{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:03:51Z","timestamp":1774602231059,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,10,4]],"date-time":"2009-10-04T00:00:00Z","timestamp":1254614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,10,4]]},"DOI":"10.1145\/1621607.1621632","type":"proceedings-article","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T14:23:22Z","timestamp":1254839002000},"page":"157-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["A model of refactoring physically and virtually separated features"],"prefix":"10.1145","author":[{"given":"Christian","family":"K\u00e4stner","sequence":"first","affiliation":[{"name":"University of Magdeburg, Magdeburg, Germany"}]},{"given":"Sven","family":"Apel","sequence":"additional","affiliation":[{"name":"University of Passau, Passau, Germany"}]},{"given":"Martin","family":"Kuhlemann","sequence":"additional","affiliation":[{"name":"University of Magdeburg, Magdeburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2009,10,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1509239.1509274"},{"key":"e_1_3_2_1_2_1","volume-title":"How AspectJ is Used: An Analysis of Eleven AspectJ Programs. Journal of Object Technology (JOT), 9(1)","author":"Apel S.","year":"2010","unstructured":"S. Apel . How AspectJ is Used: An Analysis of Eleven AspectJ Programs. Journal of Object Technology (JOT), 9(1) , 2010 . S. Apel. How AspectJ is Used: An Analysis of Eleven AspectJ Programs. Journal of Object Technology (JOT), 9(1), 2010."},{"key":"e_1_3_2_1_3_1","volume-title":"An Overview of Feature-Oriented Software Development. Journal of Object Technology (JOT), 8(5):49--84","author":"Apel S.","year":"2009","unstructured":"S. Apel and C. K\u00e4stner . An Overview of Feature-Oriented Software Development. Journal of Object Technology (JOT), 8(5):49--84 , 2009 . S. Apel and C. K\u00e4stner. An Overview of Feature-Oriented Software Development. Journal of Object Technology (JOT), 8(5):49--84, 2009."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449913.1449938"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449913.1449931"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070523"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACOM.2007.7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70770"},{"key":"e_1_3_2_1_9_1","volume-title":"Software Architecture in Practice","author":"Bass L.","year":"1998","unstructured":"L. Bass , P. Clements , and R. Kazman . Software Architecture in Practice . Addison-Wesley , 1998 . L. Bass, P. Clements, and R. Kazman. Software Architecture in Practice. Addison-Wesley, 1998."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554844_3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.23"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/832308.837146"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094826"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2003.04.005"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025115.1025235"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218563.1218586"},{"issue":"4","key":"e_1_3_2_1_17_1","first-page":"28","volume":"19","author":"Clements P.","year":"2002","unstructured":"P. Clements and C. Krueger . Point\/Counterpoint: Being Proactive Pays Off\/Eliminating the Adoption Barrier. IEEE Software , 19 ( 4 ): 28 -- 31 , 2002 . P. Clements and C. Krueger. Point\/Counterpoint: Being Proactive Pays Off\/Eliminating the Adoption Barrier. IEEE Software, 19(4):28--31, 2002.","journal-title":"Point\/Counterpoint: Being Proactive Pays Off\/Eliminating the Adoption Barrier. IEEE Software"},{"key":"e_1_3_2_1_18_1","volume-title":"Generative Programming: Methods, Tools, and Applications","author":"Czarnecki K.","year":"2000","unstructured":"K. Czarnecki and U. Eisenecker . Generative Programming: Methods, Tools, and Applications . ACM Press\/Addison-Wesley , 2000 . K. Czarnecki and U. Eisenecker. Generative Programming: Methods, Tools, and Applications. ACM Press\/Addison-Wesley, 2000."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1173706.1173738"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595733"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1158288"},{"key":"e_1_3_2_1_22_1","volume-title":"Improving the Design of Existing Code","author":"Fowler M.","year":"1999","unstructured":"M. Fowler . Refactoring. Improving the Design of Existing Code . Addison-Wesley , 1999 . M. Fowler. Refactoring. Improving the Design of Existing Code. Addison-Wesley, 1999."},{"key":"e_1_3_2_1_23_1","first-page":"810","volume-title":"Proc. Int'l Conf. Software Engineering (ICSE)","author":"Jarzabek S.","year":"2003","unstructured":"S. Jarzabek , P. Bassett , H. Zhang , and W. Zhang . XVCL: XMLbased Variant Configuration Language . In Proc. Int'l Conf. Software Engineering (ICSE) , pages 810 -- 811 . 2003 . S. Jarzabek, P. Bassett, H. Zhang, and W. Zhang. XVCL: XMLbased Variant Configuration Language. In Proc. Int'l Conf. Software Engineering (ICSE), pages 810--811. 2003."},{"key":"e_1_3_2_1_24_1","first-page":"35","volume-title":"Proc. GPCE Workshop on Modularization, Composition and Generative Techniques for Product Line Engineering","author":"K\u00e4stner C.","year":"2008","unstructured":"C. K\u00e4stner and S. Apel . Integrating Compositional and Annotative Approaches for Product Line Engineering . In Proc. GPCE Workshop on Modularization, Composition and Generative Techniques for Product Line Engineering , pages 35 -- 40 , 2008 . C. K\u00e4stner and S. Apel. Integrating Compositional and Annotative Approaches for Product Line Engineering. In Proc. GPCE Workshop on Modularization, Composition and Generative Techniques for Product Line Engineering, pages 35--40, 2008."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.36"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368131"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02571-6_11"},{"key":"e_1_3_2_1_29_1","first-page":"220","volume-title":"Aspect-Oriented Programming. In Proc. Europ. Conf. Object-Oriented Programming (ECOOP)","author":"Kiczales G.","year":"1997","unstructured":"G. Kiczales , J. Lamping , A. Menhdhekar , C. Maeda , C. Lopes , J.-M. Loingtier , and J. Irwin . Aspect-Oriented Programming. In Proc. Europ. Conf. Object-Oriented Programming (ECOOP) , pages 220 -- 242 . 1997 . G. Kiczales, J. Lamping, A. Menhdhekar, C. Maeda, C. Lopes, J.-M. Loingtier, and J. Irwin. Aspect-Oriented Programming. In Proc. Europ. Conf. Object-Oriented Programming (ECOOP), pages 220--242. 1997."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449913.1449919"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/648114.748909"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04211-9_11"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134303"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/645418.652082"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45070-2_2"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/381473.381502"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/648033.744208"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-28901-1","volume-title":"Software Product Line Engineering: Foundations, Principles and Techniques","author":"Pohl K.","year":"2005","unstructured":"K. Pohl , G. B\u00f6ckle , and F. J. van der Linden . Software Product Line Engineering: Foundations, Principles and Techniques . Springer-Verlag , 2005 . K. Pohl, G. B\u00f6ckle, and F. J. van der Linden. Software Product Line Engineering: Foundations, Principles and Techniques. Springer-Verlag, 2005."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1016"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053389"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1404891.1404899"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581390"},{"key":"e_1_3_2_1_44_1","first-page":"185","volume-title":"Proc. USENIX Conf.","author":"Spencer H.","year":"1992","unstructured":"H. Spencer and G. Collyer . #ifdef Considered Harmful or Portability Experience With C News . In Proc. USENIX Conf. , pages 185 -- 198 , 1992 . H. Spencer and G. Collyer. #ifdef Considered Harmful or Portability Experience With C News. In Proc. USENIX Conf., pages 185--198, 1992."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297064"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1289971.1289989"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/872754.873566"}],"event":{"name":"GPCE'09: Generative Programming and Component Engineering","location":"Denver Colorado USA","acronym":"GPCE'09","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the eighth international conference on Generative programming and component engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1621607.1621632","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1621607.1621632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:17:46Z","timestamp":1750234666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1621607.1621632"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,4]]},"references-count":45,"alternative-id":["10.1145\/1621607.1621632","10.1145\/1621607"],"URL":"https:\/\/doi.org\/10.1145\/1621607.1621632","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1837852.1621632","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2009,10,4]]},"assertion":[{"value":"2009-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}