{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T18:57:05Z","timestamp":1725908225222},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319659473"},{"type":"electronic","value":"9783319659480"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65948-0_9","type":"book-chapter","created":{"date-parts":[[2017,8,9]],"date-time":"2017-08-09T22:33:00Z","timestamp":1502317980000},"page":"133-148","source":"Crossref","is-referenced-by-count":0,"title":["100 Years of Software - Adapting Cyber-Physical Systems to the Changing World"],"prefix":"10.1007","author":[{"given":"Hayley","family":"Borck","sequence":"first","affiliation":[]},{"given":"Paul","family":"Kline","sequence":"additional","affiliation":[]},{"given":"Hazel","family":"Shackleton","sequence":"additional","affiliation":[]},{"given":"John","family":"Gohde","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Johnston","sequence":"additional","affiliation":[]},{"given":"Perry","family":"Alexander","sequence":"additional","affiliation":[]},{"given":"Todd","family":"Carpenter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,11]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-319-45892-2_8","volume-title":"Software Engineering for Resilient Systems","author":"DE Adjepon-Yamoah","year":"2016","unstructured":"Adjepon-Yamoah, D.E.: cloud-ATAM: method for analysing resilient attributes of cloud-based architectures. In: Crnkovic, I., Troubitsyna, E. (eds.) SERENE 2016. LNCS, vol. 9823, pp. 105\u2013114. Springer, Cham (2016). doi: 10.1007\/978-3-319-45892-2_8"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Arafeen, M.J., Do, H.: Test case prioritization using requirements-based clustering. In: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation (ICST), pp. 312\u2013321. IEEE (2013)","DOI":"10.1109\/ICST.2013.12"},{"key":"9_CR3","unstructured":"Chen, Y., Probert, R.L., Sims, D.P.: Specification-based regression test selection with risk analysis. In: Proceedings of the 2002 Conference of the Centre for Advanced Studies on Collaborative Research, p. 1. IBM Press (2002)"},{"key":"9_CR4","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9153.001.0001","volume-title":"Certified Programming with Dependent Types: A Pragmatic Introduction to the Coq Proof Assistant","author":"A Chlipala","year":"2013","unstructured":"Chlipala, A.: Certified Programming with Dependent Types: A Pragmatic Introduction to the Coq Proof Assistant. MIT Press, Cambridge (2013)"},{"issue":"7","key":"9_CR5","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/32.605761","volume":"23","author":"DM Cohen","year":"1997","unstructured":"Cohen, D.M., Dalal, S.R., Fredman, M.L., Patton, G.C.: The AETG system: an approach to testing based on combinatorial design. IEEE Trans. Softw. Eng. 23(7), 437\u2013444 (1997)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-319-57288-8_26","volume-title":"NASA Formal Methods","author":"T Dreossi","year":"2017","unstructured":"Dreossi, T., Donz\u00e9, A., Seshia, S.A.: Compositional falsification of cyber-physical systems with machine learning components. In: Barrett, C., Davies, M., Kahsai, T. (eds.) NFM 2017. LNCS, vol. 10227, pp. 357\u2013372. Springer, Cham (2017). doi: 10.1007\/978-3-319-57288-8_26"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Feiler, P., Lewis, B., Vestal, S.: The SAE avionics architecture description language (AADL) standard: a basis for model-based architecture-driven embedded systems. In: Real-Time Applications Symposium Workshop on Model-Driven Embedded Systems (2003)","DOI":"10.21236\/ADA612735"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Feiler, P.H., Gluch, D.P., Hudak, J.J.: The architecture analysis & design language (AADL): an introduction. Technical report, DTIC Document (2006)","DOI":"10.21236\/ADA455842"},{"issue":"4","key":"9_CR9","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1007\/s10664-006-9024-2","volume":"11","author":"M Grindal","year":"2006","unstructured":"Grindal, M., Lindstr\u00f6m, B., Offutt, J., Andler, S.F.: An evaluation of combination strategies for test case selection. Empir. Softw. Eng. 11(4), 583\u2013611 (2006)","journal-title":"Empir. Softw. Eng."},{"issue":"1","key":"9_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2853073.2853081","volume":"41","author":"J Hughes","year":"2016","unstructured":"Hughes, J., Sparks, C., Stoughton, A., Parikh, R., Reuther, A., Jagannathan, S.: Building resource adaptive software systems (brass): objectives and system evaluation. ACM SIGSOFT Softw. Eng. Notes 41(1), 1\u20132 (2016)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"9_CR11","unstructured":"Software Engineering Institute. Open source AADL tool environment (osate). http:\/\/la.sei.cmu.edu\/aadlinfosite\/OpenSourceAADLToolEnvironment.html"},{"issue":"1","key":"9_CR12","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"JO Kephart","year":"2003","unstructured":"Kephart, J.O., Chess, D.M.: The vision of autonomic computing. Computer 36(1), 41\u201350 (2003)","journal-title":"Computer"},{"issue":"3","key":"9_CR13","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/2658982.2527271","volume":"33","author":"B Larson","year":"2013","unstructured":"Larson, B., Hatcliff, J., Fowler, K., Delange, J.: Illustrating the AADL error modeling annex (v. 2) using a simple safety-critical medical device. ACM SIGAda Ada Lett. 33(3), 65\u201384 (2013)","journal-title":"ACM SIGAda Ada Lett."},{"issue":"1","key":"9_CR14","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/TSE.2011.104","volume":"38","author":"C Goues Le","year":"2012","unstructured":"Le Goues, C., Nguyen, T., Forrest, S., Weimer, W.: Genprog: a generic method for automatic software repair. IEEE Trans. Softw. Eng. 38(1), 54\u201372 (2012)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"9_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1082983.1083281","volume":"30","author":"C Lott","year":"2005","unstructured":"Lott, C., Jain, A., Dalal, S.: Modeling requirements for combinatorial software testing. ACM SIGSOFT Softw. Eng. Notes 30, 1\u20137 (2005). ACM","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"9_CR16","unstructured":"Mogyorodi, G.: What is requirements-based testing? Technical report, Crosstalk (2003)"},{"key":"9_CR17","volume-title":"The Art of Software Testing","author":"GJ Myers","year":"2011","unstructured":"Myers, G.J., Sandler, C., Badgett, T.: The Art of Software Testing. Wiley, New York (2011)"},{"key":"9_CR18","unstructured":"Neches, R.: Engineered resilient systems (ers) s&t priority description and roadmap (2011)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Perkins, J.H., Kim, S., Larsen, S., Amarasinghe, S., Bachrach, J., Carbin, M., Pacheco, C., Sherwood, F., Sidiroglou, S., Sullivan, G., et al.: Automatically patching errors in deployed software. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. 87\u2013102. ACM (2009)","DOI":"10.1145\/1629575.1629585"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Qi, Y., Mao, X., Lei, Y.: Efficient automated program repair through fault-recorded testing prioritization. In: 2013 29th IEEE International Conference on Software Maintenance (ICSM), pp. 180\u2013189. IEEE (2013)","DOI":"10.1109\/ICSM.2013.29"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Ranganathan, K., Rangarajan, M., Alexander, P., Regan, T.: Automated test vector generation from rosetta requirements. In: VHDL International Users Forum Fall Workshop, Proceedings, pp. 51\u201358. IEEE (2000)","DOI":"10.1109\/VIUF.2000.890263"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez, R.J., Merseguer, J., Bernardi, S.: Modelling and analysing resilience as a security issue within UML. In: Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems, pp. 42\u201351. ACM (2010)","DOI":"10.1145\/2401736.2401741"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-540-74035-3_2","volume-title":"Architecting Dependable Systems IV","author":"A-E Rugina","year":"2007","unstructured":"Rugina, A.-E., Kanoun, K., Ka\u00e2niche, M.: A system dependability modeling framework using AADL and GSPNs. In: Lemos, R., Gacek, C., Romanovsky, A. (eds.) WADS 2006. LNCS, vol. 4615, pp. 14\u201338. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-74035-3_2"},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-24124-6_5","volume-title":"Software Engineering for Resilient Systems","author":"M Stoicescu","year":"2011","unstructured":"Stoicescu, M., Fabre, J.-C., Roy, M.: Architecting resilient computing systems: overall approach and open issues. In: Troubitsyna, E.A. (ed.) SERENE 2011. LNCS, vol. 6968, pp. 48\u201362. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-24124-6_5"}],"container-title":["Lecture Notes in Computer Science","Software Engineering for Resilient Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65948-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T02:37:36Z","timestamp":1569983856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65948-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319659473","9783319659480"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65948-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}