{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:41Z","timestamp":1740099041529,"version":"3.37.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319747804"},{"type":"electronic","value":"9783319747811"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74781-1_1","type":"book-chapter","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T15:22:24Z","timestamp":1517498544000},"page":"9-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Temporal Analytics for Software Usage Models"],"prefix":"10.1007","author":[{"given":"Oana","family":"Andrei","sequence":"first","affiliation":[]},{"given":"Muffy","family":"Calder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,2]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","volume-title":"Computer Aided Verification","author":"MZ Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M.Z., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585\u2013591. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_47"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-319-33693-0_8","volume-title":"Integrated Formal Methods","author":"O Andrei","year":"2016","unstructured":"Andrei, O., Calder, M., Chalmers, M., Morrison, A., Rost, M.: Probabilistic formal analysis of app usage to inform redesign. In: \u00c1brah\u00e1m, E., Huisman, M. (eds.) IFM 2016. LNCS, vol. 9681, pp. 115\u2013129. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33693-0_8"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-319-10696-0_11","volume-title":"Quantitative Evaluation of Systems","author":"O Andrei","year":"2014","unstructured":"Andrei, O., Calder, M., Higgs, M., Girolami, M.: Probabilistic model checking of DTMC models of user activity patterns. In: Norman, G., Sanders, W. (eds.) QEST 2014. LNCS, vol. 8657, pp. 138\u2013153. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10696-0_11"},{"key":"1_CR4","volume-title":"Principles of Model Checking","author":"C Baier","year":"2008","unstructured":"Baier, C., Katoen, J.P.: Principles of Model Checking. The MIT Press, Cambridge (2008)"},{"key":"1_CR5","volume-title":"Machine Learning: A Probabilistic Perspective","author":"KP Murphy","year":"2012","unstructured":"Murphy, K.P.: Machine Learning: A Probabilistic Perspective. The MIT Press, Cambridge (2012)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-44934-5_6","volume-title":"Web Usage Analysis and User Profiling","author":"J Borges","year":"2000","unstructured":"Borges, J., Levene, M.: Data mining of user navigation patterns. In: Masand, B., Spiliopoulou, M. (eds.) WebKDD 1999. LNCS (LNAI), vol. 1836, pp. 92\u2013112. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44934-5_6"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Chierichetti, F., Kumar, R., Raghavan, P., Sarl\u00f3s, T.: Are web users really Markovian? In: Mille, A., Gandon, F.L., Misselis, J., Rabinovich, M., Staab, S. (eds.) Proceedings of the 21st World Wide Web Conference 2012 (WWW 2012), pp. 609\u2013618. ACM (2012)","DOI":"10.1145\/2187836.2187919"},{"issue":"7","key":"1_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1371\/journal.pone.0102070","volume":"9","author":"P Singer","year":"2014","unstructured":"Singer, P., Helic, D., Taraghi, B., Strohmaier, M.: Detecting memory and structure in human navigation patterns using Markov chain models of varying order. PLoS One 9(7), 1\u201321 (2014)","journal-title":"PLoS One"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Singer, P., Helic, D., Hotho, A., Strohmaier, M.: HypTrails: a Bayesian approach for comparing hypotheses about human trails on the web. In: Gangemi, A., Leonardi, S., Panconesi, A. (eds.) Proceedings of the 24th International Conference on World Wide Web (WWW 2015), pp. 1003\u20131013. ACM (2015)","DOI":"10.1145\/2736277.2741080"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Ghezzi, C., Pezz\u00e8, M., Sama, M., Tamburrelli, G.: Mining behavior models from user-intensive web applications. In: Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), pp. 277\u2013287. ACM (2014)","DOI":"10.1145\/2568225.2568234"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Kostakos, V., Ferreira, D., Gon\u00e7alves, J., Hosio, S.: Modelling smartphone usage: a Markov state transition model. In: Lukowicz, P., Kr\u00fcger, A., Bulling, A., Lim, Y., Patel, S.N. (eds.) Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2016), pp. 486\u2013497 (2016)","DOI":"10.1145\/2971648.2971669"},{"issue":"1","key":"1_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"AP Dempster","year":"1977","unstructured":"Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the EM algorithm. J. Roy. Stat. Soc.: Ser. B (Methodol.) 39(1), 1\u201338 (1977)","journal-title":"J. Roy. Stat. Soc.: Ser. B (Methodol.)"},{"issue":"4","key":"1_CR13","first-page":"10","volume":"53","author":"L Welch","year":"2003","unstructured":"Welch, L.: Hidden Markov models and the Baum-Welch algorithm. IEEE Inf. Theory Soc. Newslett. 53(4), 10\u201313 (2003)","journal-title":"IEEE Inf. Theory Soc. Newslett."},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-642-35632-2_18","volume-title":"Runtime Verification","author":"E Bartocci","year":"2013","unstructured":"Bartocci, E., Grosu, R., Karmarkar, A., Smolka, S.A., Stoller, S.D., Zadok, E., Seyster, J.: Adaptive runtime verification. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 168\u2013182. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35632-2_18"},{"key":"1_CR15","unstructured":"Bell, M., Chalmers, M., Fontaine, L., Higgs, M., Morrison, A., Rooksby, J., Rost, M., Sherwood, S.: Experiences in logging everyday app use. In: ACM Proceedings of Digital Economy 2013 (2013)"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/11562436_9","volume-title":"Formal Techniques for Networked and Distributed Systems - FORTE 2005","author":"L Zhang","year":"2005","unstructured":"Zhang, L., Hermanns, H., Jansen, D.N.: Logic and model checking for hidden Markov models. In: Wang, F. (ed.) FORTE 2005. LNCS, vol. 3731, pp. 98\u2013112. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11562436_9"},{"key":"1_CR17","series-title":"Advances in Computer Vision and Pattern Recognition","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-6699-3","volume-title":"Probabilistic Graphical Models: Principles and Applications","author":"LE Sucar","year":"2015","unstructured":"Sucar, L.E.: Probabilistic Graphical Models: Principles and Applications. ACVPR. Springer, London (2015). https:\/\/doi.org\/10.1007\/978-1-4471-6699-3"},{"key":"1_CR18","unstructured":"Langmead, C.J.: Generalized queries and Bayesian statistical model checking in dynamic Bayesian networks: application to personalized medicine. In: Proceedings of CSB 2009 (2009)"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-642-29860-8_15","volume-title":"Runtime Verification","author":"SD Stoller","year":"2012","unstructured":"Stoller, S.D., Bartocci, E., Seyster, J., Grosu, R., Havelund, K., Smolka, S.A., Zadok, E.: Runtime verification with state estimation. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol. 7186, pp. 193\u2013207. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29860-8_15"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74781-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T22:17:31Z","timestamp":1719785851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74781-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319747804","9783319747811"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74781-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}