2013
DOI: 10.1007/978-3-642-37057-1_5
|View full text |Cite
|
Sign up to set email alerts
|

On Extracting Feature Models from Sets of Valid Feature Combinations

Abstract: Abstract. Rather than developing individual systems, Software Product Line Engineering develops families of systems. The members of the software family are distinguished by the features they implement and Feature Models (FMs) are the de facto standard for defining which feature combinations are considered valid members. This paper presents an algorithm to automatically extract a feature model from a set of valid feature combinations, an essential development step when companies, for instance, decide to convert… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
54
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 38 publications
(54 citation statements)
references
References 12 publications
0
54
0
Order By: Relevance
“…For example it is then possible to derive all corresponding products (e.g., programs) for testing, model-checking, debugging, or measuring performance of them individually. A configuration set can also be used as a benchmark for approaches seeking to synthesize feature models from configurations [3,11,17,23]. As a sound and complete representation of the configurations, the set can act as a ground truth for testing some automated operations [4], etc.…”
Section: Problem Statementmentioning
confidence: 99%
“…For example it is then possible to derive all corresponding products (e.g., programs) for testing, model-checking, debugging, or measuring performance of them individually. A configuration set can also be used as a benchmark for approaches seeking to synthesize feature models from configurations [3,11,17,23]. As a sound and complete representation of the configurations, the set can act as a ground truth for testing some automated operations [4], etc.…”
Section: Problem Statementmentioning
confidence: 99%
“…It works by identifying occurrence patterns in the selected and not selected features that are mapped to parent-child relations of feature models. This work has been extended to consider requires and excludes CTCs (Haslinger et al, 2013); however, it does not support more general types of CTCs. The main distinction with our work is that only one feature model can be reversed engineered, whereas in our approach we could provide different feature models (if they exist) as alternatives for the designers to choose from.…”
Section: Related Workmentioning
confidence: 99%
“…A crucial requirement is capturing all the feature combinations present in SPLs and represent them with feature models (FMs) (Czarnecki and Eisenecker, 2000;Kang et al, 1990), a de facto standard for modelling variability -the capacity of software artefacts to change (Svahnberg et al, 2005). Previous research has addressed this reverse engineering challenge from different perspectives with different approaches such as configuration scripts (She et al, 2011), propositional logic expressions (Czarnecki and Wasowski, 2007), natural language (Weston et al, 2009), and ad hoc algorithms (Haslinger et al, 2011(Haslinger et al, , 2013Acher et al, 2012).…”
Section: Introductionmentioning
confidence: 99%
“…Several techniques for synthesising an FM from a set of configurations or constraints (e.g., encoded as a propositional formula) have been proposed [19,33,6,1,24]. These techniques cannot be applied in our context, since we cannot assume the availability of formal and complete descriptions of configurations or constraints.…”
Section: Related Workmentioning
confidence: 99%