{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:03:18Z","timestamp":1725865398835},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319470719"},{"type":"electronic","value":"9783319470726"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47072-6_3","type":"book-chapter","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T01:20:20Z","timestamp":1474420820000},"page":"34-50","source":"Crossref","is-referenced-by-count":0,"title":["Decomposing Global Quantitative Properties into Local Ones"],"prefix":"10.1007","author":[{"given":"Ilaria","family":"Matteucci","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Santini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Bartocci, E., Bortolussi, L., Nenzi, L., Sanguinetti, G.: On the robustness of temporal properties for stochastic models. In: 2nd International Workshop on Hybrid Systems and Biology, EPTCS, vol. 125, pp. 3\u201319 (2013)","DOI":"10.4204\/EPTCS.125.1"},{"key":"3_CR2","unstructured":"Bistarelli, S., Gadducci, F.: Enhancing constraints manipulation in semiring-based formalisms. In: ECAI, pp. 63\u201367 (2006)"},{"issue":"2","key":"3_CR3","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/256303.256306","volume":"44","author":"S Bistarelli","year":"1997","unstructured":"Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based constraint satisfaction and optimization. J. ACM 44(2), 201\u2013236 (1997)","journal-title":"J. ACM"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Bistarelli, S., Santini, F.: Two trust networks in one: using bipolar structures to fuse trust and distrust. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pp. 383\u2013390. IEEE (2014)","DOI":"10.1109\/PST.2014.6890964"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Bistarelli, S., Santini, F., Martinelli, F., Matteucci, I.: Automated adaptation via quantitative partial model checking. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing, pp. 1993\u20131996. ACM (2016)","DOI":"10.1145\/2851613.2851955"},{"key":"3_CR6","volume-title":"Residuation Theory","author":"TS Blyth","year":"1972","unstructured":"Blyth, T.S., Janowitz, M.F.: Residuation Theory, vol. 102. Pergamon press, Oxford (1972)"},{"issue":"3","key":"3_CR7","first-page":"61","volume":"220","author":"M Faella","year":"2008","unstructured":"Faella, M., Legay, A., Stoelinga, M.: Model checking quantitative linear time logic. ENTCS 220(3), 61\u201377 (2008)","journal-title":"ENTCS"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-540-75254-7_13","volume-title":"Multi-Agent Systems and Applications V","author":"L Gardelli","year":"2007","unstructured":"Gardelli, L., Viroli, M., Omicini, A.: Design patterns for self-organising systems. In: Burkhard, H.-D., Lindemann, G., Verbrugge, R., Varga, L.Z. (eds.) CEEMAS 2007. LNCS, vol. 4696, pp. 123\u2013132. Springer, Heidelberg (2007)"},{"key":"3_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-017-0383-3","volume-title":"Semirings and Affine Equations Over Them: Theory and Applications","author":"J Golan","year":"2003","unstructured":"Golan, J.: Semirings and Affine Equations Over Them: Theory and Applications. Kluwer Academic Pub., Dordrecht (2003)"},{"issue":"4","key":"3_CR10","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1016\/j.jlap.2012.03.008","volume":"81","author":"L Juhl","year":"2012","unstructured":"Juhl, L., Larsen, K.G., Srba, J.: Modal transition systems with weight intervals. J. Log. Algebr. Program. 81(4), 408\u2013421 (2012)","journal-title":"J. Log. Algebr. Program."},{"issue":"6","key":"3_CR11","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1093\/logcom\/1.6.761","volume":"1","author":"KG Larsen","year":"1991","unstructured":"Larsen, K.G., Xinxin, L.: Compositionality through an operational semantics of contexts. J. Logic Comput. 1(6), 761\u2013795 (1991)","journal-title":"J. Logic Comput."},{"issue":"3","key":"3_CR12","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/S1389-1286(01)00291-2","volume":"38","author":"J Li","year":"2002","unstructured":"Li, J., Yarvis, M., Reiher, P.: Securing distributed adaptation. Comput. Netw. 38(3), 347\u2013371 (2002)","journal-title":"Comput. Netw."},{"issue":"1","key":"3_CR13","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.tcs.2005.08.006","volume":"346","author":"A Lluch-Lafuente","year":"2005","unstructured":"Lluch-Lafuente, A., Montanari, U.: Quantitative mu-calculus and CTL defined over constraint semirings. TCS 346(1), 135\u2013160 (2005)","journal-title":"TCS"},{"issue":"2","key":"3_CR14","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.jlap.2011.08.001","volume":"81","author":"JA Mart\u00edn","year":"2012","unstructured":"Mart\u00edn, J.A., Martinelli, F., Pimentel, E.: Synthesis of secure adaptors. J. Log. Algebr. Program. 81(2), 99\u2013126 (2012)","journal-title":"J. Log. Algebr. Program."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Martinelli, F., Matteucci, I., Santini, F.: Semiring-based specification approaches for quantitative security. In: Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL, EPTCS, vol. 194, pp. 95\u2013109 (2015)","DOI":"10.4204\/EPTCS.194.7"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-319-25527-9_20","volume-title":"Programming Languages with Applications to Biology and Security","author":"F Martinelli","year":"2015","unstructured":"Martinelli, F., Matteucci, I., Santini, F.: There are two sides to every question. In: Bodei, C., Ferrari, G.-L., Priami, C. (eds.) Programming Languages with Applications to Biology and Security. LNCS, vol. 9465, pp. 304\u2013318. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-25527-9_20"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/3-540-44826-8_11","volume-title":"Adaptive Agents and Multi-Agent Systems","author":"S Splunter","year":"2003","unstructured":"Splunter, S., Wijngaards, N.J.E., Brazier, F.M.T.: Structuring agents for adaptation. In: Alonso, E., Kudenko, D., Kazakov, D. (eds.) AAMAS 2001-2002. LNCS, vol. 2636, pp. 174\u2013186. Springer, Heidelberg (2003). doi: 10.1007\/3-540-44826-8_11"},{"key":"3_CR18","first-page":"69","volume":"155","author":"L Vigan\u00f2","year":"2006","unstructured":"Vigan\u00f2, L.: Automated security protocol analysis with the AVISPA tool. ENTCS 155, 69\u201386 (2006)","journal-title":"ENTCS"},{"key":"3_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/978-3-540-69868-5_3","volume-title":"Engineering Self-Organising Systems","author":"T Wolf De","year":"2007","unstructured":"De Wolf, T., Holvoet, T.: Design patterns for decentralised coordination in self-organising emergent systems. In: Brueckner, S.A., Hassas, S., Jelasity, M., Yamins, D. (eds.) ESOA 2006. LNCS, vol. 4335, pp. 28\u201349. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Security Assurance"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47072-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T23:17:10Z","timestamp":1498346230000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47072-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319470719","9783319470726"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47072-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}