{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T20:10:03Z","timestamp":1748635803436,"version":"3.41.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319246437"},{"type":"electronic","value":"9783319246444"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24644-4_2","type":"book-chapter","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T05:34:39Z","timestamp":1443072879000},"page":"30-45","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Automated Integration of Service-Oriented Software Systems"],"prefix":"10.1007","author":[{"given":"Marco","family":"Autili","sequence":"first","affiliation":[]},{"given":"Paola","family":"Inverardi","sequence":"additional","affiliation":[]},{"given":"Massimo","family":"Tivoli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,12]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-642-32759-9_4","volume-title":"FM 2012: Formal Methods","author":"F. Aarts","year":"2012","unstructured":"Aarts, F., Heidarian, F., Kuppens, H., Olsen, P., Vaandrager, F.: Automata learning through counterexample guided abstraction refinement. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol.\u00a07436, pp. 10\u201327. Springer, Heidelberg (2012)"},{"issue":"1-2","key":"2_CR2","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s10994-013-5405-0","volume":"96","author":"F. Aarts","year":"2014","unstructured":"Aarts, F., Kuppens, H., Tretmans, J., Vaandrager, F., Verwer, S.: Improving active mealy machine learning for protocol conformance testing. Machine Learning\u00a096(1-2), 189\u2013224 (2014)","journal-title":"Machine Learning"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Alur, R., \u010cern\u00fd, P., Madhusudan, P., Nam, W.: Synthesis of interface specifications for java classes. SIGPLAN Not.\u00a040(1) (2005)","DOI":"10.1145\/1047659.1040314"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-37057-1_4","volume-title":"Fundamental Approaches to Software Engineering","author":"M. Autili","year":"2013","unstructured":"Autili, M., Di Ruscio, D., Di Salle, A., Inverardi, P., Tivoli, M.: A model-based synthesis process for choreography realizability enforcement. In: Cortellessa, V., Varr\u00f3, D. (eds.) FASE 2013 (ETAPS 2013). LNCS, vol.\u00a07793, pp. 37\u201352. Springer, Heidelberg (2013)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-319-08915-7_6","volume-title":"Models@run.time","author":"M. Autili","year":"2014","unstructured":"Autili, M., Di Ruscio, D., Inverardi, P., Pelliccione, P., Tivoli, M.: Modelland: Where do models come from? In: Bencomo, N., France, R., Cheng, B.H.C., A\u00dfmann, U. (eds.) Models@run.time. LNCS, vol.\u00a08378, pp. 162\u2013187. Springer, Heidelberg (2014)"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-642-40894-6_8","volume-title":"Software Engineering for Resilient Systems","author":"M. Autili","year":"2013","unstructured":"Autili, M., Di Salle, A., Tivoli, M.: Synthesis of resilient choreographies. In: Gorbenko, A., Romanovsky, A., Kharchenko, V. (eds.) SERENE 2013. LNCS, vol.\u00a08166, pp. 94\u2013108. Springer, Heidelberg (2013)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Autili, M., Inverardi, P., Tivoli, M.: Automated synthesis of service choreographies. IEEE Software\u00a0(99) (2015)","DOI":"10.1109\/MS.2014.131"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Autili, M., Ruscio, D.D., Salle, A.D., Perucci, A.: Choreosynt: enforcing choreography realizability in the future internet. In: Proc. of FSE 2014 (2014)","DOI":"10.1145\/2635868.2661667"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Autili, M., Tivoli, M.: Distributed enforcement of service choreographies. In: Proc. of FOCLASA 2014 (2014)","DOI":"10.4204\/EPTCS.175.2"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-540-78743-3_24","volume-title":"Fundamental Approaches to Software Engineering","author":"T. Berg","year":"2008","unstructured":"Berg, T., Jonsson, B., Raffelt, H.: Regular inference for state machines using domains with equality tests. In: Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008. LNCS, vol.\u00a04961, pp. 317\u2013331. Springer, Heidelberg (2008)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Inverardi, P., Pelliccione, P., Tivoli, M.: Automatic synthesis of behavior protocols for composable web-services. In: Proc. of ESEC\/FSE (2009)","DOI":"10.1145\/1595696.1595719"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-16092-9_1","volume-title":"Objects and Databases","author":"S. Ceri","year":"2010","unstructured":"Ceri, S., Braga, D., Corcoglioniti, F., Grossniklaus, M., Vadacca, S.: Search computing challenges and directions. In: Dearle, A., Zicari, R.V. (eds.) ICOODB 2010. LNCS, vol.\u00a06348, pp. 1\u20135. Springer, Heidelberg (2010)"},{"issue":"2","key":"2_CR13","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/TSE.2011.105","volume":"38","author":"V. Dallmeier","year":"2012","unstructured":"Dallmeier, V., Knopp, N., Mallon, C., Fraser, G., Hack, S., Zeller, A.: Automatically generating test cases for specification mining. IEEE Transactions on Software Engineering\u00a038(2), 243\u2013257 (2012)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-642-28872-2_2","volume-title":"Fundamental Approaches to Software Engineering","author":"D. Ruscio Di","year":"2012","unstructured":"Di Ruscio, D., Malavolta, I., Muccini, H., Pelliccione, P., Pierantonio, A.: Model-driven techniques to enhance architectural languages interoperability. In: de Lara, J., Zisman, A. (eds.) Fundamental Approaches to Software Engineering. LNCS, vol.\u00a07212, pp. 26\u201342. Springer, Heidelberg (2012)"},{"key":"2_CR15","unstructured":"Hohpe, B.W.G.: Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions, pp. 1\u2013480. Addison-Wesley (2004)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Garlan, D.: Software engineering in an uncertain world. In: Proc. of FoSER 2010, pp. 125\u2013128 (2010)","DOI":"10.1145\/1882362.1882389"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Ghezzi, C., Mocci, A., Monga, M.: Synthesizing intensional behavior models by graph transformation. In: Proc. of ICSE 2009, pp. 430\u2013440 (2009)","DOI":"10.1109\/ICSE.2009.5070542"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-642-33386-6_20","volume-title":"Automated Technology for Verification and Analysis","author":"M. G\u00fcdemann","year":"2012","unstructured":"G\u00fcdemann, M., Sala\u00fcn, G., Ouederni, M.: Counterexample guided synthesis of monitors for realizability enforcement. In: Chakraborty, S., Mukund, M. (eds.) ATVA 2012. LNCS, vol.\u00a07561, pp. 238\u2013253. Springer, Heidelberg (2012)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Hilliard, R., Malavolta, I., Muccini, H., Pelliccione, P.: On the composition and reuse of viewpoints across architecture frameworks. In: Proc. of WICSA-ECSA 2012, pp. 131\u2013140. IEEE Computer Society (2012)","DOI":"10.1109\/WICSA-ECSA.212.21"},{"key":"2_CR20","unstructured":"Hu, D.H., Yang, Q.: CIGAR: Concurrent and Interleaving Goal and Activity Recognition. In: Proc. of AAAI 2008, pp. 1363\u20131368 (2008)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Hungar, H., Margaria, T., Steffen, B.: Test-based model generation for legacy systems. In: Proc. of ITC 2003, vol.\u00a02, pp. 150\u2013159 (2003)","DOI":"10.1109\/TEST.2003.1271205"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Inverardi, P., Autili, M., Di Ruscio, D., Pelliccione, P., Tivoli, M.: Producing software by integration: Challenges and research directions (keynote). In: Proc. of ESEC\/FSE 2013, pp. 2\u201312 (2013)","DOI":"10.1145\/2491411.2505428"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Inverardi, P., Spalazzese, R., Tivoli, M.: Application-layer connector synthesis. In: SFM (2011)","DOI":"10.1007\/978-3-642-21455-4_5"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Inverardi, P., Tivoli, M.: Automatic synthesis of modular connectors via composition of protocol mediation patterns. In: Proceedings of ICSE 2013 (2013)","DOI":"10.1109\/ICSE.2013.6606546"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/11888116_5","volume-title":"Formal Techniques for Networked and Distributed Systems - FORTE 2006","author":"R. Kazhamiakin","year":"2006","unstructured":"Kazhamiakin, R., Pistore, M.: Analysis of realizability conditions for web service choreographies. In: Najm, E., Pradat-Peyre, J.-F., Donzeau-Gouge, V.V. (eds.) FORTE 2006. LNCS, vol.\u00a04229, pp. 61\u201376. Springer, Heidelberg (2006)"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/11841197_15","volume-title":"Web Services and Formal Methods","author":"R. Kazhamiakin","year":"2006","unstructured":"Kazhamiakin, R., Pistore, M.: Choreography conformance analysis: Asynchronous communications and information alignment. In: Bravetti, M., N\u00fa\u00f1ez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol.\u00a04184, pp. 227\u2013241. Springer, Heidelberg (2006)"},{"issue":"6","key":"2_CR27","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/TSE.2010.69","volume":"36","author":"K. Krogmann","year":"2010","unstructured":"Krogmann, K., Kuperberg, M., Reussner, R.: Using genetic search for reverse engineering of parametric behavior models for performance prediction. IEEE Transactions on Software Engineering\u00a036(6), 865\u2013877 (2010)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Li, X., Fan, Y., Wang, J., Wang, L., Jiang, F.: A pattern-based approach to development of service mediators for protocol mediation. In: Proceedings of WICSA 2008, pp. 137\u2013146. IEEE Computer Society (2008)","DOI":"10.1109\/WICSA.2008.13"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Lorenzoli, D., Mariani, L., Pezz\u00e8, M.: Automatic generation of software behavioral models. In: Proc. of ICSE 2008 (2008)","DOI":"10.1145\/1368088.1368157"},{"issue":"4","key":"2_CR30","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1109\/TSE.2011.62","volume":"38","author":"R. Mateescu","year":"2012","unstructured":"Mateescu, R., Poizat, P., Sala\u00fcn, G.: Adaptation of service protocols using process algebra and on-the-fly reduction techniques. IEEE Transactions on Software Engineering\u00a038(4), 755\u2013777 (2012)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Meinke, K.: Automated black-box testing of functional correctness using function approximation. In: Proc. of ISSTA 2004, pp. 143\u2013153 (2004)","DOI":"10.1145\/1007512.1007532"},{"issue":"2","key":"2_CR32","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1006\/ijhc.2001.0523","volume":"56","author":"F. Patern\u00f3","year":"2002","unstructured":"Patern\u00f3, F., Santoro, C.: Preventing user errors by systematic analysis of deviations from the system task model. International Journal of Human-Computer Studies\u00a056(2), 225\u2013245 (2002)","journal-title":"International Journal of Human-Computer Studies"},{"key":"2_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/978-3-540-89652-4_34","volume-title":"Service-Oriented Computing \u2013 ICSOC 2008","author":"G.R. Santhanam","year":"2008","unstructured":"Santhanam, G.R., Basu, S., Honavar, V.G.: TCP \u2212 compose \u2009\u22c6\u2009 \u2013 A TCP-net based algorithm for efficient composition of web services using qualitative preferences. In: Bouguettaya, A., Krueger, I., Margaria, T. (eds.) ICSOC 2008. LNCS, vol.\u00a05364, pp. 453\u2013467. Springer, Heidelberg (2008)"},{"key":"2_CR34","unstructured":"Taylor, R.N., Medvidovi\u0107, N., Dashofy, E.M.: Software Architecture: Foundations, Theory, and Practice, pp. 1\u2013736. Wiley and Sons (2009)"},{"key":"2_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/11596141_39","volume-title":"Service-Oriented Computing - ICSOC 2005","author":"M. Trainotti","year":"2005","unstructured":"Trainotti, M., Pistore, M., Calabrese, G., Zacco, G., Lucchese, G., Barbon, F., Bertoli, P., Traverso, P.: Astro: Supporting composition and execution of web services. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol.\u00a03826, pp. 495\u2013501. Springer, Heidelberg (2005)"},{"key":"2_CR36","unstructured":"van Lamsweerde, A.: Requirements Engineering - From System Goals to UML Models to Software Specifications. Wiley (2009)"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Wasylkowski, A., Zeller, A.: Mining temporal specifications from object usage. In: Proc. of ASE 2009, pp. 295\u2013306 (2009)","DOI":"10.1109\/ASE.2009.30"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Wasylkowski, A., Zeller, A., Lindig, C.: Detecting object usage anomalies. In: Proc. of ESEC-FSE 2007, pp. 35\u201344 (2007)","DOI":"10.1145\/1287624.1287632"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"White, R.W., Roth, R.A.: Exploratory Search: Beyond the Query-Response Paradigm. Synthesis Lectures on Information Concepts, Retrieval, and Services (2009)","DOI":"10.2200\/S00174ED1V01Y200901ICR003"}],"container-title":["Lecture Notes in Computer Science","Fundamentals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24644-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T19:53:11Z","timestamp":1748634791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24644-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319246437","9783319246444"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24644-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"12 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}