{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:40:05Z","timestamp":1748072405453,"version":"3.41.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2001,4,1]],"date-time":"2001-04-01T00:00:00Z","timestamp":986083200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2001,4,1]],"date-time":"2001-04-01T00:00:00Z","timestamp":986083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Automated Software Engineering"],"published-print":{"date-parts":[[2001,4]]},"DOI":"10.1023\/a:1008793523863","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T16:37:32Z","timestamp":1040575052000},"page":"195-218","source":"Crossref","is-referenced-by-count":1,"title":["The Automated Refinement of a Requirements Domain Theory"],"prefix":"10.1007","volume":"8","author":[{"given":"T.L.","family":"McCluskey","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.M.","family":"West","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"320407_CR1","doi-asserted-by":"crossref","unstructured":"Anthony, S. and Frisch, A. 1997. Generating numerical literals during refinement. In N. Lavrac and S. Dzeroski, editors, Inductive Logic Programming: Proceedings of the 7th International Workshop, ILP\u201397, pp. 61\u201376. Vol. 1297 of LNAI.","DOI":"10.1007\/3540635149_35"},{"issue":"20","key":"320407_CR2","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/0743-1066(94)90024-8","volume":"19","author":"K. Apt","year":"1994","unstructured":"Apt, K. and Bol, R. 1994. Logic programming and negation: A survey. Journal of Logic Programming, 19(20), 9\u201371.","journal-title":"Journal of Logic Programming"},{"key":"320407_CR3","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1613\/jair.438","volume":"8","author":"S. Argamon\u2013Engelson","year":"1998","unstructured":"Argamon\u2013Engelson, S. and Koppel, M. 1998. Tracability of theory patching. Journal of Artificial Intelligence Research, 8, 39\u201365.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"320407_CR4","volume-title":"Inductive Logic Programming, From Machine Learning to Software Engineering","author":"F. Bergadano","year":"1996","unstructured":"Bergadano, F. and Gunetti, D. 1996. Inductive Logic Programming, From Machine Learning to Software Engineering. Cambridge, Massachusetts, US: MIT Press."},{"key":"320407_CR5","series-title":"Technical Report impress\/2\/02\/1","volume-title":"The implementation of theory revision in the CPS validation environment","author":"C.H. Bryant","year":"1997","unstructured":"Bryant, C.H. 1997. The implementation of theory revision in the CPS validation environment. Technical Report impress\/2\/02\/1, School of Computing and Mathematics, University of Huddersfield, UK."},{"key":"320407_CR6","unstructured":"Carbonara, L. and Sleeman, D. 1996. Improving the efficiency of knowledge base refinement. In L. Saitta, editor, Proceedings of the Thirteenth International Conference on Machine Learning (ICML '96). Bari, Italy, July 3\u20136, 1996, pp. 78\u201386."},{"key":"320407_CR7","doi-asserted-by":"crossref","unstructured":"Clark, K.L. 1978. Negation as failure. In Logic and Data Bases. Plenum Press, pp. 293\u2013322.","DOI":"10.1007\/978-1-4684-3384-5_11"},{"issue":"2","key":"320407_CR8","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1006\/ijhc.1996.0012","volume":"44","author":"S. Craw","year":"1996","unstructured":"Craw, S. 1996. Refinement complements verification and validation. Int. J. Human\u2013Computer Studies, 44(2), 245\u2013256.","journal-title":"Int. J. Human\u2013Computer Studies"},{"key":"320407_CR9","unstructured":"Dondossola, G. 1998. Formal methods in the development of safety critical knowledge\u2013based components. In F. van Harmelen, editor, Proceedings of the KR '98 European Workshop on Validation and Verification of Knowledge\u2013Based Systems (CEUR Workshop Proceedings, Vol. 16)."},{"key":"320407_CR10","doi-asserted-by":"crossref","unstructured":"Dubois, E. 1998. ALBERT: A formal language and its supporting tools for requirements engineering. In Lecture Notes in Computer Science No. 1382. pp. 322\u2013325.","DOI":"10.1007\/BFb0053600"},{"key":"320407_CR11","doi-asserted-by":"crossref","unstructured":"Easterbrook, S. and Callahan, J. 1996. Independent validation of specifications: A coordination headache. In Proceedings of the Fifth Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'96). pp. 232\u2013237.","DOI":"10.1109\/ENABL.1996.555227"},{"issue":"3","key":"320407_CR12","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/S0743-1066(99)00021-7","volume":"40","author":"R. Greiner","year":"1999","unstructured":"Greiner, R. 1999. The complexity of revising logic programs. Journal of Logic Programming, 40(3), 273\u2013298.","journal-title":"Journal of Logic Programming"},{"key":"320407_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-83189-8","volume-title":"Foundations of Logic Programming","author":"J.W. Lloyd","year":"1987","unstructured":"Lloyd, J.W. 1987. Foundations of Logic Programming. Berlin: Springer\u2013Verlag, 2nd, extended edition.","edition":"2nd, extended e"},{"key":"320407_CR14","series-title":"Technical Report impress\/2\/03\/1","volume-title":"An integrated validation environment for the conflict prediction specification","author":"T.L. McCluskey","year":"1997","unstructured":"McCluskey, T.L. 1997. An integrated validation environment for the conflict prediction specification. Technical Report impress\/2\/03\/1, School of Computing and Mathematics, University of Huddersfield, UK."},{"issue":"1","key":"320407_CR15","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1002\/spe.4380250104","volume":"25","author":"T.L. McCluskey","year":"1995","unstructured":"McCluskey, T.L., Porteous, J.M., Naik, Y., Taylor, C., and Jones, S. 1995. A requirements capture method and its use in an air traffic control application. Software\u2013Practice and Experience, 25(1), 47\u201371.","journal-title":"Software\u2013Practice and Experience"},{"key":"320407_CR16","doi-asserted-by":"crossref","unstructured":"McCluskey, T.L., Porteous, J.M., West, M.M., and Bryant, C.H. 1996. The validation of formal specifications of requirements. In Proceedings of the BCS\u2013FACS Northern Formal Methods Workshop. Ilkley, UK.","DOI":"10.14236\/ewic\/FA1996.14"},{"key":"320407_CR17","doi-asserted-by":"crossref","unstructured":"McCluskey, T.L. and West, M.M. 1998. Towards the automated debugging and maintenance of logic\u2013based requirements models. In ASE '98: Proceedings of the 13th IEEE International Conference on Automated Software Engineering. pp. 105\u2013114.","DOI":"10.1109\/ASE.1998.732591"},{"issue":"20","key":"320407_CR18","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1016\/0743-1066(94)90035-3","volume":"19","author":"S. Muggleton","year":"1994","unstructured":"Muggleton, S. and De Raedt, L. 1994. Inductive logic programming: Theory and methods. Journal of Logic Programming 19(20), 629\u2013679.","journal-title":"Journal of Logic Programming"},{"key":"320407_CR19","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1613\/jair.368","volume":"6","author":"D.W. Opitz","year":"1997","unstructured":"Opitz, D.W. and Shavlik, J.W. 1997. Connectionist theory refinement: Genetically searching the space of network topologies. Journal of Artficial Intelligence Research, 6, 177\u2013209.","journal-title":"Journal of Artficial Intelligence Research"},{"key":"320407_CR20","unstructured":"Palmer, G.J. and Craw, S. 1996. The role of test cases in automated knowledge refinement. In ES96: The Sixteenth Annual Technical Conference of the British Computer Society Specialist Group on Expert Systems. Cambridge, England, pp. 75\u201390."},{"issue":"2","key":"320407_CR21","first-page":"95","volume":"19","author":"B.L. Richards","year":"1995","unstructured":"Richards, B.L. and Mooney, R.J. 1995. Automated refinement of first order horn\u2013clause domain theories. Machine Learning, 19(2), 95\u2013131.","journal-title":"Machine Learning"},{"key":"320407_CR22","unstructured":"Sebag, M. and Rouveirol, C. 1996. Constraint inductive logic programming. In L. De Raedt, editor, Proceedings of the 5th International Workshop on Inductive Logic Programming (published as Advances in Inductive Logic Programming, IOS Press), pp. 277\u2013294."},{"key":"320407_CR23","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1192.001.0001","volume-title":"Algorithmic Program Debugging","author":"Shapiro","year":"1983","unstructured":"Shapiro 1983. Algorithmic Program Debugging. Cambridge, MA: MIT Press."},{"issue":"4","key":"320407_CR24","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1006\/knac.1994.1020","volume":"6","author":"E. Sommer","year":"1994","unstructured":"Sommer, E., Morik, K., Andre, J.M., and Uszynski, M. 1994. What online machine learning can do for knowledge acquisition\u2014A case\u2013study. Knowledge Acquisition, 6(4), 435\u2013460.","journal-title":"Knowledge Acquisition"},{"issue":"3","key":"320407_CR25","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1016\/S0743-1066(99)00018-7","volume":"40","author":"A. Srinivasan","year":"1999","unstructured":"Srinivasan, A. and Camacho, R. 1999. Numerical reasoning with an ILP system capable of lazy evaluation and customized search. Journal of Logic Programming, 40(3), 185\u2013213.","journal-title":"Journal of Logic Programming"},{"key":"320407_CR26","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1002\/stvr.4370050404","volume":"5","author":"A. Vermesan","year":"1995","unstructured":"Vermesan, A. and Bench\u2013Capon, T. 1995. Techniques for the verification and validation of knowledge\u2013based systems: A survey based on the symbol\/knowledge level distinction. Software Testing, Verification and Reliability, 5, 233\u2013271.","journal-title":"Software Testing, Verification and Reliability"},{"key":"320407_CR27","unstructured":"West, M.M., Bryant, C.H., and McCluskey, T.L. 1997. Transforming general program proofs: A meta interpreter which expands negative literals. In Proceedings: LOPSTR '97, Leuven, Belgium."},{"key":"320407_CR28","unstructured":"West, M.M. and McCluskey, T.L. 1998. Ordinal operators in focused theory revision. In Proceedings: JICSLP '98 Post Conference Workshop on Computational Logic and Machine Learning. Manchester, UK, pp. 56\u201362."},{"key":"320407_CR29","unstructured":"Wogulis, J. 1993a. Handling negation in first\u2013order theory revision. In F. Bergadano, L. De Raedt, S. Matwin, and S. Muggleton, editor, Proceedings of the IJCAI '93 Workshop on Inductive Logic Programming, pp. 36\u201346."},{"key":"320407_CR30","volume-title":"An approach to repairing and evaluating first\u2013order theories containing multiple concepts and negation","author":"J.L. Wogulis","year":"1993","unstructured":"Wogulis, J.L. 1993b. An approach to repairing and evaluating first\u2013order theories containing multiple concepts and negation. Ph.D. thesis, Department of Information and Computer Science, University of California, Irvine, CA 92717, US."},{"key":"320407_CR31","unstructured":"Wrobel, S. 1996. First order theory revision. In L. De Raedt, editor, Proceedings of the 5th International Workshop on Inductive Logic Programming (published as Advances in Inductive Logic Programming, IOS Press), pp. 14\u201333."}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008793523863.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008793523863\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008793523863.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:03:38Z","timestamp":1748070218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008793523863"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,4]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2001,4]]}},"alternative-id":["320407"],"URL":"https:\/\/doi.org\/10.1023\/a:1008793523863","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"type":"print","value":"0928-8910"},{"type":"electronic","value":"1573-7535"}],"subject":[],"published":{"date-parts":[[2001,4]]}}}