{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:03:03Z","timestamp":1769738583713,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007515","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1350487"],"award-info":[{"award-number":["CCF-1350487"]}],"id":[{"id":"10.13039\/100007515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3377811.3380332","type":"proceedings-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T18:25:38Z","timestamp":1601576738000},"page":"848-860","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["A novel approach to tracing safety requirements and state-based design models"],"prefix":"10.1145","author":[{"given":"Mounifah","family":"Alenazi","sequence":"first","affiliation":[{"name":"University of Cincinnati"}]},{"given":"Nan","family":"Niu","sequence":"additional","affiliation":[{"name":"University of Cincinnati"}]},{"given":"Juha","family":"Savolainen","sequence":"additional","affiliation":[{"name":"Danfoss Drives A\/S, Gr\u00e5sten, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2020,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09099-3_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1522"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.7945\/6rna-m982"},{"key":"e_1_3_2_1_4_1","volume-title":"SysML Modeling Mistakes and Their Impacts on Requirements. In International Model-Driven Requirements Engineering Workshop (MoDRE)","author":"Alenazi Mounifah","year":"2019","unstructured":"Mounifah Alenazi, Nan Niu, and Juha Savolainen. 2019. SysML Modeling Mistakes and Their Impacts on Requirements. In International Model-Driven Requirements Engineering Workshop (MoDRE). Jeju Island, South Korea, 14--23."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MoDRE.2018.00012"},{"key":"e_1_3_2_1_6_1","volume-title":"Assuring Virtual PLC in the Context of SysML Models. In International Conference on Software Reuse (ICSR)","author":"Alenazi Mounifah","year":"2018","unstructured":"Mounifah Alenazi, Deepak Reddy, and Nan Niu. 2018. Assuring Virtual PLC in the Context of SysML Models. In International Conference on Software Reuse (ICSR). Madrid, Spain, 121--136."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-012-0293-5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.6166"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501667"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9255-y"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559978"},{"key":"e_1_3_2_1_12_1","volume-title":"Creating Socio-Technical Patches for Information Foraging: A Requirements Traceability Case Study. In IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC)","author":"Cepulis Darius","year":"2018","unstructured":"Darius Cepulis and Nan Niu. 2018. Creating Socio-Technical Patches for Information Foraging: A Requirements Traceability Case Study. In IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC). Lisbon, Portugal, 17--21."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195836.3195838"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529365"},{"key":"e_1_3_2_1_15_1","volume-title":"Peled","author":"Clarke Edmund M.","year":"2001","unstructured":"Edmund M. Clarke, Orna Grumberg, and Doron A. Peled. 2001. Model Checking. MIT Press."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.108"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806825"},{"key":"e_1_3_2_1_18_1","volume-title":"Patrick M\u00e4der, and Andrea Zisman.","author":"Cleland-Huang Jane","year":"2014","unstructured":"Jane Cleland-Huang, Orlena Gotel, Jane Huffman Hayes, Patrick M\u00e4der, and Andrea Zisman. 2014. Software Traceability: Trends and Future Directions. In Future of Software Engineering (FOSE). Hyderabad, India, 55--69."},{"key":"e_1_3_2_1_19_1","volume-title":"Trace Queries for Safety Requirements in High Assurance Systems. In International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ)","author":"Cleland-Huang Jane","year":"2012","unstructured":"Jane Cleland-Huang, Mats Heimdahl, Jane Hayes, Robyn R. Lutz, and Patrick M\u00e4der. 2012. Trace Queries for Safety Requirements in High Assurance Systems. In International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ). Essen, Germany, 179--193."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2018.00034"},{"key":"e_1_3_2_1_21_1","volume-title":"Reducing Software Architecture Models Complexity: A Slicing and Abstraction Approach. In International Conference on Formal Techniques for Networked and Distributed Systems (FORTE)","author":"Colangelo Daniela","year":"2006","unstructured":"Daniela Colangelo, Daniele Compare, Paola Inverardi, and Patrizio Pelliccione. 2006. Reducing Software Architecture Models Complexity: A Slicing and Abstraction Approach. In International Conference on Formal Techniques for Networked and Distributed Systems (FORTE). Paris, France, 243--258."},{"key":"e_1_3_2_1_22_1","volume-title":"Automated Requirements Traceability: the Study of Human Analysts. In International Requirements Engineering Conference (RE)","author":"Cuddeback David","year":"2010","unstructured":"David Cuddeback, Alex Dekhtyar, and Jane Huffman Hayes. 2010. Automated Requirements Traceability: the Study of Human Analysts. In International Requirements Engineering Conference (RE). Sydney, Australia, 231--240."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_3_2_1_24_1","volume-title":"A Practical Guide to SysML","author":"Friedenthal Sanford","unstructured":"Sanford Friedenthal, Alan Moore, and Rick Steiner. 2012. Water Distiller Example Using Functional Analysis. In A Practical Guide to SysML (Second Edition), Sanford Friedenthal, Alan Moore, and Rick Steiner (Eds.). The MK\/OMG Press, 393--429."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICORR.2007.4428491"},{"key":"e_1_3_2_1_26_1","volume-title":"Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Girshick Ross B.","year":"2014","unstructured":"Ross B. Girshick, Jeff Donahue, Trevor Darrell, and Jitendra Malik. 2014. Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Columbus, OH, USA, 580--587."},{"key":"e_1_3_2_1_27_1","volume-title":"International Requirements Engineering Conference (RE)","author":"Goodrum Micayla","unstructured":"Micayla Goodrum, Jane Cleland-Huang, Robyn R. Lutz, Jinghui Cheng, and Ronald A. Metoyer. 2017. What Requirements Knowledge Do Developers Need to Manage Change in Safety-Critical Systems?. In International Requirements Engineering Conference (RE). Lisbon, Portugal, 90--99."},{"key":"e_1_3_2_1_28_1","volume-title":"International Conference on Information Systems Development (ISD)","author":"Granda Maria Fernanda","year":"2016","unstructured":"Maria Fernanda Granda, Nelly Condori-Fern\u00e1ndez, Tanja E. J. Vos, and Oscar Pastor. 2016. Using Model Checking to Generate Tests from Specifications. In International Conference on Information Systems Development (ISD). Katowice, Poland, 17--37."},{"key":"e_1_3_2_1_29_1","volume-title":"Semantically Enhanced Software Traceability Using Deep Learning Techniques. In International Conference on Software Engineering (ICSE)","author":"Guo Jin","year":"2017","unstructured":"Jin Guo, Jinghui Cheng, and Jane Cleland-Huang. 2017. Semantically Enhanced Software Traceability Using Deep Learning Techniques. In International Conference on Software Engineering (ICSE). Buenos Aires, Argentina, 3--14."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.3"},{"key":"e_1_3_2_1_31_1","volume-title":"Functional Safety of Electrical \/ Electronic \/ Programmable Electronic Safety-Related System (IEC 61508). https:\/\/www.iec.ch\/functionalsafety\/. Last accessed","author":"International Electrotechnical Commission","year":"2020","unstructured":"International Electrotechnical Commission. 2010. Functional Safety of Electrical \/ Electronic \/ Programmable Electronic Safety-Related System (IEC 61508). https:\/\/www.iec.ch\/functionalsafety\/. Last accessed: February 2020."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00062"},{"key":"e_1_3_2_1_34_1","first-page":"7","article-title":"A Fortran Language System for Mutation-Based Software Testing. Software","volume":"21","author":"King K. N.","year":"1991","unstructured":"K. N. King and Jeff Offutt. 1991. A Fortran Language System for Mutation-Based Software Testing. Software: Practice and Experience 21, 7 (July 1991), 685--718.","journal-title":"Practice and Experience"},{"key":"e_1_3_2_1_35_1","volume-title":"Slicing of State-Based Models. In International Conference on Software Maintenance (ICSM)","author":"Korel Bogdan","year":"2003","unstructured":"Bogdan Korel, Inderdeep Singh, Luay Ho Tahat, and Boris Vaysburg. 2003. Slicing of State-Based Models. In International Conference on Software Maintenance (ICSM). Amsterdam, The Netherlands, 34--43."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.317428"},{"key":"e_1_3_2_1_37_1","volume-title":"Deep Learning Based Feature Envy Detection. In International Conference on Automated Software Engineering (ASE)","author":"Liu Hui","year":"2018","unstructured":"Hui Liu, Zhifeng Xu, and Yanzhen Zou. 2018. Deep Learning Based Feature Envy Detection. In International Conference on Automated Software Engineering (ASE). Montpellier, France, 385--396."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-012-0237-0"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEFSE.2009.5069578"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.60"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2018.00-52"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2011.08.023"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.4236\/jsea.2016.97025"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950293"},{"key":"e_1_3_2_1_45_1","volume-title":"Matching and Merging of Statecharts Specifications. In International Conference on Software Engineering (ICSE)","author":"Nejati Shiva","year":"2007","unstructured":"Shiva Nejati, Mehrdad Sabetzadeh, Marsha Chechik, Steve Easterbrook, and Pamela Zave. 2007. Matching and Merging of Statecharts Specifications. In International Conference on Software Engineering (ICSE). Minneapolis, MN, USA, 54--64."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.01.005"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606603"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636720"},{"key":"e_1_3_2_1_49_1","volume-title":"Gray Links in the Use of Requirements Traceability. In International Symposium on Foundations of Software Engineering (FSE)","author":"Niu Nan","year":"2016","unstructured":"Nan Niu, Wentao Wang, and Arushi Gupta. 2016. Gray Links in the Use of Requirements Traceability. In International Symposium on Foundations of Software Engineering (FSE). Seattle, WA, USA, 384--395."},{"key":"e_1_3_2_1_50_1","first-page":"4","article-title":"Requirements Socio-Technical Graphs for Managing Practitioners","volume":"5","author":"Niu Nan","year":"2018","unstructured":"Nan Niu, Wentao Wang, Arushi Gupta, Mona Assarandarban, Li Da Xu, Juha Savolainen, and Jing-Ru C. Cheng. 2018. Requirements Socio-Technical Graphs for Managing Practitioners' Traceability Questions. IEEE Transactions on Computational Social Systems 5, 4 (December 2018), 1152--1162.","journal-title":"Traceability Questions. IEEE Transactions on Computational Social Systems"},{"key":"e_1_3_2_1_51_1","unstructured":"No Magic Inc. 2020. MagicDraw. https:\/\/www.nomagic.com\/products\/magicdraw. Last accessed: February 2020."},{"key":"e_1_3_2_1_52_1","volume-title":"Requirements Engineering: A Roadmap. In Future of Software Engineering (FOSE). Limerick, Ireland, 35--46.","author":"Nuseibeh Bashar","year":"2000","unstructured":"Bashar Nuseibeh and Steve Easterbrook. 2000. Requirements Engineering: A Roadmap. In Future of Software Engineering (FOSE). Limerick, Ireland, 35--46."},{"key":"e_1_3_2_1_53_1","unstructured":"Object Management Group. 2020. Systems Modeling Language (SysML). http:\/\/www.omgsysml.org. Last accessed: February 2020."},{"key":"e_1_3_2_1_55_1","volume-title":"Vision and Experience. In International Workshop on Software Certification (WoSoCER)","author":"Panesar-Walawege Rajwinder Kaur","unstructured":"Rajwinder Kaur Panesar-Walawege, Mehrdad Sabetzadeh, and Lionel C. Briand. 2011. Using Model-Driven Engineering for Managing Safety Evidence: Challenges, Vision and Experience. In International Workshop on Software Certification (WoSoCER). Hiroshima, Japan, 7--12."},{"key":"e_1_3_2_1_56_1","volume-title":"Eindhoven University of Technology","author":"Process Mining Group","year":"2016","unstructured":"Process Mining Group, Eindhoven University of Technology. 2016. ProM Tools. http:\/\/www.promtools.org. Last accessed: February 2020."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568290"},{"key":"e_1_3_2_1_58_1","volume-title":"Fault Tree Analysis: A Survey of the State-of-the-Art in Modeling, Analysis and Tools. Computer Science Review 15--16, 3 (February-May","author":"Ruijters Enno","year":"2015","unstructured":"Enno Ruijters and Mari\u00eblle Stoelinga. 2015. Fault Tree Analysis: A Survey of the State-of-the-Art in Modeling, Analysis and Tools. Computer Science Review 15--16, 3 (February-May 2015), 29--62."},{"key":"e_1_3_2_1_59_1","volume-title":"Using SysML for Modeling of Safety-Critical Software-Hardware Interfaces: Guidelines and Industry Experience. In International Symposium on High-Assurance Systems Engineering (HASE)","author":"Sabetzadeh Mehrdad","year":"2011","unstructured":"Mehrdad Sabetzadeh, Shiva Nejati, Lionel C. Briand, and Anne-Heidi Evensen Mills. 2011. Using SysML for Modeling of Safety-Critical Software-Hardware Interfaces: Guidelines and Industry Experience. In International Symposium on High-Assurance Systems Engineering (HASE). Boca Raton, FL, USA, 193--201."},{"key":"e_1_3_2_1_60_1","volume-title":"Future of Software Engineering (FOSE).","author":"Sch\u00e4fer Wilhelm","unstructured":"Wilhelm Sch\u00e4fer and Heike Wehrheim. 2007. The Challenges of Building Advanced Mechatronic Systems. In Future of Software Engineering (FOSE). Minneapolis, MN, USA, 72--84."},{"key":"e_1_3_2_1_61_1","volume-title":"Building Executable SysML Model. https:\/\/blog.nomagic.com\/building-executable-sysml-model-automatic-transmission-system-part-1\/. Last accessed","author":"Strolia Zilvinas","year":"2020","unstructured":"Zilvinas Strolia and Saulius Pavalkis. 2017. Building Executable SysML Model. https:\/\/blog.nomagic.com\/building-executable-sysml-model-automatic-transmission-system-part-1\/. Last accessed: February 2020."},{"key":"e_1_3_2_1_62_1","volume-title":"Improving Defect Detection Ability of Derived Test Cases Based on Mutated UML Activity Diagrams. In IEEE Annual Computer Software and Applications Conference (COMPSAC)","author":"Sun Haiying","year":"2014","unstructured":"Haiying Sun, Mingsong Chen, Min Zhang, Jing Liu, and Ying Zhang. 2014. Improving Defect Detection Ability of Derived Test Cases Based on Mutated UML Activity Diagrams. In IEEE Annual Computer Software and Applications Conference (COMPSAC). Atlanta, GA, USA, 275--280."},{"key":"e_1_3_2_1_63_1","first-page":"121","article-title":"A Survey of Program Slicing Techniques","volume":"3","author":"Tip Frank","year":"1995","unstructured":"Frank Tip. 1995. A Survey of Program Slicing Techniques. Journal of Programming Languages 3, 3 (1995), 121--189.","journal-title":"Journal of Programming Languages"},{"key":"e_1_3_2_1_64_1","unstructured":"U.S. Department of Defense. 1980. Procedures for Performing a Failure Mode Effect and Criticality Analysis (MIL-STD-1629A). http:\/\/www.fmea-fmeca.com\/milstd1629.pdf. Last accessed: February 2020."},{"key":"e_1_3_2_1_65_1","volume-title":"van der Aalst and Kees van Hee","author":"Wil","year":"2004","unstructured":"Wil M.P. van der Aalst and Kees van Hee. 2004. Workflow Management: Models, Methods, and Systems. MIT Press."},{"key":"e_1_3_2_1_66_1","volume-title":"Process Mining and Verification of Properties: An Approach Based on Temporal Logic. In International Conferences \"On the Move to Meaningful Internet Systems\" (OTM)","author":"Wil M.","unstructured":"Wil M. P. van der Aalst, H. T. de Beer, and Boudewijn F. van Dongen. 2005. Process Mining and Verification of Properties: An Approach Based on Temporal Logic. In International Conferences \"On the Move to Meaningful Internet Systems\" (OTM). Agia Napa, Cyprus, 130--147."},{"key":"e_1_3_2_1_67_1","first-page":"1","article-title":"Automatically Tracing Dependability Requirements via Term-Based Relevance Feedback","volume":"14","author":"Wang Wentao","year":"2018","unstructured":"Wentao Wang, Arushi Gupta, Nan Niu, Li Da Xu, Jing-Ru C.Cheng, and Zhendong Niu. 2018. Automatically Tracing Dependability Requirements via Term-Based Relevance Feedback. IEEE Transactions on Industrial Informatics 14, 1 (January 2018), 342--349.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_2_1_68_1","first-page":"6","article-title":"In-Place Trace-ability for Automated Production Systems: A Survey of PLC and SysML Tools","volume":"15","author":"Wang Wentao","year":"2019","unstructured":"Wentao Wang, Nan Niu, Mounifah Alenazi, and Li Da Xu. 2019. In-Place Trace-ability for Automated Production Systems: A Survey of PLC and SysML Tools. IEEE Transactions on Industrial Informatics 15, 6 (June 2019), 3155--3162.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2018.00-53"},{"key":"e_1_3_2_1_70_1","unstructured":"Mark Weiser. 1979. Program Slices: Formal Psychological and Practical Investigations of an Automatic Program Abstraction Method. Ph.D. Dissertation. University of Michigan Ann Arbor MI USA."}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","location":"Seoul South Korea","acronym":"ICSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"]},"container-title":["Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380332","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377811.3380332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:56Z","timestamp":1750202636000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":69,"alternative-id":["10.1145\/3377811.3380332","10.1145\/3377811"],"URL":"https:\/\/doi.org\/10.1145\/3377811.3380332","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}