{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:07:03Z","timestamp":1773655623238,"version":"3.50.1"},"publisher-location":"Cham","reference-count":147,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319089140","type":"print"},{"value":"9783319089157","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08915-7_4","type":"book-chapter","created":{"date-parts":[[2014,7,4]],"date-time":"2014-07-04T13:35:54Z","timestamp":1404480954000},"page":"101-136","source":"Crossref","is-referenced-by-count":63,"title":["Using Models at Runtime to Address Assurance for Self-Adaptive Systems"],"prefix":"10.1007","author":[{"given":"Betty H. C.","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Kerstin I.","family":"Eder","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Gogolla","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Grunske","sequence":"additional","affiliation":[]},{"given":"Marin","family":"Litoiu","sequence":"additional","affiliation":[]},{"given":"Hausi A.","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"given":"Patrizio","family":"Pelliccione","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Perini","sequence":"additional","affiliation":[]},{"given":"Nauman A.","family":"Qureshi","sequence":"additional","affiliation":[]},{"given":"Bernhard","family":"Rumpe","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Schneider","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Trollmann","sequence":"additional","affiliation":[]},{"given":"Norha M.","family":"Villegas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"4_CR1","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s10009-010-0145-y","volume":"12","author":"J.-R. Abrial","year":"2010","unstructured":"Abrial, J.-R., Butler, M., Hallerstede, S., Hoang, T.S., Mehta, F., Voisin, L.: Rodin: An open toolset for modelling and reasoning in Event-B. Software Tools for Technology Transfer (STTT)\u00a012(6), 447\u2013466 (2010)","journal-title":"Software Tools for Technology Transfer (STTT)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Abrial, J.R.: The B Tool. In: Bloomfield, R.E., Marshall, L.S., Jones, R.B. (eds.) VDM 1988 VDM \u2014 The Way Ahead. LNCS, vol.\u00a0328, pp. 86\u201387. Springer, Heidelberg (1988)","DOI":"10.1007\/3-540-50214-9_8"},{"key":"4_CR3","unstructured":"Accelera. Property Specification Language Reference Manual, Version 1.1 (2004)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Autili, M., Cortellessa, V., Di Ruscio, D., Inverardi, P., Pelliccione, P., Tivoli, M.: Eagle: Engineering software in the ubiquitous globe by leveraging uncertainty. In: Proceedings of the 19th ACM SIGSOFT Symposium and 13th European Conference on Foundations of Software Engineering (ESEC\/FSE 2011), pp. 488\u2013491 (2011)","DOI":"10.1145\/2025113.2025199"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s10515-007-0012-6","volume":"14","author":"M. Autili","year":"2007","unstructured":"Autili, M., Inverardi, P., Pelliccione, P.: Graphical scenarios for specifying temporal properties: An automated approach. Automated Software Engineering (ASE 2007)\u00a014, 293\u2013340 (2007)","journal-title":"Automated Software Engineering (ASE 2007)"},{"issue":"1","key":"4_CR6","first-page":"60","volume":"7","author":"S. Aissi","year":"2003","unstructured":"Aissi, S.: Runtime environment security models. Intel Technology Journal\u00a07(1), 60\u201367 (2003)","journal-title":"Intel Technology Journal"},{"issue":"1","key":"4_CR7","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing (TDSC)\u00a01(1), 11\u201333 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing (TDSC)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Angelopoulos, K., Silva Souza, V.E., Pimentel, J.A.: Requirements and architectural approaches to adaptive software systems: A comparative study. In: Proceedings of the 8th ACM\/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2013), pp. 23\u201332 (2013)","DOI":"10.1109\/SEAMS.2013.6595489"},{"key":"4_CR9","unstructured":"Abrial, J.-R., Schuman, S.A., Meyer, B.: A specification language. In: McNaughten, R., McKeag, R.C. (eds.) On the Construction of Programs, pp. 343\u2013406. Cambridge University Press (1980)"},{"key":"4_CR10","unstructured":"Astr\u00f6m, K.J., Wittenmark, B.: Adaptive Control, 2nd edn. Addison-Wesley (1994)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Abeywickrama, D.B., Zambonelli, F.: Model checking goal-oriented requirements for self-adaptive systems. In: Proceedings of the Engineering of Computer Based Systems (ECBS 2012), pp. 33\u201342 (2012)","DOI":"10.1109\/ECBS.2012.30"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Ben-Ari, M., Manna, Z., Pnueli, A.: The temporal logic of branching time. In: Proceedings of the 8th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 1981), pp. 164\u2013176 (1981)","DOI":"10.1145\/567532.567551"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MC.2009.326","volume":"42","author":"G. Blair","year":"2009","unstructured":"Blair, G., Bencomo, N., France, R.B.: Models@run.time. IEEE Computer\u00a042, 22\u201327 (2009)","journal-title":"IEEE Computer"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Becker, B., Beyer, D., Giese, H., Klein, F., Schilling, D.: Symbolic invariant verification for systems with dynamic structural adaptation. In: Proceedings of the 28th ACM\/IEEE International Conference on Software Engineering (ICSE 2006), pp. 72\u201381 (2006)","DOI":"10.1145\/1134285.1134297"},{"key":"4_CR15","unstructured":"Blair, G., Coulson, G., Davies, N.: Adaptive middleware for mobile multimedia applications. In: Proceedings of the 8th International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV 1997), pp. 259\u2013273 (1997)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Bailey, C., Chadwick, D.W., de Lemos, R.: Self-adaptive authorization framework for policy based RBAC\/ABAC models. In: Proceedings of the 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), pp. 37\u201344 (2011)","DOI":"10.1109\/DASC.2011.31"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Balasubramanian, S., Desmarais, R., M\u00fcller, H.A., Stege, U., Venkatesh, S.: Characterizing problems for realizing policies in self-adaptive and self-managing systems. In: Proceedings of the 6th ACM\/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2011), pp. 70\u201379 (2011)","DOI":"10.1145\/1988008.1988019"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89778-1_1","volume-title":"Innovations for Requirement Analysis. From Stakeholders\u2019 Needs to Formal Designs","author":"D.M. Berry","year":"2008","unstructured":"Berry, D.M.: Ambiguity in natural language requirements documents. In: Martell, C. (ed.) Monterey Workshop 2007. LNCS, vol.\u00a05320, pp. 1\u20137. Springer, Heidelberg (2008)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Baresi, L., Ghezzi, C.: The disappearing boundary between development-time and run-time. In: Proceedings of the Workshop on Future of Software Engineering Research (FoSER 2010), pp. 17\u201322. ACM (2010)","DOI":"10.1145\/1882362.1882367"},{"issue":"2","key":"4_CR20","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s10270-006-0001-4","volume":"5","author":"L. Baresi","year":"2006","unstructured":"Baresi, L., Heckel, R., Th\u00f6ne, S., Varr\u00f3, D.: Style-based modeling and refinement of service-oriented architectures. Software and System Modeling\u00a05(2), 187\u2013207 (2006)","journal-title":"Software and System Modeling"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"The Vienna Development Method: The Meta-Language","year":"1978","unstructured":"Bjorner, D., Jones, C.B. (eds.): The Vienna Development Method: The Meta-Language. LNCS, vol.\u00a061. Springer, Heidelberg (1978)"},{"issue":"1","key":"4_CR22","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1093\/comjnl\/bxq042","volume":"54","author":"A. Bauer","year":"2011","unstructured":"Bauer, A., J\u00fcrjens, J., Yu, Y.: Run-time security traceability for evolving systems. Computer Journal\u00a054(1), 58\u201387 (2011)","journal-title":"Computer Journal"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Barbacci, M., Klein, M.H., Longstaff, T.A., Weinstock, C.B.: Quality attributes. Technical Report CMU\/SEI-95-TR-021, CMU\/SEI (1995)","DOI":"10.21236\/ADA307888"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Barna, C., Litoiu, M., Ghanbari, H.: Autonomic load-testing framework. In: Proceedings of the 8th ACM\/IEEE International Conference on Autonomic Computing (ICAC 2011), pp. 91\u2013100 (2011)","DOI":"10.1145\/1998582.1998598"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Bormann, J., Lohse, J., Payer, M., Venzl, G.: Model checking in industrial hardware design. In: Proceedings of the 32nd ACM\/IEEE Conference on Design automation (DAC 1995), pp. 298\u2013303 (1995)","DOI":"10.1145\/217474.217545"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Baresi, L., Pasquale, L., Spoletini, P.: Fuzzy goals for requirements-driven adaptation. In: Proceedings of the 18th IEEE International Requirements Engineering Conference (RE 2010), pp. 125\u2013134 (2010)","DOI":"10.1109\/RE.2010.25"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Bucchiarone, A., Pelliccione, P., Vattani, C., Runge, O.: Self-repairing systems modeling and verification using AGG. In: Proceedings of the Joint Working IEEE\/IFIP Conference on Software Architecture 2009 & European Conference on Software Architecture (WICSA\/ECSA 2009), pp. 181\u2013190 (2009)","DOI":"10.1109\/WICSA.2009.5290804"},{"key":"4_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-02161-9_3","volume-title":"Software Engineering for Self-Adaptive Systems","author":"Y. Brun","year":"2009","unstructured":"Brun, Y., et al.: Engineering self-adaptive systems through feedback loops. In: Cheng, B.H.C., de Lemos, R., Giese, H., Inverardi, P., Magee, J. (eds.) Software Engineering for Self-Adaptive Systems. LNCS, vol.\u00a05525, pp. 48\u201370. Springer, Heidelberg (2009)"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Bencomo, N., Whittle, J., Sawyer, P., Finkelstein, A., Letier, E.: Requirements reflection: Requirements as runtime entities. In: Proceedings of the ACM\/IEEE 32nd International Conference on Software Engineering (ICSE 2010), pp. 199\u2013202 (2010)","DOI":"10.1145\/1810295.1810329"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"C\u00e1mara, J., de Lemos, R.: Evaluation of resilience in self-adaptive systems using probabilistic model-checking. In: Proceedings of the 7th ACM\/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2012), pp. 53\u201362 (2012)","DOI":"10.1109\/SEAMS.2012.6224391"},{"key":"4_CR31","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-17857-3_32","volume-title":"Advances in Computer Science and Information Technology","author":"M. Gupta","year":"2011","unstructured":"Gupta, M., Rao, R.S., Pande, A., Tripathi, A.K.: Design and synthesis of synchronization skeletons using branching time temporal logic. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds.) CCSIT 2011, Part I. CCIS, vol.\u00a0131, pp. 318\u2013328. Springer, Heidelberg (2011)"},{"issue":"3","key":"4_CR32","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/TSE.2010.92","volume":"37","author":"R. Calinescu","year":"2011","unstructured":"Calinescu, R., Grunske, L., Kwiatkowska, M.Z., Mirandola, R., Tamburrelli, G.: Dynamic QoS management and optimization in service-based systems. IEEE Transactions on Software Engineering (TSE)\u00a037(3), 387\u2013409 (2011)","journal-title":"IEEE Transactions on Software Engineering (TSE)"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model checking. MIT Press (2001)","DOI":"10.1016\/B978-044450813-3\/50026-6"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Chandra, S., Godefroid, P., Palm, C.: Software model checking in practice: An industrial case study. In: Proceedings of the 24th ACM\/IEEE International Conference on Software Engineering (ICSE 2002), pp. 431\u2013441 (2002)","DOI":"10.1145\/581339.581393"},{"key":"4_CR35","unstructured":"Cho, S.M., Hong, H.S., Cha, S.D.: Safety analysis using coloured Petri nets. In: Proceedings of the Asia Pacific Software Engineering Conference (APSEC 1996), pp. 176\u2013193 (1996)"},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Clements, P.C.: A survey of architecture description languages. In: Proceedings of the 8th IEEE International Workshop on Software Specification and Design (IWSSD 1996), pp. 16\u201326 (1996)","DOI":"10.1109\/IWSSD.1996.501143"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Chantree, F., Nuseibeh, B., de Roeck, A., Willis, A.: Identifying nocuous ambiguities in natural language requirements. In: Proceedings of 14th IEEE International Requirements Engineering Conference (RE 2006), pp. 59\u201368 (2006)","DOI":"10.1109\/RE.2006.31"},{"key":"4_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-642-02463-4_19","volume-title":"Conceptual Modeling: Foundations and Applications","author":"L. Chung","year":"2009","unstructured":"Chung, L., do Prado Leite, J.C.S.: On non-functional requirements in software engineering. In: Borgida, A.T., Chaudhri, V.K., Giorgini, P., Yu, E.S. (eds.) Conceptual Modeling: Foundations and Applications. LNCS, vol.\u00a0Conceptual Modeling: Foundations and Applications, pp. 363\u2013379. Springer, Heidelberg (2009)"},{"key":"4_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"468","DOI":"10.1007\/978-3-642-04425-0_36","volume-title":"Model Driven Engineering Languages and Systems","author":"B.H.C. Cheng","year":"2009","unstructured":"Cheng, B.H.C., Sawyer, P., Bencomo, N., Whittle, J.: A goal-based modeling approach to develop requirements of an adaptive system with environmental uncertainty. In: Sch\u00fcrr, A., Selic, B. (eds.) MODELS 2009. LNCS, vol.\u00a05795, pp. 468\u2013483. Springer, Heidelberg (2009)"},{"key":"4_CR40","unstructured":"Casta\u00f1eda, L., Villegas, N.M., M\u00fcller, H.A.: Self-adaptive applications: On the development of personalized web-tasking systems. In: Proceedings of the 9th ACM\/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2014 (in press, 2014)"},{"key":"4_CR41","unstructured":"Dahm, W.J.A.: Technology Horizons a Vision for Air Force Science & Technology During 2010-2030. Technical report, U.S. Air Force (2010)"},{"key":"4_CR42","doi-asserted-by":"crossref","unstructured":"Dawson, D., Desmarais, R., Kienle, H.M., Muller, H.A.: Monitoring in adaptive systems using reflection. In: Proceedings of the 3rd ACM\/IEEE International Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2008), pp. 81\u201388 (2008)","DOI":"10.1145\/1370018.1370033"},{"key":"4_CR43","doi-asserted-by":"crossref","unstructured":"Di Marco, A., Inverardi, P., Spalazzese, R.: Synthesizing self-adaptive connectors meeting functional and performance concerns. In: Proceedings of the 8th ACM\/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2013), pp. 133\u2013142 (2013)","DOI":"10.1109\/SEAMS.2013.6595500"},{"key":"4_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-12029-9_10","volume-title":"Fundamental Approaches to Software Engineering","author":"H. Ehrig","year":"2010","unstructured":"Ehrig, H., Ermel, C., Runge, O., Bucchiarone, A., Pelliccione, P.: Formal analysis and verification of self-healing systems. In: Rosenblum, D.S., Taentzer, G. (eds.) FASE 2010. LNCS, vol.\u00a06013, pp. 139\u2013153. Springer, Heidelberg (2010)"},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Epifani, I., Ghezzi, C., Mirandola, R., Tamburrelli, G.: Model evolution by run-time parameter adaptation. In: Proceedings of the 31st ACM\/IEEE International Conference on Software Engineering (ICSE 2009), pp. 111\u2013121 (2009)","DOI":"10.1109\/ICSE.2009.5070513"},{"key":"4_CR46","doi-asserted-by":"crossref","unstructured":"Esfahani, N., Kouroshfar, E., Malek, S.: Taming uncertainty in self-adaptive software. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering (ESEC\/FSE 2011), pp. 234\u2013244 (2011)","DOI":"10.1145\/2025113.2025147"},{"key":"4_CR47","doi-asserted-by":"crossref","unstructured":"Esfahani, N., Malek, S.: Uncertainty in self-adaptive software systems. In: de Lemos, R., Giese, H., M\u00fcller, H.A., Shaw, M. (eds.) Self-Adaptive Systems. LNCS, vol.\u00a07475, pp. 214\u2013238. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-35813-5_9"},{"key":"4_CR48","doi-asserted-by":"crossref","unstructured":"Fraser, G., Arcuri, A.: Evosuite: Automatic test suite generation for object-oriented software. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering (ESEC\/FSE 2011), pp. 416\u2013419 (2011)","DOI":"10.1145\/2025113.2025179"},{"key":"4_CR49","doi-asserted-by":"crossref","unstructured":"Fleury, F., Dehlen, V., Bencomo, N., Morin, B., Jezequel, J.M.: Modeling and validating dynamic adaptation. In: Proceedings of the International Workshop on Models@RunTime (M@RT 2008), pp. 97\u2013108 (2008)","DOI":"10.1007\/978-3-642-01648-6_11"},{"key":"4_CR50","doi-asserted-by":"crossref","unstructured":"Fredericks, E.M., Devries, B., Cheng, B.H.C.: AutoRELAX: Automatically RELAXing a goal model to address uncertainty. Empirical Software Engineering (in press, 2014)","DOI":"10.1007\/s10664-014-9305-0"},{"key":"4_CR51","unstructured":"Fredericks, E.M., Devries, B., Cheng, B.H.C.: Towards run-time adaptation of test cases for self-adaptive systems in the face of uncertainty. In: Proceedings of the 9th ACM\/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2014 (in press, 2014)"},{"key":"4_CR52","doi-asserted-by":"crossref","unstructured":"Fickas, S., Feather, M.S.: Requirements monitoring in dynamic environments. In: Proceedings of the Second IEEE International Symposium on Requirements Engineering (RE 1995), pp. 140\u2013147 (1995)","DOI":"10.1109\/ISRE.1995.512555"},{"key":"4_CR53","doi-asserted-by":"crossref","unstructured":"Feather, M.S., Fickas, S., van Lamsweerde, A., Ponsard, C.: Reconciling system requirements and runtime behavior. In: Proceedings of the 9th International Workshop on Software Specification and Design (IWSSD 1998), pp. 50\u201359. IEEE (1998)","DOI":"10.1109\/IWSSD.1998.667919"},{"key":"4_CR54","doi-asserted-by":"crossref","unstructured":"Filieri, A., Ghezzi, C., Tamburrelli, G.: Run-time efficient probabilistic model checking. In: Proceedings of the 33rd ACM\/IEEE International Conference on Software Engineering (ICSE 2011), pp. 341\u2013350 (2011)","DOI":"10.1145\/1985793.1985840"},{"key":"4_CR55","doi-asserted-by":"crossref","unstructured":"Fredericks, E.M., Ramirez, A.J., Cheng, B.H.C.: Towards run-time testing of dynamic adaptive systems. In: Proceedings of the 8th ACM\/IEEE International Symposium on Software Engineering for Self-Adaptive Systems (SEAMS 2013), pp. 169\u2013174 (2013)","DOI":"10.1109\/SEAMS.2013.6595504"},{"key":"4_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-39742-4_8","volume-title":"Search Based Software Engineering","author":"E.M. Fredericks","year":"2013","unstructured":"Fredericks, E.M., Ramirez, A.J., Cheng, B.H.C.: Validating code-level behavior of dynamic adaptive systems in the face of uncertainty. In: Ruhe, G., Zhang, Y. (eds.) SSBSE 2013. LNCS, vol.\u00a08084, pp. 81\u201395. Springer, Heidelberg (2013)"},{"issue":"10","key":"4_CR57","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MC.2004.175","volume":"37","author":"D. Garlan","year":"2004","unstructured":"Garlan, D., Cheng, S.-W., Huang, A.-C., Schmerl, B., Steenkiste, P.: Rainbow: Architecture-based self-adaptation with reusable infrastructure. IEEE Computer\u00a037(10), 46\u201354 (2004)","journal-title":"IEEE Computer"},{"key":"4_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-540-69073-3_23","volume-title":"Models in Software Engineering","author":"H.J. Goldsby","year":"2008","unstructured":"Goldsby, H.J., Cheng, B.H.C., Zhang, J.: AMOEBA-RT: Run-time verification of adaptive software. In: Giese, H. (ed.) MODELS 2008. LNCS, vol.\u00a05002, pp. 212\u2013224. Springer, Heidelberg (2008)"},{"key":"4_CR59","doi-asserted-by":"crossref","unstructured":"Gomaa, H., Hussein, M.: Software reconfiguration patterns for dynamic evolution of software architectures. In: Proceedings of the Fourth IEEE\/IFIP Working Conference on Software Architecture (WICSA 2004), pp. 79\u201388 (2004)","DOI":"10.1109\/WICSA.2004.1310692"},{"key":"4_CR60","doi-asserted-by":"crossref","unstructured":"Giese, H., Hildebrandt, S., Lambers, L.: Toward bridging the gap between formal semantics and implementation of triple graph grammars. In: Proceedings of the Workshop on Model-Driven Engineering, Verification, and Validation (MODEVVA 2010), pp. 19\u201324. IEEE (2010)","DOI":"10.1109\/MoDeVVa.2010.14"},{"key":"4_CR61","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/3-540-45484-5_22","volume-title":"Formal Approaches to Agent-Based Systems","author":"D.F. Gordon","year":"2001","unstructured":"Gordon, D.F.: APT agents: Agents that are adaptive, predictable, and timely. In: Rash, J.L., Rouff, C.A., Truszkowski, W., Gordon, D.F., Hinchey, M.G. (eds.) FAABS 2000. LNCS (LNAI), vol.\u00a01871, pp. 278\u2013293. Springer, Heidelberg (2001)"},{"issue":"3","key":"4_CR62","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.infsof.2010.10.003","volume":"53","author":"L. Grunske","year":"2011","unstructured":"Grunske, L.: An effective sequential statistical test for probabilistic monitoring. Information & Software Technology (IST)\u00a053(3), 190\u2013199 (2011)","journal-title":"Information & Software Technology (IST)"},{"key":"4_CR63","doi-asserted-by":"crossref","unstructured":"Ghanbari, H., Simmons, B., Litoiu, M., Iszlai, G.: Exploring alternative approaches to implement an elasticity policy. In: Proceedings of the IEEE International Conference on Cloud Computing (CLOUD 2011), pp. 716\u2013723 (2011)","DOI":"10.1109\/CLOUD.2011.101"},{"key":"4_CR64","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/11875567_12","volume-title":"Computer Safety, Reliability, and Security","author":"H. Giese","year":"2006","unstructured":"Giese, H., Tichy, M.: Component-based hazard analysis: Optimal designs, product lines, and online-reconfiguration. In: G\u00f3rski, J. (ed.) SAFECOMP 2006. LNCS, vol.\u00a04166, pp. 156\u2013169. Springer, Heidelberg (2006)"},{"key":"4_CR65","doi-asserted-by":"crossref","unstructured":"Grunske, L., Zhang, P.: Monitoring probabilistic properties. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC\/FSE 2009), pp. 183\u2013192 (2009)","DOI":"10.1145\/1595696.1595724"},{"issue":"3","key":"4_CR66","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/0167-6423(87)90035-9","volume":"8","author":"D. Harel","year":"1987","unstructured":"Harel, D.: Statecharts: A visual formalism for complex systems. Science of Computer Programming\u00a08(3), 231\u2013274 (1987)","journal-title":"Science of Computer Programming"},{"key":"4_CR67","doi-asserted-by":"crossref","unstructured":"Hellerstein, J.L., Diao, Y., Parekh, S., Tilbury, D.M.: Feedback Control of Computing Systems. John Wiley & Sons (2004)","DOI":"10.1002\/047166880X"},{"issue":"1-6","key":"4_CR68","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/S1389-1286(00)00075-X","volume":"33","author":"B. Hashii","year":"2000","unstructured":"Hashii, B., Malabarba, S., Pandey, R., Bishop, M.: Supporting reconfigurable security policies for mobile programs. Computer Networks\u00a033(1-6), 77\u201393 (2000)","journal-title":"Computer Networks"},{"key":"4_CR69","doi-asserted-by":"crossref","unstructured":"Harel, D., Thiagarajan, P.S.: Message sequence charts. UML for Real, 77\u2013105 (2004)","DOI":"10.1007\/0-306-48738-1_4"},{"key":"4_CR70","unstructured":"IBM Corporation. An architectural blueprint for autonomic computing. Technical report, IBM Corporation (2006)"},{"key":"4_CR71","unstructured":"IEEE. IEEE standard glossary of software engineering terminology. IEEE Std 610.12-1990 (1990)"},{"issue":"4","key":"4_CR72","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1145\/503112.503114","volume":"33","author":"M.Y. Ivory","year":"2001","unstructured":"Ivory, M.Y., Hearst, M.A.: The state of the art in automating usability evaluation of user interfaces. ACM Computer Survey\u00a033(4), 470\u2013516 (2001)","journal-title":"ACM Computer Survey"},{"key":"4_CR73","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-540-75336-0_5","volume-title":"Trustworthy Global Computing","author":"P. Inverardi","year":"2007","unstructured":"Inverardi, P.: Software of the future is the future of software? In: Montanari, U., Sannella, D., Bruni, R. (eds.) TGC 2006. LNCS, vol.\u00a04661, pp. 69\u201385. Springer, Heidelberg (2007)"},{"key":"4_CR74","doi-asserted-by":"crossref","unstructured":"Inverardi, P., Pelliccione, P., Tivoli, M.: Towards an assume-guarantee theory for adaptable systems. In: Proceedings of the 4th ACM\/IEEE Workshop on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2009), pp. 106\u2013115 (2009)","DOI":"10.1109\/SEAMS.2009.5069079"},{"key":"4_CR75","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-21455-4_5","volume-title":"Formal Methods for Eternal Networked Software Systems","author":"P. Inverardi","year":"2011","unstructured":"Inverardi, P., Spalazzese, R., Tivoli, M.: Application-layer connector synthesis. In: Bernardo, M., Issarny, V. (eds.) SFM 2011. LNCS, vol.\u00a06659, pp. 148\u2013190. Springer, Heidelberg (2011)"},{"key":"4_CR76","unstructured":"Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. EATCS Series, vol.\u00a01. Springer (2003)"},{"issue":"1-2","key":"4_CR77","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/0304-3975(96)00069-2","volume":"167","author":"B. Jonsson","year":"1996","unstructured":"Jonsson, B., Tsay, Y.-K.: Assumption\/guarantee specifications in linear-time temporal logic. Theoretical Computer Science\u00a0167(1-2), 47\u201372 (1996)","journal-title":"Theoretical Computer Science"},{"issue":"1","key":"4_CR78","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"J.O. Kephart","year":"2003","unstructured":"Kephart, J.O., Chess, D.M.: The vision of autonomic computing. IEEE Computer\u00a036(1), 41\u201350 (2003)","journal-title":"IEEE Computer"},{"key":"4_CR79","doi-asserted-by":"crossref","unstructured":"Knight, J.C., Heimbigner, D., Wolf, A.L., Carzaniga, A., Hill, J., Devanbu, P., Gertz, M.: The Willow architecture: Comprehensive survivability for large-scale distributed applications. Technical Report CU-CS-926-01, Department of Computer Science, University of Colorado (2001)","DOI":"10.21236\/ADA436790"},{"issue":"11","key":"4_CR80","doi-asserted-by":"publisher","first-page":"1293","DOI":"10.1109\/32.60317","volume":"16","author":"J. Kramer","year":"1990","unstructured":"Kramer, J., Magee, J.: The evolving philosophers problem: Dynamic change management. IEEE Transactions on Software Engineering (TSE)\u00a016(11), 1293\u20131306 (1990)","journal-title":"IEEE Transactions on Software Engineering (TSE)"},{"key":"4_CR81","doi-asserted-by":"crossref","unstructured":"Kramer, J., Magee, J.: Self-managed systems: An architectural challenge. In: Future of Software Engineering (FOSE 2007), pp. 259\u2013268. IEEE (2007)","DOI":"10.1109\/FOSE.2007.19"},{"key":"4_CR82","unstructured":"Lu, Y., Abdelzaher, T., Lu, C., Sha, L., Liu, X.: Feedback control with queueing-theoretic prediction for relative delay guarantees in web servers. In: Proceedings of the 9th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2003), p. 208 (2003)"},{"key":"4_CR83","unstructured":"Murray, R.M., Astr\u00f6m, K.J., Boyd, S.P., Brockett, R.W., Burns, J.A., Dahleh, M.A.: Control in an information rich world (2002)"},{"issue":"12","key":"4_CR84","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1145\/38807.38821","volume":"22","author":"P. Maes","year":"1987","unstructured":"Maes, P.: Concepts and experiments in computational reflection. ACM SIGPLAN Notices\u00a022(12), 147\u2013155 (1987)","journal-title":"ACM SIGPLAN Notices"},{"key":"4_CR85","unstructured":"Menasc\u00e9, D.A., Bennani, M.N.: On the use of performance models to design self-managing computer systems. In: Proceedings of the 29th International Computer Measurement Group Conference (CMG 2003), pp. 7\u201312 (2003)"},{"key":"4_CR86","doi-asserted-by":"crossref","unstructured":"Meedeniya, I., Grunske, L.: An efficient method for architecture-based reliability evaluation for evolving systems with changing parameters. In: Proceedings of the 21st IEEE International Symposium on Software Reliability Engineering (ISSRE 2010), pp. 229\u2013238 (2010)","DOI":"10.1109\/ISSRE.2010.19"},{"key":"4_CR87","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-540-95888-8_2","volume-title":"Software Engineering","author":"H.A. M\u00fcller","year":"2009","unstructured":"M\u00fcller, H.A., Kienle, H.M., Stege, U.: Autonomic computing: Now you see it, now you don\u2019t\u2014design and evolution of autonomic software systems. In: De Lucia, A., Ferrucci, F. (eds.) ISSSE 2006-2008. LNCS, vol.\u00a05413, pp. 32\u201354. Springer, Heidelberg (2009)"},{"key":"4_CR88","unstructured":"Morandini, M., Penserini, L., Perini, A.: Operational semantics of goal models in adaptive agents. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems\u2014Volume 1 (AAMAS 2009), pp. 129\u2013136. IFAAMAS (2009)"},{"key":"4_CR89","doi-asserted-by":"crossref","unstructured":"M\u00fcller, H.A., Pezz\u00e8, M., Shaw, M.: Visibility of control in adaptive systems. In: Proceedings of the 2nd International Workshop on Ultra-Large-Scale Software-Intensive Systems (ULSSIS 2008). ACM (2008)","DOI":"10.1145\/1370700.1370707"},{"key":"4_CR90","unstructured":"Mu\u00f1oz, J.C., Tamura, G., Villegas, N.M., M\u00fcller, H.A.: Surprise: User-controlled granular privacy and security for personal data in smartercontext. In: Proceedings of the 22nd Conference of the Center for Advanced Studies on Collaborative Research (CASCON 2012), pp. 128\u2013142. ACM (2012)"},{"issue":"4","key":"4_CR91","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T. Murata","year":"1989","unstructured":"Murata, T.: Petri nets: Properties, analysis and applications. Proceedings to the IEEE\u00a077(4), 541\u2013580 (1989)","journal-title":"Proceedings to the IEEE"},{"key":"4_CR92","doi-asserted-by":"crossref","unstructured":"M\u00fcller, H., Villegas, N.: Runtime evolution of highly dynamic software. In: Mens, T., Serebrenik, A., Cleve, A. (eds.) Evolving Software Systems, pp. 229\u2013264. Springer (2014)","DOI":"10.1007\/978-3-642-45398-4_8"},{"key":"4_CR93","doi-asserted-by":"crossref","unstructured":"Nguyen, C., Perini, A., Bernon, C., Pav\u00f3n, J., Thangarajah, J.: Testing in multi-agent systems. In: Proceedings of the 10th International Workshop on Agent Oriented Software Engineering (AOSE 2009), pp. 180\u2013190 (2009)","DOI":"10.1007\/978-3-642-19208-1_13"},{"key":"4_CR94","unstructured":"Nguyen, C., Perini, A., Tonella, P., Miles, S., Harman, M., Luck, M.: Evolutionary testing of autonomous software agents. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems\u2014Volume 1 (AAMAS 2009), pp. 521\u2013528. IFAAMAS (2009)"},{"key":"4_CR95","doi-asserted-by":"crossref","unstructured":"Oreizy, P., Gorlick, M.M., Taylor, R.N., Heimbigner, D., Johnson, G., Medvidovic, N., Quilici, A., Rosenblum, D.S., Wolf, A.L.: An architecture-based approach to self-adaptive software. IEEE Intelligent Systems, 14","DOI":"10.1109\/5254.769885"},{"key":"4_CR96","doi-asserted-by":"crossref","unstructured":"Ouedraogo, M., Mouratidis, H., Hecker, A., Bonhomme, C., Khadraoui, D., Dubois, E., Preston, D.: A new approach to evaluating security assurance. In: Proceedings of the 7th IEEE International Conference on Information Assurance and Security (IAS 2011), pp. 215\u2013221 (2011)","DOI":"10.1109\/ISIAS.2011.6122822"},{"key":"4_CR97","doi-asserted-by":"crossref","unstructured":"La Manna, V.P., Greenyer, J., Ghezzi, C., Brenner, C.: Formalizing correctness criteria of dynamic updates derived from specification changes. In: Proceedings of the 8th ACM\/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2013), pp. 63\u201372 (2013)","DOI":"10.1109\/SEAMS.2013.6595493"},{"key":"4_CR98","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/TSE.2008.104","volume":"35","author":"P. Pelliccione","year":"2009","unstructured":"Pelliccione, P., Inverardi, P., Muccini, H.: CHARMY: A framework for designing and verifying architectural specifications. IEEE Transactions on Software Engineering (TSE)\u00a035, 325\u2013346 (2009)","journal-title":"IEEE Transactions on Software Engineering (TSE)"},{"key":"4_CR99","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/0304-3975(81)90110-9","volume":"13","author":"A. Pnueli","year":"1981","unstructured":"Pnueli, A.: A temporal logic of concurrent programs. Theoretical Computer Science\u00a013, 45\u201360 (1981)","journal-title":"Theoretical Computer Science"},{"key":"4_CR100","doi-asserted-by":"crossref","unstructured":"Peled, D., Pelliccione, P., Spoletini, P.: Model Checking. In: Wiley Encyclopedia of Computer Science and Engineering, 6th edn., 5-Volume Set, vol.\u00a03, pp. 1904\u20131920. John Wiley (2009)","DOI":"10.1002\/9780470050118.ecse247"},{"key":"4_CR101","doi-asserted-by":"crossref","unstructured":"Pasquale, L., Spoletini, P.: Monitoring fuzzy temporal requirements for service compositions: Motivations, challenges, and experimental results. In: Proceedings of the International Workshop on Requirements Engineering for Systems, Services and Systems of Systems (RESS 2011), pp. 63\u201369. IEEE (2011)","DOI":"10.1109\/RESS.2011.6043924"},{"key":"4_CR102","doi-asserted-by":"crossref","unstructured":"Priesterjahn, C., Sondermann-W\u00f6lke, C., Tichy, M., H\u00f6lscher, C.: Component-based hazard analysis for mechatronic systems. In: Proceedings of the IEEE International Symposium on Object\/Component\/Service-oriented Real-time Distributed Computing (ISORC 2011), pp. 80\u201387 (2011)","DOI":"10.1109\/ISORCW.2011.19"},{"key":"4_CR103","unstructured":"Priesterjahn, C., Tichy, M.: Modeling safe reconfiguration with the fujaba real-time tool suite. In: Proceedings of the 7th International Fujaba Days, pp. 20\u201314 (2009)"},{"key":"4_CR104","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1016\/j.jss.2008.05.030","volume":"81","author":"P. Pelliccione","year":"2008","unstructured":"Pelliccione, P., Tivoli, M., Bucchiarone, A., Polini, A.: An architectural approach to the correct and automatic assembly of evolving component-based systems. Journal of Systems Software\u00a081, 2237\u20132251 (2008)","journal-title":"Journal of Systems Software"},{"key":"4_CR105","doi-asserted-by":"crossref","unstructured":"Quade, M., Blumendorf, M., Lehmann, G., Roscher, D., Albayrak, S.: Evaluating user interface adaptations at runtime by simulating user interaction. In: Proceedings of the 25th BCS Conference on Human Computer Interaction (HCI 2011), pp. 497\u2013502 (2011)","DOI":"10.14236\/ewic\/HCI2011.83"},{"key":"4_CR106","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-21640-4_5","volume-title":"Advanced Information Systems Engineering","author":"N.A. Qureshi","year":"2011","unstructured":"Qureshi, N.A., Jureta, I.J., Perini, A.: Requirements engineering for self-adaptive systems: Core ontology and problem statement. In: Mouratidis, H., Rolland, C. (eds.) CAiSE 2011. LNCS, vol.\u00a06741, pp. 33\u201347. Springer, Heidelberg (2011)"},{"key":"4_CR107","doi-asserted-by":"crossref","unstructured":"Qureshi, N.A., Liaskos, S., Perini, A.: Reasoning about adaptive requirements for self-adaptive systems at runtime. In: Proceedings of the 2nd International Workshop on Requirements@run.time (RE@run.time 2011), pp. 16\u201322 (2011)","DOI":"10.1109\/ReRunTime.2011.6046243"},{"key":"4_CR108","doi-asserted-by":"crossref","unstructured":"Qureshi, N.A., Perini, A.: Requirements engineering for adaptive service based applications. In: Proceedings of the 18th IEEE International Requirements Engineering Conference (RE 2010), pp. 108\u2013111 (2010)","DOI":"10.1109\/RE.2010.23"},{"key":"4_CR109","doi-asserted-by":"crossref","unstructured":"Queille, J.-P., Sifakis, J.: Specification and verification of concurrent systems in CESAR. In: Dezani-Ciancaglini, M., Montanari, U. (eds.) International Symposium on Programming 1982. LNCS, vol.\u00a0137, pp. 337\u2013351. Springer, Heidelberg (1982)","DOI":"10.1007\/3-540-11494-7_22"},{"key":"4_CR110","doi-asserted-by":"crossref","unstructured":"Ramirez, A.J., Cheng, B.H.C.: Adaptive monitoring of software requirements. In: Proceedings of the Workshop on Requirements at Run Time (RE@RunTime 2010), pp. 41\u201350. IEEE (2010)","DOI":"10.1109\/RERUNTIME.2010.5628549"},{"key":"4_CR111","doi-asserted-by":"crossref","unstructured":"Ramirez, A.J., Cheng, B.H.C.: Design patterns for developing dynamically adaptive systems. In: Proceedings of the 5th ACM\/IEEE Workshop on Software Engineering for Adaptive and Self-Managed Systems (SEAMS 2010), pp. 49\u201358 (2010)","DOI":"10.1145\/1808984.1808990"},{"key":"4_CR112","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-642-24485-8_37","volume-title":"Model Driven Engineering Languages and Systems","author":"A.J. Ramirez","year":"2011","unstructured":"Ramirez, A.J., Cheng, B.H.C.: Automatic derivation of utility functions for monitoring software requirements. In: Whittle, J., Clark, T., K\u00fchne, T. (eds.) MODELS 2011. LNCS, vol.\u00a06981, pp. 501\u2013516. Springer, Heidelberg (2011)"},{"key":"4_CR113","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-642-33666-9_5","volume-title":"Model Driven Engineering Languages and Systems","author":"A.J. Ramirez","year":"2012","unstructured":"Ramirez, A.J., Cheng, B.H.C., Bencomo, N., Sawyer, P.: Relaxing claims: Coping with uncertainty while evaluating assumptions at run time. In: France, R.B., Kazmeier, J., Breu, R., Atkinson, C. (eds.) MODELS 2012. LNCS, vol.\u00a07590, pp. 53\u201369. Springer, Heidelberg (2012)"},{"key":"4_CR114","doi-asserted-by":"crossref","unstructured":"Ramirez, A.J., Cheng, B.H.C., McKinley, P.K.: Adaptive monitoring of software requirements. In: Proceedings of the First International Workshop on Requirements@run.time (RE@run.time 2010), pp. 41\u201350 (2010)","DOI":"10.1109\/RERUNTIME.2010.5628549"},{"key":"4_CR115","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-33119-0_15","volume-title":"Search Based Software Engineering","author":"A.J. Ramirez","year":"2012","unstructured":"Ramirez, A.J., Fredericks, E.M., Jensen, A.C., Cheng, B.H.C.: Automatically RELAXing a goal model to cope with uncertainty. In: Fraser, G., Teixeira de Souza, J. (eds.) SSBSE 2012. LNCS, vol.\u00a07515, pp. 198\u2013212. Springer, Heidelberg (2012)"},{"key":"4_CR116","doi-asserted-by":"crossref","unstructured":"Ramirez, A.J., Jensen, A.C., Cheng, B.H.C.: A taxonomy of uncertainty for dynamically adaptive systems. In: Proceedings of the 7th ACM\/IEEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2012), pp. 99\u2013108 (2012)","DOI":"10.1109\/SEAMS.2012.6224396"},{"key":"4_CR117","doi-asserted-by":"crossref","unstructured":"Rushby, J.: Just-in-time certification. In: Proceedings of the 12th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2007), pp. 15\u201324 (2007)","DOI":"10.1109\/ICECCS.2007.26"},{"key":"4_CR118","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-540-89247-2_2","volume-title":"Runtime Verification","author":"J. Rushby","year":"2008","unstructured":"Rushby, J.: Runtime certification. In: Leucker, M. (ed.) RV 2008. LNCS, vol.\u00a05289, pp. 21\u201335. Springer, Heidelberg (2008)"},{"key":"4_CR119","doi-asserted-by":"crossref","unstructured":"Ryutov, T., Zhou, L., Neuman, C.: Adaptive trust negotiation and access control. In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT 2005), pp. 139\u2013146 (2005)","DOI":"10.1145\/1063979.1064004"},{"key":"4_CR120","unstructured":"Proceedings of the ACM\/IEEE International Conference on Self-Adaptive and Self-Organizing Systems (2007-2014)"},{"key":"4_CR121","doi-asserted-by":"crossref","unstructured":"Schneider, D., Becker, M., Trapp, M.: Approaching runtime trust assurance in open adaptive systems. In: Proceedings of the 6th ACM\/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2011), pp. 196\u2013201 (2011)","DOI":"10.1145\/1988008.1988036"},{"key":"4_CR122","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/11663430_20","volume-title":"Satellite Events at the MoDELS 2005 Conference","author":"J.-S. Sottet","year":"2006","unstructured":"Sottet, J.-S., Calvary, G., Favr\u00e9, J.-M., Coutaz, J., Demeure, A., Balme, L.: Towards model driven engineering of plastic user interfaces. In: Bruel, J.-M. (ed.) MoDELS 2005. LNCS, vol.\u00a03844, pp. 191\u2013200. Springer, Heidelberg (2006)"},{"key":"4_CR123","doi-asserted-by":"crossref","unstructured":"Simanta, S., Morris, E., Balasubramaniam, S., Davenport, J., Smith, D.B.: Information assurance challenges and strategies for securing SOA environments and web services. In: Proceedings of the 3rd IEEE Annual Systems Conference (SysCon 2009), pp. 173\u2013178 (2009)","DOI":"10.1109\/SYSTEMS.2009.4815791"},{"key":"4_CR124","unstructured":"Souza, V.E.S., Lapouchnian, A., Robinson, W.N., Mylopoulos, J.: Awareness requirements for adaptive systems. In: Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2011), pp. 60\u201369 (2011)"},{"issue":"2","key":"4_CR125","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2491465.2491467","volume":"8","author":"D. Schneider","year":"2013","unstructured":"Schneider, D., Trapp, M.: Conditional safety certification of open adaptive systems. ACM Transactions on Autonomous and Adaptive Systems\u00a08(2), 1\u201320 (2013)","journal-title":"ACM Transactions on Autonomous and Adaptive Systems"},{"key":"4_CR126","unstructured":"Tamura, G.: QoS-CARE: A Reliable System for Preserving QoS Contracts through Dynamic Reconfiguration. PhD thesis, University of Lille 1 - Science and Technology and Universidad de Los Andes (2012)"},{"key":"4_CR127","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-27269-1_3","volume-title":"Formal Aspects of Component Software","author":"G. Tamura","year":"2012","unstructured":"Tamura, G., Casallas, R., Cleve, A., Duchien, L.: QoS contract-aware reconfiguration of component architectures using e-graphs. In: Barbosa, L.S., Lumpe, M. (eds.) FACS 2010. LNCS, vol.\u00a06921, pp. 34\u201352. Springer, Heidelberg (2012)"},{"key":"4_CR128","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-35813-5_5","volume-title":"Software Engineering for Self-Adaptive Systems II","author":"G. Tamura","year":"2013","unstructured":"Tamura, G., et al.: Towards Practical Runtime Verification and Validation of Self-Adaptive Software Systems. In: de Lemos, R., Giese, H., M\u00fcller, H.A., Shaw, M. (eds.) Software Engineering for Self-Adaptive Systems. LNCS, vol.\u00a07475, pp. 108\u2013132. Springer, Heidelberg (2013)"},{"key":"4_CR129","doi-asserted-by":"crossref","unstructured":"Tamura, G., Villegas, N.M., M\u00fcller, H.A., Duchien, L., Seinturier, L.: Improving context-awareness in self-adaptation using the dynamico reference model. In: Proceedings of the 8th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2013), pp. 153\u2013162 (2013)","DOI":"10.1109\/SEAMS.2013.6595502"},{"key":"4_CR130","unstructured":"International\u00a0Telecomunication Union. ITU-T Recommendation Z.100: Specification and Description Language, SDL (1999)"},{"key":"4_CR131","unstructured":"Villegas, N.M.: Context Management and Self-Adaptivity for Situation-Aware Smart Software Systems. PhD thesis, Department of Computer Science, University of Victoria, Canada (February 2013)"},{"issue":"11","key":"4_CR132","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1109\/32.730542","volume":"24","author":"A. Lamsweerde van","year":"1998","unstructured":"van Lamsweerde, A., Darimont, R., Letier, E.: Managing conflicts in goal-driven requirements engineering. IEEE Transactions on Software Engineering (TSE)\u00a024(11), 908\u2013926 (1998)","journal-title":"IEEE Transactions on Software Engineering (TSE)"},{"key":"4_CR133","unstructured":"Villegas, N.M., M\u00fcller, H.A., Mu\u00f1oz, J.C., Lau, A., Ng, J., Brealey, C.: A dynamic context management infrastructure for supporting user-driven web integration in the personal web. In: Proceedings of the Conference of the Center for Advanced Studies on Collaborative Research (CASCON 2011), pp. 200\u2013214. ACM (2011)"},{"key":"4_CR134","doi-asserted-by":"crossref","unstructured":"Villegas, N.M., M\u00fcller, H.A., Tamura, G.: Optimizing run-time SOA governance through context-driven SLAs and dynamic monitoring. In: Proceedings of the IEEE International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA 2011), pp. 1\u201310 (2011)","DOI":"10.1109\/MESOCA.2011.6049036"},{"key":"4_CR135","doi-asserted-by":"crossref","unstructured":"Villegas, N.M., M\u00fcller, H.A., Tamura, G., Duchien, L., Casallas, R.: A framework for evaluating quality-driven self-adaptive software systems. In: Proceedings of the 6th ACM\/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2011), pp. 80\u201389 (2011)","DOI":"10.1145\/1988008.1988020"},{"key":"4_CR136","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-35813-5_11","volume-title":"Software Engineering for Self-Adaptive Systems II","author":"N.M. Villegas","year":"2013","unstructured":"Villegas, N.M., Tamura, G., M\u00fcller, H.A., Duchien, L., Casallas, R.: DYNAMICO: A reference model for governing control objectives and context relevance in self-adaptive software systems. In: de Lemos, R., Giese, H., M\u00fcller, H.A., Shaw, M. (eds.) Software Engineering for Self-Adaptive Systems. LNCS, vol.\u00a07475, pp. 265\u2013293. Springer, Heidelberg (2013)"},{"key":"4_CR137","doi-asserted-by":"crossref","unstructured":"Wells, L.: Performance analysis using coloured Petri nets. In: Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (MASCOTS 2002), pp. 217\u2013224 (2002)","DOI":"10.1109\/MASCOT.2002.1167080"},{"key":"4_CR138","doi-asserted-by":"crossref","unstructured":"Weyns, D., Usman Iftikhar, M, de la Iglesia, D.G., Ahmad, T.: A survey of formal methods in self-adaptive systems. In: Proceedings of the Fifth International C* Conference on Computer Science and Software Engineering (C3S2E 2012), pp. 67\u201379. ACM (2012)","DOI":"10.1145\/2347583.2347592"},{"key":"4_CR139","doi-asserted-by":"crossref","unstructured":"Weyns, D., Malek, S., Andersson, J.: Forms: A formal reference model for self-adaptation. In: Proceedings of the 7th IEEE International Conference on Autonomic Computing (ICAC 2010), pp. 205\u2013214 (2010)","DOI":"10.1145\/1809049.1809078"},{"key":"4_CR140","doi-asserted-by":"crossref","unstructured":"Whittle, J., Sawyer, P., Bencomo, N., Cheng, B.H.C., Bruel, J.-M.: RELAX: Incorporating uncertainty into the specification of self-adaptive systems. In: Proceedings of the 17th IEEE International Requirements Engineering Conference (RE 2009), pp. 79\u201388 (2009)","DOI":"10.1109\/RE.2009.36"},{"key":"4_CR141","doi-asserted-by":"crossref","unstructured":"Welsh, K., Sawyer, P., Bencomo, N.: Towards requirements aware systems: Run-time resolution of design-time assumptions. In: Proceedings of the 26th ACM\/IEEE International Conference on Automated Software Engineering (ICSE 20011), pp. 560\u2013563 (2011)","DOI":"10.1109\/ASE.2011.6100125"},{"key":"4_CR142","doi-asserted-by":"crossref","unstructured":"Zhang, J., Cheng, B.H.C.: Specifying adaptation semantics. In: Proceedings of the 2005 Workshop on Architecting Dependable Systems (WADS 2005), pp. 1\u20137. ACM (2005)","DOI":"10.1145\/1083217.1083220"},{"key":"4_CR143","doi-asserted-by":"crossref","unstructured":"Zhang, J., Cheng, B.H.C.: Model-based development of dynamically adaptive software. In: Proceedings of the 28th ACM\/IEEE International Conference on Software Engineering (ICSE 2006), pp. 371\u2013380 (2006)","DOI":"10.1145\/1134285.1134337"},{"key":"4_CR144","doi-asserted-by":"crossref","unstructured":"Zhang, J., Cheng, B.H.C.: Using temporal logic to specify adaptive program semantics. Journal of Systems and Software (JSS)\u00a079(10), 1361\u20131369 (2006); Architecting Dependable Systems","DOI":"10.1016\/j.jss.2006.02.062"},{"key":"4_CR145","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/11556169_9","volume-title":"Architecting Dependable Systems III","author":"J. Zhang","year":"2005","unstructured":"Zhang, J., Cheng, B.H.C., Yang, Z., McKinley, P.K.: Enabling safe dynamic component-based software adaptation. In: de Lemos, R., Gacek, C., Romanovsky, A. (eds.) Architecting Dependable Systems III. LNCS, vol.\u00a03549, pp. 194\u2013211. Springer, Heidelberg (2005)"},{"key":"4_CR146","doi-asserted-by":"crossref","unstructured":"Zhang, J., Goldsby, H.J., Cheng, B.H.C.: Modular verification of dynamically adaptive systems. In: Proceedings of the 8th ACM International Conference on Aspect-Oriented Software Development (AOSD 2009), pp. 161\u2013172 (2009)","DOI":"10.1145\/1509239.1509262"},{"issue":"1","key":"4_CR147","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/237432.237434","volume":"6","author":"P. Zave","year":"1997","unstructured":"Zave, P., Jackson, M.: Four dark corners of requirements engineering. ACM Transactions on Software Engineering Methodology (TOSEM)\u00a06(1), 1\u201330 (1997)","journal-title":"ACM Transactions on Software Engineering Methodology (TOSEM)"}],"container-title":["Lecture Notes in Computer Science","Models@run.time"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08915-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T17:34:44Z","timestamp":1746293684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08915-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319089140","9783319089157"],"references-count":147,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08915-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}