{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T02:20:07Z","timestamp":1772158807067,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319116792","type":"print"},{"value":"9783319116808","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-11680-8_18","type":"book-chapter","created":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T17:25:41Z","timestamp":1412011541000},"page":"219-231","source":"Crossref","is-referenced-by-count":6,"title":["On Automating Inference of OCL Constraints from Counterexamples and Examples"],"prefix":"10.1007","author":[{"given":"Duc-Hanh","family":"Dang","sequence":"first","affiliation":[]},{"given":"Jordi","family":"Cabot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Sutcliffe, A.G., Maiden, N.A.M., Minocha, S., Manuel, D.: Supporting Scenario-Based Requirements Engineering. IEEE Trans. Software Eng.\u00a024(12), 1072\u20131088 (1998)","DOI":"10.1109\/32.738340"},{"key":"18_CR2","unstructured":"Warmer, J., Kleppe, A.: The Object Constraint Language: Getting Your Models Ready for MDA, 2nd edn. Addison-Wesley Professional (2003)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Gogolla, M., B\u00fcttner, F., Richters, M.: USE: A UML-Based Specification Environment for Validating UML and OCL. Science of Computer Programming\u00a069(1-3), 27\u201334 (2007)","DOI":"10.1016\/j.scico.2007.01.013"},{"key":"18_CR4","first-page":"547","volume-title":"Proc. 22th Int. Conf. Automated Software Engineering (ASE)","author":"J. Cabot","year":"2007","unstructured":"Cabot, J., Claris, R., Riera, D.: UMLtoCSP: A Tool for the Formal Verification of UML\/OCL Models Using Constraint Programming. In: Kurt Stirewalt, R.E., Alexander Egyed, B.F. (eds.) Proc. 22th Int. Conf. Automated Software Engineering (ASE), pp. 547\u2013548. ACM, New York (2007)"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-540-75209-7_30","volume-title":"Model Driven Engineering Languages and Systems","author":"K. Anastasakis","year":"2007","unstructured":"Anastasakis, K., Bordbar, B., Georg, G., Ray, I.: UML2Alloy: A Challenging Model Transformation. In: Engels, G., Opdyke, B., Schmidt, D.C., Weil, F. (eds.) MODELS 2007. LNCS, vol.\u00a04735, pp. 436\u2013450. Springer, Heidelberg (2007)"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-642-33666-9_27","volume-title":"Model Driven Engineering Languages and Systems","author":"M. Kuhlmann","year":"2012","unstructured":"Kuhlmann, M., Gogolla, M.: From UML and OCL to Relational Logic and Back. In: France, R.B., Kazmeier, J., Breu, R., Atkinson, C. (eds.) MODELS 2012. LNCS, vol.\u00a07590, pp. 415\u2013431. Springer, Heidelberg (2012)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Faunes, M., Cadavid, J.J., Baudry, B., Sahraoui, H.A., Combemale, B.: Automatically searching for metamodel well-formedness rules in examples and counter-examples. In: Moreira, A., Sch\u00e4tz, B., Gray, J., Vallecillo, A., Clarke, P. (eds.) MODELS 2013. LNCS, vol.\u00a08107, pp. 187\u2013202. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-41533-3_12"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Dang, D.H., Cabot, J.: Automating Inference of OCL Business Rules from User Scenarios. In: Proc. 20th Asia-Pacific Conf. Software Engineering (APSEC), pp. 156\u2013163. IEEE (2013)","DOI":"10.1109\/APSEC.2013.31"},{"key":"18_CR9","unstructured":"ECLiPSe: The ECLiPSe Constraint Programming System. Version 6.1 (June 2013)"},{"key":"18_CR10","unstructured":"Ferraiolo, D., Kuhn, D.: Role-Based Access Control. In: Proc. 15th National Computer Security Conf., pp. 554\u2013563 (1992)"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Kuhlmann, M., Sohr, K., Gogolla, M.: Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCL. In: Baik, J., Massacci, F., Zulkernine, M. (eds.) Proc. 5th Int. Conf. Secure Software Integration and Reliability Improvement (SSIRI), pp. 108\u2013117. IEEE (2011)","DOI":"10.1109\/SSIRI.2011.18"},{"issue":"9-10","key":"18_CR12","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1016\/j.infsof.2007.08.003","volume":"50","author":"F. Javed","year":"2008","unstructured":"Javed, F., Mernik, M., Gray, J., Bryant, B.R.: MARS: A Metamodel Recovery System Using Grammar Inference. Information & Software Technology\u00a050(9-10), 948\u2013968 (2008)","journal-title":"Information & Software Technology"},{"issue":"4","key":"18_CR13","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/s10270-005-0089-y","volume":"4","author":"M. Gogolla","year":"2005","unstructured":"Gogolla, M., Bohling, J., Richters, M.: Validating UML and OCL Models in USE by Automatic Snapshot Generation. Software and System Modeling\u00a04(4), 386\u2013398 (2005)","journal-title":"Software and System Modeling"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-540-69858-6_30","volume-title":"Natural Language and Information Systems","author":"R. Pau","year":"2008","unstructured":"Pau, R., Cabot, J.: Paraphrasing OCL Expressions with SBVR. In: Kapetanios, E., Sugumaran, V., Spiliopoulou, M. (eds.) NLDB 2008. LNCS, vol.\u00a05039, pp. 311\u2013316. Springer, Heidelberg (2008)"},{"issue":"3","key":"18_CR15","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.scico.2007.05.001","volume":"68","author":"J. Cabot","year":"2007","unstructured":"Cabot, J., Teniente, E.: Transformation Techniques for OCL Constraints. Science of Computer Programming\u00a068(3), 152\u2013168 (2007)","journal-title":"Science of Computer Programming"},{"issue":"2","key":"18_CR16","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D. Angluin","year":"1987","unstructured":"Angluin, D.: Learning Regular Sets from Queries and Counterexamples. Information and Computation\u00a075(2), 87\u2013106 (1987)","journal-title":"Information and Computation"},{"key":"18_CR17","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/11564096_8","volume-title":"Machine Learning: ECML 2005","author":"C. Bessi\u00e8re","year":"2005","unstructured":"Bessi\u00e8re, C., Coletta, R., Koriche, F., O\u2019Sullivan, B.: A SAT-Based Version Space Algorithm for Acquiring Constraint Satisfaction Problems. In: Gama, J., Camacho, R., Brazdil, P.B., Jorge, A.M., Torgo, L. (eds.) ECML 2005. LNCS (LNAI), vol.\u00a03720, pp. 23\u201334. Springer, Heidelberg (2005)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Bajwa, I., Bordbar, B., Lee, M.: OCL Constraints Generation from Natural Language Specification. In: Proc. 14th Int. Conf. Enterprise Distributed Object Computing Conference (EDOC), pp. 204\u2013213. IEEE (2010)","DOI":"10.1109\/EDOC.2010.33"}],"container-title":["Advances in Intelligent Systems and Computing","Knowledge and Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11680-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T03:15:50Z","timestamp":1675826150000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11680-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319116792","9783319116808"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11680-8_18","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}