{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:32:01Z","timestamp":1725568321559},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642165603"},{"type":"electronic","value":"9783642165610"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16561-0_27","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T09:50:50Z","timestamp":1288691450000},"page":"263-277","source":"Crossref","is-referenced-by-count":5,"title":["Dependability Analysis and Verification for Connected Systems"],"prefix":"10.1007","author":[{"given":"Felicita","family":"Di Giandomenico","sequence":"first","affiliation":[]},{"given":"Marta","family":"Kwiatkowska","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Martinucci","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Masci","sequence":"additional","affiliation":[]},{"given":"Hongyang","family":"Qu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"27_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing\u00a01(1), 11\u201333 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/3-540-61474-5_75","volume-title":"Computer Aided Verification","author":"A. Aziz","year":"1996","unstructured":"Aziz, A., Sanwal, K., Singhal, V., Brayton, R.: Verifying continuous time Markov chains. In: Alur, R., Henzinger, T.A. (eds.) CAV 1996. LNCS, vol.\u00a01102, pp. 269\u2013276. Springer, Heidelberg (1996)"},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/3-540-48320-9_12","volume-title":"CONCUR\u201999. Concurrency Theory","author":"C. Baier","year":"1999","unstructured":"Baier, C., Katoen, J.-P., Hermanns, H.: Approximate symbolic model checking of continuous-time Markov chains. In: Baeten, J.C.M., Mauw, S. (eds.) CONCUR 1999. LNCS, vol.\u00a01664, pp. 146\u2013161. Springer, Heidelberg (1999)"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Di Giandomenico, F., Di Marco, A., Issarny, V., Martinelli, F., Masci, P., Matteucci, I., Saadi, R., Sabetta, A.: Dependability in dynamic, evolving and heterogeneous systems: the connect approach. In: Proc. 2nd International Workshop on Software Engineering for Resilient Systems, SERENE2010 (2010)","DOI":"10.1145\/2401736.2401746"},{"key":"27_CR5","series-title":"LNCS","first-page":"251","volume-title":"ISoLA 2010, Part II","author":"A. Bertolino","year":"2010","unstructured":"Bertolino, A., Inverardi, P., Issarny, V., Sabetta, A., Spalazzese, R.: On-the-fly interoperability though automated mediator synthesis and monitoring. In: ISoLA 2010, Part II. LNCS, vol.\u00a06416, pp. 251\u2013262. Springer, Heidelberg (2010)"},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-60692-0_70","volume-title":"Foundations of Software Technology and Theoretical Computer Science","author":"A. Bianco","year":"1995","unstructured":"Bianco, A., de Alfaro, L.: Model checking of probabilistic and nondeterministic systems. In: Thiagarajan, P.S. (ed.) FSTTCS 1995. LNCS, vol.\u00a01026. Springer, Heidelberg (1995)"},{"key":"27_CR7","unstructured":"Calinescu, R., Grunske, L., Kwiatkowska, M., Mirandola, R., Tamburrelli, G.: Dynamic QoS management and optimisation in service-based systems. IEEE Transaction on Software Engineering (to appear)"},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/PNPM.2001.953373","volume-title":"9th Int. Workshop on Petri Nets and Performance Models","author":"G. Clark","year":"2001","unstructured":"Clark, G., Courtney, T., Daly, D., Deavours, D.D., Derisavi, S., Doyle, J.M., Sanders, W.H., Webster, P.G.: The M\u00f6bius modeling tool. In: 9th Int. Workshop on Petri Nets and Performance Models, pp. 241\u2013250. Aachen, Germany, Los Alamitos (September 2001)"},{"key":"27_CR9","volume-title":"Proc. 7th International Conference on Quantitative Evaluation of Systems (QEST 2010)","author":"L. Feng","year":"2010","unstructured":"Feng, L., Kwiatkowska, M., Parker, D.: Compositional verification of probabilistic systems using learning. In: Proc. 7th International Conference on Quantitative Evaluation of Systems (QEST 2010). IEEE CS Press, Los Alamitos (2010)"},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/RAMS.1997.571665","volume-title":"Annual Reliability and Maintainability Symposium","author":"R. Gulati","year":"1997","unstructured":"Gulati, R., Dugan, J.B.: A modular approach for analyzing static and dynamic fault trees. In: Annual Reliability and Maintainability Symposium, pp. 57\u201363. IEEE Computer Society Press, Los Alamitos (1997)"},{"issue":"5","key":"27_CR11","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/BF01211866","volume":"6","author":"H. Hansson","year":"1994","unstructured":"Hansson, H., Jonsson, B.: A logic for reasoning about time and reliability. Formal Aspects of Computing\u00a06(5), 512\u2013535 (1994)","journal-title":"Formal Aspects of Computing"},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11691372_29","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A. Hinton","year":"2006","unstructured":"Hinton, A., Kwiatkowska, M., Norman, G., Parker, D.: PRISM: A tool for automatic verification of probabilistic systems. In: Hermanns, H., Palsberg, J. (eds.) TACAS 2006. LNCS, vol.\u00a03920, Springer, Heidelberg (2006)"},{"key":"27_CR13","series-title":"LNCS","first-page":"236","volume-title":"ISoLA 2010, Part II","author":"P. Inverardi","year":"2010","unstructured":"Inverardi, P., Issarny, V., Spalazzese, R.: A theory of mediators for eternal connectors. In: ISoLA 2010, Part II, 2010. LNCS, vol.\u00a06416, pp. 236\u2013250. Springer, Heidelberg (2010)"},{"key":"27_CR14","first-page":"154","volume-title":"14th IEEE International Conference on Engineering of Complex Computer Systems","author":"V. Issarny","year":"2009","unstructured":"Issarny, V., Steffen, B., Jonsson, B., Blair, G., Grace, P., Kwiatkowska, M., Calinescu, R., Inverardi, P., Tivoli, M., Bertolino, A., Sabetta, A.: Connect Challenges: Towards Emergent connectors for Eternal Networked Systems. In: 14th IEEE International Conference on Engineering of Complex Computer Systems, pp. 154\u2013161. IEEE Computer Society, Los Alamitos (2009)"},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-642-12002-2_3","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M. Kwiatkowska","year":"2010","unstructured":"Kwiatkowska, M., Norman, G., Parker, D., Qu, H.: Assume-guarantee verification for probabilistic systems. In: Esparza, J., Majumdar, R. (eds.) Tools and Algorithms for the Construction and Analysis of Systems. LNCS, vol.\u00a06015, pp. 23\u201337. Springer, Heidelberg (2010)"},{"issue":"1","key":"27_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/90.282603","volume":"2","author":"W.E. Leland","year":"1994","unstructured":"Leland, W.E., Taqqu, M.S., Willinger, W., Wilson, D.V.: On the self-similar nature of ethernet traffic (extended version). IEEE\/ACM Transactions on Networking\u00a02(1), 1\u201315 (1994)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"27_CR17","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/EDCC.2010.26","volume-title":"8th European Dependable Computing Conference (EDCC2010)","author":"P. Masci","year":"2010","unstructured":"Masci, P., Chiaradonna, S., Di Giandomenico, F.: Dependability analysis of diffusion protocols in wireless networks with heterogeneous node capabilities. In: 8th European Dependable Computing Conference (EDCC2010), pp. 145\u2013154. IEEE Computer Society, Los Alamitos (2010)"},{"key":"27_CR18","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TDSC.2004.11","volume":"1","author":"D.M. Nicol","year":"2004","unstructured":"Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: from dependability to security. IEEE Transactions on Dependable and Secure Computing\u00a01, 48\u201365 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/SFCS.1977.32","volume-title":"Proc. 18th Annual Symposium on Foundations of Computer Science (FOCS 1977)","author":"A. Pnueli","year":"1977","unstructured":"Pnueli, A.: The temporal logic of programs. In: Proc. 18th Annual Symposium on Foundations of Computer Science (FOCS 1977), pp. 46\u201357. IEEE Computer Society Press, Los Alamitos (1977)"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Sanders, W.H., Meyer, J.F.: Stochastic Activity Networks: formal definitions and concepts, pp. 315\u2013343 (2002)","DOI":"10.1007\/3-540-44667-2_9"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification, and Validation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16561-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T21:08:09Z","timestamp":1559768889000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16561-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642165603","9783642165610"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16561-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}