{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T14:00:08Z","timestamp":1775311208497,"version":"3.50.1"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Austrian Research Promotion Agency","award":["843461"],"award-info":[{"award-number":["843461"]}]},{"DOI":"10.13039\/501100002428","name":"Austrian Science Fund","doi-asserted-by":"publisher","award":["I 2885-N33"],"award-info":[{"award-number":["I 2885-N33"]}],"id":[{"id":"10.13039\/501100002428","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2020,1,1]]},"DOI":"10.1109\/tse.2018.2859926","type":"journal-article","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T19:07:57Z","timestamp":1532545677000},"page":"100-112","source":"Crossref","is-referenced-by-count":28,"title":["On the Understandability of Temporal Properties Formalized in Linear Temporal Logic, Property Specification Patterns and Event Processing Language"],"prefix":"10.1109","volume":"46","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0043-5541","authenticated-orcid":false,"given":"Christoph","family":"Czepa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6233-2591","authenticated-orcid":false,"given":"Uwe","family":"Zdun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2013.6613831"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.25"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.10"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.97"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1827418.1827427"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24270-0_23"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/898\/4\/042020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16298-5_8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302410"},{"key":"ref36","first-page":"1","article-title":"An ontology-based approach for defining compliance rules by knowledge workers in adaptive case management","author":"tran","year":"2016","journal-title":"Proc 5th Int Workshop Adaptive Case Manage Non-workflow Approaches BPM 20th IEEE Int Enterprise Comput Workshops"},{"key":"ref35","first-page":"43","article-title":"Embracing process compliance and flexibility through behavioral consistency checking in ACM: A repair service management case","author":"tran","year":"2015","journal-title":"Proc 4th Int Workshop Adaptive Case Manage Non-workflow Approaches BPM"},{"key":"ref34","first-page":"91","article-title":"Enabling flexibility of business processes by compliance rules: A case study from the insurance industry","author":"tran","year":"2015","journal-title":"Proc 13th Int Conf Bus Process Manage"},{"key":"ref60","first-page":"95","article-title":"Comparing three notations for defining scenario-based model tests: A controlled experiment","author":"hoisl","year":"2014","journal-title":"Proc 9th Int Conf Quality Inf Commun Technol"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2960310.2960331"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1080\/00207390412331271267"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2005.1541834"},{"key":"ref28","first-page":"117","author":"holmes","year":"0","journal-title":"Model-aware Monitoring of SOAs for Compliance"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-50230-4_18"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2699488"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1037\/h0033456"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.114.3.494"},{"key":"ref29","article-title":"MEdit4CEP-CPN: An approach for complex event processing modeling by prioritized colored petri nets","author":"boubeta-puig","year":"2017","journal-title":"Inf Syst"},{"key":"ref67","article-title":"Ordinal dominance statistics (ORDDOM): An r project for statistical computing package to compute ordinal, nonparametric alternatives to mean comparison (version 3.1)","author":"rogmann","year":"2013"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1995.tb02031.x"},{"key":"ref69","first-page":"1","article-title":"Plausibility checking of formal business process specifications in linear temporal logic","author":"czepa","year":"2016","journal-title":"Proc Int Conf Advanced Inf Syst Eng"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.040"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227118"},{"key":"ref20","first-page":"1027","article-title":"Reasoning on LTL on finite traces: Insensitivity to infiniteness","author":"de giacomo","year":"2014","journal-title":"Proc 28th AAAI Conf Artif Intell"},{"key":"ref22","first-page":"1","author":"van der aalst","year":"0","journal-title":"DecSerFlow Towards a Truly Declarative Service Flow Language"},{"key":"ref21","first-page":"52","author":"clarke","year":"1982","journal-title":"Design and synthesis of synchronization skeletons using branching time temporal logic"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-014-0395-3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2007.14"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142520"},{"key":"ref25","first-page":"156","author":"yu","year":"0","journal-title":"Pattern Based Property Specification and Verification for Service Composition"},{"key":"ref50","author":"baier","year":"2008","journal-title":"Principles of Model Checking (Representation and Mind Series)"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exn075"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9208-x"},{"key":"ref58","article-title":"On the understandability of temporal properties formalized in linear temporal logic, property specification patterns and event processing language [Data set]","author":"czepa","year":"2017"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-013-0366-0"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019827"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-013-0323-y"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29860-8_11"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10172-9_1"},{"key":"ref52","first-page":"146","article-title":"Enacting declarative languages using LTL: Avoiding errors and improving performance","author":"pe\u0161i?","year":"2010","journal-title":"Proc International SPIN Workshop on Model Checking of Software"},{"key":"ref10","article-title":"On the formal semantics of the extended compliance rule graph","author":"knuplesch","year":"2013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.02.007"},{"key":"ref40","article-title":"The goal question metric approach","author":"basili","year":"1994","journal-title":"Encyclopedia of Software Engineering"},{"key":"ref12","first-page":"240","author":"de silva","year":"2013","journal-title":"Pandarch A pluggable automated non-intrusive dynamic architecture conformance checker"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302672"},{"key":"ref15","article-title":"EPL Reference","year":"2017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45657-0_29"},{"key":"ref17","first-page":"354","author":"blom","year":"2010","journal-title":"LTSmin Distributed and Symbolic Reachability"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"ref19","first-page":"854","article-title":"Linear temporal logic and linear dynamic logic on finite traces","author":"de giacomo and","year":"2013","journal-title":"Proc 23rd Int Joint Conf Artif Intell"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0145-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227125"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019617"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICET.2013.6743500"},{"key":"ref8","first-page":"351","author":"bucchiarone","year":"2004","journal-title":"Model-Checking Plus Testing From Software Architecture Analysis to Code Testing"},{"key":"ref7","first-page":"514","author":"morimoto","year":"2008","journal-title":"A Survey of Formal Verification for Business Process Modeling"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9437-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-012-0121-3"},{"key":"ref46","first-page":"201","author":"jedlitschka","year":"0","journal-title":"Reporting Experiments in Software Engineering"},{"key":"ref45","first-page":"666","article-title":"Are students representatives of professionals in software engineering experiments?","author":"salman","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref48","author":"juristo","year":"2010","journal-title":"Basics of Software Engineering Experimentation"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4625-2"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026586415054"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027796"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414055"},{"key":"ref43","first-page":"95","article-title":"Using students as experiment subjects an analysis on graduate and freshmen student data","author":"runeson","year":"2003","journal-title":"Proc 7th Int Conf Empirical Assessment Eval Softw Eng"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/8952816\/08419310.pdf?arnumber=8419310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:34:37Z","timestamp":1651070077000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8419310\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":71,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tse.2018.2859926","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}