{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,17]],"date-time":"2024-08-17T07:08:35Z","timestamp":1723878515904},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T00:00:00Z","timestamp":1506297600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["LE 3382\/2-1, SA 465\/49-1"],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,25]]},"DOI":"10.1145\/3106195.3106217","type":"proceedings-article","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T12:27:52Z","timestamp":1504268872000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Beyond Software Product Lines"],"prefix":"10.1145","author":[{"given":"Jacob","family":"Kr\u00fcger","sequence":"first","affiliation":[{"name":"Otto-von-Guericke-University, Magdeburg, Germany, Harz University of Applied Sciences, Wernigerode, Germany"}]},{"given":"Sebastian","family":"Nielebock","sequence":"additional","affiliation":[{"name":"Otto-von-Guericke-University, Magdeburg, Germany"}]},{"given":"Sebastian","family":"Krieter","sequence":"additional","affiliation":[{"name":"Otto-von-Guericke-University, Magdeburg, Germany"}]},{"given":"Christian","family":"Diedrich","sequence":"additional","affiliation":[{"name":"Otto-von-Guericke-University, Magdeburg, Germany"}]},{"given":"Thomas","family":"Leich","sequence":"additional","affiliation":[{"name":"Harz University of Applied Sciences, Wernigerode, Germany"}]},{"given":"Gunter","family":"Saake","sequence":"additional","affiliation":[{"name":"Otto-von-Guericke-University, Magdeburg, Germany"}]},{"given":"Sebastian","family":"Zug","sequence":"additional","affiliation":[{"name":"Otto-von-Guericke-University, Magdeburg, Germany"}]},{"given":"Frank","family":"Ortmeier","sequence":"additional","affiliation":[{"name":"Otto-von-Guericke-University, Magdeburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Principles of Model Checking","author":"Baier Christel","unstructured":"Christel Baier , Joost-Pieter Katoen , and Kim Guldstrand Larsen . 2008. Principles of Model Checking . MIT Press . Christel Baier, Joost-Pieter Katoen, and Kim Guldstrand Larsen. 2008. Principles of Model Checking. MIT Press."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.287"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.12.038"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110147.2110167"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.02.028"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118644898"},{"key":"e_1_3_2_1_7_1","volume-title":"Generalized Symbolic Execution for Model Checking and Testing","author":"Khurshid Sarfraz","unstructured":"Sarfraz Khurshid , Corina S P\u0103s\u0103reanu , and Willem Visser . 2003. Generalized Symbolic Execution for Model Checking and Testing . In TACAS. Springer . Sarfraz Khurshid, Corina S P\u0103s\u0103reanu, and Willem Visser. 2003. Generalized Symbolic Execution for Model Checking and Testing. In TACAS. Springer."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46982-9_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016720.1016724"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"e_1_3_2_1_11_1","volume-title":"Ramos and Dawson Engler","author":"David","year":"2015","unstructured":"David A. Ramos and Dawson Engler . 2015 . Under-Constrained Symbolic Execution: Correctness Checking for Real Code. In USENIX Security. USENIX , 49--64. David A. Ramos and Dawson Engler. 2015. Under-Constrained Symbolic Execution: Correctness Checking for Real Code. In USENIX Security. USENIX, 49--64."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096958"}],"event":{"name":"SPLC '17: 21st International Systems and Software Product Line Conference","location":"Sevilla Spain","acronym":"SPLC '17","sponsor":["Fidetia"]},"container-title":["Proceedings of the 21st International Systems and Software Product Line Conference - Volume A"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106195.3106217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T20:27:11Z","timestamp":1673641631000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106195.3106217"}},"subtitle":["Variability Modeling in Cyber-Physical Systems"],"short-title":[],"issued":{"date-parts":[[2017,9,25]]},"references-count":12,"alternative-id":["10.1145\/3106195.3106217","10.1145\/3106195"],"URL":"https:\/\/doi.org\/10.1145\/3106195.3106217","relation":{},"subject":[],"published":{"date-parts":[[2017,9,25]]},"assertion":[{"value":"2017-09-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}