{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:26:50Z","timestamp":1744604810902,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030582975"},{"type":"electronic","value":"9783030582982"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58298-2_12","type":"book-chapter","created":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T18:04:52Z","timestamp":1598637892000},"page":"272-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Verification of a Failure Management Protocol for Stateful IoT Applications"],"prefix":"10.1007","author":[{"given":"Umar","family":"Ozeer","sequence":"first","affiliation":[]},{"given":"Gwen","family":"Sala\u00fcn","sequence":"additional","affiliation":[]},{"given":"Lo\u00efc","family":"Letondeur","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois-Ga\u00ebl","family":"Ottogalli","sequence":"additional","affiliation":[]},{"given":"Jean-Marc","family":"Vincent","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,29]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Ardekani, M.S., Singh, R.P., Agrawal, N., Terry, D.B., Suminto, R.O.: Rivulet: a fault-tolerant platform for smart-home applications. In: Proceedings of Middleware 2017, pp. 41\u201354. ACM (2017)","DOI":"10.1145\/3135974.3135988"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Boyer, F., Gruber, O., Pous, D.: Robust reconfigurations of component assemblies. In: Proceedings of ICSE 2013, pp. 13\u201322. IEEE Press (2013)","DOI":"10.1109\/ICSE.2013.6606547"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-642-21437-0_10","volume-title":"FM 2011: Formal Methods","author":"F Boyer","year":"2011","unstructured":"Boyer, F., Gruber, O., Sala\u00fcn, G.: Specifying and verifying the SYNERGY reconfiguration protocol with LOTOS\u00a0NT and CADP. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol. 6664, pp. 103\u2013117. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21437-0_10"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/j.jss.2018.02.005","volume":"139","author":"A Brogi","year":"2018","unstructured":"Brogi, A., Canciani, A., Soldani, J.: Fault-aware management protocols for multi-component applications. J. Syst. Softw. 139, 189\u2013210 (2018)","journal-title":"J. Syst. Softw."},{"key":"12_CR5","unstructured":"Champelovier, D., et al.: Reference manual of the LNT to LOTOS translator, version 6.7. Inria (2018)"},{"key":"12_CR6","unstructured":"Delzanno, G.: Formal verification of internet of things protocols. In: Proceedings of FRIDA 2018 (2018)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: Proceedings of ICSE 1999, pp. 411\u2013420. ACM (1999)","DOI":"10.1145\/302405.302672"},{"issue":"3","key":"12_CR8","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/568522.568525","volume":"34","author":"ENM Elnozahy","year":"2002","unstructured":"Elnozahy, E.N.M., Alvisi, L., Wang, Y.-M., Johnson, D.B.: A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv. 34(3), 375\u2013408 (2002)","journal-title":"ACM Comput. Surv."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Etchevers, X., Sala\u00fcn, G., Boyer, F., Coupaye, T., Palma, N.D.: Reliable self-deployment of cloud applications. In: Proceedings of SAC 2014, pp. 1331\u20131338. ACM (2014)","DOI":"10.1145\/2554850.2554951"},{"issue":"1","key":"12_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/spe.2400","volume":"47","author":"X Etchevers","year":"2017","unstructured":"Etchevers, X., Sala\u00fcn, G., Boyer, F., Coupaye, T., Palma, N.D.: Reliable self-deployment of distributed cloud applications. Softw. Pract. Exp. 47(1), 3\u201320 (2017)","journal-title":"Softw. Pract. Exp."},{"issue":"2","key":"12_CR11","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TSE.2010.8","volume":"36","author":"G Friedrich","year":"2010","unstructured":"Friedrich, G., Fugini, M., Mussi, E., Pernici, B., Tagni, G.: Exception handling for repair in service-based processes. IEEE Trans. Softw. Eng. 36(2), 198\u2013215 (2010)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"15","key":"12_CR12","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10009-012-0244-z","volume":"2","author":"H Garavel","year":"2013","unstructured":"Garavel, H., Lang, F., Mateescu, R., Serwe, W.: CADP 2011: a toolbox for the construction and analysis of distributed processes. STTT 2(15), 89\u2013107 (2013)","journal-title":"STTT"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Gia, T.N., Rahmani, A.-M., Westerlund, T., Liljeberg, P., Tenhunen, H.: Fault tolerant and scalable IoT-based architecture for health monitoring. In: Processing of SAS 2015. IEEE (2015)","DOI":"10.1109\/SAS.2015.7133626"},{"key":"12_CR14","unstructured":"ISO: LOTOS \u2013 A formal description technique based on the temporal ordering of observational behaviour. Technical report 8807, ISO (1989)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Krishna, A., Pallec, M.L., Mateescu, R., Noirie, L., Sala\u00fcn, G.: IoT composer: composition and deployment of IoT applications. In: Proceedings of ICSE 2019, pp. 19\u201322. IEEE\/ACM (2019)","DOI":"10.1109\/ICSE-Companion.2019.00028"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Krishna, A., Pallec, M.L., Mateescu, R., Noirie, L., Sala\u00fcn, G.: Rigorous design and deployment of IoT applications. In: Proceedings of FormaliSE 2019, pp. 21\u201330 (2019)","DOI":"10.1109\/FormaliSE.2019.00011"},{"key":"12_CR17","unstructured":"Lampson, B., Sturgis, H.E.: Crash recovery in a distributed data storage system. Technical report, Xerox Palo Alto Research Center (1979)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-540-68237-0_12","volume-title":"FM 2008: Formal Methods","author":"R Mateescu","year":"2008","unstructured":"Mateescu, R., Thivolle, D.: A model checking language for concurrent value-passing systems. In: Cuellar, J., Maibaum, T., Sere, K. (eds.) FM 2008. LNCS, vol. 5014, pp. 148\u2013164. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68237-0_12"},{"key":"12_CR19","volume-title":"Communication and Concurrency","author":"R Milner","year":"1989","unstructured":"Milner, R.: Communication and Concurrency. Prentice Hall, Upper Saddle River (1989)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Ozeer, U., Etchevers, X., Letondeur, L., Ottogalli, F.-G., Sala\u00fcn, G., Vincent, J.-M.: Resilience of stateful IoT applications in a dynamic fog environment. In: Proceedings of MobiQuitous 2018, pp. 332\u2013341. ACM (2018)","DOI":"10.1145\/3286978.3287007"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-36249-1_3","volume-title":"Assurances for Self-Adaptive Systems","author":"G Sala\u00fcn","year":"2013","unstructured":"Sala\u00fcn, G., Etchevers, X., De Palma, N., Boyer, F., Coupaye, T.: Verification of a self-configuration protocol for distributed applications in the cloud. In: C\u00e1mara, J., de Lemos, R., Ghezzi, C., Lopes, A. (eds.) Assurances for Self-Adaptive Systems. LNCS, vol. 7740, pp. 60\u201379. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36249-1_3"},{"issue":"8","key":"12_CR22","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2016.238","volume":"49","author":"D Terry","year":"2016","unstructured":"Terry, D.: Toward a new approach to IoT fault tolerance. Computer 49(8), 80\u201383 (2016)","journal-title":"Computer"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Zhou, S., Lin, K.-J., Na, J., Chuang, C.-C., Shih, C.-S.: Supporting service adaptation in fault tolerant internet of things. In: Proceedings of SOCA 2015, pp. 65\u201372. IEEE (2015)","DOI":"10.1109\/SOCA.2015.38"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Industrial Critical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58298-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T06:04:05Z","timestamp":1707458645000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58298-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030582975","9783030582982"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58298-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FMICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Methods for Industrial Critical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fmics2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fmics20.ait.ac.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}