{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T20:33:28Z","timestamp":1774125208451,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"German Research Foundation","award":["TH 2387\/1-1 and KE 2267\/1-1"],"award-info":[{"award-number":["TH 2387\/1-1 and KE 2267\/1-1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1145\/3646548.3672593","type":"proceedings-article","created":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T12:19:07Z","timestamp":1723205947000},"page":"84-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Give an Inch and Take a Mile? Effects of Adding Reliable Knowledge to Heuristic Feature Tracing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8950-0092","authenticated-orcid":false,"given":"Sandra","family":"Greiner","sequence":"first","affiliation":[{"name":"University of Bern, Switzerland and University of Southern Denmark, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1509-1449","authenticated-orcid":false,"given":"Alexander","family":"Schulthei\u00df","sequence":"additional","affiliation":[{"name":"Paderborn University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9388-0649","authenticated-orcid":false,"given":"Paul Maximilian","family":"Bittner","sequence":"additional","affiliation":[{"name":"Paderborn University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8069-9584","authenticated-orcid":false,"given":"Thomas","family":"Th\u00fcm","sequence":"additional","affiliation":[{"name":"Paderborn University, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2582-5557","authenticated-orcid":false,"given":"Timo","family":"Kehrer","sequence":"additional","affiliation":[{"name":"University of Bern, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2024,9,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38977-1_22"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.71"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564719.3568685"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591126"},{"key":"e_1_3_2_1_5_1","volume-title":"Feature-Oriented Software Product Lines","author":"Apel Sven","unstructured":"Sven Apel, Don Batory, Christian K\u00e4stner, and Gunter Saake. 2013. Feature-Oriented Software Product Lines. Springer."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. Int\u2019l Workshop on Reverse Variability Engineering (REVE). ACM, 52\u201359","author":"Klewerton\u00a0Guez Assun\u00e7\u00e3o Wesley","year":"2014","unstructured":"Wesley Klewerton\u00a0Guez Assun\u00e7\u00e3o and Silvia\u00a0Regina Vergilio. 2014. Feature Location for Software Product Line Migration: A Mapping Study. In Proc. Int\u2019l Workshop on Reverse Variability Engineering (REVE). ACM, 52\u201359."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3663529.3663813"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468531"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549108"},{"key":"e_1_3_2_1_10_1","volume-title":"Evolving Software Systems","author":"Botterweck Goetz","unstructured":"Goetz Botterweck and Andreas Pleuss. 2014. Evolution of Software Product Lines. In Evolving Software Systems. Springer, 265\u2013295."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593891"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302333.3302343"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.567"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.13"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.42"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.218"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510466.3510470"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.12620493"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302333.3302341"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370175.1370199"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297510"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791107"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9233-9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368131"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.45"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384673"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. Int\u2019l Workshop on Reverse Variability Engineering (REVE). 1\u20138.","author":"Klatt Benjamin","year":"2013","unstructured":"Benjamin Klatt, Martin K\u00fcster, and Klaus Krogmann. 2013. A Graph-Based Analysis Concept to Derive a Variation Point Design From Product Copies. In Proc. Int\u2019l Workshop on Reverse Variability Engineering (REVE). 1\u20138."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101923"},{"key":"e_1_3_2_1_29_1","volume-title":"Software Engineering for Variability Intensive Systems - Foundations and Applications","author":"Kr\u00fcger Jacob","unstructured":"Jacob Kr\u00fcger, Thorsten Berger, and Thomas Leich. 2019. Features and How to Find Them: A Survey of Manual Feature Location. In Software Engineering for Variability Intensive Systems - Foundations and Applications. Auerbach Publications \/ Taylor & Francis, 153\u2013172."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934466.2934485"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806819"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SST.2015.16"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-015-0512-y"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-021-00361-5"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3109729.3109748"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3233027.3236402"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791086"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442391.3442403"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336294.3342360"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111532"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461001.3461660"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461001.3473065"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10104-3"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3324719"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1016"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579028.3609012"},{"key":"e_1_3_2_1_47_1","volume-title":"Domain Engineering: Product Lines, Languages, and Conceptual Models, Iris Reinhartz-Berger","author":"Rubin Julia","unstructured":"Julia Rubin and Marsha Chechik. 2013. A Survey of Feature Location Techniques. In Domain Engineering: Product Lines, Languages, and Conceptual Models, Iris Reinhartz-Berger, Arnon Sturm, Tony Clark, Sholom Cohen, and Jorn Bettin (Eds.). Springer, 29\u201358."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491627.2491644"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3585008"},{"key":"e_1_3_2_1_50_1","volume-title":"Proc. Seminar on Advanced Techniques and Tools for Software Evolution (SATToSE). Dipartimento di Informatica Universit\u00e0 degli Studi dell\u2019Aquila, L\u2019Aquila, Italy, 45\u201348","author":"Schmorleiz Thomas","year":"2014","unstructured":"Thomas Schmorleiz and Ralf L\u00e4mmel. 2014. Similarity Management via History Annotation. In Proc. Seminar on Advanced Techniques and Tools for Software Evolution (SATToSE). Dipartimento di Informatica Universit\u00e0 degli Studi dell\u2019Aquila, L\u2019Aquila, Italy, 45\u201348."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3530019.3534084"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970288"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.35"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"George Spanoudakis and Andrea Zisman. 2005. Software traceability: a roadmap. In Handbook of software engineering and knowledge engineering: vol 3: recent advances. World Scientific 395\u2013428.","DOI":"10.1142\/9789812775245_0014"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.88"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332461"},{"key":"e_1_3_2_1_57_1","volume-title":"Recording Concerns in Source Code Using Annotations. Computing Research Repository (CoRR) abs\/1808.03576","author":"Sul\u00edr Mat\u00fas","year":"2018","unstructured":"Mat\u00fas Sul\u00edr, Milan Nos\u00e1l, and Jaroslav Porub\u00e4n. 2018. Recording Concerns in Source Code Using Annotations. Computing Research Repository (CoRR) abs\/1808.03576 (2018)."},{"key":"e_1_3_2_1_58_1","first-page":"299","article-title":"Program Understanding Behaviour During Enhancement of Large-Scale Software","volume":"9","author":"von Mayrhauser Anneliese","year":"1997","unstructured":"Anneliese von Mayrhauser, A.\u00a0Marie Vans, and Adele\u00a0E. Howe. 1997. Program Understanding Behaviour During Enhancement of Large-Scale Software. J. Software: Evolution and Process 9, 5 (1997), 299\u2013327.","journal-title":"J. Software: Evolution and Process"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3280986"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362618"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.4360070105"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.13"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2012.24"}],"event":{"name":"SPLC '24: 28th ACM International Systems and Software Product Line Conference","location":"Dommeldange Luxembourg","acronym":"SPLC '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["28th ACM International Systems and Software Product Line Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646548.3672593","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3646548.3672593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:55:30Z","timestamp":1755881730000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646548.3672593"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":63,"alternative-id":["10.1145\/3646548.3672593","10.1145\/3646548"],"URL":"https:\/\/doi.org\/10.1145\/3646548.3672593","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]},"assertion":[{"value":"2024-09-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}