{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:08:54Z","timestamp":1773374934642,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["AP 206\/2-1"],"award-info":[{"award-number":["AP 206\/2-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1145\/1806799.1806819","type":"proceedings-article","created":{"date-parts":[[2010,6,8]],"date-time":"2010-06-08T12:37:34Z","timestamp":1276000654000},"page":"105-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":242,"title":["An analysis of the variability in forty preprocessor-based software product lines"],"prefix":"10.1145","author":[{"given":"J\u00f6rg","family":"Liebig","sequence":"first","affiliation":[{"name":"University of Passau"}]},{"given":"Sven","family":"Apel","sequence":"additional","affiliation":[{"name":"University of Passau"}]},{"given":"Christian","family":"Lengauer","sequence":"additional","affiliation":[{"name":"University of Passau"}]},{"given":"Christian","family":"K\u00e4stner","sequence":"additional","affiliation":[{"name":"University of Magdeburg"}]},{"given":"Michael","family":"Schulze","sequence":"additional","affiliation":[{"name":"University of Magdeburg"}]}],"member":"320","published-online":{"date-parts":[[2010,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1509239.1509274"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1404953.1404954"},{"key":"e_1_3_2_1_4_1","volume-title":"How AspectJ is Used: An Analysis of Eleven AspectJ Programs. Journal of Object Technology (JOT), 9(1):117--142","author":"Apel S.","year":"2010","unstructured":"S. Apel . How AspectJ is Used: An Analysis of Eleven AspectJ Programs. Journal of Object Technology (JOT), 9(1):117--142 , 2010 . S. Apel. How AspectJ is Used: An Analysis of Eleven AspectJ Programs. Journal of Object Technology (JOT), 9(1):117--142, 2010."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70770"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.23"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"e_1_3_2_1_8_1","volume-title":"Software Product Lines: Practices and Patterns","author":"Clements P.","year":"2002","unstructured":"P. Clements and L. Northrop . Software Product Lines: Practices and Patterns . Addison-Wesley , 2002 . P. Clements and L. Northrop. Software Product Lines: Practices and Patterns. Addison-Wesley, 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/976270.976279"},{"key":"e_1_3_2_1_11_1","volume-title":"Generative Programming: Methods, Tools, and Applications","author":"Czarnecki K.","year":"2000","unstructured":"K. Czarnecki and U. Eisenecker . Generative Programming: Methods, Tools, and Applications . Addison-Wesley , 2000 . K. Czarnecki and U. Eisenecker. Generative Programming: Methods, Tools, and Applications. Addison-Wesley, 2000."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1158288"},{"key":"e_1_3_2_1_13_1","first-page":"329","volume-title":"Proceedings of the International Conference on Software Maintenance (ICSM)","author":"Favre J.","year":"1996","unstructured":"J. Favre . Preprocessors from an Abstract Point of View . In Proceedings of the International Conference on Software Maintenance (ICSM) , pages 329 -- 339 . IEEE CS, 1996 . J. Favre. Preprocessors from an Abstract Point of View. In Proceedings of the International Conference on Software Maintenance (ICSM), pages 329--339. IEEE CS, 1996."},{"key":"e_1_3_2_1_14_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler M.","year":"1999","unstructured":"M. Fowler . Refactoring: Improving the Design of Existing Code . Addison-Wesley , 1999 . M. Fowler. Refactoring: Improving the Design of Existing Code. Addison-Wesley, 1999."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/512035.512039"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1308171.1308204"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368131"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1621607.1621632"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177732186"},{"key":"e_1_3_2_1_21_1","volume-title":"The C Programming Language","author":"Kernighan B.","year":"1988","unstructured":"B. Kernighan and D. Ritchie . The C Programming Language . Prentice-Hall , 1988 . B. Kernighan and D. Ritchie. The C Programming Language. Prentice-Hall, 1988."},{"key":"e_1_3_2_1_22_1","first-page":"220","volume-title":"Aspect-Oriented Programming. In Proceedings of the European Conference on Object-Oriented Programming (ECOOP)","author":"Kiczales G.","year":"1997","unstructured":"G. Kiczales , J. Lamping , A. Mendhekar , C. Maeda , C. Lopes , J. Loingtier , and J. Irwin . Aspect-Oriented Programming. In Proceedings of the European Conference on Object-Oriented Programming (ECOOP) , pages 220 -- 242 . Springer-Verlag , 1997 . G. Kiczales, J. Lamping, A. Mendhekar, C. Maeda, C. Lopes, J. Loingtier, and J. Irwin. Aspect-Oriented Programming. In Proceedings of the European Conference on Object-Oriented Programming (ECOOP), pages 220--242. Springer-Verlag, 1997."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/257734.257742"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1158337.1158684"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20040255"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/381473.381502"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-28901-1","volume-title":"Software Product Line Engineering: Foundations, Principles and Techniques","author":"Pohl K.","year":"2005","unstructured":"K. Pohl , G. B\u00f6ckle , and F. van der Linden . Software Product Line Engineering: Foundations, Principles and Techniques . Springer-Verlag , 2005 . K. Pohl, G. B\u00f6ckle, and F. van der Linden. Software Product Line Engineering: Foundations, Principles and Techniques. Springer-Verlag, 2005."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1404891.1404899"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2009.07.013"},{"key":"e_1_3_2_1_30_1","first-page":"20","volume-title":"Proceedings of the GPCE Workshop on Aspect-Oriented Product Line Engineering (AOPLE)","author":"Rosenm\u00fcller M.","year":"2007","unstructured":"M. Rosenm\u00fcller , M. Kuhlemann , N. Siegmund , and H. Schirmeier . Avoiding Variability of Method Signatures in Software Product Lines: A Case Study . In Proceedings of the GPCE Workshop on Aspect-Oriented Product Line Engineering (AOPLE) , pages 20 -- 25 , 2007 . http:\/\/www.softeng.ox.ac.uk\/aople\/. M. Rosenm\u00fcller, M. Kuhlemann, N. Siegmund, and H. Schirmeier. Avoiding Variability of Method Signatures in Software Product Lines: A Case Study. In Proceedings of the GPCE Workshop on Aspect-Oriented Product Line Engineering (AOPLE), pages 20--25, 2007. http:\/\/www.softeng.ox.ac.uk\/aople\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/646155.679703"},{"key":"e_1_3_2_1_32_1","first-page":"185","volume-title":"Proceedings of the USENIX Technical Conference","author":"Spencer H.","year":"1992","unstructured":"H. Spencer and G. Collyer . #ifdef Considered Harmful, or Portability Experience with C News . In Proceedings of the USENIX Technical Conference , pages 185 -- 197 . USENIX Association Berkeley , 1992 . H. Spencer and G. Collyer. #ifdef Considered Harmful, or Portability Experience with C News. In Proceedings of the USENIX Technical Conference, pages 185--197. USENIX Association Berkeley, 1992."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1245303"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081734"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/872754.873566"}],"event":{"name":"ICSE '10: 32nd International Conference on Software Engineering","location":"Cape Town South Africa","acronym":"ICSE '10","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering - Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1806799.1806819","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1806799.1806819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:37Z","timestamp":1750246777000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1806799.1806819"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":32,"alternative-id":["10.1145\/1806799.1806819","10.1145\/1806799"],"URL":"https:\/\/doi.org\/10.1145\/1806799.1806819","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]},"assertion":[{"value":"2010-05-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}