{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T15:22:56Z","timestamp":1726068176946},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030411305"},{"type":"electronic","value":"9783030411312"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41131-2_8","type":"book-chapter","created":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T11:06:49Z","timestamp":1581937609000},"page":"153-178","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Constraint-Based Modeling and Symbolic Simulation of Hybrid Systems with HydLa and HyLaGI"],"prefix":"10.1007","author":[{"given":"Yunosuke","family":"Yamada","sequence":"first","affiliation":[]},{"given":"Masashi","family":"Sato","sequence":"additional","affiliation":[]},{"given":"Kazunori","family":"Ueda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,18]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-45449-7_2","volume-title":"Embedded Software","author":"R Alur","year":"2001","unstructured":"Alur, R., et al.: Hierarchical hybrid modeling of embedded systems. In: Henzinger, T.A., Kirsch, C.M. (eds.) EMSOFT 2001. LNCS, vol. 2211, pp. 14\u201331. Springer, Heidelberg (2001). \nhttps:\/\/doi.org\/10.1007\/3-540-45449-7_2"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-319-51738-4_2","volume-title":"Cyber Physical Systems. Design, Modeling, and Evaluation","author":"K Betsuno","year":"2017","unstructured":"Betsuno, K., Matsumoto, S., Ueda, K.: Symbolic analysis of hybrid systems involving numerous discrete changes using loop detection. In: Berger, C., Mousavi, M.R., Wisniewski, R. (eds.) CyPhy 2016. LNCS, vol. 10107, pp. 17\u201330. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-51738-4_2"},{"issue":"3","key":"8_CR3","first-page":"233","volume":"5","author":"A Borning","year":"1992","unstructured":"Borning, A., Freeman-Benson, B., Wilson, M.: Constraint hierarchies. LISP Symb. Comput. 5(3), 233\u2013270 (1992)","journal-title":"LISP Symb. Comput."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Bourke, T., Pouzet, M.: Z\u00e9lus: a synchronous language with ODEs. In: HSCC 2013, pp. 113\u2013118. ACM (2013)","DOI":"10.1145\/2461328.2461348"},{"issue":"1\/2","key":"8_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1000000001","volume":"1","author":"LP Carloni","year":"2006","unstructured":"Carloni, L.P., Passerone, R., Pinto, A., Sangiovanni-Vincentelli, A.L.: Languages and tools for hybrid systems design. Found. Trends Electron. Des. Autom. 1(1\/2), 1\u2013193 (2006)","journal-title":"Found. Trends Electron. Des. Autom."},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-642-39799-8_18","volume-title":"Computer Aided Verification","author":"X Chen","year":"2013","unstructured":"Chen, X., \u00c1brah\u00e1m, E., Sankaranarayanan, S.: Flow*: an analyzer for non-linear hybrid systems. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 258\u2013263. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-39799-8_18"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/978-3-319-21401-6_36","volume-title":"Automated Deduction - CADE-25","author":"N Fulton","year":"2015","unstructured":"Fulton, N., Mitsch, S., Quesel, J.-D., V\u00f6lp, M., Platzer, A.: KeYmaera\u00a0X: an axiomatic tactical theorem prover for hybrid systems. In: Felty, A.P., Middeldorp, A. (eds.) CADE 2015. LNCS (LNAI), vol. 9195, pp. 527\u2013538. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-21401-6_36"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/3-540-60472-3_12","volume-title":"Hybrid Systems II","author":"V Gupta","year":"1995","unstructured":"Gupta, V., Jagadeesan, R., Saraswat, V., Bobrow, D.G.: Programming in hybrid constraint languages. In: Antsaklis, P., Kohn, W., Nerode, A., Sastry, S. (eds.) HS 1994. LNCS, vol. 999, pp. 226\u2013251. Springer, Heidelberg (1995). \nhttps:\/\/doi.org\/10.1007\/3-540-60472-3_12"},{"key":"8_CR9","unstructured":"Henzinger, T.A.: The theory of hybrid automata. In: LICS 1996, pp. 278\u2013292. IEEE Computer Society (1996)"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-662-46681-0_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S Kong","year":"2015","unstructured":"Kong, S., Gao, S., Chen, W., Clarke, E.: dReach: $$\\delta $$-reachability analysis for hybrid systems. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 200\u2013205. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-46681-0_15"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1109\/ACCESS.2014.2345759","volume":"2","author":"EA Lee","year":"2014","unstructured":"Lee, E.A.: Constructive models of discrete and continuous physical phenomena. IEEE Access 2, 797\u2013821 (2014)","journal-title":"IEEE Access"},{"key":"8_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807930","volume-title":"Handbook of Hybrid Systems Control: Theory, Tools, Applications","author":"J Lunze","year":"2009","unstructured":"Lunze, J.: Handbook of Hybrid Systems Control: Theory, Tools, Applications. Cambridge University Press, Cambridge (2009)"},{"key":"8_CR13","unstructured":"Matsumoto, S.: Validated simulation of parametric hybrid systems based on constraints. Ph.D. thesis, Waseda University (2017)"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.entcs.2015.10.011","volume":"317","author":"S Matsumoto","year":"2015","unstructured":"Matsumoto, S., Kono, F., Kobayashi, T., Ueda, K.: HyLaGI: symbolic implementation of a hybrid constraint language HydLa. Electron. Notes Theor. Comput. Sci. 317, 109\u2013115 (2015)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Matsumoto, S., Ueda, K.: Symbolic simulation of parametrized hybrid systems with affine arithmetic. In: TIME 2016, pp. 4\u201311. IEEE Computer Society (2016)","DOI":"10.1109\/TIME.2016.8"},{"key":"8_CR16","unstructured":"Modelica Association: Modelica - Unified Object-Oriented Language for Systems Modeling: Language Specification (Version 3.4) (2007). \nhttps:\/\/modelica.org\/documents\/ModelicaSpec34.pdf"},{"key":"8_CR17","unstructured":"$$\\tilde{\\text{N}}$$a\u00f1ez, P., Risso, N., Sanfelice, R.G.: A symbolic simulator for hybrid equations. In: Proceedings of SummerSim 2014, pp. 18:1\u201318:8 (2014)"},{"key":"8_CR18","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-319-47063-4_11","volume-title":"Internet of Things. IoT Infrastructures","author":"W Taha","year":"2016","unstructured":"Taha, W., et al.: Acumen: an open-source testbed for cyber-physical systems research. In: Mandler, B., et al. (eds.) IoT360 2015. LNICST, vol. 169, pp. 118\u2013130. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-47063-4_11"},{"key":"8_CR19","unstructured":"Takeguchi, A., Wada, R., Matsumoto, S., Hosobe, H., Ueda, K.: An algorithm for converting hybrid constraint programs to hybrid automata. In: The 29nd JSSST Annual Conference, 2A-3 (2012). \nhttps:\/\/www.ueda.info.waseda.ac.jp\/~ueda\/pub\/takeguchi_jssst_PPL2012.pdf\n\n. (in Japanese)"},{"key":"8_CR20","unstructured":"Ueda, K., Hosobe, H., Ishii, D.: Declarative semantics of the hybrid constraint language HydLa. Comput. Softw. 28(1), 306\u2013311 (2011). English translation: \nhttp:\/\/arxiv.org\/abs\/1910.12272"},{"key":"8_CR21","unstructured":"Ueda, K., Matsumoto, S., Takeguchi, A., Hosobe, H., Ishii, D.: HydLa: a high-level language for hybrid systems. In: 2nd Workshop on Logics for System Analysis (LfSA 2012, affiliated with CAV 2012), pp. 3\u201317 (2012)"},{"key":"8_CR22","unstructured":"Wakatsuki, Y., Matsumoto, S., Ito, T., Wada, T., Ueda, K.: Model analysis by using micro errors in hybrid constraint processing system HyLaGI. In: The 32nd JSSST Annual Conference (2015). \nhttp:\/\/jssst.or.jp\/files\/user\/taikai\/2015\/GENERAL\/general6-4.pdf\n\n. (in Japanese)"}],"container-title":["Lecture Notes in Computer Science","Cyber Physical Systems. Model-Based Design"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41131-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T11:09:06Z","timestamp":1581937746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41131-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030411305","9783030411312"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41131-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CyPhy","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Design, Modeling, and Evaluation of Cyber Physical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York City, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cyphy2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cyphy.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1-2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}