{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T05:47:57Z","timestamp":1740808077552,"version":"3.38.0"},"reference-count":78,"publisher":"SAGE Publications","issue":"8","license":[{"start":{"date-parts":[[2017,4,20]],"date-time":"2017-04-20T00:00:00Z","timestamp":1492646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["UH-66\/14"],"award-info":[{"award-number":["UH-66\/14"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["UH-66\/15-1"],"award-info":[{"award-number":["UH-66\/15-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61374185"],"award-info":[{"award-number":["61374185"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["SIMULATION"],"published-print":{"date-parts":[[2017,8]]},"abstract":"<jats:p> With the increasing size and complexity of models, developing models by composing existing ones becomes more important. We exploit the idea of reusing simulation experiments of individual models for composition to automatically generate experiments for the composed model. First, we illustrate the process of modeling based on composition and discuss the role simulation experiments can play in this process. Our focus is on semantic validation of the composed model. We explicitly specify simulation experiments in simulation experiment specification via a Scala layer, including the desired model behavioral properties and their required experiment set-ups. Models are annotated with experiment specifications, and upon composition, these specifications are adapted and automatically executed for the composed model. The approach is applied in a case study of developing a Wnt\/ \u03b2-catenin signaling pathway model by successively composing three individual models, where we exploit metric interval temporal logic to describe model behavioral properties and check averages of stochastic simulation results against these properties. <\/jats:p>","DOI":"10.1177\/0037549717704314","type":"journal-article","created":{"date-parts":[[2017,4,20]],"date-time":"2017-04-20T08:14:18Z","timestamp":1492676058000},"page":"659-677","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":14,"title":["Reusing simulation experiment specifications in developing models by successive composition \u2014 a case study of the Wnt\/<i>\u03b2<\/i>-catenin signaling pathway"],"prefix":"10.1177","volume":"93","author":[{"given":"Danhua","family":"Peng","sequence":"first","affiliation":[{"name":"University of Rostock, Institute of Computer Science, Germany"}]},{"given":"Tom","family":"Warnke","sequence":"additional","affiliation":[{"name":"University of Rostock, Institute of Computer Science, Germany"}]},{"given":"Fiete","family":"Haack","sequence":"additional","affiliation":[{"name":"University of Rostock, Institute of Computer Science, Germany"},{"name":"Research Unit \u201cFunctional Genome Analysis\u201d, Leibniz Institute for Farm Animal Biology (FBN), Germany"}]},{"given":"Adelinde M","family":"Uhrmacher","sequence":"additional","affiliation":[{"name":"University of Rostock, Institute of Computer Science, Germany"}]}],"member":"179","published-online":{"date-parts":[[2017,4,20]]},"reference":[{"first-page":"553","volume-title":"Proceedings of the 31st winter simulation conference","author":"Page EH","key":"bibr1-0037549717704314"},{"first-page":"181","volume-title":"Proceedings of the spring 2003 simulation interoperability workshop","author":"Petty MD","key":"bibr2-0037549717704314"},{"first-page":"135","volume-title":"Proceedings of the 29th Winter Simulation Conference","author":"Balci O.","key":"bibr3-0037549717704314"},{"key":"bibr4-0037549717704314","unstructured":"Stelling J, Mendes P, Klipp E, Defining modeling strategies for Systems Biology. Report, FutureSysBio Workshop, G\u00f6teborg, Sweden, 2011."},{"first-page":"151","volume-title":"Proceedings of the 2nd ACM SIGSIM conference on principles of advanced discrete simulation","author":"Peng D","key":"bibr5-0037549717704314"},{"key":"bibr6-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1177\/0037549712438469"},{"key":"bibr7-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1057\/jos.2012.20"},{"first-page":"1577","volume-title":"Proceedings of the 32nd winter simulation conference","author":"Kasputis S","key":"bibr8-0037549717704314"},{"first-page":"3054","volume-title":"Proceedings of the 43rd winter simulation conference","author":"Szabo C","key":"bibr9-0037549717704314"},{"first-page":"2812","volume-title":"47th winter simulation conference","author":"Robinson S","key":"bibr10-0037549717704314"},{"key":"bibr11-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1057\/jos.2012.18"},{"key":"bibr12-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2602368"},{"key":"bibr13-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1201\/9781439810385-c14"},{"first-page":"103","volume-title":"Proceedings of the 41st annual simulation symposium","author":"Teo YM","key":"bibr14-0037549717704314"},{"first-page":"145","volume-title":"Proceedings of the 11th IEEE international symposium on distributed simulation and real-time applications","author":"Moradi F","key":"bibr15-0037549717704314"},{"key":"bibr16-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1003849"},{"key":"bibr17-0037549717704314","first-page":"5","volume":"1","author":"Davis PK","year":"2004","journal-title":"JDMS"},{"key":"bibr18-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1186\/1752-0509-4-92"},{"key":"bibr19-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2008.64"},{"first-page":"1083","volume-title":"Proceedings of the 38th Winter Simulation Conference","author":"R\u00f6hl M","key":"bibr20-0037549717704314"},{"first-page":"230","volume-title":"Proceedings of the first Asia international conference on modelling & simulation","author":"Szabo C","key":"bibr21-0037549717704314"},{"key":"bibr22-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2006.27"},{"key":"bibr23-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1057\/jos.2012.11"},{"key":"bibr24-0037549717704314","unstructured":"Szyperski C, Gruntz D, Murer S. Component software: Beyond object-oriented programming. Boston, Massachusetts, USA: Addison-Wesley Longman Publishing Co., Inc, 2002."},{"first-page":"27","volume-title":"Proceedings of the first international conference on grand challenges for modeling and simulation","author":"Overstreet CM","key":"bibr25-0037549717704314"},{"first-page":"416","volume-title":"Proceedings of the spring 2003 simulation interoperability workshop","author":"Petty MD","key":"bibr26-0037549717704314"},{"volume-title":"Proceedings of the fall 2003 simulation interoperability workshop","author":"Weisel E","key":"bibr27-0037549717704314"},{"first-page":"3","volume-title":"Proceedings of the 2009 ACM\/IEEE\/SCS 23rd workshop on principles of advanced and distributed simulation","author":"Szabo C","key":"bibr28-0037549717704314"},{"first-page":"1411","volume-title":"Proceedings of the 41st winter simulation conference","author":"Szabo C","key":"bibr29-0037549717704314"},{"first-page":"897","volume-title":"Proceedings of the 38th winter simulation conference","author":"Traore MK.","key":"bibr30-0037549717704314"},{"first-page":"923","volume-title":"Proceedings of the 40th winter simulation conference","author":"Verbraeck A","key":"bibr31-0037549717704314"},{"key":"bibr32-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1098\/rsif.2008.0516.focus"},{"key":"bibr33-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btp401"},{"key":"bibr34-0037549717704314","unstructured":"Smith LP, Hucka M, Hoops S, SBML level 3 package specification: Hierarchical model composition, 2013. Available at: http:\/\/sbml.org\/Special\/specifications\/sbml-level-3\/version-1\/comp\/sbml-comp-version-1-release-3.pdf"},{"key":"bibr35-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1038\/nbt1156"},{"key":"bibr36-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1016\/j.ecolmodel.2010.08.019"},{"key":"bibr37-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-93813-2_7"},{"key":"bibr38-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2010.06.007"},{"first-page":"159","volume-title":"Proceedings of the 2009 spring simulation multiconference","author":"Chreyh R","key":"bibr39-0037549717704314"},{"key":"bibr40-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1093\/database\/bau130"},{"first-page":"25","volume-title":"Proceedings of the symposium on theory of modeling & simulation: DEVS integrative M&S symposium","author":"Wang S","key":"bibr41-0037549717704314"},{"key":"bibr42-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1016\/j.pbiomolbio.2014.10.001"},{"key":"bibr43-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3922-0"},{"first-page":"21","volume-title":"Proceedings of the 7th international ICST conference on simulation tools and techniques","author":"Rybacki S","key":"bibr44-0037549717704314"},{"volume-title":"Theory of modelling and simulation","year":"1976","author":"Zeigler B.","key":"bibr45-0037549717704314"},{"key":"bibr46-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1186\/1752-0509-5-198"},{"key":"bibr47-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1145\/2567895"},{"volume-title":"Model checking.","year":"1999","author":"Clarke E","key":"bibr48-0037549717704314"},{"first-page":"266","volume-title":"Proceedings of the 17th international conference on computer aided verification","author":"Sen K","key":"bibr49-0037549717704314"},{"key":"bibr50-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2013.09.004"},{"first-page":"48","volume-title":"Computational methods in systems biology","author":"Fages F","key":"bibr51-0037549717704314"},{"first-page":"161","volume-title":"11th international conference on computer modelling and simulation","author":"Leye S","key":"bibr52-0037549717704314"},{"key":"bibr53-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1038\/msb.2011.77"},{"key":"bibr54-0037549717704314","doi-asserted-by":"publisher","DOI":"10.3389\/fpls.2012.00155"},{"key":"bibr55-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38874-3_3"},{"key":"bibr56-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1186\/1752-0509-5-166"},{"key":"bibr57-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30206-3_12"},{"key":"bibr58-0037549717704314","doi-asserted-by":"crossref","unstructured":"Legay A, Delahaye B, Bensalem S. Statistical model checking: An overview. In: Runtime verification. Berlin: Springer, pp.122\u2013135.","DOI":"10.1007\/978-3-642-16612-9_11"},{"key":"bibr59-0037549717704314","doi-asserted-by":"publisher","DOI":"10.2478\/s11658-011-0021-0"},{"key":"bibr60-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pcbi.1004106"},{"key":"bibr61-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.383"},{"key":"bibr62-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0042792"},{"key":"bibr63-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1979.10481038"},{"first-page":"137","volume-title":"Proceedings of the 40th annual simulation symposium","author":"Himmelspach J","key":"bibr64-0037549717704314"},{"key":"bibr65-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1016\/j.cell.2012.05.012"},{"key":"bibr66-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1242\/jcs.058008"},{"key":"bibr67-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1002\/wsbm.1221"},{"key":"bibr68-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1007\/s00285-009-0262-y"},{"first-page":"133","volume-title":"Proceedings of the 3rd ACM SIGSIM conference on principles of advanced discrete simulation","author":"Warnke T","key":"bibr69-0037549717704314"},{"key":"bibr70-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pbio.0000010"},{"first-page":"4010","volume-title":"Proceedings of the 45th winter simulation conference","author":"Peng D","key":"bibr71-0037549717704314"},{"key":"bibr72-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1016\/j.devcel.2013.07.020"},{"key":"bibr73-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2013.40"},{"key":"bibr74-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0003498"},{"key":"bibr75-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1074\/jbc.M114.573519"},{"key":"bibr76-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1038\/ncb1405"},{"key":"bibr77-0037549717704314","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg015"},{"key":"bibr78-0037549717704314","unstructured":"The Sytems Biology Institute. Simulation software for systems biology, http:\/\/systems-biology.org\/software\/simulation\/sbmlsim.html, (2016, accessed 14 March 2017)."}],"container-title":["SIMULATION"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0037549717704314","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0037549717704314","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0037549717704314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T18:29:32Z","timestamp":1740767372000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0037549717704314"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,20]]},"references-count":78,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["10.1177\/0037549717704314"],"URL":"https:\/\/doi.org\/10.1177\/0037549717704314","relation":{},"ISSN":["0037-5497","1741-3133"],"issn-type":[{"type":"print","value":"0037-5497"},{"type":"electronic","value":"1741-3133"}],"subject":[],"published":{"date-parts":[[2017,4,20]]}}}