{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:06:52Z","timestamp":1763467612011,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2002,11,18]],"date-time":"2002-11-18T00:00:00Z","timestamp":1037577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2002,11,18]]},"DOI":"10.1145\/587051.587066","type":"proceedings-article","created":{"date-parts":[[2004,4,19]],"date-time":"2004-04-19T17:18:43Z","timestamp":1082395123000},"page":"89-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Verifying cross-cutting features as open systems"],"prefix":"10.1145","author":[{"given":"Harry","family":"Li","sequence":"first","affiliation":[{"name":"Brown University, Providence, RI"}]},{"given":"Shriram","family":"Krishnamurthi","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI"}]},{"given":"Kathi","family":"Fisler","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA"}]}],"member":"320","published-online":{"date-parts":[[2002,11,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/647769.734093"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/288195.288305"},{"key":"e_1_3_2_1_3_1","first-page":"28","volume-title":"Proceedings of the International Workshop on Description Logics","author":"Areces C.","year":"1999"},{"volume-title":"Feature Interactions in Telecommunications Systems. IOS Press","year":"2000","author":"Areces C.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","first-page":"95","volume-title":"Requirements Targeting Software and Systems Engineering, number 1526 in Lecture Notes in Computer Science","author":"Astesiano E.","year":"1998"},{"key":"e_1_3_2_1_6_1","first-page":"153","volume-title":"Feature Interactions in Telecommunications Systems","author":"Au P.","year":"1997"},{"volume-title":"Smalltalk and Java Conference","year":"1998","author":"Batory D.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/645546.656056"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/136586.136587"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/383845.383857"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.469460"},{"key":"e_1_3_2_1_13_1","first-page":"36","volume-title":"Feature Interactions in Telecommunications Systems","author":"Braithwaite K.","year":"1994"},{"key":"e_1_3_2_1_14_1","first-page":"274","volume-title":"International Conference on Computer-Aided Verification, number 1633 in Lecture Notes in Computer Science","author":"Bruns G.","year":"1999"},{"key":"e_1_3_2_1_15_1","first-page":"168","volume-title":"International Conference on Concurrency Theory, number 877 in Lecture Notes in Computer Science","author":"Bruns G.","year":"2000"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Feature Interactions in Telecommunications Systems","author":"Cameron E.","year":"1994"},{"volume-title":"Proceedings of the ICSE Workshop on Advanced Separation of Concerns","year":"2001","author":"Chechik M.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/876894.880855"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/5397.5399"},{"volume-title":"MIT Press","year":"2000","author":"Clarke E.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/289423.289432"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/503209.503231"},{"volume-title":"Feature Interactions in Telecommunications Systems","year":"2000","author":"Hall R. J.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/645395.651926"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/226241.226249"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.729683"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.729680"},{"key":"e_1_3_2_1_30_1","unstructured":"G. Kiczales J. Lamping A. Mendhekar C. Maeda C. V. Lopes J.-M. Loingtier and J. Irwin.]]  G. Kiczales J. Lamping A. Mendhekar C. Maeda C. V. Lopes J.-M. Loingtier and J. Irwin.]]"},{"key":"e_1_3_2_1_31_1","first-page":"75","volume-title":"International Conference on Computer-Aided Verification, number 1102 in Lecture Notes in Computer Science","author":"Kupferman O.","year":"1998"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/646482.691582"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/645881.672228"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/786769.787036"},{"key":"e_1_3_2_1_35_1","first-page":"86","volume-title":"Feature Interactions in Telecommunications Systems","author":"Lin F. J.","year":"1994"},{"key":"e_1_3_2_1_36_1","first-page":"153","volume-title":"Reflection","author":"Nelson T.","year":"2001"},{"volume-title":"European Conference on Object-Oriented Programming, number 1241 in Lecture Notes in Computer Science","year":"1997","author":"Prehofer C.","key":"e_1_3_2_1_38_1"},{"volume-title":"Addison-Wesley\/ACM Press","year":"1998","author":"Szyperski C.","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/508386.508405"},{"volume-title":"European Symposium on the Theory and Practice of Software (ETAPS).","year":"2001","author":"Vardi M. Y.","key":"e_1_3_2_1_41_1"},{"volume-title":"Second International Workshop on Advanced Intelligent Networks","year":"1997","author":"Zave P.","key":"e_1_3_2_1_42_1"}],"event":{"name":"SIGSOFT02\/FSE-10: 10th Int'l Symposium on the Foundations of Software Engineering","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Charleston South Carolina USA","acronym":"SIGSOFT02\/FSE-10"},"container-title":["Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/587051.587066","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/587051.587066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:43:41Z","timestamp":1750268621000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/587051.587066"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,11,18]]},"references-count":38,"alternative-id":["10.1145\/587051.587066","10.1145\/587051"],"URL":"https:\/\/doi.org\/10.1145\/587051.587066","relation":{},"subject":[],"published":{"date-parts":[[2002,11,18]]},"assertion":[{"value":"2002-11-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}