{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:32:39Z","timestamp":1743067959965,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030912642"},{"type":"electronic","value":"9783030912659"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-91265-9_13","type":"book-chapter","created":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T11:26:47Z","timestamp":1637321207000},"page":"239-257","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Distributed Simplex Architecture for\u00a0Multi-agent Systems"],"prefix":"10.1007","author":[{"given":"Usama","family":"Mehmood","sequence":"first","affiliation":[]},{"given":"Scott D.","family":"Stoller","sequence":"additional","affiliation":[]},{"given":"Radu","family":"Grosu","sequence":"additional","affiliation":[]},{"given":"Shouvik","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Amol","family":"Damare","sequence":"additional","affiliation":[]},{"given":"Scott A.","family":"Smolka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,18]]},"reference":[{"issue":"2","key":"13_CR1","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1109\/TPEL.2018.2828538","volume":"34","author":"M Nasir","year":"2019","unstructured":"Nasir, M., Jin, Z., Khan, H.A., Zaffar, N.A., Vasquez, J.C., Guerrero, J.M.: A decentralized control architecture applied to DC nanogrid clusters for rural electrification in developing regions. IEEE Trans. Power Electron. 34(2), 1773\u20131785 (2019)","journal-title":"IEEE Trans. Power Electron."},{"issue":"1","key":"13_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12008-014-0257-9","volume":"10","author":"Z Boussaada","year":"2014","unstructured":"Boussaada, Z., Curea, O., Camblong, H., Bellaaj Mrabet, N., Hacala, A.: Multi-agent systems for the dependability and safety of microgrids. Int. J. Interact. Design Manuf. (IJIDeM) 10(1), 1\u201313 (2014). https:\/\/doi.org\/10.1007\/s12008-014-0257-9","journal-title":"Int. J. Interact. Design Manuf. (IJIDeM)"},{"key":"13_CR3","first-page":"100106","volume":"16","author":"A Tahir","year":"2019","unstructured":"Tahir, A., B\u00f6ling, J., Haghbayan, M.-H., Toivonen, H.T., Plosila, J.: Swarms of unmanned aerial vehicles - a survey. J. Ind. Inf. Integr. 16, 100106 (2019)","journal-title":"J. Ind. Inf. Integr."},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/11428862_94","volume-title":"Computational Science \u2013 ICCS 2005","author":"R Tynan","year":"2005","unstructured":"Tynan, R., O\u2019Hare, G.M.P., Marsh, D., O\u2019Kane, D.: Multi-agent system architectures for wireless sensor networks. In: Sunderam, V.S., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2005. LNCS, vol. 3516, pp. 687\u2013694. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11428862_94"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Seto, D., Sha, L.: A case study on analytical analysis of the inverted pendulum real-time control system. Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, Technical report CMU\/SEI-99-TR-023 (1999)","DOI":"10.21236\/ADA373286"},{"issue":"4","key":"13_CR6","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MS.2001.936213","volume":"18","author":"L Sha","year":"2001","unstructured":"Sha, L.: Using simplicity to control complexity. IEEE Softw. 18(4), 20\u201328 (2001)","journal-title":"IEEE Softw."},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-030-55754-6_6","volume-title":"NASA Formal Methods","author":"DT Phan","year":"2020","unstructured":"Phan, D.T., Grosu, R., Jansen, N., Paoletti, N., Smolka, S.A., Stoller, S.D.: Neural simplex architecture. In: Lee, R., Jha, S., Mavridou, A., Giannakopoulou, D. (eds.) NFM 2020. LNCS, vol. 12229, pp. 97\u2013114. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55754-6_6"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Gurriet, T., Singletary, A., Reher, J., Ciarletta, L., Feron, E., Ames, A.: Towards a framework for realizable safety critical control through active set invariance. In: 2018 ACM\/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS), pp. 98\u2013106 (2018)","DOI":"10.1109\/ICCPS.2018.00018"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.arcontrol.2018.09.006","volume":"46","author":"M Egerstedt","year":"2018","unstructured":"Egerstedt, M., Pauli, J.N., Notomista, G., Hutchinson, S.: Robot ecology: constraint-based control design for long duration autonomy. Annu. Rev. Control. 46, 1\u20137 (2018)","journal-title":"Annu. Rev. Control."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Wang, L., Ames, A.D., Egerstedt, M.: Safety barrier certificates for heterogeneous multi-robot systems. In: 2016 American Control Conference (ACC), pp. 5213\u20135218. IEEE (2016)","DOI":"10.1109\/ACC.2016.7526486"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-540-24743-2_32","volume-title":"Hybrid Systems: Computation and Control","author":"S Prajna","year":"2004","unstructured":"Prajna, S., Jadbabaie, A.: Safety verification of hybrid systems using barrier certificates. In: Alur, R., Pappas, G.J. (eds.) HSCC 2004. LNCS, vol. 2993, pp. 477\u2013492. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24743-2_32"},{"issue":"1","key":"13_CR12","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.automatica.2005.08.007","volume":"42","author":"S Prajna","year":"2006","unstructured":"Prajna, S.: Barrier certificates for nonlinear model validation. Autom. 42(1), 117\u2013126 (2006)","journal-title":"Autom."},{"issue":"12","key":"13_CR13","doi-asserted-by":"publisher","first-page":"462","DOI":"10.3182\/20070822-3-ZA-2920.00076","volume":"40","author":"P Wieland","year":"2007","unstructured":"Wieland, P., Allg\u00f6wer, F.: Constructive safety using control barrier functions. IFAC Proc. Vol. 40(12), 462\u2013467 (2007). 7th IFAC Symposium on Nonlinear Control Systems","journal-title":"IFAC Proc. Vol."},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Ames, A.D., Coogan, S., Egerstedt, M., Notomista, G., Sreenath, K., Tabuada, P.: Control barrier functions: Theory and applications. In: 18th European Control Conference, ECC 2019, pp. 3420\u20133431. IEEE, Naples (2019)","DOI":"10.23919\/ECC.2019.8796030"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Borrmann, U., Wang, L., Ames, A.D., Egerstedt, M.: Control barrier certificates for safe swarm behavior. In: Egerstedt, M., Wardi, Y. (eds.) ADHS. Series IFAC-PapersOnLine, vol. 48, no. 27, pp. 68\u201373. Elsevier (2015)","DOI":"10.1016\/j.ifacol.2015.11.154"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Blanchini, F., Miani, S.: Set-Theoretic Methods in Control. 1st edn. Birkh\u00e4user Basel (2007)","DOI":"10.1007\/978-0-8176-4606-6_1"},{"issue":"11","key":"13_CR17","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1016\/S0005-1098(99)00113-2","volume":"35","author":"F Blanchini","year":"1999","unstructured":"Blanchini, F.: Set invariance in control. Automatica 35(11), 1747\u20131767 (1999)","journal-title":"Automatica"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Wang, L., Han, D., Egerstedt, M.: Permissive barrier certificates for safe stabilization using sum-of-squares. In: 2018 Annual American Control Conference, ACC 2018, pp. 585\u2013590. IEEE (2018)","DOI":"10.23919\/ACC.2018.8431617"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Mehmood, U., et al.: Declarative vs rule-based control for flocking dynamics. In: Proceedings of 33rd Annual ACM Symposium on Applied Computing (2018)","DOI":"10.1145\/3167132.3167222"},{"issue":"4","key":"13_CR20","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/37402.37406","volume":"21","author":"CW Reynolds","year":"1987","unstructured":"Reynolds, C.W.: Flocks, herds and schools: a distributed behavioral model. SIGGRAPH Comput. Graph. 21(4), 25\u201334 (1987)","journal-title":"SIGGRAPH Comput. Graph."},{"issue":"2","key":"13_CR21","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1109\/TPEL.2006.890003","volume":"22","author":"N Pogaku","year":"2007","unstructured":"Pogaku, N., Prodanovic, M., Green, T.C.: Modeling, analysis and testing of autonomous operation of an inverter-based microgrid. IEEE Trans. Power Electron. 22(2), 613\u2013625 (2007)","journal-title":"IEEE Trans. Power Electron."},{"issue":"10","key":"13_CR22","doi-asserted-by":"publisher","first-page":"2457","DOI":"10.1016\/j.automatica.2014.08.009","volume":"50","author":"J Schiffer","year":"2014","unstructured":"Schiffer, J., Ortega, R., Astolfi, A., Raisch, J., Sezi, T.: Conditions for stability of droop-controlled inverter-based microgrids. Automatica 50(10), 2457\u20132469 (2014)","journal-title":"Automatica"},{"issue":"2","key":"13_CR23","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/28.993176","volume":"38","author":"EAA Coelho","year":"2002","unstructured":"Coelho, E.A.A., Cortizo, P.C., Garcia, P.F.D.: Small-signal stability for parallel-connected inverters in stand-alone AC supply systems. IEEE Trans. Ind. Appl. 38(2), 533\u2013542 (2002)","journal-title":"IEEE Trans. Ind. Appl."},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Kundu, S., Geng, S., Nandanoori, S.P., Hiskens, I.A., Kalsi, K.: Distributed barrier certificates for safe operation of inverter-based microgrids. In: 2019 American Control Conference (ACC), pp. 1042\u20131047 (2019)","DOI":"10.23919\/ACC.2019.8815296"},{"key":"13_CR25","unstructured":"Kundur, P., Balu, N., Lauby, M.: Power System Stability and Control. EPRI Power System Engineering Series. McGraw-Hill Education (1994)"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Seto, D., Krogh, B., Sha, L., Chutinan, A.: The simplex architecture for safe online control system upgrades. In: Proceedings of the 1998 American Control Conference, vol. 6, pp. 3504\u20133508 (1998)","DOI":"10.1109\/ACC.1998.703255"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Aiello, M., Berryman, J., Grohs, J., Schierman, J.: Run-time assurance for advanced flight-critical control systems (2010)","DOI":"10.2514\/6.2010-8041"},{"key":"13_CR28","unstructured":"Schierman, J., et al.: Run-time verification and validation for safety-critical flight control systems (2012)"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Lim, Y.J., Hong, G., Shin, D., Jee, E., Bae, D.-H.: A runtime verification framework for dynamically adaptive multi-agent systems. In: 2016 International Conference on Big Data and Smart Computing (BigComp), pp. 509\u2013512 (2016)","DOI":"10.1109\/BIGCOMP.2016.7425981"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Alotaibi, H., Zedan, H.: Runtime verification of safety properties in multi-agents systems. In: 2010 10th International Conference on Intelligent Systems Design and Applications, pp. 356\u2013362 (2010)","DOI":"10.1109\/ISDA.2010.5687238"},{"issue":"8","key":"13_CR31","doi-asserted-by":"publisher","first-page":"3861","DOI":"10.1109\/TAC.2016.2638961","volume":"62","author":"AD Ames","year":"2017","unstructured":"Ames, A.D., Xu, X., Grizzle, J.W., Tabuada, P.: Control barrier function based quadratic programs for safety critical systems. IEEE Trans. Autom. Control 62(8), 3861\u20133876 (2017)","journal-title":"IEEE Trans. Autom. Control"},{"key":"13_CR32","unstructured":"Raju, D., Bharadwaj, S., Topcu, U.: Online synthesis for runtime enforcement of safety in multi-agent systems. Preprint ArXiv:1910.10380 (2019)"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering. Theories, Tools, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-91265-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T11:30:05Z","timestamp":1637321405000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-91265-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030912642","9783030912659"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-91265-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"18 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SETTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Dependable Software Engineering: Theories, Tools, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"setta2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/lcs.ios.ac.cn\/setta2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.05","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.53","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}