{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:49:14Z","timestamp":1725518954589},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540878742"},{"type":"electronic","value":"9783540878759"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87875-9_40","type":"book-chapter","created":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T01:46:10Z","timestamp":1222047970000},"page":"568-583","source":"Crossref","is-referenced-by-count":27,"title":["Automatically Generating Behavioral Models of Adaptive Systems to Address Uncertainty"],"prefix":"10.1007","author":[{"given":"Heather J.","family":"Goldsby","sequence":"first","affiliation":[]},{"given":"Betty H. C.","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Schmidt, D.C.: Model-Driven Engineering. IEEE Computer\u00a039(2) (2006)","DOI":"10.1109\/MC.2006.58"},{"issue":"1","key":"40_CR2","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2008.17","volume":"41","author":"P. McKinley","year":"2008","unstructured":"McKinley, P., Cheng, B.H., Ofria, C., Knoester, D., Beckmann, B., Goldsby, H.: Harnessing digital evolution. IEEE Computer\u00a041(1), 54\u201363 (2008)","journal-title":"IEEE Computer"},{"key":"40_CR3","unstructured":"Goldsby, H.J., Cheng, B.H.C.: An automated approach to detecting unwanted latent behavior in models of high assurance systems. Technical report, Michigan State University (May 2008) (submitted for publication)"},{"issue":"10","key":"40_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MC.2004.175","volume":"37","author":"D. Garlan","year":"2004","unstructured":"Garlan, D., Cheng, S.W., Huang, A.C., Schmerl, B., Steenkiste, P.: Rainbow: Architecture-based self-adaptation with reusable infrastructure. Computer\u00a037(10), 46\u201354 (2004)","journal-title":"Computer"},{"key":"40_CR5","first-page":"23","volume-title":"ICSE \u201991: Proceedings of the 13th International Conference on Software Engineering","author":"M.M. Gorlick","year":"1991","unstructured":"Gorlick, M.M., Razouk, R.R.: Using weaves for software construction and analysis. In: ICSE 1991: Proceedings of the 13th International Conference on Software Engineering, pp. 23\u201334. IEEE Computer Society Press, Los Alamitos (1991)"},{"key":"40_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-60406-5_12","volume-title":"Proc. 5th European Software Engineering Conf. (ESEC 1995)","author":"J. Magee","year":"1995","unstructured":"Magee, J., Dulay, N., Eisenbach, S., Kramer, J.: Specifying Distributed Software Architectures. In: Schafer, W., Botella, P. (eds.) ESEC 1995. LNCS, vol.\u00a0989, pp. 137\u2013153. Springer, Heidelberg (1995)"},{"key":"40_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00500-007-0214-7","volume":"12","author":"J. Noppen","year":"2008","unstructured":"Noppen, J., van den Broek, P., Aksit, M.: Software development with imperfect information. Soft Computing\u00a012, 3\u201328 (2008)","journal-title":"Soft Computing"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Yen, J., Lee, J.: Fuzzy logic as a basis for specifying imprecise requirements. In: Second IEEE International Conference on Fuzzy Systems (1993)","DOI":"10.1109\/FUZZY.1993.327535"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Whittle, J., Jayaraman, P.K.: Generating hierarchical state machines from use case charts. In: 14th IEEE International Requirements Engineering Conference (RE 2006), Washington, DC, USA, pp. 16\u201325 (2006)","DOI":"10.1109\/RE.2006.25"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Harel, D., Kugler, H., Pnueli, A.: Synthesis revisited: Generating statechart models from scenario-based requirements. In: Formal Methods in Software and Systems Modeling (2005)","DOI":"10.1007\/978-3-540-31847-7_18"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Uchitel, S., Brunet, G., Chechik, M.: Behaviour model synthesis from properties and scenarios. In: ICSE 2007: Proceedings of the 29th International Conference on Software Engineering, pp. 34\u201343 (2007)","DOI":"10.1109\/ICSE.2007.21"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Jobstmann, B., Bloem, R.: Optimizations for LTL synthesis. In: FMCAD 2006: Proceedings of the Formal Methods in Computer Aided Design (2006)","DOI":"10.1109\/FMCAD.2006.22"},{"key":"40_CR13","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1162\/106454604773563612","volume":"10","author":"C. Ofria","year":"2004","unstructured":"Ofria, C., Wilke, C.O.: Avida: A software platform for research in computational evolutionary biology. Journal of Artificial Life\u00a010, 191\u2013229, International Society of Artificial Life (ISAL) (2004)","journal-title":"Journal of Artificial Life"},{"key":"40_CR14","unstructured":"Hughes, D., Greenwood, P., Coulson, G., Blair, G., Pappenberger, F., Smith, P., Beven, K.: An intelligent and adaptable flood monitoring and warning system. In: Proceedings of the 5th UK E-Science All Hands Meeting (AHM) (2006)"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, J., Cheng, B.H.C.: Model-based development of dynamically adaptive software. In: ICSE 2006: Proceeding of the 28th International Conference on Software Engineering, pp. 371\u2013380 (2006) (Best Paper Award)","DOI":"10.1145\/1134285.1134337"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Goldsby, H.J., Cheng, B.H.C., McKinley, P.K., Knoester, D.B., Ofria, C.A.: Digital evolution of behavioral models for autonomic systems. In: Proceedings of the 5th International Conference on Autonomic Computing (ICAC 2008), Chicago, Illinois (June 2008) (Best Paper Award)","DOI":"10.1109\/ICAC.2008.26"},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"Konrad, S., Cheng, B.H.C.: Facilitating the construction of specification pattern-based properties. In: Proceedings of the IEEE International Requirements Engineering Conference (RE 2005), Paris, France (August 2005)","DOI":"10.1109\/RE.2005.29"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Cheng, S.W., Garlan, D., Schmerl, B.: Architecture-based self-adaptation in the presence of multiple objectives. In: ICSE 2006 Workshop on Software Engineering for Adaptive and Self-Managing Systems, Shanghai, China (May 2006)","DOI":"10.1145\/1137677.1137679"},{"key":"40_CR19","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: Proceedings of the 21st International Conference on Software Engineering, pp. 411\u2013420 (1999)","DOI":"10.1145\/302405.302672"},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"McUmber, W.E., Cheng, B.H.C.: A general framework for formalizing UML with formal languages. In: Proceedings of the IEEE International Conference on Software Engineering (ICSE 2001), Toronto, Canada (May 2001)","DOI":"10.1109\/ICSE.2001.919116"},{"key":"40_CR21","volume-title":"The Spin Model Checker, Primer and Reference Manual","author":"G. Holzmann","year":"2004","unstructured":"Holzmann, G.: The Spin Model Checker, Primer and Reference Manual. Addison-Wesley, Reading (2004)"},{"key":"40_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, J., Yang, Z., Cheng, B.H., McKinley, P.K.: Adding safeness to dynamic adaptation techniques. In: Proceedings of ICSE 2004 Workshop on Architecting Dependable Systems, Edinburgh, Scotland, UK (May 2004)","DOI":"10.1049\/ic:20040495"}],"container-title":["Lecture Notes in Computer Science","Model Driven Engineering Languages and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87875-9_40.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:51:02Z","timestamp":1619524262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87875-9_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540878742","9783540878759"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87875-9_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}