{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:09Z","timestamp":1740098949513,"version":"3.37.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319694825"},{"type":"electronic","value":"9783319694832"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69483-2_20","type":"book-chapter","created":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T07:34:48Z","timestamp":1508139288000},"page":"337-349","source":"Crossref","is-referenced-by-count":0,"title":["PranCS: A Protocol and Discrete Controller Synthesis Tool"],"prefix":"10.1007","author":[{"given":"Idress","family":"Husien","sequence":"first","affiliation":[]},{"given":"Sven","family":"Schewe","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Berthier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,17]]},"reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/3-540-36575-3_13","volume-title":"Programming Languages and Systems","author":"K Altisen","year":"2003","unstructured":"Altisen, K., Clodic, A., Maraninchi, F., Rutten, E.: Using controller-synthesis techniques to build property-enforcing layers. In: Degano, P. (ed.) ESOP 2003. LNCS, vol. 2618, pp. 174\u2013188. Springer, Heidelberg (2003). doi: 10.1007\/3-540-36575-3_13"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-60472-3_1","volume-title":"Hybrid Systems II","author":"E Asarin","year":"1995","unstructured":"Asarin, E., Maler, O., Pnueli, A.: Symbolic controller synthesis for discrete and timed systems. In: Antsaklis, P., Kohn, W., Nerode, A., Sastry, S. (eds.) HS 1994. LNCS, vol. 999, pp. 1\u201320. Springer, Heidelberg (1995). doi: 10.1007\/3-540-60472-3_1"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Berthier, N., Maraninchi, F., Mounier, L.: Synchronous Programming of Device Drivers for Global Resource Control in Embedded Operating Systems. ACM Trans. Embed. Comput. Syst. 12(1s), 39: 1\u201339: 26., March 2013","DOI":"10.1145\/2435227.2435235"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Berthier, N., Marchand, H.: Discrete controller synthesis for infinite state systems with ReaX. In: 12th Internation Workshop on Discrete Event Systems. WODES 20114, IFAC, pp. 46\u201353, May 2014","DOI":"10.3182\/20140514-3-FR-4046.00099"},{"issue":"2","key":"20_CR5","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/0890-5401(92)90017-A","volume":"98","author":"JR Burch","year":"1992","unstructured":"Burch, J.R., Clarke, E.M., McMillan, K.L., Dill, D.L., Hwang, L.J.: Symbolic model checking: $$10^{20}$$ states and beyond. Inf. Comput. 98(2), 142\u2013170 (1992)","journal-title":"Inf. Comput."},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/3-540-45657-0_29","volume-title":"Computer Aided Verification","author":"A Cimatti","year":"2002","unstructured":"Cimatti, A., Clarke, E., Giunchiglia, E., Giunchiglia, F., Pistore, M., Roveri, M., Sebastiani, R., Tacchella, A.: NuSMV 2: an opensource tool for symbolic model checking. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, pp. 359\u2013364. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45657-0_29"},{"key":"20_CR7","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1016\/S0950-5849(01)00195-1","volume":"43","author":"JA Clark","year":"2001","unstructured":"Clark, J.A., Jacob, J.L.: Protocols are programs too: the meta-heuristic search for security protocols. Inf. Softw. Technol. 43, 891\u2013904 (2001)","journal-title":"Inf. Softw. Technol."},{"key":"20_CR8","volume-title":"Model Checking","author":"EM Clarke","year":"1999","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)"},{"key":"20_CR9","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1016\/0377-2217(90)90301-Q","volume":"46","author":"D Connolly","year":"1990","unstructured":"Connolly, D.: An improved annealing scheme for the qap. Eur. J. Oper. Res. 46, 93\u2013100 (1990)","journal-title":"Eur. J. Oper. Res."},{"issue":"4","key":"20_CR10","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1109\/9.664159","volume":"43","author":"JE Cury","year":"1998","unstructured":"Cury, J.E., Krogh, B.H., Niinomi, T.: Synthesis of supervisory controllers for hybrid systems based on approximating automata. IEEE Trans. Autom. Control 43(4), 564\u2013568 (1998)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"2","key":"20_CR11","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1007\/s10703-009-0084-y","volume":"35","author":"A Girault","year":"2009","unstructured":"Girault, A., Rutten, \u00c9.: Automating the addition of fault tolerance with discrete controller synthesis. Formal Methods Syst. Des. 35(2), 190 (2009)","journal-title":"Formal Methods Syst. Des."},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/0-306-48056-5_10","volume-title":"Handbook of Metaheuristics, International Series in Operations Research & Management Science","author":"D Henderson","year":"2003","unstructured":"Henderson, D., Jacobson, S.H., Johnson, A.W.: The theory and practice of simulated annealing. In: Glover, F., Kochenberger, G.A. (eds.) Handbook of Metaheuristics, International Series in Operations Research & Management Science, vol. 57, pp. 287\u2013319. Springer, Boston (2003). doi: 10.1007\/0-306-48056-5_10"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Husien, I., Berthier, N., Schewe, S.: A hot method for synthesising cool controllers. In: Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software. SPIN 2017, pp. 122\u2013131. ACM, New York (2017)","DOI":"10.1145\/3092282.3092299"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-319-41591-8_11","volume-title":"Software Engineering and Formal Methods","author":"I Husien","year":"2016","unstructured":"Husien, I., Schewe, S.: Program generation using simulated annealing and model checking. In: De Nicola, R., K\u00fchn, E. (eds.) SEFM 2016. LNCS, vol. 9763, pp. 155\u2013171. Springer, Cham (2016). doi: 10.1007\/978-3-319-41591-8_11"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-540-71605-1_11","volume-title":"Genetic Programming","author":"CG Johnson","year":"2007","unstructured":"Johnson, C.G.: Genetic programming with fitness based on model checking. In: Ebner, M., O\u2019Neill, M., Ek\u00e1rt, A., Vanneschi, L., Esparcia-Alc\u00e1zar, A.I. (eds.) EuroGP 2007. LNCS, vol. 4445, pp. 114\u2013124. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-71605-1_11"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-540-78800-3_11","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G Katz","year":"2008","unstructured":"Katz, G., Peled, D.: Model checking-based genetic programming with an application to mutual exclusion. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 141\u2013156. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-78800-3_11"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-00431-5_8","volume-title":"Model Checking and Artificial Intelligence","author":"G Katz","year":"2009","unstructured":"Katz, G., Peled, D.: Model checking driven heuristic search for correct programs. In: Peled, D.A., Wooldridge, M.J. (eds.) MoChArt 2008. LNCS (LNAI), vol. 5348, pp. 122\u2013131. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-00431-5_8"},{"key":"20_CR18","volume-title":"Genetic Programming: On the Programming of Computers by Means of Natural Selection","author":"JR Koza","year":"1992","unstructured":"Koza, J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge (1992)"},{"issue":"4","key":"20_CR19","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1016\/0005-1098(91)90055-7","volume":"27","author":"BH Krogh","year":"1991","unstructured":"Krogh, B.H., Holloway, L.E.: Synthesis of feedback control logic for discrete manufacturing systems. Automatica 27(4), 641\u2013651 (1991)","journal-title":"Automatica"},{"issue":"4","key":"20_CR20","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1023\/A:1008311720696","volume":"10","author":"H Marchand","year":"2000","unstructured":"Marchand, H., Bournai, P., Le Borgne, M., Le Guernic, P.: Synthesis of discrete-event controllers based on the signal environment. Discrete Event Dynamic Syst. Theory Appl. 10(4), 325\u2013346 (2000)","journal-title":"Discrete Event Dynamic Syst. Theory Appl."},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Pnueli, A., Rosner, R.: On the synthesis of a reactive module. In: Proceedings of the 16th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. POPL 1989. pp. 179\u2013190. ACM, New York (1989)","DOI":"10.1145\/75277.75293"},{"issue":"1","key":"20_CR22","first-page":"81","volume":"77","author":"P Ramadge","year":"1989","unstructured":"Ramadge, P., Wonham, W.: The control of discrete event systems. Proc. IEEE Spec. Issue Dyn. Discr. Event Syst. 77(1), 81\u201398 (1989)","journal-title":"Proc. IEEE Spec. Issue Dyn. Discr. Event Syst."},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Wang, Y., Lafortune, S., Kelly, T., Kudlur, M., Mahlke, S.: The theory of deadlock avoidance via discrete control. In: Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 252\u2013263. POPL 2009. ACM, New York (2009)","DOI":"10.1145\/1594834.1480913"},{"key":"20_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3126-5","volume-title":"Petri Net Synthesis for Discrete Event Control of Manufacturing Systems","author":"M Zhou","year":"2012","unstructured":"Zhou, M., DiCesare, F.: Petri Net Synthesis for Discrete Event Control of Manufacturing Systems, vol. 204. Springer Science & Business Media, Heidelberg (2012). doi: 10.1007\/978-1-4615-3126-5"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering. Theories, Tools, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69483-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T14:51:20Z","timestamp":1570200680000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69483-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319694825","9783319694832"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69483-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}