{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T00:10:12Z","timestamp":1759018212117,"version":"3.44.0"},"reference-count":103,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100008575","name":"Center for Evolutionary and Theoretical Immunology","doi-asserted-by":"publisher","award":["390696704"],"award-info":[{"award-number":["390696704"]}],"id":[{"id":"10.13039\/100008575","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["389792660","EXC 2050\/1"],"award-info":[{"award-number":["389792660","EXC 2050\/1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1016\/j.jss.2023.111915","type":"journal-article","created":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T12:06:29Z","timestamp":1701950789000},"page":"111915","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["Feature causality"],"prefix":"10.1016","volume":"209","author":[{"given":"Clemens","family":"Dubslaff","sequence":"first","affiliation":[]},{"given":"Kallistos","family":"Weis","sequence":"additional","affiliation":[]},{"given":"Christel","family":"Baier","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3687-2233","authenticated-orcid":false,"given":"Sven","family":"Apel","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2023.111915_b1","article-title":"Variability bugs in highly configurable systems: A qualitative analysis","volume":"26","author":"Abal","year":"2018","journal-title":"Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.jss.2023.111915_b2","first-page":"431","article-title":"The computational complexity of structure-based causality","volume":"58","author":"Aleksandrowicz","year":"2017","journal-title":"Artif. Intell. Res."},{"key":"10.1016\/j.jss.2023.111915_b3","first-page":"1","article-title":"Feature interactions: The next generation (Dagstuhl Seminar 14281)","volume":"4","author":"Apel","year":"2014","journal-title":"Dagstuhl Rep."},{"year":"2013","series-title":"Feature-Oriented Software Product Lines - Concepts and Implementation","author":"Apel","key":"10.1016\/j.jss.2023.111915_b4"},{"key":"10.1016\/j.jss.2023.111915_b5","series-title":"Proceedings of the 35th International Conference on Software Engineering","first-page":"482","article-title":"Strategies for product-line verification: Case studies and experiments","author":"Apel","year":"2013"},{"key":"10.1016\/j.jss.2023.111915_b6","series-title":"Tactile Internet with Human-in-the-Loop","first-page":"301","article-title":"Tactile computing: Essential building blocks for the tactile internet","author":"A\u00dfmann","year":"2021"},{"key":"10.1016\/j.jss.2023.111915_b7","series-title":"Proceedings of the 19th International Symposium on Software Testing and Analysis","first-page":"73","article-title":"Causal inference for statistical fault localization","author":"Baah","year":"2010"},{"key":"10.1016\/j.jss.2023.111915_b8","series-title":"Proceedings of the 48th International Colloquium on Automata, Languages, and Programming, Vol. LIPIcs:198","first-page":"1","article-title":"From verification to causality-based explications","author":"Baier","year":"2021"},{"year":"2008","series-title":"Principles of Model Checking","author":"Baier","key":"10.1016\/j.jss.2023.111915_b9"},{"key":"10.1016\/j.jss.2023.111915_b10","series-title":"Proceedings of the 23rd Systems and Software Product Line Conference","first-page":"39","article-title":"Static analysis of featured transition systems","author":"ter Beek","year":"2019"},{"key":"10.1016\/j.jss.2023.111915_b11","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/s10703-011-0132-2","article-title":"Explaining counterexamples using causality","volume":"40","author":"Beer","year":"2012","journal-title":"Form. Methods Syst. Des."},{"key":"10.1016\/j.jss.2023.111915_b12","series-title":"Proceedings of the 34th Conference on Programming Language Design and Implementation","first-page":"355","article-title":"SPLLIFT: statically analyzing software product lines in minutes instead of years","author":"Bodden","year":"2013"},{"key":"10.1016\/j.jss.2023.111915_b13","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1109\/TC.1986.1676819","article-title":"Graph-based algorithms for Boolean function manipulation","volume":"35","author":"Bryant","year":"1986","journal-title":"Trans. Comput."},{"key":"10.1016\/j.jss.2023.111915_b14","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/S1389-1286(02)00352-3","article-title":"Feature interaction: a critical review and considered forecast","volume":"41","author":"Calder","year":"2003","journal-title":"Comput. Netw."},{"key":"10.1016\/j.jss.2023.111915_b15","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s10703-006-0002-5","article-title":"Feature interaction detection by pairwise analysis of LTL properties\u2014A case study","volume":"28","author":"Calder","year":"2006","journal-title":"Form. Methods Syst. Des."},{"key":"10.1016\/j.jss.2023.111915_b16","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/0012-365X(78)90168-1","article-title":"On the number of prime implicants","volume":"24","author":"Chandra","year":"1978","journal-title":"Discrete Math."},{"key":"10.1016\/j.jss.2023.111915_b17","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1613\/jair.1391","article-title":"Responsibility and blame: A structural-model approach","volume":"22","author":"Chockler","year":"2004","journal-title":"Artificial Intelligence Res."},{"key":"10.1016\/j.jss.2023.111915_b18","series-title":"Proceedings of the 24th Systems and Software Product Line Conference","first-page":"1","article-title":"From features to roles","author":"Chrszon","year":"2020"},{"key":"10.1016\/j.jss.2023.111915_b19","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s00165-017-0432-4","article-title":"ProFeat: feature-oriented engineering for family-based probabilistic model checking","volume":"30","author":"Chrszon","year":"2018","journal-title":"Form. Asp. Comput."},{"key":"10.1016\/j.jss.2023.111915_b20","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1145\/5397.5399","article-title":"Automatic verification of finite-state concurrent systems using temporal logic specifications","volume":"8","author":"Clarke","year":"1986","journal-title":"Trans. Programm. Lang. Syst."},{"key":"10.1016\/j.jss.2023.111915_b21","doi-asserted-by":"crossref","first-page":"1130","DOI":"10.1016\/j.scico.2010.10.005","article-title":"A text-based approach to feature modelling: Syntax and semantics of TVL","volume":"76","author":"Classen","year":"2011","journal-title":"Sci. Comput. Programm."},{"key":"10.1016\/j.jss.2023.111915_b22","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1007\/s10009-012-0234-1","article-title":"Model checking software product lines with SNIP","volume":"14","author":"Classen","year":"2012","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"10.1016\/j.jss.2023.111915_b23","doi-asserted-by":"crossref","first-page":"1069","DOI":"10.1109\/TSE.2012.86","article-title":"Featured transition systems: Foundations for verifying variability-intensive systems and their application to LTL model checking","volume":"39","author":"Classen","year":"2013","journal-title":"Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2023.111915_b24","series-title":"Proceedings of the 27th International Conference on Software Engineering","first-page":"342","article-title":"Locating causes of program failures","author":"Cleve","year":"2005"},{"key":"10.1016\/j.jss.2023.111915_b25","series-title":"Proceedings of the 17th Systems and Software Product Line Conference","first-page":"141","article-title":"ProVeLines: a product line of verifiers for software product lines","author":"Cordy","year":"2013"},{"key":"10.1016\/j.jss.2023.111915_b26","series-title":"Proceedings of the 35th International Conference on Software Engineering","first-page":"472","article-title":"Beyond boolean product-line model checking: Dealing with feature attributes and multi-features","author":"Cordy","year":"2013"},{"key":"10.1016\/j.jss.2023.111915_b27","series-title":"Proceedings of the 29th European Design Automation Conference","first-page":"36","article-title":"Implicit and incremental computation of primes and essential primes of boolean functions","author":"Coudert","year":"1992"},{"key":"10.1016\/j.jss.2023.111915_b28","series-title":"Proceedings of the 35th Conference on Automated Software Engineering","first-page":"684","article-title":"Mastering uncertainty in performance estimations of configurable software systems","author":"Dorn","year":"2020"},{"key":"10.1016\/j.jss.2023.111915_b29","doi-asserted-by":"crossref","unstructured":"Drake, C., 2015. Pyeda: Data structures and algorithms for electronic design automation. In: Proceedings of the 14th Python in Science Conference. SciPy, pp. 26\u201331.","DOI":"10.25080\/Majora-7b98e3ed-004"},{"key":"10.1016\/j.jss.2023.111915_b30","series-title":"Proceedings of the 17th Conference on Software Engineering and Formal Methods, Vol. LNCS:12226","first-page":"162","article-title":"Compositional feature-oriented systems","author":"Dubslaff","year":"2019"},{"year":"2021","series-title":"Quantitative Analysis of Configurable and Reconfigurable Systems","author":"Dubslaff","key":"10.1016\/j.jss.2023.111915_b31"},{"key":"10.1016\/j.jss.2023.111915_b32","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/978-3-662-46734-3_5","article-title":"Probabilistic model checking for feature-oriented systems","volume":"LNCS:8989","author":"Dubslaff","year":"2015","journal-title":"Trans. Aspect-Oriented Softw. Dev."},{"key":"10.1016\/j.jss.2023.111915_b33","doi-asserted-by":"crossref","unstructured":"Dubslaff, C., Ding, K., Morozov, A., Baier, C., Janschek, K., 2019a. Breaking the Limits of Redundancy Systems Analysis. In: Proceedings of the 29th European Safety and Reliability Conference. ESREL, pp. 2317\u20132325.","DOI":"10.3850\/978-981-11-2724-3_0618-cd"},{"key":"10.1016\/j.jss.2023.111915_b34","series-title":"Proceedings of the 15th Conference on Integrated Formal Methods, Vol. LNCS:11918","first-page":"194","article-title":"Ontology-mediated probabilistic model checking","author":"Dubslaff","year":"2019"},{"key":"10.1016\/j.jss.2023.111915_b35","series-title":"Proceedings of the 4th Workshop on Models for Formal Analysis of Real Systems, Vol. EPTCS:316","first-page":"121","article-title":"Iterative variable reordering: Taming huge system families","author":"Dubslaff","year":"2020"},{"key":"10.1016\/j.jss.2023.111915_b36","unstructured":"Dubslaff, C., Morozov, A., Baier, C., Janschek, K., 2020b. Reduction Methods on Error-Propagation Graphs for Quantitative Systems Reliability Analysis. In: Proceedings of the 30th European Safety and Reliability Conference (ESREL) and 15th Probabilistic Safety Assessment and Management Conference. PSAM."},{"key":"10.1016\/j.jss.2023.111915_b37","doi-asserted-by":"crossref","unstructured":"Dubslaff, C., Weis, K., Baier, C., Apel, S., 2022. Causality in Configurable Software Systems. In: Proceedings of the 44th International Conference on Software Engineering. ICSE\u201922.","DOI":"10.1145\/3510003.3510200"},{"year":"2023","series-title":"FeatCause \u2013 Sources and Data","author":"Dubslaff","key":"10.1016\/j.jss.2023.111915_b38"},{"year":"2023","series-title":"FeatCause \u2013 Github","author":"Dubslaff","key":"10.1016\/j.jss.2023.111915_b39"},{"year":"1991","series-title":"Probabilistic Causality","author":"Eells","key":"10.1016\/j.jss.2023.111915_b40"},{"key":"10.1016\/j.jss.2023.111915_b41","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/S0004-3702(02)00271-0","article-title":"Complexity results for structure-based causality","volume":"142","author":"Eiter","year":"2002","journal-title":"Artificial Intelligence"},{"issue":"6\u20137","key":"10.1016\/j.jss.2023.111915_b42","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1016\/j.artint.2005.12.003","article-title":"Causes and explanations in the structural-model approach: Tractable cases","volume":"170","author":"Eiter","year":"2006","journal-title":"Artif. Intell."},{"key":"10.1016\/j.jss.2023.111915_b43","series-title":"Proceedings of the 22nd International Symposium on Software Reliability Engineering","first-page":"90","article-title":"Feature interaction faults revisited: An exploratory study","author":"Garvin","year":"2011"},{"key":"10.1016\/j.jss.2023.111915_b44","doi-asserted-by":"crossref","unstructured":"Gomaa, H., Hussein, M., 2003. Dynamic Software Reconfiguration in Software Product Families. In: Proceedings of the 5th Workshop on Software Profuct Family Engineering, Vol. LNCS:3014. PFE, pp. 435\u2013444.","DOI":"10.1007\/978-3-540-24667-1_33"},{"key":"10.1016\/j.jss.2023.111915_b45","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1093\/bjps\/IX.36.307","article-title":"A theory of causality","volume":"9","author":"Good","year":"1959","journal-title":"British J. Philos. Sci."},{"key":"10.1016\/j.jss.2023.111915_b46","series-title":"Proceedings of the 10th Workshop on Model Checking of Software, Vol. LNCS:2648","first-page":"121","article-title":"What went wrong: Explaining counterexamples","author":"Groce","year":"2003"},{"key":"10.1016\/j.jss.2023.111915_b47","doi-asserted-by":"crossref","first-page":"1826","DOI":"10.1007\/s10664-017-9573-6","article-title":"Data-efficient performance learning for configurable systems","volume":"23","author":"Guo","year":"2018","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.jss.2023.111915_b48","series-title":"Proceedings of the 24th International Joint Conference on Artificial Intelligence","first-page":"3022","article-title":"A modification of the Halpern-Pearl definition of causality","author":"Halpern","year":"2015"},{"key":"10.1016\/j.jss.2023.111915_b49","series-title":"Proceedings of the 17th Conference in Uncertainty in Artificial Intelligence","first-page":"194","article-title":"Causes and explanations: A structural-model approach - part I: Causes","author":"Halpern","year":"2001"},{"key":"10.1016\/j.jss.2023.111915_b50","series-title":"Proceedings of the 17th International Joint Conference on Artificial Intelligence","first-page":"27","article-title":"Causes and explanations: A structural-model approach - part II: Explanations","author":"Halpern","year":"2001"},{"key":"10.1016\/j.jss.2023.111915_b51","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1007\/BF01211866","article-title":"A logic for reasoning about time and reliability","volume":"6","author":"Hansson","year":"1994","journal-title":"Form. Asp. Comput."},{"key":"10.1016\/j.jss.2023.111915_b52","series-title":"Proceedings of the 22nd International Joint Conference on Artificial Intelligence","first-page":"566","article-title":"Minimization for generalized boolean formulas","author":"Hemaspaandra","year":"2011"},{"key":"10.1016\/j.jss.2023.111915_b53","series-title":"Proceedings of the 18th Symposium Automated Technology for Verification and Analysis, Vol. LNCS:12302","first-page":"343","article-title":"From checking to inference: Actual causality computations as optimization problems","author":"Ibrahim","year":"2020"},{"year":"2021","series-title":"CADET: Debugging and fixing misconfigurations using counterfactual reasoning","author":"Iqbal","key":"10.1016\/j.jss.2023.111915_b54"},{"key":"10.1016\/j.jss.2023.111915_b55","series-title":"Proceedings of the 42nd International Conference on Software Engineering","first-page":"87","article-title":"Causal testing: Understanding defects\u2019 root causes","author":"Johnson","year":"2020"},{"key":"10.1016\/j.jss.2023.111915_b56","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MS.2020.2987024","article-title":"The interplay of sampling and machine learning for software performance prediction","volume":"37","author":"Kaltenecker","year":"2020","journal-title":"Software"},{"key":"10.1016\/j.jss.2023.111915_b57","series-title":"Proceedings of the 41st International Conference on Software Engineering","first-page":"1084","article-title":"Distance-based sampling of software configuration spaces","author":"Kaltenecker","year":"2019"},{"year":"1990","series-title":"Feature-Oriented Domain Analysis (FODA) Feasibility Study","author":"Kang","key":"10.1016\/j.jss.2023.111915_b58"},{"key":"10.1016\/j.jss.2023.111915_b59","doi-asserted-by":"crossref","first-page":"2265","DOI":"10.1007\/s10270-018-0662-9","article-title":"Tradeoffs in modeling performance of highly configurable software systems","volume":"18","author":"Kolesnikov","year":"2019","journal-title":"Softw. Syst. Model."},{"key":"10.1016\/j.jss.2023.111915_b60","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/TSE.2004.24","article-title":"Software fault interactions and implications for software testing","volume":"30","author":"Kuhn","year":"2004","journal-title":"Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2023.111915_b61","doi-asserted-by":"crossref","first-page":"556","DOI":"10.2307\/2025310","article-title":"Counterfactual theories of causation","author":"Lewis","year":"1973","journal-title":"J. Phil."},{"key":"10.1016\/j.jss.2023.111915_b62","series-title":"Proceedings of the 5th International Conference on Autonomic and Autonomous Systems","first-page":"346","article-title":"Resource-aware contracts for addressing feature interaction in dynamic adaptive systems","author":"Liu","year":"2009"},{"key":"10.1016\/j.jss.2023.111915_b63","series-title":"Proceedings of the 10th Workshop on Variability Modelling of Software-Intensive Systems","first-page":"41","article-title":"Context aware reconfiguration in software product lines","author":"Mauro","year":"2016"},{"key":"10.1016\/j.jss.2023.111915_b64","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1002\/j.1538-7305.1956.tb03835.x","article-title":"Minimization of Boolean functions","volume":"35","author":"McCluskey","year":"1956","journal-title":"Bell Syst. Tech. J."},{"key":"10.1016\/j.jss.2023.111915_b65","series-title":"Proceedings of the 30th Design Automation Conference","first-page":"618","article-title":"Espresso-signature: A new exact minimizer for logic functions","author":"McGeer","year":"1993"},{"year":"2004","series-title":"The Art of Software Testing","author":"Myers","key":"10.1016\/j.jss.2023.111915_b66"},{"key":"10.1016\/j.jss.2023.111915_b67","doi-asserted-by":"crossref","first-page":"794","DOI":"10.1109\/TSE.2018.2870895","article-title":"Finding faster configurations using FLASH","volume":"46","author":"Nair","year":"2020","journal-title":"Trans. Softw. Eng."},{"year":"2010","series-title":"Principles of Program Analysis","author":"Nielson","key":"10.1016\/j.jss.2023.111915_b68"},{"key":"10.1016\/j.jss.2023.111915_b69","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/BF00289615","article-title":"Boolesche minimalpolynome und \u00fcberdeckungsprobleme","volume":"4","author":"Paul","year":"1975","journal-title":"Acta Inform."},{"year":"2009","series-title":"Causality: Models, Reasoning and Inference","author":"Pearl","key":"10.1016\/j.jss.2023.111915_b70"},{"year":"2017","series-title":"Elements of Causal Inference: Foundations and Learning Algorithms","author":"Peters","key":"10.1016\/j.jss.2023.111915_b71"},{"key":"10.1016\/j.jss.2023.111915_b72","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/S0167-6423(00)00018-6","article-title":"Feature integration using a feature construct","volume":"41","author":"Plath","year":"2001","journal-title":"Sci. Comput. Programm."},{"key":"10.1016\/j.jss.2023.111915_b73","series-title":"Proceedings of the 18th Symposium on Foundations of Computer Science","first-page":"46","article-title":"The temporal logic of programs","author":"Pnueli","year":"1977"},{"key":"10.1016\/j.jss.2023.111915_b74","series-title":"Proceedings of the 23rd Conference on Automated Software Engineering","first-page":"347","article-title":"Configuration lifting: Verification meets software configuration","author":"Post","year":"2008"},{"key":"10.1016\/j.jss.2023.111915_b75","series-title":"Proceedings of the 17th International Symposium on Software Testing and Analysis","first-page":"75","article-title":"Configuration-aware regression testing: An empirical study of sampling and prioritization","author":"Qu","year":"2008"},{"key":"10.1016\/j.jss.2023.111915_b76","article-title":"Variability-aware static analysis at scale: An empirical study","volume":"27","author":"Rhein","year":"2018","journal-title":"Trans. Softw. Eng. Methodol."},{"year":"1999","series-title":"Root Cause Analysis Handbook: A Guide To Effective Incident Investigation","author":"Risk","key":"10.1016\/j.jss.2023.111915_b77"},{"key":"10.1016\/j.jss.2023.111915_b78","series-title":"Proceedings of the 16th Symposium on High Assurance Systems Engineering","first-page":"173","article-title":"Modeling and verification for probabilistic properties in software product lines","author":"Rodrigues","year":"2015"},{"key":"10.1016\/j.jss.2023.111915_b79","first-page":"45","article-title":"Root cause analysis for beginners","volume":"37","author":"Rooney","year":"2004","journal-title":"Qual. Prog."},{"key":"10.1016\/j.jss.2023.111915_b80","series-title":"Proceedings of the 2012 International Symposium on Software Testing and Analysis","first-page":"309","article-title":"Isolating failure causes through test case generation","author":"R\u00f6\u00dfler","year":"2012"},{"key":"10.1016\/j.jss.2023.111915_b81","series-title":"Proceedings of the 10th Joint Meeting on Foundations of Software Engineering","first-page":"284","article-title":"Performance-influence models for highly configurable systems","author":"Siegmund","year":"2015"},{"key":"10.1016\/j.jss.2023.111915_b82","series-title":"Proceedings of the 34th International Conference on Software Engineering","first-page":"167","article-title":"Predicting performance via automated feature-interaction detection","author":"Siegmund","year":"2012"},{"key":"10.1016\/j.jss.2023.111915_b83","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.infsof.2012.07.020","article-title":"Scalable prediction of non-functional properties in software product lines: Footprint and memory consumption","volume":"55","author":"Siegmund","year":"2013","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.jss.2023.111915_b84","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1007\/s11219-011-9152-9","article-title":"SPL conqueror: Toward optimization of non-functional properties in software product lines","volume":"20","author":"Siegmund","year":"2012","journal-title":"Softw. Qual. J."},{"issue":"3","key":"10.1016\/j.jss.2023.111915_b85","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1145\/2637365.2517209","article-title":"Family-based performance measurement","volume":"49","author":"Siegmund","year":"2013","journal-title":"SIGPLAN Not."},{"year":"1997","series-title":"CUDD 3.0.0","author":"Somenzi","key":"10.1016\/j.jss.2023.111915_b86"},{"issue":"4","key":"10.1016\/j.jss.2023.111915_b87","doi-asserted-by":"crossref","first-page":"241","DOI":"10.2307\/1192297","article-title":"The relation between counterfactual (\u201cBut for\u201d) and causal reasoning: Experimental findings and implications for Jurors\u2019 decisions","volume":"64","author":"Spellman","year":"2001","journal-title":"Law Contemp. Probl.","ISSN":"https:\/\/id.crossref.org\/issn\/0023-9186","issn-type":"print"},{"key":"10.1016\/j.jss.2023.111915_b88","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/0885-064X(92)90033-8","article-title":"Polynomial-time algorithms for generation of prime implicants","volume":"8","author":"Strzemecki","year":"1992","journal-title":"J. Complexity"},{"key":"10.1016\/j.jss.2023.111915_b89","series-title":"Proceedings of the 7th Symposium on Leveraging Applications of Formal Methods, Vol. LNCS:9952","first-page":"114","article-title":"Statistical model checking for product lines","author":"ter Beek","year":"2016"},{"key":"10.1016\/j.jss.2023.111915_b90","series-title":"Proceedings of the 24th Systems and Software Product Line Conference","article-title":"A BDD for linux? The knowledge compilation challenge for variability","author":"Th\u00fcm","year":"2020"},{"key":"10.1016\/j.jss.2023.111915_b91","doi-asserted-by":"crossref","first-page":"6:1","DOI":"10.1145\/2580950","article-title":"A classification and survey of analysis strategies for software product lines","volume":"47","author":"Th\u00fcm","year":"2014","journal-title":"Comput. Surv."},{"key":"10.1016\/j.jss.2023.111915_b92","doi-asserted-by":"crossref","first-page":"1230","DOI":"10.1109\/TCAD.2005.855944","article-title":"Complexity of two-level logic minimization","volume":"25","author":"Umans","year":"2006","journal-title":"Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"key":"10.1016\/j.jss.2023.111915_b93","series-title":"Proceedings on the 22nd Symposium on Formal Methods, Vol. LNCS:10951","first-page":"329","article-title":"QFLan: A tool for the quantitative analysis of highly reconfigurable systems","author":"Vandin","year":"2018"},{"key":"10.1016\/j.jss.2023.111915_b94","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/s10515-020-00273-8","article-title":"ConfigCrusher: Towards white-box performance analysis for configurable systems","volume":"27","author":"Velez","year":"2020","journal-title":"Autom. Softw. Eng."},{"key":"10.1016\/j.jss.2023.111915_b95","series-title":"Proceedings of the 43rd International Conference on Software Engineering","article-title":"White-box analysis over machine learning: Modeling performance of configurable systems","author":"Velez","year":"2021"},{"key":"10.1016\/j.jss.2023.111915_b96","series-title":"Proceedings of the 37th International Conference on Software Engineering","first-page":"178","article-title":"Presence-condition simplification in highly configurable systems","author":"von Rhein","year":"2015"},{"key":"10.1016\/j.jss.2023.111915_b97","first-page":"841","article-title":"Counterfactual explanations without opening the black box: Automated decisions and the GDPR","volume":"31","author":"Wachter","year":"2017","journal-title":"Harv. J. Law Technol."},{"key":"10.1016\/j.jss.2023.111915_b98","series-title":"Proceedings of the 43rd International Conference on Software Engineering","article-title":"White-box performance-influence models: A profiling and learning approach","author":"Weber","year":"2021"},{"key":"10.1016\/j.jss.2023.111915_b99","first-page":"185","article-title":"Probabilistic theories of causation","author":"Williamson","year":"2009","journal-title":"Oxf. Handb. Causation"},{"key":"10.1016\/j.jss.2023.111915_b100","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/TSE.2006.8","article-title":"Covering arrays for efficient fault characterization in complex configuration spaces","volume":"32","author":"Yilmaz","year":"2006","journal-title":"Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2023.111915_b101","series-title":"Proceedings of the Workshop on Language Constructs for Describing Features","first-page":"11","article-title":"Feature-oriented description, formal methods, and DFC","author":"Zave","year":"2001"},{"key":"10.1016\/j.jss.2023.111915_b102","series-title":"Proceedings of the 10th Symposium on Foundations of Software Engineering","first-page":"1","article-title":"Isolating cause-effect chains from computer programs","author":"Zeller","year":"2002"},{"key":"10.1016\/j.jss.2023.111915_b103","series-title":"Proceedings of the 30th Conference on Automated Software Engineering","first-page":"365","article-title":"Performance prediction of configurable software systems by Fourier learning (T)","author":"Zhang","year":"2015"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121223003102?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121223003102?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T23:39:47Z","timestamp":1759016387000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121223003102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":103,"alternative-id":["S0164121223003102"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2023.111915","relation":{},"ISSN":["0164-1212"],"issn-type":[{"type":"print","value":"0164-1212"}],"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Feature causality","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2023.111915","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"111915"}}