{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:12:47Z","timestamp":1743102767087,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030483241"},{"type":"electronic","value":"9783030483258"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-48325-8_11","type":"book-chapter","created":{"date-parts":[[2020,5,13]],"date-time":"2020-05-13T08:02:45Z","timestamp":1589356965000},"page":"157-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Exploiting Anti-scenarios for the Non Realizability Problem"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5498-6878","authenticated-orcid":false,"given":"Fernando","family":"Asteasuain","sequence":"first","affiliation":[]},{"given":"Federico","family":"Calonge","sequence":"additional","affiliation":[]},{"given":"Pablo","family":"Gamboa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,14]]},"reference":[{"key":"11_CR1","unstructured":"Acacia+ web site. \nhttp:\/\/lit2.ulb.ac.be\/acaciaplus\/"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Alrajeh, D., Kramer, J., Russo, A., Uchitel, S.: Learning operational requirements from goal models. In: 2009 IEEE 31st International Conference on Software Engineering, pp. 265\u2013275. IEEE (2009)","DOI":"10.1109\/ICSE.2009.5070527"},{"key":"11_CR3","volume-title":"Feature-Oriented Software Product Lines","author":"S Apel","year":"2016","unstructured":"Apel, S., Batory, D., K\u00e4stner, C., Saake, G.: Feature-Oriented Software Product Lines. Springer, Heidelberg (2016)"},{"issue":"04","key":"11_CR4","first-page":"669","volume":"25","author":"F Asteasuain","year":"2015","unstructured":"Asteasuain, F., Braberman, V.: Specification patterns: formal and easy. IJSEKE 25(04), 669\u2013700 (2015)","journal-title":"IJSEKE"},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s00766-015-0242-2","volume":"22","author":"F Asteasuain","year":"2016","unstructured":"Asteasuain, F., Braberman, V.: Declaratively building behavior by means of scenario clauses. Requir. Eng. 22(2), 239\u2013274 (2016). \nhttps:\/\/doi.org\/10.1007\/s00766-015-0242-2","journal-title":"Requir. Eng."},{"key":"11_CR6","unstructured":"Asteasuain, F., Calonge, F., Gamboa, P.: Aspect oriented behavioral synthesis. In: CACIC, pp. 622\u2013631 (2019). ISBN 978-987-688-377-1"},{"key":"11_CR7","unstructured":"Bergmans, L.M.: Towards detection of semantic conflicts between crosscutting concerns. In: Analysis of Aspect-Oriented Software (ECOOP 2003) (2003)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Bloem, R., Jobstmann, B., Piterman, N., Pnueli, A., Sa\u2019Ar, Y.: Synthesis of reactive (1) designs (2011)","DOI":"10.1016\/j.jcss.2011.08.007"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1007\/978-3-642-31424-7_45","volume-title":"Computer Aided Verification","author":"A Bohy","year":"2012","unstructured":"Bohy, A., Bruy\u00e8re, V., Filiot, E., Jin, N., Raskin, J.-F.: Acacia+, a tool for LTL synthesis. In: Madhusudan, P., Seshia, S.A. (eds.) CAV 2012. LNCS, vol. 7358, pp. 652\u2013657. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-31424-7_45"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-642-04368-0_7","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"V Braberman","year":"2009","unstructured":"Braberman, V., Garbervestky, D., Kicillof, N., Monteverde, D., Olivero, A.: Speeding up model checking of timed-models by combining scenario specialization and live component analysis. In: Ouaknine, J., Vaandrager, F.W. (eds.) FORMATS 2009. LNCS, vol. 5813, pp. 58\u201372. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-04368-0_7"},{"issue":"4","key":"11_CR11","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1080\/17517575.2018.1462406","volume":"13","author":"T Cerny","year":"2019","unstructured":"Cerny, T.: Aspect-oriented challenges in system integration with microservices, SOA and IoT. Enterp. Inf. Syst. 13(4), 467\u2013489 (2019)","journal-title":"Enterp. Inf. Syst."},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11817963_5","volume-title":"Computer Aided Verification","author":"M De Wulf","year":"2006","unstructured":"De Wulf, M., Doyen, L., Henzinger, T.A., Raskin, J.-F.: Antichains: a new algorithm for checking universality of finite automata. In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol. 4144, pp. 17\u201330. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11817963_5"},{"issue":"9","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2430536.2430543","volume":"22","author":"N D\u2019Ippolito","year":"2013","unstructured":"D\u2019Ippolito, N., Braberman, V., Piterman, N., Uchitel, S.: Synthesising non-anomalous event-based controllers for liveness goals. ACM Trans. Softw. Eng. Methodol. (TOSEM) 22(9), 1\u201336 (2013)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Disenfeld, C., Katz, S.: A closer look at aspect interference and cooperation. In: AOSD, pp. 107\u2013118. ACM (2012)","DOI":"10.1145\/2162049.2162063"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-540-71209-1_34","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L Doyen","year":"2007","unstructured":"Doyen, L., Raskin, J.-F.: Improved algorithms for the automata-based approach to model-checking. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol. 4424, pp. 451\u2013465. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-71209-1_34"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Duhoux, B., Mens, K., Dumas, B.: Implementation of a feature-based context-oriented programming language. In: Proceedings of the Workshop on Context-Oriented Programming, pp. 9\u201316 (2019)","DOI":"10.1145\/3340671.3343357"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Dwyer, M., Avrunin, M., Corbett, M.: Patterns in property specifications for finite-state verification. In: ICSE, pp. 411\u2013420 (1999)","DOI":"10.1145\/302405.302672"},{"key":"11_CR18","volume-title":"Aspect-Oriented Software Development","author":"R Filman","year":"2004","unstructured":"Filman, R., Elrad, T., Clarke, S., Ak\u015fit, M.: Aspect-Oriented Software Development. Addison-Wesley Professional, Boston (2004)"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-04761-9_15","volume-title":"Automated Technology for Verification and Analysis","author":"O Friedmann","year":"2009","unstructured":"Friedmann, O., Lange, M.: Solving parity games in practice. In: Liu, Z., Ravn, A.P. (eds.) ATVA 2009. LNCS, vol. 5799, pp. 182\u2013196. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-04761-9_15"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/3-540-46541-3_24","volume-title":"STACS 2000","author":"M Jurdzi\u0144ski","year":"2000","unstructured":"Jurdzi\u0144ski, M.: Small progress measures for solving parity games. In: Reichel, H., Tison, S. (eds.) STACS 2000. LNCS, vol. 1770, pp. 290\u2013301. Springer, Heidelberg (2000). \nhttps:\/\/doi.org\/10.1007\/3-540-46541-3_24"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/11687061_4","volume-title":"Transactions on Aspect-Oriented Software Development I","author":"S Katz","year":"2006","unstructured":"Katz, S.: Aspect categories and classes of temporal properties. In: Rashid, A., Aksit, M. (eds.) Transactions on Aspect-Oriented Software Development I. LNCS, vol. 3880, pp. 106\u2013134. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11687061_4"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume-title":"ECOOP\u201997 \u2014 Object-Oriented Programming","author":"G Kiczales","year":"1997","unstructured":"Kiczales, G., et al.: Aspect-oriented programming. In: Ak\u015fit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220\u2013242. Springer, Heidelberg (1997). \nhttps:\/\/doi.org\/10.1007\/BFb0053381"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"K\u00f6nighofer, R., Hofferek, G., Bloem, R.: Debugging formal specifications using simple counterstrategies. In: 2009 Formal Methods in Computer-Aided Design, pp. 152\u2013159. IEEE (2009)","DOI":"10.1109\/FMCAD.2009.5351127"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Kr\u00fcger, J.: Separation of concerns: experiences of the crowd. In: ACM Symposium on Applied Computing, pp. 2076\u20132077. ACM (2018)","DOI":"10.1145\/3167132.3167458"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-29860-8_11","volume-title":"Runtime Verification","author":"FM Maggi","year":"2012","unstructured":"Maggi, F.M., Westergaard, M., Montali, M., van der Aalst, W.M.P.: Runtime verification of LTL-based declarative process models. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol. 7186, pp. 131\u2013146. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-29860-8_11"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Malakuti, S., Aksit, M.: Event-based modularization: how emergent behavioral patterns must be modularized? In: FOAL, pp. 7\u201312 (2014)","DOI":"10.1145\/2588548.2588549"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Maoz, S., Ringert, J.O.: Synthesizing a lego forklift controller in GR (1): a case study. arXiv preprint \narXiv:1602.01172\n\n (2016)","DOI":"10.4204\/EPTCS.202.5"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Maoz, S., Sa\u2019ar, Y.: AspectLTL: an aspect language for LTL specifications. In: AOSD, pp. 19\u201330. ACM (2011)","DOI":"10.1145\/1960275.1960280"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Mezini, M., Ostermann, K.: Variability management with feature-oriented programming and aspects. In: ACM SEN, vol. 29, pp. 127\u2013136. ACM (2004)","DOI":"10.1145\/1041685.1029915"},{"issue":"3","key":"11_CR30","first-page":"33","volume":"3","author":"SI Casas","year":"2009","unstructured":"Casas, S.I., Perez-Schofield, J.B.G., Marcos, C.A.: MEDIATOR: an AOP tool to support conflicts among aspects. Int. J. Softw. Eng. Appl. (IJSEIA) 3(3), 33\u201344 (2009)","journal-title":"Int. J. Softw. Eng. Appl. (IJSEIA)"},{"key":"11_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-540-77050-3_37","volume-title":"FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science","author":"S Schewe","year":"2007","unstructured":"Schewe, S.: Solving parity games in big steps. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, pp. 449\u2013460. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-77050-3_37"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Tahara, Y., Ohsuga, A., Honiden, S.: Formal verification of dynamic evolution processes of UML models using aspects. In: Proceedings of the 12th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp. 152\u2013162. IEEE Press (2017)","DOI":"10.1109\/SEAMS.2017.4"},{"key":"11_CR33","unstructured":"Tourw\u00e9, T., Brichau, J., Gybels, K.: On the existence of the AOSD-evolution paradox. SPLAT (2003)"},{"key":"11_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/978-3-540-71209-1_35","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"Y-K Tsay","year":"2007","unstructured":"Tsay, Y.-K., Chen, Y.-F., Tsai, M.-H., Wu, K.-N., Chan, W.-C.: GOAL: a graphical tool for manipulating B\u00fcchi automata and temporal formulae. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol. 4424, pp. 466\u2013471. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-71209-1_35"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Ubayashi, N., Tamai, T.: Aspect-oriented programming with model checking. In: Proceedings of the 1st International Conference on Aspect-Oriented Software Development, pp. 148\u2013154. ACM (2002)","DOI":"10.1145\/508386.508405"},{"key":"11_CR36","unstructured":"Velan, S.: Introducing artificial intelligence agents to the empirical measurement of design properties for aspect oriented software development. In: 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 80\u201385. IEEE (2019)"},{"issue":"1\u20132","key":"11_CR37","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/S0304-3975(98)00009-7","volume":"200","author":"W Zielonka","year":"1998","unstructured":"Zielonka, W.: Infinite games on finitely coloured graphs with applications to automata on infinite trees. Theor. Comput. Sci. 200(1\u20132), 135\u2013183 (1998)","journal-title":"Theor. Comput. Sci."}],"container-title":["Communications in Computer and Information Science","Computer Science \u2013 CACIC 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-48325-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,13]],"date-time":"2020-05-13T08:05:30Z","timestamp":1589357130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-48325-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030483241","9783030483258"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-48325-8_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CACIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Argentine Congress of Computer Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"R\u00edo Cuarto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Argentina","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cacic2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cacic2019.exa.unrc.edu.ar\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"RedUNCI","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"185","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.05","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}