{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:59:40Z","timestamp":1761897580106,"version":"3.41.0"},"reference-count":108,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T00:00:00Z","timestamp":1627948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872182"],"award-info":[{"award-number":["61872182"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The Research Council of Norway","award":["286898\/F20"],"award-info":[{"award-number":["286898\/F20"]}]},{"name":"The Research Council of Norway","award":["240024\/F20"],"award-info":[{"award-number":["240024\/F20"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2021,10,31]]},"abstract":"<jats:p>\n            Modern systems, such as cyber-physical systems, often consist of multiple products within\/across product lines communicating with each other through information networks. Consequently, their runtime behaviors are influenced by product configurations and networks. Such systems play a vital role in our daily life; thus, ensuring their correctness by thorough testing becomes essential. However, testing these systems is particularly challenging due to a large number of possible configurations and limited available resources. Therefore, it is important and practically useful to test these systems with specific configurations under which products will most likely fail to communicate with each other. Motivated by this, we present a search-based configuration recommendation (\n            <jats:italic>SBCR<\/jats:italic>\n            ) approach to recommend faulty configurations for the system under test (SUT) based on cross-product line (CPL) rules. CPL rules are soft constraints, constraining product configurations while indicating the most probable system states with a certain degree of confidence. In\n            <jats:italic>SBCR<\/jats:italic>\n            , we defined four search objectives based on CPL rules and combined them with six commonly applied search algorithms. To evaluate\n            <jats:italic>SBCR<\/jats:italic>\n            (i.e.,\n            <jats:italic>\n              SBCR\n              <jats:sub>NSGA-II<\/jats:sub>\n              , SBCR\n              <jats:sub>IBEA<\/jats:sub>\n              , SBCR\n              <jats:sub>MoCell<\/jats:sub>\n              , SBCR\n              <jats:sub>SPEA2<\/jats:sub>\n              , SBCR\n              <jats:sub>PAES<\/jats:sub>\n            <\/jats:italic>\n            , and\n            <jats:italic>\n              SBCR\n              <jats:sub>SMPSO<\/jats:sub>\n            <\/jats:italic>\n            ), we performed two case studies (Cisco and Jitsi) and conducted difference analyses. Results show that for both of the case studies,\n            <jats:italic>SBCR<\/jats:italic>\n            significantly outperformed random search-based configuration recommendation (\n            <jats:italic>RBCR<\/jats:italic>\n            ) for 86% of the total comparisons based on six quality indicators, and 100% of the total comparisons based on the percentage of faulty configurations (PFC). Among the six variants of\n            <jats:italic>\n              SBCR, SBCR\n              <jats:sub>SPEA2<\/jats:sub>\n            <\/jats:italic>\n            outperformed the others in 85% of the total comparisons based on six quality indicators and 100% of the total comparisons based on PFC.\n          <\/jats:p>","DOI":"10.1145\/3464939","type":"journal-article","created":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T04:09:51Z","timestamp":1628050191000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Recommending Faulty Configurations for Interacting Systems Under Test Using Multi-objective Search"],"prefix":"10.1145","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8090-6627","authenticated-orcid":false,"given":"Safdar Aqeel","family":"Safdar","sequence":"first","affiliation":[{"name":"Simula Research Laboratory and University of Oslo, Oslo, Norway"}]},{"given":"Tao","family":"Yue","sequence":"additional","affiliation":[{"name":"Simula Research Laboratory and Nanjing University of Aeronautics and Astronautics"}]},{"given":"Shaukat","family":"Ali","sequence":"additional","affiliation":[{"name":"Simula Research Laboratory"}]}],"member":"320","published-online":{"date-parts":[[2021,8,3]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_1_1_1","DOI":"10.1016\/j.infsof.2012.02.002"},{"volume-title":"Proceedings of International Workshop on Variability Modelling of Software-Intensive Systems (VaMoS\u201910)","author":"Rosenm\u00fcller M.","first-page":"123","key":"e_1_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_3_1","DOI":"10.1016\/j.infsof.2015.12.004"},{"key":"e_1_2_1_4_1","first-page":"57","article-title":"Nonconformity resolving recommendations for product line configuration. In Proceedings of International Conference on Software Testing. IEEE","author":"Lu H.","year":"2016","journal-title":"Chicago"},{"volume-title":"ISO","year":"2013","author":"ISO","key":"e_1_2_1_5_1"},{"volume-title":"Proceedings of International Systems and Software Product Line Conference (SPLC). ACM, 338\u2013347","author":"Yue T.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","first-page":"32","article-title":"Automatic selection of test execution plans from a video conferencing system product line. In Proceedings of VARiability for You Workshop: Variability Modeling Made Useful for Everyone","volume":"2425422","author":"Wang S.","year":"2012","journal-title":"ACM"},{"doi-asserted-by":"publisher","key":"e_1_2_1_8_1","DOI":"10.1109\/TSE.2008.50"},{"volume-title":"Proceedings of International Conference on Software Product Lines. Springer, 196\u2013210","author":"Oster S.","key":"e_1_2_1_9_1"},{"volume-title":"Proceedings of 2010 3rd International Conference on Software Testing, Verification and Validation. IEEE, 459\u2013468","author":"Perrouin G.","key":"e_1_2_1_10_1"},{"volume":"1","volume-title":"Proceedings of 16th International Software Product Line Conference -","author":"Johansen M. F.","key":"e_1_2_1_11_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_12_1","DOI":"10.5555\/2873826.2874006"},{"doi-asserted-by":"publisher","key":"e_1_2_1_13_1","DOI":"10.1007\/s10664-010-9135-7"},{"volume-title":"Proceedings of 37th International Conference on Software Engineering\u2014Volume 1","author":"Henard C.","key":"e_1_2_1_14_1"},{"volume-title":"Proceedings of International Conference on Automated Software Engineering (ASE). IEEE, 465\u2013474","author":"Sayyad A. S.","key":"e_1_2_1_15_1"},{"unstructured":"C. Salinesi R. Triki and R. Mazo. 2012. Combining configuration and recommendation to define an interactive product line configuration approach. arXiv preprint arXiv:1206.2520 (2012).  C. Salinesi R. Triki and R. Mazo. 2012. Combining configuration and recommendation to define an interactive product line configuration approach. arXiv preprint arXiv:1206.2520 (2012).","key":"e_1_2_1_16_1"},{"volume-title":"Proceedings of ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences. ACM, 120\u2013131","author":"Pereira J. A.","key":"e_1_2_1_17_1"},{"volume-title":"Proceedings of International Systems and Software Product Line Conference (SPLC\u201908)","author":"White J.","key":"e_1_2_1_18_1"},{"volume-title":"Proceedings of 35th International Conference on Software Engineering (ICSE\u201913)","author":"Henard C.","key":"e_1_2_1_19_1"},{"volume-title":"Proceedings of 18th International Software Product Line Conference\u2014Volume 1. ACM, 157\u2013166","author":"Barreiros J.","key":"e_1_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_21_1","DOI":"10.1109\/TSE.2014.2383381"},{"volume-title":"Proceedings of 34th International Conference on Software Engineering (ICSE\u201912)","author":"Xiong Y.","key":"e_1_2_1_22_1"},{"volume-title":"Proceedings of 17th International Software Product Line Conference. ACM, 82\u201390","author":"Wang B.","key":"e_1_2_1_23_1"},{"volume-title":"Proceedings of International Systems and Software Product Line Conference (SPLC\u201908)","author":"Czarnecki K.","key":"e_1_2_1_24_1"},{"key":"e_1_2_1_25_1","first-page":"1","article-title":"Using multi-objective search and machine learning to infer rules constraining product configurations","volume":"26","author":"Safdar S. A.","year":"2019","journal-title":"Automated Software Engineering (ASE)"},{"key":"e_1_2_1_26_1","first-page":"1319","article-title":"Mining cross product line rules with multi-objective search and machine learning. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO\u201917)","volume":"3071261","author":"Safdar S. A.","year":"2017","journal-title":"ACM"},{"doi-asserted-by":"publisher","key":"e_1_2_1_27_1","DOI":"10.1016\/j.infsof.2015.01.008"},{"volume-title":"Proceedings of International Systems and Software Product Line Conference (SPLC\u201914)","author":"Harman M.","key":"e_1_2_1_28_1"},{"key":"e_1_2_1_29_1","first-page":"1","article-title":"SMTIBEA: A hybrid multi-objective optimization algorithm for configuring large constrained software product lines","volume":"16","author":"Guo J.","year":"2017","journal-title":"Software & Systems Modeling (SoSyM)"},{"key":"e_1_2_1_30_1","volume-title":"Clever Algorithms: Nature-Inspired Programming Recipes","author":"Brownlee J.","year":"2012","edition":"1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_31_1","DOI":"10.1109\/4235.996017"},{"volume-title":"Proceedings of International Conference on Software Engineering (ICSE\u201916)","author":"Sarro F.","key":"e_1_2_1_32_1"},{"key":"e_1_2_1_33_1","first-page":"140","article-title":"Pareto efficient multi-objective test case selection","volume":"1273483","author":"Yoo S.","year":"2007","journal-title":"Proceedings of International Symposium on Software Testing and Analysis. ACM"},{"volume-title":"Proceedings of International Working Conference on Requirements Engineering: Foundation for Software Quality. Springer","author":"Zhang Y.","key":"e_1_2_1_34_1"},{"volume-title":"Proceedings of International Conference on Parallel Problem Solving from Nature. Springer, 832\u2013842","author":"Zitzler E.","key":"e_1_2_1_35_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_36_1","DOI":"10.1109\/4235.797969"},{"unstructured":"E. Zitzler M. Laumanns and L. Thiele. 2001. SPEA2: Improving the Strength Pareto Evolutionary Algorithm. TIK-report 103 (2001).  E. Zitzler M. Laumanns and L. Thiele. 2001. SPEA2: Improving the Strength Pareto Evolutionary Algorithm. TIK-report 103 (2001).","key":"e_1_2_1_37_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_38_1","DOI":"10.1162\/106365600568167"},{"unstructured":"A. Nebro J. Durillo F. Luna B. Dorronsoro and E. Alba. 2007. Design Issues in a Multiobjective Cellular Genetic Algorithm. Springer Berlin.  A. Nebro J. Durillo F. Luna B. Dorronsoro and E. Alba. 2007. Design Issues in a Multiobjective Cellular Genetic Algorithm. Springer Berlin.","key":"e_1_2_1_39_1"},{"volume-title":"Proceedings of IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making (MCDM\u201909)","author":"Nebro A. J.","key":"e_1_2_1_40_1"},{"volume-title":"Version 2.2","author":"CL.","key":"e_1_2_1_41_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_42_1","DOI":"10.1109\/TSE.2015.2415793"},{"volume-title":"Proceedings of International Conference on Software Engineering (ICSE\u201914)","author":"Nadi S.","key":"e_1_2_1_43_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_44_1","DOI":"10.1002\/stvr.294"},{"doi-asserted-by":"publisher","key":"e_1_2_1_45_1","DOI":"10.1109\/TSE.2013.17"},{"volume-title":"Proceedings of International Systems and Software Product Line Conference (SPLC\u201913)","author":"Henard C.","key":"e_1_2_1_46_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_47_1","DOI":"10.1007\/s00158-003-0368-6"},{"doi-asserted-by":"publisher","key":"e_1_2_1_48_1","DOI":"10.1016\/j.advengsoft.2011.05.014"},{"volume-title":"Proceedings of International Conference on Software Engineering (ICSE). IEEE, 1\u201310","author":"Arcuri A.","key":"e_1_2_1_49_1"},{"volume-title":"Proceedings of International Systems and Software Product Line Conference (SPLC\u201914)","author":"Wang S.","key":"e_1_2_1_50_1"},{"volume-title":"Proceedings of International Conference on Model-Driven Engineering and Software Development (MODELSWARD). Springer 581\u2013589","author":"Ali S.","key":"e_1_2_1_51_1"},{"unstructured":"Jitsi. 2003. Retrieved June 4 2021 from http:\/\/www.jitsi.org.  Jitsi. 2003. Retrieved June 4 2021 from http:\/\/www.jitsi.org.","key":"e_1_2_1_52_1"},{"volume-title":"Proceedings of International Conference on Software Engineering (ICSE\u201916)","author":"Wang S.","key":"e_1_2_1_53_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_54_1","DOI":"10.1145\/3375636"},{"unstructured":"J. D. Knowles L. Thiele and E. Zitzler. 2006. A tutorial on the performance assessment of stochastic multiobjective optimizers. TIK-Report 214 (2006).  J. D. Knowles L. Thiele and E. Zitzler. 2006. A tutorial on the performance assessment of stochastic multiobjective optimizers. TIK-Report 214 (2006).","key":"e_1_2_1_55_1"},{"volume-title":"Citeseer","year":"1998","author":"Van Veldhuizen D. A.","key":"e_1_2_1_56_1"},{"volume-title":"Multiple Criteria Decision Making","year":"1973","author":"Cochrane J. L.","key":"e_1_2_1_57_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_58_1","DOI":"10.5555\/559152"},{"doi-asserted-by":"publisher","key":"e_1_2_1_59_1","DOI":"10.1109\/3468.650320"},{"volume-title":"Proceedings of IEEE International Conference on Systems, Man and Cybernetics, Intelligent Systems for the 21st Century. IEEE, 1556\u20131561","author":"Tanaka M.","key":"e_1_2_1_60_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_61_1","DOI":"10.1109\/TEVC.2007.913109"},{"volume-title":"Proceedings of IEEE Congress on Evolutionary Computation (CEC). IEEE, 892\u2013899","author":"Zhou A.","key":"e_1_2_1_62_1"},{"volume-title":"Technical Report TR\/IRIDIA\/2011-004, IRIDIA","year":"2011","author":"L\u00f3pez-Ib\u00e1nez M.","key":"e_1_2_1_63_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_64_1","DOI":"10.1007\/s00500-012-0946-x"},{"key":"e_1_2_1_65_1","first-page":"2","article-title":"Ant colony optimization on a limited budget of evaluations","volume":"9","author":"Caceres L. P.","year":"2015","journal-title":"Swarm Intelligence"},{"doi-asserted-by":"publisher","key":"e_1_2_1_66_1","DOI":"10.1007\/s11432-016-0089-7"},{"doi-asserted-by":"crossref","unstructured":"L. C. Bezerra M. L\u00f3pez-Ib\u00e1\u00f1ez and T. St\u00fctzle. 2020. Automatic configuration of multi-objective optimizers and multi-objective configuration. Springer Cham.  L. C. Bezerra M. L\u00f3pez-Ib\u00e1\u00f1ez and T. St\u00fctzle. 2020. Automatic configuration of multi-objective optimizers and multi-objective configuration. Springer Cham.","key":"e_1_2_1_67_1","DOI":"10.1007\/978-3-030-18764-4_4"},{"doi-asserted-by":"publisher","key":"e_1_2_1_68_1","DOI":"10.1109\/TSE.2018.2882176"},{"doi-asserted-by":"publisher","key":"e_1_2_1_69_1","DOI":"10.1016\/j.advwatres.2005.07.010"},{"doi-asserted-by":"publisher","key":"e_1_2_1_70_1","DOI":"10.1016\/j.swevo.2011.02.001"},{"volume-title":"Proceedings of 26th IEEE\/ACM International Conference on Automated Software Engineering. IEEE Computer Society, 53\u201362","author":"Baars A.","key":"e_1_2_1_71_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_72_1","DOI":"10.1109\/TSE.2010.26"},{"volume-title":"Proceedings of 11th Annual Conference on Genetic and Evolutionary Computation. ACM, 1673\u20131680","author":"Gueorguiev S.","key":"e_1_2_1_73_1"},{"unstructured":"J. A. Rice. 2006. Mathematical Statistics and Data Analysis. Cengage Learning.  J. A. Rice. 2006. Mathematical Statistics and Data Analysis. Cengage Learning.","key":"e_1_2_1_74_1"},{"key":"e_1_2_1_75_1","first-page":"1","article-title":"Assessing the quality of industrial avionics software: an extensive empirical evaluation","volume":"22","author":"Wu J.","year":"2016","journal-title":"Empirical Software Engineering (EMSE)"},{"doi-asserted-by":"publisher","key":"e_1_2_1_76_1","DOI":"10.1214\/aoms\/1177730491"},{"key":"e_1_2_1_77_1","first-page":"101","article-title":"A critique and improvement of the CL common language effect size statistics of McGraw and Wong","volume":"25","author":"Vargha A.","year":"2000","journal-title":"Journal of Educational and Behavioral Statistics (JEBS)"},{"doi-asserted-by":"publisher","key":"e_1_2_1_78_1","DOI":"10.1093\/biomet\/57.3.579"},{"doi-asserted-by":"publisher","key":"e_1_2_1_79_1","DOI":"10.1016\/j.ress.2005.11.018"},{"volume":"6956","volume-title":"Proceedings of International Symposium on Search Based Software Engineering (SSBSE\u201911)","author":"Arcuri A.","key":"e_1_2_1_81_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_82_1","DOI":"10.1007\/s10664-013-9249-9"},{"key":"e_1_2_1_83_1","first-page":"182","article-title":"Enhancing test case prioritization in an industrial setting with resource awareness and multi-objective search. In Proceedings of 38th International Conference on Software Engineering Companion","volume":"2889240","author":"Wang S.","year":"2016","journal-title":"ACM"},{"doi-asserted-by":"publisher","key":"e_1_2_1_84_1","DOI":"10.1016\/j.infsof.2019.03.007"},{"volume-title":"Proceedings of International Conference on System Analysis and Modeling (SAM). Springer, 1\u201319","author":"Safdar S. A.","key":"e_1_2_1_85_1"},{"unstructured":"S. A. Safdar L. Hong Y. Tao A. Shaukat and K. Nie. 2020. A framework for automated multi-stage and multi-step product configuration of cyber-physical systems. Software and Systems Modeling (SoSym) 19 3 (2020).  S. A. Safdar L. Hong Y. Tao A. Shaukat and K. Nie. 2020. A framework for automated multi-stage and multi-step product configuration of cyber-physical systems. Software and Systems Modeling (SoSym) 19 3 (2020).","key":"e_1_2_1_86_1"},{"volume-title":"End-user guide manuals. Retrieved","year":"2021","key":"e_1_2_1_87_1"},{"volume-title":"Proceedings of 22nd International Systems and Software Product Line Conference-Volume 1. ACM, 87\u201397","author":"Pereira J. A.","key":"e_1_2_1_88_1"},{"volume-title":"Proceedings of 17th International Software Product Line Conference. ACM, 227\u2013235","author":"Marijan D.","key":"e_1_2_1_89_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_90_1","DOI":"10.1145\/3238147.3238201"},{"volume-title":"Proceedings of 10th Joint Meeting on Foundations of Software Engineering. 942\u2013945","author":"Wang C.","key":"e_1_2_1_91_1"},{"doi-asserted-by":"crossref","unstructured":"P. Runeson M. Host A. Rainer and B. Regnell. 2012. Case study research in software engineering: Guidelines and examples. John Wiley & Sons.  P. Runeson M. Host A. Rainer and B. Regnell. 2012. Case study research in software engineering: Guidelines and examples. John Wiley & Sons.","key":"e_1_2_1_92_1","DOI":"10.1002\/9781118181034"},{"unstructured":"M\u00e1rcio De Oliveira Barros and Arilo Cl\u00e1udio Dias-Neto. 2011. 0006\/2011 - Threats to validity in search-based software engineering empirical studies. RelaTe-DIA 5 1 (2011). http:\/\/www.seer.unirio.br\/monografiasppgi\/article\/view\/1479.  M\u00e1rcio De Oliveira Barros and Arilo Cl\u00e1udio Dias-Neto. 2011. 0006\/2011 - Threats to validity in search-based software engineering empirical studies. RelaTe-DIA 5 1 (2011). http:\/\/www.seer.unirio.br\/monografiasppgi\/article\/view\/1479.","key":"e_1_2_1_93_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_94_1","DOI":"10.1016\/j.jss.2014.08.024"},{"doi-asserted-by":"publisher","key":"e_1_2_1_95_1","DOI":"10.1109\/52.391832"},{"doi-asserted-by":"publisher","key":"e_1_2_1_96_1","DOI":"10.1109\/TSE.2007.38"},{"doi-asserted-by":"crossref","unstructured":"C. Wohlin P. Runeson M. Host M. Ohlsson B. Regnell and A. Wesslen. 2000. Experimentation in software engineering: An introduction. Kluwer Academic Publishers.  C. Wohlin P. Runeson M. Host M. Ohlsson B. Regnell and A. Wesslen. 2000. Experimentation in software engineering: An introduction. Kluwer Academic Publishers.","key":"e_1_2_1_97_1","DOI":"10.1007\/978-1-4615-4625-2"},{"key":"e_1_2_1_98_1","first-page":"1085","volume-title":"Proceedings of The Genetic and Evolutionary Computation Conference (GECCO\u201916)","volume":"2908850","author":"Pradhan D."},{"volume-title":"Proceedings of International Conference on Software Engineering (ICSE\u201913)","author":"Sayyad A. S.","key":"e_1_2_1_99_1"},{"volume-title":"Proceedings of 26th International Symposium on Software Reliability Engineering. IEEE, 393\u2013404","author":"Wang S.","key":"e_1_2_1_100_1"},{"volume-title":"Proceedings of 38th International Conference on Software Engineering. IEEE, 619--630","author":"Sarro F.","key":"e_1_2_1_101_1"},{"volume-title":"Proceedings of 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 54\u201363","author":"Yu H.","key":"e_1_2_1_102_1"},{"volume-title":"Proceedings of 4th International Conference on Model-Driven Engineering and Software Development (MODELSWARD\u201916)","author":"Yue T.","key":"e_1_2_1_103_1"},{"doi-asserted-by":"publisher","key":"e_1_2_1_104_1","DOI":"10.1016\/j.infsof.2012.09.006"},{"volume-title":"Proceedings of International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Springer, 337\u2013340","author":"De Moura L.","key":"e_1_2_1_105_1"},{"volume-title":"Proceedings of Workshop on Open-Source Software for Integer and Constraint Programming (OSSICP'08)","author":"Jussien N.","key":"e_1_2_1_106_1"},{"unstructured":"Veer B. and Dallaway J. 2010. The eCos component writer's guide. http:\/\/ecos.sourceware.org\/docs-3.0\/pdf\/ecos-3.0-cdl-guide-a4.pdf.  Veer B. and Dallaway J. 2010. The eCos component writer's guide. http:\/\/ecos.sourceware.org\/docs-3.0\/pdf\/ecos-3.0-cdl-guide-a4.pdf.","key":"e_1_2_1_107_1"},{"unstructured":"S. She and T. Berger. 2010. Formal semantics of the Kconfig language. Technical note University of Waterloo 24 (2010).  S. She and T. Berger. 2010. Formal semantics of the Kconfig language. Technical note University of Waterloo 24 (2010).","key":"e_1_2_1_108_1"},{"volume-title":"Component definition language. Department of SW Engineering. Master thesis","year":"1998","author":"Mencl V.","key":"e_1_2_1_109_1"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3464939","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3464939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:11Z","timestamp":1750191431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3464939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,3]]},"references-count":108,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,10,31]]}},"alternative-id":["10.1145\/3464939"],"URL":"https:\/\/doi.org\/10.1145\/3464939","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"type":"print","value":"1049-331X"},{"type":"electronic","value":"1557-7392"}],"subject":[],"published":{"date-parts":[[2021,8,3]]},"assertion":[{"value":"2020-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}