{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T04:22:14Z","timestamp":1771647734021,"version":"3.50.1"},"reference-count":45,"publisher":"World Scientific Pub Co Pte Ltd","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Model. Simul. Sci. Comput."],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:p> Traditional requirement verification methods often fail to fully consider the modeling of time-dependent behaviors during system execution, which may lead to inconsistent system requirements, thereby compromise software reliability and correctness. To address this limitation, this paper proposes the Scenario-Specific Verification Method for System Requirements Consistency via Time Modeling. The Scenario-Specific Verification Method converts use case descriptions and problem graphs into Clock Constraint Specification Language (CCSL) constraints, transformed into clock graphs for verifying requirement consistency. The resulting constraints are solved with the Z3 solver to validate correctness, thereby enhancing system reliability. The novel time modeling approach provides techniques for verifying temporal dependencies in requirements. A case study demonstrates the efficiency and accuracy of the Scenario-Specific Verification Method in detecting inconsistencies. The main contributions include that a technique is demonstrated to formalize use case descriptions as CCSL constraints, improving on natural language and a method is presented utilizing CCSL time modeling and clock graphs to analyze requirements for consistency. Overall, an innovative solution for requirement verification using time modeling is offered by this paper, contributing to the enhancement of system development process reliability and correctness. <\/jats:p>","DOI":"10.1142\/s1793962324410162","type":"journal-article","created":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T02:47:32Z","timestamp":1701658052000},"source":"Crossref","is-referenced-by-count":2,"title":["Scenario-specific verification of system requirements consistency via time modeling"],"prefix":"10.1142","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8771-5597","authenticated-orcid":false,"given":"Jingkai","family":"Shi","sequence":"first","affiliation":[{"name":"Computer School, Beijing Information Science and Technology University, Beijing 100101, P. R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7641-6369","authenticated-orcid":false,"given":"Liwei","family":"Zheng","sequence":"additional","affiliation":[{"name":"Computer School, Beijing Information Science and Technology University, Beijing 100101, P. R. China"}]}],"member":"219","published-online":{"date-parts":[[2024,1,19]]},"reference":[{"key":"S1793962324410162BIB001","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57288-8_31"},{"key":"S1793962324410162BIB002","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2017.54"},{"key":"S1793962324410162BIB003","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00043"},{"key":"S1793962324410162BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2019.00033"},{"key":"S1793962324410162BIB005","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70848-5"},{"key":"S1793962324410162BIB006","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2641239"},{"key":"S1793962324410162BIB007","doi-asserted-by":"publisher","DOI":"10.59785\/tjhest.v1i2.24"},{"key":"S1793962324410162BIB008","doi-asserted-by":"publisher","DOI":"10.54153\/sjpas.2023.v5i2.500"},{"key":"S1793962324410162BIB009","doi-asserted-by":"publisher","DOI":"10.54153\/sjpas.2023.v5i2.539"},{"key":"S1793962324410162BIB010","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3294954"},{"key":"S1793962324410162BIB011","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116344"},{"key":"S1793962324410162BIB012","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6550"},{"key":"S1793962324410162BIB013","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317904"},{"key":"S1793962324410162BIB014","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116344"},{"key":"S1793962324410162BIB015","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2020.102546"},{"key":"S1793962324410162BIB016","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2019.00-23"},{"key":"S1793962324410162BIB017","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3285412"},{"key":"S1793962324410162BIB018","doi-asserted-by":"publisher","DOI":"10.18293\/SEKE2023-221"},{"key":"S1793962324410162BIB019","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-77935-5_26"},{"key":"S1793962324410162BIB020","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050046"},{"key":"S1793962324410162BIB021","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019787"},{"key":"S1793962324410162BIB022","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"S1793962324410162BIB023","volume-title":"Workshop on Formal and Model-Driven Techniques for Developing Trustworthy Systems at 18th Int. Conf. Formal Engineering Methods","author":"Bienmller T.","year":"2016"},{"key":"S1793962324410162BIB024","first-page":"1","volume":"76","author":"Becker J. S.","year":"2018","journal-title":"Electron. Commun. EASST"},{"key":"S1793962324410162BIB025","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2015.7185035"},{"key":"S1793962324410162BIB026","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0031816"},{"key":"S1793962324410162BIB027","first-page":"166","volume-title":"Requirements Engineering: Foundation for Software Quality \u2014 17th Int. Working Conf., REFSQ 2011","author":"Post A.","year":"2011"},{"key":"S1793962324410162BIB028","volume-title":"Monographs in Theoretical Computer Science","author":"Chaochen Z.","year":"2004"},{"key":"S1793962324410162BIB029","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27705-4_18"},{"key":"S1793962324410162BIB031","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2019.00040"},{"key":"S1793962324410162BIB032","doi-asserted-by":"publisher","DOI":"10.1109\/TASE49443.2020.00037"},{"key":"S1793962324410162BIB033","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_14"},{"key":"S1793962324410162BIB034","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2017.08.015"},{"key":"S1793962324410162BIB035","doi-asserted-by":"publisher","DOI":"10.1109\/REW53955.2021.00076"},{"key":"S1793962324410162BIB036","doi-asserted-by":"publisher","DOI":"10.1109\/ISSSR58837.2023.00032"},{"issue":"6","key":"S1793962324410162BIB037","first-page":"1595","volume":"29","author":"Zhang M.","year":"2018","journal-title":"J. Software"},{"key":"S1793962324410162BIB038","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2022.102777"},{"key":"S1793962324410162BIB039","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2007.29"},{"key":"S1793962324410162BIB040","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744775"},{"key":"S1793962324410162BIB041","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2014.24"},{"key":"S1793962324410162BIB043","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-008-0055-2"},{"key":"S1793962324410162BIB044","first-page":"157","volume-title":"2013 11th ACM\/IEEE Int. Conf. Formal Methods and Models for Codesign (MEMOCODE 2013)","author":"Mallet F.","year":"2013"},{"key":"S1793962324410162BIB045","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-009-0109-0"},{"key":"S1793962324410162BIB046","volume-title":"Int. Symp. Theoretical Aspects of Software Engineering, TASE 2020","author":"Aoki T.","year":"2020"},{"key":"S1793962324410162BIB047","doi-asserted-by":"publisher","DOI":"10.1145\/1943371.1943378"}],"container-title":["International Journal of Modeling, Simulation, and Scientific Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S1793962324410162","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:37:17Z","timestamp":1715153837000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S1793962324410162"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,19]]},"references-count":45,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["10.1142\/S1793962324410162"],"URL":"https:\/\/doi.org\/10.1142\/s1793962324410162","relation":{},"ISSN":["1793-9623","1793-9615"],"issn-type":[{"value":"1793-9623","type":"print"},{"value":"1793-9615","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,19]]},"article-number":"2441016"}}