{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T18:12:41Z","timestamp":1693332761876},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,9,13]],"date-time":"2012-09-13T00:00:00Z","timestamp":1347494400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1007\/s00607-012-0214-z","type":"journal-article","created":{"date-parts":[[2012,9,12]],"date-time":"2012-09-12T03:53:43Z","timestamp":1347422023000},"page":"191-221","source":"Crossref","is-referenced-by-count":5,"title":["Detecting component changes at run time with behavior models"],"prefix":"10.1007","volume":"95","author":[{"given":"Andrea","family":"Mocci","sequence":"first","affiliation":[]},{"given":"Mario","family":"Sangiorgio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,9,13]]},"reference":[{"issue":"2","key":"214_CR1","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D Angluin","year":"1987","unstructured":"Angluin D (1987) Learning regular sets from queries and counterexamples. Inf Comput 75(2):87\u2013106","journal-title":"Inf Comput"},{"key":"214_CR2","doi-asserted-by":"crossref","unstructured":"Baresi L, Ghezzi C (2010) The disappearing boundary between development-time and run-time. In: FoSER \u201910, New York, NY, USA","DOI":"10.1145\/1882362.1882367"},{"key":"214_CR3","doi-asserted-by":"crossref","unstructured":"Baresi L, Guinea S (2011) Self-supervising bpel processes. IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2010.37"},{"key":"214_CR4","doi-asserted-by":"crossref","unstructured":"Bertolino A, Inverardi P, Pelliccione P, Tivoli M (2009) Automatic synthesis of behavior protocols for composable web-services. In: Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, ESEC\/FSE \u201909. ACM, New York, pp 141\u2013150","DOI":"10.1145\/1595696.1595719"},{"key":"214_CR5","doi-asserted-by":"crossref","unstructured":"Dallmeier V, Knopp N, Mallon C, Hack S, Zeller A (2010) Generating test cases for specification mining. In: ISSTA \u201910: proceedings of the (2010) ACM SIGSOFT international symposium on software testing and analysis, Trento, Italy","DOI":"10.1145\/1831708.1831719"},{"key":"214_CR6","doi-asserted-by":"crossref","unstructured":"Dallmeier V, Lindig C, Wasylkowski A, Zeller A (2006) Mining object behavior with adabu. In: Proceedings of the 2006 international workshop on dynamic systems analysis, WODA \u201906. ACM, New York, pp 17\u201324","DOI":"10.1145\/1138912.1138918"},{"issue":"1","key":"214_CR7","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1109\/TSE.2010.98","volume":"38","author":"G Caso de","year":"2012","unstructured":"de Caso G, Braberman V, Garbervetsky D, Uchitel S (2012) Automated abstractions for contract validation. IEEE Trans Softw Eng 38(1):141\u2013162","journal-title":"IEEE Trans Softw Eng"},{"key":"214_CR8","doi-asserted-by":"crossref","unstructured":"Di Nitto E, Ghezzi C, Metzger A, Papazoglou M, Pohl K (2008) A journey to highly dynamic, self-adaptive service-based applications. ASE","DOI":"10.1007\/s10515-008-0032-x"},{"issue":"2","key":"214_CR9","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/192218.192221","volume":"3","author":"R Doong","year":"1994","unstructured":"Doong R, Frankl PG (1994) The ASTOOT approach to testing object-oriented programs. ACM Trans Softw Eng Methods 3(2):101\u2013130","journal-title":"ACM Trans Softw Eng Methods"},{"key":"214_CR10","doi-asserted-by":"crossref","unstructured":"Dupont P (1996) Incremental regular inference. In: Proceedings of the third ICGI-96. Springer, Berlin, pp 222\u2013237","DOI":"10.1007\/BFb0033357"},{"key":"214_CR11","doi-asserted-by":"crossref","unstructured":"Ghezzi C, Mocci A, Monga M (2009) Synthesizing intensional behavior models by graph transformation. In: Proceedings of the 31st international conference on software engineering, ICSE \u201909. IEEE Computer Society, Washington, pp 430\u2013440","DOI":"10.1109\/ICSE.2009.5070542"},{"key":"214_CR12","doi-asserted-by":"crossref","unstructured":"Ghezzi C, Mocci A, Sangiorgio M (2011) Runtime monitoring of functional component changes with behavior models. In: Models@run.time \u201911, Wellington, New Zealand","DOI":"10.1007\/978-3-642-29645-1_17"},{"key":"214_CR13","doi-asserted-by":"crossref","unstructured":"Goguen J, Malcolm G (2000) A hidden agenda. Theor Comput Sci 245(1):55\u2013101","DOI":"10.1016\/S0304-3975(99)00275-3"},{"key":"214_CR14","volume-title":"Program development in Java: abstraction, specification and object-oriented design","author":"J Guttag","year":"2001","unstructured":"Guttag J, Liskov B (2001) Program development in Java: abstraction, specification and object-oriented design. Addison-Wesley, New York"},{"key":"214_CR15","unstructured":"Hooman J, Hendriks T (2007) Model-based run-time error detection. In: Models@run.time \u201907, Nashville, USA"},{"key":"214_CR16","volume-title":"Software abstractions: logic, language, and analysis","author":"D Jackson","year":"2011","unstructured":"Jackson D (2011) Software abstractions: logic, language, and analysis. MIT Press, Boston"},{"key":"214_CR17","doi-asserted-by":"crossref","unstructured":"Lorenzoli D, Mariani L, Pezz\u00e8 M (2008) Automatic generation of software behavioral models. In: Proceedings of the 30th international conference on software engineering, ICSE \u201908. ACM, New York, pp 501\u2013510","DOI":"10.1145\/1368088.1368157"},{"key":"214_CR18","doi-asserted-by":"crossref","unstructured":"Maoz S (2009) Using model-based traces as runtime models. IEEE Computer","DOI":"10.1007\/978-3-642-01648-6_12"},{"key":"214_CR19","doi-asserted-by":"crossref","unstructured":"Marchetto A, Tonella P, Ricca F (2008) State-based testing of ajax web applications. In: 1st International conference on software testing, verification, and validation, pp 121\u2013130","DOI":"10.1109\/ICST.2008.22"},{"key":"214_CR20","unstructured":"Mocci A (2010) Behavioral modeling, inference and validation for stateful component specifications. PhD thesis, Politecnico di Milano, Milano, Italy"},{"key":"214_CR21","doi-asserted-by":"crossref","unstructured":"Morin B, Barais O, Jezequel J-M, Fleurey F, Solberg A (2009) Models@ run.time to support dynamic adaptation. Computer","DOI":"10.1109\/MC.2009.327"},{"key":"214_CR22","doi-asserted-by":"crossref","unstructured":"Murphy C, Kaiser G, Vo I, Chu M (2009) Quality assurance of software applications using the in vivo testing approach. In: Proceedings of the 2009 international conference on software testing verification and validation, ICST \u201909. IEEE Computer Society, Washington, pp 111\u2013120","DOI":"10.1109\/ICST.2009.18"},{"key":"214_CR23","unstructured":"Oracle, java se 6.0 doc (2011) http:\/\/download.oracle.com\/javase\/6\/docs\/index.html"},{"key":"214_CR24","doi-asserted-by":"crossref","unstructured":"Parekh R, Nichitiu C, Honavar V (1998) A polynomial time incremental algorithm for learning dfa. In: Proceedings of the fifth ICGI-98","DOI":"10.1007\/BFb0054062"},{"key":"214_CR25","unstructured":"Rabbitmq website (2011) http:\/\/www.rabbitmq.com\/"},{"key":"214_CR26","unstructured":"Rivest RL, Schapire RE (1989) Inference of finite automata using homing sequences. In: Proceedings of the twenty-first annual ACM symposium on theory of computing, STOC \u201989. ACM, New York, pp 411\u2013420"},{"key":"214_CR27","unstructured":"Ro\u015fu G, Chen F (2012) Semantics and algorithms for parametric monitoring. Logical Methods Comput Sci 8(1):1\u201347, 2012. Short version presented at TACAS 2009"},{"key":"214_CR28","doi-asserted-by":"crossref","unstructured":"Sannella D, Tarlecki A (2010) Foundations of algebraic specification and formal software development. EATCS monographs on theoretical computer science. Springer, Berlin","DOI":"10.1007\/978-3-642-17336-3_7"},{"key":"214_CR29","unstructured":"Spy at runtime (2011) http:\/\/home.dei.polimi.it\/sangiorgio\/spy\/index.xhtml"},{"key":"214_CR30","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/TSE.1986.6312929","volume":"12","author":"RE Strom","year":"1986","unstructured":"Strom RE, Yemini S (1986) Typestate: a programming language concept for enhancing software reliability. IEEE Trans Softw Eng 12:157\u2013171","journal-title":"IEEE Trans Softw Eng"},{"key":"214_CR31","doi-asserted-by":"crossref","unstructured":"Whaley J, Martin MC, Lam MS (2002) Automatic extraction of object-oriented component interfaces. In: Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis, ISSTA \u201902. ACM, New York, pp 218\u2013228","DOI":"10.1145\/566172.566212"},{"key":"214_CR32","doi-asserted-by":"crossref","unstructured":"Xie T, Martin E, Yuan H (2006) Automatic extraction of abstract-object-state machines from unit-test executions. In: International conference on software engineering, research demos, pp 835\u2013838, May 2006","DOI":"10.1145\/1134285.1134427"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-012-0214-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-012-0214-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-012-0214-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T19:12:14Z","timestamp":1562181134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-012-0214-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,13]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,3]]}},"alternative-id":["214"],"URL":"https:\/\/doi.org\/10.1007\/s00607-012-0214-z","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9,13]]}}}