{"id":"https://openalex.org/W2126210726","doi":"https://doi.org/10.1109/tse.2014.2327020","title":"Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Configurations for Software Product Lines","display_name":"Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Configurations for Software Product Lines","publication_year":2014,"publication_date":"2014-05-29","ids":{"openalex":"https://openalex.org/W2126210726","doi":"https://doi.org/10.1109/tse.2014.2327020","mag":"2126210726"},"language":"en","primary_location":{"id":"doi:10.1109/tse.2014.2327020","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2014.2327020","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://researchportal.unamur.be/en/publications/7eec5145-4602-462a-83bb-01dffd3d85fa","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072615745","display_name":"Christopher Henard","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Christopher Henard","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081145634","display_name":"Mike Papadakis","orcid":"https://orcid.org/0000-0003-1852-2547"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Mike Papadakis","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055104897","display_name":"Gilles Perrouin","orcid":"https://orcid.org/0000-0002-8431-0377"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Gilles Perrouin","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040326968","display_name":"Jacques Klein","orcid":"https://orcid.org/0000-0003-4052-475X"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Jacques Klein","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112713583","display_name":"Patrick Heymans","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Patrick Heymans","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040574362","display_name":"Yves Le Traon","orcid":"https://orcid.org/0000-0002-1045-4861"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Yves Le Traon","raw_affiliation_strings":["Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg"],"affiliations":[{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"Interdisciplinary Centre for Security, Reliability and Trust University of Luxembourg Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5072615745"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":30.3851,"has_fulltext":true,"cited_by_count":211,"citation_normalized_percentile":{"value":0.99699727,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"40","issue":"7","first_page":"650","last_page":"670"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8241825103759766},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6836655735969543},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.6748715043067932},{"id":"https://openalex.org/keywords/software-product-line","display_name":"Software product line","score":0.5848156809806824},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5765517354011536},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.5623515844345093},{"id":"https://openalex.org/keywords/combinatorial-explosion","display_name":"Combinatorial explosion","score":0.525077760219574},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5250197052955627},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5239615440368652},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5230882167816162},{"id":"https://openalex.org/keywords/prioritization","display_name":"Prioritization","score":0.48507824540138245},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.4814023971557617},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4316995143890381},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3649437427520752},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2508891224861145},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.24385181069374084},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18699896335601807},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.18625441193580627},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.11220017075538635}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8241825103759766},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6836655735969543},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.6748715043067932},{"id":"https://openalex.org/C2778177629","wikidata":"https://www.wikidata.org/wiki/Q2111823","display_name":"Software product line","level":4,"score":0.5848156809806824},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5765517354011536},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.5623515844345093},{"id":"https://openalex.org/C115908005","wikidata":"https://www.wikidata.org/wiki/Q2668364","display_name":"Combinatorial explosion","level":2,"score":0.525077760219574},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5250197052955627},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5239615440368652},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5230882167816162},{"id":"https://openalex.org/C2777615720","wikidata":"https://www.wikidata.org/wiki/Q11888847","display_name":"Prioritization","level":2,"score":0.48507824540138245},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.4814023971557617},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4316995143890381},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3649437427520752},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2508891224861145},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.24385181069374084},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18699896335601807},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18625441193580627},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.11220017075538635},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.0},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tse.2014.2327020","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tse.2014.2327020","pdf_url":null,"source":{"id":"https://openalex.org/S8351582","display_name":"IEEE Transactions on Software Engineering","issn_l":"0098-5589","issn":["0098-5589","1939-3520","2326-3881"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Software Engineering","raw_type":"journal-article"},{"id":"pmh:oai:pure.unamur.be:openaire/7eec5145-4602-462a-83bb-01dffd3d85fa","is_oa":true,"landing_page_url":"https://researchportal.unamur.be/en/publications/7eec5145-4602-462a-83bb-01dffd3d85fa","pdf_url":null,"source":{"id":"https://openalex.org/S4406922457","display_name":"Repository of the University of Namur","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Henard, C, Papadakis, M, Perrouin, G, Klein, J, Heymans, P & Traon, Y L 2014, 'Bypassing the combinatorial explosion : Using similarity to generate and prioritize t-wise test configurations for software product lines', IEEE Transactions on Software Engineering, vol. 40, no. 7, 6823132, pp. 650-670. https://doi.org/10.1109/TSE.2014.2327020","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:orbilu.uni.lu:10993/16874","is_oa":true,"landing_page_url":"http://orbilu.uni.lu/handle/10993/16874","pdf_url":null,"source":{"id":"https://openalex.org/S4306401815","display_name":"Open Repository and Bibliography (University of Luxembourg)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186903577","host_organization_name":"University of Luxembourg","host_organization_lineage":["https://openalex.org/I186903577"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Software Engineering, 40(7), 650-670. IEEE (2014).","raw_type":null}],"best_oa_location":{"id":"pmh:oai:pure.unamur.be:openaire/7eec5145-4602-462a-83bb-01dffd3d85fa","is_oa":true,"landing_page_url":"https://researchportal.unamur.be/en/publications/7eec5145-4602-462a-83bb-01dffd3d85fa","pdf_url":null,"source":{"id":"https://openalex.org/S4406922457","display_name":"Repository of the University of Namur","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Henard, C, Papadakis, M, Perrouin, G, Klein, J, Heymans, P & Traon, Y L 2014, 'Bypassing the combinatorial explosion : Using similarity to generate and prioritize t-wise test configurations for software product lines', IEEE Transactions on Software Engineering, vol. 40, no. 7, 6823132, pp. 650-670. https://doi.org/10.1109/TSE.2014.2327020","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6000000238418579}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":69,"referenced_works":["https://openalex.org/W5815757","https://openalex.org/W47865225","https://openalex.org/W90855943","https://openalex.org/W198244130","https://openalex.org/W1494019345","https://openalex.org/W1501652040","https://openalex.org/W1552525409","https://openalex.org/W1611760289","https://openalex.org/W1680457268","https://openalex.org/W1710690747","https://openalex.org/W1894930292","https://openalex.org/W1963551584","https://openalex.org/W1979100395","https://openalex.org/W1979306994","https://openalex.org/W1979922504","https://openalex.org/W1986531046","https://openalex.org/W1996517887","https://openalex.org/W2008347524","https://openalex.org/W2009443992","https://openalex.org/W2012198830","https://openalex.org/W2014515160","https://openalex.org/W2014973576","https://openalex.org/W2023501626","https://openalex.org/W2025886988","https://openalex.org/W2026947155","https://openalex.org/W2035015614","https://openalex.org/W2038815784","https://openalex.org/W2046747375","https://openalex.org/W2060555016","https://openalex.org/W2071160808","https://openalex.org/W2072590803","https://openalex.org/W2075699551","https://openalex.org/W2089704436","https://openalex.org/W2098345837","https://openalex.org/W2099213660","https://openalex.org/W2102076216","https://openalex.org/W2105438268","https://openalex.org/W2110337982","https://openalex.org/W2111517421","https://openalex.org/W2115910430","https://openalex.org/W2116622216","https://openalex.org/W2120210839","https://openalex.org/W2122796178","https://openalex.org/W2128204165","https://openalex.org/W2128967738","https://openalex.org/W2138428785","https://openalex.org/W2139980321","https://openalex.org/W2140871157","https://openalex.org/W2143361941","https://openalex.org/W2152893457","https://openalex.org/W2156062547","https://openalex.org/W2157771728","https://openalex.org/W2164414043","https://openalex.org/W2165096715","https://openalex.org/W2165220807","https://openalex.org/W2167572480","https://openalex.org/W2168778730","https://openalex.org/W2171451409","https://openalex.org/W2172225938","https://openalex.org/W2745750801","https://openalex.org/W3151997557","https://openalex.org/W4237212741","https://openalex.org/W4240446120","https://openalex.org/W6601913941","https://openalex.org/W6603723569","https://openalex.org/W6633062151","https://openalex.org/W6636644970","https://openalex.org/W6639575737","https://openalex.org/W6668651192"],"related_works":["https://openalex.org/W2506292322","https://openalex.org/W4283209547","https://openalex.org/W2107940771","https://openalex.org/W2137998879","https://openalex.org/W2967482817","https://openalex.org/W2911912352","https://openalex.org/W2119574514","https://openalex.org/W2771359128","https://openalex.org/W2063647782","https://openalex.org/W4220798833"],"abstract_inverted_index":{"Large":[0],"Software":[1],"Product":[2],"Lines":[3],"(SPLs)":[4],"are":[5,40,76,174],"common":[6],"in":[7,127],"industry,":[8],"thus":[9],"introducing":[10],"the":[11,28,58,122,137,145,150,169,171,180,184],"need":[12],"of":[13,30,45,63,86,109,121,136],"practical":[14],"solutions":[15],"to":[16,25,33,42,55,99,164,194],"test":[17],"them.":[18],"To":[19],"this":[20],"end,":[21],"t-wise":[22,36,158],"can":[23,187],"help":[24],"drastically":[26],"reduce":[27],"number":[29],"product":[31,71,88,110,146],"configurations":[32,72,89],"test.":[34],"Current":[35],"approaches":[37],"for":[38,66,73,90,106],"SPLs":[39,75],"restricted":[41],"small":[43],"values":[44],"t.":[46],"In":[47,61],"addition,":[48],"these":[49,113],"techniques":[50,101,114,124,162,173],"fail":[51,163],"at":[52],"providing":[53],"means":[54,65],"finely":[56],"control":[57],"configuration":[59,147],"process.":[60],"view":[62],"this,":[64],"automatically":[67],"generating":[68,87],"and":[69,96,102,149,160,177],"prioritizing":[70],"large":[74,91,166],"required.":[77],"This":[78],"paper":[79],"proposes":[80],"(a)":[81],"a":[82,94,116,132,191],"search-based":[83],"approach":[84],"capable":[85],"SPLs,":[92],"forming":[93],"scalable":[95],"flexible":[97],"alternative":[98,193],"current":[100],"(b)":[103],"prioritization":[104,151,161],"algorithms":[105],"any":[107],"set":[108],"configurations.":[111],"Both":[112],"employ":[115],"similarity":[117,185],"heuristic.":[118],"The":[119,140,153],"ability":[120],"proposed":[123,172],"is":[125],"assessed":[126],"an":[128],"empirical":[129],"study":[130],"through":[131],"comparison":[133,141],"with":[134],"state":[135],"art":[138],"tools.":[139],"focuses":[142],"on":[143],"both":[144,175],"generation":[148],"aspects.":[152],"results":[154],"demonstrate":[155],"that":[156,183],"existing":[157],"tools":[159],"handle":[165],"SPLs.":[167],"On":[168],"contrary,":[170],"effective":[176],"scalable.":[178],"Additionally,":[179],"experiments":[181],"show":[182],"heuristic":[186],"be":[188],"used":[189],"as":[190],"viable":[192],"t-wise.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":18},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":26},{"year":2018,"cited_by_count":29},{"year":2017,"cited_by_count":25},{"year":2016,"cited_by_count":24},{"year":2015,"cited_by_count":19},{"year":2014,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
