{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:27:55Z","timestamp":1752982075086,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["389792660","390696704","2050\/1"],"award-info":[{"award-number":["389792660","390696704","2050\/1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NWO","award":["VI.Veni.222.431"],"award-info":[{"award-number":["VI.Veni.222.431"]}]},{"name":"CAPES","award":["88887.136410\/2017-00","88881.512952\/2020-01"],"award-info":[{"award-number":["88887.136410\/2017-00","88881.512952\/2020-01"]}]},{"name":"CNPq","award":["315532\/20211","423125\/2021-4","465614\/2014-0"],"award-info":[{"award-number":["315532\/20211","423125\/2021-4","465614\/2014-0"]}]},{"name":"Alexander von Humboldt Foundation"},{"name":"INES"},{"name":"FACEPE","award":["APQ\/0388-1.03\/14","APQ-0399-1.03\/17"],"award-info":[{"award-number":["APQ\/0388-1.03\/14","APQ-0399-1.03\/17"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3695490","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"1120-1132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Blackbox Observability of Features and Feature Interactions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9120-1670","authenticated-orcid":false,"given":"Kallistos","family":"Weis","sequence":"first","affiliation":[{"name":"Saarland University, Saarbrucken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6154-1666","authenticated-orcid":false,"given":"Leopoldo Motta","family":"Teixeira","sequence":"additional","affiliation":[{"name":"Federal University of Pernambuco, Recife, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5718-8276","authenticated-orcid":false,"given":"Clemens","family":"Dubslaff","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3687-2233","authenticated-orcid":false,"given":"Sven","family":"Apel","sequence":"additional","affiliation":[{"name":"Saarland University, Saarbrucken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4230\/DagRep.4.7.1"},{"volume-title":"Feature-oriented software product lines","author":"Apel Sven","key":"e_1_3_2_1_2_1","unstructured":"Sven Apel, Don Batory, Christian K\u00e4stner, and Gunter Saake. 2016. Feature-oriented software product lines. Springer."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2528265.2528267"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11554844_3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/136035.136043"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00352-3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468555"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528100"},{"volume-title":"Fundamental Approaches to Software Engineering, Jos\u00e9 Luiz Fiadeiro and Paola Inverardi (Eds.)","author":"Classen Andreas","key":"e_1_3_2_1_9_1","unstructured":"Andreas Classen, Patrick Heymans, and Pierre-Yves Schobbens. 2008. What's in a Feature: A Requirements Engineering Perspective. In Fundamental Approaches to Software Engineering, Jos\u00e9 Luiz Fiadeiro and Paola Inverardi (Eds.). Springer Berlin Heidelberg, 16--30."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201186"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499777.2499781"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416620"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3850\/978-981-11-2724-3_0618-cd"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3646548.3676538"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19849-6_14"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 30th European Safety and Reliability Conference (ESREL) and 15th Probabilistic Safety Assessment and Management Conference (PSAM).","author":"Dubslaff Clemens","year":"2020","unstructured":"Clemens Dubslaff, Andrey Morozov, Christel Baier, and Klaus Janschek. 2020. Reduction Methods on Error-Propagation Graphs for Quantitative Systems Reliability Analysis. In Proceedings of the 30th European Safety and Reliability Conference (ESREL) and 15th Probabilistic Safety Assessment and Management Conference (PSAM)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510200"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111915"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/2014377"},{"key":"e_1_3_2_1_20_1","volume-title":"Stefania and Semini Laura","author":"Gnesi Alessandro","year":"2017","unstructured":"Fantechi, Alessandro and Gnesi, Stefania and Semini Laura. 2017. Optimizing Feature Interaction Detection. In Critical Systems: Formal Methods and Automated Verification, Laure Petrucci, Cristina Seceleanu, and Ana Cavalcanti (Eds.). Springer International Publishing, Cham, 201--216."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00035"},{"volume-title":"Proceedings of the 22nd International Symposium on Software Reliability Engineering (ISSRE). ACM, 90--99","author":"Brady","key":"e_1_3_2_1_22_1","unstructured":"Brady J. Garvin and Myra B. Cohen. 2011. Feature Interaction Faults Revisited: An Exploratory Study. In Proceedings of the 22nd International Symposium on Software Reliability Engineering (ISSRE). ACM, 90--99."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693089"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9573-6"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00113"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00080"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Axel Halin Alexandre Nuttinck Mathieu Acher Xavier Devroey Gilles Perrouin and Benoit Baudry. 2017. Test them all is it worth it? A ground truth comparison of configuration sampling strategies. arXiv preprint arXiv:1710.07980 1--8.","DOI":"10.1145\/3382025.3414985"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"Hans Harder Simon Jantsch Christel Baier and Clemens Dubslaff. 2023. A Unifying Formal Approach to Importance Values in Boolean Functions. In IJCAI. ijcai.org 2728--2737. 10.24963\/ijcai.2023\/304","DOI":"10.24963\/ijcai.2023\/304"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.69"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57256-2_13"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.2987024"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00112"},{"key":"e_1_3_2_1_33_1","volume-title":"Performance Evolution of Configurable Software Systems: An Empirical Study. Empirical Software Engineering (EMSE)","author":"Kaltenecker Christian","year":"2023","unstructured":"Christian Kaltenecker, Stefan M\u00fchlbauer, Alexander Grebhahn, Norbert Siegmund, and Sven Apel. 2023. Performance Evolution of Configurable Software Systems: An Empirical Study. Empirical Software Engineering (EMSE) (2023). To appear."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Kyo Kang Sholom Cohen James Hess William Novak and A. Peterson. 1990. Feature-Oriented Domain Analysis (FODA) Feasibility Study. Technical Report CMU\/SEI-90-TR-021. Software Engineering Institute Carnegie Mellon University Pittsburgh PA. http:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?AssetID=11231","DOI":"10.21236\/ADA235785"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-018-0662-9"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1109\/TKDE.2011.88","article-title":"A performance anomaly detection and analysis framework for dbms development","volume":"24","author":"Lee Donghun","year":"2011","unstructured":"Donghun Lee, Sang K Cha, and Arthur H Lee. 2011. A performance anomaly detection and analysis framework for dbms development. IEEE Transactions on Knowledge and Data Engineering 24, 8 (2011), 1345--1360.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111671"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2008.08.004"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-9117-0_3"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1215508110"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416573"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00176"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110558"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2415793"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2870895"},{"key":"e_1_3_2_1_46_1","first-page":"1","article-title":"Feature interaction: The security threat from within software systems","volume":"5","author":"Nhlabatsi Armstrong","year":"2008","unstructured":"Armstrong Nhlabatsi, Robin Laney, and Bashar Nuseibeh. 2008. Feature interaction: The security threat from within software systems. Progress in Informatics 5, 75 (2008), 1.","journal-title":"Progress in Informatics"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2002-101-209"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2015.34"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.45"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693104"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.08.008"},{"key":"e_1_3_2_1_52_1","unstructured":"Pourya Shaker. 2013. A feature-oriented modelling language and a feature-interaction taxonomy for product-line requirements. (2013)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786845"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227196"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.01.016"},{"key":"e_1_3_2_1_56_1","volume-title":"CUDD: CU decision diagram package release 2.3. 0","author":"Somenzi Fabio","year":"1998","unstructured":"Fabio Somenzi. 1998. CUDD: CU decision diagram package release 2.3. 0. University of Colorado at Boulder 621 (1998)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6911(84)90007-0"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-016-0433-2"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-020-00273-8"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00100"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510043"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.39"},{"key":"e_1_3_2_1_63_1","first-page":"841","article-title":"Counterfactual Explanations without Opening the Black Box: Automated Decisions and the GDPR","volume":"31","author":"Wachter Sandra","year":"2017","unstructured":"Sandra Wachter, Brent D. Mittelstadt, and Chris Russell. 2017. Counterfactual Explanations without Opening the Black Box: Automated Decisions and the GDPR. Harvard Journal of Law and Technology 31 (2017), 841--887.","journal-title":"Harvard Journal of Law and Technology"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion52605.2021.00107"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276487"},{"key":"e_1_3_2_1_66_1","unstructured":"Franz Wotawa Gerhard Friedrich and Artur Andrzejak. 2018. Software configuration diagnosis? A Survey of existing methods and open challenges. http:\/\/confws.ist.tugraz.at 20th International Workshop on Configuration ConfWS; Conference date: 27-09-2018 Through 28-09-2018."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.15"}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Sacramento CA USA","acronym":"ASE '24"},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695490","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3695490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:19Z","timestamp":1750291579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3695490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":67,"alternative-id":["10.1145\/3691620.3695490","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3695490","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}