{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T14:06:04Z","timestamp":1709561164771},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2004,7,1]],"date-time":"2004-07-01T00:00:00Z","timestamp":1088640000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Softw Tools Technol Transfer"],"published-print":{"date-parts":[[2004,7]]},"DOI":"10.1007\/s10009-004-0139-8","type":"journal-article","created":{"date-parts":[[2004,6,30]],"date-time":"2004-06-30T08:24:41Z","timestamp":1088583881000},"page":"4-14","source":"Crossref","is-referenced-by-count":14,"title":["Behavior-based model construction"],"prefix":"10.1007","volume":"6","author":[{"given":"Hardi","family":"Hungar","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"Steffen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2004,7,1]]},"reference":[{"key":"139_CR1","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"2","author":"Angluin","year":"1987","unstructured":"Angluin D (1987) Learning regular sets from queries and counterexamples. Inf Comput 2(75):87\u2013106","journal-title":"Inf Comput"},{"key":"139_CR2","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/TSE.1978.231496","volume":"4","author":"Chow","year":"1978","unstructured":"Chow TS (1978) Testing software design modeled by finite-state machines. IEEE Trans Softw Eng 4(3):178\u2013187","journal-title":"IEEE Trans Softw Eng"},{"key":"139_CR3","doi-asserted-by":"crossref","unstructured":"Emerson EA (1990) Temporal and modal logic. In: van Leeuwen J (ed) Handbook of theoretical computer science. Elsevier, Amsterdam","DOI":"10.1016\/B978-0-444-88074-1.50021-4"},{"key":"139_CR4","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1145\/333979.333989","volume":"47","author":"Giacobazzi","year":"2000","unstructured":"Giacobazzi R, Ranzato F, Scozzari F (2000) Making abstract interpretations complete. J ACM 47(2):361\u2013416","journal-title":"J ACM"},{"key":"139_CR5","doi-asserted-by":"crossref","unstructured":"Groce A, Peled D, Yannakakis M (2002) Adaptive model checking. In: Katoen J-P, Stevens P (eds) Proceedings 8th international conference for tools and algorithms for the construction and analysis of systems, Grenoble, France, April 8\u201312, 2002. Lecture notes in computer science, vol 2280. Springer, Berlin Heidelberg New York, pp 357\u2013370","DOI":"10.1007\/3-540-46002-0_25"},{"key":"139_CR6","doi-asserted-by":"crossref","unstructured":"Hagerer A, Hungar H, Niese O, Steffen B (2002) Model generation by moderated regular extrapolation. In: Kutsche R, Weber H (eds) Proceedings of the 5th international conference on fundamental approaches to software engineering (FASE \u201902), Grenoble, France, April 8\u201312, 2002. Lecture notes in computer science, vol 2306. Springer, Berlin Heidelberg New York, pp 80\u201395","DOI":"10.1007\/3-540-45923-5_6"},{"key":"139_CR7","doi-asserted-by":"crossref","unstructured":"Hagerer A, Margaria T, Niese O, Steffen B, Brune G, Ide H (2001) Efficient regression testing of CTI-systems: testing a complex call-center solution. Annual review of communication, vol 55. International Engineering Consortium (IEC), Chicago","DOI":"10.1109\/ETW.2001.946662"},{"key":"139_CR8","unstructured":"Hopcroft JE, Ullman JD (1979) Introduction to automata theory, languages, and computation. Addison-Wesley, Reading, MA"},{"key":"139_CR9","doi-asserted-by":"crossref","unstructured":"Hungar H, Niese O, Steffen B (2003) Domain-specific optimization in automata learning. In: Somenzi F, Hunt WA (eds) Proceedings of the 5th international conference on computer aided verification (CAV \u201903), Boulder, Colorado, USA, July 8\u201312, 2003. Lecture notes in computer science, vol 2725. Springer, Berlin Heidelberg New York, pp 315\u2013327","DOI":"10.1007\/978-3-540-45069-6_31"},{"key":"139_CR10","doi-asserted-by":"crossref","unstructured":"Hungar H, Steffen B (2003) Behaviour-based model construction. In: Zuck LD, Attie PC, Cortesi A, Mukhopadhyay S (eds) Proceedings of the 4th international conference on verification, model checking and abstract interpretation (VMCAI\u201903), New York, USA, Jan. 9\u201311, 2003. Lecture notes in computer science, vol 2575. Springer, Berlin Heidelberg New York, pp 5\u201319","DOI":"10.1007\/3-540-36384-X_3"},{"key":"139_CR11","doi-asserted-by":"crossref","unstructured":"Kearns MJ, Vazirani UV (1994) An introduction to computational learning theory. MIT Press, Cambridge, MA","DOI":"10.7551\/mitpress\/3897.001.0001"},{"key":"139_CR12","doi-asserted-by":"crossref","unstructured":"Lang KJ, Pearlmutter BA, Price RA (1998) Results of the Abbadingo one DFA learning competition and a new evidence-driven state merging algorithm. In: Proceedings of the 4th international colloquium on grammatical inference \u2013 ICGI \u201998. Lecture notes in artificial intelligence, vol 1433. Springer, Berlin Heidelberg New York, pp 1\u201312","DOI":"10.1007\/BFb0054059"},{"key":"139_CR13","doi-asserted-by":"crossref","first-page":"1090","DOI":"10.1109\/5.533956","volume":"84","author":"Lee","year":"1996","unstructured":"Lee D, Yannakakis M (1996) Principles and methods of testing finite state machines \u2013 a survey. Proc IEEE 84:1090\u20131123","journal-title":"Proc IEEE"},{"key":"139_CR14","doi-asserted-by":"crossref","unstructured":"Mazurkiewicz A (1987) Trace theory. In: Brauer W et al (eds) Petri nets, applications and relationship to other models of concurrency. Lecture notes in computer science, vol 255. Springer, Berlin Heidelberg New York, pp 279\u2013324","DOI":"10.1007\/3-540-17906-2_30"},{"key":"139_CR15","first-page":"129","volume":"34","author":"Moore","year":"1956","unstructured":"Moore EF (1956) Gedanken-experiments on sequential machines. Ann Math Stud Automata Stud 34:129\u2013153","journal-title":"Ann Math Stud Automata Stud"},{"key":"139_CR16","doi-asserted-by":"crossref","unstructured":"Niese O, Steffen B, Margaria T, Hagerer A, Brune G, Ide H (2001) Library-based design and consistency checks of system-level industrial test cases. In: Hussmann H (ed) Proceedings of the 4th international conference on fundamental approaches to software engineering (FASE \u201901), Genova, Italy, April 2\u20136, 2001. Lecture notes in computer science, vol 2029. Springer, Berlin Heidelberg New York, pp 233\u2013248","DOI":"10.1007\/3-540-45314-8_17"},{"key":"139_CR17","doi-asserted-by":"crossref","unstructured":"Peled D, Vardi MY, Yannakakis M (1999) Black box checking. In: Wu J, Chanson ST, Gao Q (eds) Proceedings of the joint international conference on formal description techniques for distributed system and communication\/protocols and protocol specification, testing and verification (FORTE\/PSTV \u201999), Beijing, China, Oct. 5\u20138, 1999. Kluwer, Dordrecht, pp 225\u2013240","DOI":"10.1007\/978-0-387-35578-8_13"},{"key":"139_CR18","first-page":"403","volume":"26","author":"Steffen","year":"1992","unstructured":"Steffen B, Jay B, Mendler M (1992) Compositional characterization of observable program properties. Int J Theor Comput Sci Appl 26(5):403\u2013424","journal-title":"Int J Theor Comput Sci Appl"},{"key":"139_CR19","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1145\/1968.1972","volume":"27","author":"Valiant","year":"1984","unstructured":"Valiant LG (1984) A theory of the learnable. Commun ACM 27(11):1134\u20131142","journal-title":"Commun ACM"},{"key":"139_CR20","doi-asserted-by":"crossref","unstructured":"Valmari A (1993) On-the-fly verification with stubborn sets. In: Proceedings of the 5th international conference on computer aided verification (CAV \u201993), Elounda, Greece, June 28\u2013July 1, 1993. Lecture notes in computer science, vol 697. Springer, Berlin Heidelberg New York, pp 397\u2013408","DOI":"10.1007\/3-540-56922-7_33"},{"key":"139_CR21","first-page":"98","volume":"4","author":"Vasilevskii","year":"1973","unstructured":"Vasilevskii MP (1973) Failure diagnosis of automata. Kibernetika 4:98\u2013108","journal-title":"Kibernetika"}],"container-title":["International Journal on Software Tools for Technology Transfer"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-004-0139-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10009-004-0139-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-004-0139-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T15:46:25Z","timestamp":1585842385000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10009-004-0139-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,7]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,7]]}},"alternative-id":["139"],"URL":"https:\/\/doi.org\/10.1007\/s10009-004-0139-8","relation":{},"ISSN":["1433-2779","1433-2787"],"issn-type":[{"value":"1433-2779","type":"print"},{"value":"1433-2787","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,7]]}}}