{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T03:17:52Z","timestamp":1768706272520,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The University of North Carolina System Research Opportunities Initiative"},{"name":"The United States National Science Foundation","award":["CNS-2244424"],"award-info":[{"award-number":["CNS-2244424"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3691416","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4994-4996","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Poster: TAPChecker: Model Checking in Trigger-Action Rules Generation Using Large Language Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1364-2567","authenticated-orcid":false,"given":"Huan","family":"Bui","sequence":"first","affiliation":[{"name":"Department of Software Information Systems, The University of North Carolina at Charlotte, Charlotte, North Carolina, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5310-1652","authenticated-orcid":false,"given":"Harper","family":"Lienerth","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Albion College, Albion, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6555-9858","authenticated-orcid":false,"given":"Chenglong","family":"Fu","sequence":"additional","affiliation":[{"name":"Department of Software Information Systems, The University of North Carolina at Charlotte, Charlotte, North Carolina, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7508-5024","authenticated-orcid":false,"given":"Meera","family":"Sridhar","sequence":"additional","affiliation":[{"name":"Department of Software Information Systems, The University of North Carolina at Charlotte, Charlotte, North Carolina, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"411","article-title":"A Comparison of Model Checking Tools for Software Verification","volume":"16","author":"Bianchi Andrea","year":"2014","unstructured":"Andrea Bianchi, Thomas Eikema, Joost-Pieter Katoen, and Angelika H. Mader. 2014. A Comparison of Model Checking Tools for Software Verification. Software Tools for Technology Transfer 16, 4 (2014), 411--432.","journal-title":"Software Tools for Technology Transfer"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45657-0_29"},{"key":"e_1_3_2_1_3_1","volume-title":"Peled","author":"Clarke Edmund M.","year":"1999","unstructured":"Edmund M. Clarke, Orna Grumberg, and Doron A. Peled. 1999. Model Checking. MIT Press."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. 803--812","author":"Huang Jeffrey","year":"2013","unstructured":"Jeffrey Huang, Selma Cakmak, and Robert Miller. 2013. Supporting Trigger-Action Programming in the Smart Home. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. 803--812."},{"key":"e_1_3_2_1_5_1","volume-title":"Exploring smarter smart spaces with help from large language models. arXiv preprint arXiv:2303.14143","author":"King Evan","year":"2023","unstructured":"Evan King, Haoxiang Yu, Sangsu Lee, and Christine Julien. 2023. \" Get ready for a party\": Exploring smarter smart spaces with help from large language models. arXiv preprint arXiv:2303.14143 (2023)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643505"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Kenneth L. McMillan. 1993. Symbolic Model Checking: An Approach to the State Explosion Problem. In PhD Thesis Carnegie Mellon University.","DOI":"10.1007\/978-1-4615-3190-6_3"},{"key":"e_1_3_2_1_8_1","first-page":"107","article-title":"Flexible Conflict Detection and Resolution for Smart Home Systems","volume":"6","author":"Mendoza Pablo","year":"2015","unstructured":"Pablo Mendoza, Steve Hodges, Damian DeJonghe, and Selma Cakmak. 2015. Flexible Conflict Detection and Resolution for Smart Home Systems. IEEE Transactions on Smart Grid 6, 1 (2015), 107--116.","journal-title":"IEEE Transactions on Smart Grid"},{"key":"e_1_3_2_1_9_1","volume-title":"SAGE: Smart home Agent with Grounded Execution. arXiv preprint arXiv:2311.00772","author":"Rivkin Dmitriy","year":"2023","unstructured":"Dmitriy Rivkin, Francois Hogan, Amal Feriani, Abhisek Konar, Adam Sigal, Steve Liu, and Greg Dudek. 2023. SAGE: Smart home Agent with Grounded Execution. arXiv preprint arXiv:2311.00772 (2023)."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. 803--812","author":"Ur Blase","unstructured":"Blase Ur, Elizabeth McManus, Kevin Pak, Josh Sciolla, and Michael L. Littman. 2014. Practical Trigger-Action Programming in the Smart Home. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. 803--812."},{"key":"e_1_3_2_1_11_1","first-page":"144152","article-title":"A comprehensive survey of enabling and emerging technologies for social Internet of Things","volume":"7","author":"Yassine Abdou","year":"2019","unstructured":"Abdou Yassine, Sanjay Singh, Mohammad S Hossain, and Ghulam Muhammad. 2019. A comprehensive survey of enabling and emerging technologies for social Internet of Things. IEEE Access 7 (2019), 144152--144174.","journal-title":"IEEE Access"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691416","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3691416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:15:42Z","timestamp":1755843342000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691416"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":11,"alternative-id":["10.1145\/3658644.3691416","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3691416","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}