{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:40:20Z","timestamp":1730198420189,"version":"3.28.0"},"reference-count":71,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,11]]},"DOI":"10.1109\/ase56229.2023.00016","type":"proceedings-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T13:49:44Z","timestamp":1699451384000},"page":"1747-1752","source":"Crossref","is-referenced-by-count":0,"title":["Live Programming for Finite Model Finders"],"prefix":"10.1109","author":[{"given":"Allison","family":"Sullivan","sequence":"first","affiliation":[{"name":"University of Texas at Arlington,Arlington,TX,USA"}]}],"member":"263","reference":[{"key":"ref13","first-page":"281","volume":"22","author":"cunha","year":"2020","journal-title":"Validating the hybrid ertms\/etcs level 3 concept with electrum"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3276604.3276611"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96145-3_3"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/LIVE.2013.6617346"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2015.7357208"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806635"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66197-1_11"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71209-1_49"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00064"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91631-2_22"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3296979.3192373"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.31"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17108-6_18"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32409-4_21"},{"key":"ref17","first-page":"1934","author":"dini","year":"0","journal-title":"Proceedings of the 33rd Annual ACM Symposium on Applied Computing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146251"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3527323"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287653"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14107-2_26"},{"key":"ref50","first-page":"552","article-title":"Falling back on executable specifications","author":"samimi","year":"0","journal-title":"Proceedings of European Conference of Object-Oriented Programming"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950336"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3290327"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-27481-7_21"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-95582-7_34"},{"key":"ref42","first-page":"1","article-title":"The Margrave tool for firewall analysis","author":"nelson","year":"0","journal-title":"Proceedings of the 24th International Conference on Large Installation System Administration (LISA)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606569"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454059"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2699417"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-017-0608-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VL.1998.706155"},{"key":"ref7","article-title":"Bounded exhaustive search of alloy specification repairs","author":"brida","year":"0","journal-title":"ICSE"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17524-9_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950337"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-017-0445-z"},{"key":"ref6","first-page":"131","volume":"6172","author":"blanchette","year":"2010","journal-title":"Nitpick A counterexample generator for higher-order logic based on a relational model finder"},{"journal-title":"Pharo by Example","year":"2010","author":"black","key":"ref5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106272"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24485-8_44"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275534"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2172\/797949"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2001.989787"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-022-09642-2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45236-2_46"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/FormaliSE58978.2023.00013"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/215585.215636"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/571968.571970"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.27"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2509578.2509585"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1297105.1297073"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534369"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45234-6_2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89275-5_2"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2185376.2185383"},{"journal-title":"ICEBAR Feedback-Driven Iterative Repair of Alloy Specifications","year":"2023","author":"brida","key":"ref23"},{"key":"ref67","first-page":"577","article-title":"Contract-based data structure repair using Alloy","author":"zaeem","year":"0","journal-title":"ECOOP"},{"key":"ref26","article-title":"Reach: Refining alloy scenarios by size","author":"jovanovic","year":"0","journal-title":"ISSRE"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/505145.505149"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-014-0302-2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094851"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3093333.3009838"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17462-0_10"},{"key":"ref22","first-page":"469","article-title":"A general approach to network configuration analysis","author":"fogel","year":"2015","journal-title":"Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/258549.258721"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3162985"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009838"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180200"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30942-8_1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376494"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2019.2910010"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91271-4_8"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238162"}],"event":{"name":"2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","start":{"date-parts":[[2023,9,11]]},"location":"Luxembourg, Luxembourg","end":{"date-parts":[[2023,9,15]]}},"container-title":["2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10298258\/10298286\/10298544.pdf?arnumber=10298544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T14:10:02Z","timestamp":1702303802000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10298544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,11]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/ase56229.2023.00016","relation":{},"subject":[],"published":{"date-parts":[[2023,9,11]]}}}