{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:39:06Z","timestamp":1760027946444,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2568225.2568283","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"140-151","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":94,"title":["Mining configuration constraints: static analyses and empirical results"],"prefix":"10.1145","author":[{"given":"Sarah","family":"Nadi","sequence":"first","affiliation":[{"name":"University of Waterloo, Canada"}]},{"given":"Thorsten","family":"Berger","sequence":"additional","affiliation":[{"name":"IT University of Copenhagen, Denmark"}]},{"given":"Christian","family":"K\u00e4stner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Krzysztof","family":"Czarnecki","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"CDLTools. https:\/\/bitbucket.org\/tberger\/cdltools.  CDLTools. https:\/\/bitbucket.org\/tberger\/cdltools."},{"key":"e_1_3_2_1_2_1","unstructured":"FARCE. https:\/\/bitbucket.org\/tberger\/farce.  FARCE. https:\/\/bitbucket.org\/tberger\/farce."},{"key":"e_1_3_2_1_3_1","unstructured":"KBuildMiner. http:\/\/code.google.com\/p\/variability\/ wiki\/PresenceConditionsExtraction.  KBuildMiner. http:\/\/code.google.com\/p\/variability\/ wiki\/PresenceConditionsExtraction."},{"key":"e_1_3_2_1_4_1","unstructured":"LVAT. http:\/\/code.google.com\/p\/ linux-variability-analysis-tools.  LVAT. http:\/\/code.google.com\/p\/ linux-variability-analysis-tools."},{"key":"e_1_3_2_1_5_1","unstructured":"Online appendix. http:\/\/gsd.uwaterloo.ca\/farce.  Online appendix. http:\/\/gsd.uwaterloo.ca\/farce."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/827253.827741"},{"key":"e_1_3_2_1_7_1","first-page":"290","volume-title":"Proceedings of the Working Conference on Reverse Engineering (WCRE)","author":"Baxter I.","unstructured":"I. Baxter and M. Mehlich . Preprocessor conditional removal by simple partial evaluation . In Proceedings of the Working Conference on Reverse Engineering (WCRE) , pages 281\u2013 290 . IEEE Computer Society, 2001. I. Baxter and M. Mehlich. Preprocessor conditional removal by simple partial evaluation. In Proceedings of the Working Conference on Reverse Engineering (WCRE), pages 281\u2013290. IEEE Computer Society, 2001."},{"key":"e_1_3_2_1_8_1","first-page":"463","volume-title":"Proceedings of the European Software Engineering Conference\/Foundations of Software Engineering (ESEC\/FSE)","author":"Bayer J.","unstructured":"J. Bayer , J.-F. Girard , M. W\u00fcrthner , J.-M. DeBaud , and M. Apel . Transitioning legacy assets to a product line architecture . In Proceedings of the European Software Engineering Conference\/Foundations of Software Engineering (ESEC\/FSE) , pages 446\u2013 463 . Springer, 1999. J. Bayer, J.-F. Girard, M. W\u00fcrthner, J.-M. DeBaud, and M. Apel. Transitioning legacy assets to a product line architecture. In Proceedings of the European Software Engineering Conference\/Foundations of Software Engineering (ESEC\/FSE), pages 446\u2013463. Springer, 1999."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.01.001"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430502.2430513"},{"key":"e_1_3_2_1_11_1","unstructured":"T. Berger and S. She. Formal semantics of the CDL language. Technical Note. Available at www.informatik. uni-leipzig.de\/~berger\/cdl_semantics.pdf.  T. Berger and S. She. Formal semantics of the CDL language. Technical Note. Available at www.informatik. uni-leipzig.de\/~berger\/cdl_semantics.pdf."},{"key":"e_1_3_2_1_12_1","volume-title":"W \u02db asowski. Feature-to-Code mapping in two large product lines. Technical report","author":"Berger T.","year":"2010","unstructured":"T. Berger , S. She , K. Czarnecki , and A. W \u02db asowski. Feature-to-Code mapping in two large product lines. Technical report , University of Leipzig , 2010 . T. Berger, S. She, K. Czarnecki, and A. W \u02db asowski. Feature-to-Code mapping in two large product lines. Technical report, University of Leipzig, 2010."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.34"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859010"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2491976"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162049.2162052"},{"key":"e_1_3_2_1_18_1","volume-title":"Generative Programming: Methods, Tools, and Applications","author":"Czarnecki K.","year":"2000","unstructured":"K. Czarnecki and U. W. Eisenecker . Generative Programming: Methods, Tools, and Applications . Addison-Wesley , Boston, MA , 2000 . K. Czarnecki and U. W. Eisenecker. Generative Programming: Methods, Tools, and Applications. Addison-Wesley, Boston, MA, 2000."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1173706.1173738"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491455"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0076-6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.39"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110147.2110164"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2211616.2211617"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048128"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384673"},{"key":"e_1_3_2_1_28_1","first-page":"16","volume-title":"Safe and Secure Software Reuse","author":"Le D.","unstructured":"D. Le , H. Lee , K. Kang , and L. Keun . Validating consistency between a feature model and its implementation . In Safe and Secure Software Reuse , volume 7925 , pages 1\u2013 16 . Springer, 2013. D. Le, H. Lee, K. Kang, and L. Keun. Validating consistency between a feature model and its implementation. In Safe and Secure Software Reuse, volume 7925, pages 1\u201316. Springer, 2013."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806819"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491437"},{"key":"e_1_3_2_1_31_1","first-page":"150","volume-title":"Software Product Lines: Going Beyond","author":"Lotufo R.","unstructured":"R. Lotufo , S. She , T. Berger , K. Czarnecki , and A. W \u02db asowski. Evolution of the Linux kernel variability model . In Software Product Lines: Going Beyond , volume 6287 , pages 136\u2013 150 . Springer, 2010. R. Lotufo, S. She, T. Berger, K. Czarnecki, and A. W \u02db asowski. Evolution of the Linux kernel variability model. In Software Product Lines: Going Beyond, volume 6287, pages 136\u2013150. Springer, 2010."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.21"},{"key":"e_1_3_2_1_33_1","volume-title":"Journal of Software: Evolution and Process","author":"Nadi S.","year":"2013","unstructured":"S. Nadi and R. Holt . The Linux kernel: A case study of build system variability . Journal of Software: Evolution and Process , 2013 . Early online view. http:\/\/dx.doi.org\/10.1002\/smr.1595. S. Nadi and R. Holt. The Linux kernel: A case study of build system variability. Journal of Software: Evolution and Process, 2013. Early online view. http:\/\/dx.doi.org\/10.1002\/smr.1595."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568300"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00722-4_9"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491627.2491628"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2019136.2019139"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985812"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806864"},{"key":"e_1_3_2_1_40_1","unstructured":"S. She and T. Berger. Formal semantics of the Kconfig language. Technical Note. Available at eng.uwaterloo. ca\/~shshe\/kconfig_semantics.pdf.  S. She and T. Berger. Formal semantics of the Kconfig language. Technical Note. Available at eng.uwaterloo. ca\/~shshe\/kconfig_semantics.pdf."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the International Workshop on Variability Modelling of Software-intensive Systems (VaMoS)","author":"She S.","year":"2010","unstructured":"S. She , R. Lotufo , T. Berger , A. Wasowski , and K. Czarnecki . The variability model of the Linux kernel . In Proceedings of the International Workshop on Variability Modelling of Software-intensive Systems (VaMoS) , 2010 . S. She, R. Lotufo, T. Berger, A. Wasowski, and K. Czarnecki. The variability model of the Linux kernel. In Proceedings of the International Workshop on Variability Modelling of Software-intensive Systems (VaMoS), 2010."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985856"},{"key":"e_1_3_2_1_43_1","first-page":"282","volume-title":"Proceedings of the International Software Product Line Conference (SPLC)","volume":"2379","author":"Simon D.","unstructured":"D. Simon and T. Eisenbarth . Evolutionary introduction of software product lines . In Proceedings of the International Software Product Line Conference (SPLC) , volume 2379 , pages 272\u2013 282 . Springer, 2002. D. Simon and T. Eisenbarth. Evolutionary introduction of software product lines. In Proceedings of the International Software Product Line Conference (SPLC), volume 2379, pages 272\u2013282. Springer, 2002."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the International Workshop on Open Source Software and Product Lines (SPLC-OSSPL)","author":"Sincero J.","year":"2007","unstructured":"J. Sincero , H. Schirmeier , W. Schr\u00f6der-Preikschat , and O. Spinczyk . Is the Linux kernel a software product line ? In Proceedings of the International Workshop on Open Source Software and Product Lines (SPLC-OSSPL) , 2007 . J. Sincero, H. Schirmeier, W. Schr\u00f6der-Preikschat, and O. Spinczyk. Is the Linux kernel a software product line? In Proceedings of the International Workshop on Open Source Software and Product Lines (SPLC-OSSPL), 2007."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868294.1868300"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2001.948405"},{"key":"e_1_3_2_1_47_1","first-page":"660","volume-title":"Proceedings of the International Conference Software Engineering (ICSE)","author":"Tamrawi A.","unstructured":"A. Tamrawi , H. A. Nguyen , H. V. Nguyen , and T. N. Nguyen . Build code analysis with symbolic evaluation . In Proceedings of the International Conference Software Engineering (ICSE) , pages 650\u2013 660 . IEEE Computer Society, 2012. A. Tamrawi, H. A. Nguyen, H. V. Nguyen, and T. N. Nguyen. Build code analysis with symbolic evaluation. In Proceedings of the International Conference Software Engineering (ICSE), pages 650\u2013660. IEEE Computer Society, 2012."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966451"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1289971.1289989"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580950"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070526"},{"key":"e_1_3_2_1_52_1","unstructured":"B. Veer and J. Dallaway. The eCos component writer\u2019s guide. ecos.sourceware.org\/ecos\/docs-latest\/ cdl-guide\/cdl-guide.html.  B. Veer and J. Dallaway. The eCos component writer\u2019s guide. ecos.sourceware.org\/ecos\/docs-latest\/ cdl-guide\/cdl-guide.html."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPLC.2008.16"},{"key":"e_1_3_2_1_54_1","first-page":"68","volume-title":"Proceedings of the International Conference Software Engineering (ICSE)","author":"Xiong Y.","unstructured":"Y. Xiong , A. Hubaux , S. She , and K. Czarnecki . Generating range fixes for software configuration . In Proceedings of the International Conference Software Engineering (ICSE) , pages 58\u2013 68 . IEEE Computer Society, 2012. Y. Xiong, A. Hubaux, S. She, and K. Czarnecki. Generating range fixes for software configuration. In Proceedings of the International Conference Software Engineering (ICSE), pages 58\u201368. IEEE Computer Society, 2012."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364412.2364428"},{"key":"e_1_3_2_1_56_1","unstructured":"R. Zippel and contributors. kconfig-language.txt. available in the kernel tree at www.kernel.org.  R. Zippel and contributors. kconfig-language.txt. available in the kernel tree at www.kernel.org."}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568283","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2568225.2568283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:30Z","timestamp":1750234230000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2568225.2568283"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":54,"alternative-id":["10.1145\/2568225.2568283","10.1145\/2568225"],"URL":"https:\/\/doi.org\/10.1145\/2568225.2568283","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}