{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:44:27Z","timestamp":1730292267321,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/re.2018.00040","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T04:59:51Z","timestamp":1539665991000},"page":"325-335","source":"Crossref","is-referenced-by-count":1,"title":["Supporting Diagnosis of Requirements Violations in Systems of Systems"],"prefix":"10.1109","author":[{"given":"Michael","family":"Vierhauser","sequence":"first","affiliation":[]},{"given":"Jane","family":"Cleland-Huang","sequence":"additional","affiliation":[]},{"given":"Rick","family":"Rabiser","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Krismayer","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Grunbacher","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.11.032"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICGSE.2013.20"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.12.034"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/322993.322995"},{"journal-title":"The Invisible Computer Why Good Products Can Fail the Personal Computer Is so Complex and Information Appliances Are the Solution","year":"1998","author":"norman","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2794381"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0077-9"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/32.799955"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-005-0016-3"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/32.895989"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368216"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2188286.2188326"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302672"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227237"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.147"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1995.512550"},{"key":"ref15","first-page":"296","article-title":"Efficient runtime monitoring with metric temporal logic: A case study in the Android operating system","author":"gunadi","year":"2014","journal-title":"Proc 19th Int Symp Formal Methods"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320423"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-007-0024-1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1039539.1039541"},{"journal-title":"Aspect-Oriented Programming","year":"1997","author":"kiczales","key":"ref19"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1109\/TSC.2013.45","article-title":"Comprehensive explanation of SLA violations at runtime","author":"m\u00fcller","year":"2014","journal-title":"IEEE Trans on Services Computing"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-08915-7","volume":"8378","author":"bencomo","year":"2014","journal-title":"Models©run time foundations applications and roadmaps"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/978-3-540-73551-9_9","article-title":"Monitoring architectural properties in dynamic component-based systems","author":"muccini","year":"2007","journal-title":"Proceedings of International Symposium on Component-Based Software Engineering"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1705"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.3571562"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1109\/ASE.2006.16","article-title":"Archtrace: policy-based support for managing evolving architecture-to-implementation traceability links","author":"murta","year":"2006","journal-title":"Proc 21st IEEE\/ACM Int'l Conf on Automated Software Engineering"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860808-5\/50005-8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2239-5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2013.21"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.45"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2239-5_6"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2011.69"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1023\/B:FORM.0000017719.43755.7c"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.07.008"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/978-1-4471-2239-5_4","article-title":"Information retrieval methods for automated traceability recovery","author":"lucia","year":"2012","journal-title":"Software and Systems Traceability"},{"key":"ref47","first-page":"220","article-title":"Technical action research as a validation method in information systems design science","author":"wieringa","year":"2012","journal-title":"Proc of the Int'l Conf on Design Science Research in Information Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115700"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54045-0_14"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/65.244791"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859009"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.10"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320412"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2479217"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.08.005"},{"journal-title":"Mantis Bug Tracker","year":"2017","key":"ref25"}],"event":{"name":"2018 IEEE 26th International Requirements Engineering Conference (RE)","start":{"date-parts":[[2018,8,20]]},"location":"Banff, AB","end":{"date-parts":[[2018,8,24]]}},"container-title":["2018 IEEE 26th International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8490808\/8491107\/08491147.pdf?arnumber=8491147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:49:26Z","timestamp":1643222966000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8491147\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/re.2018.00040","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}