{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T05:41:39Z","timestamp":1770270099381,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":102,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Research Foundation (DFG)","award":["TH 2387\/1-1 and KE 2267\/1-1"],"award-info":[{"award-number":["TH 2387\/1-1 and KE 2267\/1-1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,20]]},"DOI":"10.1145\/3468264.3468531","type":"proceedings-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T01:44:18Z","timestamp":1629337458000},"page":"1007-1020","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Feature trace recording"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9388-0649","authenticated-orcid":false,"given":"Paul Maximilian","family":"Bittner","sequence":"first","affiliation":[{"name":"University of Ulm, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1509-1449","authenticated-orcid":false,"given":"Alexander","family":"Schulthei\u00df","sequence":"additional","affiliation":[{"name":"Humboldt University of Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8069-9584","authenticated-orcid":false,"given":"Thomas","family":"Th\u00fcm","sequence":"additional","affiliation":[{"name":"University of Ulm, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2582-5557","authenticated-orcid":false,"given":"Timo","family":"Kehrer","sequence":"additional","affiliation":[{"name":"Humboldt University of Berlin, Germany"}]},{"given":"Jeffrey M.","family":"Young","sequence":"additional","affiliation":[{"name":"Oregon State University, USA"}]},{"given":"Lukas","family":"Linsbauer","sequence":"additional","affiliation":[{"name":"TU Braunschweig, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00049"},{"key":"e_1_3_2_1_2_1","volume-title":"Ullman","author":"Aho Alfred V.","year":"2006","unstructured":"Alfred V. Aho , Monica S. Lam , Ravi Sethi , and Jeffrey D . Ullman . 2006 . Compilers : Principles, Techniques, and Tools (2nd Edition). Addison-Wesley . Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman. 2006. Compilers: Principles, Techniques, and Tools (2nd Edition). Addison-Wesley."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38977-1_22"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.71"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382025.3414955"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3023956.3023967"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591126"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37521-7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.34"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554844_3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4230\/DagRep.9.5.1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791108"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1993.346017"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.12.030"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.24355\/dbbs.084-202002271120-0"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45398-4_9"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/233269.233366"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/280277.280280"},{"key":"e_1_3_2_1_19_1","volume-title":"Generative Programming: Methods, Tools, and Applications","author":"Czarnecki Krzysztof","year":"2000","unstructured":"Krzysztof Czarnecki and Ulrich Eisenecker . 2000 . Generative Programming: Methods, Tools, and Applications . ACM\/Addison-Wesley . Krzysztof Czarnecki and Ulrich Eisenecker. 2000. Generative Programming: Methods, Tools, and Applications. ACM\/Addison-Wesley."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306336"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9557-6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.567"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1767751.1767754"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.13"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.42"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307630.3342392"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642982"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884632"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.218"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.44"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370175.1370199"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-012-0242-1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/359581.359603"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791107"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9233-9"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368131"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02571-6_11"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.45"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100050"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693079"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER52604.2021.00013"},{"key":"e_1_3_2_1_45_1","volume-title":"Proc. Int\u2019l Workshop on Reverse Variability Engineering (REVE). 1\u20138.","author":"Klatt Benjamin","year":"2013","unstructured":"Benjamin Klatt , Martin K\u00fcster , and Klaus Krogmann . 2013 . A Graph-Based Analysis Concept to Derive a Variation Point Design from Product Copies . In Proc. Int\u2019l Workshop on Reverse Variability Engineering (REVE). 1\u20138. Benjamin Klatt, Martin K\u00fcster, and Klaus Krogmann. 2013. A Graph-Based Analysis Concept to Derive a Variation Point Design from Product Copies. In Proc. Int\u2019l Workshop on Reverse Variability Engineering (REVE). 1\u20138."},{"key":"e_1_3_2_1_46_1","unstructured":"Rainer Koschke. 2007. Survey of Research on Software Clones. In Duplication Redundancy and Similarity in Software Rainer Koschke Ettore Merlo and Andrew Walenstein (Eds.) (Dagstuhl Seminar Proceedings 06301). IBFI. issn:1862\u20134405 http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2007\/962  Rainer Koschke. 2007. Survey of Research on Software Clones. In Duplication Redundancy and Similarity in Software Rainer Koschke Ettore Merlo and Andrew Walenstein (Eds.) (Dagstuhl Seminar Proceedings 06301). IBFI. issn:1862\u20134405 http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2007\/962"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-009-9077-8"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1201\/9780429022067-7"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1997.624264"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2012.05.003"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934466.2934485"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2011.6070391"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806819"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1960275.1960299"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136040.3136054"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889262"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SST.2015.16"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-015-0512-y"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134303"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00147"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.41"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791086"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517208.2517221"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2688333"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1981.231109"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.v21:2"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442391.3442403"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382026.3425776"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382025.3414954"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380151102"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01840446"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.90"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(85)90011-1"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491627.2491628"},{"key":"e_1_3_2_1_75_1","first-page":"334","article-title":"RTED: A Robust Algorithm for the Tree Edit Distance","volume":"5","author":"Pawlik Mateusz","year":"2011","unstructured":"Mateusz Pawlik and Nikolaus Augsten . 2011 . RTED: A Robust Algorithm for the Tree Edit Distance . Computing Research Repository (CoRR) , 5 , 4 (2011), 334 \u2013 345 . Mateusz Pawlik and Nikolaus Augsten. 2011. RTED: A Robust Algorithm for the Tree Edit Distance. Computing Research Repository (CoRR), 5, 4 (2011), 334\u2013345.","journal-title":"Computing Research Repository (CoRR)"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934466.2962726"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28901-1"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1016"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.01.008"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/800020.808247"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-3546-9_6"},{"key":"e_1_3_2_1_82_1","volume-title":"Proc. Europ. Conf. on Object-Oriented Programming (ECOOP). 1743","author":"Rieger Matthias","year":"1999","unstructured":"Matthias Rieger , St\u00e9phane Ducasse , and Georges Golomingi . 1999 . Tool Support for Refactoring Duplicated OO Code . In Proc. Europ. Conf. on Object-Oriented Programming (ECOOP). 1743 , Springer, 177\u2013178. Matthias Rieger, St\u00e9phane Ducasse, and Georges Golomingi. 1999. Tool Support for Refactoring Duplicated OO Code. In Proc. Europ. Conf. on Object-Oriented Programming (ECOOP). 1743, Springer, 177\u2013178."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36654-3_2"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491627.2491644"},{"key":"e_1_3_2_1_85_1","volume-title":"Proc. Seminar on Advanced Techniques and Tools for Software Evolution (SATToSE). Dipartimento di Informatica Universit\u00e0 degli Studi dell\u2019Aquila, L\u2019Aquila, Italy, 45\u201348","author":"Schmorleiz Thomas","year":"2014","unstructured":"Thomas Schmorleiz and Ralf L\u00e4mmel . 2014 . Similarity Management via History Annotation . In Proc. Seminar on Advanced Techniques and Tools for Software Evolution (SATToSE). Dipartimento di Informatica Universit\u00e0 degli Studi dell\u2019Aquila, L\u2019Aquila, Italy, 45\u201348 . Thomas Schmorleiz and Ralf L\u00e4mmel. 2014. Similarity Management via History Annotation. In Proc. Seminar on Advanced Techniques and Tools for Software Evolution (SATToSE). Dipartimento di Informatica Universit\u00e0 degli Studi dell\u2019Aquila, L\u2019Aquila, Italy, 45\u201348."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851785"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637365.2517215"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970288"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.35"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.2307\/2267445"},{"key":"e_1_3_2_1_91_1","volume-title":"or Portability Experience With C News","author":"Spencer Henry","unstructured":"Henry Spencer and Geoff Collyer . 1992. #ifdef Considered Harmful , or Portability Experience With C News . In USENIX. USENIX Association , 185\u2013197. Henry Spencer and Geoff Collyer. 1992. #ifdef Considered Harmful, or Portability Experience With C News. In USENIX. USENIX Association, 185\u2013197."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.88"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332461"},{"key":"e_1_3_2_1_94_1","volume-title":"Recording Concerns in Source Code Using Annotations. Computing Research Repository (CoRR), abs\/1808.03576","author":"Sul\u00edr Mat\u00fas","year":"2018","unstructured":"Mat\u00fas Sul\u00edr , Milan Nos\u00e1l , and Jaroslav Porub\u00e4n . 2018. Recording Concerns in Source Code Using Annotations. Computing Research Repository (CoRR), abs\/1808.03576 ( 2018 ). Mat\u00fas Sul\u00edr, Milan Nos\u00e1l, and Jaroslav Porub\u00e4n. 2018. Recording Concerns in Source Code Using Annotations. Computing Research Repository (CoRR), abs\/1808.03576 (2018)."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307630.3342414"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.35"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11245-9_3"},{"key":"e_1_3_2_1_98_1","first-page":"299","article-title":"Program Understanding Behaviour During Enhancement of Large-Scale Software","volume":"9","author":"von Mayrhauser Anneliese","year":"1997","unstructured":"Anneliese von Mayrhauser , A. Marie Vans , and Adele E. Howe . 1997 . Program Understanding Behaviour During Enhancement of Large-Scale Software . J. Software: Evolution and Process , 9 , 5 (1997), 299 \u2013 327 . https:\/\/doi.org\/10.1002\/(SICI)1096-908X(199709\/10)9:5<299::AID-SMR157>3.0.CO;2-S Anneliese von Mayrhauser, A. Marie Vans, and Adele E. Howe. 1997. Program Understanding Behaviour During Enhancement of Large-Scale Software. J. Software: Evolution and Process, 9, 5 (1997), 299\u2013327. https:\/\/doi.org\/10.1002\/(SICI)1096-908X(199709\/10)9:5<299::AID-SMR157>3.0.CO;2-S","journal-title":"J. Software: Evolution and Process"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362618"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1593"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.4360070105"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.13"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.24"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554874"}],"event":{"name":"ESEC\/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Athens Greece","acronym":"ESEC\/FSE '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3468531","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468264.3468531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:50Z","timestamp":1750195490000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3468531"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,18]]},"references-count":102,"alternative-id":["10.1145\/3468264.3468531","10.1145\/3468264"],"URL":"https:\/\/doi.org\/10.1145\/3468264.3468531","relation":{},"subject":[],"published":{"date-parts":[[2021,8,18]]},"assertion":[{"value":"2021-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}