{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T18:57:44Z","timestamp":1768849064940,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61906069"],"award-info":[{"award-number":["61906069"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3510053","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"1945-1957","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Search-based diverse sampling from real-world software product lines"],"prefix":"10.1145","author":[{"given":"Yi","family":"Xiang","sequence":"first","affiliation":[{"name":"South China University of Technology, Guangzhou, China"}]},{"given":"Han","family":"Huang","sequence":"additional","affiliation":[{"name":"South China University of Technology, Guangzhou, China"}]},{"given":"Yuren","family":"Zhou","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, Guangzhou, China"}]},{"given":"Sizhe","family":"Li","sequence":"additional","affiliation":[{"name":"South China University of Technology, Guangzhou, China"}]},{"given":"Chuan","family":"Luo","sequence":"additional","affiliation":[{"name":"Microsoft Research, Beijing, China"}]},{"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft Research, Beijing, China"}]},{"given":"Miqing","family":"Li","sequence":"additional","affiliation":[{"name":"University of Birmingham, Birmingham, UK"}]},{"given":"Xiaowei","family":"Yang","sequence":"additional","affiliation":[{"name":"South China University of Technology, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94144-8_9"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993236.2993253"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-016-0569-2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31612-8_3"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554844_3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3233\/SAT190075"},{"key":"e_1_3_2_1_8_1","article-title":"Improving WalkSAT By Effective Tie-Breaking and Efficient","volume":"58","author":"Cai Shaowei","year":"2014","unstructured":"Shaowei Cai, Chuan Luo, and Kaile Su. 2014. Improving WalkSAT By Effective Tie-Breaking and Efficient Implementation. Comput. J. 58, 11 (11 2014), 2864--2875.","journal-title":"Implementation. Comput. J."},{"key":"e_1_3_2_1_9_1","volume-title":"Vardi","author":"Chakraborty Supratik","year":"2015","unstructured":"Supratik Chakraborty, Daniel J. Fremont, Kuldeep S. Meel, Sanjit A. Seshia, and Moshe Y. Vardi. 2015. On Parallel Scalable Uniform SAT Witness Generation. In Tools and Algorithms for the Construction and Analysis of Systems, Christel Baier and Cesare Tinelli (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 304--319."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2790925"},{"key":"e_1_3_2_1_11_1","volume-title":"Software product lines: practices and patterns","author":"Clements Paul","unstructured":"Paul Clements and Linda Northrop. 2001. Software product lines: practices and patterns. Addison-Wesley Longman Publishing Co., Inc. 467 pages."},{"key":"e_1_3_2_1_12_1","volume-title":"Coello Coello and Margarita Reyes Sierra","author":"Carlos","year":"2004","unstructured":"Carlos A. Coello Coello and Margarita Reyes Sierra. 2004. A Study of the Parallelization of a Coevolutionary Multi-objective Evolutionary Algorithm. In Mexican International Conference on Artificial Intelligence (MICAI). Springer Berlin Heidelberg, 688--697."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273482"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/368273.368557"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321707.3321752"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Genetic and Evolutionary Computation Conference","author":"Doncieux Stephane","year":"2020","unstructured":"Stephane Doncieux, Giuseppe Paolo, Alban Laflaqui\u00e8re, and Alexandre Coninx. 2020. Novelty Search makes Evolvability Inevitable. In Proceedings of the Genetic and Evolutionary Computation Conference (Canc\u00c3\u017en, Mexico) (GECCO'20). Association for Computing Machinery, New York, NY, USA, 85--93."},{"key":"e_1_3_2_1_18_1","volume-title":"Efficient Sampling of SAT Solutions for Testing. In 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE). IEEE Computer Society","author":"Dutra Rafael","year":"2018","unstructured":"Rafael Dutra, Kevin Laeufer, Jonathan Bachrach, and Koushik Sen. 2018. Efficient Sampling of SAT Solutions for Testing. In 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE). IEEE Computer Society, Los Alamitos, CA, USA, 549--559."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9135-7"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889205_56"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739480.2754736"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693089"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-017-0610-0"},{"key":"e_1_3_2_1_24_1","volume-title":"Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. In The 37th International Conference on Software Engineering","volume":"1","author":"Henard Christopher","year":"2015","unstructured":"Christopher Henard, Mike Papadakis, Mark Harman, and Yves Le Traon. 2015. Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. In The 37th International Conference on Software Engineering, Vol. 1. 517--528."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2327020"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499777.2499778"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382025.3414951"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897760"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2050655.2050721"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362536.2362547"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00112"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377024.3377042"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1162\/EVCO_a_00025"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the Eleventh International Conference on Artificial Life (ALIFE XI). 329--336","author":"Lehman Joel","unstructured":"Joel Lehman and Kenneth O. Stanley. 2008. Exploiting openendedness to solve problems through the search for novelty. In Proceedings of the Eleventh International Conference on Artificial Life (ALIFE XI). 329--336."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791070"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491437"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884793"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2866614.2866615"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106273"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336294.3342359"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2648511.2648521"},{"key":"e_1_3_2_1_45_1","volume-title":"AutoSMP: An Evaluation Platform for Sampling Algorithms","author":"Pett Tobias","unstructured":"Tobias Pett, Sebastian Krieter, Thomas Th\u00fcm, Malte Lochau, and Ina Schaefer. 2021. AutoSMP: An Evaluation Platform for Sampling Algorithms. Association for Computing Machinery, New York, NY, USA, 41--44."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336294.3336322"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00032"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100068"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.45"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693104"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of International Conference on Computer-Aided Verification (CAV).","author":"Soos Mate","unstructured":"Mate Soos, Stephan Gocht, and Kuldeep S. Meel. 2020. Tinted, Detached, and Lazy CNF-XOR solving and its Applications to Counting and Sampling. In Proceedings of International Conference on Computer-Aided Verification (CAV)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377024.3377025"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/11814948_38"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3057853"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2922419"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09761-2"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176644"}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","location":"Pittsburgh Pennsylvania","acronym":"ICSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510053","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:04Z","timestamp":1750191124000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":54,"alternative-id":["10.1145\/3510003.3510053","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3510053","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}