{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:27:33Z","timestamp":1770283653955,"version":"3.49.0"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,5,5]],"date-time":"2015-05-05T00:00:00Z","timestamp":1430784000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1007\/s10664-015-9364-x","type":"journal-article","created":{"date-parts":[[2015,5,4]],"date-time":"2015-05-04T10:19:08Z","timestamp":1430734748000},"page":"1744-1793","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Coevolution of variability models and related software artifacts"],"prefix":"10.1007","volume":"21","author":[{"given":"Leonardo","family":"Passos","sequence":"first","affiliation":[]},{"given":"Leopoldo","family":"Teixeira","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Dintzner","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Apel","sequence":"additional","affiliation":[]},{"given":"Andrzej","family":"W\u0105sowski","sequence":"additional","affiliation":[]},{"given":"Krzysztof","family":"Czarnecki","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Borba","sequence":"additional","affiliation":[]},{"given":"Jianmei","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,5]]},"reference":[{"key":"9364_CR1","doi-asserted-by":"crossref","unstructured":"Alves V, Gheyi R, Massoni T, Kulesza U, Borba P, Lucena C (2006) Refactoring product lines. In: Proceedings of the international conference on generative programming and component engineering. ACM, pp 201\u2013210","DOI":"10.1145\/1173706.1173737"},{"key":"9364_CR2","doi-asserted-by":"crossref","unstructured":"Apel S, Batory D, K\u00e4stner C, Saake G (2013) Feature-oriented software product lines: concepts and implementation. Springer","DOI":"10.1007\/978-3-642-37521-7"},{"issue":"3","key":"9364_CR3","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/MS.2010.77","volume":"27","author":"MA Babar","year":"2010","unstructured":"Babar MA, Chen L, Shull F (2010) Managing variability in software product lines. IEEE Softw 27(3):89\u201391, 94","journal-title":"IEEE Softw"},{"issue":"10","key":"9364_CR4","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MC.2012.289","volume":"45","author":"L Baresi","year":"2012","unstructured":"Baresi L, Guinea S, Pasquale L (2012) Service-oriented dynamic software product lines. IEEE Comput 45(10):42\u201348","journal-title":"IEEE Comput"},{"issue":"11","key":"9364_CR5","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1109\/32.9057","volume":"14","author":"DS Batory","year":"1988","unstructured":"Batory DS, Barnett JR, Garza JF, Smith KP, Tsukuda K, Twichell BC, Wise TE (1988) GENESIS: an extensible database management system. IEEE Trans Softw Eng 14(11):1711\u20131730","journal-title":"IEEE Trans Softw Eng"},{"key":"9364_CR6","unstructured":"Berger T, Nair D, Rublack R, Atlee JM, Czarnecki K, W\u0105sowski A (2014) Variability modeling in industry: practices, benefits, and challenges. In: Model-driven engineering languages and systems, lecture notes in computer science, vol 8767. Springer, pp 302\u2013319"},{"key":"9364_CR7","doi-asserted-by":"crossref","unstructured":"Berger T, She S, Lotufo R, Czarnecki K, W\u0105sowski A (2010) Feature-to-code mapping in two large product lines. Tech. rep., Department of Computer Science, University of Leipzig","DOI":"10.1007\/978-3-642-15579-6_48"},{"key":"9364_CR8","doi-asserted-by":"crossref","unstructured":"Berger T, She S, Lotufo R, W\u0105sowski A, Czarnecki K (2010) Variability modeling in the real: a perspective from the operating systems domain. In: Proceedings of the international conference on automated software engineering. ACM, pp 73\u201382","DOI":"10.1145\/1858996.1859010"},{"issue":"12","key":"9364_CR9","doi-asserted-by":"crossref","first-page":"1611","DOI":"10.1109\/TSE.2013.34","volume":"39","author":"T Berger","year":"2013","unstructured":"Berger T, She S, Lotufo R, W\u0105sowski A, Czarnecki K (2013) A study of variability models and languages in the systems software domain. IEEE Trans Softw Eng 39(12):1611\u20131640","journal-title":"IEEE Trans Softw Eng"},{"key":"9364_CR10","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1016\/j.tcs.2012.01.031","volume":"455","author":"P Borba","year":"2012","unstructured":"Borba P, Teixeira L, Gheyi R (2012) A theory of software product line refinement. Theor Comput Sci 455:2\u201330","journal-title":"Theor Comput Sci"},{"key":"9364_CR11","unstructured":"Bovet D, Cesati M (2005) Understanding the Linux kernel, 3rd edn. O\u2019Reilly"},{"key":"9364_CR12","doi-asserted-by":"crossref","unstructured":"Chen K, Rajlich V (2010) Case study of feature location using dependence graph, after 10 years. In: Proceedings of the international workshop on program comprehension. IEEE, pp 1\u20133","DOI":"10.1109\/ICPC.2010.40"},{"key":"9364_CR13","unstructured":"Corbet J, Kroah-Hartman G, McPherson A (2013) Linux kernel development: how fast it is going, who is doing it, what they are doing, and who is sponsoring it. Last seen: July 16th, 2014. http:\/\/www.linuxfoundation.org\/publications\/linux-foundation\/who-writes-linux-2013"},{"key":"9364_CR14","unstructured":"Corbet J, Rubini A, Kroah-Hartman G (2005) Linux device drivers, 3rd edn. O\u2019Reilly"},{"key":"9364_CR15","doi-asserted-by":"crossref","unstructured":"Deprez JC, Lakhotia A (2000) A formalism to automate mapping from program features to code. In: Proceedings of the international workshop on program comprehension. IEEE, pp 69\u201378","DOI":"10.1109\/WPC.2000.852481"},{"key":"9364_CR16","doi-asserted-by":"crossref","unstructured":"Dietrich C, Tartler R, Schr\u00f6der-Preikschat W, Lohmann D (2012) A robust approach for variability extraction from the Linux build system. In: Proceedings of the international software product line conference. ACM, pp 21\u201330","DOI":"10.1145\/2362536.2362544"},{"key":"9364_CR17","doi-asserted-by":"crossref","unstructured":"Dintzner N, Van Deursen A, Pinzger M (2013) Extracting feature model changes from the Linux kernel using FMDiff. In: Proceedings of the international workshop on variability modelling of software-intensive systems. ACM, pp 22:1\u201322:8","DOI":"10.1145\/2556624.2556631"},{"issue":"3","key":"9364_CR18","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/TSE.2003.1183929","volume":"29","author":"T Eisenbarth","year":"2003","unstructured":"Eisenbarth T, Koschke R, Simon D (2003) Locating features in source code. IEEE Trans Softw Eng 29(3):210\u2013224","journal-title":"IEEE Trans Softw Eng"},{"issue":"12","key":"9364_CR19","doi-asserted-by":"crossref","first-page":"1146","DOI":"10.1109\/TSE.2002.1158288","volume":"28","author":"MD Ernst","year":"2002","unstructured":"Ernst MD, Badros GJ, Notkin D (2002) An empirical analysis of C preprocessor use. IEEE Trans Softw Eng 28(12):1146\u20131170","journal-title":"IEEE Trans Softw Eng"},{"key":"9364_CR20","doi-asserted-by":"crossref","unstructured":"Favre JM (1997) Understanding in the large. In: Proceedings of the international workshop on program comprehension. IEEE, pp 29\u201338","DOI":"10.1109\/WPC.1997.601260"},{"issue":"4","key":"9364_CR21","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1016\/j.jss.2011.10.050","volume":"85","author":"DG Feitelson","year":"2012","unstructured":"Feitelson DG (2012) Perpetual development: a model of the Linux kernel life cycle. J Syst Softw 85(4):859\u2013875","journal-title":"J Syst Softw"},{"key":"9364_CR22","unstructured":"Fowler M, Beck K, Brant J, Opdyke W, Roberts D (1999) Refactoring: improving the design of existing code. Addison Wesley"},{"key":"9364_CR23","doi-asserted-by":"crossref","unstructured":"Godfrey MW, Tu Q (2000) Evolution in open source software: a case study. In: Proceedings of the international conference on software maintenance. IEEE, pp 131\u2013142","DOI":"10.1109\/ICSM.2000.883030"},{"issue":"5","key":"9364_CR24","doi-asserted-by":"crossref","first-page":"4987","DOI":"10.1016\/j.eswa.2011.10.014","volume":"39","author":"J Guo","year":"2012","unstructured":"Guo J, Wang Y, Trinidad P, Benavides D (2012) Consistency maintenance for evolving feature models. Expert Syst Appl 39(5):4987\u20134998","journal-title":"Expert Syst Appl"},{"key":"9364_CR25","doi-asserted-by":"crossref","unstructured":"Gurp JV, Bosch J, Svahnberg M (2001) On the notion of variability in software product lines. In: Proceedings of the working conference on software architecture. IEEE, pp 45\u201354","DOI":"10.1109\/WICSA.2001.948406"},{"key":"9364_CR26","doi-asserted-by":"crossref","unstructured":"Holdschick H (2012) Challenges in the evolution of model-based software product lines in the automotive domain. In: Proceedings of the international workshop on feature-oriented software development. ACM, pp 70\u201373","DOI":"10.1145\/2377816.2377826"},{"key":"9364_CR27","doi-asserted-by":"crossref","unstructured":"Hunsen C, Zhang B, Siegmund J, K\u00e4stner C, Lessenich O, Becker M, Apel S (2014) Preprocessor-based variability in open-source and industrial software systems: an empirical study. Empir Softw Eng. To appear","DOI":"10.1007\/s10664-015-9360-1"},{"key":"9364_CR28","doi-asserted-by":"crossref","unstructured":"Izurieta C, Bieman J (2006) The evolution of FreeBSD and Linux. In: Proceedings of the international symposium on empirical software engineering. ACM, pp 204\u2013211","DOI":"10.1145\/1159733.1159765"},{"key":"9364_CR29","doi-asserted-by":"crossref","unstructured":"Janota M, Kiniry J (2007) Reasoning about feature models in higher-order logic. In: Proceedings of the international software product line conference. IEEE, pp 13\u201322","DOI":"10.1109\/SPLINE.2007.36"},{"key":"9364_CR30","doi-asserted-by":"crossref","unstructured":"Kang KC, Cohen SG, Hess JA, Novak WE, Peterson AS (1990) Feature-oriented domain analysis (FODA) feasibility study. Tech. rep. Carnegie-Mellon University Software Engineering Institute","DOI":"10.21236\/ADA235785"},{"issue":"6","key":"9364_CR31","doi-asserted-by":"crossref","first-page":"59","DOI":"10.5381\/jot.2009.8.6.c5","volume":"8","author":"C K\u00e4stner","year":"2009","unstructured":"K\u00e4stner C, Apel S (2009) Virtual separation of concerns \u2013 a second chance for preprocessors. J Object Technol 8(6):59\u201378","journal-title":"J Object Technol"},{"key":"9364_CR32","doi-asserted-by":"crossref","unstructured":"K\u00e4stner C, Apel S, Batory D (2007) A case study implementing features using AspectJ. In: Proceedings of the international software product line conference. IEEE, pp 223\u2013232","DOI":"10.1109\/SPLINE.2007.12"},{"key":"9364_CR33","doi-asserted-by":"crossref","unstructured":"K\u00e4stner C, Apel S, Kuhlemann M (2008) Granularity in software product lines. In: Proceedings of the international conference on software engineering. ACM, pp 311\u2013320","DOI":"10.1145\/1368088.1368131"},{"key":"9364_CR34","doi-asserted-by":"crossref","unstructured":"K\u00e4stner C, Giarrusso PG, Rendel T, Erdweg S, Ostermann K, Berger T (2011) Variability-aware parsing in the presence of lexical macros and conditional compilation. In: Proceedings of the international conference on object-oriented programming, systems, languages, and applications. ACM, pp 805\u2013824","DOI":"10.1145\/2048066.2048128"},{"key":"9364_CR35","doi-asserted-by":"crossref","unstructured":"Kiczales G, Lamping J, Mendhekar A, Maeda C, Lopes C, Loingtier JM, Irwin J (1997) Aspect-oriented programming. In: Proceedings of the European conference on object-oriented programming. Springer, pp 220\u2013242","DOI":"10.1007\/BFb0053381"},{"issue":"1","key":"9364_CR36","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/TSE.2012.16","volume":"39","author":"M Kim","year":"2013","unstructured":"Kim M, Notkin D, Grossman D, Wilson Jr. G (2013) Identifying and summarizing systematic code changes via rule inference. IEEE Trans Softw Eng 39 (1):45\u201362","journal-title":"IEEE Trans Softw Eng"},{"key":"9364_CR37","doi-asserted-by":"crossref","unstructured":"Kuchana P (2004) Software architecture design patterns in java. Auerbach Publications","DOI":"10.1201\/9780203496213"},{"key":"9364_CR38","unstructured":"Le D, Walkingshaw E, Erwig M (2011) #ifdef confirmed harmful: promoting understandable software variation. In: Proceedings of the symposium on visual languages and human-centric computing. IEEE, pp 143\u2013150"},{"key":"9364_CR39","doi-asserted-by":"crossref","unstructured":"Liebig J, Apel S, Lengauer C, K\u00e4stner C, Schulze M (2010) An analysis of the variability in forty preprocessor-based software product lines. In: Proceedings of the international conference on software engineering. ACM, pp 105\u2013114","DOI":"10.1145\/1806799.1806819"},{"key":"9364_CR40","doi-asserted-by":"crossref","unstructured":"Liebig J, K\u00e4stner C, Apel S (2011) Analyzing the discipline of preprocessor annotations in 30 million lines of C code. In: Proceedings of the international conference on aspect-oriented software development. ACM, pp 191\u2013202","DOI":"10.1145\/1960275.1960299"},{"key":"9364_CR41","doi-asserted-by":"crossref","unstructured":"Lotufo R, She S, Berger T, Czarnecki K, W\u0105sowski A (2010) Evolution of the Linux kernel variability model. In: Proceedings of the international conference on software product lines: going beyond. Springer, pp 136\u2013150","DOI":"10.1007\/978-3-642-15579-6_10"},{"key":"9364_CR42","unstructured":"Love R (2010) Linux kernel development, 3rd edn. Addison Wesley"},{"key":"9364_CR43","doi-asserted-by":"crossref","unstructured":"Marcus A, Rajlich V, Buchta J, Petrenko M, Sergeyev A (2005) Static techniques for concept location in object-oriented code. In: Proceedings of the international workshop on program comprehension. IEEE, pp 33\u201342","DOI":"10.1109\/WPC.2005.33"},{"key":"9364_CR44","unstructured":"Massa A (2002) Embedded software development with eCos. Prentice Hall"},{"key":"9364_CR45","doi-asserted-by":"crossref","unstructured":"Nadi S, Berger T, K\u00e4stner C, Czarnecki K (2014) Mining configuration constraints: static analyses and empirical results. In: Proceedings of the international conference on software engineering . ACM, pp 140\u2013151","DOI":"10.1145\/2568225.2568283"},{"key":"9364_CR46","doi-asserted-by":"crossref","unstructured":"Nadi S, Holt R (2012) Mining kbuild to detect variability anomalies in Linux. In: Proceedings of the European conference on software maintenance and reengineering. IEEE, pp 107\u2013116","DOI":"10.1109\/CSMR.2012.21"},{"key":"9364_CR47","doi-asserted-by":"crossref","unstructured":"Nadi S, Holt R (2013) The Linux kernel: a case study of build system variability. J Softw: Evol Process","DOI":"10.1002\/smr.1595"},{"key":"9364_CR48","doi-asserted-by":"crossref","unstructured":"Neill CJ, Laplante PA (2005) Antipatterns: identification, refactoring, and management. CRC Press","DOI":"10.1201\/9781420031249"},{"key":"9364_CR49","doi-asserted-by":"crossref","unstructured":"Neves L, Teixeira L, Sena D, Alves V, Kulezsa U, Borba P (2011) Investigating the safe evolution of software product lines. In: Proceedings of the international conference on generative programming and component engineering. ACM, pp 33\u201342","DOI":"10.1145\/2047862.2047869"},{"key":"9364_CR50","doi-asserted-by":"crossref","unstructured":"Passos L, Czarnecki K (2014) A dataset of feature additions and feature removals from the Linux kernel. In: Proceedings of the working conference on mining software repositories. ACM, pp 376\u2013 379","DOI":"10.1145\/2597073.2597124"},{"key":"9364_CR51","doi-asserted-by":"crossref","unstructured":"Passos L, Czarnecki K, Apel S, W\u0105sowski A, K\u00e4stner C, Guo J (2013) Feature-oriented software evolution. In: Proceedings of the international workshop on variability modelling of software-intensive systems. ACM, pp 17:1\u201317:8","DOI":"10.1145\/2430502.2430526"},{"key":"9364_CR52","doi-asserted-by":"crossref","unstructured":"Passos L, Czarnecki K, W\u0105sowski A (2012) Towards a catalog of variability evolution patterns: the Linux kernel case. In: Proceedings of the international workshop on feature-oriented software development. ACM, pp 62\u201369","DOI":"10.1145\/2377816.2377825"},{"key":"9364_CR53","doi-asserted-by":"crossref","unstructured":"Passos L, Guo J, Teixeira L, Czarnecki K, W\u0105sowski A, Borba P (2013) Coevolution of variability models and related artifacts: a case study from the Linux kernel. In: Proceedings of the international software product line conference. ACM, pp 91\u2013100","DOI":"10.1145\/2491627.2491628"},{"issue":"10","key":"9364_CR54","doi-asserted-by":"crossref","first-page":"2261","DOI":"10.1016\/j.jss.2011.08.008","volume":"85","author":"A Pleuss","year":"2012","unstructured":"Pleuss A, Botterweck G, Dhungana D, Polzer A, Kowalewski S (2012) Model-driven support for product line evolution on feature level. J Syst Softw 85(10):2261\u20132274","journal-title":"J Syst Softw"},{"issue":"12","key":"9364_CR55","doi-asserted-by":"crossref","first-page":"1493","DOI":"10.1016\/j.datak.2009.07.013","volume":"68","author":"M Rosenm\u00fcller","year":"2009","unstructured":"Rosenm\u00fcller M, Apel S, Leich T, Saake G (2009) Tailor-made data management for embedded systems: a case study on Berkeley DB. Data Knowl Eng 68(12):1493\u20131512","journal-title":"Data Knowl Eng"},{"key":"9364_CR56","doi-asserted-by":"crossref","unstructured":"Rosenm\u00fcller M, Siegmund N, Schirmeier H, Sincero J, Apel S, Leich T, Spinczyk O, Saake G (2008) FAME-DBMS: tailor-made data management solutions for embedded systems. In: Proceedings of the EDBT workshop on software engineering for tailor-made data management. ACM, pp 1\u20136","DOI":"10.1145\/1385486.1385488"},{"key":"9364_CR57","doi-asserted-by":"crossref","unstructured":"Runeson P, Host M, Rainer A, Regnell B (2012) Case study research in software engineering: guidelines and examples, 1st edn. Wiley","DOI":"10.1002\/9781118181034"},{"key":"9364_CR58","doi-asserted-by":"crossref","unstructured":"Seidl C, Heidenreich F, A\u00dfmann U (2012) Coevolution of models and feature mapping in software product lines. In: Proceedings of the international software product line conference . ACM, pp 76\u201385","DOI":"10.1145\/2362536.2362550"},{"key":"9364_CR59","unstructured":"She S, Lotufo R, Berger T, Wa\u0307sowski A, Czarnecki K (2010) The variability model of the Linux kernel. In: Proceedings of the international workshop on variability modelling of software-intensive systems. Universit\u00e4t Duisburg-Essen, pp 45\u201351"},{"key":"9364_CR60","doi-asserted-by":"crossref","unstructured":"She S, Lotufo R, Berger T, W\u0105sowski A, Czarnecki K (2011) Reverse engineering feature models. In: Proceedings of the international conference on software engineering. ACM, pp 461\u2013470","DOI":"10.1145\/1985793.1985856"},{"issue":"6","key":"9364_CR61","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1002\/smr.338","volume":"18","author":"S Simmons","year":"2006","unstructured":"Simmons S, Edwards D, Wilde N, Homan J, Groble M (2006) Industrial tools for the feature location problem: an exploratory study. J Softw Maintenance Evol 18(6):457\u2013474","journal-title":"J Softw Maintenance Evol"},{"key":"9364_CR62","unstructured":"Spencer H, Collyer G (1992) #ifdef Considered harmful, or portability experience with C news. In: Proceedings of the USENIX security symposium. USENIX Association"},{"key":"9364_CR63","unstructured":"Sun J, Zhang H, Wang H (2005) Formal semantics and verification for feature modeling. In: Proceedings of the international conference on engineering of complex computer systems. IEEE , pp 303\u2013312"},{"issue":"5","key":"9364_CR64","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/s10009-012-0225-2","volume":"14","author":"R Tartler","year":"2012","unstructured":"Tartler R, Sincero J, Dietrich C, Schr\u00f6der-Preikschat W, Lohmann D (2012) Revealing and repairing configuration inconsistencies in large scale system software. Int J Softw Tools Technol Transfer 14(5):531\u2013551","journal-title":"Int J Softw Tools Technol Transfer"},{"key":"9364_CR65","doi-asserted-by":"crossref","unstructured":"Th\u00fcm T, Batory D, K\u00e4stner C (2009) Reasoning about edits to feature models. In: Proceedings of the international conference on software engineering. IEEE, pp 254\u2013264","DOI":"10.1109\/ICSE.2009.5070526"},{"key":"9364_CR66","doi-asserted-by":"crossref","unstructured":"Th\u00fcm T, K\u00e4stner C, Erdweg S, Siegmund N (2011) Abstract features in feature modeling. In: Proceedings of the international software product line conference. IEEE, pp 191\u2013200","DOI":"10.1109\/SPLC.2011.53"},{"issue":"4","key":"9364_CR67","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1109\/TSE.2011.57","volume":"38","author":"MT Valente","year":"2012","unstructured":"Valente MT, Borges V, Passos L (2012) A semi-automatic approach for extracting software product lines. IEEE Trans Softw Eng 38(4):737\u2013754","journal-title":"IEEE Trans Softw Eng"},{"key":"9364_CR68","unstructured":"Venkateswaran S (2008) Essential Linux device drivers, 1st edn. Prentice Hall"},{"issue":"1","key":"9364_CR69","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1002\/smr.4360070105","volume":"7","author":"N Wilde","year":"1995","unstructured":"Wilde N, Scully MC (1995) Software reconnaissance: mapping program features to code. J Softw Maint 7(1):49\u201362","journal-title":"J Softw Maint"},{"key":"9364_CR70","unstructured":"Wright C, Cowan C, Smalley S, Morris J, Kroah-Hartman G (2002) Linux security modules: general security support for the Linux kernel. In: Proceedings of the USENIX security symposium. USENIX Association, pp 17\u201331"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9364-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-015-9364-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-015-9364-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,24]],"date-time":"2019-08-24T14:05:59Z","timestamp":1566655559000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-015-9364-x"}},"subtitle":["A fresh look at evolution patterns in the Linux kernel"],"short-title":[],"issued":{"date-parts":[[2015,5,5]]},"references-count":70,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["9364"],"URL":"https:\/\/doi.org\/10.1007\/s10664-015-9364-x","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,5]]}}}