{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T07:48:31Z","timestamp":1771573711415,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030349677","type":"print"},{"value":"9783030349684","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-34968-4_8","type":"book-chapter","created":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T19:14:54Z","timestamp":1574363694000},"page":"138-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Learning to Reuse: Adaptive Model Learning for Evolving Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8492-7484","authenticated-orcid":false,"given":"Carlos Diego N.","family":"Damasceno","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4869-6794","authenticated-orcid":false,"given":"Mohammad Reza","family":"Mousavi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1454-2607","authenticated-orcid":false,"given":"Adenilso","family":"da Silva Simao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,22]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D Angluin","year":"1987","unstructured":"Angluin, D.: Learning regular sets from queries and counterexamples. Inf. Comput. 75, 87\u2013106 (1987)","journal-title":"Inf. Comput."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Arcuri, A., Briand, L.: A practical guide for using statistical tests to assess randomized algorithms in software engineering. In: Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, pp. 1\u201310. ACM (2011)","DOI":"10.1145\/1985793.1985795"},{"key":"8_CR3","volume-title":"Testing Object-Oriented Systems: Models, Patterns, and Tools","author":"RV Binder","year":"1999","unstructured":"Binder, R.V.: Testing Object-Oriented Systems: Models, Patterns, and Tools. Addison-Wesley Longman Publishing Co. Inc., Boston (1999)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11498490_1","volume-title":"Model-Based Testing of Reactive Systems","author":"M Broy","year":"2005","unstructured":"Broy, M., Jonsson, B., Katoen, J.-P., Leucker, M., Pretschner, A.: Part I. Testing of finite state machines. In: Broy, M., Jonsson, B., Katoen, J.-P., Leucker, M., Pretschner, A. (eds.) Model-Based Testing of Reactive Systems. LNCS, vol. 3472, pp. 1\u20133. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11498490_1"},{"issue":"3","key":"8_CR5","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s10703-008-0053-x","volume":"32","author":"S Chaki","year":"2008","unstructured":"Chaki, S., Clarke, E., Sharygina, N., Sinha, N.: Verification of evolving software via component substitutability analysis. Form. Methods Syst. Des. 32(3), 235\u2013266 (2008)","journal-title":"Form. Methods Syst. Des."},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/TSE.1978.231496","volume":"SE\u20134","author":"TS Chow","year":"1978","unstructured":"Chow, T.S.: Testing software design modeled by finite-state machines. IEEE Trans. Softw. Eng. SE\u20134(3), 178\u2013187 (1978)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Damasceno, C.D.N., Mousavi, M.R., da Silva Simao, A.: Learning from difference: an automated approach for learning family models from software product lines. In: Proceeedings of the 23rd International Systems and Software Product Line Conference, SPLC 2019, vol. 1. ACM Press, Paris (2019)","DOI":"10.1145\/3336294.3336307"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-030-03427-6_13","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice","author":"O Duhaiby al","year":"2018","unstructured":"al Duhaiby, O., Mooij, A., van Wezep, H., Groote, J.F.: Pitfalls in applying model learning to industrial legacy software. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11247, pp. 121\u2013138. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-030-03427-6_13"},{"issue":"6","key":"8_CR9","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/32.87284","volume":"17","author":"S Fujiwara","year":"1991","unstructured":"Fujiwara, S., Bochmann, G.V., Khendek, F., Amalou, M., Ghedamsi, A.: Test selection based on finite state models. IEEE Trans. Softw. Eng. 17(6), 591\u2013603 (1991)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/3-540-46002-0_25","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A Groce","year":"2002","unstructured":"Groce, A., Peled, D., Yannakakis, M.: Adaptive model checking. In: Katoen, J.-P., Stevens, P. (eds.) TACAS 2002. LNCS, vol. 2280, pp. 357\u2013370. Springer, Heidelberg (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-46002-0_25"},{"key":"8_CR11","unstructured":"Hess, M.R., Kromrey, J.D.: Robust confidence intervals for effect sizes: a comparative study of Cohen\u2019sd and Cliffs delta under non-normality and heterogeneous variances. In: Annual Meeting - American Educational Research Association (2004)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/978-3-642-16558-0_55","volume-title":"Leveraging Applications of Formal Methods, Verification, and Validation","author":"F Howar","year":"2010","unstructured":"Howar, F., Steffen, B., Merten, M.: From ZULU to RERS. In: Margaria, T., Steffen, B. (eds.) ISoLA 2010. LNCS, vol. 6415, pp. 687\u2013704. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-16558-0_55"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-030-00244-2_11","volume-title":"Formal Methods for Industrial Critical Systems","author":"D Huistra","year":"2018","unstructured":"Huistra, D., Meijer, J., van de Pol, J.: Adaptive learning for learn-based regression testing. In: Howar, F., Barnat, J. (eds.) FMICS 2018. LNCS, vol. 11119, pp. 162\u2013177. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-030-00244-2_11"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Irfan, M.N., Oriat, C., Groz, R.: Angluin style finite state machine inference with non-optimal counterexamples. In: Proceedings of the First International Workshop on Model Inference In Testing, MIIT 2010, pp. 11\u201319. ACM, New York (2010)","DOI":"10.1145\/1868044.1868046"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Irfan, M.N., Oriat, C., Groz, R.: Chapter 3 - Model inference and testing. In: Advances in Computers, vol. 89, pp. 89\u2013139. Elsevier (2013)","DOI":"10.1016\/B978-0-12-408094-2.00003-5"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-319-11164-3_26","volume-title":"Runtime Verification","author":"M Isberner","year":"2014","unstructured":"Isberner, M., Howar, F., Steffen, B.: The TTT algorithm: a redundancy-free approach to active automata learning. In: Bonakdarpour, B., Smolka, S.A. (eds.) RV 2014. LNCS, vol. 8734, pp. 307\u2013322. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-11164-3_26"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-319-21690-4_32","volume-title":"Computer Aided Verification","author":"M Isberner","year":"2015","unstructured":"Isberner, M., Howar, F., Steffen, B.: The open-source LearnLib. In: Kroening, D., P\u0103s\u0103reanu, C.S. (eds.) CAV 2015. LNCS, vol. 9206, pp. 487\u2013495. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-21690-4_32"},{"issue":"11","key":"8_CR18","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1016\/j.infsof.2007.02.015","volume":"49","author":"VB Kampenes","year":"2007","unstructured":"Kampenes, V.B., Dyb, T., Hannay, J.E., Sjberg, D.I.: A systematic review of effect size in software engineering experiments. Inf. Softw. Technol. 49(11), 1073\u20131086 (2007)","journal-title":"Inf. Softw. Technol."},{"key":"8_CR19","unstructured":"LearnLib: LearnLib 0.13 - Javadoc (2018). \nhttp:\/\/learnlib.github.io\/learnlib\/maven-site\/0.13.0\/apidocs\/\n\n. Accessed 06 Aug 2018"},{"issue":"2","key":"8_CR20","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s11334-005-0016-y","volume":"1","author":"T Margaria","year":"2005","unstructured":"Margaria, T., Raffelt, H., Steffen, B.: Knowledge-based relevance filtering for efficient system-level test-based model generation. Innov. Syst. Softw. Eng. 1(2), 147\u2013156 (2005)","journal-title":"Innov. Syst. Softw. Eng."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Mariani, L., Pezz, M., Zuddas, D.: Chapter 4 - Recent advances in automatic black-box testing. In: Advances in Computers, vol. 99, pp. 157\u2013193. Elsevier (2015)","DOI":"10.1016\/bs.adcom.2015.04.002"},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-21768-5_11","volume-title":"Tests and Proofs","author":"K Meinke","year":"2011","unstructured":"Meinke, K., Sindhu, M.A.: Incremental learning-based testing for reactive systems. In: Gogolla, M., Wolff, B. (eds.) TAP 2011. LNCS, vol. 6706, pp. 134\u2013151. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-21768-5_11"},{"key":"8_CR23","unstructured":"OpenSSL Foundation Inc.: OpenSSL - Cryptography and SSL\/TLS toolkit (2018). \nhttps:\/\/www.openssl.org\/\n\n. Accessed 21 Aug 2018"},{"key":"8_CR24","unstructured":"OpenSSL Foundation Inc.: OpenSSL releases at Github (2018). \nhttps:\/\/github.com\/openssl\/openssl\/releases\n\n. Accessed 26 Aug 2018"},{"issue":"2","key":"8_CR25","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1006\/inco.1993.1021","volume":"103","author":"RL Rivest","year":"1993","unstructured":"Rivest, R.L., Schapire, R.E.: Inference of finite automata using homing sequences. Inf. Comput. 103(2), 299\u2013347 (1993)","journal-title":"Inf. Comput."},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-319-47560-8_11","volume-title":"Secure IT Systems","author":"J Ruiter","year":"2016","unstructured":"Ruiter, J.: A tale of the OpenSSL state machine: a large-scale black-box analysis. In: Brumley, B.B., R\u00f6ning, J. (eds.) NordSec 2016. LNCS, vol. 10014, pp. 169\u2013184. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-47560-8_11"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-05089-3_14","volume-title":"FM 2009: Formal Methods","author":"M Shahbaz","year":"2009","unstructured":"Shahbaz, M., Groz, R.: Inferring mealy machines. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol. 5850, pp. 207\u2013222. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-05089-3_14"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"6:1","DOI":"10.1145\/2580950","volume":"47","author":"T Th\u00fcm","year":"2014","unstructured":"Th\u00fcm, T., Apel, S., K\u00e4stner, C., Schaefer, I., Saake, G.: A classification and survey of analysis strategies for software product lines. ACM Comput. Surv. 47, 6:1\u20136:45 (2014)","journal-title":"ACM Comput. Surv."},{"key":"8_CR29","unstructured":"Torchiano, M.: Effsize: efficient effect size computation (v. 0.7.1). CRAN package repository, March 2017. \nhttps:\/\/cran.r-project.org\/web\/packages\/effsize\/effsize.pdf\n\n. Accessed 20 Nov 2017"},{"issue":"2","key":"8_CR30","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/2967606","volume":"60","author":"F Vaandrager","year":"2017","unstructured":"Vaandrager, F.: Model learning. Commun. ACM 60(2), 86\u201395 (2017)","journal-title":"Commun. ACM"},{"issue":"2","key":"8_CR31","first-page":"101","volume":"25","author":"A Vargha","year":"2000","unstructured":"Vargha, A., Delaney, H.D.: A critique and improvement of the CL common language effect size statistics of McGraw and Wong. J. Educ. Behav. Stat. 25(2), 101\u2013132 (2000)","journal-title":"J. Educ. Behav. Stat."},{"issue":"4","key":"8_CR32","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/BF01068590","volume":"9","author":"MP Vasilevskii","year":"1973","unstructured":"Vasilevskii, M.P.: Failure diagnosis of automata. Cybernetics 9(4), 653\u2013665 (1973)","journal-title":"Cybernetics"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Walkinshaw, N.: Chapter 1 - Reverse-engineering software behavior. In: Memon, A. (ed.) Advances in Computers, vol. 91. Elsevier (2013)","DOI":"10.1016\/B978-0-12-408089-8.00001-X"},{"issue":"2","key":"8_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2430545.2430549","volume":"22","author":"N Walkinshaw","year":"2013","unstructured":"Walkinshaw, N., Bogdanov, K.: Automated comparison of state-based software models in terms of their language and structure. ACM Trans. Softw. Eng. Methodol. 22(2), 1\u201337 (2013)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Windm\u00fcller, S., Neubauer, J., Steffen, B., Howar, F., Bauer, O.: Active continuous quality control. In: Proceedings of the 16th International ACM Sigsoft Symposium on Component-Based Software Engineering, CBSE 2013, pp. 111\u2013120. ACM, New York (2013)","DOI":"10.1145\/2465449.2465469"},{"key":"8_CR36","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-29044-2_4","volume-title":"Experimentation in Software Engineering","author":"C Wohlin","year":"2012","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Systematic literature reviews. In: Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A. (eds.) Experimentation in Software Engineering, pp. 45\u201354. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-29044-2_4"}],"container-title":["Lecture Notes in Computer Science","Integrated Formal Methods"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34968-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T19:17:21Z","timestamp":1574363841000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34968-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030349677","9783030349684"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34968-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"22 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IFM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Integrated Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bergen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ifm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifm2019.hvl.no\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}