{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T16:32:14Z","timestamp":1744216334267},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,1,9]],"date-time":"2015-01-09T00:00:00Z","timestamp":1420761600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s13278-014-0242-0","type":"journal-article","created":{"date-parts":[[2015,1,8]],"date-time":"2015-01-08T08:26:39Z","timestamp":1420705599000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Verification of lack of emergent behavior in extending a social network of agents"],"prefix":"10.1007","volume":"5","author":[{"given":"Mohammad","family":"Moshirpour","sequence":"first","affiliation":[]},{"given":"Shimaa M.","family":"El-Sherif","sequence":"additional","affiliation":[]},{"given":"Reda","family":"Alhajj","sequence":"additional","affiliation":[]},{"given":"Behrouz H.","family":"Far","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,9]]},"reference":[{"key":"242_CR7","doi-asserted-by":"crossref","unstructured":"Alur R, Etessami K, Yannakakis M (2003) Inference of message sequence charts. IEEE Trans Softw Eng:623\u2013633","DOI":"10.1109\/TSE.2003.1214326"},{"key":"242_CR8","volume-title":"Structural holes: the social structure of competition","author":"R Burt","year":"1995","unstructured":"Burt R (1995) Structural holes: the social structure of competition. Harvard University Press, Cambridge"},{"key":"242_CR9","unstructured":"Capp\u00e9 O, Moulines E, Ryd\u00e9n T (2007) Inference in hidden Markov Models. Springer"},{"key":"242_CR6","doi-asserted-by":"crossref","unstructured":"Casual closure for MSC languages (2005)","DOI":"10.1007\/11590156_27"},{"key":"242_CR10","unstructured":"Daconta MC, Obrst LJ, Smith KT (2003) The semantic Web. A guide to the future of XML, web services and knowledge management. Indianapolis"},{"key":"242_CR11","doi-asserted-by":"crossref","unstructured":"El-Sherif SM, Far B, Eberlein A (2011) Calculating the strength of ties of a social network in a semantic search system using Hidden Markov Models. In: International Conference on Systems, Man and Cybernetics (SMC). Anchorage, Alaska, pp 2755\u20132760","DOI":"10.1109\/ICSMC.2011.6084089"},{"key":"242_CR12","unstructured":"Far BH, Zhong C, Yang Z, Afsharchi M (2009) Realization of semantic search using concept learning and document annotation agents. In: Proceeding of Twenty-First International Conference on Software Engineering and Knowledge Engineering (SEKE). pp 164\u2013169"},{"key":"242_CR13","unstructured":"Gilbert E, Karahalios K (2009) Predicting tie strength with social network. In: International conference on Human factors in computing systems. Boston, pp 211\u2013220"},{"key":"242_CR1","unstructured":"Goldenson DR, Gibson DL (2003) Demonstrating the impact and benefits of CMMI: an update and preliminary results. CMU\/SEI-2003-SR-009"},{"key":"242_CR14","doi-asserted-by":"crossref","unstructured":"Granovetter M (ed) (1983) The strength of weak ties: a network theory revisited. In: Sociological theory","DOI":"10.2307\/202051"},{"key":"242_CR15","doi-asserted-by":"crossref","unstructured":"Harel D, Kugler H (2002) Synthesizing state-based object systems from lsc specifications. Int J Found Comput Sci","DOI":"10.1142\/S0129054102000935"},{"key":"242_CR5","unstructured":"ITU: message sequence charts. Recommendation, International Telecommunication Union (1992)"},{"key":"242_CR16","doi-asserted-by":"crossref","unstructured":"Khurshid B, Moshirpour M, Eberlein A, Far BH (2013) An automated ontology generation technique for an emergent behavior detection system. In: 14th International Conference on Information Reuse & Integration (IRI 2013). San Francisco, pp 380\u2013387","DOI":"10.1109\/IRI.2013.6642496"},{"key":"242_CR17","doi-asserted-by":"crossref","unstructured":"Kruger I, Grosu R, Scholz P, Broy M (1999) From mscs to statecharts. In: Rammig FJ (ed) Distributed and parallel embedded systems. Kluwer Academic Publisher","DOI":"10.1007\/978-0-387-35570-2_5"},{"key":"242_CR18","doi-asserted-by":"crossref","first-page":"393","DOI":"10.2307\/2095260","volume":"46","author":"N Lin","year":"1981","unstructured":"Lin N, Ensel WM, Vaughn JC (1981) Social resources and strength of ties: Structural factors in occupational status attainment. Am Sociol Rev 46:393\u2013405","journal-title":"Am Sociol Rev"},{"key":"242_CR19","unstructured":"Loupasakis A, Ntarmos N, Triantafillou P (2011) eXO: decentralized autonomous scalable social networking. In: The 5th Biennial Conference on Innovative Data Systems Research (CIDR). Asilomar, California, pp 85\u201395"},{"key":"242_CR20","unstructured":"Makinen E, Systa T (2001) MAS\u2014an interactive synthesizer to support behavioral modeling in UML\u201d presented at the ICSE 2001. Toronto"},{"key":"242_CR21","unstructured":"Moshirpour M (2011) Model-based detection of emergent behavior in distributed and multi-agent systems from component level perspective. In: Master of Science Department of Electrical and Computer Engineering. University of Calgary, Calgary"},{"key":"242_CR24","unstructured":"Moshirpour M, Eberlein A, Far BH (2013) Automated construction of system domain knowledge using an ontology-based approach. In: The 25th International Conference on Software Engineering and Knowledge Engineering (SEKE 2013). Boston"},{"key":"242_CR2","doi-asserted-by":"crossref","unstructured":"Moshirpour M, El-Sherif SM, Alhajj R, Far BH (2013) Detecting emergent behavior in a social network of agents. In: \u00d6zyer T, Rokne J, Wagner G, Reuser AHP (eds) The influence of technology on social network analysis and mining. Springer, pp 339\u2013409","DOI":"10.1007\/978-3-7091-1346-2_17"},{"key":"242_CR3","doi-asserted-by":"crossref","unstructured":"Moshirpour M, El-Sherif SM, Alhajj R, Far BH (2013) Analyzing the scalability of a social network of agents. In: The 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013). Niagara Falls, Canada","DOI":"10.1145\/2492517.2492571"},{"key":"242_CR22","doi-asserted-by":"crossref","unstructured":"Moshirpour M, Mousavi A, Far BH (2010) Detecting emergent behavior in distributed systems using scenario-based specifications. In: Presented at the Proceedings of the International Conference on Software Engineering and Knowledge Engineering. San Francisco Bay, USA","DOI":"10.1109\/ICTAI.2010.29"},{"key":"242_CR23","doi-asserted-by":"crossref","unstructured":"Moshirpour M, Mousavi A, Far BH (2010) Detecting emergent behavior in distributed systems using scenario-based specifications. In: International Conference on Software Engineering and Knowledge Engineering. San Francisco Bay","DOI":"10.1109\/ICTAI.2010.29"},{"key":"242_CR25","unstructured":"Mousavi A (2009) Inference of emergent behaviours of scenario-based specifications, Ph.D. thesis Ph.D. thesis, Department of Electrial and Computer Engineering, University of Calgary"},{"key":"242_CR26","unstructured":"Mousavi A, Far B (2008) \u201cEliciting Scenarios from Scenarios,\u201d presented at the proceedings of 20th International Conference on Software Engineering and Knowledge Engineering (SEKE 2008). San Francisco Bay"},{"key":"242_CR27","doi-asserted-by":"crossref","unstructured":"Muccini H (2003) Detecting implied scenarios analyzing nonlocal branching choices. In: Presented at the FASE. Warsaw, Poland","DOI":"10.1007\/3-540-36578-8_26"},{"key":"242_CR28","doi-asserted-by":"crossref","unstructured":"Onnela JP, Saramaki J, Hyvonen J, Szabo G, Lazer D, Kaski K, et al. (2007) Structure and tie strengths in a mobile communication network. Natl Acad Sci United States Am 104","DOI":"10.1073\/pnas.0610245104"},{"key":"242_CR29","unstructured":"Petroczi A, Nepusz T, Bazso F (2007) Measuring tie-strength in virtual social networks. Off J Int Netw Soc Netw Anal 27"},{"key":"242_CR30","doi-asserted-by":"crossref","unstructured":"Pujol JM, Siganos G,Erramilli V (2010) The little engine(s) that could: scaling online social networks without Pains. In: ACM SIGCOMM. New Dehli, India, pp 375\u2013386","DOI":"10.1145\/1851275.1851227"},{"key":"242_CR4","unstructured":"Unified modeling language specification. version 2. (ed) (2006) Available from Rational Software Corporation. Cupertino, CA"},{"key":"242_CR31","doi-asserted-by":"crossref","unstructured":"Uchitel S, Kramer J, Magee J (2002) Negative scenarios for implied scenario elicitation. In: Presented at the 10th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2002). Charleston","DOI":"10.1145\/587051.587069"},{"key":"242_CR32","doi-asserted-by":"crossref","unstructured":"Uchitel S, Kramer J, Magee J (2003) Synthesis of behavioral models from scenarios. IEEE Trans Softw Eng:pp 99\u2013115","DOI":"10.1109\/TSE.2003.1178048"},{"key":"242_CR33","volume-title":"\u201cGenerating statecharts designs from scenarios,\u201d presented at the ICSE","author":"J Whittle","year":"2000","unstructured":"Whittle J, Schumann J (2000) \u201cGenerating statecharts designs from scenarios,\u201d presented at the ICSE. Limerick, Ireland"},{"key":"242_CR34","volume-title":"\u201cScenario-Based Engineering of Multi-Agent Systems,\u201d in agent technology from a formal perspective","author":"J Whittle","year":"2006","unstructured":"Whittle J, Schumann J (2006) \u201cScenario-Based Engineering of Multi-Agent Systems,\u201d in agent technology from a formal perspective, 3rd edn. Springer, London","edition":"3"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-014-0242-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-014-0242-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-014-0242-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T08:11:54Z","timestamp":1566202314000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-014-0242-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,9]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["242"],"URL":"https:\/\/doi.org\/10.1007\/s13278-014-0242-0","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,9]]},"article-number":"1"}}