{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:27:46Z","timestamp":1725794866327},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662436516"},{"type":"electronic","value":"9783662436523"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43652-3_9","type":"book-chapter","created":{"date-parts":[[2014,5,28]],"date-time":"2014-05-28T22:22:12Z","timestamp":1401315732000},"page":"117-123","source":"Crossref","is-referenced-by-count":8,"title":["Analysis of Self-\u22c6 and P2P Systems Using Refinement"],"prefix":"10.1007","author":[{"given":"Manamiary Bruno","family":"Andriamiarina","sequence":"first","affiliation":[]},{"given":"Dominique","family":"M\u00e9ry","sequence":"additional","affiliation":[]},{"given":"Neeraj Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Abrial, J.-R.: Modeling in Event-B: System and Software Engineering. Cambridge University Press (2010)","DOI":"10.1017\/CBO9781139195881"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-642-38613-8_19","volume-title":"Integrated Formal Methods","author":"M.B. Andriamiarina","year":"2013","unstructured":"Andriamiarina, M.B., M\u00e9ry, D., Singh, N.K.: Integrating Proved State-Based Models for Constructing Correct Distributed Algorithms. In: Johnsen, E.B., Petre, L. (eds.) IFM 2013. LNCS, vol.\u00a07940, pp. 268\u2013284. Springer, Heidelberg (2013)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Andriamiarina, M.B., M\u00e9ry, D., Singh, N.K.: Analysis of Self-\u22c6 and P2P Systems using Refinement (Full Report). Technical Report, LORIA, Nancy, France (2014)","DOI":"10.1007\/978-3-662-43652-3_9"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/SASO.2009.25","volume-title":"Proceedings of the 2009 Third IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2009","author":"A. Berns","year":"2009","unstructured":"Berns, A., Ghosh, S.: Dissecting self-* properties. In: Proceedings of the 2009 Third IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2009, pp. 10\u201319. EEE Computer Society, Washington, DC (2009)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Dolev, S.: Self-Stabilization. MIT Press (2000)","DOI":"10.7551\/mitpress\/6156.001.0001"},{"issue":"3","key":"9_CR6","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1145\/177492.177726","volume":"16","author":"L. Lamport","year":"1994","unstructured":"Lamport, L.: A temporal logic of actions. ACM Trans. Prog. Lang. Syst.\u00a016(3), 872\u2013923 (1994)","journal-title":"ACM Trans. Prog. Lang. Syst."},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Leavens, G.T., Abrial, J.-R., Batory, D.S., Butler, M.J., Coglio, A., Fisler, K., Hehner, E.C.R., Jones, C.B., Miller, D., Jones, S.L.P., Sitaraman, M., Smith, D.R., Stump, A.: Roadmap for enhanced languages and methods to aid verification. In: Jarzabek, S., Schmidt, D.C., Veldhuizen, T.L. (eds.) GPCE, pp. 221\u2013236. ACM (2006)","DOI":"10.1145\/1173706.1173740"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Marquezan, C.C., Granville, L.Z.: Self-* and P2P for Network Management - Design Principles and Case Studies. Springer Briefs in Computer Science. Springer (2012)","DOI":"10.1007\/978-1-4471-4201-0"},{"issue":"2-3","key":"9_CR9","first-page":"197","volume":"3","author":"D. M\u00e9ry","year":"2009","unstructured":"M\u00e9ry, D.: Refinement-based guidelines for algorithmic systems. International Journal of Software and Informatics\u00a03(2-3), 197\u2013239 (2009)","journal-title":"International Journal of Software and Informatics"},{"key":"9_CR10","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1145\/2069216.2069252","volume-title":"Proceedings of the Second Symposium on Information and Communication Technology, SoICT 2011","author":"D. M\u00e9ry","year":"2011","unstructured":"M\u00e9ry, D., Singh, N.K.: Automatic code generation from event-b models. In: Proceedings of the Second Symposium on Information and Communication Technology, SoICT 2011, pp. 179\u2013188. ACM, New York (2011)"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-02704-8_8","volume-title":"Autonomic and Trusted Computing","author":"G. Smith","year":"2009","unstructured":"Smith, G., Sanders, J.W.: Formal development of self-organising systems. In: Gonz\u00e1lez Nieto, J., Reif, W., Wang, G., Indulska, J. (eds.) ATC 2009. LNCS, vol.\u00a05586, pp. 90\u2013104. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Abstract State Machines, Alloy, B, TLA, VDM, and Z"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43652-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T23:13:52Z","timestamp":1649114032000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43652-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662436516","9783662436523"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43652-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}