{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T22:59:16Z","timestamp":1767999556929,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T00:00:00Z","timestamp":1559174400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T00:00:00Z","timestamp":1559174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003958","name":"Stichting voor de Technische Wetenschappen","doi-asserted-by":"crossref","award":["13859"],"award-info":[{"award-number":["13859"]}],"id":[{"id":"10.13039\/501100003958","id-type":"DOI","asserted-by":"crossref"}]},{"name":"3TU.BSR project"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11334-019-00342-6","type":"journal-article","created":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T08:02:32Z","timestamp":1559203352000},"page":"267-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Sound black-box checking in the LearnLib"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1591-1195","authenticated-orcid":false,"given":"Jeroen","family":"Meijer","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4305-0625","authenticated-orcid":false,"given":"Jaco","family":"van de Pol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,30]]},"reference":[{"issue":"2","key":"342_CR1","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D Angluin","year":"1987","unstructured":"Angluin D (1987) Learning regular sets from queries and counterexamples. Inf Comput 75(2):87\u2013106","journal-title":"Inf Comput"},{"key":"342_CR2","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.tcs.2016.07.031","volume":"650","author":"D Angluin","year":"2016","unstructured":"Angluin D, Fisman D (2016) Learning regular omega languages. Theor Comput Sci 650:57\u201372","journal-title":"Theor Comput Sci"},{"key":"342_CR3","volume-title":"Principles of model checking","author":"C Baier","year":"2008","unstructured":"Baier C, Katoen J (2008) Principles of model checking. MIT Press, Cambridge"},{"key":"342_CR4","unstructured":"Belinfante A (2014) JTorX: exploring model-based testing. In: PhD thesis, University of Twente, Enschede, Netherlands"},{"key":"342_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-319-49052-6_2","volume":"10028","author":"V Bloemen","year":"2016","unstructured":"Bloemen V, van de Pol J (2016) Multi-core scc-based LTL model checking. Haifa Verif Conf Lect Notes Comput Sci 10028:18\u201333","journal-title":"Haifa Verif Conf Lect Notes Comput Sci"},{"key":"342_CR6","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-642-14295-6_32","volume":"6174","author":"B Bollig","year":"2010","unstructured":"Bollig B, Katoen J, Kern C, Leucker M, Neider D, Piegdon DR (2010) libalf: The automata learning framework. CAV Lect Notes Comput Sci 6174:360\u2013364","journal-title":"CAV Lect Notes Comput Sci"},{"key":"342_CR7","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/3-540-45657-0_29","volume":"2404","author":"A Cimatti","year":"2002","unstructured":"Cimatti A, Clarke EM, Giunchiglia E, Giunchiglia F, Pistore M, Roveri M, Sebastiani R, Tacchella A (2002) Nusmv 2: an opensource tool for symbolic model checking. CAV Lect Notes Comput Sci 2404:359\u2013364","journal-title":"CAV Lect Notes Comput Sci"},{"issue":"2\/3","key":"342_CR8","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/BF00121128","volume":"1","author":"C Courcoubetis","year":"1992","unstructured":"Courcoubetis C, Vardi MY, Wolper P, Yannakakis M (1992) Memory-efficient algorithms for the verification of temporal properties. Form Methods Syst Des 1(2\/3):275\u2013288","journal-title":"Form Methods Syst Des"},{"key":"342_CR9","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/3-540-48119-2_16","volume":"1708","author":"J Couvreur","year":"1999","unstructured":"Couvreur J (1999) On-the-fly verification of linear temporal logic. Lect Notes Comput Sci World Congr Form Methods 1708:253\u2013271","journal-title":"Lect Notes Comput Sci World Congr Form Methods"},{"key":"342_CR10","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-319-46520-3_8","volume":"9938","author":"A Duret-Lutz","year":"2016","unstructured":"Duret-Lutz A, Lewkowicz A, Fauchille A, Michaud T, Renault E, Xu L (2016) Spot 2.0: a framework for LTL and $$\\omega $$-automata manipulation. ATVA Lect Notes Comput Sci 9938:122\u2013129","journal-title":"ATVA Lect Notes Comput Sci"},{"key":"342_CR11","unstructured":"Frohme M (2015) Active automata learning with adaptive distinguishing sequences. Master\u2019s thesis, Technische Universit\u00e4t Dortmund"},{"issue":"6","key":"342_CR12","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1109\/32.87284","volume":"17","author":"S Fujiwara","year":"1991","unstructured":"Fujiwara S, von Bochmann G, Khendek F, Amalou M, Ghedamsi A (1991) Test selection based on finite state models. IEEE Trans Softw Eng 17(6):591\u2013603","journal-title":"IEEE Trans Softw Eng"},{"issue":"5","key":"342_CR13","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1093\/jigpal\/jzl007","volume":"14","author":"A Groce","year":"2006","unstructured":"Groce A, Peled DA, Yannakakis M (2006) Adaptive model checking. Log J IGPL 14(5):729\u2013744","journal-title":"Log J IGPL"},{"key":"342_CR14","volume-title":"The SPIN model checker: primer and reference manual","author":"GJ Holzmann","year":"2004","unstructured":"Holzmann GJ (2004) The SPIN model checker: primer and reference manual. Addison-Wesley, Boston"},{"key":"342_CR15","unstructured":"Howar F (2012) Active learning of interface programs. PhD thesis, Dortmund University of Technology, Dortmund"},{"key":"342_CR16","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-96562-8_5","volume":"11026","author":"F Howar","year":"2018","unstructured":"Howar F, Steffen B (2018) Active automata learning in practice: an annotated bibliography of the years 2011 to 2016. Lect Notes Comput Sci Mach Learn Dyn Softw Anal 11026:123\u2013148","journal-title":"Lect Notes Comput Sci Mach Learn Dyn Softw Anal"},{"key":"342_CR17","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-030-00244-2_11","volume":"11119","author":"D Huistra","year":"2018","unstructured":"Huistra D, Meijer J, van de Pol J (2018) Adaptive learning for learn-based regression testing. FMICS Lect Notes Comput Sci 11119:162\u2013177","journal-title":"FMICS Lect Notes Comput Sci"},{"key":"342_CR18","unstructured":"Isberner M (2015) Foundations of active automata learning: an algorithmic perspective. In: PhD thesis, Technical University Dortmund, Germany"},{"key":"342_CR19","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-319-11164-3_26","volume":"8734","author":"M Isberner","year":"2014","unstructured":"Isberner M, Howar F, Steffen B (2014) The TTT algorithm: a redundancy-free approach to active automata learning. RV Lect Notes Comput Sci 8734:307\u2013322","journal-title":"RV Lect Notes Comput Sci"},{"key":"342_CR20","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-319-21690-4_32","volume":"9206","author":"M Isberner","year":"2015","unstructured":"Isberner M, Howar F, Steffen B (2015) The open-source learnLib: a framework for active automata learning. CAV Lect Notes Comput Sci 9206:487\u2013495","journal-title":"CAV Lect Notes Comput Sci"},{"key":"342_CR21","doi-asserted-by":"crossref","unstructured":"Jasper M, Fecke M, Steffen B, Schordan M, Meijer J, van\u00a0de Pol J, Howar F, Siegel SF (2017) The RERS 2017 challenge and workshop (invited paper). In: SPIN, ACM, pp 11\u201320","DOI":"10.1145\/3092282.3098206"},{"key":"342_CR22","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1007\/978-3-662-46681-0_61","volume":"9035","author":"G Kant","year":"2015","unstructured":"Kant G, Laarman A, Meijer J, van de Pol J, Blom S, van Dijk T (2015) Ltsmin: High-performance language-independent model checking. TACAS Lect Notes Comput Sci 9035:692\u2013707","journal-title":"TACAS Lect Notes Comput Sci"},{"key":"342_CR23","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3897.001.0001","volume-title":"An introduction to computational learning theory","author":"MJ Kearns","year":"1994","unstructured":"Kearns MJ, Vazirani UV (1994) An introduction to computational learning theory. MIT Press, Cambridge"},{"key":"342_CR24","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-319-64119-5_13","volume":"10437","author":"H Khosrowjerdi","year":"2017","unstructured":"Khosrowjerdi H, Meinke K, Rasmusson A (2017) Learning-based testing for safety critical automotive applications. IMBSA Lect Notes Comput Sci 10437:197\u2013211","journal-title":"IMBSA Lect Notes Comput Sci"},{"key":"342_CR25","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-24372-1_23","volume":"6996","author":"A Laarman","year":"2011","unstructured":"Laarman A, Langerak R, van de Pol J, Weber M, Wijs A (2011) Multi-core nested depth-first search. ATVA Lect Notes Comput Sci 6996:321\u2013335","journal-title":"ATVA Lect Notes Comput Sci"},{"issue":"2","key":"342_CR26","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1006\/inco.1995.1070","volume":"118","author":"O Maler","year":"1995","unstructured":"Maler O, Pnueli A (1995) On the learnability of infinitary regular sets. Inf Comput 118(2):316\u2013326","journal-title":"Inf Comput"},{"key":"342_CR27","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-319-77935-5_24","volume":"10811","author":"J Meijer","year":"2018","unstructured":"Meijer J, van de Pol J (2018) Sound black-box checking in the learnlib. NFM Lect Notes Comput Sci 10811:349\u2013366","journal-title":"NFM Lect Notes Comput Sci"},{"key":"342_CR28","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-66583-2_9","volume":"10497","author":"K Meinke","year":"2017","unstructured":"Meinke K (2017) Learning-based testing of cyber-physical systems-of-systems: a platooning study. EPEW Lect Notes Comput Sci 10497:135\u2013151","journal-title":"EPEW Lect Notes Comput Sci"},{"key":"342_CR29","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-21768-5_11","volume":"6706","author":"K Meinke","year":"2011","unstructured":"Meinke K, Sindhu MA (2011) Incremental learning-based testing for reactive systems. TAP Lect Notes Comput Sci 6706:134\u2013151","journal-title":"TAP Lect Notes Comput Sci"},{"key":"342_CR30","doi-asserted-by":"crossref","unstructured":"Meinke K, Sindhu MA (2013) Lbtest: a learning-based testing tool for reactive systems. In: ICST, IEEE computer society, pp 447\u2013454","DOI":"10.1109\/ICST.2013.62"},{"key":"342_CR31","first-page":"248","volume":"336","author":"M Merten","year":"2011","unstructured":"Merten M, Howar F, Steffen B, Margaria T (2011) Automata learning with on-the-fly direct hypothesis construction. ISoLA Workshops Commun Comput Inf Sci 336:248\u2013260","journal-title":"ISoLA Workshops Commun Comput Inf Sci"},{"issue":"2","key":"342_CR32","first-page":"225","volume":"7","author":"DA Peled","year":"2002","unstructured":"Peled DA, Vardi MY, Yannakakis M (2002) Black box checking. J Autom Lang Comb 7(2):225\u2013246","journal-title":"J Autom Lang Comb"},{"key":"342_CR33","doi-asserted-by":"crossref","unstructured":"van\u00a0de Pol J, Meijer J (2019) Synchronous or alternating? LTL black-box checking of Mealy machines by combining the LearnLib and LTSmin, Accepted","DOI":"10.1007\/978-3-030-22348-9_24"},{"issue":"4","key":"342_CR34","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s10009-009-0120-7","volume":"11","author":"H Raffelt","year":"2009","unstructured":"Raffelt H, Merten M, Steffen B, Margaria T (2009) Dynamic testing via automata learning. STTT 11(4):307\u2013324","journal-title":"STTT"},{"issue":"2","key":"342_CR35","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1006\/inco.1993.1021","volume":"103","author":"RL Rivest","year":"1993","unstructured":"Rivest RL, Schapire RE (1993) Inference of finite automata using homing sequences. Inf Comput 103(2):299\u2013347","journal-title":"Inf Comput"},{"key":"342_CR36","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-05089-3_14","volume":"5850","author":"M Shahbaz","year":"2009","unstructured":"Shahbaz M, Groz R (2009) Inferring mealy machines. FM Lect Notes Comput Sci 5850:207\u2013222","journal-title":"FM Lect Notes Comput Sci"},{"key":"342_CR37","unstructured":"Sindhu MA (2013) Algorithms and tools for learning-based testing of reactive systems. In: PhD thesis, KTH Royal Institute of Technology, Sweden"},{"key":"342_CR38","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-21455-4_8","volume":"6659","author":"B Steffen","year":"2011","unstructured":"Steffen B, Howar F, Merten M (2011) Introduction to active automata learning from a practical perspective. SFM Lect Notes Comput Sci 6659:256\u2013296","journal-title":"SFM Lect Notes Comput Sci"},{"issue":"5","key":"342_CR39","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s10009-014-0336-z","volume":"16","author":"B Steffen","year":"2014","unstructured":"Steffen B, Isberner M, Naujokat S, Margaria T, Geske M (2014) Property-driven benchmark generation: synthesizing programs of realistic structure. STTT 16(5):465\u2013479","journal-title":"STTT"},{"key":"342_CR40","doi-asserted-by":"crossref","unstructured":"Steffen B, Jasper M, Meijer J, van\u00a0de Pol J (2017) Property-preserving generation of tailored benchmark petri nets. In: ACSD, IEEE computer society, pp 1\u20138","DOI":"10.1109\/ACSD.2017.24"},{"key":"342_CR41","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-642-16612-9_33","volume":"6418","author":"D Tabakov","year":"2010","unstructured":"Tabakov D, Vardi MY (2010) Optimized temporal monitors for systemc. RV Lect Notes Comput Sci 6418:436\u2013451","journal-title":"RV Lect Notes Comput Sci"},{"issue":"2","key":"342_CR42","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1137\/0201010","volume":"1","author":"RE Tarjan","year":"1972","unstructured":"Tarjan RE (1972) Depth-first search and linear graph algorithms. SIAM J Comput 1(2):146\u2013160","journal-title":"SIAM J Comput"},{"key":"342_CR43","unstructured":"Timmer M, Brinksma E, Stoelinga M (2011) Model-based testing. In: Software and systems safety: specification and verification, NATO science for peace and security series-D: information and communication security, vol\u00a030, IOS Press, Amsterdam, pp 1\u201332"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-019-00342-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11334-019-00342-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-019-00342-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,28]],"date-time":"2020-05-28T19:21:16Z","timestamp":1590693676000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11334-019-00342-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,30]]},"references-count":43,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["342"],"URL":"https:\/\/doi.org\/10.1007\/s11334-019-00342-6","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"value":"1614-5046","type":"print"},{"value":"1614-5054","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,30]]},"assertion":[{"value":"1 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}