{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T10:15:58Z","timestamp":1772532958078,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/icosc.2019.8665630","type":"proceedings-article","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T22:31:50Z","timestamp":1552602710000},"page":"361-366","source":"Crossref","is-referenced-by-count":9,"title":["Using OWL Ontologies as a Domain-Specific Language for Capturing Requirements for Formal Analysis and Test Case Generation"],"prefix":"10.1109","author":[{"given":"Andrew W.","family":"Crapo","sequence":"first","affiliation":[]},{"given":"Abha","family":"Moitra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Requirements Group. AFRL's Summer of Innovation 2017","author":"aiello","year":"2018","journal-title":"S5 Symposium"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-COMPANION.2009.5070960"},{"key":"ref33","author":"li","year":"2016","journal-title":"Integrated automated test case generation for safety-critical software"},{"key":"ref32","article-title":"DO-178C Software Considerations in Airborne Systems and Equipment Certification","year":"2011","journal-title":"RTCA"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.152.3"},{"key":"ref30","first-page":"46","article-title":"Automated specification analysis using an interactive theorem prover","author":"chamarthi","year":"2011","journal-title":"FMCAD"},{"key":"ref37","first-page":"1","article-title":"Formal verification of critical aerospace software","author":"wiels","year":"2012","journal-title":"Aerospace Lab Journal"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-8157-6_44"},{"key":"ref35","author":"de conto","year":"2016","journal-title":"System and method for equivalence class analysis-based automated requirements-based test case generation"},{"key":"ref34","author":"li","year":"2017","journal-title":"System and method for coverage-based automated test case augmentation for design models"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2018.00046"},{"key":"ref40","year":"2018","journal-title":"PVS Property Verification System"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1109\/RE.2017.54","article-title":"Requirements Capture and Analysis in ASSERT&#x2122;","author":"crapo","year":"2017","journal-title":"2017 IEEE 25th International Requirements Engineering Conference (RE"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2017.8102059"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1109\/RE.2018.00036","article-title":"Towards Development of Complete and Conflict-Free Requirements","author":"moitra","year":"2018","journal-title":"Requirements Engineering Conference (RE) 2018 IEEE 26th International"},{"key":"ref14","year":"2018","journal-title":"OWL Web Ontology Language"},{"key":"ref15","year":"2018","journal-title":"Xtext Language Engineering for Everyone"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2016.16"},{"key":"ref17","article-title":"Software Engineering Institute, Reliability validation and improvement framework","year":"2012","journal-title":"Special Report CMU\/SEI-2012-SR-013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2005.1502528"},{"key":"ref19","article-title":"Research Triangle Institute, The economic impacts of inadequate infrastructure for software testing","year":"2002","journal-title":"NIST Planning Report 02&#x2013;1"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14052-5_25"},{"key":"ref4","article-title":"The Semantically Enabled Smart Grid","author":"crapo","year":"2009","journal-title":"Grid Interop"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_36"},{"key":"ref3","article-title":"Overcoming Challenges Using the CIM as a Semantic Model for Energy Applications","author":"crapo","year":"2010","journal-title":"Grid Interop"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1115\/DETC2015-47556"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.70.1"},{"key":"ref5","article-title":"A Semantic Model for Cyber Security","author":"barnett","year":"2011","journal-title":"Grid Interop"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5679592"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2014.36"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1142\/S1793351X13500025"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2009.5379854"},{"key":"ref1","year":"0","journal-title":"SADL Web Site"},{"key":"ref20","author":"galin","year":"2008","journal-title":"Software Quality Assurance From Theory to Implementation"},{"key":"ref22","author":"crapo","year":"2018","journal-title":"Typed Lists in OWL and SADL"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2514\/6.2009-1882"},{"key":"ref24","year":"2018","journal-title":"IBM Rational DOORS"},{"key":"ref41","article-title":"SpeAR: Specification and Analysis of Requirements","author":"wagner","year":"2014","journal-title":"S5 Symposium"},{"key":"ref23","article-title":"Semantics: Revolutionary Breakthrough or Just Another Way of Doing Things? in Semantic Web: Implications for Technologies and Business Practices","author":"crapo","year":"2016","journal-title":"Michael Workman"},{"key":"ref26","article-title":"The ACL2 Sedan theorem proving system","author":"chamarthi","year":"2011","journal-title":"TACAS"},{"key":"ref25","author":"manolios","year":"2017","journal-title":"Scalable methods for analyzing formalized requirements and localizing errors"}],"event":{"name":"2019 IEEE 13th International Conference on Semantic Computing (ICSC)","location":"Newport Beach, CA, USA","start":{"date-parts":[[2019,1,30]]},"end":{"date-parts":[[2019,2,1]]}},"container-title":["2019 IEEE 13th International Conference on Semantic Computing (ICSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8652245\/8665495\/08665630.pdf?arnumber=8665630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:21:30Z","timestamp":1658157690000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8665630\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/icosc.2019.8665630","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}