{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:40:10Z","timestamp":1742938810522,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642244841"},{"type":"electronic","value":"9783642244858"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24485-8_50","type":"book-chapter","created":{"date-parts":[[2011,10,10]],"date-time":"2011-10-10T19:59:05Z","timestamp":1318276745000},"page":"683-698","source":"Crossref","is-referenced-by-count":3,"title":["A Toolchain for the Detection of Structural and Behavioral Latent System Properties"],"prefix":"10.1007","author":[{"given":"Adam C.","family":"Jensen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Betty H. C.","family":"Cheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Heather J.","family":"Goldsby","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edward C.","family":"Nelson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"50_CR1","first-page":"126","volume-title":"Proceedings of IEEE International Symposium on Requirements Engineering","author":"R.R. Lutz","year":"1993","unstructured":"Lutz, R.R.: Analyzing software requirements errors in safety-critical, embedded systems. In: Proceedings of IEEE International Symposium on Requirements Engineering, pp. 126\u2013133. IEEE, Los Alamitos (1993)"},{"key":"50_CR2","unstructured":"Pressman, R.: Software Engineering: A Practitioner\u2019s Approach (2007)"},{"issue":"5","key":"50_CR3","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/32.588521","volume":"23","author":"G.J. Holzmann","year":"2002","unstructured":"Holzmann, G.J.: The model checker SPIN. IEEE Transactions on Software Engineering\u00a023(5), 279\u2013295 (2002)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"50_CR4","first-page":"46","volume-title":"18th Annual Symposium on Foundations of Computer Science","author":"A. Pnueli","year":"1977","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science, pp. 46\u201357. IEEE, Los Alamitos (1977)"},{"key":"50_CR5","first-page":"51","volume-title":"The Spin Verification System: The Second Workshop on the SPIN Verification System: Proceedings of a DIMACS Workshop","author":"P. Kars","year":"1997","unstructured":"Kars, P.: The Application of PROMELA and SPIN in the BOS Project. In: The Spin Verification System: The Second Workshop on the SPIN Verification System: Proceedings of a DIMACS Workshop, August 5, page 51. American Mathematical Society, Providence (1997)"},{"key":"50_CR6","unstructured":"Havelund, K., Lowry, M., Park, S.J., Pecheur, C., Penix, J., Visser, W., White, J.L., et al.: Formal analysis of the remote agent before and after flight. In: Lfm2000: Fifth NASA Langley Formal Methods Workshop, Citeseer (2000)"},{"key":"50_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-16145-2_22","volume-title":"Model Driven Engineering Languages and Systems","author":"H.J. Goldsby","year":"2010","unstructured":"Goldsby, H.J., Cheng, B.H.C.: Automatically Discovering Properties That Specify the Latent Behavior of UML Models. In: Petriu, D.C., Rouquette, N., Haugen, \u00d8. (eds.) MODELS 2010. LNCS, vol.\u00a06394, pp. 316\u2013330. Springer, Heidelberg (2010)"},{"key":"50_CR8","doi-asserted-by":"publisher","DOI":"10.1887\/0750308958","volume-title":"Handbook of evolutionary computation","author":"T. B\u00e4ck","year":"1997","unstructured":"B\u00e4ck, T., Fogel, D.B., Michalewicz, Z.: Handbook of evolutionary computation. Taylor & Francis, Abington (1997)"},{"key":"50_CR9","first-page":"329","volume":"11","author":"J. Lehman","year":"2008","unstructured":"Lehman, J., Stanley, K.O.: Exploiting open-endedness to solve problems through the search for novelty. Artificial Life\u00a011, 329 (2008)","journal-title":"Artificial Life"},{"key":"50_CR10","first-page":"433","volume-title":"Proceedings of the 23rd International Conference on Software Engineering","author":"W.E. McUmber","year":"2001","unstructured":"McUmber, W.E., Cheng, B.H.C.: A general framework for formalizing UML with formal languages. In: Proceedings of the 23rd International Conference on Software Engineering, pp. 433\u2013442. IEEE Computer Society, Los Alamitos (2001)"},{"key":"50_CR11","volume-title":"Design and validation of computer protocols","author":"G.J. Holzmann","year":"1991","unstructured":"Holzmann, G.J.: Design and validation of computer protocols, vol.\u00a094. Prentice Hall, New Jersey (1991)"},{"key":"50_CR12","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1145\/302405.302672","volume-title":"Proceedings of the 21st International Conference on Software Engineering","author":"M.B. Dwyer","year":"1999","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: Proceedings of the 21st International Conference on Software Engineering, pp. 411\u2013420. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"50_CR13","doi-asserted-by":"crossref","unstructured":"Konrad, S., Cheng, B.H.C.: Real-time specification patterns. In: Proceedings of the International Conference on Software Engineering (ICSE 2005), St Louis, MO, USA (2005)","DOI":"10.1145\/1062455.1062526"},{"key":"50_CR14","doi-asserted-by":"crossref","unstructured":"Egyed, A.: Automatically detecting and tracking inconsistencies in software design models. IEEE Transactions on Software Engineering (2010)","DOI":"10.1109\/TSE.2010.38"},{"key":"50_CR15","doi-asserted-by":"crossref","unstructured":"Engels, G., K\u00fcster, J.M., Heckel, R., Groenewegen, L.: A methodology for specifying and analyzing consistency of object-oriented behavioral models 26(5):186\u2013195 (2001)","DOI":"10.1145\/503271.503235"},{"key":"50_CR16","unstructured":"Gomaa, H., Wijesekera, D.: Consistency in multiple-view UML models: a case study. In: Workshop on Consistency Problems in UML-based Software Development II, page 1. Citeseer (2003)"},{"key":"50_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-16145-2_11","volume-title":"Model Driven Engineering Languages and Systems","author":"C. Schwarzl","year":"2010","unstructured":"Schwarzl, C., Peischl, B.: Static- and dynamic consistency analysis of UML state chart models. In: Petriu, D.C., Rouquette, N., Haugen, \u00d8. (eds.) MODELS 2010. LNCS, vol.\u00a06394, pp. 151\u2013165. Springer, Heidelberg (2010)"},{"issue":"2-3","key":"50_CR18","first-page":"231","volume":"10","author":"J. Simmonds","year":"2004","unstructured":"Simmonds, J., Van Der Straeten, R., Jonckers, V., Mens, T.: Maintaining consistency between UML models using description logic. S\u00e9rie L\u2019objet-logiciel, base de donn\u00e9es, r\u00e9seaux\u00a010(2-3), 231\u2013244 (2004)","journal-title":"S\u00e9rie L\u2019objet-logiciel, base de donn\u00e9es, r\u00e9seaux"},{"key":"50_CR19","unstructured":"Wagner, R., Giese, H., Nickel, U.: A plug-in for flexible and incremental consistency management. In: Proc. of the International Conference on the Unified Modeling Language 2003 (Workshop 7: Consistency Problems in UML-based Software Development), San Francisco, USA (2003)"},{"key":"50_CR20","volume-title":"The description logic handbook: theory, implementation, and applications","author":"F. Baader","year":"2003","unstructured":"Baader, F.: The description logic handbook: theory, implementation, and applications. Cambridge Univ. Pr., Cambridge (2003)"},{"key":"50_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/10722167_34","volume-title":"Computer Aided Verification","author":"W. Chan","year":"2000","unstructured":"Chan, W.: Temporal-logic queries. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol.\u00a01855, pp. 450\u2013463. Springer, Heidelberg (2000)"},{"key":"50_CR22","unstructured":"Chang, R.M., Avrunin, G.S., Clarke, L.A.: Property inference from program executions. Technical Report UM-CS-2006-26, University of Massachusetts (2006)"},{"issue":"10","key":"50_CR23","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSE.2003.1237171","volume":"29","author":"A. Gurfinkel","year":"2003","unstructured":"Gurfinkel, A., Chechik, M., Devereux, B.: Temporal logic query checking: A tool for model exploration. IEEE Transactions on Software Engineering\u00a029(10), 898\u2013914 (2003)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"50_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-540-31980-1_30","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"W. Weimer","year":"2005","unstructured":"Weimer, W., Necula, G.C.: Mining temporal specifications for error detection. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol.\u00a03440, pp. 461\u2013476. Springer, Heidelberg (2005)"},{"key":"50_CR25","first-page":"282","volume-title":"ICSE 2006: Proceedings of the 28th International Conference on Software Engineering","author":"J. Yang","year":"2006","unstructured":"Yang, J., Evans, D., Bhardwaj, D., Bhat, T., Das, M.: Perracotta: mining temporal API rules from imperfect traces. In: ICSE 2006: Proceedings of the 28th International Conference on Software Engineering, pp. 282\u2013291. ACM, New York (2006)"},{"key":"50_CR26","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/ICSE.2002.1007952","volume-title":"ICSE 2002: Proceedings of the 24th International Conference on Software Engineering","author":"R.L. Smith","year":"2002","unstructured":"Smith, R.L., Avrunin, G.S., Clarke, L.A., Osterweil, L.J.: Propel: an approach supporting property elucidation. In: ICSE 2002: Proceedings of the 24th International Conference on Software Engineering, pp. 11\u201321. ACM, New York (2002)"},{"key":"50_CR27","doi-asserted-by":"crossref","unstructured":"Jensen, A.C., Cheng, B.H.C., Goldsby, H.J.: A toolchain for the detection of structural and behavioral latent system properties. Technical Report MSU-CSE-11-10, Computer Science and Engineering, Michigan State University, East Lansing, Michigan (May 2011)","DOI":"10.21236\/ADA559459"}],"container-title":["Lecture Notes in Computer Science","Model Driven Engineering Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24485-8_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,9]],"date-time":"2021-12-09T23:36:29Z","timestamp":1639092989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24485-8_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642244841","9783642244858"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24485-8_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}