{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:24Z","timestamp":1750306104488,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T00:00:00Z","timestamp":1503273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,21]]},"DOI":"10.1145\/3106237.3106272","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"106-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["The power of \"why\" and \"why not\": enriching scenario exploration with provenance"],"prefix":"10.1145","author":[{"given":"Tim","family":"Nelson","sequence":"first","affiliation":[{"name":"Brown University, USA"}]},{"given":"Natasha","family":"Danas","sequence":"additional","affiliation":[{"name":"Brown University, USA"}]},{"given":"Daniel J.","family":"Dougherty","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, USA"}]},{"given":"Shriram","family":"Krishnamurthi","sequence":"additional","affiliation":[{"name":"Brown University, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/CSF.2010.27"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/196244.196575"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1007\/s10703-011-0132-2"},{"unstructured":"Ilan Beer Shoham Ben-David Cindy Eisner and Yoav Rodeh. 1997.  Ilan Beer Shoham Ben-David Cindy Eisner and Yoav Rodeh. 1997.","key":"e_1_3_2_1_4_1"},{"volume-title":"Detection of Vacuity in ACTL Formulas. In International Conference on Computer Aided Verification. 279\u2013290","author":"Efficient","unstructured":"Efficient Detection of Vacuity in ACTL Formulas. In International Conference on Computer Aided Verification. 279\u2013290 . Efficient Detection of Vacuity in ACTL Formulas. In International Conference on Computer Aided Verification. 279\u2013290.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-642-14052-5_11"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2834050.2834111"},{"key":"e_1_3_2_1_8_1","volume-title":"Causality and Responsibility for Formal Verification and Beyond. In Workshop on Causal Reasoning for Embedded and safety-critical Systems Technologies.","author":"Chockler Hana","year":"2016","unstructured":"Hana Chockler . 2016 . Causality and Responsibility for Formal Verification and Beyond. In Workshop on Causal Reasoning for Embedded and safety-critical Systems Technologies. Hana Chockler. 2016. Causality and Responsibility for Formal Verification and Beyond. In Workshop on Causal Reasoning for Embedded and safety-critical Systems Technologies."},{"unstructured":"Alcino Cunha Nuno Macedo and Tiago Guimaraes. 2014.  Alcino Cunha Nuno Macedo and Tiago Guimaraes. 2014.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1007\/978-3-642-54804-8_2"},{"key":"e_1_3_2_1_11_1","volume-title":"Dougherty","author":"Danas Natasha","year":"2017","unstructured":"Natasha Danas , Tim Nelson , Lane Harrison , Shriram Krishnamurthi , and Daniel J . Dougherty . 2017 . User Studies of Principled Model Finder Output. In Software Engineering and Formal Methods . Natasha Danas, Tim Nelson, Lane Harrison, Shriram Krishnamurthi, and Daniel J. Dougherty. 2017. User Studies of Principled Model Finder Output. In Software Engineering and Formal Methods."},{"key":"e_1_3_2_1_12_1","volume-title":"Kakas","author":"Denecker Marc","year":"2002","unstructured":"Marc Denecker and Antonis C . Kakas . 2002 . Abduction in Logic Programming. In Computational Logic: Logic Programming and Beyond . Marc Denecker and Antonis C. Kakas. 2002. Abduction in Logic Programming. In Computational Logic: Logic Programming and Beyond."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/1146238.1146251"},{"volume-title":"Searching for Shapes in Cryptographic Protocols. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems.","author":"Doghmi Shaddin F.","unstructured":"Shaddin F. Doghmi , Joshua D. Guttman , and F. Javier Thayer . 2007 . Searching for Shapes in Cryptographic Protocols. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer. 2007. Searching for Shapes in Cryptographic Protocols. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","volume-title":"Whalen","author":"Ghassabani Elaheh","year":"2016","unstructured":"Elaheh Ghassabani , Andrew Gacek , and Michael W . Whalen . 2016 . Elaheh Ghassabani, Andrew Gacek, and Michael W. Whalen. 2016."},{"unstructured":"Efficient Generation of Inductive Validity Cores for Safety Properties. In Foundations of Software Engineering.  Efficient Generation of Inductive Validity Cores for Safety Properties. In Foundations of Software Engineering.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/2351676.2351683"},{"key":"e_1_3_2_1_18_1","volume-title":"Enhancing the Alloy Analyzer with Patterns of Analysis. In Workshop on Logic-based Methods in Programming Environments.","author":"Heaven Will","year":"2005","unstructured":"Will Heaven and Alessandra Russo . 2005 . Enhancing the Alloy Analyzer with Patterns of Analysis. In Workshop on Logic-based Methods in Programming Environments. Will Heaven and Alessandra Russo. 2005. Enhancing the Alloy Analyzer with Patterns of Analysis. In Workshop on Logic-based Methods in Programming Environments."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/309847.309936"},{"unstructured":"Daniel Jackson. 2012.  Daniel Jackson. 2012.","key":"e_1_3_2_1_20_1"},{"volume-title":"Logic, Language, and Analysis","author":"Abstractions Software","unstructured":"Software Abstractions : Logic, Language, and Analysis ( second ed.). MIT Press . Software Abstractions: Logic, Language, and Analysis (second ed.). MIT Press.","key":"e_1_3_2_1_21_1"},{"unstructured":"James A. Jones. 2008.  James A. Jones. 2008.","key":"e_1_3_2_1_22_1"},{"unstructured":"Semi-Automatic Fault Localization. Ph.D. Dissertation. Georgia Institute of Technology.  Semi-Automatic Fault Localization. Ph.D. Dissertation. Georgia Institute of Technology.","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/985692.985712"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/1518701.1518942"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1007\/11817949_3"},{"key":"e_1_3_2_1_27_1","volume-title":"Sakallah","author":"Liffiton Mark H.","year":"2008","unstructured":"Mark H. Liffiton and Karem A . Sakallah . 2008 . Mark H. Liffiton and Karem A. Sakallah. 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1007\/s10817-007-9084-z"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1007\/978-3-662-43652-3_31"},{"key":"e_1_3_2_1_30_1","volume-title":"Jan Oliver Ringert, and Bernhard Rumpe","author":"Maoz Shahar","year":"2011","unstructured":"Shahar Maoz , Jan Oliver Ringert, and Bernhard Rumpe . 2011 . CD2Alloy: Class Diagrams Analysis Using Alloy Revisited. In Model Driven Engineering Languages and Systems . Shahar Maoz, Jan Oliver Ringert, and Bernhard Rumpe. 2011. CD2Alloy: Class Diagrams Analysis Using Alloy Revisited. In Model Driven Engineering Languages and Systems."},{"key":"e_1_3_2_1_31_1","volume-title":"CDDiff: Semantic Differencing for Class Diagrams. In European Conference on Object Oriented Programming.","author":"Maoz Shahar","year":"2011","unstructured":"Shahar Maoz , Jan Oliver Ringert , and Bernhard Rumpe . 2011 . CDDiff: Semantic Differencing for Class Diagrams. In European Conference on Object Oriented Programming. Shahar Maoz, Jan Oliver Ringert, and Bernhard Rumpe. 2011. CDDiff: Semantic Differencing for Class Diagrams. In European Conference on Object Oriented Programming."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.2172\/822574"},{"unstructured":"Aleksandar Milicevic Derek Rayside Kuat Yessenov and Daniel Jackson. 2011.  Aleksandar Milicevic Derek Rayside Kuat Yessenov and Daniel Jackson. 2011.","key":"e_1_3_2_1_33_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/1985793.1985863"},{"unstructured":"Timothy Nelson Christopher Barratt Daniel J. Dougherty Kathi Fisler and Shriram Krishnamurthi. 2010.  Timothy Nelson Christopher Barratt Daniel J. Dougherty Kathi Fisler and Shriram Krishnamurthi. 2010.","key":"e_1_3_2_1_35_1"},{"volume-title":"Margrave Tool for Firewall Analysis. In USENIX Large Installation System Administration Conference.","author":"The","unstructured":"The Margrave Tool for Firewall Analysis. In USENIX Large Installation System Administration Conference. The Margrave Tool for Firewall Analysis. In USENIX Large Installation System Administration Conference.","key":"e_1_3_2_1_36_1"},{"unstructured":"Tim Nelson Andrew D. Ferguson Michael J. G. Scheer and Shriram Krishnamurthi. 2014.  Tim Nelson Andrew D. Ferguson Michael J. G. Scheer and Shriram Krishnamurthi. 2014.","key":"e_1_3_2_1_37_1"},{"unstructured":"Tierless Programming and Reasoning for Software-Defined Networks. In Networked Systems Design and Implementation.  Tierless Programming and Reasoning for Software-Defined Networks. In Networked Systems Design and Implementation.","key":"e_1_3_2_1_38_1"},{"unstructured":"Tim Nelson Salman Saghafi Daniel J. Dougherty Kathi Fisler and Shriram Krishnamurthi. 2013.  Tim Nelson Salman Saghafi Daniel J. Dougherty Kathi Fisler and Shriram Krishnamurthi. 2013.","key":"e_1_3_2_1_39_1"},{"volume-title":"International Conference on Software Engineering.","author":"Aluminum","unstructured":"Aluminum : Principled Scenario Exploration Through Minimality . In International Conference on Software Engineering. Aluminum: Principled Scenario Exploration Through Minimality. In International Conference on Software Engineering.","key":"e_1_3_2_1_40_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.5555\/3106091.3106097"},{"unstructured":"Natali Ruchansky and Davide Proserpio. 2013.  Natali Ruchansky and Davide Proserpio. 2013.","key":"e_1_3_2_1_42_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1145\/2534169.2491711"},{"unstructured":"Salman Saghafi Ryan Danas and Daniel J Dougherty. 2015.  Salman Saghafi Ryan Danas and Daniel J Dougherty. 2015.","key":"e_1_3_2_1_44_1"},{"volume-title":"International Conference on Automated Deduction. Springer, 434\u2013449","author":"Exploring","unstructured":"Exploring Theories with a Model-Finding Assistant . In International Conference on Automated Deduction. Springer, 434\u2013449 . Exploring Theories with a Model-Finding Assistant. In International Conference on Automated Deduction. Springer, 434\u2013449.","key":"e_1_3_2_1_45_1"},{"unstructured":"Daniel Schwartz-Narbonne Chanseok Oh Martin Sch\u00e4f and Thomas Wies. 2015.  Daniel Schwartz-Narbonne Chanseok Oh Martin Sch\u00e4f and Thomas Wies. 2015.","key":"e_1_3_2_1_46_1"},{"volume-title":"International Conference on Software Engineering. 737\u2013740","author":"VERMEER","unstructured":"VERMEER : A Tool for Tracing and Explaining Faulty C Programs . In International Conference on Software Engineering. 737\u2013740 . VERMEER: A Tool for Tracing and Explaining Faulty C Programs. In International Conference on Software Engineering. 737\u2013740.","key":"e_1_3_2_1_47_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1109\/TNET.2002.808407"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_49_1","DOI":"10.1007\/978-3-540-68237-0_23"},{"key":"e_1_3_2_1_50_1","volume-title":"Kodkod: A Relational Model Finder. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 632\u2013647","author":"Torlak Emina","year":"2007","unstructured":"Emina Torlak and Daniel Jackson . 2007 . Kodkod: A Relational Model Finder. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 632\u2013647 . Emina Torlak and Daniel Jackson. 2007. Kodkod: A Relational Model Finder. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 632\u2013647."},{"unstructured":"Engin Uzuncaova and Sarfraz Khurshid. 2008.  Engin Uzuncaova and Sarfraz Khurshid. 2008.","key":"e_1_3_2_1_51_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1007\/978-3-540-68237-0_22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1145\/2619239.2626335"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"acronym":"ESEC\/FSE'17","name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Paderborn Germany"},"container-title":["Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106272","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:37Z","timestamp":1750217437000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":53,"alternative-id":["10.1145\/3106237.3106272","10.1145\/3106237"],"URL":"https:\/\/doi.org\/10.1145\/3106237.3106272","relation":{},"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"2017-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}