{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T10:49:29Z","timestamp":1756810169472,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,16]],"date-time":"2016-09-16T00:00:00Z","timestamp":1473984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,16]]},"DOI":"10.1145\/2934466.2934477","type":"proceedings-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T19:17:32Z","timestamp":1475176652000},"page":"60-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Comparing algorithms for efficient feature-model slicing"],"prefix":"10.1145","author":[{"given":"Sebastian","family":"Krieter","sequence":"first","affiliation":[{"name":"University of Magdeburg, Magdeburg, Germany"}]},{"given":"Reimar","family":"Schr\u00f6ter","sequence":"additional","affiliation":[{"name":"University of Magdeburg, Magdeburg, Germany"}]},{"given":"Thomas","family":"Th\u00fcm","sequence":"additional","affiliation":[{"name":"TU Braunschweig, Brunswick, Germany"}]},{"given":"Wolfram","family":"Fenske","sequence":"additional","affiliation":[{"name":"University of Magdeburg, Magdeburg, Germany"}]},{"given":"Gunter","family":"Saake","sequence":"additional","affiliation":[{"name":"University of Magdeburg, Magdeburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,9,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100135"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100089"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2012.12.004"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554844_3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430502.2430513"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/368273.368557"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11499107_5"},{"key":"e_1_3_2_1_8_1","first-page":"357","volume-title":"LPAR","author":"Heule M.","year":"2010","unstructured":"M. Heule , M. J\u00e4rvisalo , and A. Biere . Clause Elimination Procedures for CNF Formulas . In LPAR , pages 357 -- 371 . Springer , 2010 . M. Heule, M. J\u00e4rvisalo, and A. Biere. Clause Elimination Procedures for CNF Formulas. In LPAR, pages 357--371. Springer, 2010."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-011-0220-1"},{"key":"e_1_3_2_1_11_1","volume-title":"An Efficient Algorithm for Feature-Model Slicing. Technical report","author":"Krieter S.","year":"2015","unstructured":"S. Krieter , R. Schr\u00f6ter , , T. Th\u00fcm , and G. Saake . An Efficient Algorithm for Feature-Model Slicing. Technical report , University of Magdeburg , 2015 . S. Krieter, R. Schr\u00f6ter, , T. Th\u00fcm, and G. Saake. An Efficient Algorithm for Feature-Model Slicing. Technical report, University of Magdeburg, 2015."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889175"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639950.1640002"},{"key":"e_1_3_2_1_14_1","first-page":"231","volume-title":"SPLC","author":"Mendon\u00e7a M.","year":"2009","unstructured":"M. Mendon\u00e7a , A. W\u0105sowski , and K. Czarnecki . SAT-Based Analysis of Feature Models is Easy . In SPLC , pages 231 -- 240 . Software Engineering Institute , 2009 . M. Mendon\u00e7a, A. W\u0105sowski, and K. Czarnecki. SAT-Based Analysis of Feature Models is Easy. In SPLC, pages 231--240. Software Engineering Institute, 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33666-9_17"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884823"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2094091.2094095"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2012.06.002"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPLC.2011.53"}],"event":{"name":"SPLC '16: The 20th International Systems and Software Product Line Conference","sponsor":["Huawei Technologies Co. Ltd. Huawei Technologies Co. Ltd.","Key Laboratory of High Confidence Software Technologies Key Laboratory of High Confidence Software Technologies, Ministry of Education","DC Holdings Digital China Holdings Limited"],"location":"Beijing China","acronym":"SPLC '16"},"container-title":["Proceedings of the 20th International Systems and Software Product Line Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2934466.2934477","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2934466.2934477","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:54Z","timestamp":1750222494000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2934466.2934477"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,16]]},"references-count":18,"alternative-id":["10.1145\/2934466.2934477","10.1145\/2934466"],"URL":"https:\/\/doi.org\/10.1145\/2934466.2934477","relation":{},"subject":[],"published":{"date-parts":[[2016,9,16]]},"assertion":[{"value":"2016-09-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}