{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:10:11Z","timestamp":1762459811628,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T00:00:00Z","timestamp":1580860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SCHA 1635\/12-1"],"award-info":[{"award-number":["SCHA 1635\/12-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,5]]},"DOI":"10.1145\/3377024.3377034","type":"proceedings-article","created":{"date-parts":[[2020,2,6]],"date-time":"2020-02-06T17:20:12Z","timestamp":1581009612000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Recovering variability information from source code of clone-and-own software systems"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Schlie","sequence":"first","affiliation":[{"name":"TU Braunschweig, Braunschweig, Germany"}]},{"given":"Sandro","family":"Schulze","sequence":"additional","affiliation":[{"name":"University of Magdeburg, Magdeburg, Germany"}]},{"given":"Ina","family":"Schaefer","sequence":"additional","affiliation":[{"name":"TU Braunschweig, Braunschweig, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,2,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336294.3342362"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591126"},{"volume-title":"Feature-Oriented Software Product Lines","author":"Apel Sven","key":"e_1_3_2_1_3_1","unstructured":"Sven Apel , Don Batory , Christian K\u00e4stner , and Gunter Saake . 2016. Feature-Oriented Software Product Lines . Springer . Sven Apel, Don Batory, Christian K\u00e4stner, and Gunter Saake. 2016. Feature-Oriented Software Product Lines. Springer."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2478566.2479079"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9499-z"},{"key":"e_1_3_2_1_6_1","volume-title":"Variability mechanisms in software ecosystems. Information and Software Technology 56 (11","author":"Berger Thorsten","year":"2014","unstructured":"Thorsten Berger , Helge Pfeiffer , Reinhard Tartler , Steffen Dienst , Krzysztof Czarnecki , Andrzej Wasowski , and Steven She . 2014. Variability mechanisms in software ecosystems. Information and Software Technology 56 (11 2014 ), 1520--1535. Thorsten Berger, Helge Pfeiffer, Reinhard Tartler, Steffen Dienst, Krzysztof Czarnecki, Andrzej Wasowski, and Steven She. 2014. Variability mechanisms in software ecosystems. Information and Software Technology 56 (11 2014), 1520--1535."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00072"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11561347_28"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110147.2110167"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.13"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.530"},{"volume-title":"Proc. of the Intl. Conference on Software Analysis, Evolution, and Reengineering (SANER). 316--326","author":"Fenske W.","key":"e_1_3_2_1_12_1","unstructured":"W. Fenske , J. Meinicke , S. Schulze , S. Schulze , and G. Saake . 2017. Variant-Preserving Refactorings for Migrating Cloned Products to a Product Line . In Proc. of the Intl. Conference on Software Analysis, Evolution, and Reengineering (SANER). 316--326 . W. Fenske, J. Meinicke, S. Schulze, S. Schulze, and G. Saake. 2017. Variant-Preserving Refactorings for Migrating Cloned Products to a Product Line. In Proc. of the Intl. Conference on Software Analysis, Evolution, and Reengineering (SANER). 316--326."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.394"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554844_6"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9076-6"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368131"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.37"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2008.14"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3233027.3236403"},{"key":"e_1_3_2_1_20_1","volume-title":"The Hungarian Method for the Assignment Problem. Naval Res. Logist. Quart. 2 (01","author":"Kuhn H.W.","year":"1955","unstructured":"H.W. Kuhn . 1955. The Hungarian Method for the Assignment Problem. Naval Res. Logist. Quart. 2 (01 1955 ), 83--98. H.W. Kuhn. 1955. The Hungarian Method for the Assignment Problem. Naval Res. Logist. Quart. 2 (01 1955), 83--98."},{"key":"e_1_3_2_1_21_1","first-page":"707","article-title":"Binary Codes Capable of Correcting Deletions, Insertions, and Reversals","volume":"10","author":"Levenshtein V. I.","year":"1966","unstructured":"V. I. Levenshtein . 1966 . Binary Codes Capable of Correcting Deletions, Insertions, and Reversals . Soviet Physics Doklady 10 , 8 (1966), 707 -- 710 . V. I. Levenshtein. 1966. Binary Codes Capable of Correcting Deletions, Insertions, and Reversals. Soviet Physics Doklady 10, 8 (1966), 707--710.","journal-title":"Soviet Physics Doklady"},{"key":"e_1_3_2_1_22_1","volume-title":"Morpheus: Variability-Aware Refactoring in the Wild. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering","volume":"1","author":"Liebig J.","unstructured":"J. Liebig , A. Janker , F. Garbe , S. Apel , and C. Lengauer . 2015 . Morpheus: Variability-Aware Refactoring in the Wild. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering , Vol. 1 . 380--391. J. Liebig, A. Janker, F. Garbe, S. Apel, and C. Lengauer. 2015. Morpheus: Variability-Aware Refactoring in the Wild. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, Vol. 1. 380--391."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3233027.3236398"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-015-0512-y"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of the Intl. Conference on Evaluation of Novel Approaches to Software Engineering (ENASE). 188--199","author":"Mazo Ra\u00fal","year":"2011","unstructured":"Ra\u00fal Mazo , Camille Salinesi , Daniel Diaz , and Alberto Lora Michiels . 2011 . Transforming Attribute and Clone-Enabled Feature Models Into Constraint Programs Over Finite Domains . In Proc. of the Intl. Conference on Evaluation of Novel Approaches to Software Engineering (ENASE). 188--199 . Ra\u00fal Mazo, Camille Salinesi, Daniel Diaz, and Alberto Lora Michiels. 2011. Transforming Attribute and Clone-Enabled Feature Models Into Constraint Programs Over Finite Domains. In Proc. of the Intl. Conference on Evaluation of Novel Approaches to Software Engineering (ENASE). 188--199."},{"volume-title":"Mastering Software Variability with FeatureIDE","author":"Meinicke Jens","key":"e_1_3_2_1_26_1","unstructured":"Jens Meinicke , Thomas Th\u00fcm , Reimar Schr\u00f6ter , Fabian Benduhn , Thomas Leich , and Gunter Saake . 2017. Mastering Software Variability with FeatureIDE . Springer . Jens Meinicke, Thomas Th\u00fcm, Reimar Schr\u00f6ter, Fabian Benduhn, Thomas Leich, and Gunter Saake. 2017. Mastering Software Variability with FeatureIDE. Springer."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629716.1629722"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934466.2962726"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2003.1231223"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606686"},{"volume-title":"Proc. of the European Software Engineering Conference\/Foundations of Software Engineering (ESEC\/FSE). ACM, 301--311","author":"Rubin J.","key":"e_1_3_2_1_31_1","unstructured":"J. Rubin and M. Chechik . 2013. N-way Model Merging . In Proc. of the European Software Engineering Conference\/Foundations of Software Engineering (ESEC\/FSE). ACM, 301--311 . J. Rubin and M. Chechik. 2013. N-way Model Merging. In Proc. of the European Software Engineering Conference\/Foundations of Software Engineering (ESEC\/FSE). ACM, 301--311."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9102-8"},{"volume-title":"Proc. of the Intl. Symposium on the Foundations of Software Engineering (FSE). ACM, 354--365","author":"Saini Vaibhav","key":"e_1_3_2_1_33_1","unstructured":"Vaibhav Saini , Farima Farmahinifarahani , Yadong Lu , Pierre Baldi , and Cristina V. Lopes . 2018. Oreo: Detection of Clones in the Twilight Zone . In Proc. of the Intl. Symposium on the Foundations of Software Engineering (FSE). ACM, 354--365 . Vaibhav Saini, Farima Farmahinifarahani, Yadong Lu, Pierre Baldi, and Cristina V. Lopes. 2018. Oreo: Detection of Clones in the Twilight Zone. In Proc. of the Intl. Symposium on the Foundations of Software Engineering (FSE). ACM, 354--365."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-35122-3_5"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851785"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491627.2491654"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332461"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.57"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47169-3_43"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859020"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1986009"},{"volume-title":"Proc. of the Working Conference on Reverse Engineering (WCRE). 109--118","author":"Xue Y.","key":"e_1_3_2_1_43_1","unstructured":"Y. Xue , Z. Xing , and S. Jarzabek . 2010. Understanding Feature Evolution in a Family of Product Variants . In Proc. of the Working Conference on Reverse Engineering (WCRE). 109--118 . Y. Xue, Z. Xing, and S. Jarzabek. 2010. Understanding Feature Evolution in a Family of Product Variants. In Proc. of the Working Conference on Reverse Engineering (WCRE). 109--118."},{"volume-title":"Proc. of the Intl. Workshop on Variability and Complexity in Software Design (VACE). 14--20","author":"Zhang B.","key":"e_1_3_2_1_44_1","unstructured":"B. Zhang , S. Duszynski , and M. Becker . 2016. Variability Mechanisms and Lessons Learned in Practice . In Proc. of the Intl. Workshop on Variability and Complexity in Software Design (VACE). 14--20 . B. Zhang, S. Duszynski, and M. Becker. 2016. Variability Mechanisms and Lessons Learned in Practice. In Proc. of the Intl. Workshop on Variability and Complexity in Software Design (VACE). 14--20."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.52"}],"event":{"name":"VaMoS '20: 14th International Working Conference on Variability Modelling of Software-Intensive Systems","acronym":"VaMoS '20","location":"Magdeburg Germany"},"container-title":["Proceedings of the 14th International Working Conference on Variability Modelling of Software-Intensive Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377024.3377034","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377024.3377034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:49Z","timestamp":1750202629000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377024.3377034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,5]]},"references-count":44,"alternative-id":["10.1145\/3377024.3377034","10.1145\/3377024"],"URL":"https:\/\/doi.org\/10.1145\/3377024.3377034","relation":{},"subject":[],"published":{"date-parts":[[2020,2,5]]},"assertion":[{"value":"2020-02-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}