{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:19:40Z","timestamp":1759033180435,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3419804.3420262","type":"proceedings-article","created":{"date-parts":[[2020,10,18]],"date-time":"2020-10-18T10:23:21Z","timestamp":1603016601000},"page":"12-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards automated provenance collection for runtime models to record system history"],"prefix":"10.1145","author":[{"given":"Owen","family":"Reynolds","sequence":"first","affiliation":[{"name":"SEA research group, EAS, Aston University, Birmingham, United Kingdom"}]},{"given":"Antonio","family":"Garc\u00eda-Dom\u00ednguez","sequence":"additional","affiliation":[{"name":"SEA research group, EAS, Aston University, Birmingham, United Kingdom"}]},{"given":"Nelly","family":"Bencomo","sequence":"additional","affiliation":[{"name":"SEA research group, EAS, Aston University, Birmingham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"R. Andrews J. Diederich and A. Tickle. 1995. Survey and critique of techniques for extracting rules from trained artificial neural networks. Knowledge-Based Systems (1995). https:\/\/doi.org\/10.1016\/0950-7051(96)81920-4  R. Andrews J. Diederich and A. Tickle. 1995. Survey and critique of techniques for extracting rules from trained artificial neural networks. Knowledge-Based Systems (1995). https:\/\/doi.org\/10.1016\/0950-7051(96)81920-4","key":"e_1_3_2_1_1_1","DOI":"10.1016\/0950-7051(96)81920-4"},{"unstructured":"Apache Foundation. 2020. Log4J homepage. https:\/\/logging.apache.org\/log4j\/2.x\/Date last checked: August 1st 2020.  Apache Foundation. 2020. Log4J homepage. https:\/\/logging.apache.org\/log4j\/2.x\/Date last checked: August 1st 2020.","key":"e_1_3_2_1_2_1"},{"volume-title":"Proc. of SEAMS","year":"2015","author":"Arcaini P.","key":"e_1_3_2_1_3_1"},{"volume-title":"EPiCS: Engineering Proprioception in Computing Systems. In IEEE 15th International Conference on Computational Science and Engineering. https:\/\/doi.org\/10","year":"2012","author":"Becker T.","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1207\/S15327051HCI16234_05"},{"volume-title":"Proc. of MODELS","year":"2019","author":"Bencomo N.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1007\/s10270-018-00712-x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/TSE.2017.2707089"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/MC.2009.326"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/MC.2009.326"},{"doi-asserted-by":"crossref","unstructured":"National Research Council. 2014. Complex Operational Decision Making in Networked Systems of Humans and Machines: A Multidisciplinary Approach. National Academies Press Washington DC. https:\/\/doi.org\/10.17226\/18844  National Research Council. 2014. Complex Operational Decision Making in Networked Systems of Humans and Machines: A Multidisciplinary Approach. National Academies Press Washington DC. https:\/\/doi.org\/10.17226\/18844","key":"e_1_3_2_1_11_1","DOI":"10.17226\/18844"},{"unstructured":"Eclipse Foundation. 2019. CDO Model Repository. https:\/\/www.eclipse.org\/cdo\/Date last checked: July 19th 2020.  Eclipse Foundation. 2019. CDO Model Repository. https:\/\/www.eclipse.org\/cdo\/Date last checked: July 19th 2020.","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/2591062.2591175"},{"unstructured":"A. Garc\u00eda-Dom\u00ednguez and S. Madani. 2020. emc-cdo GitHub project. https:\/\/github.com\/epsilonlabs\/emc-cdo Date last checked: August 1st 2020.  A. Garc\u00eda-Dom\u00ednguez and S. Madani. 2020. emc-cdo GitHub project. https:\/\/github.com\/epsilonlabs\/emc-cdo Date last checked: August 1st 2020.","key":"e_1_3_2_1_14_1"},{"volume-title":"SPADE: Support for Provenance Auditing in Distributed Environments. In Middleware 2012 (LNCS)","year":"2012","author":"Gehani A.","key":"e_1_3_2_1_15_1"},{"unstructured":"German Aerospace Center. 2019. SUMO homepage. http:\/\/sumo.sourceforge.net\/Date last checked: August 2nd 2020.  German Aerospace Center. 2019. SUMO homepage. http:\/\/sumo.sourceforge.net\/Date last checked: August 2nd 2020.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"crossref","unstructured":"E. Gessiou V. Pappas E. Athanasopoulos etal 2012. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation. In Information Security and Privacy Research. Vol. 376. Springer Berlin Heidelberg 103--114. https:\/\/doi.org\/10.1007\/978-3-642-30436-1_9  E. Gessiou V. Pappas E. Athanasopoulos et al. 2012. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation. In Information Security and Privacy Research. Vol. 376. Springer Berlin Heidelberg 103--114. https:\/\/doi.org\/10.1007\/978-3-642-30436-1_9","key":"e_1_3_2_1_17_1","DOI":"10.1007\/978-3-642-30436-1_9"},{"unstructured":"P. Groth and L. Moreau. 2013. PROV-Overview. Working Group Note. W3C. https:\/\/www.w3.org\/TR\/prov-overview\/ Last checked: August 2nd 2020.  P. Groth and L. Moreau. 2013. PROV-Overview. Working Group Note. W3C. https:\/\/www.w3.org\/TR\/prov-overview\/ Last checked: August 2nd 2020.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1007\/978-3-319-73117-9_11"},{"volume-title":"Experience Report: System Log Analysis for Anomaly Detection. In 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE). 207--218","author":"He S.","key":"e_1_3_2_1_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1007\/s00778-017-0486-1"},{"volume-title":"Verifying Linear Temporal Logic Properties in UML\/OCL Class Diagrams Using Filmstripping. In 2016 Euromicro Conference on Digital System Design (DSD). 708--713","year":"2016","author":"Hilken F.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/mc.2003.1160055"},{"key":"e_1_3_2_1_24_1","volume-title":"Aspect-Oriented Programming. In Proceedings of ECOOP'97","volume":"1241","author":"Kiczales G.","year":"1997"},{"volume-title":"Proceedings of ECMDA-FA","year":"2006","author":"Kolovos D. S.","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"crossref","unstructured":"S. Kounev P. Lewis K. Bellman N. Bencomo etal 2017. The Notion of Self-aware Computing. Springer International Publishing Cham 3--16. https:\/\/doi.org\/10.1007\/978-3-319-47474-8_1  S. Kounev P. Lewis K. Bellman N. Bencomo et al. 2017. The Notion of Self-aware Computing. Springer International Publishing Cham 3--16. https:\/\/doi.org\/10.1007\/978-3-319-47474-8_1","key":"e_1_3_2_1_26_1","DOI":"10.1007\/978-3-319-47474-8_1"},{"volume-title":"Structured Logging: Crafting Useful Message Content. login","year":"2019","author":"Legeza V.","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"crossref","unstructured":"S. Madani D. S. Kolovos and R. F. Paige. 2019. Towards optimisation of model queries: A parallel execution approach. Journal of Object Technology (2019). https:\/\/doi.org\/10.5381\/JOT.2019.18.2.A3  S. Madani D. S. Kolovos and R. F. Paige. 2019. Towards optimisation of model queries: A parallel execution approach. Journal of Object Technology (2019). https:\/\/doi.org\/10.5381\/JOT.2019.18.2.A3","key":"e_1_3_2_1_28_1","DOI":"10.5381\/jot.2019.18.2.a3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1016\/j.future.2010.07.005"},{"volume-title":"Temporal Models for History-Aware Explainability. In 12th System Analysis and Modelling Conference (SAM '20)","year":"2020","author":"Parra-Ullauri J","key":"e_1_3_2_1_30_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1007\/s10115-018-1164-3"},{"volume-title":"ACM\/IEEE MODELS 2020 Companion Proceedings. https:\/\/doi.org\/10","year":"1950","author":"Reynolds O.","key":"e_1_3_2_1_32_1"},{"volume-title":"Proceedings of RE'10","year":"2010","author":"Sawyer P.","key":"e_1_3_2_1_33_1"},{"volume-title":"International Data Privacy Law 7, 4 (12","year":"2017","author":"Selbst Andrew D","key":"e_1_3_2_1_34_1"},{"volume-title":"CEUR Workshop Proceedings 1079","year":"2013","author":"Szvetits M.","key":"e_1_3_2_1_35_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/SEAMS.2013.6595502"},{"doi-asserted-by":"crossref","unstructured":"K. Welsh N. Bencomo P. Sawyer and J. Whittle. 2014. Self-Explanation in Adaptive Systems Based on Runtime Goal-Based Models. 122--145. https:\/\/doi.org\/10.1007\/978-3-662-44871-7_5  K. Welsh N. Bencomo P. Sawyer and J. Whittle. 2014. Self-Explanation in Adaptive Systems Based on Runtime Goal-Based Models. 122--145. https:\/\/doi.org\/10.1007\/978-3-662-44871-7_5","key":"e_1_3_2_1_37_1","DOI":"10.1007\/978-3-662-45896-9_5"},{"unstructured":"D. A. Wheeler. 2013. sloccount homepage. https:\/\/sourceforge.net\/projects\/sloccount\/ Date last checked: August 1st 2020.  D. A. Wheeler. 2013. sloccount homepage. https:\/\/sourceforge.net\/projects\/sloccount\/ Date last checked: August 1st 2020.","key":"e_1_3_2_1_38_1"},{"volume-title":"Proceedings of ICSE","year":"2012","author":"Yuan D.","key":"e_1_3_2_1_39_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1007\/s11704-016-5554-y"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"acronym":"SAM '20","name":"SAM '20: 12th System Analysis and Modelling Conference","location":"Virtual Event Canada"},"container-title":["Proceedings of the 12th System Analysis and Modelling Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419804.3420262","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419804.3420262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:03Z","timestamp":1750195923000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419804.3420262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":40,"alternative-id":["10.1145\/3419804.3420262","10.1145\/3419804"],"URL":"https:\/\/doi.org\/10.1145\/3419804.3420262","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}