{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T02:17:04Z","timestamp":1772677024162,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030880804","type":"print"},{"value":"9783030880811","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88081-1_20","type":"book-chapter","created":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T11:07:08Z","timestamp":1632913628000},"page":"264-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Exploration Strategies for Model Checking with Ant Colony Optimization"],"prefix":"10.1007","author":[{"given":"Tsutomu","family":"Kumazawa","sequence":"first","affiliation":[]},{"given":"Munehiro","family":"Takimoto","sequence":"additional","affiliation":[]},{"given":"Yasushi","family":"Kambayashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","unstructured":"Alba, E., Chicano, F.: ACOhg: dealing with huge graphs. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 10\u201317 (2007). https:\/\/doi.org\/10.1145\/1276958.1276961","DOI":"10.1145\/1276958.1276961"},{"key":"20_CR2","doi-asserted-by":"publisher","unstructured":"Alba, E., Chicano, F.: Finding safety errors with ACO. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 1066\u20131073 (2007). https:\/\/doi.org\/10.1145\/1276958.1277171","DOI":"10.1145\/1276958.1277171"},{"key":"20_CR3","doi-asserted-by":"publisher","unstructured":"Alba, E., Troya, J.M.: Genetic algorithms for protocol validation. In: Proceedings of the 4th International Conference on Parallel Problem Solving from Nature, pp. 870\u2013879 (1996). https:\/\/doi.org\/10.1007\/3-540-61723-X_1050","DOI":"10.1007\/3-540-61723-X_1050"},{"issue":"6","key":"20_CR4","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.ipl.2007.11.015","volume":"106","author":"F Chicano","year":"2008","unstructured":"Chicano, F., Alba, E.: Ant colony optimization with partial order reduction for discovering safety property violations in concurrent models. Inf. Process. Lett. 106(6), 221\u2013231 (2008). https:\/\/doi.org\/10.1016\/j.ipl.2007.11.015","journal-title":"Inf. Process. Lett."},{"key":"20_CR5","doi-asserted-by":"publisher","unstructured":"Chicano, F., Alba, E.: Finding liveness errors with ACO. In: Proceedings of the IEEE Congress on Evolutionary Computation, pp. 2997\u20133004 (2008). https:\/\/doi.org\/10.1109\/CEC.2008.4631202","DOI":"10.1109\/CEC.2008.4631202"},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Chicano, F., Ferreira, M., Alba, E.: Comparing metaheuristic algorithms for error detection in Java programs. In: Proceedings of the Third International Conference on Search Based Software Engineering, pp. 82\u201396 (2011). https:\/\/doi.org\/10.1007\/978-3-642-23716-4_11","DOI":"10.1007\/978-3-642-23716-4_11"},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/BFb0025774","volume-title":"Logics of Programs","author":"EM Clarke","year":"1982","unstructured":"Clarke, E.M., Emerson, E.A.: Design and synthesis of synchronization skeletons using branching time temporal logic. In: Kozen, D. (ed.) Logic of Programs 1981. LNCS, vol. 131, pp. 52\u201371. Springer, Heidelberg (1982). https:\/\/doi.org\/10.1007\/BFb0025774"},{"key":"20_CR8","volume-title":"Model Checking","author":"EM Clarke Jr","year":"2018","unstructured":"Clarke, E.M., Jr., Grumberg, O., Kroening, D., Peled, D., Veith, H.: Model Checking, 2nd edn. MIT Press, Cambridge (2018)","edition":"2"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Dorigo, M., St\u00fctzle, T.: Ant Colony Optimization. MIT Press, Bradford Company (2004)","DOI":"10.7551\/mitpress\/1290.001.0001"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-00431-5_5","volume-title":"Model Checking and Artificial Intelligence","author":"S Edelkamp","year":"2009","unstructured":"Edelkamp, S., Schuppan, V., Bo\u0161na\u010dki, D., Wijs, A., Fehnker, A., Aljazzar, H.: Survey on directed model checking. In: Peled, D.A., Wooldridge, M.J. (eds.) MoChArt 2008. LNCS (LNAI), vol. 5348, pp. 65\u201389. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00431-5_5"},{"key":"20_CR11","unstructured":"Ferreira, M., Chicano, F., Alba, E., G\u00f3mez-Pulido, J.A.: Detecting protocol errors using particle swarm optimization with Java pathfinder. In: Proceedings of the High Performance Computing & Simulation Conference, pp. 319\u2013325 (2008)"},{"key":"20_CR12","doi-asserted-by":"publisher","unstructured":"Francesca, G., Santone, A., Vaglini, G., Villani, M.L.: Ant colony optimization for deadlock detection in concurrent systems. In: Proceedings of IEEE 35th Annual Computer Software and Applications Conference, pp. 108\u2013117. IEEE Computer Society (2011). https:\/\/doi.org\/10.1109\/COMPSAC.2011.22","DOI":"10.1109\/COMPSAC.2011.22"},{"issue":"1","key":"20_CR13","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1145\/2379776.2379787","volume":"45","author":"M Harman","year":"2012","unstructured":"Harman, M., Mansouri, S.A., Zhang, Y.: Search-based software engineering: trends, techniques and applications. ACM Comput. Surv. 45(1), 111\u20131161 (2012). https:\/\/doi.org\/10.1145\/2379776.2379787","journal-title":"ACM Comput. Surv."},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1016\/j.swevo.2018.06.002","volume":"44","author":"T Kumazawa","year":"2019","unstructured":"Kumazawa, T., Takada, K., Takimoto, M., Kambayashi, Y.: Ant colony optimization based model checking extended by smell-like pheromone with hop counts. Swarm Evol. Comput. 44, 511\u2013521 (2019). https:\/\/doi.org\/10.1016\/j.swevo.2018.06.002","journal-title":"Swarm Evol. Comput."},{"key":"20_CR15","doi-asserted-by":"publisher","unstructured":"Kumazawa, T., Takimoto, M., Kambayashi, Y.: A survey on the applications of swarm intelligence to software verification. In: Handbook of Research on Fireworks Algorithms and Swarm Intelligence, pp. 376\u2013398 (2020). https:\/\/doi.org\/10.4018\/978-1-7998-1659-1.ch017","DOI":"10.4018\/978-1-7998-1659-1.ch017"},{"key":"20_CR16","doi-asserted-by":"publisher","unstructured":"Kumazawa, T., Yokoyama, C., Takimoto, M., Kambayashi, Y.: Ant colony optimization based model checking extended by smell-like pheromone. EAI Endorsed Trans. Ind. Netw. Intell. Syst. 16(7) (2016). https:\/\/doi.org\/10.4108\/eai.21-4-2016.151156","DOI":"10.4108\/eai.21-4-2016.151156"},{"key":"20_CR17","volume-title":"Concurrency: State Models & Java Programming","author":"J Magee","year":"2006","unstructured":"Magee, J., Kramer, J.: Concurrency: State Models & Java Programming, 2nd edn. Wiley, Hoboken (2006)","edition":"2"},{"issue":"4","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3149485.3149495","volume":"42","author":"RM Milewicz","year":"2018","unstructured":"Milewicz, R.M., Poulding, S.: Scalable parallel model checking via Monte-Carlo tree search. ACM SIGSOFT Softw. Eng. Notes 42(4), 1\u20135 (2018). https:\/\/doi.org\/10.1145\/3149485.3149495","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"20_CR19","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.jss.2017.05.128","volume":"131","author":"E Pira","year":"2017","unstructured":"Pira, E., Rafe, V., Nikanjam, A.: Deadlock detection in complex software systems specified through graph transformation using Bayesian optimization algorithm. J. Syst. Softw. 131, 181\u2013200 (2017). https:\/\/doi.org\/10.1016\/j.jss.2017.05.128","journal-title":"J. Syst. Softw."},{"key":"20_CR20","doi-asserted-by":"publisher","unstructured":"Poulding, S., Feldt, R.: Heuristic model checking using a Monte-Carlo tree search algorithm. In: Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, pp. 1359\u20131366 (2015). https:\/\/doi.org\/10.1145\/2739480.2754767","DOI":"10.1145\/2739480.2754767"},{"issue":"12","key":"20_CR21","doi-asserted-by":"publisher","first-page":"4531","DOI":"10.1007\/s00500-018-3444-y","volume":"23","author":"V Rafe","year":"2019","unstructured":"Rafe, V., Darghayedi, M., Pira, E.: MS-ACO: a multi-stage ant colony optimization to refute complex software systems specified through graph transformation. Soft Comput. 23(12), 4531\u20134556 (2019). https:\/\/doi.org\/10.1007\/s00500-018-3444-y","journal-title":"Soft Comput."},{"key":"20_CR22","doi-asserted-by":"publisher","unstructured":"Rafe, V., Moradi, M., Yousefian, R., Nikanjam, A.: A meta-heuristic solution for automated refutation of complex software systems specified through graph transformations. Appl. Soft Comput. 33(C), 136\u2013149 (2015). https:\/\/doi.org\/10.1016\/j.asoc.2015.04.032","DOI":"10.1016\/j.asoc.2015.04.032"},{"issue":"2","key":"20_CR23","doi-asserted-by":"publisher","first-page":"189","DOI":"10.22044\/jadm.2019.7564.1900","volume":"8","author":"N Rezaee","year":"2020","unstructured":"Rezaee, N., Momeni, H.: A hybrid meta-heuristic approach to cope with state space explosion in model checking technique for deadlock freeness. J. AI Data Min. 8(2), 189\u2013199 (2020). https:\/\/doi.org\/10.22044\/jadm.2019.7564.1900","journal-title":"J. AI Data Min."},{"key":"20_CR24","doi-asserted-by":"publisher","unstructured":"Staunton, J., Clark, J.A.: Searching for safety violations using estimation of distribution algorithms. In: Proceedings of the 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, pp. 212\u2013221 (2010). https:\/\/doi.org\/10.1109\/ICSTW.2010.24","DOI":"10.1109\/ICSTW.2010.24"},{"key":"20_CR25","doi-asserted-by":"publisher","unstructured":"Staunton, J., Clark, J.A.: Finding short counterexamples in promela models using estimation of distribution algorithms. In: Proceedings of the 13th Annual Conference on Genetic and Evolutionary Computation, pp. 1923\u20131930 (2011). https:\/\/doi.org\/10.1145\/2001576.2001834","DOI":"10.1145\/2001576.2001834"},{"issue":"2","key":"20_CR26","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1137\/0201010","volume":"1","author":"R Tarjan","year":"1972","unstructured":"Tarjan, R.: Depth first search and linear graph algorithms. SIAM J. Comput. 1(2), 146\u2013160 (1972)","journal-title":"SIAM J. Comput."},{"key":"20_CR27","unstructured":"Vardi, M.Y., Wolper, P.: An automata-theoretic approach to automatic program verification. In: Proceedings of the First Symposium on Logic in Computer Science, pp. 322\u2013331 (1986)"},{"key":"20_CR28","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.asoc.2014.06.055","volume":"24","author":"R Yousefian","year":"2014","unstructured":"Yousefian, R., Rafe, V., Rahmani, M.: A heuristic solution for model checking graph transformation systems. Appl. Soft Comput. 24, 169\u2013180 (2014). https:\/\/doi.org\/10.1016\/j.asoc.2014.06.055","journal-title":"Appl. Soft Comput."}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88081-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,29]],"date-time":"2021-09-29T11:14:43Z","timestamp":1632914083000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88081-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030880804","9783030880811"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88081-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"30 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccci.pwr.edu.pl\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"231","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}