{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T05:48:05Z","timestamp":1747374485430},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11390-020-1003-3","type":"journal-article","created":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T14:03:15Z","timestamp":1628690595000},"page":"839-855","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Using Markov Chain Based Estimation of Distribution Algorithm for Model-Based Safety Analysis of Graph Transformation"],"prefix":"10.1007","volume":"36","author":[{"given":"Einollah","family":"Pira","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,7,30]]},"reference":[{"key":"1003_CR1","doi-asserted-by":"publisher","unstructured":"Rausand M. Reliability of Safety-Critical Systems: Theory and Applications. John Wiley & Sons, 2014. https:\/\/doi.org\/10.1002\/9781118776353.","DOI":"10.1002\/9781118776353"},{"key":"1003_CR2","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ress.2012.03.021","volume":"105","author":"J Lahtinen","year":"2012","unstructured":"Lahtinen J, Valkonen J, Bj\u00f6rkman K, Frits J, Niemel\u00e4 I, Heljanko K. Model checking of safety-critical software in the nuclear engineering domain. Reliab. Eng. Syst. Saf., 2012, 105: 104-113. https:\/\/doi.org\/10.1016\/j.ress.2012.03.021.","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"1003_CR3","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.asoc.2014.06.055","volume":"24","author":"R Yousefian","year":"2014","unstructured":"Yousefian R, Rafe V, Rahmani M. A heuristic solution for model checking graph transformation systems. Appl. Soft Comput., 2014, 24: 169-180. https:\/\/doi.org\/10.1016\/j.asoc.2014.06.055.","journal-title":"Appl. Soft Comput."},{"key":"1003_CR4","doi-asserted-by":"publisher","unstructured":"Francesca G, Santone A, Vaglini G, Villani M L. Ant colony optimization for deadlock detection in concurrent systems. In Proc. the 35th Annual IEEE International Computer Software and Applications Conference, July 2011, pp.108-117. https:\/\/doi.org\/10.1109\/COMPSAC.2011.22.","DOI":"10.1109\/COMPSAC.2011.22"},{"key":"1003_CR5","doi-asserted-by":"publisher","unstructured":"Alba E, Chicano F. Finding safety errors with ACO. In Proc. the 9th Annual Conference on Genetic and Evolutionary Computation, July 2007, pp.1066-1073. https:\/\/doi.org\/10.1145\/1276958.1277171.","DOI":"10.1145\/1276958.1277171"},{"key":"1003_CR6","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.asoc.2015.04.032","volume":"33","author":"V Rafe","year":"2015","unstructured":"Rafe V, Moradi M, Yousefian R, Nikanjam A. A metaheuristic solution for automated refutation of complex software systems specified through graph transformations. Appl. Soft Comput., 2015, 33: 136-149. https:\/\/doi.org\/10.1016\/j.asoc.2015.04.032.","journal-title":"Appl. Soft Comput."},{"key":"1003_CR7","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.jss.2017.05.128","volume":"131","author":"E Pira","year":"2017","unstructured":"Pira E, Rafe V, Nikanjam A. Deadlock detection in complex software systems specified through graph transformation using Bayesian optimization algorithm. J. Syst. Softw., 2017, 131: 181-200. https:\/\/doi.org\/10.1016\/j.jss.2017.05.128.","journal-title":"J. Syst. Softw."},{"key":"1003_CR8","doi-asserted-by":"publisher","first-page":"1185","DOI":"10.1016\/j.asoc.2016.06.039","volume":"49","author":"E Pira","year":"2016","unstructured":"Pira E, Rafe V, Nikanjam A. EMCDM: Efficient model checking by data mining for verification of complex software systems specified through architectural styles. Appl. Soft Comput., 2016, 49: 1185-1201. https:\/\/doi.org\/10.1016\/j.asoc.2016.06.039.","journal-title":"Appl. Soft Comput."},{"key":"1003_CR9","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.infsof.2018.01.004","volume":"97","author":"E Pira","year":"2018","unstructured":"Pira E, Rafe V, Nikanjam A. Searching for violation of safety and liveness properties using knowledge discovery in complex systems specified through graph transformations. Inf. Softw. Technol., 2018, 97: 110-134. https:\/\/doi.org\/10.1016\/j.infsof.2018.01.004.","journal-title":"Inf. Softw. Technol."},{"key":"1003_CR10","doi-asserted-by":"crossref","unstructured":"Bicarregui J, Matthews B. Proof and refutation in formal software development. In Proc. the 3rd Irish Workshop on Formal Methods, July 1999.","DOI":"10.14236\/ewic\/IWFM1999.1"},{"key":"1003_CR11","unstructured":"Koller D, Friedman N. Probabilistic Graphical Models: Principles and Techniques (1st edition). MIT Press, 2009."},{"issue":"3","key":"1003_CR12","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1162\/10636560075-0078808","volume":"8","author":"M Pelikan","year":"2000","unstructured":"Pelikan M, Goldberg D E, Cant\u00fa-Paz E. Linkage problem, distribution estimation, and Bayesian networks. Evol. Comput., 2000, 8(3): 311-340. https:\/\/doi.org\/10.1162\/10636560075-0078808.","journal-title":"Evol. Comput."},{"key":"1003_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.ress.2015.03.012","volume":"139","author":"J Lahtinen","year":"2015","unstructured":"Lahtinen J, Kuismin T, Heljanko K. Verifying large modular systems using iterative abstraction refinement. Reliab. Eng. Syst. Saf., 2015, 139: 120-130. https:\/\/doi.org\/10.1016\/j.ress.2015.03.012.","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"1003_CR14","doi-asserted-by":"publisher","unstructured":"Rozenberg G. Handbook of Graph Grammars and Computing by Graph Transformation, Volume 1: Foundations. World Scientific, 1997. https:\/\/doi.org\/10.1142\/3303.","DOI":"10.1142\/3303"},{"key":"1003_CR15","doi-asserted-by":"publisher","unstructured":"Kastenberg H, Rensink A. Model checking dynamic states in GROOVE. In Proc. the 13th International SPIN Workshop on Model Checking of Software, March 30\u2013April 1, 2006, pp.299-305. https:\/\/doi.org\/10.1007\/11691617_19.","DOI":"10.1007\/11691617_19"},{"key":"1003_CR16","doi-asserted-by":"publisher","unstructured":"Staunton J, Clark J A. Searching for safety violations using estimation of distribution algorithms. In Proc. the 3rd International Conference on Software Testing, Verification, and Validation, April 2010, pp.212-221. https:\/\/doi.org\/10.1109\/ICSTW.2010.24.","DOI":"10.1109\/ICSTW.2010.24"},{"key":"1003_CR17","doi-asserted-by":"publisher","unstructured":"Staunton J, Clark J A. Finding short counterexamples in promela models using estimation of distribution algorithms. In Proc. the 13th Annual Conference on Genetic and Evolutionary Computation, July 2011, pp.1923-1930. https:\/\/doi.org\/10.1145\/2001576.2001834.","DOI":"10.1145\/2001576.2001834"},{"key":"1003_CR18","doi-asserted-by":"publisher","unstructured":"Staunton J, Clark J A. Applications of model reuse when using estimation of distribution algorithms to test concurrent software. In Proc. the 3rd International Symposium on Search Based Software Engineering, September 2011, pp.97-111. https:\/\/doi.org\/10.1007\/978-3-642-23716-4_12.","DOI":"10.1007\/978-3-642-23716-4_12"},{"key":"1003_CR19","doi-asserted-by":"publisher","unstructured":"Pira E, Rafe V, Nikanjam A. Using evolutionary algorithms for reachability analysis of complex software systems specified through graph transformation. Reliab. Eng. Syst. Saf., 2019, 191: Article No. 106577. https:\/\/doi.org\/10.1016\/j.ress.2019.106577.","DOI":"10.1016\/j.ress.2019.106577"},{"issue":"1","key":"1003_CR20","doi-asserted-by":"publisher","first-page":"137","DOI":"10.3233\/IFS-162127","volume":"31","author":"R Yousefian","year":"2016","unstructured":"Yousefian R, Aboutorabi S, Rafe V. A greedy algorithm versus metaheuristic solutions to deadlock detection in graph transformation systems. J. Intell. Fuzzy Syst., 2016, 31(1): 137-149. https:\/\/doi.org\/10.3233\/IFS-162127.","journal-title":"J. Intell. Fuzzy Syst."},{"key":"1003_CR21","doi-asserted-by":"publisher","unstructured":"Yang X S. A new metaheuristic bat-inspired algorithm. In Proc. the 2010 Nature Inspired Cooperative Strategies for Optimization, May 2010, pp.65-74. https:\/\/doi.org\/10.1007\/978-3-642-12538-6_6.","DOI":"10.1007\/978-3-642-12538-6_6"},{"key":"1003_CR22","unstructured":"Baier C, Katoen J P. Principles of Model Checking. MIT Press, 2008."},{"key":"1003_CR23","doi-asserted-by":"publisher","unstructured":"Sivanandam S N, Deepa S N. Introduction to Genetic Algorithms. Springer, 2008. https:\/\/doi.org\/10.1007\/978-3-540-73190-0.","DOI":"10.1007\/978-3-540-73190-0"},{"issue":"4","key":"1003_CR24","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/s10009-003-0130-9","volume":"6","author":"A Groce","year":"2004","unstructured":"Groce A, Visser W. Heuristics for model checking Java programs. Int. J. Softw. Tools Technol. Transf., 2004, 6(4): 260-276. https:\/\/doi.org\/10.1007\/s10009-003-0130-9.","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"1003_CR25","unstructured":"Edelkamp S, Lafuente A L, Leue S. Protocol verification with heuristic search. In Proc. the 2001 Spring Symposium Series, March 2001."},{"key":"1003_CR26","doi-asserted-by":"crossref","unstructured":"Schmidt \u00c1. Model checking of visual modeling languages. Bp Univ Technol Hung. 2004.","DOI":"10.1007\/978-3-540-45221-8_8"},{"issue":"9","key":"1003_CR27","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/35.312843","volume":"32","author":"SM Bellovin","year":"1994","unstructured":"Bellovin S M, Cheswick W R. Network firewalls. IEEE Commun. Mag., 1994, 32(9): 50-57. https:\/\/doi.org\/10.1109\/35.312843.","journal-title":"IEEE Commun. Mag."},{"key":"1003_CR28","doi-asserted-by":"publisher","unstructured":"Azim M R S, Mahmud K, Das C K. Automatic train track switching system with computerized control from the central monitoring unit. International Journal of u- and e-Service, Science and Technology, 2014, 7(1): 201-212. https:\/\/doi.org\/10.14257\/ijunesst.2014.7.1.18.","DOI":"10.14257\/ijunesst.2014.7.1.18"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-020-1003-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-020-1003-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-020-1003-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T04:09:34Z","timestamp":1673064574000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-020-1003-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["1003"],"URL":"https:\/\/doi.org\/10.1007\/s11390-020-1003-3","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7]]},"assertion":[{"value":"6 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}