":"2022","unstructured":"Burzlaff, F., Wilken, N., Bartelt, C., Stuckenschmidt, H.: Semantic Interoperability Methods for Smart Service Systems: A Survey. IEEE Trans. Eng. Manag. 69(6), 4052\u20134066 (2022). https:\/\/doi.org\/10.1109\/TEM.2019.2922103","journal-title":"IEEE Trans. Eng. Manag."},{"key":"594_CR35","unstructured":"Buterin, V., et al.: Ethereum Whitepaper (2014). https:\/\/ethereum.org\/en\/whitepaper Accessed 16-Jan-2025"},{"key":"594_CR36","doi-asserted-by":"publisher","unstructured":"Butler, S., Gamalielsson, J., Lundell, B., Brax, C., Mattsson, A., Gustavsson, T., Feist, J., L\u00f6nroth, E.: Maintaining interoperability in open source software: A case study of the Apache PDFBox project. J. Syst. Softw. (JSS) 159 (2020). https:\/\/doi.org\/10.1016\/J.JSS.2019.110452","DOI":"10.1016\/J.JSS.2019.110452"},{"key":"594_CR37","unstructured":"Castillo, M.: Meet @Fiatjaf, The Mysterious Nostr Creator Who Has Lured 18 Million Users And \\$5 Million From Jack Dorsey. https:\/\/www.forbes.com\/sites\/digital-assets\/2023\/05\/30\/bitcoin-social-network-nostr-creator-fiatjaf-\/ Accessed 16-July-2025"},{"key":"594_CR38","doi-asserted-by":"publisher","unstructured":"Cervantes, H., Charleston-Villalobos, S.: Using a lightweight workflow engine in a plugin-based product line architecture. In: Proc. of the Int\u2019l Symposium on Component-Based Software Engineering (CBSE), vol. 4063, pp. 198\u2013205. Springer (2006). https:\/\/doi.org\/10.1007\/11783565_14","DOI":"10.1007\/11783565_14"},{"key":"594_CR39","doi-asserted-by":"publisher","unstructured":"Chan, W.K., Chin, J., Goh, V.T.: Evolution of bitcoin addresses from security perspectives. In: Proc. Int\u2019l Conf. on Internet Technologies and Secured Transactions (ICITST), pp. 1\u20136. IEEE (2020). https:\/\/doi.org\/10.23919\/ICITST51030.2020.9351346","DOI":"10.23919\/ICITST51030.2020.9351346"},{"key":"594_CR40","unstructured":"Choose Your Wallet. Bitcoin.org. https:\/\/bitcoin.org\/en\/choose-your-wallet Accessed 16-Jan-2025"},{"key":"594_CR41","unstructured":"Chow, A.: BIP373: MuSig2 PSBT Fields. https:\/\/bips.dev\/373\/.\u00a0Accessed 04 Jun 2024"},{"key":"594_CR42","unstructured":"craigraw: Sparrow Bitcoin Wallet. https:\/\/sparrowwallet.com\/features Accessed 16-Jan-2025"},{"key":"594_CR43","unstructured":"Czarnecki, K., Eisenecker, U.W.: Generative Programming: Methods, Tools, and Applications. Addison-Wesley (2000)"},{"key":"594_CR44","unstructured":"Dashjr, L.: BIP2: BIP Process, Revised. https:\/\/bips.dev\/2 Accessed 16-Jan-2025"},{"key":"594_CR45","unstructured":"Dashjr, L.: BIP20: URI Scheme. https:\/\/bips.dev\/20.\u00a0Accessed 16 Jan 2025"},{"key":"594_CR46","doi-asserted-by":"publisher","unstructured":"Debbiche, J., Lignell, O., Kr\u00fcger, J., Berger, T.: Migrating Java-Based Apo-Games into a Composition-Based Software Product Line. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 98\u2013102. ACM (2019). https:\/\/doi.org\/10.1145\/3336294.3342361","DOI":"10.1145\/3336294.3342361"},{"issue":"10","key":"594_CR47","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1145\/355604.361591","volume":"15","author":"EW Dijkstra","year":"1972","unstructured":"Dijkstra, E.W.: The Humble Programmer. Commun. ACM 15(10), 859\u2013866 (1972). https:\/\/doi.org\/10.1145\/355604.361591","journal-title":"Commun. ACM"},{"key":"594_CR48","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The Second-Generation Onion Router. In: Proc. USENIX Security Symposium, pp. 303\u2013320. USENIX (2004)","DOI":"10.21236\/ADA465464"},{"issue":"1","key":"594_CR49","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1002\/SMR.567","volume":"25","author":"B Dit","year":"2013","unstructured":"Dit, B., Revelle, M., Gethers, M., Poshyvanyk, D.: Feature location in source code: a taxonomy and survey. J. Softw. Evol. Process 25(1), 53\u201395 (2013). https:\/\/doi.org\/10.1002\/SMR.567","journal-title":"J. Softw. Evol. Process"},{"issue":"6","key":"594_CR50","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MIC.2022.3209804","volume":"26","author":"TV Doan","year":"2022","unstructured":"Doan, T.V., Psaras, Y., Ott, J., Bajpai, V.: Toward Decentralized Cloud Storage With IPFS: Opportunities, Challenges, and Future Considerations. IEEE Int. Comput. 26(6), 7\u201315 (2022). https:\/\/doi.org\/10.1109\/MIC.2022.3209804","journal-title":"IEEE Int. Comput."},{"key":"594_CR51","unstructured":"Documentation. Home Assistant. https:\/\/www.home-assistant.io\/docs Accessed 16-Jan-2025"},{"key":"594_CR52","doi-asserted-by":"publisher","unstructured":"DuPont, Q.: Experiments in Algorithmic Governance: A History and Ethnography of \u201cThe DAO,\u201d a Failed Decentralized Autonomous Organization. In: Campbell-Verduyn, M. (ed.) Bitcoin and Beyond, pp. 157\u2013177. Routledge (2017). Chap. 8. https:\/\/doi.org\/10.4324\/9781315211909-9","DOI":"10.4324\/9781315211909-9"},{"key":"594_CR53","unstructured":"Eclipse Foundation. Eclipse Foundation. https:\/\/www.eclipse.org\/home\/ Accessed 03-July-2025"},{"key":"594_CR54","doi-asserted-by":"publisher","unstructured":"Eggert, M., G\u00fcnther, K., Maletschek, J., Maxiniuc, A., Mann-Wahrenberg, A.: In three steps to software product lines: a practical example from the automotive industry. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 170\u2013177. Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3546932.3547003","DOI":"10.1145\/3546932.3547003"},{"key":"594_CR55","unstructured":"Electrum Bitcoin Wallet. https:\/\/electrum.org Accessed 16-Jan-2025"},{"key":"594_CR56","unstructured":"Electrum Seed Version System. https:\/\/electrum.readthedocs.io\/en\/latest\/seedphrase.html Accessed 16-Jan-2025"},{"key":"594_CR57","unstructured":"ElementsProject\/lightning. https:\/\/github.com\/ElementsProject\/lightning Accessed 2025-07-15"},{"key":"594_CR58","unstructured":"Erhardt, M.: Re: [Bitcoindev] Time for an Update to BIP2? (2024). https:\/\/mailing-list.bitcoindevs.xyz\/bitcoindev\/82a37738-a17b-4a8c-9651-9e241118a363@murch.one Accessed: 16-Jan-2025"},{"key":"594_CR59","unstructured":"Ethereum Improvement Proposals (EIPs). https:\/\/eips.ethereum.org Accessed 16-Jan-2025"},{"key":"594_CR60","unstructured":"ethereum\/go-ethereum. https:\/\/github.com\/ethereum\/go-ethereum Accessed 16-July-2025"},{"key":"594_CR61","unstructured":"Explore Nostr Apps. https:\/\/nostrapps.com\/ Accessed 14-July-2025"},{"key":"594_CR62","doi-asserted-by":"publisher","unstructured":"Fenske, W., Meinicke, J., Schulze, S., Schulze, S., Saake, G.: Variant-Preserving Refactorings for Migrating Cloned Products to a Product Line. In: Proc. Int\u2019l Conf. on Software Analysis, Evolution and Reengineering (SANER), pp. 316\u2013326. IEEE (2017). https:\/\/doi.org\/10.1109\/SANER.2017.7884632","DOI":"10.1109\/SANER.2017.7884632"},{"key":"594_CR63","doi-asserted-by":"publisher","unstructured":"Franz, P., Berger, T., Fayaz, I., Nadi, S., Groshev, E.: ConfigFix: Interactive Configuration Conflict Resolution for the Linux Kernel. In: Proc. Int\u2019l Conf. on Software Engineering: Software Engineering in Practice (ICSE-SEIP), pp. 91\u2013100. IEEE (2021). https:\/\/doi.org\/10.1109\/ICSE-SEIP52600.2021.00018","DOI":"10.1109\/ICSE-SEIP52600.2021.00018"},{"key":"594_CR64","doi-asserted-by":"publisher","unstructured":"Friesel, B., M\u00fcller, M., Ferraz, M.F., Spinczyk, O.: On the Relation of Variability Modeling Languages and Non-Functional Properties. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 140\u2013144. ACM (2022). https:\/\/doi.org\/10.1145\/3503229.3547055","DOI":"10.1145\/3503229.3547055"},{"key":"594_CR65","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/J.JNCA.2016.08.007","volume":"81","author":"M Ganzha","year":"2017","unstructured":"Ganzha, M., Paprzycki, M., Pawlowski, W., Szmeja, P., Wasielewska, K.: Semantic interoperability in the Internet of Things: An overview from the INTER-IoT perspective. J. Netw. Comput. Appl. 81, 111\u2013124 (2017). https:\/\/doi.org\/10.1016\/J.JNCA.2016.08.007","journal-title":"J. Netw. Comput. Appl."},{"key":"594_CR66","doi-asserted-by":"publisher","unstructured":"Greenwood, P., Bartolomei, T.T., Figueiredo, E., D\u00f3sea, M., Garcia, A.F., Cacho, N., Sant\u2019Anna, C., Soares, S., Borba, P., Kulesza, U., Rashid, A.: On the Impact of Aspectual Decompositions on Design Stability: An Empirical Study. In: Proc. Europ. Conf. on Object-Oriented Programming (ECOOP), vol. 4609, pp. 176\u2013200. Springer (2007). https:\/\/doi.org\/10.1007\/978-3-540-73589-2_9","DOI":"10.1007\/978-3-540-73589-2_9"},{"key":"594_CR67","doi-asserted-by":"publisher","unstructured":"Greiner, S., Schulthei\u00df, A., Bittner, P.M., Th\u00fcm, T., Kehrer, T.: Give an Inch and Take a Mile? Effects of Adding Reliable Knowledge to Heuristic Feature Tracing. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 84\u201395. ACM (2024). https:\/\/doi.org\/10.1145\/3646548.3672593","DOI":"10.1145\/3646548.3672593"},{"key":"594_CR68","doi-asserted-by":"publisher","unstructured":"Gyrard, A., Datta, S.K., Bonnet, C.: A Survey and Analysis of Ontology-Based Software Tools for Semantic Interoperability in IoT and WoT Landscapes. In: Proc. World Forum on Internet of Things (WF-IoT), pp. 86\u201391. IEEE (2018). https:\/\/doi.org\/10.1109\/WF-IOT.2018.8355091","DOI":"10.1109\/WF-IOT.2018.8355091"},{"key":"594_CR69","doi-asserted-by":"publisher","unstructured":"Habli, I., Kelly, T., Hopkins, I.: Challenges of Establishing a Software Product Line for an Aerospace Engine Monitoring System. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 193\u2013202 (2007). https:\/\/doi.org\/10.1109\/SPLINE.2007.37","DOI":"10.1109\/SPLINE.2007.37"},{"key":"594_CR70","doi-asserted-by":"publisher","unstructured":"Heider, W., Rabiser, R., Gr\u00fcnbacher, P.: Facilitating the evolution of products in product line engineering by capturing and replaying configuration decisions. Int\u2019l J. Softw. Tools Technol. Trans. (STTT) 14(5), 613\u2013630 (2012). https:\/\/doi.org\/10.1007\/S10009-012-0229-Y","DOI":"10.1007\/S10009-012-0229-Y"},{"key":"594_CR71","unstructured":"Home Assistant Community Store (HACS). https:\/\/hacs.xyz\/ Accessed 17-July-2025"},{"key":"594_CR72","unstructured":"InterPlanetary Improvement Proposals (IPIPs). https:\/\/specs.ipfs.tech\/ipips Accessed 2025-01-16"},{"key":"594_CR73","unstructured":"ipfs\/awesome-ipfs: Community List of Awesome Projects, Apps, Tools, Pinning Services and More Related To IPFS. https:\/\/github.com\/ipfs\/awesome-ipfs\/tree\/main Accessed 17-July-2025"},{"key":"594_CR74","unstructured":"ipfs\/Helia. IPFS Project. https:\/\/github.com\/ipfs\/helia Accessed 17-July-2025"},{"key":"594_CR75","unstructured":"ipfs\/Kubo. IPFS Project. https:\/\/github.com\/ipfs\/kubo Accessed 17-July-2025"},{"key":"594_CR76","unstructured":"ISO\/IEC 7498-1:1994, Information Technology - Open Systems Interconnection - Basic Reference Model: The Basic Model. https:\/\/www.iso.org\/standard\/20269.html"},{"issue":"4","key":"594_CR77","doi-asserted-by":"publisher","first-page":"579","DOI":"10.3390\/SYM12040579","volume":"12","author":"G Kambourakis","year":"2020","unstructured":"Kambourakis, G., Kolias, C., Geneiatakis, D., Karopoulos, G., Makrakis, G.M., Kounelis, I.: A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks. Symmetry 12(4), 579 (2020). https:\/\/doi.org\/10.3390\/SYM12040579","journal-title":"Symmetry"},{"key":"594_CR78","doi-asserted-by":"publisher","unstructured":"Kang, K.C., Cohen, S.G., Hess, J.A., Novak, W.E., Peterson, A.S.: Feature-Oriented Domain Analysis (FODA) Feasibility Study. Technical report (1990). https:\/\/doi.org\/10.21236\/ADA235785","DOI":"10.21236\/ADA235785"},{"issue":"1","key":"594_CR79","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2013.45","volume":"40","author":"C K\u00e4stner","year":"2014","unstructured":"K\u00e4stner, C., Dreiling, A., Ostermann, K.: Variability Mining: Consistent Semi-automatic Detection of Product-Line Features. IEEE Trans. Softw. Eng. (TSE) 40(1), 67\u201382 (2014). https:\/\/doi.org\/10.1109\/TSE.2013.45","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"key":"594_CR80","unstructured":"Kconfig Language. The Linux Kernel documentation. https:\/\/www.kernel.org\/doc\/html\/next\/kbuild\/kconfig-language.html Accessed 21-July-2025"},{"key":"594_CR81","doi-asserted-by":"publisher","unstructured":"Kehrer, T., Th\u00fcm, T., Schulthei\u00df, A., Bittner, P.M.: Bridging the Gap Between Clone-and-Own and Software Product Lines. In: Proc. Int\u2019l Conf. on Software Engineering: New Ideas and Emerging Results (ICSE-NIER), pp. 21\u201325. IEEE (2021). https:\/\/doi.org\/10.1109\/ICSE-NIER52604.2021.00013","DOI":"10.1109\/ICSE-NIER52604.2021.00013"},{"key":"594_CR82","doi-asserted-by":"publisher","unstructured":"Kim, T., Lee, J., Kang, S.: Cloned Code Clustering for the Software Product Line Engineering Approach to Developing a Family of Products. In: Proc. on Computer Software and Applications Conf. (COMPSAC), pp. 1350\u20131355. IEEE (2024). https:\/\/doi.org\/10.1109\/COMPSAC61105.2024.00178","DOI":"10.1109\/COMPSAC61105.2024.00178"},{"key":"594_CR83","unstructured":"Klatt, B., K\u00fcster, M., Krogmann, K.: A Graph-Based Analysis Concept to Derive a Variation Point Design From Product Copies. In: Proc. Int\u2019l Workshop on Reverse Variability Engineering (REVE), pp. 1\u20138 (2013)"},{"key":"594_CR84","unstructured":"Know Your Wallet Like You Built It. WalletScrutiny. https:\/\/walletscrutiny.com Accessed 16-Jan-2025"},{"key":"594_CR85","doi-asserted-by":"publisher","unstructured":"Krueger, C.W.: Easing the Transition to Software Mass Customization. In: Linden, F. (ed.) Proc. Int\u2019l Workshop on Software Product-Family Engineering (PFE), vol. 2290, pp. 282\u2013293. Springer (2001). https:\/\/doi.org\/10.1007\/3-540-47833-7_25","DOI":"10.1007\/3-540-47833-7_25"},{"key":"594_CR86","doi-asserted-by":"publisher","unstructured":"Kr\u00fcger, J., Berger, T.: An Empirical Analysis of the Costs of Clone- and Platform-Oriented Software Reuse. In: Proc. Europ. Software Engineering Conf.\/Foundations of Software Engineering (ESEC\/FSE), pp. 432\u2013444. ACM (2020). https:\/\/doi.org\/10.1145\/3368089.3409684","DOI":"10.1145\/3368089.3409684"},{"key":"594_CR87","doi-asserted-by":"publisher","unstructured":"Kr\u00fcger, J., Fenske, W., Th\u00fcm, T., Aporius, D., Saake, G., Leich, T.: Apo-Games: A Case Study for Reverse Engineering Variability From Cloned Java Variants. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 251\u2013256. ACM (2018). https:\/\/doi.org\/10.1145\/3233027.3236403","DOI":"10.1145\/3233027.3236403"},{"key":"594_CR88","doi-asserted-by":"publisher","unstructured":"Kr\u00fcger, J., Gu, W., Shen, H., Mukelabai, M., Hebig, R., Berger, T.: Towards a Better Understanding of Software Features and Their Characteristics: A Case Study of Marlin. In: Proc. Int\u2019l Workshop on Variability Modelling of Software-Intensive Systems (VaMoS), pp. 105\u2013112. ACM (2018). https:\/\/doi.org\/10.1145\/3168365.3168371","DOI":"10.1145\/3168365.3168371"},{"key":"594_CR89","doi-asserted-by":"publisher","unstructured":"Kr\u00fcger, J., Mukelabai, M., Gu, W., Shen, H., Hebig, R., Berger, T.: Where Is My Feature and What Is It About? A Case Study on Recovering Feature Facets. J. Systems and Software (JSS) 152, 239\u2013253 (2019). https:\/\/doi.org\/10.1016\/J.JSS.2019.01.057","DOI":"10.1016\/J.JSS.2019.01.057"},{"key":"594_CR90","doi-asserted-by":"publisher","DOI":"10.1145\/3729423","author":"E Kuiter","year":"2025","unstructured":"Kuiter, E., Sundermann, C., Th\u00fcm, T., Hess, T., Krieter, S., Saake, G.: How Configurable is the Linux Kernel? Analyzing Two Decades of Feature-Model History. Trans. Softw. Eng. Methodol. (TOSEM) (2025). https:\/\/doi.org\/10.1145\/3729423","journal-title":"Trans. Softw. Eng. Methodol. (TOSEM)"},{"issue":"3","key":"594_CR91","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1016\/J.AEI.2012.04.007","volume":"26","author":"P Laar","year":"2012","unstructured":"Laar, P., Hendriks, T.: A retrospective analysis of teletext: An interoperability standard evolving already over 30 years. Adv. Eng. Inform. 26(3), 516\u2013528 (2012). https:\/\/doi.org\/10.1016\/J.AEI.2012.04.007","journal-title":"Adv. Eng. Inform."},{"key":"594_CR92","unstructured":"Lahteine, S., et al.: Marlin Firmware. Website: https:\/\/marlinfw.org\/docs\/basics\/introduction.html. Accessed: 12-July-2025"},{"key":"594_CR93","doi-asserted-by":"publisher","unstructured":"Lee, E., Seo, Y., Oh, S., Kim, Y.: A Survey on Standards for Interoperability and Security in the Internet of Things 23(2), 1020\u20131047 (2021). https:\/\/doi.org\/10.1109\/COMST.2021.3067354","DOI":"10.1109\/COMST.2021.3067354"},{"key":"594_CR94","doi-asserted-by":"publisher","unstructured":"Lehman, M.M.: Laws of Software Evolution Revisited. In: Proc. European Workshop on Software Process Technology (EWSPT), vol. 1149, pp. 108\u2013124. Springer (1996). https:\/\/doi.org\/10.1007\/BFB0017737","DOI":"10.1007\/BFB0017737"},{"key":"594_CR95","doi-asserted-by":"publisher","unstructured":"Lewis, G.A.: Role of Standards in Cloud-Computing Interoperability. In: HICSS, pp. 1652\u20131661. IEEE (2013). https:\/\/doi.org\/10.1109\/HICSS.2013.470","DOI":"10.1109\/HICSS.2013.470"},{"key":"594_CR96","unstructured":"lightningnetwork\/lnd. https:\/\/github.com\/lightningnetwork\/lnd Accessed 15-July-2025"},{"key":"594_CR97","doi-asserted-by":"publisher","unstructured":"Lima, C., Machado, I., Galster, M., Flach G.\u00a0Chavez, C.: Recovering Architectural Variability from Source Code. In: Proc. Brazilian Symposium on Software Engineering (SBES), pp. 808\u2013817. ACM (2020). https:\/\/doi.org\/10.1145\/3422392.3422399","DOI":"10.1145\/3422392.3422399"},{"key":"594_CR98","doi-asserted-by":"publisher","unstructured":"Linsbauer, L., Berger, T., Gr\u00fcnbacher, P.: A Classification of Variation Control Systems. In: Proc. Int\u2019l Conf. on Generative Programming: Concepts & Experiences (GPCE), pp. 49\u201362. ACM (2017).https:\/\/doi.org\/10.1145\/3136040.3136054","DOI":"10.1145\/3136040.3136054"},{"key":"594_CR99","doi-asserted-by":"publisher","unstructured":"Linsbauer, L., Schw\u00e4gerl, F., Berger, T., Gr\u00fcnbacher, P.: Concepts of variation control systems. J. Syst. Softw. (JSS) 171, 110796 (2021). https:\/\/doi.org\/10.1016\/J.JSS.2020.110796","DOI":"10.1016\/J.JSS.2020.110796"},{"issue":"4","key":"594_CR100","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1007\/S10270-015-0512-Y","volume":"16","author":"L Linsbauer","year":"2017","unstructured":"Linsbauer, L., Lopez-Herrejon, R.E., Egyed, A.: Variability Extraction and Modeling for Product Variants. Softw. Syst. Model. (SoSyM) 16(4), 1179\u20131199 (2017). https:\/\/doi.org\/10.1007\/S10270-015-0512-Y","journal-title":"Softw. Syst. Model. (SoSyM)"},{"key":"594_CR101","unstructured":"lnurl\/luds. https:\/\/github.com\/lnurl\/luds Accessed 17-July-2025"},{"key":"594_CR102","unstructured":"Lopp, J.: Bitcoin Technical Resources. https:\/\/www.lopp.net\/bitcoin-information\/technical-resources.html"},{"issue":"1","key":"594_CR103","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S10664-020-09901-Z","volume":"26","author":"R Mahdavi-Hezaveh","year":"2021","unstructured":"Mahdavi-Hezaveh, R., Dremann, J., Williams, L.A.: Software development with feature toggles: practices used by practitioners. Empir. Softw. Eng. (EMSE) 26(1), 1 (2021). https:\/\/doi.org\/10.1007\/S10664-020-09901-Z","journal-title":"Empir. Softw. Eng. (EMSE)"},{"key":"594_CR104","doi-asserted-by":"publisher","unstructured":"Marchezan, L., Assun\u00e7\u00e3o, W.K.G., Michelon, G.K., Herac, E., Egyed, A.: Code Smell Analysis in Cloned Java Variants: The Apo-Games Case Study. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 250\u2013254. ACM (2022). https:\/\/doi.org\/10.1145\/3546932.3547015","DOI":"10.1145\/3546932.3547015"},{"key":"594_CR105","unstructured":"marshalleq: Thinking of Dropping Home Assistant Due to Poor Integration Connectivity and Consistency. Home Assistant Community. https:\/\/community.home-assistant.io\/t\/thinking-of-dropping-home-assistant-due-to-poor-integration-connectivity-and-consistency\/779978 Accessed 17-July-2025"},{"key":"594_CR106","doi-asserted-by":"publisher","unstructured":"Martinez, J., Ziadi, T., Bissyand\u00e9, T.F., Klein, J., Traon, Y.L.: Bottom-up adoption of software product lines: a generic and extensible approach. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 101\u2013110. ACM (2015). https:\/\/doi.org\/10.1145\/2791060.2791086","DOI":"10.1145\/2791060.2791086"},{"key":"594_CR107","doi-asserted-by":"publisher","unstructured":"Martino, B.D., Rak, M., Ficco, M., Esposito, A., Maisto, S.A., Nacchia, S.: Internet of things reference architectures, security and interoperability: A survey. Int Things 1-2, 99\u2013112 (2018). https:\/\/doi.org\/10.1016\/J.IOT.2018.08.008","DOI":"10.1016\/J.IOT.2018.08.008"},{"key":"594_CR108","unstructured":"Mathewson, N.: 264-Subprotocol-Versions - Tor Design Proposals (2016). https:\/\/spec.torproject.org\/proposals\/264-subprotocol-versions.html Accessed 17-July-2025"},{"key":"594_CR109","unstructured":"Mathewson, N.: 346-Protovers-Again - Tor Design Proposals (2023). https:\/\/spec.torproject.org\/proposals\/346-protovers-again.html Accessed 17-July-2025"},{"key":"594_CR110","unstructured":"MetaMask\/metamask-extension. https:\/\/github.com\/MetaMask\/metamask-extension Accessed 16-July-2025"},{"key":"594_CR111","unstructured":"MicroPython Differences from CPython. MicroPython Documentation. https:\/\/docs.micropython.org\/en\/latest\/genrst\/index.html Accessed 18-July-2025"},{"key":"594_CR112","unstructured":"Micropython\/Micropython. MicroPython. https:\/\/github.com\/micropython\/micropython Accessed 18-July-2025"},{"key":"594_CR113","unstructured":"Miller, P., Staab, J.: NIP44 Encrypted Payloads (Versioned). https:\/\/github.com\/nostr-protocol\/nips\/blob\/master\/44.md Accessed 02-Sept-2025"},{"key":"594_CR114","doi-asserted-by":"publisher","unstructured":"Mistr\u00edk, I., Galster, M., Maxim, B.R. (eds.): Software Engineering for Variability Intensive Systems - Foundations and Applications. Auerbach Publications \/ Taylor & Francis (2019). https:\/\/doi.org\/10.1201\/9780429022067","DOI":"10.1201\/9780429022067"},{"key":"594_CR115","doi-asserted-by":"publisher","unstructured":"Mortara, J., Collet, P.: Capturing the Diversity of Analyses on the Linux Kernel Variability. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 160\u2013171. ACM (2021). https:\/\/doi.org\/10.1145\/3461001.3471151","DOI":"10.1145\/3461001.3471151"},{"key":"594_CR116","doi-asserted-by":"publisher","unstructured":"Myll\u00e4rniemi, V., Savolainen, J., M\u00e4nnist\u00f6, T.: Performance variability in software product lines: a case study in the telecommunication domain. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 32\u201341. ACM (2013). https:\/\/doi.org\/10.1145\/2491627.2491631","DOI":"10.1145\/2491627.2491631"},{"key":"594_CR117","unstructured":"Nabu Casa: About Us. Nabu Casa. https:\/\/www.nabucasa.com\/about\/ Accessed 17-July-2025"},{"key":"594_CR118","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"issue":"2","key":"594_CR119","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/J.ARCONTROL.2012.09.014","volume":"36","author":"O Noran","year":"2012","unstructured":"Noran, O.: Achieving a sustainable interoperability of standards. Ann. Rev. Control 36(2), 327\u2013337 (2012). https:\/\/doi.org\/10.1016\/J.ARCONTROL.2012.09.014","journal-title":"Ann. Rev. Control"},{"key":"594_CR120","unstructured":"Nostr Implementation Possibilities (NIPs). https:\/\/github.com\/nostr-protocol\/nips Accessed 16-Jan-2025"},{"key":"594_CR121","unstructured":"nostr-protocol\/nostr. nostr-protocol. https:\/\/github.com\/nostr-protocol\/nostr Accessed 16-Dec-2024"},{"key":"594_CR122","doi-asserted-by":"publisher","unstructured":"Noura, M., Atiquzzaman, M., Gaedke, M.: Interoperability in internet of things: Taxonomies and open challenges 24(3), 796\u2013809 (2019). https:\/\/doi.org\/10.1007\/S11036-018-1089-9","DOI":"10.1007\/S11036-018-1089-9"},{"key":"594_CR123","unstructured":"Palatinus, M., Rusnak, P., Aaron, V., Bowe, S.: BIP39: Mnemonic Code for Generating Deterministic Keys. https:\/\/bips.dev\/39 Accessed 16-Jan-2025"},{"key":"594_CR124","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSE.1976.233797","volume":"1","author":"DL Parnas","year":"1976","unstructured":"Parnas, D.L.: On the design and development of program families. IEEE Trans. Softw. Eng. (TSE) 1, 1\u20139 (1976)","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"key":"594_CR125","unstructured":"PEP 13 \u2013 Python Language Governance. Python Enhancement Proposals (PEPs). https:\/\/peps.python.org\/pep-0013\/ Accessed 18-July-2025"},{"key":"594_CR126","unstructured":"Perry, M.: 291-Two-Guard-Nodes (2018). https:\/\/spec.torproject.org\/proposals\/291-two-guard-nodes.html Accessed 17-July-2025"},{"key":"594_CR127","unstructured":"Perry, M.: 324-Rtt-Congestion-Control (2020). https:\/\/spec.torproject.org\/proposals\/324-rtt-congestion-control.html Accessed 17-July-2025"},{"key":"594_CR128","doi-asserted-by":"publisher","unstructured":"Pett, T., Krieter, S., Runge, T., Th\u00fcm, T., Lochau, M., Schaefer, I.: Stability of Product-Line Sampling in Continuous Integration. In: Proc. Int\u2019l Working Conf. on Variability Modelling of Software-Intensive Systems (VaMoS). ACM (2021). https:\/\/doi.org\/10.1145\/3442391.3442410","DOI":"10.1145\/3442391.3442410"},{"key":"594_CR129","doi-asserted-by":"publisher","unstructured":"Pett, T., Krieter, S., Th\u00fcm, T., Schaefer, I.: MulTi-Wise Sampling: Trading Uniform T-Wise Feature Interaction Coverage for Smaller Samples. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 47\u201353. ACM (2024). https:\/\/doi.org\/10.1145\/3646548.3672589","DOI":"10.1145\/3646548.3672589"},{"issue":"10","key":"594_CR130","doi-asserted-by":"publisher","first-page":"2261","DOI":"10.1016\/J.JSS.2011.08.008","volume":"85","author":"A Pleuss","year":"2012","unstructured":"Pleuss, A., Botterweck, G., Dhungana, D., Polzer, A., Kowalewski, S.: Model-driven support for product line evolution on feature level. J. Syst. Softw. (JSS) 85(10), 2261\u20132274 (2012). https:\/\/doi.org\/10.1016\/J.JSS.2011.08.008","journal-title":"J. Syst. Softw. (JSS)"},{"key":"594_CR131","doi-asserted-by":"publisher","unstructured":"Pnueli, A.: The Temporal Logic of Programs. In: Proc. Symposium on Foundations of Computer Science (SFCS), pp. 46\u201357. IEEE (1977). https:\/\/doi.org\/10.1109\/SFCS.1977.32","DOI":"10.1109\/SFCS.1977.32"},{"key":"594_CR132","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28901-1","author":"K Pohl","year":"2005","unstructured":"Pohl, K., B\u00f6ckle, G., Linden, F.J.: Software Product Line Engineering: Foundations. Princ. Techn. Springer (2005). https:\/\/doi.org\/10.1007\/3-540-28901-1","journal-title":"Princ. Techn. Springer"},{"key":"594_CR133","unstructured":"Poon, J., Dryja, T.: The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments (2016). https:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"594_CR134","unstructured":"ProjectOpenSea\/Seaport. https:\/\/github.com\/ProjectOpenSea\/seaport Accessed 16-July-2025"},{"key":"594_CR135","unstructured":"Protocol Labs. https:\/\/protocol.ai\/ Accessed 17-July-2025"},{"key":"594_CR136","unstructured":"Python Enhancement Proposals (PEPs). https:\/\/peps.python.org Accessed 16-Jan-2025"},{"key":"594_CR137","unstructured":"Python Package Index (PyPI). https:\/\/pypi.org\/ Accessed 18-July-2025"},{"key":"594_CR138","unstructured":"Python. https:\/\/python.org Accessed 16-Jan-2025"},{"key":"594_CR139","unstructured":"Questions Tagged [bip32-hd-wallets]. Bitcoin Stack Exchange. https:\/\/bitcoin.stackexchange.com\/questions\/tagged\/bip32-hd-wallets Accessed 16-Jan-2025"},{"issue":"6","key":"594_CR140","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/S10845-006-0037-X","volume":"17","author":"SR Ray","year":"2006","unstructured":"Ray, S.R., Jones, A.T.: Manufacturing interoperability. J. Intell. Manuf. 17(6), 681\u2013688 (2006). https:\/\/doi.org\/10.1007\/S10845-006-0037-X","journal-title":"J. Intell. Manuf."},{"key":"594_CR141","doi-asserted-by":"publisher","unstructured":"Rosu, C., Togan, M.: A Modern Paradigm for Effective Software Development: Feature Toggle Systems. In: Int\u2019l Conf. on Electronics, Computers and Artificial Intelligence (ECAI), pp. 1\u20136. IEEE (2023). https:\/\/doi.org\/10.1109\/ECAI58194.2023.10193936","DOI":"10.1109\/ECAI58194.2023.10193936"},{"key":"594_CR142","doi-asserted-by":"publisher","unstructured":"Rowe, D., Leaney, J., Lowe, D.: Defining Systems Evolvability - A Taxonomy of Change. In: Proc. Int\u2019l Conf. on Engineering of Computer-Based Systems (ECBS), pp. 45\u201352. IEEE (1998). https:\/\/doi.org\/10.1109\/ECBS.1998.10027","DOI":"10.1109\/ECBS.1998.10027"},{"key":"594_CR143","doi-asserted-by":"publisher","unstructured":"Rubin, J., Czarnecki, K., Chechik, M.: Managing Cloned Variants: A Framework and Experience. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 101\u2013110. ACM (2013). https:\/\/doi.org\/10.1145\/2491627.2491644","DOI":"10.1145\/2491627.2491644"},{"key":"594_CR144","unstructured":"RustPython\/RustPython. RustPython. https:\/\/github.com\/RustPython\/RustPython Accessed 18-July-2025"},{"key":"594_CR145","unstructured":"sandwichfarm\/nostr-watch: A NIP-66 Nostr Client for Browsing Nostr Relays. https:\/\/github.com\/sandwichfarm\/nostr-watch Accessed 14-July-2025"},{"key":"594_CR146","doi-asserted-by":"publisher","unstructured":"Santos, I.S., Rocha, L.S., A.\u00a0Santos\u00a0Neto, P., Andrade, R.M.C.: Model Verification of Dynamic Software Product Lines. In: Proc. Brazilian Symposium on Software Engineering (SBES), pp. 113\u2013122. ACM (2016). https:\/\/doi.org\/10.1145\/2973839.2973852","DOI":"10.1145\/2973839.2973852"},{"key":"594_CR147","doi-asserted-by":"publisher","unstructured":"Sartipi, K., Yarmand, M.H.: Standard-based Data and Service Interoperability in eHealth Systems. In: Proc. Int\u2019l Conf. on Software Maintenance (ICSM), pp. 187\u2013196. IEEE (2008). https:\/\/doi.org\/10.1109\/ICSM.2008.4658067","DOI":"10.1109\/ICSM.2008.4658067"},{"key":"594_CR148","unstructured":"SatoshiLabs: SatoshiLabs Improvement Proposals (SLIPs). https:\/\/github.com\/satoshilabs\/slips Accessed 16-Jan-2025"},{"key":"594_CR149","unstructured":"scgbckbone: Commit 829afcc \u201cchange BIP39 Status to Final\u201d. bitcoin\/bips on GitHub. https:\/\/github.com\/bitcoin\/bips\/commit\/829afccd1ae26403f8c3583d7347b04aeb54c2ca Accessed 19-July-2025"},{"key":"594_CR150","unstructured":"Schmorleiz, T., L\u00e4mmel, R.: Similarity Management via History Annotation. In: Proc. Seminar on Advanced Techniques and Tools for Software Evolution (SATToSE), pp. 45\u201348. Dipartimento di Informatica Universit\u00e0 degli Studi dell\u2019Aquila (2014)"},{"key":"594_CR151","doi-asserted-by":"publisher","unstructured":"Schulthei\u00df, A., Bittner, P.M., Boll, A., Grunske, L., Th\u00fcm, T., Kehrer, T.: RaQuN: A Generic and Scalable N-Way Model Matching Algorithm. Software and System Modeling (SoSyM) 22, 1495\u20131517 (2023) https:\/\/doi.org\/10.1007\/S10270-022-01062-5","DOI":"10.1007\/S10270-022-01062-5"},{"key":"594_CR152","doi-asserted-by":"publisher","unstructured":"Schulthei\u00df, A., Bittner, P.M., Th\u00fcm, T., Kehrer, T.: Quantifying the Potential to Automate the Synchronization of Variants in Clone-and-Own. In: Proc. Int\u2019l Conf. on Software Maintenance and Evolution (ICSME), pp. 269\u2013280. IEEE (2022). https:\/\/doi.org\/10.1109\/ICSME55016.2022.00032","DOI":"10.1109\/ICSME55016.2022.00032"},{"key":"594_CR153","doi-asserted-by":"publisher","unstructured":"Seidl, C., Schaefer, I., A\u00dfmann, U.: Capturing Variability in Space and Time with Hyper Feature Models. In: Proc. Int\u2019l Workshop on Variability Modelling of Software-Intensive Systems (VaMoS), pp. 6\u2013168. ACM (2014). https:\/\/doi.org\/10.1145\/2556624.2556625","DOI":"10.1145\/2556624.2556625"},{"key":"594_CR154","doi-asserted-by":"publisher","unstructured":"Shatnawi, A., Seriai, A., Sahraoui, H.A., Ziadi, T., Seriai, A.: ReSIde: Reusable Service Identification from Software Families. J. Syst. Softw. (JSS) 170, 110748 (2020). https:\/\/doi.org\/10.1016\/J.JSS.2020.110748","DOI":"10.1016\/J.JSS.2020.110748"},{"key":"594_CR155","doi-asserted-by":"publisher","unstructured":"Shatnawi, A., Seriai, A., Sahraoui, H.A.: Recovering Architectural Variability of a Family of Product Variants. In: Proc. Int\u2019l Conf. on Software Reuse (ICSR), vol. 8919, pp. 17\u201333. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-319-14130-5_2","DOI":"10.1007\/978-3-319-14130-5_2"},{"key":"594_CR156","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/J.JSS.2016.07.039","volume":"131","author":"A Shatnawi","year":"2017","unstructured":"Shatnawi, A., Seriai, A., Sahraoui, H.A.: Recovering Software Product Line Architecture of a Family of Object-Oriented Product Variants. J. Syst. Softw. (JSS) 131, 325\u2013346 (2017). https:\/\/doi.org\/10.1016\/J.JSS.2016.07.039","journal-title":"J. Syst. Softw. (JSS)"},{"key":"594_CR157","unstructured":"She, S., Lotufo, R., Berger, T., Wasowski, A., Czarnecki, K.: The Variability Model of The Linux Kernel. In: Proc. Int\u2019l Workshop on Variability Modelling of Software-Intensive Systems (VaMoS), vol. 37, pp. 45\u201351. Universit\u00e4t Duisburg-Essen (2010)"},{"key":"594_CR158","doi-asserted-by":"publisher","unstructured":"Siegmund, J., Siegmund, N., Apel, S.: Views on Internal and External Validity in Empirical Software Engineering. In: Proc. Int\u2019l Conf. on Software Engineering (ICSE), pp. 9\u201319. IEEE (2015). https:\/\/doi.org\/10.1109\/ICSE.2015.24","DOI":"10.1109\/ICSE.2015.24"},{"key":"594_CR159","unstructured":"Sincero, J., Schirmeier, H., Schr\u00f6der-Preikschat, W., Spinczyk, O.: Is the Linux Kernel a Software Product Line? In: Proc. Int\u2019l Workshop on Open Source Software and Product Lines (OSSPL), pp. 9\u201312. IEEE (2007)"},{"key":"594_CR160","doi-asserted-by":"publisher","unstructured":"Soares, S., Borba, P., Laureano, E.: Distribution and persistence as aspects. Softw. Pract. Exper. 36(7), 711\u2013759 (2006). https:\/\/doi.org\/10.1002\/SPE.715","DOI":"10.1002\/SPE.715"},{"key":"594_CR161","unstructured":"Software Wallets: Comparing 25 Bitcoin Software Wallets Feature by Feature. The Bitcoin Hole. https:\/\/thebitcoinhole.com\/software-wallets Accessed 20-July-2025"},{"key":"594_CR162","unstructured":"S\u00f8rensen, J.: HACS 2.0 - The Best Way to Share Community-Made Projects Just Got Better. Home Assistant. https:\/\/www.home-assistant.io\/blog\/2024\/08\/21\/hacs-the-best-way-to-share-community-made-projects\/ Accessed 17-July-2025"},{"key":"594_CR163","doi-asserted-by":"publisher","unstructured":"St\u0103nciulescu, \u015e., Rabiser, D., Seidl, C.: A Technology-Neutral Role-Based Collaboration Model for Software Ecosystems. In: Proc. Int\u2019l Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA), vol. 9953, pp. 512\u2013530 (2016). https:\/\/doi.org\/10.1007\/978-3-319-47169-3_41","DOI":"10.1007\/978-3-319-47169-3_41"},{"key":"594_CR164","doi-asserted-by":"publisher","unstructured":"St\u0103nciulescu, \u015e., Schulze, S., Wasowski, A.: Forked and Integrated Variants in an Open-Source Firmware Project. In: Koschke, R., Krinke, J., Robillard, M.P. (eds.) Proc. Int\u2019l Conf. on Software Maintenance and Evolution (ICSME), pp. 151\u2013160. IEEE (2015). https:\/\/doi.org\/10.1109\/ICSM.2015.7332461","DOI":"10.1109\/ICSM.2015.7332461"},{"key":"594_CR165","doi-asserted-by":"publisher","unstructured":"Svahnberg, M., Gurp, J., Bosch, J.: A taxonomy of variability realization techniques. Software: Practice and Experience 35(8), 705\u2013754 (2005). https:\/\/doi.org\/10.1002\/SPE.652","DOI":"10.1002\/SPE.652"},{"key":"594_CR166","unstructured":"The Open Database Of The Corporate World: THE TOR PROJECT, INC. https:\/\/opencorporates.com\/companies\/us_ma\/208096820 Accessed 17-July-2025"},{"key":"594_CR167","unstructured":"The Tor Project. GitLab. https:\/\/gitlab.torproject.org\/tpo Accessed 18-July-2025"},{"key":"594_CR168","doi-asserted-by":"publisher","unstructured":"Th\u00fcm, T., Batory, D.S., K\u00e4stner, C.: Reasoning About Edits to Feature Models. In: Proc. Int\u2019l Conf. on Software Engineering (ICSE), pp. 254\u2013264. IEEE (2009). https:\/\/doi.org\/10.1109\/ICSE.2009.5070526","DOI":"10.1109\/ICSE.2009.5070526"},{"issue":"1","key":"594_CR169","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/2580950","volume":"47","author":"T Th\u00fcm","year":"2014","unstructured":"Th\u00fcm, T., Apel, S., K\u00e4stner, C., Schaefer, I., Saake, G.: A Classification and Survey of Analysis Strategies for Software Product Lines. ACM Comput. Surv. (CSUR) 47(1), 6\u20131645 (2014). https:\/\/doi.org\/10.1145\/2580950","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"594_CR170","unstructured":"Tor Browser. GitLab. https:\/\/gitlab.torproject.org\/tpo\/applications\/tor-browser Accessed 17-July-2025"},{"key":"594_CR171","unstructured":"Tor Design Proposals. https:\/\/spec.torproject.org\/proposals\/index.html Accessed 16-Jan-2025"},{"key":"594_CR172","unstructured":"Torvalds, L., et al.: Linux Kernel Source Tree. Website: https:\/\/github.com\/torvalds\/linux. Accessed: 12-July-2025"},{"key":"594_CR173","unstructured":"Torvalds, L., et al.: The Linux Kernel Archives. Website: https:\/\/www.kernel.org\/linux.html. Accessed: 12-July-2025"},{"key":"594_CR174","unstructured":"van der Wijden, M., Lange, F., Rong, G.: EIP-4938: Eth\/67 - Removal of GetNodeData. https:\/\/eips.ethereum.org\/EIPS\/eip-4938 Accessed 16-July-2025"},{"key":"594_CR175","doi-asserted-by":"publisher","unstructured":"Van Gurp, J., Prehofer, C., Bosch, J.: Comparing practices for reuse in integration-oriented software product lines and large open source software projects. Softw. Pract. Exper. 40(4), 285\u2013312 (2010). https:\/\/doi.org\/10.1002\/SPE.955","DOI":"10.1002\/SPE.955"},{"key":"594_CR176","doi-asserted-by":"publisher","unstructured":"Varshosaz, M., Al-Hajjaji, M., Th\u00fcm, T., Runge, T., Mousavi, M.R., Schaefer, I.: A Classification of Product Sampling for Software Product Lines. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 1\u201313. ACM (2018). https:\/\/doi.org\/10.1145\/3233027.3233035","DOI":"10.1145\/3233027.3233035"},{"key":"594_CR177","unstructured":"Wallets Recovery - Bitcoin Wallet Seeds Recovery Guide. https:\/\/walletsrecovery.org\/ Accessed 20-July-2025"},{"key":"594_CR178","doi-asserted-by":"publisher","unstructured":"Wang, A., Feng, N., Chechik, M.: Code-Level Functional Equivalence Checking of Annotative Software Product Lines. In: Proc. Int\u2019l Systems and Software Product Line Conf. (SPLC), pp. 64\u201375. ACM (2023). https:\/\/doi.org\/10.1145\/3579027.3608978","DOI":"10.1145\/3579027.3608978"},{"key":"594_CR179","doi-asserted-by":"publisher","unstructured":"Wang, L., Zheng, Z., Wu, X., Sang, B., Zhang, J., Tao, X.: Fork Entropy: Assessing the Diversity of Open Source Software Projects\u2019 Forks. In: Proc. Int\u2019l Conf. on Automated Software Engineering (ASE), pp. 204\u2013216 (2023). https:\/\/doi.org\/10.1109\/ASE56229.2023.00168","DOI":"10.1109\/ASE56229.2023.00168"},{"key":"594_CR180","unstructured":"Wuille, P.: BIP32: Hierarchical Deterministic Wallets. https:\/\/bips.dev\/32 Accessed 16-Jan-2025"},{"key":"594_CR181","doi-asserted-by":"publisher","unstructured":"Xia, B., Bi, T., Xing, Z., Lu, Q., Zhu, L.: An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead. In: Proc. Int\u2019l Conf. on Software Engineering (ICSE), pp. 2630\u20132642. IEEE (2023). https:\/\/doi.org\/10.1109\/ICSE48619.2023.00219","DOI":"10.1109\/ICSE48619.2023.00219"},{"issue":"2","key":"594_CR182","doi-asserted-by":"publisher","first-page":"1432","DOI":"10.1109\/COMST.2020.2969706","volume":"22","author":"Y Xiao","year":"2020","unstructured":"Xiao, Y., Zhang, N., Lou, W., Hou, Y.T.: A Survey of Distributed Consensus Protocols for Blockchain Networks. IEEE Commun. Surv. Tutor. 22(2), 1432\u20131465 (2020). https:\/\/doi.org\/10.1109\/COMST.2020.2969706","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"594_CR183","doi-asserted-by":"publisher","unstructured":"Zave, P.: An experiment in feature engineering. In: McIver, A., Morgan, C. (eds.) Programming Methodology. Monographs in Computer Science, pp. 353\u2013377. Springer, New York (2003). https:\/\/doi.org\/10.1007\/978-0-387-21798-7_17","DOI":"10.1007\/978-0-387-21798-7_17"},{"key":"594_CR184","doi-asserted-by":"publisher","unstructured":"Zhou, S., Vasilescu, B., K\u00e4stner, C.: What the Fork: A Study of Inefficient and Efficient Forking Practices in Social Coding. In: Proc. Europ. Software Engineering Conf.\/Foundations of Software Engineering (ESEC\/FSE), pp. 350\u2013361. ACM (2019). https:\/\/doi.org\/10.1145\/3338906.3338918","DOI":"10.1145\/3338906.3338918"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-026-00594-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-026-00594-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-026-00594-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:29:00Z","timestamp":1774074540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-026-00594-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,21]]},"references-count":184,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,12]]}},"alternative-id":["594"],"URL":"https:\/\/doi.org\/10.1007\/s10515-026-00594-0","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,21]]},"assertion":[{"value":"5 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"67"}}