{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:55:57Z","timestamp":1743015357874,"version":"3.40.3"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030912642"},{"type":"electronic","value":"9783030912659"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-91265-9_3","type":"book-chapter","created":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T11:26:47Z","timestamp":1637321207000},"page":"40-58","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging Event-B Theories for Handling Domain Knowledge in Design Models"],"prefix":"10.1007","author":[{"given":"Ismail","family":"Mendil","sequence":"first","affiliation":[]},{"given":"Yamine","family":"A\u00eft-Ameur","sequence":"additional","affiliation":[]},{"given":"Neeraj Kumar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Dominique","family":"M\u00e9ry","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Palanque","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,18]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139195881","volume-title":"Modeling in Event-B - System and Software Engineering","author":"JR Abrial","year":"2010","unstructured":"Abrial, J.R.: Modeling in Event-B - System and Software Engineering. Cambridge University Press, Cambridge (2010)"},{"key":"3_CR2","unstructured":"Abrial, J.R., Butler, M., Hallerstede, S., Leuschel, M., Schmalz, M., Voisin, L.: Proposals for mathematical extensions for Event-B. Technical report (2009)"},{"issue":"2","key":"3_CR3","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s00500-015-1633-5","volume":"21","author":"Y A\u00eft Ameur","year":"2017","unstructured":"A\u00eft Ameur, Y., Baron, M., Bellatreche, L., Jean, S., Sardet, E.: Ontologies in engineering: the OntoDB\/OntoQL platform. Soft. Comput. 21(2), 369\u2013389 (2017)","journal-title":"Soft. Comput."},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.scico.2015.12.004","volume":"121","author":"Y A\u00eft Ameur","year":"2016","unstructured":"A\u00eft Ameur, Y., M\u00e9ry, D.: Making explicit domain knowledge in formal system development. Sci. Comput. Program. 121, 100\u2013127 (2016)","journal-title":"Sci. Comput. Program."},{"key":"3_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5054-6","volume-title":"Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems","author":"Y A\u00eft Ameur","year":"2021","unstructured":"A\u00eft Ameur, Y., Nakajima, S., M\u00e9ry, D.: Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-981-15-5054-6"},{"key":"3_CR6","series-title":"International Handbooks on Information Systems","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-24750-0_4","volume-title":"Handbook on Ontologies","author":"G Antoniou","year":"2004","unstructured":"Antoniou, G., van Harmelen, F.: Web ontology language: OWL. In: Staab, S., Studer, R. (eds.) Handbook on Ontologies. International Handbooks on Information Systems, pp. 67\u201392. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24750-0_4"},{"key":"3_CR7","unstructured":"ARINC: ARINC 661 specification: Cockpit Display System Interfaces To User Systems. By AEEC, Published by SAE, 16701 Melford Blvd., Suite 120, Bowie, Maryland 20715 USA, June 2019"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"311","DOI":"10.3233\/AO-2012-0113","volume":"7","author":"P Barlatier","year":"2012","unstructured":"Barlatier, P., Dapoigny, R.: A type-theoretical approach for ontologies: the case of roles. Appl. Ontol. 7, 311\u2013356 (2012)","journal-title":"Appl. Ontol."},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-48119-2_22","volume-title":"FM\u201999 \u2014 Formal Methods","author":"P Behm","year":"1999","unstructured":"Behm, P., Benoit, P., Faivre, A., Meynadier, J.-M.: M\u00e9t\u00e9or: a successful application of b in a large project. In: Wing, J.M., Woodcock, J., Davies, J. (eds.) FM 1999. LNCS, vol. 1708, pp. 369\u2013387. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48119-2_22"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-642-11486-1_24","volume-title":"Perspectives of Systems Informatics","author":"N Benaissa","year":"2010","unstructured":"Benaissa, N., M\u00e9ry, D.: Cryptographic protocols analysis in event B. In: Pnueli, A., Virbitskaite, I., Voronkov, A. (eds.) PSI 2009. LNCS, vol. 5947, pp. 282\u2013293. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11486-1_24"},{"key":"3_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07964-5","volume-title":"Interactive Theorem Proving and Program Development: Coq\u2019Art The Calculus of Inductive Constructions","author":"Y Bertot","year":"2010","unstructured":"Bertot, Y., Castran, P.: Interactive Theorem Proving and Program Development: Coq\u2019Art The Calculus of Inductive Constructions, 1st edn. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-662-07964-5","edition":"1"},{"key":"3_CR12","series-title":"Texts in Theoretical Computer Science. An EATCS Series","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-33653-2","volume-title":"Software Engineering 3 - Domains, Requirements, and Software Design","author":"D Bj\u00f8rner","year":"2006","unstructured":"Bj\u00f8rner, D.: Software Engineering 3 - Domains, Requirements, and Software Design. Texts in Theoretical Computer Science. An EATCS Series, Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/3-540-33653-2"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Bj\u00f8rner, D.: Domain analysis and description principles, techniques, and modelling languages. ACM Trans. Softw. Eng. Methodol. 28(2), 8:1\u20138:67 (2019)","DOI":"10.1145\/3295738"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-030-30446-1_15","volume-title":"Software Engineering and Formal Methods","author":"AD Brucker","year":"2019","unstructured":"Brucker, A.D., Wolff, B.: Isabelle\/DOF: design and implementation. In: \u00d6lveczky, P.C., Sala\u00fcn, G. (eds.) SEFM 2019. LNCS, vol. 11724, pp. 275\u2013292. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30446-1_15"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-030-34968-4_4","volume-title":"Integrated Formal Methods","author":"AD Brucker","year":"2019","unstructured":"Brucker, A.D., Wolff, B.: Using ontologies in formal developments targeting certification. In: Ahrendt, W., Tapia Tarifa, S.L. (eds.) IFM 2019. LNCS, vol. 11918, pp. 65\u201382. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34968-4_4"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-030-58298-2_8","volume-title":"Formal Methods for Industrial Critical Systems","author":"M Butler","year":"2020","unstructured":"Butler, M., et al.: The first twenty-five years of industrial use of the B-method. In: ter Beek, M.H., Ni\u010dkovi\u0107, D. (eds.) FMICS 2020. LNCS, vol. 12327, pp. 189\u2013209. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58298-2_8"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-642-39698-4_5","volume-title":"Theories of Programming and Formal Methods","author":"M Butler","year":"2013","unstructured":"Butler, M., Maamria, I.: Practical theory extension in Event-B. In: Liu, Z., Woodcock, J., Zhu, H. (eds.) Theories of Programming and Formal Methods. LNCS, vol. 8051, pp. 67\u201381. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39698-4_5"},{"key":"3_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.scico.2016.02.003","volume":"126","author":"D Calegari","year":"2016","unstructured":"Calegari, D., Mossakowski, T., Szasz, N.: Heterogeneous verification in the context of model driven engineering. Sci. Comput. Program. 126, 3\u201330 (2016)","journal-title":"Sci. Comput. Program."},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-35786-2_11","volume-title":"Conceptual Structures for STEM Research and Education","author":"R Dapoigny","year":"2013","unstructured":"Dapoigny, R., Barlatier, P.: Modeling ontological structures with type classes in Coq. In: Pfeiffer, H.D., Ignatov, D.I., Poelmans, J., Gadiraju, N. (eds.) ICCS-ConceptStruct 2013. LNCS (LNAI), vol. 7735, pp. 135\u2013152. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35786-2_11"},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/978-1-4939-1887-4_27","volume-title":"Context in Computing","author":"R Dapoigny","year":"2014","unstructured":"Dapoigny, R., Barlatier, P.: Formalizing context for domain ontologies in Coq. In: Br\u00e9zillon, P., Gonzalez, A.J. (eds.) Context in Computing, pp. 437\u2013454. Springer, New York (2014). https:\/\/doi.org\/10.1007\/978-1-4939-1887-4_27"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Dupont, G., A\u00eft-Ameur, Y., Pantel, M., Singh, N.K.: Handling refinement of continuous behaviors: a refinement and proof based approach with Event-B. In: 13th International Symposium TASE, pp. 9\u201316. IEEE Computer Society Press (2019)","DOI":"10.1109\/TASE.2019.00-25"},{"key":"3_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-319-91271-4_11","volume-title":"Abstract State Machines, Alloy, B, TLA, VDM, and Z","author":"G Dupont","year":"2018","unstructured":"Dupont, G., A\u00eft-Ameur, Y., Pantel, M., Singh, N.K.: Proof-based approach to hybrid systems development: dynamic logic and Event-B. In: Butler, M., Raschke, A., Hoang, T.S., Reichl, K. (eds.) ABZ 2018. LNCS, vol. 10817, pp. 155\u2013170. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91271-4_11"},{"key":"3_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-030-48077-6_12","volume-title":"Rigorous State-Based Methods","author":"G Dupont","year":"2020","unstructured":"Dupont, G., A\u00eft-Ameur, Y., Pantel, M., Singh, N.K.: Formally verified architecture patterns of hybrid systems using proof and refinement with Event-B. In: Raschke, A., M\u00e9ry, D., Houdek, F. (eds.) ABZ 2020. LNCS, vol. 12071, pp. 169\u2013185. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-48077-6_12"},{"key":"3_CR24","unstructured":"EUROCONTROL: Airborne collision avoidance system (ACAS) guide, December 2017"},{"key":"3_CR25","unstructured":"Gruber, T.R.: Towards principles for the design of ontologies used for knowledge sharing. In: Guarino, N., Poli, R. (eds.) Formal Ontology in Conceptual Analysis and Knowledge Representation. Kluwer Academic Publisher\u2019s (1993)"},{"key":"3_CR26","unstructured":"Haarslev, V., M\u00f6ller, R.: Description of the RACER system and its applications, vol. 2083, January 2001"},{"key":"3_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-319-47166-2_24","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques","author":"K Hacid","year":"2016","unstructured":"Hacid, K., Ait-Ameur, Y.: Strengthening MDE and formal design models by references to domain ontologies. a model annotation based approach. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9952, pp. 340\u2013357. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47166-2_24"},{"key":"3_CR28","first-page":"1","volume":"74","author":"K Hacid","year":"2017","unstructured":"Hacid, K., A\u00eft Ameur, Y.: Handling domain knowledge in design and analysis of engineering models. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 74, 1\u201321 (2017)","journal-title":"Electron. Commun. Eur. Assoc. Softw. Sci. Technol."},{"key":"3_CR29","series-title":"Springer Briefs in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29825-7","volume-title":"On the Mathematics of Modelling, Metamodelling","author":"B Henderson-Sellers","year":"2012","unstructured":"Henderson-Sellers, B.: On the Mathematics of Modelling, Metamodelling. Springer Briefs in Computer Science, Ontologies and Modelling Languages. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29825-7"},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-981-15-5054-6_2","volume-title":"Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems","author":"TS Hoang","year":"2021","unstructured":"Hoang, T.S., Voisin, L., Butler, M.: Domain-specific developments using rodin theories. In: Ait-Ameur, Y., Nakajima, S., M\u00e9ry, D. (eds.) Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems, pp. 19\u201337. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-5054-6_2"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Mendil, I., Singh, N.K., A\u00eft Ameur, Y., M\u00e9ry, D., Palanque, P.A.: An integrated framework for the formal analysis of critical interactive systems. In: 27th Asia-Pacific Software Engineering Conference, APSEC 2020, Singapore, 1\u20134 December 2020, pp. 139\u2013148. IEEE (2020)","DOI":"10.1109\/APSEC51365.2020.00022"},{"key":"3_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-030-85248-1_8","volume-title":"Formal Methods for Industrial Critical Systems","author":"I Mendil","year":"2021","unstructured":"Mendil, I., A\u00eft-Ameur, Y., Singh, N.K., M\u00e9ry, D., Palanque, P.: Standard conformance-by-construction with Event-B. In: Lluch Lafuente, A., Mavridou, A. (eds.) FMICS 2021. LNCS, vol. 12863, pp. 126\u2013146. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-85248-1_8"},{"key":"3_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-642-24550-3_30","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"D M\u00e9ry","year":"2011","unstructured":"M\u00e9ry, D., Singh, N.K.: Analysis of DSR protocol in Event-B. In: D\u00e9fago, X., Petit, F., Villain, V. (eds.) SSS 2011. LNCS, vol. 6976, pp. 401\u2013415. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-24550-3_30"},{"key":"3_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-3-319-72044-9_2","volume-title":"Recent Trends in Algebraic Development Techniques","author":"T Mossakowski","year":"2017","unstructured":"Mossakowski, T.: The distributed ontology, model and specification language \u2013 DOL. In: James, P., Roggenbach, M. (eds.) WADT 2016. LNCS, vol. 10644, pp. 5\u201310. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72044-9_2"},{"key":"3_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45949-9","volume-title":"Isabelle\/HOL: A Proof Assistant for Higher-order Logic","author":"T Nipkow","year":"2002","unstructured":"Nipkow, T., Wenzel, M., Paulson, L.C.: Isabelle\/HOL: A Proof Assistant for Higher-order Logic. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45949-9"},{"key":"3_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1007\/3-540-55602-8_217","volume-title":"Automated Deduction\u2014CADE-11","author":"S Owre","year":"1992","unstructured":"Owre, S., Rushby, J.M., Shankar, N.: PVS: a prototype verification system. In: Kapur, D. (ed.) CADE 1992. LNCS, vol. 607, pp. 748\u2013752. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-55602-8_217"},{"key":"3_CR37","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-1-4020-8157-6_2","volume-title":"Building the Information Society","author":"G Pierra","year":"2004","unstructured":"Pierra, G.: The PLIB ontology-based approach to data integration. In: Jacquart, R. (ed.) Building the Information Society. IIFIP, vol. 156, pp. 13\u201318. Springer, Boston, MA (2004). https:\/\/doi.org\/10.1007\/978-1-4020-8157-6_2"},{"key":"3_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33170-1","volume-title":"Industrial Deployment of System Engineering Methods","year":"2013","unstructured":"Romanovsky, A.B., Thomas, M. (eds.): Industrial Deployment of System Engineering Methods. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-33170-1"},{"key":"3_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5260-6","volume-title":"Using Event-B for Critical Device Software Systems","author":"NK Singh","year":"2013","unstructured":"Singh, N.K.: Using Event-B for Critical Device Software Systems. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-1-4471-5260-6"},{"key":"3_CR40","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-981-15-5054-6_5","volume-title":"Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems","author":"NK Singh","year":"2021","unstructured":"Singh, N.K., Ait-Ameur, Y., M\u00e9ry, D.: Formal ontological analysis for medical protocols. In: Ait-Ameur, Y., Nakajima, S., M\u00e9ry, D. (eds.) Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems, pp. 83\u2013107. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-5054-6_5"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Singh, N.K., A\u00eft Ameur, Y., Pantel, M., Dieumegard, A., Jenn, E.: Stepwise formal modeling and verification of self-adaptive systems with event-b. the automatic rover protection case study. In: 21st International Conference on Engineering of Complex Computer Systems, ICECCS, pp. 43\u201352 (2016)","DOI":"10.1109\/ICECCS.2016.015"},{"key":"3_CR42","unstructured":"Sirin, E., Parsia, B.: Pellet: an OWL DL reasoner. In: Description Logics, pp. 212\u2013213 (2004)"},{"key":"3_CR43","unstructured":"ED 143 - Minimum Operational Performance Standards for Traffic Alert and Collision Avoidance System II (TCAS II) (2013)"},{"key":"3_CR44","unstructured":"U.S. Department of transportation, F.A.A.: Introduction to TCAS 2, version 7.1, February 2011"},{"key":"3_CR45","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-981-15-5054-6_3","volume-title":"Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems","author":"S Tueno","year":"2021","unstructured":"Tueno, S., Laleau, R., Mammar, A., Frappier, M.: Integrating domain modeling within a formal requirements engineering method. In: Ait-Ameur, Y., Nakajima, S., M\u00e9ry, D. (eds.) Implicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems, pp. 39\u201358. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-5054-6_3"},{"issue":"1","key":"3_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/237432.237434","volume":"6","author":"P Zave","year":"1997","unstructured":"Zave, P., Jackson, M.: Four dark corners of requirements engineering. ACM Trans. Softw. Eng. Methodol. 6(1), 1\u201330 (1997)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"4","key":"3_CR47","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s10009-016-0421-6","volume":"19","author":"F Zoubeyr","year":"2017","unstructured":"Zoubeyr, F., A\u00eft Ameur, Y., Ouederni, M., Tari, A.: A correct-by-construction model for asynchronously communicating systems. Int. J. Softw. Tools Technol. Transf. 19(4), 465\u2013485 (2017)","journal-title":"Int. J. Softw. Tools Technol. Transf."}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering. Theories, Tools, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-91265-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T11:30:58Z","timestamp":1637321458000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-91265-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030912642","9783030912659"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-91265-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"18 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SETTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Dependable Software Engineering: Theories, Tools, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"setta2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/lcs.ios.ac.cn\/setta2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.05","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.53","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}