{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T17:19:23Z","timestamp":1763227163179,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031150074"},{"type":"electronic","value":"9783031150081"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15008-1_15","type":"book-chapter","created":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T23:02:47Z","timestamp":1662332567000},"page":"226-243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Multi-level Methodology for\u00a0Behavioral Comparison of\u00a0Software-Intensive Systems"],"prefix":"10.1007","author":[{"given":"Dennis","family":"Hendriks","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Arjan van der","family":"Meer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Wytse","family":"Oortwijn","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,9,5]]},"reference":[{"issue":"3","key":"15_CR1","doi-asserted-by":"publisher","first-page":"657","DOI":"10.2298\/CSIS200131013B","volume":"18","author":"D Bera","year":"2021","unstructured":"Bera, D., Schuts, M., Hooman, J., Kurtev, I.: Reverse engineering models of software interfaces. Comput. Sci. Inf. Syst. 18(3), 657\u2013686 (2021). https:\/\/doi.org\/10.2298\/CSIS200131013B","journal-title":"Comput. Sci. Inf. Syst."},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Cleaveland, R., Sokolsky, O.: Equivalence and Preorder checking for finite-state systems. In: Handbook of Process Algebra, pp. 391\u2013424 (2001). https:\/\/doi.org\/10.1016\/B978-044482830-9\/50024-2","DOI":"10.1016\/B978-044482830-9\/50024-2"},{"issue":"5","key":"15_CR3","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/S0019-9958(67)91165-5","volume":"10","author":"EM Gold","year":"1967","unstructured":"Gold, E.M.: Language identification in the limit. Inf. Control 10(5), 447\u2013474 (1967). https:\/\/doi.org\/10.1016\/S0019-9958(67)91165-5","journal-title":"Inf. Control"},{"key":"15_CR4","doi-asserted-by":"publisher","unstructured":"Gulzar, M.A., Zhu, Y., Han, X.: Perception and practices of differential testing. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), pp. 71\u201380. IEEE (2019). https:\/\/doi.org\/10.1109\/ICSE-SEIP.2019.00016","DOI":"10.1109\/ICSE-SEIP.2019.00016"},{"key":"15_CR5","unstructured":"Hendriks, D., van der Meer, A., Oortwijn, W.: A multi-level methodology for behavioral comparison of software-intensive systems. arxiv (2022). https:\/\/doi.org\/10.48550\/arxiv.2205.08201"},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"De la Higuera, C.: Grammatical Inference: Learning Automata and Grammars. Cambridge University Press, New York (2010). https:\/\/doi.org\/10.1017\/CBO9781139194655","DOI":"10.1017\/CBO9781139194655"},{"key":"15_CR7","doi-asserted-by":"publisher","unstructured":"Hooimeijer, B., Geilen, M., Groote, J.F., Hendriks, D., Schiffelers, R.: Constructive Model Inference: model learning for component-based software architectures. In: Proceedings of the 17th International Conference on Software Technologies - ICSOFT, pp. 146\u2013158 (2022). https:\/\/doi.org\/10.5220\/0011145700003266","DOI":"10.5220\/0011145700003266"},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Hopcroft, J.: An n log n algorithm for minimizing states in a finite automaton. In: Theory of Machines and Computations, pp. 189\u2013196. Elsevier (1971). https:\/\/doi.org\/10.1016\/B978-0-12-417750-5.50022-1","DOI":"10.1016\/B978-0-12-417750-5.50022-1"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-96562-8_5","volume-title":"Machine Learning for Dynamic Software Analysis: Potentials and Limits","author":"F Howar","year":"2018","unstructured":"Howar, F., Steffen, B.: Active automata learning in practice. In: Bennaceur, A., H\u00e4hnle, R., Meinke, K. (eds.) Machine Learning for Dynamic Software Analysis: Potentials and Limits. LNCS, vol. 11026, pp. 123\u2013148. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96562-8_5"},{"key":"15_CR10","doi-asserted-by":"publisher","unstructured":"Kelter, U., Schmidt, M.: Comparing state machines. In: Proceedings of the 2008 International Workshop on Comparison and Versioning of Software Models, pp. 1\u20136 (2008). https:\/\/doi.org\/10.1145\/1370152.1370154","DOI":"10.1145\/1370152.1370154"},{"key":"15_CR11","doi-asserted-by":"publisher","unstructured":"Klusener, S., Mooij, A., Ketema, J., Van Wezep, H.: Reducing code duplication by identifying fresh domain abstractions. In: 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 569\u2013578. IEEE (2018). https:\/\/doi.org\/10.1109\/ICSME.2018.00020","DOI":"10.1109\/ICSME.2018.00020"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0054059","volume-title":"Grammatical Inference","author":"KJ Lang","year":"1998","unstructured":"Lang, K.J., Pearlmutter, B.A., Price, R.A.: Results of the Abbadingo one DFA learning competition and a new evidence-driven state merging algorithm. In: Honavar, V., Slutzki, G. (eds.) ICGI 1998. LNCS, vol. 1433, pp. 1\u201312. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0054059"},{"issue":"9","key":"15_CR13","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1109\/PROC.1980.11805","volume":"68","author":"MM Lehman","year":"1980","unstructured":"Lehman, M.M.: Programs, life cycles, and laws of software evolution. Proc. IEEE 68(9), 1060\u20131076 (1980). https:\/\/doi.org\/10.1109\/PROC.1980.11805","journal-title":"Proc. IEEE"},{"key":"15_CR14","unstructured":"McIlroy, M.D., Buxton, J., Naur, P., Randell, B.: Mass produced software components. In: Proceedings of the 1st International Conference on Software Engineering, Garmisch Partenkirchen, Germany, pp. 88\u201398 (1968)"},{"key":"15_CR15","doi-asserted-by":"publisher","unstructured":"Nejati, S., Sabetzadeh, M., Chechik, M., Easterbrook, S., Zave, P.: Matching and merging of Statecharts specifications. In: 29th International Conference on Software Engineering (ICSE 2007), pp. 54\u201364. IEEE (2007). https:\/\/doi.org\/10.1109\/ICSE.2007.50","DOI":"10.1109\/ICSE.2007.50"},{"issue":"6","key":"15_CR16","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1137\/0216062","volume":"16","author":"R Paige","year":"1987","unstructured":"Paige, R., Tarjan, R.E.: Three partition refinement algorithms. SIAM J. Comput. 16(6), 973\u2013989 (1987). https:\/\/doi.org\/10.1137\/0216062","journal-title":"SIAM J. Comput."},{"key":"15_CR17","doi-asserted-by":"publisher","unstructured":"Quante, J., Koschke, R.: Dynamic protocol recovery. In: 14th Working Conference on Reverse Engineering (WCRE 2007), pp. 219\u2013228. IEEE (2007). https:\/\/doi.org\/10.1109\/WCRE.2007.24","DOI":"10.1109\/WCRE.2007.24"},{"issue":"2","key":"15_CR18","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Emp. Softw. Eng. 14(2), 131\u2013164 (2009). https:\/\/doi.org\/10.1007\/s10664-008-9102-8","journal-title":"Emp. Softw. Eng."},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-319-33693-0_20","volume-title":"Integrated Formal Methods","author":"M Schuts","year":"2016","unstructured":"Schuts, M., Hooman, J., Vaandrager, F.: Refactoring of legacy software using model learning and equivalence checking: an industrial experience report. In: \u00c1brah\u00e1m, E., Huisman, M. (eds.) IFM 2016. LNCS, vol. 9681, pp. 311\u2013325. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33693-0_20"},{"key":"15_CR20","unstructured":"Sipser, M.: Introduction to the Theory of Computation. Cengage Learning, 3rd edn. Cengage, Boston (2013)"},{"issue":"4","key":"15_CR21","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","volume":"45","author":"M Sokolova","year":"2009","unstructured":"Sokolova, M., Lapalme, G.: A systematic analysis of performance measures for classification tasks. Inf. Process. Manag. 45(4), 427\u2013437 (2009). https:\/\/doi.org\/10.1016\/j.ipm.2009.03.002","journal-title":"Inf. Process. Manag."},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/11691372_28","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"O Sokolsky","year":"2006","unstructured":"Sokolsky, O., Kannan, S., Lee, I.: Simulation-based graph similarity. In: Hermanns, H., Palsberg, J. (eds.) TACAS 2006. LNCS, vol. 3920, pp. 426\u2013440. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11691372_28"},{"issue":"5","key":"15_CR23","doi-asserted-by":"publisher","first-page":"4097","DOI":"10.1007\/s10664-020-09858-z","volume":"25","author":"M-A Storey","year":"2020","unstructured":"Storey, M.-A., Ernst, N.A., Williams, C., Kalliamvakou, E.: The who, what, how of software engineering research: a socio-technical framework. Emp. Softw. Eng. 25(5), 4097\u20134129 (2020). https:\/\/doi.org\/10.1007\/s10664-020-09858-z","journal-title":"Emp. Softw. Eng."},{"key":"15_CR24","unstructured":"Szyperski, C., Gruntz, D., Murer, S.: Component Software: Beyond Object-Oriented Programming. 2nd edn. Pearson Education, Upper Saddle River (2002)"},{"key":"15_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-540-70844-5_17","volume-title":"Implementation and Applications of Automata","author":"R Van Glabbeek","year":"2008","unstructured":"Van Glabbeek, R., Ploeger, B.: Five Determinisation Algorithms. In: Ibarra, O.H., Ravikumar, B. (eds.) CIAA 2008. LNCS, vol. 5148, pp. 161\u2013170. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70844-5_17"},{"key":"15_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/3-540-57208-2_6","volume-title":"CONCUR\u201993","author":"RJ Van Glabbeek","year":"1993","unstructured":"Van Glabbeek, R.J.: The linear time \u2014 branching time spectrum II. In: Best, E. (ed.) CONCUR 1993. LNCS, vol. 715, pp. 66\u201381. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-57208-2_6"},{"issue":"8","key":"15_CR27","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/859670.859671","volume":"46","author":"P Vitharana","year":"2003","unstructured":"Vitharana, P.: Risks and challenges of component-based software developmen. Commun. ACM 46(8), 67\u201372 (2003). https:\/\/doi.org\/10.1145\/859670.859671","journal-title":"Commun. ACM"},{"issue":"2","key":"15_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2430545.2430549","volume":"22","author":"N Walkinshaw","year":"2013","unstructured":"Walkinshaw, N., Bogdanov, K.: Automated comparison of state-based software models in terms of their language and structure. ACM Trans. Softw. Eng. Methodol. 22(2), 1\u201337 (2013). https:\/\/doi.org\/10.1145\/2430545.2430549","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"15_CR29","doi-asserted-by":"publisher","unstructured":"Yang, N., Cuijper, P., Schiffelers, R., Lukkien, J., Serebrenik, A.: An interview study of how developers use execution logs in embedded software engineering. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), pp. 61\u201370. IEEE (2021). https:\/\/doi.org\/10.1109\/ICSE-SEIP52600.2021.00015","DOI":"10.1109\/ICSE-SEIP52600.2021.00015"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Industrial Critical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15008-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T23:09:57Z","timestamp":1662332997000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15008-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031150074","9783031150081"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15008-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"5 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FMICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Methods for Industrial Critical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Warsaw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fmics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fmics2022.fsa.win.tue.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}