{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:42:59Z","timestamp":1725615779839},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642243714"},{"type":"electronic","value":"9783642243721"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24372-1_12","type":"book-chapter","created":{"date-parts":[[2011,9,29]],"date-time":"2011-09-29T05:41:14Z","timestamp":1317274874000},"page":"150-167","source":"Crossref","is-referenced-by-count":8,"title":["Algorithms for Synthesizing Priorities in Component-Based Systems"],"prefix":"10.1007","author":[{"given":"Chih-Hong","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Saddek","family":"Bensalem","sequence":"additional","affiliation":[]},{"given":"Yu-Fang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Rongjie","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Jobstmann","sequence":"additional","affiliation":[]},{"given":"Harald","family":"Ruess","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Buckl","sequence":"additional","affiliation":[]},{"given":"Alois","family":"Knoll","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Abujarad, F., Bonakdarpour, B., Kulkarni, S.: Parallelizing deadlock resolution in symbolic synthesis of distributed programs. In: PDMC 2009. EPTCS, vol.\u00a014, pp. 92\u2013106 (2009)","DOI":"10.4204\/EPTCS.14.7"},{"key":"12_CR2","first-page":"116","volume-title":"GLSVLSI 2003","author":"F. Aloul","year":"2003","unstructured":"Aloul, F., Markov, I., Sakallah, K.: FORCE: a fast and easy-to-implement variable-ordering heuristic. In: GLSVLSI 2003, pp. 116\u2013119. ACM, New York (2003)"},{"issue":"2","key":"12_CR3","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D. Angluin","year":"1987","unstructured":"Angluin, D.: Learning regular sets from queries and counterexamples. Information and Computation\u00a075(2), 87\u2013106 (1987)","journal-title":"Information and Computation"},{"key":"12_CR4","first-page":"784","volume-title":"ICSE 2007","author":"M. Autili","year":"2007","unstructured":"Autili, M., Inverardi, P., Navarra, A., Tivoli, M.: SYNTHESIS: a tool for automatically assembling correct and distributed component-based systems. In: ICSE 2007, pp. 784\u2013787. IEEE Computer Society, Los Alamitos (2007)"},{"issue":"7","key":"12_CR5","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1109\/9.231459","volume":"38","author":"S. Balemi","year":"1993","unstructured":"Balemi, S., Hoffmann, G., Gyugyi, P., Wong-Toi, H., Franklin, G.: Supervisory control of a rapid thermal multiprocessor. IEEE Transactions on Automatic Control\u00a038(7), 1040\u20131059 (1993)","journal-title":"IEEE Transactions on Automatic Control"},{"key":"12_CR6","first-page":"3","volume-title":"SEFM 2006","author":"A. Basu","year":"2006","unstructured":"Basu, A., Bozga, M., Sifakis, J.: Modeling heterogeneous real-time components in BIP. In: SEFM 2006, pp. 3\u201312. IEEE, Los Alamitos (2006)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-540-88387-6_7","volume-title":"Automated Technology for Verification and Analysis","author":"S. Bensalem","year":"2008","unstructured":"Bensalem, S., Bozga, M., Sifakis, J., Nguyen, T.: Compositional verification for component-based systems and application. In: Cha, S(S.), Choi, J.-Y., Kim, M., Lee, I., Viswanathan, M. (eds.) ATVA 2008. LNCS, vol.\u00a05311, pp. 64\u201379. Springer, Heidelberg (2008)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/978-3-642-20398-5_32","volume-title":"NASA Formal Methods","author":"S. Bensalem","year":"2011","unstructured":"Bensalem, S., Griesmayer, A., Legay, A., Nguyen, T.-H., Sifakis, J., Yan, R.-J.: D-Finder 2: Towards Efficient Correctness of Incremental Design. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NFM 2011. LNCS, vol.\u00a06617, pp. 453\u2013458. Springer, Heidelberg (2011)"},{"key":"12_CR9","volume-title":"EMSOFT 2011","author":"B. Bonakdarpour","year":"2011","unstructured":"Bonakdarpour, B., Bozga, M., Quilbeuf, J.: Automated distributed implementation of component-based models with priorities. In: EMSOFT 2011. ACM, New York (to appear, 2011)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Cheng, C.-H., Bensalem, S., Chen, Y.-F., Yan, R.-J., Jobstmann, B., Ruess, H., Buckl, C., Knoll, A.: Algorithms for synthesizing priorities in component-based systems (extended version), arXiv:1107.1383 [cs.LO] (2011)","DOI":"10.1007\/978-3-642-24372-1_12"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/978-3-642-20398-5_34","volume-title":"NASA Formal Methods","author":"C.-H. Cheng","year":"2011","unstructured":"Cheng, C.-H., Bensalem, S., Jobstmann, B., Yan, R.-J., Knoll, A., Ruess, H.: Model construction and priority synthesis for simple interaction systems. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NFM 2011. LNCS, vol.\u00a06617, pp. 466\u2013471. Springer, Heidelberg (2011)"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-642-22256-6_11","volume-title":"Implementation and Application of Automata","author":"C.-H. Cheng","year":"2011","unstructured":"Cheng, C.-H., Jobstmann, B., Buckl, C., Knoll, A.: On the hardness of priority synthesis. In: Bouchou-Markhoff, B., Caron, P., Champarnaud, J.-M., Maurel, D. (eds.) CIAA 2011. LNCS, vol.\u00a06807, pp. 110\u2013117. Springer, Heidelberg (2011)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/3-540-48683-6_44","volume-title":"Computer Aided Verification","author":"A. Cimatti","year":"1999","unstructured":"Cimatti, A., Clarke, E., Giunchiglia, F., Roveri, M.: NuSMV: a new symbolic model verifier. In: Halbwachs, N., Peled, D.A. (eds.) CAV 1999. LNCS, vol.\u00a01633, pp. 495\u2013499. Springer, Heidelberg (1999)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-36577-X_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"J. Cobleigh","year":"2003","unstructured":"Cobleigh, J., Giannakopoulou, D., P\u0103s\u0103reanu, C.: Learning assumptions for compositional verification. In: Garavel, H., Hatcliff, J. (eds.) TACAS 2003. LNCS, vol.\u00a02619, pp. 331\u2013346. Springer, Heidelberg (2003)"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-540-30101-1_15","volume-title":"Formal Methods for Components and Objects","author":"G. G\u00f6\u00dfler","year":"2004","unstructured":"G\u00f6\u00dfler, G., Sifakis, J.: Priority systems. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol.\u00a03188, pp. 314\u2013329. Springer, Heidelberg (2004)"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Automata, Logics, and Infinite Games","year":"2002","unstructured":"Gr\u00e4del, E., Thomas, W., Wilke, T. (eds.): Automata, Logics, and Infinite Games. LNCS, vol.\u00a02500. Springer, Heidelberg (2002)"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-3-642-14295-6_35","volume-title":"Computer Aided Verification","author":"S. Graf","year":"2010","unstructured":"Graf, S., Peled, D., Quinton, S.: Achieving distributed control through model checking. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol.\u00a06174, pp. 396\u2013409. Springer, Heidelberg (2010)"},{"key":"12_CR18","volume-title":"The Spin Model Checker: Primer and Reference Manual","author":"G. Holzmann","year":"2004","unstructured":"Holzmann, G.: The Spin Model Checker: Primer and Reference Manual. Addison-Wesley Professional, Reading (2004)"},{"issue":"1","key":"12_CR19","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/70.988975","volume":"18","author":"M. Iordache","year":"2002","unstructured":"Iordache, M., Moody, J., Antsaklis, P.: Synthesis of deadlock prevention supervisors using Petri nets. IEEE Transactions on Robotics and Automation\u00a018(1), 59\u201368 (2002)","journal-title":"IEEE Transactions on Robotics and Automation"},{"issue":"2","key":"12_CR20","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1109\/TSMCC.2007.913920","volume":"38","author":"Z. Li","year":"2008","unstructured":"Li, Z., Zhou, M., Wu, N.: A survey and comparison of Petri net-based deadlock prevention policies for flexible manufacturing systems. IEEE Transactions on Systems, Man, and Cybernetics\u00a038(2), 173\u2013188 (2008)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"12_CR21","first-page":"746","volume-title":"FOCS 1990","author":"A. Pneuli","year":"1990","unstructured":"Pneuli, A., Rosner, R.: Distributed reactive systems are hard to synthesize. In: FOCS 1990, vol.\u00a02, pp. 746\u2013757. IEEE Computer Society, Los Alamitos (1990)"},{"issue":"1","key":"12_CR22","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/5.21072","volume":"77","author":"P. Ramadge","year":"1989","unstructured":"Ramadge, P., Wonham, W.: The control of discrete event systems. Proceedings of the IEEE\u00a077(1), 81\u201398 (1989)","journal-title":"Proceedings of the IEEE"}],"container-title":["Lecture Notes in Computer Science","Automated Technology for Verification and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24372-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T14:28:03Z","timestamp":1560695283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24372-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642243714","9783642243721"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24372-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}