{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:14Z","timestamp":1750220834387,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,9]]},"DOI":"10.1145\/3307630.3342413","type":"proceedings-article","created":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T12:38:04Z","timestamp":1565267884000},"page":"73-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Process for Fault-Driven Repair of Constraints Among Features"],"prefix":"10.1145","author":[{"given":"Paolo","family":"Arcaini","sequence":"first","affiliation":[{"name":"National Institute of Informatics, Japan"}]},{"given":"Angelo","family":"Gargantini","sequence":"additional","affiliation":[{"name":"University of Bergamo, Italy"}]},{"given":"Marco","family":"Radavelli","sequence":"additional","affiliation":[{"name":"University of Bergamo, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2892642"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168365.3168372"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302333.3302338"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3001867.3001870"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31157-5_9"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168365.3168374"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.01.045"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2019.00054"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv001"},{"volume-title":"Verification and Validation (ICST), 2015 IEEE 8th International Conference on. 1--10","year":"2015","author":"Arcaini Paolo","key":"e_1_3_2_1_10_1"},{"volume-title":"Automatic Detection and Removal of Conformance Faults in Feature Models. In 2016 IEEE International Conference on Software Testing, Verification and Validation (ICST). 102--112","year":"2016","author":"Arcaini Paolo","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554844_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34188-5_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2010.06.011"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02949-3_4"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767833"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"John Joseph Chilenski and Steven P. Miller. 1994. Applicability of modified condition\/decision coverage to software testing. Software Engineering Journal 9 (September 1994) 193--200(7). Issue 5.  John Joseph Chilenski and Steven P. Miller. 1994. Applicability of modified condition\/decision coverage to software testing. Software Engineering Journal 9 (September 1994) 193--200(7). Issue 5.","DOI":"10.1049\/sej.1994.0025"},{"volume-title":"Combinatorial Interaction Testing for Automated Constraint Repair. In 2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). 239--248","year":"2017","author":"Gargantini Angelo","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Bernhard Garn Marco Radavelli Angelo Gargantini Manuel Leithner and Dimitris E. Simos. 2019. A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection. In Advances and Trends in Artificial Intelligence. From Theory to Practice Franz Wotawa Gerhard Friedrich Ingo Pill Roxane Koitz-Hristov and Moonis Ali (Eds.). Springer International Publishing Cham 207--215.  Bernhard Garn Marco Radavelli Angelo Gargantini Manuel Leithner and Dimitris E. Simos. 2019. A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection. In Advances and Trends in Artificial Intelligence. From Theory to Practice Franz Wotawa Gerhard Friedrich Ingo Pill Roxane Koitz-Hristov and Moonis Ali (Eds.). Springer International Publishing Cham 207--215.","DOI":"10.1007\/978-3-030-22999-3_19"},{"volume-title":"2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 1--4.","author":"Ghandehari Laleh Sh","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence -","volume":"571","author":"Hemaspaandra Edith","year":"2011"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486975"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486893"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155664"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337225"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Rafael Lotufo Steven She Thorsten Berger Krzysztof Czarnecki and Andrzej W\u0105sowski. 2010. Evolution of the linux kernel variability model. Software Product Lines: Going Beyond (2010) 136--150.   Rafael Lotufo Steven She Thorsten Berger Krzysztof Czarnecki and Andrzej W\u0105sowski. 2010. Evolution of the linux kernel variability model. Software Product Lines: Going Beyond (2010) 136--150.","DOI":"10.1007\/978-3-642-15579-6_10"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1956.tb03835.x"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Jens Meinicke Thomas Th\u00fcm Reimar Schr\u00f6ter Fabian Benduhn Thomas Leich and Gunter Saake. 2017. Mastering Software Variability with FeatureIDE. Springer.   Jens Meinicke Thomas Th\u00fcm Reimar Schr\u00f6ter Fabian Benduhn Thomas Leich and Gunter Saake. 2017. Mastering Software Variability with FeatureIDE . Springer.","DOI":"10.1007\/978-3-319-61443-4"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639950.1640002"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568283"},{"volume-title":"Proceedings of the 2013 International Conference on Software Engineering. IEEE Press, 772--781","year":"2013","author":"Thien Nguyen Hoang Duong","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.08.004"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2421279"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Klaus Pohl G\u00fcnter B\u00f6ckle and Frank J. van der Linden. 2005. Software Product Line Engineering: Foundations Principles and Techniques. Springer-Verlag Berlin Heidelberg.   Klaus Pohl G\u00fcnter B\u00f6ckle and Frank J. van der Linden. 2005. Software Product Line Engineering: Foundations Principles and Techniques . Springer-Verlag Berlin Heidelberg.","DOI":"10.1007\/3-540-28901-1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351707"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37057-1_7"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24912-4_16"},{"key":"e_1_3_2_1_39_1","unstructured":"Paul Temple Mathieu Acher Battista Biggio Jean-Marc J\u00e9z\u00e9quel and Fabio Roli. 2018. Towards Adversarial Configurations for Software Product Lines. CoRR abs\/1805.12021 (2018). arXiv:1805.12021 http:\/\/arxiv.org\/abs\/1805.12021  Paul Temple Mathieu Acher Battista Biggio Jean-Marc J\u00e9z\u00e9quel and Fabio Roli. 2018. Towards Adversarial Configurations for Software Product Lines. CoRR abs\/1805.12021 (2018). arXiv:1805.12021 http:\/\/arxiv.org\/abs\/1805.12021"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.4121211"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934466.2934472"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070526"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818779"}],"event":{"name":"SPLC 2019: 23rd International Systems and Software Product Line Conference","acronym":"SPLC 2019","location":"Paris France"},"container-title":["Proceedings of the 23rd International Systems and Software Product Line Conference - Volume B"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3307630.3342413","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3307630.3342413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:37Z","timestamp":1750202017000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3307630.3342413"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":42,"alternative-id":["10.1145\/3307630.3342413","10.1145\/3307630"],"URL":"https:\/\/doi.org\/10.1145\/3307630.3342413","relation":{},"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"2019-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}