{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:45:09Z","timestamp":1771699509386,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T00:00:00Z","timestamp":1561334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Braz Comput Soc"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13173-019-0088-4","type":"journal-article","created":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T02:13:48Z","timestamp":1561342428000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Product line architecture recovery with outlier filtering in software families: the Apo-Games case study"],"prefix":"10.1186","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0286-2056","authenticated-orcid":false,"given":"Crescencio","family":"Lima","sequence":"first","affiliation":[]},{"given":"Wesley KG","family":"Assun\u00e7\u00e3o","sequence":"additional","affiliation":[]},{"given":"Jabier","family":"Martinez","sequence":"additional","affiliation":[]},{"given":"William","family":"Mendon\u00e7a","sequence":"additional","affiliation":[]},{"given":"Ivan C","family":"Machado","sequence":"additional","affiliation":[]},{"given":"Christina FG","family":"Chavez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,24]]},"reference":[{"key":"88_CR1","doi-asserted-by":"crossref","unstructured":"van der Linden FJ, Schmid K, Rommes E (2007) Software product lines in action: the best industrial practice in product line engineering. Springer.","DOI":"10.1007\/978-3-540-71437-8"},{"key":"88_CR2","doi-asserted-by":"crossref","unstructured":"Pohl K, B\u00f6ckle G, van der Linden F (2005) Software product line engineering: foundations, principles, and techniques. Springer-Verlag New York Inc.","DOI":"10.1007\/3-540-28901-1"},{"key":"88_CR3","doi-asserted-by":"crossref","unstructured":"Apel S, Batory D, Kastner C, Saake G (2013) Feature-Oriented Software Product Lines.","DOI":"10.1007\/978-3-642-37521-7"},{"issue":"4","key":"88_CR4","first-page":"20:1","volume":"21","author":"R Holmes","year":"2013","unstructured":"Holmes R, Walker RJ (2013) Systematizing pragmatic software reuse. ACM Trans Softw Engineer Methodol 21(4):20:1\u201320:44.","journal-title":"ACM Trans Softw Engineer Methodol"},{"key":"88_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.13","volume-title":"An exploratory study of cloning in industrial software product lines","author":"Y Dubinsky","year":"2013","unstructured":"Dubinsky Y, Rubin J, Berger T, Duszynski S, Becker M, Czarnecki K (2013) An exploratory study of cloning in industrial software product lines. IEEE Computer Society, Washington, DC."},{"issue":"7","key":"88_CR6","first-page":"971","volume":"47","author":"N Kulkarni","year":"2017","unstructured":"Kulkarni N, Varma V (2017) Perils of opportunistically reusing software module. Softw: Pract Exp 47(7):971\u2013984.","journal-title":"Softw: Pract Exp"},{"issue":"6","key":"88_CR7","doi-asserted-by":"publisher","first-page":"2972","DOI":"10.1007\/s10664-017-9499-z","volume":"22","author":"WKG Assun\u010b\u00e3o","year":"2017","unstructured":"Assun\u010b\u00e3o WKG, Lopez-Herrejon RE, Linsbauer L, Vergilio SR, Egyed A (2017) Reengineering legacy applications into software product lines: a systematic mapping. Empirical Softw Engineer 22(6):2972\u20133016.","journal-title":"Empirical Softw Engineer"},{"key":"88_CR8","doi-asserted-by":"crossref","unstructured":"Martinez J, Assun\u00e7\u00e3o WKG, Ziadi T (2017) ESPLA: a catalog of extractive SPL adoption case studies In: Proceedings of the 21st International Systems and Software Product Line Conference, SPLC 2017, 38\u201341.. ACM.","DOI":"10.1145\/3109729.3109748"},{"key":"88_CR9","doi-asserted-by":"crossref","unstructured":"Berger T, Rublack R, Nair D, Atlee JM, Becker M, Czarnecki K, et al (2013) A survey of variability modeling in industrial practice In: Proceeding of the 7th International Workshop on Variability Modelling of Software-intensive Systems.","DOI":"10.1145\/2430502.2430513"},{"key":"88_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.scico.2018.04.002","volume":"163","author":"D Wille","year":"2018","unstructured":"Wille D, \u00d6nder B, Cleophas L, Seidl C, van den Brand M, Schaefer I (2018) Improving custom-tailored variability mining using outlier and cluster detection. Sci Comput Program 163:62\u201384.","journal-title":"Sci Comput Program"},{"key":"88_CR11","doi-asserted-by":"crossref","unstructured":"Taylor RN, Medvidovic N, Dashofy EM (2010) Software architecture-foundations, theory, and practice. Wiley.","DOI":"10.1145\/1810295.1810435"},{"key":"88_CR12","first-page":"486","volume-title":"2013 28th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2013","author":"J Garcia","year":"2013","unstructured":"Garcia J, Ivkovic I, Medvidovic N (2013) A comparative analysis of software architecture recovery techniques In: 2013 28th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2013, 486\u2013496.. IEEE, Silicon Valley."},{"key":"88_CR13","doi-asserted-by":"crossref","unstructured":"Lima C, Assun\u00e7\u00e3o WKG, Martinez J, do Carmo Machado I, von Flach G Chavez C, Mendon\u00e7a WDF (2018) Towards an automated product line architecture recovery: the Apo-Games case study In: VII Brazilian Symposium on Software Components, Architectures, and Reuse. SBCARS \u201918, 33\u201342.. ACM.","DOI":"10.1145\/3267183.3267187"},{"key":"88_CR14","doi-asserted-by":"crossref","unstructured":"Kr\u00fcger J, Fenske W, Th\u00fcm T, Aporius D, Saake G, Leich T (2018) Apo-Games - a case study for reverse engineering variability from cloned Java variants In: Proceedings of the 22nd International Systems and Software Product Line Conference - Challenge Track. SPLC \u201918.. ACM. Available from: \n                    https:\/\/variability-challenges.github.io\/2018\/ApoGames\n                    \n                  .","DOI":"10.1145\/3233027.3236403"},{"issue":"6","key":"88_CR15","first-page":"1","volume":"37","author":"M Galster","year":"2013","unstructured":"Galster M, Weyns D, Avgeriou P, Becker M (2013) Variability in software architecture: views and beyond. SIGSOFT Softw Eng Notes 37(6):1\u20139.","journal-title":"SIGSOFT Softw Eng Notes"},{"issue":"4","key":"88_CR16","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.infsof.2010.12.006","volume":"53","author":"L Chen","year":"2011","unstructured":"Chen L, Ali Babar M (2011) A systematic review of evaluation of variability management approaches in software product lines. Inf Softw Technol 53(4):344\u2013362.","journal-title":"Inf Softw Technol"},{"issue":"11","key":"88_CR17","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1016\/j.infsof.2007.10.013","volume":"50","author":"F Ahmed","year":"2008","unstructured":"Ahmed F, Capretz LF (2008) The software product line architecture: an empirical investigation of key process activities. Inf Softw Technol 50(11):1098\u20131113.","journal-title":"Inf Softw Technol"},{"key":"88_CR18","doi-asserted-by":"crossref","unstructured":"Verlage M, Kiesgen T (2005) Five years of product line engineering in a small company In: Proceedings of the 27th International Conference on Software Engineering, 534\u2013543.. ACM.","DOI":"10.1145\/1062455.1062551"},{"issue":"6","key":"88_CR19","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/52.469759","volume":"12","author":"P Kruchten","year":"1995","unstructured":"Kruchten P (1995) The 4+1 View Model of Architecture. IEEE Softw 12(6):42\u201350.","journal-title":"IEEE Softw"},{"issue":"4","key":"88_CR20","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/TSE.2009.19","volume":"35","author":"S Ducasse","year":"2009","unstructured":"Ducasse S, Pollet D (2009) Software architecture reconstruction: a process-oriented taxonomy. IEEE Trans Softw Engineer 35(4):573\u2013591.","journal-title":"IEEE Trans Softw Engineer"},{"key":"88_CR21","doi-asserted-by":"crossref","unstructured":"Zhang T, Deng L, Wu J, Zhou Q, Ma C (2008) Some metrics for accessing quality of product line architecture In: International Conference on Computer Science and Software Engineering, 500\u2013503.. IEEE.","DOI":"10.1109\/CSSE.2008.500"},{"key":"88_CR22","first-page":"316","volume-title":"IEEE 24th International Conference on Software Analysis, Evolution and Reengineering, SANER 2017","author":"W Fenske","year":"2017","unstructured":"Fenske W, Meinicke J, Schulze S, Schulze S, Saake G (2017) Variant-preserving refactorings for migrating cloned products to a product line In: IEEE 24th International Conference on Software Analysis, Evolution and Reengineering, SANER 2017, 316\u2013326.. IEEE Computer Society, Klagenfurt."},{"key":"88_CR23","unstructured":"Roughan M, Tuke SJ (2015) Unravelling Graph-Exchange File Formats. abs\/1503.02781."},{"key":"88_CR24","unstructured":"Cardoso MPS, Lima C, Chavez C, do Carmo Machado I (2017) PLAR tool \u2013 a software product line architecture recovery tool In: 8th Brazilian Conference on Software: Theory and Practice - Tool Session."},{"key":"88_CR25","first-page":"67","volume-title":"Proceedings of the 39th International Conference on Software Engineering, ICSE 2017","author":"J Martinez","year":"2017","unstructured":"Martinez J, Ziadi T, Bissyand\u00e9 TF, Klein J, Traon YL (2017) Bottom-up technologies for reuse: automated extractive adoption of software product lines In: Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, 67\u201370.. Companion Volume IEEE Computer Society, Buenos Aires."},{"key":"88_CR26","volume-title":"Initial evidence for understanding the relationship between product line architecture and software architecture recovery","author":"CR Lima-Neto","year":"2015","unstructured":"Lima-Neto CR, Cardoso M, Chavez C, Almeida E (2015) Initial evidence for understanding the relationship between product line architecture and software architecture recovery, Vol. IX. Brazilian Symposium on Components, Architectures and Reuse Software (SBCARS)."},{"key":"88_CR27","doi-asserted-by":"crossref","unstructured":"Cardoso MPS, Lima C, de Almeida ES, do Carmo Machado I, von Flach G Chavez C (2017) Investigating the variability impact on the recovery of software product line architectures: an exploratory study In: Proceedings of the 11th Brazilian Symposium on Software Components, Architectures, and Reuse, 12:1\u201312:10.. ACM.","DOI":"10.1145\/3132498.3133835"},{"key":"88_CR28","doi-asserted-by":"crossref","unstructured":"Lima C, do Carmo Machado I, de Almeida ES, von Flach Garcia Chavez C (2018) Recovering the product line architecture of the Apo-Games In: Proceedings of the 22nd International Systems and Software Product Line Conference SPLC \u201918.. ACM.","DOI":"10.1145\/3233027.3236398"},{"key":"88_CR29","doi-asserted-by":"crossref","unstructured":"Rubin J, Chechik M (2012) Locating distinguishing features using diff sets In: 27th IEEE\/ACM International Conference on Automated Software Engineering, 242\u2013245.. ACM.","DOI":"10.1145\/2351676.2351712"},{"key":"88_CR30","doi-asserted-by":"crossref","unstructured":"Fischer S, Linsbauer L, Lopez-Herrejon RE, Egyed A (2014) Enhancing clone-and-own with systematic reuse for developing software variants In: 2014 IEEE International Conference on Software Maintenance and Evolution, 391\u2013400.","DOI":"10.1109\/ICSME.2014.61"},{"key":"88_CR31","doi-asserted-by":"crossref","unstructured":"Shatnawi A, Seriai A, Sahraoui H (2015) Recovering architectural variability of a family of product variants In: Software Reuse for Dynamic Systems in the Cloud and Beyond vol. 8919 of Lecture Notes in Computer Science, 17\u201333.. Springer International Publishing.","DOI":"10.1007\/978-3-319-14130-5_2"},{"key":"88_CR32","doi-asserted-by":"crossref","unstructured":"van Solingen R, Basili V, Caldiera G, Rombach HD (2002) Goal Question Metric (GQM) approach. Wiley.","DOI":"10.1002\/0471028959.sof142"},{"issue":"1","key":"88_CR33","doi-asserted-by":"publisher","first-page":"59","DOI":"10.2307\/2685263","volume":"42","author":"JL Rodgers","year":"1988","unstructured":"Rodgers JL, Nicewander WA (1988) Thirteen ways to look at the correlation coefficient. Am Stat 42(1):59\u201366.","journal-title":"Am Stat"},{"key":"88_CR34","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/S1571-0661(05)82590-3","volume":"53","author":"W Petersen","year":"2004","unstructured":"Petersen W (2004) A set-theoretical approach for the induction of inheritance hierarchies. Electr Notes Theoret Comput Sci 53:296\u2013308.","journal-title":"Electr Notes Theoret Comput Sci"},{"issue":"C","key":"88_CR35","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.jss.2016.07.039","volume":"131","author":"A Shatnawi","year":"2017","unstructured":"Shatnawi A, Seriai AD, Sahraoui H (2017) Recovering software product line architecture of a family of object-oriented product variants. J Syst Softw 131(C):325\u2013346. \n                    https:\/\/doi.org\/10.1016\/j.jss.2016.07.039\n                    \n                  .","journal-title":"J Syst Softw"},{"issue":"4","key":"88_CR36","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1007\/s10270-015-0512-y","volume":"16","author":"L Linsbauer","year":"2017","unstructured":"Linsbauer L, Lopez-Herrejon RE, Egyed A (2017) Variability extraction and modeling for product variants. Softw Syst Model 16(4):1179\u20131199. \n                    https:\/\/doi.org\/10.1007\/s10270-015-0512-y\n                    \n                  .","journal-title":"Softw Syst Model"}],"container-title":["Journal of the Brazilian Computer Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13173-019-0088-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13173-019-0088-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13173-019-0088-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T10:46:07Z","timestamp":1723545967000},"score":1,"resource":{"primary":{"URL":"https:\/\/journal-bcs.springeropen.com\/articles\/10.1186\/s13173-019-0088-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,24]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["88"],"URL":"https:\/\/doi.org\/10.1186\/s13173-019-0088-4","relation":{},"ISSN":["0104-6500","1678-4804"],"issn-type":[{"value":"0104-6500","type":"print"},{"value":"1678-4804","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,24]]},"assertion":[{"value":"6 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"7"}}