{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T17:49:06Z","timestamp":1776361746278,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":95,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The authors are supported by the DFG through the Collaborative Research Center TRR 248 (https:\/\/perspicuous-computing.science), the Cluster of Excellence EXC 2050\/1 (CeTI, project ID 390696704, as part of Germany?s Excellence Strategy, and the Research Training Groups QuantLA (GRK 1763) and RoSI (GRK 1907)."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3510200","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"325-337","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Causality in configurable software systems"],"prefix":"10.1145","author":[{"given":"Clemens","family":"Dubslaff","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Dresden, Dresden, Germany"}]},{"given":"Kallistos","family":"Weis","sequence":"additional","affiliation":[{"name":"Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Christel","family":"Baier","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Dresden, Dresden, Germany"}]},{"given":"Sven","family":"Apel","sequence":"additional","affiliation":[{"name":"Saarland University, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Article 10","author":"Abal Iago","year":"2018","unstructured":"Iago Abal, Jean Melo, \u015etefan St\u0103nciulescu, Claus Brabrand, M\u00e1rcio Ribeiro, and Andrzej W\u0103sowski. 2018. Variability Bugs in Highly Configurable Systems: A Qualitative Analysis. Transactions on Software Engineering and Methodology 26, Article 10 (2018)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3176764.3176775"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Feature Interactions: The Next Generation (Dagstuhl Seminar 14281)","volume":"4","author":"Apel Sven","year":"2014","unstructured":"Sven Apel, Joanne M. Atlee, Luciano Baresi, and Pamela Zave. 2014. Feature Interactions: The Next Generation (Dagstuhl Seminar 14281). Dagstuhl Reports 4 (2014), 1--24.","journal-title":"Dagstuhl Reports"},{"key":"e_1_3_2_1_4_1","volume-title":"Feature-Oriented Software Product Lines - Concepts and Implementation","author":"Apel Sven","unstructured":"Sven Apel, Don S. Batory, Christian K\u00e4stner, and Gunter Saake. 2013. Feature-Oriented Software Product Lines - Concepts and Implementation. Springer."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606594"},{"key":"e_1_3_2_1_6_1","first-page":"301","article-title":"Tactile computing: Essential building blocks for the Tactile Internet. Academic Press","volume":"13","author":"A\u00dfmann Uwe","year":"2021","unstructured":"Uwe A\u00dfmann, Christel Baier, Clemens Dubslaff, Dominik Grzelak, Simon Hanisch, Ardhi P P Hartono, Stefan K\u00f6psell, Tianfang Lin, and Thorsten Strufe. 2021. Tactile computing: Essential building blocks for the Tactile Internet. Academic Press, Chapter 13, 301--326.","journal-title":"Chapter"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831717"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 48th International Colloquium on Automata, Languages, and Programming (ICALP)","volume":"198","author":"Baier Christel","year":"2021","unstructured":"Christel Baier, Clemens Dubslaff, Florian Funke, Simon Jantsch, Rupak Majumdar, Jakob Piribauer, and Robin Ziemek. 2021. From Verification to Causality-Based Explications. In Proceedings of the 48th International Colloquium on Automata, Languages, and Programming (ICALP), Vol. LIPIcs:198. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik, 1--20."},{"key":"e_1_3_2_1_9_1","volume-title":"Principles of Model Checking","author":"Baier Christel","unstructured":"Christel Baier and Joost-Pieter Katoen. 2008. Principles of Model Checking. MIT Press."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336294.3336295"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-011-0132-2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2491976"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00352-3"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-006-0002-5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(78)90168-1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622487.1622491"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382025.3414962"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-017-0432-4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/5397.5399"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2010.10.005"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-012-0234-1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.86"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 27th International Conference on Software Engineering (ICSE). ACM, 342--351","author":"Cleve Holger","year":"2005","unstructured":"Holger Cleve and Andreas Zeller. 2005. Locating causes of program failures. In Proceedings of the 27th International Conference on Software Engineering (ICSE). ACM, 342--351."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499777.2499781"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1992.227866"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416620"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-7b98e3ed-004"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30446-1_9"},{"key":"e_1_3_2_1_30_1","volume-title":"Quantitative Analysis of Configurable and Reconfigurable Systems. Ph. D. Dissertation. TU Dresden","author":"Dubslaff Clemens","unstructured":"Clemens Dubslaff. 2021. Quantitative Analysis of Configurable and Reconfigurable Systems. Ph. D. Dissertation. TU Dresden, Institute for Theoretical Computer Science."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46734-3_5"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.3850\/978-981-11-2724-3_0618-cd"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34968-4_11"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.316.5"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 30th European Safety and Reliability Conference (ESREL) and 15th Probabilistic Safety Assessment and Management Conference (PSAM).","author":"Dubslaff Clemens","year":"2020","unstructured":"Clemens Dubslaff, Andrey Morozov, Christel Baier, and Klaus Janschek. 2020. Reduction Methods on Error-Propagation Graphs for Quantitative Systems Reliability Analysis. In Proceedings of the 30th European Safety and Reliability Conference (ESREL) and 15th Probabilistic Safety Assessment and Management Conference (PSAM)."},{"key":"e_1_3_2_1_36_1","unstructured":"Clemens Dubslaff Kallistos Weis Christel Baier and Sven Apel. 2021. FeatCause - Sources and Data. https:\/\/github.com\/dubslaff\/FeatCause"},{"key":"e_1_3_2_1_37_1","volume-title":"Probabilistic causality","author":"Eells Ellery","unstructured":"Ellery Eells. 1991. Probabilistic causality. Cambridge University Press."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(02)00271-0"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2005.12.003"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 22nd International Symposium on Software Reliability Engineering (ISSRE). ACM, 90--99","author":"Brady","unstructured":"Brady J. Garvin and Myra B. Cohen. 2011. Feature Interaction Faults Revisited: An Exploratory Study. In Proceedings of the 22nd International Symposium on Software Reliability Engineering (ISSRE). ACM, 90--99."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 5th Workshop on Software Profuct Family Engineering (PFE)","volume":"3014","author":"Gomaa Hassan","year":"2003","unstructured":"Hassan Gomaa and Mohamed Hussein. 2003. Dynamic Software Reconfiguration in Software Product Families. In Proceedings of the 5th Workshop on Software Profuct Family Engineering (PFE), Vol. LNCS:3014. 435--444."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjps\/IX.36.307"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44829-2_8"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9573-6"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI). AAAI, 3022--3033","author":"Halpern Joseph Y.","year":"2015","unstructured":"Joseph Y. Halpern. 2015. A Modification of the Halpern-Pearl Definition of Causality. In Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI). AAAI, 3022--3033."},{"key":"e_1_3_2_1_46_1","volume-title":"Halpern and Judea Pearl","author":"Joseph","year":"2001","unstructured":"Joseph Y. Halpern and Judea Pearl. 2001. Causes and Explanations: A Structural-Model Approach - Part I: Causes. In Proceedings of the 17th Conference in Uncertainty in Artificial Intelligence (UAI). Morgan Kaufmann, 194--202."},{"key":"e_1_3_2_1_47_1","volume-title":"Halpern and Judea Pearl","author":"Joseph","year":"2001","unstructured":"Joseph Y. Halpern and Judea Pearl. 2001. Causes and Explanations: A Structural-Model Approach - Part II: Explanations. In Proceedings of the 17th International Joint Conference on Artificial Intelligence (IJCAI). Morgan Kaufmann, 27--34."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI). IJCAI\/AAAI, 566--571","author":"Hemaspaandra Edith","year":"2011","unstructured":"Edith Hemaspaandra and Henning Schnoor. 2011. Minimization for Generalized Boolean Formulas. In Proceedings of the 22nd International Joint Conference on Artificial Intelligence (IJCAI). IJCAI\/AAAI, 566--571."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59152-6_19"},{"key":"e_1_3_2_1_50_1","volume-title":"Baishakhi Ray, and Pooyan Jamshidi.","author":"Iqbal Md Shahriar","year":"2021","unstructured":"Md Shahriar Iqbal, Rahul Krishna, Mohammad Ali Javidian, Baishakhi Ray, and Pooyan Jamshidi. 2021. CADET: Debugging and Fixing Misconfigurations using Counterfactual Reasoning. arXiv:2010.06061 [cs.SE]"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380377"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.2987024"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00112"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-018-0662-9"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.24"},{"key":"e_1_3_2_1_57_1","volume-title":"Counterfactual Theories of Causation. Journal of Philosophy","author":"Lewis David","year":"1973","unstructured":"David Lewis. 1973. Counterfactual Theories of Causation. Journal of Philosophy (1973), 556--567."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAS.2009.24"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2866614.2866620"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1956.tb03835.x"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/157485.165069"},{"key":"e_1_3_2_1_62_1","volume-title":"The art of software testing","author":"Myers Glenford J.","unstructured":"Glenford J. Myers. 2004. The art of software testing. Wiley."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2870895"},{"key":"e_1_3_2_1_64_1","volume-title":"Principles of Program Analysis","author":"Nielson Flemming","unstructured":"Flemming Nielson, Hanne R. Nielson, and Chris Hankin. 2010. Principles of Program Analysis. Springer."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00289615"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/1642718"},{"key":"e_1_3_2_1_67_1","unstructured":"J. Peters D. Janzing and B. Sch\u00f6lkopf. 2017. Elements of Causal Inference: Foundations and Learning Algorithms. MIT Press."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(00)00018-6"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"e_1_3_2_1_70_1","volume-title":"Proceedings of the 23rd Conference on Automated Software Engineering (ASE). IEEE, 347--350","author":"Post H.","unstructured":"H. Post and C. Sinz. 2008. Configuration Lifting: Verification Meets Software Configuration. In Proceedings of the 23rd Conference on Automated Software Engineering (ASE). IEEE, 347--350."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390641"},{"key":"e_1_3_2_1_72_1","volume-title":"Article 18","author":"Rhein Alexander Von","year":"2018","unstructured":"Alexander Von Rhein, J\u00f6rg Liebig, Andreas Janker, Christian K\u00e4stner, and Sven Apel. 2018. Variability-Aware Static Analysis at Scale: An Empirical Study. Transactions on Software Engineering and Methodology 27, Article 18 (2018)."},{"key":"e_1_3_2_1_73_1","volume-title":"Risk and Reliability Division","author":"ABS Group Inc.","year":"1999","unstructured":"ABS Group Inc. Risk and Reliability Division. 1999. Root Cause Analysis Handbook: A Guide to Effective Incident Investigation. Government Institutes."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2015.34"},{"key":"e_1_3_2_1_75_1","first-page":"45","article-title":"Root Cause Analysis For Beginners","volume":"37","author":"Rooney James J","year":"2004","unstructured":"James J Rooney and Lee N. Vanden Heuvel. 2004. Root Cause Analysis For Beginners. Quality Progress 37 (2004), 45.","journal-title":"Quality Progress"},{"key":"e_1_3_2_1_76_1","volume-title":"Proceedings of the 2012 International Symposium on Software Testing and Analysis (ISSTA). ACM, 309--319","author":"R\u00f6\u00dfler Jeremias","year":"2012","unstructured":"Jeremias R\u00f6\u00dfler, Gordon Fraser, Andreas Zeller, and Alessandro Orso. 2012. Isolating Failure Causes through Test Case Generation. In Proceedings of the 2012 International Symposium on Software Testing and Analysis (ISSTA). ACM, 309--319."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786845"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337243"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.07.020"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9152-9"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637365.2517209"},{"key":"e_1_3_2_1_82_1","unstructured":"Fabio Somenzi. 1997. CUDD 3.0.0. http:\/\/vlsi.colorado.edu\/~fabio\/CUDD\/html\/"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/0885-064X(92)90033-8"},{"key":"e_1_3_2_1_84_1","volume-title":"Proceedings of the 7th Symposium on Leveraging Applications of Formal Methods (ISoLA)","volume":"9952","author":"Beek Maurice H.","year":"2016","unstructured":"Maurice H. ter Beek, Axel Legay, Alberto Lluch Lafuente, and Andrea Vandin. 2016. Statistical Model Checking for Product Lines. In Proceedings of the 7th Symposium on Leveraging Applications of Formal Methods (ISoLA), Vol. LNCS:9952. Springer, 114--133."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580950"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.29007\/1mjd"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-020-00273-8"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00100"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.39"},{"key":"e_1_3_2_1_90_1","first-page":"841","article-title":"Counterfactual Explanations without Opening the Black Box: Automated Decisions and the GDPR","volume":"31","author":"Wachter Sandra","year":"2017","unstructured":"Sandra Wachter, Brent D. Mittelstadt, and Chris Russell. 2017. Counterfactual Explanations without Opening the Black Box: Automated Decisions and the GDPR. Harvard Journal of Law and Technology 31 (2017), 841--887.","journal-title":"Harvard Journal of Law and Technology"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00099"},{"key":"e_1_3_2_1_92_1","volume-title":"Probabilistic Theories of Causation. The Oxford Handbook of Causation","author":"Williamson Jon","year":"2009","unstructured":"Jon Williamson. 2009. Probabilistic Theories of Causation. The Oxford Handbook of Causation (2009), 185--212."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.8"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0287-8_2"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.15"}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","location":"Pittsburgh Pennsylvania","acronym":"ICSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510200","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:24Z","timestamp":1750191144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":95,"alternative-id":["10.1145\/3510003.3510200","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3510200","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}