{"id":"https://openalex.org/W2021458623","doi":"https://doi.org/10.1145/2695664.2695933","title":"An investigation on the evolutionary nature of exception handling violations in software product lines","display_name":"An investigation on the evolutionary nature of exception handling violations in software product lines","publication_year":2015,"publication_date":"2015-04-13","ids":{"openalex":"https://openalex.org/W2021458623","doi":"https://doi.org/10.1145/2695664.2695933","mag":"2021458623"},"language":"en","primary_location":{"id":"doi:10.1145/2695664.2695933","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2695664.2695933","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011909526","display_name":"Dem\u00f3stenes Sena","orcid":null},"institutions":[{"id":"https://openalex.org/I35046152","display_name":"Universidade Federal do Rio Grande do Norte","ror":"https://ror.org/04wn09761","country_code":"BR","type":"education","lineage":["https://openalex.org/I35046152"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Dem\u00f3stenes Sena","raw_affiliation_strings":["Federal University of Rio Grande do Norte, Natal, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Rio Grande do Norte, Natal, Brazil","institution_ids":["https://openalex.org/I35046152"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065908206","display_name":"Roberta Coelho","orcid":"https://orcid.org/0000-0003-0001-435X"},"institutions":[{"id":"https://openalex.org/I35046152","display_name":"Universidade Federal do Rio Grande do Norte","ror":"https://ror.org/04wn09761","country_code":"BR","type":"education","lineage":["https://openalex.org/I35046152"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Roberta Coelho","raw_affiliation_strings":["Federal University of Rio Grande do Norte, Natal, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Rio Grande do Norte, Natal, Brazil","institution_ids":["https://openalex.org/I35046152"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064571846","display_name":"Uir\u00e1 Kulesza","orcid":"https://orcid.org/0000-0002-5467-6458"},"institutions":[{"id":"https://openalex.org/I35046152","display_name":"Universidade Federal do Rio Grande do Norte","ror":"https://ror.org/04wn09761","country_code":"BR","type":"education","lineage":["https://openalex.org/I35046152"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Uir\u00e1 Kulesza","raw_affiliation_strings":["Federal University of Rio Grande do Norte, Natal, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Rio Grande do Norte, Natal, Brazil","institution_ids":["https://openalex.org/I35046152"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011909526"],"corresponding_institution_ids":["https://openalex.org/I35046152"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0430154,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"1616","last_page":"1623"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11450","display_name":"Model-Driven Software Engineering Techniques","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exception-handling","display_name":"Exception handling","score":0.8364688754081726},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7496229410171509},{"id":"https://openalex.org/keywords/software-evolution","display_name":"Software evolution","score":0.6760455369949341},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6243901252746582},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6022347807884216},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.558698296546936},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5059913992881775},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4866255223751068},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.44433140754699707},{"id":"https://openalex.org/keywords/source-lines-of-code","display_name":"Source lines of code","score":0.4423292577266693},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.43554747104644775},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.43158629536628723},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4274366497993469},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.39021188020706177},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.36843743920326233},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.14099180698394775}],"concepts":[{"id":"https://openalex.org/C145428669","wikidata":"https://www.wikidata.org/wiki/Q471748","display_name":"Exception handling","level":2,"score":0.8364688754081726},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7496229410171509},{"id":"https://openalex.org/C202105479","wikidata":"https://www.wikidata.org/wiki/Q265013","display_name":"Software evolution","level":5,"score":0.6760455369949341},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6243901252746582},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6022347807884216},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.558698296546936},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5059913992881775},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4866255223751068},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.44433140754699707},{"id":"https://openalex.org/C199519371","wikidata":"https://www.wikidata.org/wiki/Q942695","display_name":"Source lines of code","level":3,"score":0.4423292577266693},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.43554747104644775},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.43158629536628723},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4274366497993469},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.39021188020706177},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.36843743920326233},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.14099180698394775},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2695664.2695933","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2695664.2695933","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.47999998927116394,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W10259981","https://openalex.org/W306273264","https://openalex.org/W1501652040","https://openalex.org/W1531088406","https://openalex.org/W1540343830","https://openalex.org/W1833620599","https://openalex.org/W1856815419","https://openalex.org/W1952332000","https://openalex.org/W1975454934","https://openalex.org/W2023396576","https://openalex.org/W2071136304","https://openalex.org/W2089053753","https://openalex.org/W2097341407","https://openalex.org/W2105618101","https://openalex.org/W2116844130","https://openalex.org/W2118948150","https://openalex.org/W2129115058","https://openalex.org/W2130253908","https://openalex.org/W2130876928","https://openalex.org/W2142874510","https://openalex.org/W2163245363","https://openalex.org/W2164317885","https://openalex.org/W2165688098","https://openalex.org/W2171002355","https://openalex.org/W2395663448","https://openalex.org/W6712133386"],"related_works":["https://openalex.org/W2131032015","https://openalex.org/W4384302888","https://openalex.org/W3014055696","https://openalex.org/W1993306785","https://openalex.org/W2069105920","https://openalex.org/W2021458623","https://openalex.org/W2741422284","https://openalex.org/W4312622767","https://openalex.org/W2891784660","https://openalex.org/W2039168567"],"abstract_inverted_index":{"The":[0,168],"Exception":[1],"Handling":[2],"(EH)":[3],"is":[4,15],"a":[5,59,115,184,209],"widely":[6],"used":[7],"mechanism":[8],"for":[9,216],"building":[10],"robust":[11],"systems":[12],"and":[13,41,132,136],"it":[14,73,137,193],"embedded":[16],"in":[17,130,183,187],"most":[18,188],"of":[19,27,44,61,91,145,158,174,189,208,211],"the":[20,25,52,66,68,88,96,122,155,162,172,175,190,198,206,217],"mainstream":[21],"programming":[22],"languages.":[23],"In":[24,106],"context":[26],"Software":[28],"Product":[29],"Lines":[30],"(SPL),":[31],"we":[32,113],"can":[33,56],"find":[34],"exception":[35,53,92,97,123,163,177,199,219],"handling":[36,54,93,98,124,164,178,200,220],"code":[37,55,179],"associated":[38],"to":[39,86,108,142,152,195],"common":[40],"variable":[42],"features":[43],"an":[45,80],"SPL.":[46],"However,":[47],"studies":[48],"have":[49],"shown":[50],"that":[51,171],"also":[57],"become":[58],"source":[60],"bugs":[62],"which":[63,119],"may":[64],"affect":[65],"system":[67],"other":[69],"way":[70,186],"around,":[71],"making":[72],"even":[74],"less":[75],"robust.":[76],"This":[77,202],"paper":[78,203],"describes":[79],"empirical":[81],"study":[82,112],"whose":[83],"goal":[84,150],"was":[85,138,151],"investigate":[87],"evolutionary":[89],"nature":[90],"violations.":[94],"Can":[95],"behavior":[99],"be":[100],"preserved":[101],"along":[102],"SPL":[103],"evolution":[104,159,173,214],"scenarios?":[105],"order":[107],"carry":[109],"out":[110,205],"this":[111],"extended":[114],"tool,":[116],"called":[117],"PLEA,":[118],"statically":[120],"discovers":[121],"flows":[125],"on":[126,197],"SPLs":[127,176,218],"(those":[128],"implemented":[129],"Java":[131],"using":[133],"annotation":[134],"techniques),":[135],"executed":[139],"over":[140],"five":[141],"seven":[143],"versions":[144],"two":[146],"distinct":[147],"SPLs.":[148],"Our":[149],"identify":[153],"how":[154],"different":[156],"kinds":[157],"scenarios":[160,215],"affected":[161],"policy":[165],"initially":[166],"defined.":[167],"results":[169],"showed":[170],"did":[180],"not":[181],"occur":[182],"planned":[185],"scenarios.":[191],"Consequently,":[192],"led":[194],"violations":[196],"behavior.":[201],"points":[204],"need":[207],"set":[210],"EH":[212],"behavior-preserving":[213],"code.":[221]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
