{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:38:01Z","timestamp":1743046681658,"version":"3.40.3"},"publisher-location":"Vienna","reference-count":27,"publisher":"Springer Vienna","isbn-type":[{"type":"print","value":"9783709113455"},{"type":"electronic","value":"9783709113462"}],"license":[{"start":{"date-parts":[[2012,12,21]],"date-time":"2012-12-21T00:00:00Z","timestamp":1356048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,12,21]],"date-time":"2012-12-21T00:00:00Z","timestamp":1356048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-7091-1346-2_17","type":"book-chapter","created":{"date-parts":[[2013,3,14]],"date-time":"2013-03-14T11:42:05Z","timestamp":1363261325000},"page":"393-409","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Detecting Emergent Behavior in a Social Network of Agents"],"prefix":"10.1007","author":[{"given":"Mohammad","family":"Moshirpour","sequence":"first","affiliation":[]},{"given":"Shimaa M.","family":"El-Sherif","sequence":"additional","affiliation":[]},{"given":"Behrouz H.","family":"Far","sequence":"additional","affiliation":[]},{"given":"Reda","family":"Alhajj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,21]]},"reference":[{"key":"17_CR1","volume-title":"Social Network Analysis: A Handbook","author":"J Scott","year":"2000","unstructured":"Scott, J.: Social Network Analysis: A Handbook, 2nd ed. Sage, London\/Thousands Oaks (2000)","edition":"2"},{"key":"17_CR2","volume-title":"Introduction to Social Networks Methods","author":"RA Hanneman","year":"2005","unstructured":"Hanneman, R.A., Riddle, M.: Introduction to Social Networks Methods. Sage, London\/Thousand Oaks (2005)"},{"key":"17_CR3","volume-title":"Version 2","author":"Unified Modeling Language Specification","year":"2006","unstructured":"Unified Modeling Language Specification. Version 2. Available from Rational Software Corporation, Cupertino (2006)"},{"unstructured":"ITU: Message Sequence Charts. Recommendation, International Telecommunication Union (1992)","key":"17_CR4"},{"issue":"1","key":"17_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1142\/S0129054102000935","volume":"13","author":"D Harel","year":"2002","unstructured":"Harel, D., Kugler, H.: Synthesizing state-based object systems from lsc specifications. Int. J.\u00a0Found. Comput. Sci. 13(1), 5\u201351 (2002)","journal-title":"Int. J. Found. Comput. Sci."},{"key":"17_CR6","volume-title":"Distributed and Parallel Embedded Systems","author":"I Kruger","year":"1999","unstructured":"Kruger, I., Grosu, R., Scholz, P., Broy, M.: From mscs to statecharts. In: Rammig, F.J. (ed.) Distributed and Parallel Embedded Systems. Kluwer, Boston (1999)"},{"unstructured":"Makinen, E., Systa, T.: MAS \u2013 an interactive synthesizer to support behavioral modeling in UML. In: ICSE 2001, Toronto (2001)","key":"17_CR7"},{"key":"17_CR8","first-page":"99","volume-title":"Synthesis of behavioral models from scenarios","author":"S Uchitel","year":"2003","unstructured":"Uchitel, S., Kramer, J., Magee, J.: Synthesis of behavioral models from scenarios. IEEE Transaction on Software Engineering, Feb 2003, pp. 99\u2013115"},{"doi-asserted-by":"crossref","unstructured":"Whittle, J., Schumann, J.: Generating statecharts designs from scenarios. In: ICSE, Limerick (2000)","key":"17_CR9","DOI":"10.1145\/337180.337217"},{"unstructured":"Whittle, J., Schumann, J.: Scenario-based engineering of multi-agent systems. In: Agent Technology from a Formal Perspective, 3d ed. Springer, London (2006)","key":"17_CR10"},{"doi-asserted-by":"crossref","unstructured":"Adsul, B., Mukund, M., Kumar, K.N., Narayanan, V.: Casual closure for MSC languages. In: FSTTCS, pp. 335\u2013347. Hyderabad, India (2005)","key":"17_CR11","DOI":"10.1007\/11590156_27"},{"key":"17_CR12","first-page":"623","volume-title":"Inference of message sequence charts","author":"R Alur","year":"2003","unstructured":"Alur, R., Etessami, K., Yannakakis, M.: Inference of message sequence charts. IEEE Transaction on Software Engineering, July 2003, pp. 623\u2013633"},{"doi-asserted-by":"crossref","unstructured":"Muccini, H.: Detecting implied scenarios analyzing nonlocal branching choices. In: FASE 2003, Warsaw (2003)","key":"17_CR13","DOI":"10.1007\/3-540-36578-8_26"},{"doi-asserted-by":"crossref","unstructured":"Uchitel, S., Kramer, J., Magee, J.: Negative scenarios for implied scenario elicitation. In: 10th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2002), Charleston (2002)","key":"17_CR14","DOI":"10.1145\/587051.587069"},{"key":"17_CR15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge\/New York (1994)"},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"MS Granovetter","year":"1973","unstructured":"Granovetter, M.S.: The strength of weak ties. Am. J. Sociol. 78, 1360\u20131380 (1973)","journal-title":"Am. J. Sociol."},{"key":"17_CR17","volume-title":"Getting A Job: A Study of Contacts and Careers","author":"MS Granovetter","year":"1974","unstructured":"Granovetter, M.S.: Getting A Job: A Study of Contacts and Careers. University Of Chicago Press, Cambridge (1974)"},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"201","DOI":"10.2307\/202051","volume":"1","author":"MS Granovetter","year":"1983","unstructured":"Granovetter, M.S.: The strength of weak ties: a network theory revisited. Sociol. Theory 1, 201\u2013233 (1983)","journal-title":"Sociol. Theory"},{"key":"17_CR19","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1086\/229572","volume":"96","author":"B Wellman","year":"1990","unstructured":"Wellman, B., Wortley, S.: Different strokes from different folks: community ties and social support. Am. J. Sociol. 96, 558\u2013588 (1990)","journal-title":"Am. J. Sociol."},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"393","DOI":"10.2307\/2095260","volume":"46","author":"N Lin","year":"1981","unstructured":"Lin, N., Ensel, W.M., Vaughn, J.C.: Social resources and strength of ties: structural factors in occupational status attainment. Am. Sociol. Rev. 46, 393\u2013405 (1981)","journal-title":"Am. Sociol. Rev."},{"key":"17_CR21","volume-title":"Structural Holes: The Social Structure of Competition","author":"R Burt","year":"1995","unstructured":"Burt, R.: Structural Holes: The Social Structure of Competition. Harvard University Press, Cambridge (1995)"},{"unstructured":"Far, B.H., Zhong, C., Yang, Z., Afsharchi, M.: Realization of semantic search using concept learning and document annotation agents. In: Proceeding of Twenty-First International Conference on Software Engineering and Knowledge Engineering (SEKE), pp.\u00a0164\u2013169. Boston, USA (2009)","key":"17_CR22"},{"unstructured":"Lally, A., Verspoor, K., Nyberg, E.: Unstructured Information Management Architecture (UIMA) Version 1.0 (OASIS, 2008) (2008)","key":"17_CR23"},{"unstructured":"Moshirpour, M., Mousavi, A., Far, B.: Detecting emergent behavior in distributed systems using scenario-based specifications. In: International Conference on Software Engineering and Knowledge Engineering, San Francisco (2010)","key":"17_CR24"},{"unstructured":"Mousavi, A.: Inference of emergent behaviours of scenario-based specifications. In: Department of Electrial and Computer Engineering, vol. PhD, University of Calgary, Calgary (2009)","key":"17_CR25"},{"doi-asserted-by":"crossref","unstructured":"Goldenson, D.R., Gibson, D.L.: Demonstrating the impact and benefits of CMMI: an update and preliminary results. CMU\/SEI-2003-SR-009, Pittsburgh, Oct 2003","key":"17_CR26","DOI":"10.21236\/ADA418481"},{"unstructured":"Mousavi, A., Far, B.: Eliciting scenarios from scenarios. In: Proceedings of 20th International Conference on Software Engineering and Knowledge Engineering (SEKE 2008), San\u00a0Francisco, 1\u20133 July 2008","key":"17_CR27"}],"container-title":["Lecture Notes in Social Networks","The Influence of Technology on Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-7091-1346-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T15:05:50Z","timestamp":1676300750000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-7091-1346-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,21]]},"ISBN":["9783709113455","9783709113462"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-7091-1346-2_17","relation":{},"ISSN":["2190-5428","2190-5436"],"issn-type":[{"type":"print","value":"2190-5428"},{"type":"electronic","value":"2190-5436"}],"subject":[],"published":{"date-parts":[[2012,12,21]]},"assertion":[{"value":"21 December 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}