{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:32:31Z","timestamp":1766579551572,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-17-CE25-0010-01 VaryVary project"],"award-info":[{"award-number":["ANR-17-CE25-0010-01 VaryVary project"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1145\/3546932.3546997","type":"proceedings-article","created":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T22:11:00Z","timestamp":1661379060000},"page":"85-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Feature subset selection for learning huge configuration spaces"],"prefix":"10.1145","author":[{"given":"Mathieu","family":"Acher","sequence":"first","affiliation":[{"name":"Univ Rennes, Rennes, France"}]},{"given":"Hugo","family":"Martin","sequence":"additional","affiliation":[{"name":"Univ Rennes, Rennes, France"}]},{"given":"Luc","family":"Lesoil","sequence":"additional","affiliation":[{"name":"Univ Rennes, Rennes, France"}]},{"given":"Arnaud","family":"Blouin","sequence":"additional","affiliation":[{"name":"Univ Rennes, Rennes, France"}]},{"given":"Jean-Marc","family":"J\u00e9z\u00e9quel","sequence":"additional","affiliation":[{"name":"Univ Rennes, Rennes, France"}]},{"given":"Djamel Eddine","family":"Khelladi","sequence":"additional","affiliation":[{"name":"Univ Rennes, Rennes, France"}]},{"given":"Olivier","family":"Barais","sequence":"additional","affiliation":[{"name":"Univ Rennes, Rennes, France"}]},{"given":"Juliana Alves","family":"Pereira","sequence":"additional","affiliation":[{"name":"PUC-Rio, Rio de Janeiro, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2022,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"URL https:\/\/elinux.org\/Kernel_Size_Tuning_Guide  URL https:\/\/elinux.org\/Kernel_Size_Tuning_Guide"},{"key":"e_1_3_2_1_2_1","unstructured":"Abadi M. Agarwal A. Barham P. Brevdo E. Chen Z. Citro C. Corrado G.S. Davis A. Dean J. Devin M. Ghemawat S. Goodfellow I. Harp A. Irving G. Isard M. Jia Y. Jozefowicz R. Kaiser L. Kudlur M. Levenberg J. Man\u00e9 D. Monga R. Moore S. Murray D. Olah C. Schuster M. Shlens J. Steiner B. Sutskever I. Talwar K. Tucker P. Vanhoucke V. Vasudevan V. Vi\u00e9gas F. Vinyals O. Warden P. Wattenberg M. Wicke M. Yu Y. Zheng X.: TensorFlow: Large-scale machine learning on heterogeneous systems (2015). URL https:\/\/www.tensorflow.org\/. Software available from tensorflow.org  Abadi M. Agarwal A. Barham P. Brevdo E. Chen Z. Citro C. Corrado G.S. Davis A. Dean J. Devin M. Ghemawat S. Goodfellow I. Harp A. Irving G. Isard M. Jia Y. Jozefowicz R. Kaiser L. Kudlur M. Levenberg J. Man\u00e9 D. Monga R. Moore S. Murray D. Olah C. Schuster M. Shlens J. Steiner B. Sutskever I. Talwar K. Tucker P. Vanhoucke V. Vasudevan V. Vi\u00e9gas F. Vinyals O. Warden P. Wattenberg M. Wicke M. Yu Y. Zheng X.: TensorFlow: Large-scale machine learning on heterogeneous systems (2015). URL https:\/\/www.tensorflow.org\/. Software available from tensorflow.org"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642990"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149119"},{"key":"e_1_3_2_1_5_1","first-page":"162","volume-title":"Proceedings","author":"Abbasi E.K.","year":"2013","unstructured":"Abbasi , E.K. , Hubaux , A. , Acher , M. , Boucher , Q. , Heymans , P. : The anatomy of a sales configurator: An empirical study of 111 cases. In: Advanced Information Systems Engineering - 25th International Conference, CAiSE 2013, Valencia, Spain, June 17--21, 2013 . Proceedings , pp. 162 -- 177 ( 2013 ) Abbasi, E.K., Hubaux, A., Acher, M., Boucher, Q., Heymans, P.: The anatomy of a sales configurator: An empirical study of 111 cases. In: Advanced Information Systems Engineering - 25th International Conference, CAiSE 2013, Valencia, Spain, June 17--21, 2013. Proceedings, pp. 162--177 (2013)"},{"key":"e_1_3_2_1_6_1","volume-title":"J\u00e9z\u00e9quel","author":"Acher M.","year":"2019","unstructured":"Acher , M. , Martin , H. , Alves Pereira , J. , Blouin , A. , Eddine Khelladi , D. , J\u00e9z\u00e9quel , J.M. : Learning From Thousands of Build Failures of Linux Kernel Configurations. Technical report, Inria; IRISA ( 2019 ). URL https:\/\/hal.inria.fr\/hal-02147012 Acher, M., Martin, H., Alves Pereira, J., Blouin, A., Eddine Khelladi, D., J\u00e9z\u00e9quel, J.M.: Learning From Thousands of Build Failures of Linux Kernel Configurations. Technical report, Inria; IRISA (2019). URL https:\/\/hal.inria.fr\/hal-02147012"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9510-8"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Breiman L.: Random forests. Machine learning 45(1) 5--32 (2001)  Breiman L.: Random forests. Machine learning 45 (1) 5--32 (2001)","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_9_1","first-page":"108","volume-title":"ECML PKDD Workshop: Languages for Data Mining and Machine Learning","author":"Buitinck L.","year":"2013","unstructured":"Buitinck , L. , Louppe , G. , Blondel , M. , Pedregosa , F. , Mueller , A. , Grisel , O. , Niculae , V. , Prettenhofer , P. , Gramfort , A. , Grobler , J. , Layton , R. , VanderPlas , J. , Joly , A. , Holt , B. , Varoquaux , G. : API design for machine learning software: experiences from the scikit-learn project . In: ECML PKDD Workshop: Languages for Data Mining and Machine Learning , pp. 108 -- 122 ( 2013 ) Buitinck, L., Louppe, G., Blondel, M., Pedregosa, F., Mueller, A., Grisel, O., Niculae, V., Prettenhofer, P., Gramfort, A., Grobler, J., Layton, R., VanderPlas, J., Joly, A., Holt, B., Varoquaux, G.: API design for machine learning software: experiences from the scikit-learn project. In: ECML PKDD Workshop: Languages for Data Mining and Machine Learning, pp. 108--122 (2013)"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46681-0_25"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2958031.2958038"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-015-0472-2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1600-0587.2012.07348.x"},{"key":"e_1_3_2_1_14_1","volume-title":"Smith","author":"Draper N.R.","year":"1998","unstructured":"Draper , N.R. , Smith , H. : Applied regression analysis, vol. 326 . John Wiley & Sons ( 1998 ) Draper, N.R., Smith, H.: Applied regression analysis, vol. 326. John Wiley & Sons (1998)"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194133.3194138"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180248"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602576.2602585"},{"key":"e_1_3_2_1_18_1","volume-title":"Dominici","author":"Fisher A.","year":"2018","unstructured":"Fisher , A. , Rudin , C. , Dominici , F. : All models are wrong, but many are useful: Learning a variable's importance by studying an entire class of prediction models simultaneously ( 2018 ) Fisher, A., Rudin, C., Dominici, F.: All models are wrong, but many are useful: Learning a variable's importance by studying an entire class of prediction models simultaneously (2018)"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.18420\/fgbs2022f-03"},{"key":"e_1_3_2_1_20_1","volume-title":"Hands-on machine learning with Scikit-Learn and TensorFlow: concepts, tools, and techniques to build intelligent systems. \"O'Reilly Media","author":"G\u00e9ron A.","year":"2017","unstructured":"G\u00e9ron , A. : Hands-on machine learning with Scikit-Learn and TensorFlow: concepts, tools, and techniques to build intelligent systems. \"O'Reilly Media , Inc .\" ( 2017 ) G\u00e9ron, A.: Hands-on machine learning with Scikit-Learn and TensorFlow: concepts, tools, and techniques to build intelligent systems. \"O'Reilly Media, Inc.\" (2017)"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.18"},{"key":"e_1_3_2_1_22_1","volume-title":"Apel","author":"Grebhahn A.","year":"2017","unstructured":"Grebhahn , A. , Rodrigo , C. , Siegmund , N. , Gaspar , F.J. , Apel , S. : Performance-influence models of multigrid methods: A case study on triangular grids. Concurrency and Computation: Practice and Experience 29(17), e4057 ( 2017 ) Grebhahn, A., Rodrigo, C., Siegmund, N., Gaspar, F.J., Apel, S.: Performance-influence models of multigrid methods: A case study on triangular grids. Concurrency and Computation: Practice and Experience 29(17), e4057 (2017)"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693089"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9635-4"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243838"},{"key":"e_1_3_2_1_26_1","unstructured":"https:\/\/tiny.wiki.kernel.org\/: Linux kernel tinification. Last access: july 2019  https:\/\/tiny.wiki.kernel.org\/: Linux kernel tinification. Last access: july 2019"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-011-0220-1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110147.2110164"},{"key":"e_1_3_2_1_29_1","volume-title":"Garlan","author":"Jamshidi P.","year":"1903","unstructured":"Jamshidi , P. , C\u00e1mara , J. , Schmerl , B. , K\u00e4stner , C. , Garlan , D. : Machine learning meets quantitative planning: Enabling self-adaptation in autonomous robots. arXiv preprint arXiv: 1903 .03920 (2019) Jamshidi, P., C\u00e1mara, J., Schmerl, B., K\u00e4stner, C., Garlan, D.: Machine learning meets quantitative planning: Enabling self-adaptation in autonomous robots. arXiv preprint arXiv:1903.03920 (2019)"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115661"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591191"},{"volume-title":"Proceedings of the IEEE\/ACM International Conference on Software Engineering (ICSE). ACM (2019)","author":"Kaltenecker C.","key":"e_1_3_2_1_32_1","unstructured":"Kaltenecker , C. , Grebhahn , A. , Siegmund , N. , Guo , J. , Apel , S. : Distance-based sampling of software configuration spaces . In: Proceedings of the IEEE\/ACM International Conference on Software Engineering (ICSE). ACM (2019) Kaltenecker, C., Grebhahn, A., Siegmund, N., Guo, J., Apel, S.: Distance-based sampling of software configuration spaces. In: Proceedings of the IEEE\/ACM International Conference on Software Engineering (ICSE). ACM (2019)"},{"key":"e_1_3_2_1_33_1","volume-title":"Apel","author":"Kolesnikov S.","year":"2017","unstructured":"Kolesnikov , S. , Siegmund , N. , K\u00e4stner , C. , Apel , S. : On the relation of external and internal feature interactions: A case study. arXiv preprint arXiv:1712.07440 ( 2017 ) Kolesnikov, S., Siegmund, N., K\u00e4stner, C., Apel, S.: On the relation of external and internal feature interactions: A case study. arXiv preprint arXiv:1712.07440 (2017)"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-018-0662-9"},{"key":"e_1_3_2_1_35_1","first-page":"1","volume-title":"Mizuno","author":"Kondo M.","year":"2019","unstructured":"Kondo , M. , Bezemer , C.P. , Kamei , Y. , Hassan , A.E. , Mizuno , O. : The impact of feature reduction techniques on defect prediction models. Empirical Software Engineering pp. 1 -- 39 ( 2019 ) Kondo, M., Bezemer, C.P., Kamei, Y., Hassan, A.E., Mizuno, O.: The impact of feature reduction techniques on defect prediction models. Empirical Software Engineering pp. 1--39 (2019)"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301417.3312501"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972557"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.62"},{"key":"e_1_3_2_1_39_1","first-page":"601","volume-title":"2018 USENIX Annual Technical Conference, USENIX ATC 2018","author":"Lawall J.","year":"2018","unstructured":"Lawall , J. , Muller , G. : Coccinelle: 10 years of automated evolution in the linux kernel . In: 2018 USENIX Annual Technical Conference, USENIX ATC 2018 , Boston, MA, USA, July 11--13 , 2018 ., pp. 601 -- 614 (2018). URL https:\/\/www.usenix.org\/conference\/atc18\/presentation\/lawall Lawall, J., Muller, G.: Coccinelle: 10 years of automated evolution in the linux kernel. In: 2018 USENIX Annual Technical Conference, USENIX ATC 2018, Boston, MA, USA, July 11--13, 2018., pp. 601--614 (2018). URL https:\/\/www.usenix.org\/conference\/atc18\/presentation\/lawall"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00092"},{"key":"e_1_3_2_1_41_1","first-page":"136","volume-title":"Wasowski","author":"Lotufo R.","year":"2010","unstructured":"Lotufo , R. , She , S. , Berger , T. , Czarnecki , K. , Wasowski , A. : Evolution of the linux kernel variability model. In : Proc. of SPLC'10, LNCS , vol. 6287 , pp. 136 -- 150 ( 2010 ) Lotufo, R., She, S., Berger, T., Czarnecki, K., Wasowski, A.: Evolution of the linux kernel variability model. In: Proc. of SPLC'10, LNCS, vol. 6287, pp. 136--150 (2010)"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3116768"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461001.3471155"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884793"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970322"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2866614.2866615"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2866614.2866615"},{"key":"e_1_3_2_1_48_1","unstructured":"Molnar C.: Interpretable Machine Learning. Lulu. com (2020)  Molnar C.: Interpretable Machine Learning. Lulu. com (2020)"},{"key":"e_1_3_2_1_49_1","volume-title":"Czarnecki","author":"Nadi S.","year":"2015","unstructured":"Nadi , S. , Berger , T. , K\u00e4stner , C. , Czarnecki , K. : Where do configuration constraints stem from? an extraction approach and an empirical study. IEEE Trans. Software Eng . ( 2015 ) Nadi, S., Berger, T., K\u00e4stner, C., Czarnecki, K.: Where do configuration constraints stem from? an extraction approach and an empirical study. IEEE Trans. Software Eng. (2015)"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/2487085.2487112"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486839"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2865772"},{"volume-title":"Embedded Linux Conference North-America","author":"Opdenacker M.","key":"e_1_3_2_1_53_1","unstructured":"Opdenacker , M. : Bof: Embedded linux size (2018) . Embedded Linux Conference North-America Opdenacker, M.: Bof: Embedded linux size (2018). Embedded Linux Conference North-America"},{"key":"e_1_3_2_1_54_1","volume-title":"Howard","author":"Parr T.","year":"2018","unstructured":"Parr , T. , Turgutlu , K. , Csiszar , C. , Howard , J. : Beware Default Random Forest Importances ( 2018 ). Last access: july 2019 Parr, T., Turgutlu, K., Csiszar, C., Howard, J.: Beware Default Random Forest Importances (2018). Last access: july 2019"},{"key":"e_1_3_2_1_55_1","article-title":"A study of feature scattering in the linux kernel","author":"Passos L.","year":"2018","unstructured":"Passos , L. , Queiroz , R. , Mukelabai , M. , Berger , T. , Apel , S. , Czarnecki , K. , Padilla , J. : A study of feature scattering in the linux kernel . IEEE Transactions on Software Engineering ( 2018 ) Passos, L., Queiroz, R., Mukelabai, M., Berger, T., Apel, S., Czarnecki, K., Padilla, J.: A study of feature scattering in the linux kernel. IEEE Transactions on Software Engineering (2018)","journal-title":"IEEE Transactions on Software Engineering ("},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2884911"},{"key":"e_1_3_2_1_57_1","volume-title":"Ventresque","author":"Pereira J.A.","year":"2019","unstructured":"Pereira , J.A. , Martin , H. , Acher , M. , J\u00e9z\u00e9quel , J.M. , Botterweck , G. , Ventresque , A. : Learning software configuration spaces: A systematic literature review ( 2019 ) Pereira, J.A., Martin, H., Acher, M., J\u00e9z\u00e9quel, J.M., Botterweck, G., Ventresque, A.: Learning software configuration spaces: A systematic literature review (2019)"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00032"},{"key":"e_1_3_2_1_59_1","first-page":"156","volume-title":"Lohmann","author":"Rothberg V.","year":"2016","unstructured":"Rothberg , V. , Dietrich , C. , Ziegler , A. , Lohmann , D. : Towards scalable configuration testing in variable software. In : ACM SIGPLAN Notices, vol. 52 , pp. 156 -- 167 . ACM ( 2016 ) Rothberg, V., Dietrich, C., Ziegler, A., Lohmann, D.: Towards scalable configuration testing in variable software. In: ACM SIGPLAN Notices, vol. 52, pp. 156--167. ACM (2016)"},{"key":"e_1_3_2_1_60_1","volume-title":"Czarnecki","author":"Sarkar A.","year":"2015","unstructured":"Sarkar , A. , Guo , J. , Siegmund , N. , Apel , S. , Czarnecki , K. : Cost-efficient sampling for performance prediction of configurable systems (t). In : ASE '15 ( 2015 ) Sarkar, A., Guo, J., Siegmund, N., Apel, S., Czarnecki, K.: Cost-efficient sampling for performance prediction of configurable systems (t). In: ASE'15 (2015)"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.31"},{"key":"e_1_3_2_1_62_1","article-title":"Software configuration engineering in practice: Interviews, survey, and systematic literature review","author":"Sayagh M.","year":"2018","unstructured":"Sayagh , M. , Kerzazi , N. , Adams , B. , Petrillo , F. : Software configuration engineering in practice: Interviews, survey, and systematic literature review . IEEE Transactions on Software Engineering ( 2018 ) Sayagh, M., Kerzazi, N., Adams, B., Petrillo, F.: Software configuration engineering in practice: Interviews, survey, and systematic literature review. IEEE Transactions on Software Engineering (2018)","journal-title":"IEEE Transactions on Software Engineering ("},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786845"},{"key":"e_1_3_2_1_64_1","volume-title":"Apel","author":"Siegmund N.","year":"2015","unstructured":"Siegmund , N. , Grebhahn , A. , K\u00e4stner , C. , Apel , S. : Performance-influence models for highly configurable systems. In : ESEC\/FSE '15 ( 2015 ) Siegmund, N., Grebhahn, A., K\u00e4stner, C., Apel, S.: Performance-influence models for highly configurable systems. In: ESEC\/FSE'15 (2015)"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPLC.2011.20"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.07.020"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106251"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2010.26"},{"key":"e_1_3_2_1_69_1","unstructured":"Supplementary material (Web page): https:\/\/github.com\/tuxml\/size-analysis  Supplementary material (Web page): https:\/\/github.com\/tuxml\/size-analysis"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Th\u00fcm T. Apel S. K\u00e4stner C. Schaefer I. Saake G.: A classification and survey of analysis strategies for software product lines. ACM Computing Surveys (2014)  Th\u00fcm T. Apel S. K\u00e4stner C. Schaefer I. Saake G.: A classification and survey of analysis strategies for software product lines. ACM Computing Surveys (2014)","DOI":"10.1007\/978-3-642-37521-7"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/299157.299165"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3030216"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3233027.3233030"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227206"},{"volume-title":"34th International Conference on Software Engineering (2012)","author":"Xiong Y.","key":"e_1_3_2_1_76_1","unstructured":"Xiong , Y. , Hubaux , A. , She , S. , Czarnecki , K. : Generating range fixes for software configuration . In: 34th International Conference on Software Engineering (2012) Xiong, Y., Hubaux, A., She, S., Czarnecki, K.: Generating range fixes for software configuration. In: 34th International Conference on Software Engineering (2012)"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2383381"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786852"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.8"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272998.1273020"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106287"}],"event":{"name":"SPLC '22: 26th ACM International Systems and Software Product Line Conference","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Graz Austria","acronym":"SPLC '22"},"container-title":["Proceedings of the 26th ACM International Systems and Software Product Line Conference - Volume A"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546932.3546997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546932.3546997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:41Z","timestamp":1750186841000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546932.3546997"}},"subtitle":["the case of linux kernel size"],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":81,"alternative-id":["10.1145\/3546932.3546997","10.1145\/3546932"],"URL":"https:\/\/doi.org\/10.1145\/3546932.3546997","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]},"assertion":[{"value":"2022-09-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}