{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T12:54:57Z","timestamp":1773924897060,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/icse.2013.6606594","type":"proceedings-article","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T14:38:03Z","timestamp":1380638283000},"page":"482-491","source":"Crossref","is-referenced-by-count":65,"title":["Strategies for product-line verification: Case studies and experiments"],"prefix":"10.1109","author":[{"given":"Sven","family":"Apel","sequence":"first","affiliation":[]},{"given":"Alexander","family":"von Rhein","sequence":"additional","affiliation":[]},{"given":"Philipp","family":"Wendler","sequence":"additional","affiliation":[]},{"given":"Armin","family":"Groslinger","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Beyer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587066"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1049\/ip-e.1983.0001"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.16"},{"key":"15","first-page":"151","article-title":"Model composition in product lines and feature interaction detection using critical pair analysis","volume":"4735","author":"jayaraman","year":"2007","journal-title":"Proc MoDELS LNCS"},{"key":"16","first-page":"311","article-title":"Results of the second feature interaction contest","author":"kolberg","year":"2000","journal-title":"Feature Interactions in Telecommunica-tions and Software Systems VI"},{"key":"13","author":"gruler","year":"2010","journal-title":"A Formal Approach to Software Product Lines"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1023\/B:AUSE.0000049208.84702.84"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806850"},{"key":"12","author":"czarnecki","year":"2000","journal-title":"Generative Programming Methods Tools and Applications"},{"key":"21","first-page":"196","article-title":"Automated incremental pairwise testing of software product lines","author":"oster","year":"2010","journal-title":"Proc SPLC LNCS 6287"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0075-7"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9160-9"},{"key":"23","first-page":"150","article-title":"Plug-and-play features","volume":"5","author":"plath","year":"1998","journal-title":"Feature Interactions in Telecommunications and Software Systems"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(00)00018-6"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.45"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.07.020"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/2094091.2094095"},{"key":"28","author":"thu?m","year":"2012","journal-title":"Analysis Strategies for Software Product Lines"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022920129859"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21461-5_3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100075"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985838"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070523"},{"key":"30","author":"von rhein","year":"2011","journal-title":"Introducing Binary Decision Diagrams in the Explicit-State Verification of Java Code"},{"key":"7","first-page":"241","article-title":"Improving the testing and testability of software product lines","volume":"6287","author":"cabral","year":"2010","journal-title":"Proc SPLC LNCS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36046-6_1"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37057-1_11"},{"key":"4","first-page":"184","article-title":"CPACHECKER: A tool for configurable software verification","volume":"6806","author":"beyer","year":"2011","journal-title":"Proc CAV LNCS"},{"key":"9","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s10703-006-0002-5","article-title":"Feature interaction detection by pairwise analysis of ltl properties: A case study","volume":"28","author":"calder","year":"2006","journal-title":"Formal Methods in System Design"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00352-3"}],"event":{"name":"2013 35th International Conference on Software Engineering (ICSE)","location":"San Francisco, CA, USA","start":{"date-parts":[[2013,5,18]]},"end":{"date-parts":[[2013,5,26]]}},"container-title":["2013 35th International Conference on Software Engineering (ICSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6596173\/6606539\/06606594.pdf?arnumber=6606594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T18:55:30Z","timestamp":1498071330000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6606594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icse.2013.6606594","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}