{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:04:00Z","timestamp":1774602240080,"version":"3.50.1"},"reference-count":104,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-17-CE25-0010"],"award-info":[{"award-number":["ANR-17-CE25-0010"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/tse.2021.3116768","type":"journal-article","created":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T21:08:29Z","timestamp":1633036109000},"page":"4274-4290","source":"Crossref","is-referenced-by-count":25,"title":["Transfer Learning Across Variants and Versions: The Case of Linux Kernel Size"],"prefix":"10.1109","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6093-2358","authenticated-orcid":false,"given":"Hugo","family":"Martin","sequence":"first","affiliation":[{"name":"Inria, CNRS, IRISA, University Rennes, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1483-3858","authenticated-orcid":false,"given":"Mathieu","family":"Acher","sequence":"additional","affiliation":[{"name":"Inria, CNRS, IRISA, University Rennes, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0799-2829","authenticated-orcid":false,"given":"Juliana Alves","family":"Pereira","sequence":"additional","affiliation":[{"name":"PUC-Rio, Rio de Janeiro, RJ, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8967-8154","authenticated-orcid":false,"given":"Luc","family":"Lesoil","sequence":"additional","affiliation":[{"name":"Inria, CNRS, IRISA, University Rennes, Rennes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0582-9745","authenticated-orcid":false,"given":"Jean-Marc","family":"Jezequel","sequence":"additional","affiliation":[{"name":"Inria, CNRS, IRISA, University Rennes, Rennes, France"}]},{"given":"Djamel Eddine","family":"Khelladi","sequence":"additional","affiliation":[{"name":"Inria, CNRS, IRISA, University Rennes, Rennes, France"}]}],"member":"263","reference":[{"key":"ref39","year":"2019"},{"key":"ref38","year":"2019"},{"key":"ref33","article-title":"Learning very large configuration spaces: What matters for linux kernel sizes","author":"acher","year":"2019"},{"key":"ref32","article-title":"BoF: Embedded Linux size","author":"opdenacker","year":"2018"},{"key":"ref31","year":"0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/299157.299165"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359640"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2018.8547554"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3358960.3379137"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3393691.3394215"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416573"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606584"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227206"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115661"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3358960.3379127"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236074"},{"key":"ref24","first-page":"1305","article-title":"Active transfer learning under model shift","author":"wang","year":"2014","journal-title":"Proc 31th Int Conf Mach Learn"},{"key":"ref23","first-page":"43","article-title":"Transfer learning for performance modeling of deep neural network systems","author":"iqbal","year":"2019","journal-title":"Proc USENIX Conf Oper Mach Learn"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9300-5"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9557-6"},{"key":"ref25","article-title":"Experience transfer for the configuration tuning of large scale computing systems","author":"chen","year":"2012"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15579-6_10"},{"key":"ref50","article-title":"Learning from thousands of build failures of Linux kernel configurations","author":"acher","year":"2019"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106251"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.4121211"},{"key":"ref57","year":"0","journal-title":"Kafka"},{"key":"ref56","year":"0","journal-title":"Opencv"},{"key":"ref55","year":"0","journal-title":"Apache Cassandra"},{"key":"ref54","year":"0","journal-title":"Clang"},{"key":"ref53","year":"0","journal-title":"GCC"},{"key":"ref52","year":"0","journal-title":"Curl"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2866614.2866615"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-018-0662-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227196"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-017-0610-0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2934466.2934469"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-017-0225-2"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3030216"},{"key":"ref49","year":"0","journal-title":"KernelCI"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3071178.3071261"},{"key":"ref46","first-page":"973","article-title":"Meltdown: Reading kernel memory from user space","author":"lipp","year":"2018","journal-title":"Proc 27th USENIX Conf Secur Symp"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236074"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2983927"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236074"},{"key":"ref41","first-page":"108","article-title":"API design for machine learning software: Experiences from the scikit-learn project","author":"buitinck","year":"2013","journal-title":"Proc ECML PKDD Workshop Lang Data Mining Mach Learn"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3461001.3471155"},{"key":"ref43","author":"molnar","year":"2019","journal-title":"Interpretable Machine Learning"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.62"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9510-8"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-015-0472-2"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2884911"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2866614.2866615"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2934466.2934472"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106287"},{"key":"ref75","first-page":"601","article-title":"Coccinelle: 10 years of automated evolution in the Linux kernel","author":"lawall","year":"2018","journal-title":"Proc USENIX Conf USENIX Annu Tech Conf"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9573-6"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106238"},{"key":"ref60","first-page":"469","article-title":"CherryPick: Adaptively unearthing the best cloud configurations for big data analytics","author":"alipourfard","year":"2017","journal-title":"Proc 14th USENIX Conf Netw Syst Des Implementation"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00032"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238175"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39799-8_40"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46681-0_25"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180248"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3149119"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642990"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9152-9"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2415793"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111044"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.2968520"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539857"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273521"},{"key":"ref92","article-title":"Overcoming negative transfer: A survey","author":"zhang","year":"2020"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970339"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-020-00273-8"},{"key":"ref104","first-page":"31","article-title":"A study of Linux file system evolution","author":"lu","year":"2013","journal-title":"Proc 11th USENIX Conf File Storage Technol"},{"key":"ref103","first-page":"601","article-title":"Coccinelle: 10 years of automated evolution in the Linux kernel","author":"lawall","year":"2018","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9364-x"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890733"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973924"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-017-0220-7"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2720603"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2870895"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2019.00015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00112"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693089"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.45"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786845"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064029"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115661"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-016-0043-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-017-0089-0"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2897053.2897058"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2017.11"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786845"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.45"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00100"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791101"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SPLC.2011.20"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2870895"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00099"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9946941\/09555247.pdf?arnumber=9555247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:35:52Z","timestamp":1670873752000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9555247\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":104,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tse.2021.3116768","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]}}}