{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:55:37Z","timestamp":1742914537150,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578831"},{"type":"electronic","value":"9783030578848"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57884-8_4","type":"book-chapter","created":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T13:44:40Z","timestamp":1598881480000},"page":"38-48","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Formal Method for Safety Time Series Simulation of Aerospace"],"prefix":"10.1007","author":[{"given":"Ti","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Jinying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Miao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,1]]},"reference":[{"key":"4_CR1","volume-title":"C++ Primer","author":"SB Lippman","year":"2005","unstructured":"Lippman, S.B., Lajoie, J.: C++ Primer, 4th edn. Addison-Wesley Professional, Boston (2005)","edition":"4"},{"key":"4_CR2","volume-title":"Introduction to Algorithms","author":"TH Cormen","year":"2009","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 3rd edn. The MIT Press, Cambridge (2009)","edition":"3"},{"key":"4_CR3","volume-title":"Communication and Concurrency","author":"R Milner","year":"1989","unstructured":"Milner, R.: Communication and Concurrency. Prentice-Hall, New Jersey (1989)"},{"issue":"2","key":"4_CR4","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1023\/A:1010064516533","volume":"11","author":"G Boudol","year":"1998","unstructured":"Boudol, G.: The $$\\pi $$-calculus in direct style. High. Order Symbolic Comput. 11(2), 177\u2013208 (1998)","journal-title":"High. Order Symbolic Comput."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Kim, D., Ciesielski, S.K. et al.: Temporal parallel gate-level timing simulation. In: IEEE International High Level Design Validation & Test Workshop. IEEE (2008)","DOI":"10.1109\/HLDVT.2008.4695886"},{"issue":"2","key":"4_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.entcs.2007.11.004","volume":"194","author":"B Haagensen","year":"2008","unstructured":"Haagensen, B., Maffeis, S., Phillips, I.: Matching Systems for Concurrent Calculi. Electron. Notes Theor. Comput. Sci. 194(2), 85\u201399 (2008)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"issue":"1","key":"4_CR7","first-page":"7","volume":"41","author":"Z Fei","year":"2014","unstructured":"Fei, Z., Yong, Z., Liu, Y., et al.: A temporal and fuzzy logic inference based method for power system fault diagnosis. J. North China Electric Power Univ. 41(1), 7\u201314 (2014)","journal-title":"J. North China Electric Power Univ."},{"key":"4_CR8","unstructured":"Khan, A.I, Alam, M.M., Noor-ul-Qayyum, et al.: Validation of component based software development model using formal B-method. Int. J. Comput. Appl. 67(9), 24\u201339 (2013)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Voorhees, B.H.: Time Series Simulation: Computational Analysis Of One-Dimensional Cellular Automata. World Scientific, pp. 208\u2013219 (1995)","DOI":"10.1142\/9789812798671_0012"},{"issue":"2","key":"4_CR10","doi-asserted-by":"publisher","first-page":"307","DOI":"10.32604\/cmc.2018.03693","volume":"57","author":"X Tang","year":"2018","unstructured":"Tang, X., Juan, X., Duan, B.: A memory-efficient simulation method of Grover\u2019s search algorithm. Comput. Mater. Continua 57(2), 307\u2013319 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"4_CR11","doi-asserted-by":"publisher","first-page":"97","DOI":"10.32604\/cmc.2018.03511","volume":"57","author":"L Liu","year":"2018","unstructured":"Liu, L., Li, W., Jia, H.: Method of time series similarity measurement based on dynamic time warping. Comput. Mater. Continua 57(1), 97\u2013106 (2018)","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"4_CR12","first-page":"169","volume":"56","author":"LV Vanegas-Useche","year":"2018","unstructured":"Vanegas-Useche, L.V., Abdel-Wahab, M.M., Parker, G.A.: Determination of the normal contact stiffness and integration time step for the finite element modeling of bristle-surface interaction. Comput. Mater. Continua 56(1), 169\u2013184 (2018)","journal-title":"Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57884-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T13:45:40Z","timestamp":1598881540000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57884-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030578831","9783030578848"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57884-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hohhot","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}