{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:37:23Z","timestamp":1725910643245},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319680330"},{"type":"electronic","value":"9783319680347"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68034-7_10","type":"book-chapter","created":{"date-parts":[[2017,9,13]],"date-time":"2017-09-13T17:32:45Z","timestamp":1505323965000},"page":"162-178","source":"Crossref","is-referenced-by-count":0,"title":["Correctness-by-Learning of Infinite-State Component-Based Systems"],"prefix":"10.1007","author":[{"given":"Haitham","family":"Bou-Ammar","sequence":"first","affiliation":[]},{"given":"Mohamad","family":"Jaber","sequence":"additional","affiliation":[]},{"given":"Mohamad","family":"Nassar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,14]]},"reference":[{"issue":"3","key":"10_CR1","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MS.2011.27","volume":"28","author":"A Basu","year":"2011","unstructured":"Basu, A., Bensalem, S., Bozga, M., Combaz, J., Jaber, M., Nguyen, T., Sifakis, J.: Rigorous component-based system design using the BIP framework. IEEE Softw. 28(3), 41\u201348 (2011)","journal-title":"IEEE Softw."},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/978-3-642-02658-4_45","volume-title":"Computer Aided Verification","author":"S Bensalem","year":"2009","unstructured":"Bensalem, S., Bozga, M., Nguyen, T.-H., Sifakis, J.: D-Finder: a tool for compositional deadlock detection and verification. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol. 5643, pp. 614\u2013619. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-02658-4_45"},{"issue":"5","key":"10_CR3","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s00446-012-0168-6","volume":"25","author":"B Bonakdarpour","year":"2012","unstructured":"Bonakdarpour, B., Bozga, M., Jaber, M., Quilbeuf, J., Sifakis, J.: A framework for automated distributed implementation of component-based models. Distrib. Comput. 25(5), 383\u2013409 (2012)","journal-title":"Distrib. Comput."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Charafeddine, H., El-Harake, K., Falcone, Y., Jaber, M.: Runtime enforcement for component-based systems. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, pp. 1789\u20131796, 13\u201317 April 2015","DOI":"10.1145\/2695664.2695879"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Clarke, E.M.: My 27-year quest to overcome the state explosion problem. In: Proceedings of the 24th Annual IEEE Symposium on Logic in Computer Science, LICS 2009, Los Angeles, CA, USA, p. 3, 11\u201314 August 2009","DOI":"10.1109\/LICS.2009.42"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Clarke, E.M., Klieber, W., Nov\u00e1cek, M., Zuliani, P.: Model checking and the state explosion problem. In: Tools for Practical Software Verification, LASER, International Summer School, Elba Island, Italy, Revised Tutorial, pp. 1\u201330 (2011)","DOI":"10.1007\/978-3-642-35746-6_1"},{"issue":"1","key":"10_CR7","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s10270-013-0323-y","volume":"14","author":"Y Falcone","year":"2015","unstructured":"Falcone, Y., Jaber, M., Nguyen, T., Bozga, M., Bensalem, S.: Runtime verification of component-based systems in the BIP framework with formally-proved sound and complete instrumentation. Softw. Syst. Model. 14(1), 173\u2013199 (2015)","journal-title":"Softw. Syst. Model."},{"issue":"2","key":"10_CR8","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s10009-014-0360-z","volume":"17","author":"Y Falcone","year":"2015","unstructured":"Falcone, Y., Zuck, L.D.: Runtime verification: the application perspective. STTT 17(2), 121\u2013123 (2015)","journal-title":"STTT"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Flanagan, C., Qadeer, S.: Predicate abstraction for software verification. In: Conference Record of POPL 2002: The 29th Symposium on Principles of Programming Languages, Portland, OR, USA, pp. 191\u2013202, 16\u201318 January 2002","DOI":"10.1145\/503272.503291"},{"issue":"7","key":"10_CR10","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1109\/TSE.2015.2510001","volume":"42","author":"C Huang","year":"2016","unstructured":"Huang, C., Peled, D.A., Schewe, S., Wang, F.: A game-theoretic foundation for the maximum software resilience against dense errors. IEEE Trans. Softw. Eng. 42(7), 605\u2013622 (2016)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Katz, G., Peled, D.A.: Synthesizing, correcting and improving code, using model checking-based genetic programming. In: Hardware and Software: Verification and Testing - Proceedings of the 9th International Haifa Verification Conference, HVC 2013, Haifa, Israel, pp. 246\u2013261, 5\u20137 November 2013","DOI":"10.1007\/978-3-319-03077-7_17"},{"key":"10_CR12","unstructured":"Lin, L.J.: Reinforcement Learning for Robots Using Neural Networks. Ph.D. thesis, Pittsburgh, PA, USA (1992). uMI Order No. GAX93-22750"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-319-47166-2_12","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques","author":"D Peled","year":"2016","unstructured":"Peled, D.: Automatic synthesis of code using genetic programming. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016, Part I. LNCS, vol. 9952, pp. 182\u2013187. Springer, Cham (2016). doi: 10.1007\/978-3-319-47166-2_12"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-319-46982-9_8","volume-title":"Runtime Verification","author":"D Peled","year":"2016","unstructured":"Peled, D.: Using genetic programming for software reliability. In: Falcone, Y., S\u00e1nchez, C. (eds.) RV 2016. LNCS, vol. 10012, pp. 116\u2013131. Springer, Cham (2016). doi: 10.1007\/978-3-319-46982-9_8"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Pinisetty, S., Preoteasa, V., Tripakis, S., J\u00e9ron, T., Falcone, Y., Marchand, H.: Predictive runtime enforcement. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, pp. 1628\u20131633, 4\u20138 April 2016","DOI":"10.1145\/2851613.2851827"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-40648-0_7","volume-title":"NASA Formal Methods","author":"S Pinisetty","year":"2016","unstructured":"Pinisetty, S., Tripakis, S.: Compositional runtime enforcement. In: Rayadurgam, S., Tkachuk, O. (eds.) NFM 2016. LNCS, vol. 9690, pp. 82\u201399. Springer, Cham (2016). doi: 10.1007\/978-3-319-40648-0_7"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Pnueli, A., Rosner, R.: On the synthesis of a reactive module. In: Conference Record of the Sixteenth Annual ACM Symposium on Principles of Programming Languages, Austin, Texas, USA, pp. 179\u2013190, 11\u201313 January 1989","DOI":"10.1145\/75277.75293"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Pnueli, A., Rosner, R.: Distributed reactive systems are hard to synthesize. In: 31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, vol. II, pp. 746\u2013757, 22\u201324 October 1990","DOI":"10.1109\/FSCS.1990.89597"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-11494-7_22","volume-title":"International Symposium on Programming","author":"JP Queille","year":"1982","unstructured":"Queille, J.P., Sifakis, J.: Specification and verification of concurrent systems in CESAR. In: Dezani-Ciancaglini, M., Montanari, U. (eds.) Programming 1982. LNCS, vol. 137, pp. 337\u2013351. Springer, Heidelberg (1982). doi: 10.1007\/3-540-11494-7_22"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Component Software"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68034-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T12:37:01Z","timestamp":1570106221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68034-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319680330","9783319680347"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68034-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}