<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Feature-oriented Modeling for Collaborative Virtual Environment Construction</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Xin Zhao Department of Computer Science School of Engineering University of Alabama Tuscaloosa</institution>
          ,
          <addr-line>Alabama 35487</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>-Collaborative Virtual Environments (CVEs) introduce significant improvements to communication and interaction by offering a simulated visualization for data representation and synchronized exchange. Participants can share their context and information in a consistent, integrated environment even if they are geographically distributed. These characteristics greatly enhance the virtualization of collaborative applications such as combat training, distance education, and a broad range of domain-specific needs. However, there are many accidental complexities involved in the creation of such environments that make it very challenging for end-users who do not have software development expertise. Our proposed work seeks to simplify and customize CVEs through feature-oriented modeling. The objective of this Ph.D. investigation is to provide a step-wise collaborative environment construction approach for end-users, thus allowing non-experts to create CVEs simply by choosing system features. Specific research challenges in using feature models for this specific application approach will be introduced along with our vision for investigating these issues as a doctoral dissertation.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION AND PROBLEM</title>
      <p>
        Virtual Reality (VR) is a computer-based technique that
simulates a physical presence wherein users are able to interact
with a virtual world and gain sensory experiences (e.g., visual,
haptic, aural). Although an exact definition of VR is hard to
formulate (the earliest existence of this concept comes from
a science fiction novel written by Weinbaum [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]), the great
benefit of this technique is easy to see —“going nowhere but
experiencing anywhere” with equipment (such as headsets and
remote controllers). There are many areas that VR could apply,
such as education (distance learning), military (combat
training), health (surgery simulation), and civil engineering (urban
planning). A Collaborative Virtual Environment (CVE) is an
extension of a networked virtual environment that provides
a context for cooperation combining both the participants and
their information into a common display space with integration
and persistence.
      </p>
      <p>
        The construction of CVEs is challenging, both from a
hardware aspect ([
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]) and software aspect. Software
challenges, which are the focus of my research, mainly involve
how to facilitate the CVE construction process. Although there
are several development tools (such as Unity 3D1, Blender2,
1https://unity3d.com/
2https://www.blender.org/
JMonkeyEngine3) supporting CVE construction, these tools
are highly expertized and developers need programming skills
to implement systems using these tools. Such activities always
introduce many accidental complexities [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] to the environment
construction.
      </p>
      <p>
        Model-Driven Engineering focuses more on problem
solving from domain aspects rather than a focus on the
underlying technology space. The promise of MDE — improving
system portability, reuseability and adaptability [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]
— makes it an acceptable development methodology both
in academic and industrial fields. Feature-oriented software
development (FOSD), a MDE-based software development
paradigm, involves product synthesis and customization based
on system features. Feature models, the core assets in FOSD,
encapsulate the commonalities and variabilities of software
products. The set of these products builds up a Software
Product Line (SPL) [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. Feature modeling allows developers
to concentrate on a particular domain at an abstract level
without knowing implementation details. Though FOSD has
been applied to several application domains successfully [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ],
employing feature-oriented modeling to virtual environment
construction is still new.
      </p>
      <p>In summary, my Ph.D. research aims to answer the
following questions:</p>
      <p>RQ1 — Methodology: Can we design a novel step-wise
feature-oriented approach based on feature priority for
software development?
RQ2 — Design: Can we design collaborative virtual
environments through step-wise feature modeling?
RQ3 — Evaluation: To what extent do end-users benefit
from feature-oriented CVEs?</p>
    </sec>
    <sec id="sec-2">
      <title>II. RELATED WORK</title>
      <p>Applying FOSD to CVE construction is still a new research
field. Few works attempt to provide CVE construction through
feature-oriented approaches. In this section, we review some
existing literature related to two research fields: CVE
construction and FOSD.</p>
      <p>
        CVEs aim at the synchronization of communication among
different participants in one virtual environment. Greenhalgh
et al. proposed a collaborative virtual teleconferencing system
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Though this is one of the earliest papers discussing CVEs,
the focus of this work is how to process interactions between a
human and a computer. For research aiming at the construction
of virtual environments, Herna´ndez et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] proposed a 3D
real-time CVE for GUI sketching. In this work, the authors
focus on collaborative GUI sketching and implemented a
prototype called WeSketch. A similar tool is Teleplace4, a
3D application for virtual on-line meetings. In the industrial
context, there are some tools (e.g., Unity 3D, Blender) that
allow users to develop a customized virtual environment.
However, these tools are highly-expertized and developers
need some programming skills to accomplish specific tasks.
None of these industrial tools provide support for real-time
collaboration.
      </p>
      <p>
        FOSD deals with external system features in a specific
domain. In FOSD, features are treated separately and designers
do not need to consider implementation details. A feature
model is an abstraction of system features and consists of
all the functional and non-functional elements in the system.
Feature diagrams [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and formal semantics [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] are widely
used to represent feature models. Though FOSD decomposes
the complexity of system design, it increases the complexity
when integrating and organizing all the system features [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
Lee et al. proposed a guideline for solving this problem from
domain planning and feature identification [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Although
feature prioritization and feature selection are not novel ideas
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], there still lacks related work toward applying a
selection process to CVE construction. FOSD has been applied
to many application domains, such as reverse engineering [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ],
computer networks [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] and image processing [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>III. PROPOSED SOLUTION</title>
      <p>We propose a step-wise feature-oriented modeling approach
for CVE construction. Figure 1 shows the framework for our
proposed solution. In the following subsections, we discuss
the details in each step and possible tools used to support
each step.</p>
      <p>4https://telexlr8.wordpress.com/openqwaq/teleplace/</p>
      <sec id="sec-3-1">
        <title>A. Feature Model Construction</title>
        <p>
          In feature model construction, we will first build a
prioritized feature model. A prioritized feature diagram is a
feature diagram with all the features defined with priorities.
For same level nodes, the priorities are labeled as 1,2,3...N.
For parent-children nodes, the priorities are labeled as
11, 1-2, 1-3...1-N. When features have the same priorities,
their labels are the same. Then, we transform this prioritized
feature diagram to a feature table. This table is organized
according to priorities and presented to end-users. In order
to simplify the construction process and avoid construction
problems (e.g., feature interaction [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] may violate cross-tree
dependencies), we propose a step-wise construction for CVEs
from a feature table. Users choose features from the feature
table step-by-step. For example, if feature A excludes feature
B and feature A has higher priority, then if feature A is chosen,
feature B is automatically disabled in later steps. For features
that have child nodes, when such features are chosen, the
feature table will automatically extend to allow users to choose
their child feature nodes. There are several tools that support
feature modeling construction, such as Feature Modeling
Plugin (fmp) [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] and FeatureIDE [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. We plan to implement our
approach based on FeatureIDE, which supports all phases of
FOSD and is fully integrated in the Eclipse IDE.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>B. Product Configuration</title>
        <p>In the system implementation phase, the input of this step
is the summation of all the features selected by the user
from the feature table and the output is a CVE. We plan
to design two parts of a user interface — one part is the
feature table allowing end-users to choose system features
they want and the other part is the real-time generation of the
CVE. This phase will be achieved using MDE, which means
that CVE construction is generated automatically. Eclipse
and FeatureIDE would be our preferred tools for this step.
FeatureIDE enables code generation from feature diagram,
helping users to jump from high-level abstraction to system
implementation. However, FeatureIDE only supports the
automated generation of static part in the system. A model for
behavioral aspects for the system need to be added in this
step. For the convenience of our development, Java will be
the hosting language because Eclipse provides an integrated
environment for Java development.</p>
      </sec>
      <sec id="sec-3-3">
        <title>C. Collaborative Communication</title>
        <p>In the system collaboration phase, we will connect different
users who are geographically distributed after the construction
of the virtual environment. In our proposed framework,
collaborative here means real-time collaboration — data is shared
with timely synchronization. One user could see another
participant’s actions with low latency. There are some tools
supporting real-time CVE development, such as Photon unity
networking5 and JMonkeyEngine6. In this step, we plan to
apply JMonkeyEngine as an implementation tool because it
supports Java development, which is consistent with
implementation languages in previous steps.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>IV. EVALUATION AND EXPECTED CONTRIBUTION</title>
      <p>In order to evaluate our proposed framework, we plan to
implement an application based on a feature-oriented CVE — a
collaborative virtual classroom. This prototype will implement
some basic teaching tasks in a real classroom, such as
realtime communication among participants. We plan to test this
simple collaborative virtual classroom to real scenarios and test
its performance. The analysis could include both qualitative
evaluation (such as delay time and storage requirement) and
quantitative evaluation (such as semi-structured interview with
users and post-surveys).</p>
      <p>The contribution of this Ph.D. project is two-fold. We expect
that this research will be both beneficial to academia and
industry:</p>
      <p>In academia, we expect the proposal of step-wise feature
modeling could solve part of existing challenges in FOSD
and provide related researchers a new aspect to the system
construction for product lines from feature modeling.
In industry, the contribution to the community may be the
new approach for building easy and customized CVEs
(software aspects) by non-experts across many domains.</p>
    </sec>
    <sec id="sec-5">
      <title>V. CURRENT STATUS</title>
      <p>This dissertation work is still in a very early age. At
present, we achieved several tasks. First, we performed some
existing literature reviews to understand challenges in current
FOSD approaches. Furthermore, we tested several mainstream
virtual environment building tools. From this testing, we found
some issues that prevent an easy and fast way to CVE
construction for non-experts. To make the customization of
CVEs more accessible to non-experts, we propose applying
MDE to overcome these challenges. The next steps of our
work include step-wise feature model construction design and
implementation, applying step-wise feature modeling approach
to build CVEs, and system testing. shows a proposed timeline
for completion. The highlights of proposed timeline are shown
as follows:
5https://www.photonengine.com/en/Photon
6http://jmonkeyengine.org
– 06/2017 — 11/2017: feature table construction
– 12/2017 — 05/2018: feature-based virtual environment
construction
– 12/2017 — 06/2018: feature-based virtual environment
testing
– 07/2018 — 10/2018: feature-based CVE construction
– 07/2018 — 11/2018: feature-based CVE testing
– 12/2018 — 04/2019: collaborative virtual classroom
implementation
– 12/2018 — 05/2019: collaborative virtual classroom
testing
– 06/2019 — 08/2019: empirical evaluation of
featurebased CVE construction
– 09/2019 — 12/2019: dissertation and defense</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Antkiewicz</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Czarnecki</surname>
          </string-name>
          .
          <article-title>Featureplugin: feature modeling plugin for eclipse</article-title>
          .
          <source>In Proceedings of the 2004 OOPSLA workshop on eclipse technology eXchange</source>
          , pages
          <fpage>67</fpage>
          -
          <lpage>72</lpage>
          . ACM,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
            <surname>Bagheri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Asadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gasevic</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Soltani</surname>
          </string-name>
          .
          <article-title>Stratified analytic hierarchy process: Prioritization and selection of software features</article-title>
          .
          <source>Software Product Lines: Going Beyond</source>
          , pages
          <fpage>300</fpage>
          -
          <lpage>315</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D. R.</given-names>
            <surname>Begault</surname>
          </string-name>
          and
          <string-name>
            <given-names>L. J.</given-names>
            <surname>Trejo</surname>
          </string-name>
          . 3
          <article-title>-d sound for virtual reality and multimedia</article-title>
          .
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Bocovich</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Atlee</surname>
          </string-name>
          .
          <article-title>Feature-oriented modelling in bip: A case study</article-title>
          .
          <source>In ModComp@ MoDELS</source>
          , pages
          <fpage>6</fpage>
          -
          <lpage>11</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F.</given-names>
            <surname>Brooks</surname>
          </string-name>
          .
          <article-title>No silver bullet : essence and accidents of software engineering</article-title>
          ,
          <year>1987</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>X.</given-names>
            <surname>Deng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Hong</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          .
          <article-title>Citrus greening detection using visible spectrum imaging and c-svc</article-title>
          .
          <source>Computers and Electronics in Agriculture</source>
          ,
          <volume>130</volume>
          :
          <fpage>177</fpage>
          -
          <lpage>183</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ferber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Haag</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Savolainen</surname>
          </string-name>
          .
          <article-title>Feature interaction and dependencies: Modeling features for reengineering a legacy product line</article-title>
          .
          <source>Software product lines</source>
          , pages
          <fpage>37</fpage>
          -
          <lpage>60</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S. Grauman</given-names>
            <surname>Weinbaum</surname>
          </string-name>
          .
          <source>Pygmalion's spectacles</source>
          ,
          <year>1935</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>C.</given-names>
            <surname>Greenhalgh</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Benford</surname>
          </string-name>
          .
          <article-title>Massive: a collaborative virtual environment for teleconferencing</article-title>
          .
          <source>ACM Transactions on Computer-Human Interaction (TOCHI)</source>
          ,
          <volume>2</volume>
          (
          <issue>3</issue>
          ):
          <fpage>239</fpage>
          -
          <lpage>261</lpage>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>H. A.</given-names>
            <surname>Herna</surname>
          </string-name>
          <article-title>´ndez and</article-title>
          <string-name>
            <given-names>H.</given-names>
            <surname>Trefftz</surname>
          </string-name>
          .
          <article-title>Wesketch: A 3d real time collaborative virtual environment that improves the gui sketching task</article-title>
          .
          <source>In Information Technology: New Generations (ITNG)</source>
          , 2011 Eighth International Conference on, pages
          <fpage>163</fpage>
          -
          <lpage>168</lpage>
          . IEEE,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>K. C. Kang</surname>
            ,
            <given-names>S. G.</given-names>
          </string-name>
          <string-name>
            <surname>Cohen</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          <string-name>
            <surname>Hess</surname>
            ,
            <given-names>W. E.</given-names>
          </string-name>
          <string-name>
            <surname>Novak</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Peterson</surname>
          </string-name>
          .
          <article-title>Feature-oriented domain analysis (foda) feasibility study</article-title>
          .
          <source>Technical report</source>
          , Carnegie-Mellon
          <source>Univ Pittsburgh Pa Software Engineering Inst</source>
          ,
          <year>1990</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>C.</given-names>
            <surname>Kastner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Thum</surname>
          </string-name>
          , G. Saake,
          <string-name>
            <given-names>J.</given-names>
            <surname>Feigenspan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Leich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Wielgorz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Apel</surname>
          </string-name>
          .
          <article-title>Featureide: A tool framework for feature-oriented software development</article-title>
          .
          <source>In Software Engineering</source>
          ,
          <year>2009</year>
          .
          <article-title>ICSE 2009</article-title>
          . IEEE 31st International Conference on, pages
          <fpage>611</fpage>
          -
          <lpage>614</lpage>
          . IEEE,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>K.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. C.</given-names>
            <surname>Kang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Lee</surname>
          </string-name>
          .
          <article-title>Concepts and guidelines of feature modeling for product line software engineering</article-title>
          .
          <source>In International Conference on Software Reuse</source>
          , pages
          <fpage>62</fpage>
          -
          <lpage>77</lpage>
          . Springer,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>J.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Batory</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Nedunuri</surname>
          </string-name>
          .
          <article-title>Modeling interactions in feature oriented software designs</article-title>
          .
          <source>In FIW</source>
          , pages
          <fpage>178</fpage>
          -
          <lpage>197</lpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Mellor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Clark</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Futagami</surname>
          </string-name>
          .
          <article-title>Model-driven development: guest editors' introduction</article-title>
          . IEEE software,
          <volume>20</volume>
          (
          <issue>5</issue>
          ):
          <fpage>14</fpage>
          -
          <lpage>18</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>T.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. S.</given-names>
            <surname>Schmidt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. G.</given-names>
            <surname>Staadt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Livingston</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ball</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>May</surname>
          </string-name>
          .
          <article-title>A survey of large high-resolution display technologies, techniques, and applications</article-title>
          .
          <source>In Virtual Reality Conference</source>
          ,
          <year>2006</year>
          , pages
          <fpage>223</fpage>
          -
          <lpage>236</lpage>
          . IEEE,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>E.</given-names>
            <surname>Peters</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Heijligers</surname>
          </string-name>
          , J. de Kievith,
          <string-name>
            <given-names>X.</given-names>
            <surname>Razafindrakoto</surname>
          </string-name>
          , R. van Oosterhout,
          <string-name>
            <given-names>C.</given-names>
            <surname>Santos</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Mayer</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Louwerse</surname>
          </string-name>
          .
          <article-title>Design for collaboration in mixed reality: Technical challenges and solutions. In Games and Virtual Worlds for Serious Applications (VS-</article-title>
          <string-name>
            <surname>Games</surname>
            <given-names>)</given-names>
          </string-name>
          ,
          <year>2016</year>
          8th International Conference on, pages
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          . IEEE,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rabiser</surname>
          </string-name>
          , H. Pra¨hofer, P. Gru¨ nbacher, M. Petruzelka,
          <string-name>
            <given-names>K.</given-names>
            <surname>Eder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Angerer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kromoser</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Grimmer</surname>
          </string-name>
          <article-title>. Multi-purpose, multi-level feature modeling of large-scale industrial software systems</article-title>
          .
          <source>Software &amp; Systems Modeling</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>26</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>B.</given-names>
            <surname>Selic</surname>
          </string-name>
          .
          <article-title>The pragmatics of model-driven development</article-title>
          .
          <source>IEEE software</source>
          ,
          <volume>20</volume>
          (
          <issue>5</issue>
          ):
          <fpage>19</fpage>
          -
          <lpage>25</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>J.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Fang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L. H.</given-names>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>Formal semantics and verification for feature modeling</article-title>
          .
          <source>In Engineering of Complex Computer Systems</source>
          ,
          <year>2005</year>
          .
          <article-title>ICECCS 2005</article-title>
          .
          <article-title>Proceedings</article-title>
          . 10th IEEE International Conference on, pages
          <fpage>303</fpage>
          -
          <lpage>312</lpage>
          . IEEE,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Weiss</surname>
          </string-name>
          and
          <string-name>
            <given-names>C. T. R.</given-names>
            <surname>Lai</surname>
          </string-name>
          .
          <article-title>Software product-line engineering: a family-based software development process</article-title>
          , volume
          <volume>12</volume>
          .
          <string-name>
            <surname>Addison-Wesley</surname>
            <given-names>Reading</given-names>
          </string-name>
          ,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>L.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. G.</given-names>
            <surname>Barker</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Desai</surname>
          </string-name>
          .
          <article-title>Computer-implemented modeling systems and methods for analyzing and predicting computer network intrusions</article-title>
          ,
          <source>Sept. 6 2011. US Patent 8</source>
          ,
          <issue>015</issue>
          ,
          <fpage>133</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>E.</given-names>
            <surname>Yamany</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Eid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Shaheen</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Sayyad</surname>
          </string-name>
          .
          <article-title>Opti-select: An interactive tool for user-in-the-loop feature selection in software product lines</article-title>
          .
          <source>In Proceedings of the 18th International Software Product Line Conference: Companion Volume for Workshops</source>
          , Demonstrations and Tools-Volume
          <volume>2</volume>
          , pages
          <fpage>126</fpage>
          -
          <lpage>129</lpage>
          . ACM,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhu</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          .
          <article-title>Model driven development with non-functional aspects</article-title>
          .
          <source>In Proceedings of the 2009 ICSE Workshop on Aspect-Oriented Requirements Engineering and Architecture Design</source>
          , pages
          <fpage>49</fpage>
          -
          <lpage>54</lpage>
          . IEEE Computer Society,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>