{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T17:41:54Z","timestamp":1749318114186,"version":"3.40.3"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031479625"},{"type":"electronic","value":"9783031479632"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-47963-2_16","type":"book-chapter","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T21:41:26Z","timestamp":1700689286000},"page":"256-275","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Reactive Synthesis Using Mode Decomposition"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9427-9345","authenticated-orcid":false,"given":"Mat\u00edas","family":"Brizzio","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3927-4773","authenticated-orcid":false,"given":"C\u00e9sar","family":"S\u00e1nchez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,23]]},"reference":[{"key":"16_CR1","unstructured":"The reactive synthesis competition. https:\/\/www.syntcomp.org\/"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Alur, R., Torre, S.L.: Deterministic generators and games for LTL fragments. In: Proceedings of the LICS\u201901, pp. 291\u2013300. ACM (2001)","DOI":"10.1109\/LICS.2001.932505"},{"key":"16_CR3","doi-asserted-by":"publisher","unstructured":"Balachander, M., Filiot, E., Raskin, J.F.: LTL reactive synthesis with a few hints. In: Sankaranarayanan, S., Sharygina, N. (eds.) Tools and Algorithms for the Construction and Analysis of Systems. TACAS 2023. LNCS, vol. 13994, pp. 309\u2013328. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30820-8_20","DOI":"10.1007\/978-3-031-30820-8_20"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Bansal, S., Li, Y., Tabajara, L.M., Vardi, M.Y.: Hybrid compositional reasoning for reactive synthesis from finite-horizon specifications. In: AAAI\u201920 (2020)","DOI":"10.1609\/aaai.v34i06.6528"},{"key":"16_CR5","unstructured":"Bharadwaj, R., Heitmeyer, C.: Applying the SCR requirements method to a simple autopilot. In: NASA Conference Publication, pp. 87\u2013102. NASA (1997)"},{"issue":"3","key":"16_CR6","first-page":"911","volume":"78","author":"R Bloem","year":"2012","unstructured":"Bloem, R., Jobstmann, B., Piterman, N., Pnueli, A., Sa\u2019ar, Y.: Synthesis of reactive(1) designs. JCSS 78(3), 911\u2013938 (2012)","journal-title":"JCSS"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Brizzio, M., Cordy, M., Papadakis, M., S\u00e1nchez, C., Aguirre, N., Degiovanni, R.: Automated repair of unrealisable LTL specifications guided by model counting. In: Proceedings of the GECCO\u201923, pp. 1499\u20131507. ACM (2023)","DOI":"10.1145\/3583131.3590454"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Bultan, T.: Action language: a specification language for model checking reactive systems. In: In: Proceedings of the ICSE, pp. 335\u2013344 (2000)","DOI":"10.1145\/337180.337219"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Carvalho, L., et al.: ACoRe: automated goal-conflict resolution. In: In: Proceedings of the FASE\u201923 (2023)","DOI":"10.1007\/978-3-031-30826-0_1"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/3-540-55719-9_97","volume-title":"Automata, Languages and Programming","author":"E Chang","year":"1992","unstructured":"Chang, E., Manna, Z., Pnueli, A.: Characterization of temporal property classes. In: Kuich, W. (ed.) ICALP 1992. LNCS, vol. 623, pp. 474\u2013486. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-55719-9_97"},{"key":"16_CR11","unstructured":"Church, A.: Logic, arithmetic, and automata (1962)"},{"key":"16_CR12","doi-asserted-by":"publisher","unstructured":"Church, A.: Application of recursive arithmetic to the problem of circuit synthesis. J. Symb. Log. 28(4), 289\u2013290 (1963). https:\/\/doi.org\/10.2307\/2271310","DOI":"10.2307\/2271310"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"De Giacomo, G., Favorito, M.: Compositional approach to translate LTLf\/LDLf into deterministic finite automata. In: Proceedings of the ICAPS\u201921, pp. 122\u2013130 (2021)","DOI":"10.1609\/icaps.v31i1.15954"},{"key":"16_CR14","unstructured":"De Giacomo, G., Vardi, M.Y.: Linear temporal logic and linear dynamic logic on finite traces. In: Proceedings of the IJCAI\u201913, pp. 854\u2013860. AAAI Press (2013)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Degiovanni, R., Castro, P.F., Arroyo, M., Ruiz, M., Aguirre, N., Frias, M.F.: Goal-conflict likelihood assessment based on model counting. In: ICSE (2018)","DOI":"10.1145\/3180155.3180261"},{"issue":"2","key":"16_CR16","volume":"28","author":"R Degiovanni","year":"2018","unstructured":"Degiovanni, R., Ponzio, P., Aguirre, N., Frias, M.: Improving lazy abstraction for SCR specifications through constraint relaxation. STVR 28(2), e1657 (2018)","journal-title":"STVR"},{"key":"16_CR17","doi-asserted-by":"publisher","unstructured":"D\u2019ippolito, N., Braberman, V., Piterman, N., Uchitel, S.: Synthesizing nonanomalous event-based controllers for liveness goals. ACM Trans. Softw. Eng. Methodol. 22(1) 1\u201336 (2013). https:\/\/doi.org\/10.1145\/2430536.2430543","DOI":"10.1145\/2430536.2430543"},{"key":"16_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-319-89960-2_17","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"R Dureja","year":"2018","unstructured":"Dureja, R., Rozier, K.Y.: More scalable LTL model checking via discovering design-space dependencies ($$D^{3}$$). In: Beyer, D., Huisman, M. (eds.) TACAS 2018. LNCS, vol. 10805, pp. 309\u2013327. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89960-2_17"},{"key":"16_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-319-41540-6_18","volume-title":"Computer Aided Verification","author":"R Ehlers","year":"2016","unstructured":"Ehlers, R., Raman, V.: Slugs: extensible GR(1) synthesis. In: Chaudhuri, S., Farzan, A. (eds.) CAV 2016. LNCS, vol. 9780, pp. 333\u2013339. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41540-6_18"},{"issue":"3","key":"16_CR20","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/0167-6423(83)90017-5","volume":"2","author":"EA Emerson","year":"1982","unstructured":"Emerson, E.A., Clarke, E.M.: Using branching time temporal logic to synthesize synchronization skeletons. Sci. Comput. Program. 2(3), 241\u2013266 (1982)","journal-title":"Sci. Comput. Program."},{"key":"16_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-319-08867-9_13","volume-title":"Computer Aided Verification","author":"J Esparza","year":"2014","unstructured":"Esparza, J., K\u0159et\u00ednsk\u00fd, J.: From LTL to deterministic automata: a safraless compositional approach. In: Biere, A., Bloem, R. (eds.) CAV 2014. LNCS, vol. 8559, pp. 192\u2013208. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-08867-9_13"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Fifarek, A., Wagner, L., Hoffman, J., Rodes, B., Aiello, A., Davis, J.: SpeAR v2.0: formalized past LTL specification and analysis of requirements. In: NFM (2017)","DOI":"10.1007\/978-3-319-57288-8_30"},{"key":"16_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-642-15643-4_10","volume-title":"Automated Technology for Verification and Analysis","author":"E Filiot","year":"2010","unstructured":"Filiot, E., Jin, N., Raskin, J.-F.: Compositional algorithms for LTL synthesis. In: Bouajjani, A., Chin, W.-N. (eds.) ATVA 2010. LNCS, vol. 6252, pp. 112\u2013127. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15643-4_10"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Finkbeiner, B., Geier, G., Passing, N.: Specification decomposition for reactive synthesis. ISSE (2022)","DOI":"10.1007\/978-3-030-76384-8_8"},{"key":"16_CR25","unstructured":"Finucane, C.P., Jing, G., Kress-Gazit, H.: Designing reactive robot controllers with LTLMoP. In: Proceedings of the AAAIWS\u201911 (2011)"},{"key":"16_CR26","unstructured":"Giannakopoulou, D., Mavridou, A., Rhein, J., Pressburger, T., Schumann, J., Nija, S.: Formal requirements elicitation with FRET. In: REFSQ\u201920 (2020)"},{"key":"16_CR27","unstructured":"Heitmeyer, C.: Requirements models for critical systems. In: Software and Systems Safety, pp. 158\u2013181. IOS Press (2011)"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Heitmeyer, C., Labaw, B., Kiskis, D.: Consistency checking of SCR-style requirements specifications. In: Proceedings of the RE\u201995, pp. 56\u201363. IEEE (1995)","DOI":"10.1109\/ISRE.1995.512546"},{"key":"16_CR29","first-page":"159","volume":"22","author":"C Heitmeyer","year":"2015","unstructured":"Heitmeyer, C., et al.: Building high assurance human-centric decision systems. AuSE 22, 159\u2013197 (2015)","journal-title":"AuSE"},{"key":"16_CR30","first-page":"580","volume":"5","author":"CL Heitmeyer","year":"1983","unstructured":"Heitmeyer, C.L., McLean, J.D.: Abstract requirements specification: a new approach and its application. IEEE TSE 5, 580\u2013589 (1983)","journal-title":"IEEE TSE"},{"key":"16_CR31","unstructured":"Heninger, K.L.: Software requirements for the a-7e aircraft. NRL Memorandum Report 3876, Naval Research Laboratory (1978)"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Hermo, M., Lucio, P., S\u00e1nchez, C.: Tableaux for realizability of safety specifications. In: Proceedings of the FM\u201923, pp. 495\u2013513 (2023)","DOI":"10.1007\/978-3-031-27481-7_28"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Iannopollo, A., Tripakis, S., Vincentelli, A.: Specification decomposition for synthesis from libraries of LTL assume\/guarantee contracts. In: DATE. IEEE (2018)","DOI":"10.23919\/DATE.2018.8342266"},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Jacobs, S., Klein, F., Schirmer, S.: A high-level LTL synthesis format: TLSF v1.1. EPTCS 229, 112\u2013132, November 2016","DOI":"10.4204\/EPTCS.229.10"},{"key":"16_CR35","unstructured":"Kirby, J.: Example NRL SCR software requirements for an automobile cruise control and monitoring system. Wang Inst. of Graduate Studies (1987)"},{"issue":"3","key":"16_CR36","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/MRA.2011.942116","volume":"18","author":"H Kress-Gazit","year":"2011","unstructured":"Kress-Gazit, H., Wongpiromsarn, T., Topcu, U.: Correct, reactive, high-level robot control. IEEE Robot. Autom. Mag. 18(3), 65\u201374 (2011)","journal-title":"IEEE Robot. Autom. Mag."},{"key":"16_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/978-3-030-01090-4_34","volume-title":"Automated Technology for Verification and Analysis","author":"J K\u0159et\u00ednsk\u00fd","year":"2018","unstructured":"K\u0159et\u00ednsk\u00fd, J., Meggendorfer, T., Sickert, S.: Owl: a library for $$\\omega $$-words, automata, and LTL. In: Lahiri, S.K., Wang, C. (eds.) ATVA 2018. LNCS, vol. 11138, pp. 543\u2013550. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01090-4_34"},{"key":"16_CR38","doi-asserted-by":"crossref","unstructured":"Kupferman, O.: Recent challenges and ideas in temporal synthesis. In: SOFSEM\u201912 (2012)","DOI":"10.1007\/978-3-642-27660-6_8"},{"key":"16_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/11817963_6","volume-title":"Computer Aided Verification","author":"O Kupferman","year":"2006","unstructured":"Kupferman, O., Piterman, N., Vardi, M.Y.: Safraless compositional synthesis. In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol. 4144, pp. 31\u201344. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11817963_6"},{"key":"16_CR40","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/A:1011254632723","volume":"19","author":"O Kupferman","year":"2001","unstructured":"Kupferman, O., Vardi, M.Y.: Model checking of safety properties. Form. Methods Syst. Des. 19, 291\u2013314 (2001)","journal-title":"Form. Methods Syst. Des."},{"key":"16_CR41","first-page":"175","volume":"15","author":"E Letier","year":"2008","unstructured":"Letier, E., Kramer, J., Magee, J., Uchitel, S.: Deriving event-based transition systems from goal-oriented requirements models. AuSE 15, 175\u2013206 (2008)","journal-title":"AuSE"},{"key":"16_CR42","unstructured":"Li, J., Pu, G., Zhang, L., Yao, Y., Vardi, M.Y., He, J.: Polsat: a portfolio LTL satisfiability solver (2013). http:\/\/arxiv.org\/abs\/1311.1602"},{"key":"16_CR43","doi-asserted-by":"crossref","unstructured":"Mallozzi, P., Incer, I., Nuzzo, P., Sangiovanni-Vincentelli, A.L.: Contract-based specification refinement and repair for mission planning. In: FormaliSE\u201923 (2023)","DOI":"10.1109\/FormaliSE58978.2023.00011"},{"key":"16_CR44","doi-asserted-by":"publisher","unstructured":"Manna, Z., Pnueli, A.: Temporal Verification of Reactive Systems: Safety. Springer-Verlag, New York, NY, USA (1995). https:\/\/doi.org\/10.1007\/978-1-4612-4222-2","DOI":"10.1007\/978-1-4612-4222-2"},{"key":"16_CR45","doi-asserted-by":"publisher","unstructured":"Mavin, A., Wilkinson, P., Harwood, A., Novak, M.: Easy approach to requirements syntax (EARS), pp. 317\u2013322, October 2009. https:\/\/doi.org\/10.1109\/RE.2009.9","DOI":"10.1109\/RE.2009.9"},{"key":"16_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/978-3-319-96145-3_31","volume-title":"Computer Aided Verification","author":"PJ Meyer","year":"2018","unstructured":"Meyer, P.J., Sickert, S., Luttenberger, M.: Strix: explicit reactive synthesis strikes back! In: Chockler, H., Weissenbacher, G. (eds.) CAV 2018. LNCS, vol. 10981, pp. 578\u2013586. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96145-3_31"},{"key":"16_CR47","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: SFCS\u201977, pp. 46\u201357. IEEE (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"16_CR48","doi-asserted-by":"publisher","unstructured":"Pnueli, A., Rosner, R.: On the synthesis of a reactive module. In: Proceedings of the 16th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL\u201989), pp. 179\u2013190 (1989). https:\/\/doi.org\/10.1145\/75277.75293","DOI":"10.1145\/75277.75293"},{"key":"16_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/11813040_38","volume-title":"FM 2006: Formal Methods","author":"A Pnueli","year":"2006","unstructured":"Pnueli, A., Zaks, A.: PSL model checking and run-time verification via testers. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. LNCS, vol. 4085, pp. 573\u2013586. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11813040_38"},{"key":"16_CR50","doi-asserted-by":"publisher","unstructured":"de Roever, W.P., Langmaack, H., Pnueli, A. (eds.): Compositionality: The Significant Difference. Springer, Berlin, Heidelberg (1998). https:\/\/doi.org\/10.1007\/3-540-49213-5","DOI":"10.1007\/3-540-49213-5"},{"key":"16_CR51","doi-asserted-by":"crossref","unstructured":"van Schouwen, A.J., Parnas, D.L., Madey, J.: Documentation of requirements for computer systems. In: Proceedings of the ISRE, pp. 198\u2013207. IEEE (1993)","DOI":"10.1109\/ISRE.1993.324857"},{"key":"16_CR52","first-page":"495","volume":"6","author":"AP Sistla","year":"1994","unstructured":"Sistla, A.P.: Safety, liveness, and fairness in temporal logic. FAC 6, 495\u2013511 (1994)","journal-title":"FAC"},{"key":"16_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-319-70389-3_10","volume-title":"Hardware and Software: Verification and Testing","author":"S Zhu","year":"2017","unstructured":"Zhu, S., Tabajara, L.M., Li, J., Pu, G., Vardi, M.Y.: A symbolic approach to safety LTL synthesis. In: HVC 2017. LNCS, vol. 10629, pp. 147\u2013162. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70389-3_10"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing \u2013 ICTAC 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47963-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T19:48:32Z","timestamp":1730576912000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47963-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031479625","9783031479632"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47963-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"23 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Colloquium on Theoretical Aspects of Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Peru","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ictac2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ictac2023.compsust.utec.edu.pe\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}