{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:30Z","timestamp":1750306650812,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"French BGLE project CONNEXION"},{"name":"European ITEA2 project MERgE","award":["ITEA2 11011"],"award-info":[{"award-number":["ITEA2 11011"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2642937.2643000","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"433-444","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Automating the formalization of product comparison matrices"],"prefix":"10.1145","author":[{"given":"Guillaume","family":"B\u00e9can","sequence":"first","affiliation":[{"name":"Inria - IRISA, Rennes, France"}]},{"given":"Nicolas","family":"Sannier","sequence":"additional","affiliation":[{"name":"Inria - IRISA, Rennes, France"}]},{"given":"Mathieu","family":"Acher","sequence":"additional","affiliation":[{"name":"Inria - IRISA, Rennes, France"}]},{"given":"Olivier","family":"Barais","sequence":"additional","affiliation":[{"name":"Inria - IRISA, Rennes, France"}]},{"given":"Arnaud","family":"Blouin","sequence":"additional","affiliation":[{"name":"Inria - IRISA, Rennes, France"}]},{"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"Inria - IRISA, Rennes, France"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140335.1140346"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2006.06.001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362536.2362553"},{"key":"e_1_3_2_1_4_1","volume-title":"INRIA, oct","author":"B\u00e9can G.","year":"2013","unstructured":"G. B\u00e9can , M. Acher , B. Baudry , and S. Ben Nasr . Breathing ontological knowledge into feature model management. Rapport Technique RT-0441 , INRIA, oct 2013 . G. B\u00e9can, M. Acher, B. Baudry, and S. Ben Nasr. Breathing ontological knowledge into feature model management. Rapport Technique RT-0441, INRIA, oct 2013."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430502.2430513"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486982"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2009.04.002"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33666-9_2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2010.22"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337427"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31128-4_15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987434.1987453"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491455"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568316"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101929"},{"key":"e_1_3_2_1_16_1","first-page":"187","volume-title":"Moreira et al. {33}","author":"Faunes M.","unstructured":"M. Faunes , J. J. Cadavid , B. Baudry , H. A. Sahraoui , and B. Combemale . Automatically searching for metamodel well-formedness rules in examples and counter-examples . In Moreira et al. {33} , pages 187 -- 202 . M. Faunes, J. J. Cadavid, B. Baudry, H. A. Sahraoui, and B. Combemale. Automatically searching for metamodel well-formedness rules in examples and counter-examples. In Moreira et al. {33}, pages 187--202."},{"key":"e_1_3_2_1_17_1","first-page":"35","volume-title":"Moreira et al. {33}","author":"Francis M.","unstructured":"M. Francis , D. S. Kolovos , N. D. Matragkas , and R. F. Paige . Adding spreadsheets to the mde toolkit . In Moreira et al. {33} , pages 35 -- 51 . M. Francis, D. S. Kolovos, N. D. Matragkas, and R. F. Paige. Adding spreadsheets to the mde toolkit. In Moreira et al. {33}, pages 35--51."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.39"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1994.1047"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337275"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1883978.1883984"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985855"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405300"},{"key":"e_1_3_2_1_24_1","volume-title":"Twelve","author":"Iyengar S.","year":"2010","unstructured":"S. Iyengar . The Art of Choosing . Twelve , 2010 . S. Iyengar. The Art of Choosing. Twelve, 2010."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39200-9_8"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38709-8_18"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.08.003"},{"key":"e_1_3_2_1_28_1","first-page":"7","volume-title":"Proceedings of the 9th OOPSLA Workshop on Domain-Specific Modeling (DSM'09)","author":"Karsai G.","year":"2009","unstructured":"G. Karsai , H. Krahn , C. Pinkernell , B. Rumpe , M. Schneider , and S. V\u00f6lkel . Design guidelines for domain specific languages. In M. Rossi, J. Sprinkle, J. Gray, and J.-P. Tolvanen, editors , Proceedings of the 9th OOPSLA Workshop on Domain-Specific Modeling (DSM'09) , pages 7 -- 13 , 2009 . G. Karsai, H. Krahn, C. Pinkernell, B. Rumpe, M. Schneider, and S. V\u00f6lkel. Design guidelines for domain specific languages. In M. Rossi, J. Sprinkle, J. Gray, and J.-P. Tolvanen, editors, Proceedings of the 9th OOPSLA Workshop on Domain-Specific Modeling (DSM'09), pages 7--13, 2009."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.109"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.39"},{"key":"e_1_3_2_1_31_1","first-page":"1","volume-title":"Software & Systems Modeling","author":"L\u00f3pez-Fern\u00e1ndez J.","year":"2013","unstructured":"J. L\u00f3pez-Fern\u00e1ndez , J. S. Cuadrado , E. Guerra , and J. de Lara . Example-driven meta-model development . Software & Systems Modeling , pages 1 -- 25 , 2013 . J. L\u00f3pez-Fern\u00e1ndez, J. S. Cuadrado, E. Guerra, and J. de Lara. Example-driven meta-model development. Software & Systems Modeling, pages 1--25, 2013."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568231"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41533-3"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/271074.271084"},{"key":"e_1_3_2_1_35_1","volume-title":"Thinking is bad: Implications of human error research for spreadsheet research and practice. CoRR, abs\/0801.3114","author":"Panko R. R.","year":"2008","unstructured":"R. R. Panko . Thinking is bad: Implications of human error research for spreadsheet research and practice. CoRR, abs\/0801.3114 , 2008 . R. R. Panko. Thinking is bad: Implications of human error research for spreadsheet research and practice. CoRR, abs\/0801.3114, 2008."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693116"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556624.2556636"},{"key":"e_1_3_2_1_38_1","volume-title":"DSL Engineering - Designing, Implementing and Using Domain-Specific Languages. dslbook.org","author":"Voelter M.","year":"2013","unstructured":"M. Voelter , S. Benz , C. Dietrich , B. Engelmann , M. Helander , L. C. L. Kats , E. Visser , and G. Wachsmuth . DSL Engineering - Designing, Implementing and Using Domain-Specific Languages. dslbook.org , 2013 . M. Voelter, S. Benz, C. Dietrich, B. Engelmann, M. Helander, L. C. L. Kats, E. Visser, and G. Wachsmuth. DSL Engineering - Designing, Implementing and Using Domain-Specific Languages. dslbook.org, 2013."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568270"}],"event":{"name":"ASE '14: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","M\u00e4lardalen University M\u00e4lardalen University","IEEE CS"],"location":"Vasteras Sweden","acronym":"ASE '14"},"container-title":["Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2643000","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2642937.2643000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:09Z","timestamp":1750229769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2643000"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":39,"alternative-id":["10.1145\/2642937.2643000","10.1145\/2642937"],"URL":"https:\/\/doi.org\/10.1145\/2642937.2643000","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}