{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:14Z","timestamp":1750220474278,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,17]]},"DOI":"10.1145\/3486609.3487200","type":"proceedings-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T22:14:41Z","timestamp":1637619281000},"page":"69-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Delta-based verification of software product families"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5298-3369","authenticated-orcid":false,"given":"Marco","family":"Scaletta","sequence":"first","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8000-7613","authenticated-orcid":false,"given":"Reiner","family":"H\u00e4hnle","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4439-7129","authenticated-orcid":false,"given":"Dominic","family":"Steinh\u00f6fel","sequence":"additional","affiliation":[{"name":"CISPA, Germany"}]},{"given":"Richard","family":"Bubel","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12154-3_4"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49812-6"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-71500-7_2"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37521-7"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606594"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.23"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.102.4"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45231-8_9"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.11.015"},{"volume-title":"Information Processing \u201974","author":"Burstall Rod M.","key":"e_1_3_2_2_10_1","unstructured":"Rod M. Burstall . 1974. Program proving as hand simulation with a little induction . In Information Processing \u201974 . Elsevier\/North-Holland , Amsterdam . 308\u2013312. Rod M. Burstall. 1974. Program proving as hand simulation with a little induction. In Information Processing \u201974. Elsevier\/North-Holland, Amsterdam. 308\u2013312."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21455-4_13"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364412.2364422"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048113"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429094"},{"key":"e_1_3_2_2_15_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler Martin","year":"1999","unstructured":"Martin Fowler . 1999 . Refactoring: Improving the Design of Existing Code . Addison-Wesley , Boston . Martin Fowler. 1999. Refactoring: Improving the Design of Existing Code. Addison-Wesley, Boston."},{"key":"e_1_3_2_2_16_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler Martin","year":"2018","unstructured":"Martin Fowler . 2018 . Refactoring: Improving the Design of Existing Code . Addison-Wesley Professional , Boston . 2 nd edition Martin Fowler. 2018. Refactoring: Improving the Design of Existing Code. Addison-Wesley Professional, Boston. 2nd edition","edition":"2"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1472"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22045-6_7"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61470-6_8"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91908-9_18"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34026-0_4"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38574-2_21"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25271-6_8"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2002.1020288"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-010-0152-5"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64354-6_5"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647508.2647512"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-e.1983.0001"},{"key":"e_1_3_2_2_30_1","unstructured":"Gary T. Leavens Erik Poll Curtis Clifton Yoonsik Cheon Clyde Ruby David Cok Peter M\u00fcller Joseph Kiniry Patrice Chalin Daniel M. Zimmerman and Werner Dietl. 2013. JML Reference Manual. http:\/\/www.eecs.ucf.edu\/~leavens\/JML\/\/OldReleases\/jmlrefman.pdf Draft revision 2344  Gary T. Leavens Erik Poll Curtis Clifton Yoonsik Cheon Clyde Ruby David Cok Peter M\u00fcller Joseph Kiniry Patrice Chalin Daniel M. Zimmerman and Werner Dietl. 2013. JML Reference Manual. http:\/\/www.eecs.ucf.edu\/~leavens\/JML\/\/OldReleases\/jmlrefman.pdf Draft revision 2344"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/197320.197383"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3166064"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.161279"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053389"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15579-6_6"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64437-6_16"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03418-4_25"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30942-8_20"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580950"},{"volume-title":"d.]. SPL2go","author":"Th\u00fcm Thomas","key":"e_1_3_2_2_40_1","unstructured":"Thomas Th\u00fcm and Fabian Benduhn . [n. d.]. SPL2go . http:\/\/spl2go.cs.ovgu.de Accessed: 2021-09-23 Thomas Th\u00fcm and Fabian Benduhn. [n. d.]. SPL2go. http:\/\/spl2go.cs.ovgu.de Accessed: 2021-09-23"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336294.3342374"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480361.2371404"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.48"},{"key":"e_1_3_2_2_44_1","volume-title":"Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2016 (SE), Wien (CEUR Workshop Proceedings","volume":"54","author":"Winkelmann Tim","year":"2016","unstructured":"Tim Winkelmann , Jonathan Koscielny , Christoph Seidl , Sven Schuster , Ferruccio Damiani , and Ina Schaefer . 2016 . Parametric DeltaJ 1.5: Propagating Feature Attributes into Implementation Artifacts . In Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2016 (SE), Wien (CEUR Workshop Proceedings , Vol. 1559). CEUR-WS.org, Aachen. 40\u2013 54 . http:\/\/ceur-ws.org\/Vol-1559\/paper04.pdf Tim Winkelmann, Jonathan Koscielny, Christoph Seidl, Sven Schuster, Ferruccio Damiani, and Ina Schaefer. 2016. Parametric DeltaJ 1.5: Propagating Feature Attributes into Implementation Artifacts. In Gemeinsamer Tagungsband der Workshops der Tagung Software Engineering 2016 (SE), Wien (CEUR Workshop Proceedings, Vol. 1559). CEUR-WS.org, Aachen. 40\u201354. http:\/\/ceur-ws.org\/Vol-1559\/paper04.pdf"},{"key":"e_1_3_2_2_45_1","unstructured":"David Winterland. 2020. Abstract Execution for Correctness-by-Construction. Master\u2019s thesis. Technische Universit\u00e4t Braunschweig. https:\/\/www.tu-braunschweig.de\/isf\/team\/runge  David Winterland. 2020. Abstract Execution for Correctness-by-Construction. Master\u2019s thesis. Technische Universit\u00e4t Braunschweig. https:\/\/www.tu-braunschweig.de\/isf\/team\/runge"}],"event":{"name":"GPCE '21: Concepts and Experiences","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Chicago IL USA","acronym":"GPCE '21"},"container-title":["Proceedings of the 20th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486609.3487200","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3486609.3487200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:40Z","timestamp":1750193320000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486609.3487200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":45,"alternative-id":["10.1145\/3486609.3487200","10.1145\/3486609"],"URL":"https:\/\/doi.org\/10.1145\/3486609.3487200","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}