{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T03:40:26Z","timestamp":1771386026099,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T00:00:00Z","timestamp":1449619200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s40860-015-0016-0","type":"journal-article","created":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T17:34:59Z","timestamp":1449682499000},"page":"17-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Formalization of resilience for constraint-based dynamic systems"],"prefix":"10.1007","volume":"2","author":[{"given":"Nicolas","family":"Schwind","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Morgan","family":"Magnin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Katsumi","family":"Inoue","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tenda","family":"Okimoto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Taisuke","family":"Sato","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kazuhiro","family":"Minami","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hiroshi","family":"Maruyama","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Ali S, Koenig S, Tambe M (2005) Preprocessing techniques for accelerating the DCOP algorithm ADOPT. In: Proceedings of the 4th international conference on autonomous agents and multi-agent systems (AAMAS\u201905), pp 1041\u20131048","DOI":"10.1145\/1082473.1082631"},{"key":"16_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511615320","volume-title":"Principles of constraint programming","author":"K Apt","year":"2003","unstructured":"Apt K (2003) Principles of constraint programming. Cambridge University Press, New York"},{"issue":"2","key":"16_CR3","first-page":"1","volume":"3","author":"JC Augusto","year":"2013","unstructured":"Augusto JC, Callaghan V, Cook D, Kameas A, Satoh I (2013) Intelligent environments: a manifesto. Hum-Centric Comput Inf Sci 3(2):1\u201318","journal-title":"Hum-Centric Comput Inf Sci"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Ballarini P, Miller A (2006) Model checking medium access control for sensor networks. In: Proceedings of the 2nd international symposium on leveraging applications of formal methods (ISoLA\u201906), pp 256\u2013262","DOI":"10.1109\/ISoLA.2006.16"},{"issue":"12\u201313","key":"16_CR5","doi-asserted-by":"crossref","first-page":"1429","DOI":"10.1016\/j.artint.2008.03.005","volume":"172","author":"C Baral","year":"2008","unstructured":"Baral C, Eiter T, Bj\u00e4reland M, Nakamura M (2008) Maintenance goals of agents in a dynamic environment: formulation and policy construction. Artif Intell 172(12\u201313):1429\u20131469","journal-title":"Artif Intell"},{"issue":"1","key":"16_CR6","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/JPROC.2002.805826","volume":"91","author":"A Benveniste","year":"2003","unstructured":"Benveniste A, Caspi P, Edwards SA, Halbwachs N, Guernic PL, de Simone R (2003) The synchronous languages 12 years later. Proc IEEE 91(1):64\u201383","journal-title":"Proc IEEE"},{"issue":"1","key":"16_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TCC.2013.6","volume":"1","author":"K Bilal","year":"2013","unstructured":"Bilal K, Manzano M, Khan SU, Calle E, Li K, Zomaya AY (2013) On the characterization of the structural robustness of data center networks. IEEE Trans Cloud Comput 1(1):1\u20131","journal-title":"IEEE Trans Cloud Comput"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Bruneau M (2003) A framework to quantitatively assess and enhance the seismic resilience of communities. In: Earthquake spectra, vol 19","DOI":"10.1193\/1.1623497"},{"issue":"3","key":"16_CR9","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1002\/j.2051-5545.2010.tb00297.x","volume":"9","author":"D Cicchetti","year":"2010","unstructured":"Cicchetti D (2010) Resilience under conditions of extreme stress: a multilevel perspective. World Psychiatry 9(3):145\u2013154","journal-title":"World Psychiatry"},{"key":"16_CR10","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1613\/jair.4126","volume":"49","author":"L Climent","year":"2014","unstructured":"Climent L, Wallace RJ, Salido MA, Barber F (2014) Robustness and stability in constraint programming under dynamism and uncertainty. J Artif Intell Res 49:49\u201378","journal-title":"J Artif Intell Res"},{"issue":"1","key":"16_CR11","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s40860-015-0002-6","volume":"1","author":"V Florio De","year":"2015","unstructured":"De Florio V (2015) On resilient behaviors in computational systems and environments. J Reliab Intell Environ 1(1):33\u201346","journal-title":"J Reliab Intell Environ"},{"issue":"5","key":"16_CR12","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1016\/S0005-1098(01)00022-X","volume":"37","author":"B Schutter De","year":"2001","unstructured":"De Schutter B (2001) Stability analysis of discrete event systems. Automatica 37(5):799\u2013801","journal-title":"Automatica"},{"key":"16_CR13","volume-title":"Constraint processing","author":"R Dechter","year":"2003","unstructured":"Dechter R (2003) Constraint processing. Morgan Kaufmann Publishers Inc., San Francisco"},{"key":"16_CR14","unstructured":"Dechter R, Dechter A (1988) Belief maintenance in dynamic constraint networks. In: Proceedings of the 7th national conference on artificial intelligence (AAAI\u201988), pp 37\u201342"},{"issue":"11","key":"16_CR15","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1145\/361179.361202","volume":"17","author":"EW Dijkstra","year":"1974","unstructured":"Dijkstra EW (1974) Self-stabilizing systems in spite of distributed control. Commun ACM 17(11):643\u2013644","journal-title":"Commun ACM"},{"issue":"4","key":"16_CR16","doi-asserted-by":"crossref","first-page":"20","DOI":"10.5751\/ES-03610-150420","volume":"15","author":"C Folke","year":"2010","unstructured":"Folke C, Carpenter SR, Walker B, Scheffer M, Chapin T, Rockstr\u00f6m J (2010) Resilience thinking: integrating resilience, adaptability and transformability. Ecol Soc 15(4):20","journal-title":"Ecol Soc"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Greenberg A, Hamilton J, Maltz DA, Patel P (2008) The cost of a cloud: research problems in data center networks. ACM SIGCOMM. Comput Commun Rev 39(1):68\u201373","DOI":"10.1145\/1496091.1496103"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Grimm V, Calabrese JM (2011) What is resilience? A short introduction. In: Viability and resilience of complex systems, understanding complex systems. Springer, Berlin, pp 3\u201313","DOI":"10.1007\/978-3-642-20423-4_1"},{"issue":"3","key":"16_CR19","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/s004420050090","volume":"109","author":"V Grimm","year":"1997","unstructured":"Grimm V, Wissel C (1997) Babel, or the ecological stability discussions: an inventory and analysis of terminology and a guide for avoiding confusion. Oecologia 109(3):323\u2013334","journal-title":"Oecologia"},{"issue":"4","key":"16_CR20","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1002\/sys.20101","volume":"11","author":"YY Haimes","year":"2008","unstructured":"Haimes YY, Crowther KG, Horowitz BM (2008) Homeland security preparedness: balancing protection with resilience in emergent systems. Syst Eng 11(4):287\u2013308","journal-title":"Syst Eng"},{"key":"16_CR21","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"RW Hamming","year":"1950","unstructured":"Hamming RW (1950) Error detecting and error correcting codes. Bell Syst Tech J 29:147\u2013160","journal-title":"Bell Syst Tech J"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Henzinger TA, Sifakis J (2006) The embedded systems design challenge. In: Formal methods (FM\u201906), pp 1\u201315","DOI":"10.1007\/11813040_1"},{"key":"16_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1146\/annurev.es.04.110173.000245","volume":"4","author":"C Holling","year":"1973","unstructured":"Holling C (1973) Resilience and stability of ecological systems. Annu Rev Ecol Syst 4:1\u201323","journal-title":"Annu Rev Ecol Syst"},{"key":"16_CR24","unstructured":"Junges R, Bazzan A (2008) Evaluating the performance of DCOP algorithms in a real world, dynamic problem. In: Proceedings of the 7th international conference on autonomous agents and multi-agent systems (AAMAS\u201908), pp 599\u2013606"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Kopetz H (2011) Real-time systems: design principles for distributed embedded applications. In: Real-time systems series. Springer, US","DOI":"10.1007\/978-1-4419-8237-7"},{"issue":"18","key":"16_CR26","first-page":"10108","volume":"47","author":"I Linkov","year":"2013","unstructured":"Linkov I, Eisenberg DA, Bates ME, Chang D, Convertino M, Allen JH, Flynn SE, Seager TP (2013) Measurable resilience for actionable policy. Environ Sci Technol 47(18):10108\u201310110","journal-title":"Environ Sci Technol"},{"issue":"4","key":"16_CR27","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1007\/s10669-013-9485-y","volume":"33","author":"I Linkov","year":"2013","unstructured":"Linkov I, Eisenberg DA, Plourde K, Seager TP, Allen J, Kott A (2013) Resilience metrics for cyber systems. Environ Syst Decis 33(4):471\u2013476","journal-title":"Environ Syst Decis"},{"key":"16_CR28","unstructured":"Longstaff PH, Armstrong NJ, Perrin K, Parker WM, Hidek MA (2010) Building resilient communities: a preliminary framework for assessment. Homel Secur Aff 6(3)"},{"key":"16_CR29","unstructured":"Maheswaran R, Tambe M, Bowring E, Pearce J, Varakantham P (2004) Taking DCOP to the real world: efficient complete solutions for distributed multi-event scheduling. In: Proceedings of the 3rd international conference on autonomous agents and multi-agent systems, pp 310\u2013317"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Marrero W, Clarke E, Jha S (1997) Model checking for security protocols. Technical report, Carnegie Mellon University, Pittsburgh","DOI":"10.21236\/ADA327281"},{"issue":"3","key":"16_CR31","doi-asserted-by":"crossref","first-page":"7300","DOI":"10.1145\/116825.116855","volume":"38","author":"CM \u00d6zveren","year":"1991","unstructured":"\u00d6zveren CM, Willsky AS, Antsaklis PJ (1991) Stability and stabilizability of discrete event dynamic systems. J ACM 38(3):7300\u20137752","journal-title":"J ACM"},{"issue":"3","key":"16_CR32","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1145\/116825.116855","volume":"38","author":"CM \u00d6zveren","year":"1991","unstructured":"\u00d6zveren CM, Willsky AS, Antsaklis PJ (1991) Stability and stabilizability of discrete event dynamic systems. J ACM 38(3):729\u2013751","journal-title":"J ACM"},{"key":"16_CR33","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316887","volume-title":"Markov decision processes: discrete stochastic dynamic programming","author":"ML Puterman","year":"1994","unstructured":"Puterman ML (1994) Markov decision processes: discrete stochastic dynamic programming, 1st edn. Wiley, New York","edition":"1"},{"issue":"1","key":"16_CR34","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1137\/0325013","volume":"25","author":"PJ Ramadge","year":"1987","unstructured":"Ramadge PJ, Wonham WM (1987) Supervisory control of a class of discrete event processes. SIAM J Control Optim 25(1):206\u2013230","journal-title":"SIAM J Control Optim"},{"key":"16_CR35","doi-asserted-by":"crossref","unstructured":"Ritchey RW, Ammann P (2000) Using model checking to analyze network vulnerabilities. In: IEEE symposium on security and privacy, pp 156\u2013165","DOI":"10.1109\/SECPRI.2000.848453"},{"key":"16_CR36","unstructured":"Russell SJ, Norvig P (2003) Artificial intelligence: a modern approach, 2 edn. Pearson Education, UK"},{"key":"16_CR37","unstructured":"Schiex T, Fargier H, Verfaillie G (1995) Valued constraint satisfaction problems: hard and easy problems. In: Proceedings of the 14th international joint conference on artificial intelligence (IJCAI\u201995), pp 631\u2013639"},{"key":"16_CR38","unstructured":"Schwind N, Okimoto T, Inoue K, Chan H, Ribeiro T, Minami K, Maruyama H (2013) Systems resilience: a challenge problem for dynamic constraint-based agent systems. In: Proceedings of the 12th international conference on autonomous agents and multi-agent systems (AAMAS\u201913), pp 785\u2013788"},{"key":"16_CR39","doi-asserted-by":"crossref","unstructured":"Sharma A, Sharma D (2012) Solving dynamic constraint optimization problems using ichea. In: Neural information processing, vol 7665. Springer, Berlin, pp 434\u2013444","DOI":"10.1007\/978-3-642-34487-9_53"},{"key":"16_CR40","doi-asserted-by":"crossref","unstructured":"Smith P, Hutchison D, Sterbenz JPG, Schller M, Fessi A, Karaliopoulos M, Lac C, Plattner B (2011) Network resilience: a systematic approach. IEEE Commun Mag 49(7):88\u201397","DOI":"10.1109\/MCOM.2011.5936160"},{"key":"16_CR41","doi-asserted-by":"crossref","unstructured":"Stoicescu M, Fabre J-C, Roy M (2011) Architecting resilient computing systems: overall approach and open issues. In: Troubitsyna E (ed) Software engineering for resilient systems. Lecture notes in computer science, vol 6968. Springer, New York, pp 48\u201362","DOI":"10.1007\/978-3-642-24124-6_5"},{"key":"16_CR42","unstructured":"Taleb NN (2008) The black swan: the impact of the highly improbable. Random House Inc., New York"},{"issue":"7","key":"16_CR43","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1109\/5.871303","volume":"88","author":"CJ Tomlin","year":"2000","unstructured":"Tomlin CJ, Lygeros J, Sastry SS (2000) A game theoretic approach to controller design for hybrid systems. Proc IEEE 88(7):949\u2013970","journal-title":"Proc IEEE"},{"issue":"1","key":"16_CR44","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s10845-008-0176-3","volume":"21","author":"G Verfaillie","year":"2010","unstructured":"Verfaillie G, Pralet C, Lema\u00eetre M (2010) Constraint-based modeling of discrete event dynamic systems. J Intell Manuf 21(1):31\u201347","journal-title":"J Intell Manuf"},{"key":"16_CR45","unstructured":"Verfaillie G, Schiex T (1994) Solution reuse in dynamic constraint satisfaction problems. In: Proceedings of the 12th national conference on artificial intelligence (AAAI\u201994), pp 307\u2013312"},{"issue":"2","key":"16_CR46","doi-asserted-by":"crossref","first-page":"5","DOI":"10.5751\/ES-00650-090205","volume":"9","author":"BH Walker","year":"2004","unstructured":"Walker BH, Holling CS, Carpenter SC, Kinzig AP (2004) Resilience, adaptability and transformability. Ecol Soc 9(2):5","journal-title":"Ecol Soc"},{"key":"16_CR47","doi-asserted-by":"crossref","unstructured":"Wallace RJ, Freuder EC (1998) Stable solutions for dynamic constraint satisfaction problems. In: Proceedings of 4th international conference on principles and practice of constraint programming (CP\u201998), pp 447\u2013461","DOI":"10.1007\/3-540-49481-2_32"},{"key":"16_CR48","unstructured":"Wallace RJ, Grimes D, Freuder EC (2009) Solving dynamic constraint satisfaction problems by identifying stable features. In: Proceedings of the 21st international joint conference on artificial intelligence (IJCAI\u201909), pp 621\u2013627"},{"key":"16_CR49","volume-title":"Searching for safety","author":"A Wildavsky","year":"1991","unstructured":"Wildavsky A (1991) Searching for safety. Transaction Publishers, New Brunswick"},{"key":"16_CR50","doi-asserted-by":"crossref","unstructured":"Wohlgemuth S (2014) Adaptive user-centered security. In: Availability, reliability, and security in information systems. Lecture Notes in Computer Science, vol 8708, pp 94\u2013109","DOI":"10.1007\/978-3-319-10975-6_7"},{"key":"16_CR51","doi-asserted-by":"crossref","unstructured":"Wohlgemuth S (2014) Is privacy supportive for adaptive ICT systems? In: Proceedings of the 16th international conference on information integration and web-based applications and services (iiWAS\u201914), pp 559\u2013570","DOI":"10.1145\/2684200.2684363"},{"issue":"3","key":"16_CR52","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/BF01797154","volume":"6","author":"KC Wong","year":"1996","unstructured":"Wong KC, Wonham WM (1996) Hierarchical control of discrete-event systems. Discret Event Dyn Syst 6(3):241\u2013273","journal-title":"Discret Event Dyn Syst"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-015-0016-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-015-0016-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-015-0016-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T08:54:13Z","timestamp":1567414453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-015-0016-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,9]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["16"],"URL":"https:\/\/doi.org\/10.1007\/s40860-015-0016-0","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,9]]}}}