{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:37Z","timestamp":1725889897164},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642361760"},{"type":"electronic","value":"9783642361777"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36177-7_2","type":"book-chapter","created":{"date-parts":[[2013,1,2]],"date-time":"2013-01-02T06:25:26Z","timestamp":1357107926000},"page":"20-37","source":"Crossref","is-referenced-by-count":4,"title":["On-the-Fly Dependable Mediation between Heterogeneous Networked Systems"],"prefix":"10.1007","author":[{"given":"Antonia","family":"Bertolino","sequence":"first","affiliation":[]},{"given":"Antonello","family":"Calabr\u00f2","sequence":"additional","affiliation":[]},{"given":"Felicita","family":"Di Giandomenico","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Nostro","sequence":"additional","affiliation":[]},{"given":"Paola","family":"Inverardi","sequence":"additional","affiliation":[]},{"given":"Romina","family":"Spalazzese","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Bondavalli, A., Chiaradonna, S., Giandomenico, F.D.: Model-based evaluation as a support to the design of dependable systems. In: Diab, H.B., Zomaya, A.Y. (eds.) Dependable Computing Systems: Paradigms, Performance Issues, and Applications, pp. 57\u201386. Wiley (2005)"},{"key":"2_CR2","unstructured":"CONNECT Consortium: Deliverable 6.1 \u2013 Experiment scenarios, prototypes and report \u2013 Iteration 1 (2011)"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-16561-0_25","volume-title":"Leveraging Applications of Formal Methods, Verification, and Validation","author":"P. Inverardi","year":"2010","unstructured":"Inverardi, P., Issarny, V., Spalazzese, R.: A Theory of Mediators for Eternal Connectors. In: Margaria, T., Steffen, B. (eds.) ISoLA 2010, Part II. LNCS, vol.\u00a06416, pp. 236\u2013250. Springer, Heidelberg (2010)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Spalazzese, R., Inverardi, P., Issarny, V.: Towards a formalization of mediating connectors for on the fly interoperability. In: Proceedings of the WICSA\/ECSA 2009, pp. 345\u2013348 (2009)","DOI":"10.1109\/WICSA.2009.5290664"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-642-15114-9_26","volume-title":"Software Architecture","author":"R. Spalazzese","year":"2010","unstructured":"Spalazzese, R., Inverardi, P.: Mediating Connector Patterns for Components Interoperability. In: Babar, M.A., Gorton, I. (eds.) ECSA 2010. LNCS, vol.\u00a06285, pp. 335\u2013343. Springer, Heidelberg (2010)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Spalazzese, R., Inverardi, P.: Components interoperability through mediating connector pattern. In: WCSI 2010, arXiv:1010.2337. EPTCS, vol.\u00a037, pp. 27\u201341 (2010)","DOI":"10.4204\/EPTCS.37.3"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-642-21455-4_11","volume-title":"Formal Methods for Eternal Networked Software Systems","author":"A. Bertolino","year":"2011","unstructured":"Bertolino, A., Calabr\u00f3, A., Di Giandomenico, F., Nostro, N.: Dependability and Performance Assessment of Dynamic CONNECTed Systems. In: Bernardo, M., Issarny, V. (eds.) SFM 2011. LNCS, vol.\u00a06659, pp. 350\u2013392. Springer, Heidelberg (2011)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Masci, P., Martinucci, M., Di Giandomenico, F.: Towards automated dependability analysis of dynamically connected systems. In: Proc. IEEE International Symposium on Autonomous Decentralized Systems, Kobe, Japan, pp. 139\u2013146. IEEE (June 2011)","DOI":"10.1109\/ISADS.2011.23"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-642-24124-6_7","volume-title":"Software Engineering for Resilient Systems","author":"P. Masci","year":"2011","unstructured":"Masci, P., Nostro, N., Di Giandomenico, F.: On Enabling Dependability Assurance in Heterogeneous Networks through Automated Model-Based Analysis. In: Troubitsyna, E.A. (ed.) SERENE 2011. LNCS, vol.\u00a06968, pp. 78\u201392. Springer, Heidelberg (2011)"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/0743-7315(92)90006-9","volume":"15","author":"W.H. Sanders","year":"1992","unstructured":"Sanders, W.H., Malhis, L.M.: Dependability evaluation using composed SAN-based reward models. Journal of Parallel and Distributed Computing\u00a015, 238\u2013254 (1992)","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/3-540-46429-8_25","volume-title":"Computer Performance Evaluation. Modelling Techniques and Tools","author":"D. Daly","year":"2000","unstructured":"Daly, D., Deavours, D.D., Doyle, J.M., Webster, P.G., Sanders, W.H.: M\u00f6bius: An Extensible Tool for Performance and Dependability Modeling. In: Haverkort, B.R., Bohnenkamp, H.C., Smith, C.U. (eds.) TOOLS 2000. LNCS, vol.\u00a01786, pp. 332\u2013336. Springer, Heidelberg (2000)"},{"key":"2_CR12","unstructured":"Drools fusion: Complex event processor, \n                    \n                      http:\/\/www.jboss.org\/drools\/drools-fusion.html"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Weiser, M.: Hot Topics: Ubiquitous Computing. IEEE Computer (1993)","DOI":"10.1109\/2.237456"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/49.46852","volume":"8","author":"K.L. Calvert","year":"1990","unstructured":"Calvert, K.L., Lam, S.S.: Formal methods for protocol conversion. IEEE Journal on Selected Areas in Communications\u00a08, 127\u2013142 (1990)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1109\/32.6181","volume":"14","author":"S.S. Lam","year":"1988","unstructured":"Lam, S.S.: Correction to \u201dprotocol conversion\u201d. IEEE Trans. Software Eng.\u00a014, 1376 (1988)","journal-title":"IEEE Trans. Software Eng."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Okumura, K.: A formal protocol conversion method. In: SIGCOMM, pp. 30\u201337 (1986)","DOI":"10.1145\/1013812.18176"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.121508","volume":"25","author":"G. Wiederhold","year":"1992","unstructured":"Wiederhold, G.: Mediators in the architecture of future information systems. IEEE Computer\u00a025, 38\u201349 (1992)","journal-title":"IEEE Computer"},{"key":"2_CR18","unstructured":"Garlan, D., Shaw, M.: An introduction to software architecture. Technical Report CMU-CS-94-166, Carnegie Mellon University (1994)"},{"key":"2_CR19","series-title":"A System of Patterns","volume-title":"Pattern-Oriented Software Architecture","author":"F. Buschmann","year":"1996","unstructured":"Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., Stal, M.: Pattern-Oriented Software Architecture. A System of Patterns, vol.\u00a01. Wiley, Chichester (1996)"},{"key":"2_CR20","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Resusable Object-Oriented Software. Addison-Wesley Professional (1995)"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/32.685257","volume":"24","author":"M. Wermelinger","year":"1998","unstructured":"Wermelinger, M., Fiadeiro, J.L.: Connectors for mobile programs. IEEE Trans. Softw. Eng.\u00a024, 331\u2013341 (1998)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"2_CR22","unstructured":"Spitznagel, B.: Compositional Transformation of Software Connectors. PhD thesis, Carnegie Mellon University (2004)"},{"key":"2_CR23","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1145\/1772690.1772765","volume-title":"Proceedings of the 19th International Conference on World Wide Web, WWW 2010","author":"H.R. Motahari Nezhad","year":"2010","unstructured":"Motahari Nezhad, H.R., Xu, G.Y., Benatallah, B.: Protocol-aware matching of web service interfaces for adapter development. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 731\u2013740. ACM, New York (2010)"},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/11678564_12","volume-title":"Business Process Management Workshops","author":"E. Cimpian","year":"2006","unstructured":"Cimpian, E., Mocan, A.: WSMX Process Mediation Based on Choreographies. In: Bussler, C.J., Haller, A. (eds.) BPM 2005. LNCS, vol.\u00a03812, pp. 130\u2013143. Springer, Heidelberg (2006)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Vacul\u00edn, R., Sycara, K.: Towards automatic mediation of OWL-S process models. In: IEEE International Conference on Web Services, pp. 1032\u20131039 (2007)","DOI":"10.1109\/ICWS.2007.177"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/11762256_46","volume-title":"The Semantic Web: Research and Applications","author":"S..K. Williams","year":"2006","unstructured":"Williams, S.K., Battle, S.A., Cuadrado, J.E.: Protocol Mediation for Adaptation in Semantic Web Services. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol.\u00a04011, pp. 635\u2013649. Springer, Heidelberg (2006)"},{"key":"2_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-10383-4_11","volume-title":"Service-Oriented Computing","author":"L. Cavallaro","year":"2009","unstructured":"Cavallaro, L., Di Nitto, E., Pradella, M.: An Automatic Approach to Enable Replacement of Conversational Services. In: Baresi, L., Chi, C.-H., Suzuki, J. (eds.) ICSOC-ServiceWave 2009. LNCS, vol.\u00a05900, pp. 159\u2013174. Springer, Heidelberg (2009)"},{"key":"2_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/11841760_6","volume-title":"Business Process Management","author":"M. Dumas","year":"2006","unstructured":"Dumas, M., Spork, M., Wang, K.: Adapt or Perish: Algebra and Visual Notation for Service Interface Adaptation. In: Dustdar, S., Fiadeiro, J.L., Sheth, A.P. (eds.) BPM 2006. LNCS, vol.\u00a04102, pp. 65\u201380. Springer, Heidelberg (2006)"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Spitznagel, B., Garlan, D.: A compositional formalization of connector wrappers. In: ICSE, pp. 374\u2013384 (2003)","DOI":"10.1109\/ICSE.2003.1201216"},{"key":"2_CR30","unstructured":"Fiadeiro, J.L., Lopes, A., Wermelinger, M.: Theory and practice of software architectures. Tutorial at the 16th IEEE Conference on Automated Software Engineering, San Diego, CA, USA, November 26-29 (2001)"},{"key":"2_CR31","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/839268.839272","volume":"12","author":"A. Lopes","year":"2003","unstructured":"Lopes, A., Wermelinger, M., Fiadeiro, J.L.: Higher-order architectural connectors. ACM Trans. Softw. Eng. Methodol.\u00a012, 64\u2013104 (2003)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"2_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-540-31862-0_6","volume-title":"Theoretical Aspects of Computing - ICTAC 2004","author":"M.A. Barbosa","year":"2005","unstructured":"Barbosa, M.A., Barbosa, L.S.: Specifying Software Connectors. In: Liu, Z., Araki, K. (eds.) ICTAC 2004. LNCS, vol.\u00a03407, pp. 52\u201367. Springer, Heidelberg (2005)"},{"key":"2_CR33","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.tcs.2006.07.005","volume":"366","author":"R. Bruni","year":"2006","unstructured":"Bruni, R., Lanese, I., Montanari, U.: A basic algebra of stateless connectors. Theor. Comput. Sci.\u00a0366, 98\u2013120 (2006)","journal-title":"Theor. Comput. Sci."},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Yellin, D.M., Strom, R.E.: Protocol specifications and component adaptors. ACM Trans. Program. Lang. Syst. 19 (1997)","DOI":"10.1145\/244795.244801"},{"key":"2_CR35","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.scico.2008.03.001","volume":"71","author":"M. Tivoli","year":"2008","unstructured":"Tivoli, M., Inverardi, P.: Failure-free coordinators synthesis for component-based architectures. Sci. Comput. Program.\u00a071, 181\u2013212 (2008)","journal-title":"Sci. Comput. Program."},{"key":"2_CR36","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/TSE.2008.31","volume":"34","author":"C. Canal","year":"2008","unstructured":"Canal, C., Poizat, P., Sala\u00fcn, G.: Model-based adaptation of behavioral mismatching components. IEEE Trans. Software Eng.\u00a034, 546\u2013563 (2008)","journal-title":"IEEE Trans. Software Eng."},{"key":"2_CR37","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TDSC.2004.11","volume":"1","author":"D.M. Nicol","year":"2004","unstructured":"Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: from dependability to security. IEEE Transactions on Dependable and Secure Computing\u00a01, 48\u201365 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"2_CR38","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MNET.2004.1265833","volume":"18","author":"P. Pietzuch","year":"2004","unstructured":"Pietzuch, P., Shand, B., Bacon, J.: Composite event detection as a generic middleware extension. IEEE Network\u00a018, 44\u201355 (2004)","journal-title":"IEEE Network"},{"key":"2_CR39","unstructured":"Hussein, E.A.S., Abdel-wahab, H., Maly, K.: HiFi: A New Monitoring Architecture for Distributed Systems Management. In: Proceedings of ICDCS, pp. 171\u2013178 (1999)"},{"key":"2_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11955498_1","volume-title":"Service Availability","author":"K. Mishra","year":"2006","unstructured":"Mishra, K., Trivedi, K.S.: Model Based Approach for Autonomic Availability Management. In: Penkler, D., Reitenspiess, M., Tam, F. (eds.) ISAS 2006. LNCS, vol.\u00a04328, pp. 1\u201316. Springer, Heidelberg (2006)"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Pietrantuono, R., Russo, S., Trivedi, K.S.: Online monitoring of software system reliability. In: Proc. EDCC 2010 - 2010 European Dependable Computing Conference, pp. 209\u2013218. IEEE Computer Society (2010)","DOI":"10.1109\/EDCC.2010.33"}],"container-title":["Communications in Computer and Information Science","Software and Data Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36177-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T03:50:50Z","timestamp":1557460250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36177-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642361760","9783642361777"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36177-7_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}