{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:35:51Z","timestamp":1778344551974,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T00:00:00Z","timestamp":1503619200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"BMBF","award":["01IS14017A, 01IS14017B"],"award-info":[{"award-number":["01IS14017A, 01IS14017B"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1318808, 1552944"],"award-info":[{"award-number":["1318808, 1552944"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science of Security Lablet","award":["H9823014C0140"],"award-info":[{"award-number":["H9823014C0140"]}]},{"name":"SERC","award":["H9823008D0171"],"award-info":[{"award-number":["H9823008D0171"]}]},{"name":"AFRL and DARPA","award":["FA8750-16-2-0042"],"award-info":[{"award-number":["FA8750-16-2-0042"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970322","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T08:40:09Z","timestamp":1472200809000},"page":"483-494","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["On essential configuration complexity: measuring interactions in highly-configurable systems"],"prefix":"10.1145","author":[{"given":"Jens","family":"Meinicke","sequence":"first","affiliation":[{"name":"University of Magdeburg, Germany"}]},{"given":"Chu-Pan","family":"Wong","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Christian","family":"K\u00e4stner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Thomas","family":"Th\u00fcm","sequence":"additional","affiliation":[{"name":"TU Braunschweig, Germany"}]},{"given":"Gunter","family":"Saake","sequence":"additional","affiliation":[{"name":"University of Magdeburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642990"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1763507.1763523"},{"key":"e_1_3_2_1_3_1","first-page":"395","volume-title":"ASE","author":"Angerer F.","unstructured":"F. Angerer, A. Grimmer, H. Pr\u00e4hofer, and P. Gr\u00fcnbacher. Configuration-Aware Change Impact Analysis. In ASE, pages 385\u2013395. IEEE, 2015."},{"key":"e_1_3_2_1_4_1","first-page":"278","volume-title":"HVC","author":"Apel S.","unstructured":"S. Apel, D. Beyer, K. Friedberger, F. Raimondi, and A. von Rhein. Domain Types: Abstract-Domain Selection Based on Variable Usage. In HVC, pages 262\u2013278. Springer, 2013."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486852"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103677"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465106.2465121"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1965724.1965743"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-007-0044-z"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635927"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2491976"},{"key":"e_1_3_2_1_12_1","first-page":"344","volume-title":"ESEC\/FSE","author":"B\u00f6hme M.","unstructured":"M. B\u00f6hme, B. C. d. S. Oliveira, and A. Roychoudhury. Regression Tests to Expose Change Interaction Errors. In ESEC\/FSE, pages 334\u2013344. ACM, 2013."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162049.2162052"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1987.1663532"},{"key":"e_1_3_2_1_15_1","volume-title":"IOS Press","author":"Bruns G.","year":"2005","unstructured":"G. Bruns. Foundations for Features. In Feature Interactions in Telecommunications and Software Systems VIII, pages 3\u201311. IOS Press, 2005."},{"key":"e_1_3_2_1_16_1","first-page":"439","volume-title":"LICS","author":"Burch J. R.","unstructured":"J. R. Burch, E. M. Clarke, K. L. McMillan, D. L. Dill, and L.-J. Hwang. Symbolic Model Checking: 10 20 States and Beyond. In LICS, pages 428\u2013439. IEEE, 1990."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1885639.1885662"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00352-3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.04.002"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985838"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273482"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.37"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382275"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.15"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063239.2063245"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2011.25"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337253"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AUSE.0000049208.84702.84"},{"issue":"4","key":"e_1_3_2_1_30_1","first-page":"366","volume":"2","author":"Havelund K.","year":"2000","unstructured":"K. Havelund and T. Pressburger. Model Checking Java Programs Using Java PathFinder. STTT, 2(4):366\u2013381, 2000.","journal-title":"Model Checking Java Programs Using Java PathFinder. STTT"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542527"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694390"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.729683"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2211616.2211617"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384673"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2377816.2377817"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1960275.1960284"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.23"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491459"},{"key":"e_1_3_2_1_40_1","volume-title":"IOS Press","author":"Kolberg M.","year":"2000","unstructured":"M. Kolberg, E. Magill, D. Marples, and S. Reiff. Feature Interactions in Telecommunication Systems VI, chapter Results of the Second Feature Interaction Contest, pages 311\u2013325. IOS Press, 2000."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-e.1983.0001"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.24"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491437"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2643001"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/645418.652082"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362836"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884793"},{"key":"e_1_3_2_1_48_1","series-title":"LIPIcs","first-page":"518","volume-title":"ECOOP","author":"Medeiros F.","unstructured":"F. Medeiros, C. K\u00e4stner, M. Ribeiro, S. Nadi, and R. Gheyi. The Love\/Hate Relationship with the C Preprocessor: An Interview Study. In ECOOP, volume 37 of LIPIcs, pages 495\u2013518. Schloss Dagstuhl\u2013LZI, 2015."},{"key":"e_1_3_2_1_49_1","volume-title":"A Variability-Aware Interpreter for Java Applications. Master\u2019s thesis","author":"Meinicke J.","year":"2014","unstructured":"J. Meinicke. VarexJ: A Variability-Aware Interpreter for Java Applications. Master\u2019s thesis, University of Magdeburg, 2014."},{"key":"e_1_3_2_1_50_1","first-page":"240","volume-title":"SPLC","author":"M. Mendon\u00b8","unstructured":"M. Mendon\u00b8 ca, A. Wasowski, and K. Czarnecki. SAT-Based Analysis of Feature Models is Easy. In SPLC, pages 231\u2013240. Software Engineering Institute, 2009."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568300"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.2201\/NiiPi.2008.5.8"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1883612.1883618"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(00)00018-6"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806864"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.14778\/2556549.2556551"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786830"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.55"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985872"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/2643634.2643677"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580950"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508284.1508267"},{"key":"e_1_3_2_1_63_1","volume-title":"Introducing Binary Decision Diagrams in the Explicit-State Verification of Java Code. In JPF Workshop","author":"von Rhein A.","year":"2011","unstructured":"A. von Rhein, S. Apel, and F. Raimondi. Introducing Binary Decision Diagrams in the Explicit-State Verification of Java Code. In JPF Workshop, 2011."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661136.2661143"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375611"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_3_2_1_68_1","volume-title":"Good Friends Publishing Company","author":"Zave P.","year":"2009","unstructured":"P. Zave. Software Requirements and Design: The Work of Michael Jackson, chapter Modularity in Distributed Feature Composition, pages 267\u2013290. Good Friends Publishing Company, 2009."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486830"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1089008.1089012"}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","location":"Singapore Singapore","acronym":"ASE'16","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970322","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970322","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:29:35Z","timestamp":1763458175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":70,"alternative-id":["10.1145\/2970276.2970322","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970322","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}