{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:17:10Z","timestamp":1763389030709,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,16]],"date-time":"2016-09-16T00:00:00Z","timestamp":1473984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,16]]},"DOI":"10.1145\/2934466.2934472","type":"proceedings-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T19:17:32Z","timestamp":1475176652000},"page":"209-218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Using machine learning to infer constraints for product lines"],"prefix":"10.1145","author":[{"given":"Paul","family":"Temple","sequence":"first","affiliation":[{"name":"University of Rennes 1, France"}]},{"given":"Jos\u00e9 A.","family":"Galindo","sequence":"additional","affiliation":[{"name":"Inria, Rennes, France"}]},{"given":"Mathieu","family":"Acher","sequence":"additional","affiliation":[{"name":"University of Rennes 1, France"}]},{"given":"Jean-Marc","family":"J\u00e9z\u00e9quel","sequence":"additional","affiliation":[{"name":"University of Rennes 1, France"}]}],"member":"320","published-online":{"date-parts":[[2016,9,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647908.2655981"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2012.12.004"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2648511.2648532"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362536.2362553"},{"key":"e_1_3_2_1_5_1","volume-title":"Empirical Software Engineering","author":"B\u00e9can G.","year":"2015","unstructured":"G. B\u00e9can , M. Acher , B. Baudry , and S. Ben Nasr . Breathing ontological knowledge into feature model synthesis: an empirical study . Empirical Software Engineering , 2015 . G. B\u00e9can, M. Acher, B. Baudry, and S. Ben Nasr. Breathing ontological knowledge into feature model synthesis: an empirical study. Empirical Software Engineering, 2015."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791068"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46681-0_25"},{"key":"e_1_3_2_1_8_1","volume-title":"Constructing Interaction Test Suites for Highly-Configurable Systems in the Presence of Constraints : A Greedy Approach","author":"Cohen M. B.","year":"2008","unstructured":"M. B. Cohen , M. B. Dwyer , and I. C. Society . Constructing Interaction Test Suites for Highly-Configurable Systems in the Presence of Constraints : A Greedy Approach . 2008 . M. B. Cohen, M. B. Dwyer, and I. C. Society. Constructing Interaction Test Suites for Highly-Configurable Systems in the Presence of Constraints : A Greedy Approach. 2008."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491455"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382756.2382783"},{"key":"e_1_3_2_1_11_1","volume-title":"No-reference noise and blur detection via the fourier transform. Technical report","author":"Dosselman R. W.","year":"2012","unstructured":"R. W. Dosselman and X. D. Yang . No-reference noise and blur detection via the fourier transform. Technical report , University of Regina , CANADA, 2012 . R. W. Dosselman and X. D. Yang. No-reference noise and blur detection via the fourier transform. Technical report, University of Regina, CANADA, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610411"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065036"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693089"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2327020"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486975"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362536.2362547"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.23"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1960275.1960284"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491459"},{"key":"e_1_3_2_1_22_1","volume-title":"Testing Product Generation in Software Product Lines","author":"Lamancha B. P.","year":"2010","unstructured":"B. P. Lamancha and M. P. Usaola . Testing Product Generation in Software Product Lines . 2010 . B. P. Lamancha and M. P. Usaola. Testing Product Generation in Software Product Lines. 2010."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884793"},{"volume-title":"Where do configuration constraints stem from? an extraction approach and an empirical study","author":"Nadi S.","key":"e_1_3_2_1_24_1","unstructured":"S. Nadi , T. Berger , C. K\u00e4stner , and K. Czarnecki . Where do configuration constraints stem from? an extraction approach and an empirical study . IEEE Trans. Software Eng . S. Nadi, T. Berger, C. K\u00e4stner, and K. Czarnecki. Where do configuration constraints stem from? an extraction approach and an empirical study. IEEE Trans. Software Eng."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568300"},{"key":"e_1_3_2_1_26_1","volume-title":"INRIA Rennes, LINA CNRS UMR 6241","author":"Prud'homme C.","year":"2014","unstructured":"C. Prud'homme , J.-G. Fages , and X. Lorca . Choco3 Documentation. TASC , INRIA Rennes, LINA CNRS UMR 6241 , COSLING S.A.S. , 2014 . C. Prud'homme, J.-G. Fages, and X. Lorca. Choco3 Documentation. TASC, INRIA Rennes, LINA CNRS UMR 6241, COSLING S.A.S., 2014."},{"volume-title":"ASE'15","author":"Sarkar A.","key":"e_1_3_2_1_27_1","unstructured":"A. Sarkar , J. Guo , N. Siegmund , S. Apel , and K. Czarnecki . Cost-efficient sampling for performance prediction of configurable systems (t) . In ASE'15 . A. Sarkar, J. Guo, N. Siegmund, S. Apel, and K. Czarnecki. Cost-efficient sampling for performance prediction of configurable systems (t). In ASE'15."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985856"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786845"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.07.020"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791093"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580950"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070526"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791069"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818779"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345798"},{"volume-title":"ASE'15","author":"Zhang Y.","key":"e_1_3_2_1_37_1","unstructured":"Y. Zhang , J. Guo , E. Blais , and K. Czarnecki . Performance prediction of configurable software systems by fourier learning (T) . In ASE'15 . Y. Zhang, J. Guo, E. Blais, and K. Czarnecki. Performance prediction of configurable software systems by fourier learning (T). In ASE'15."}],"event":{"name":"SPLC '16: The 20th International Systems and Software Product Line Conference","sponsor":["Huawei Technologies Co. Ltd. Huawei Technologies Co. Ltd.","Key Laboratory of High Confidence Software Technologies Key Laboratory of High Confidence Software Technologies, Ministry of Education","DC Holdings Digital China Holdings Limited"],"location":"Beijing China","acronym":"SPLC '16"},"container-title":["Proceedings of the 20th International Systems and Software Product Line Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2934466.2934472","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2934466.2934472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:54Z","timestamp":1750222494000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2934466.2934472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,16]]},"references-count":37,"alternative-id":["10.1145\/2934466.2934472","10.1145\/2934466"],"URL":"https:\/\/doi.org\/10.1145\/2934466.2934472","relation":{},"subject":[],"published":{"date-parts":[[2016,9,16]]},"assertion":[{"value":"2016-09-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}