{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:37:57Z","timestamp":1759639077400},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642548031"},{"type":"electronic","value":"9783642548048"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54804-8_6","type":"book-chapter","created":{"date-parts":[[2014,3,21]],"date-time":"2014-03-21T09:59:16Z","timestamp":1395395956000},"page":"79-93","source":"Crossref","is-referenced-by-count":0,"title":["Heterogeneous and Asynchronous Networks of Timed Systems"],"prefix":"10.1007","author":[{"given":"Jos\u00e9 Luis","family":"Fiadeiro","sequence":"first","affiliation":[]},{"given":"Ant\u00f3nia","family":"Lopes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"6_CR1","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/0304-3975(91)90224-P","volume":"82","author":"M. Abadi","year":"1991","unstructured":"Abadi, M., Lamport, L.: The existence of refinement mappings. Theor. Comput. Sci.\u00a082(2), 253\u2013284 (1991)","journal-title":"Theor. Comput. Sci."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Benveniste, A., Caillaud, B., Carloni, L.P., Sangiovanni-Vincentelli, A.L.: Tag machines. In: EMSOFT, pp. 255\u2013263. ACM (2005)","DOI":"10.1145\/1086228.1086276"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Delahaye, B., Fiadeiro, J.L., Legay, A., Lopes, A.: Heterogeneous timed machines. Technical report (October 2013) (submitted)","DOI":"10.1007\/978-3-319-10882-7_8"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Delahaye, B., Fiadeiro, J.L., Legay, A., Lopes, A.: A timed component algebra for services. In: Beyer, D., Boreale, M. (eds.) FMOODS\/FORTE 2013. LNCS, vol.\u00a07892, pp. 242\u2013257. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-38592-6_17"},{"issue":"2","key":"6_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.entcs.2005.12.042","volume":"157","author":"G. D\u00edaz","year":"2006","unstructured":"D\u00edaz, G., Pardo, J.J., Cambronero, M.-E., Valero, V., Cuartero, F.: Verification of web services with timed automata. Electr. Notes Theor. Comput. Sci.\u00a0157(2), 19\u201334 (2006)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.tcs.2013.05.011","volume":"503","author":"J.L. Fiadeiro","year":"2013","unstructured":"Fiadeiro, J.L., Lopes, A.: An interface theory for service-oriented design. Theor. Comput. Sci.\u00a0503, 1\u201330 (2013)","journal-title":"Theor. Comput. Sci."},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Forget, J., Boniol, F., Lesens, D., Pagetti, C.: A multi-periodic synchronous data-flow language. In: HASE, pp. 251\u2013260. IEEE Computer Society (2008)","DOI":"10.1109\/HASE.2008.47"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Guermouche, N., Godart, C.: Timed model checking based approach for web services analysis. In: ICWS, pp. 213\u2013221. IEEE (2009)","DOI":"10.1109\/ICWS.2009.42"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Kazhamiakin, R., Pandya, P.K., Pistore, M.: Representation, verification, and computation of timed properties in web. In: ICWS, pp. 497\u2013504. IEEE Computer Society (2006)","DOI":"10.1109\/ICWS.2006.112"},{"issue":"4","key":"6_CR10","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/BF01995674","volume":"2","author":"R. Koymans","year":"1990","unstructured":"Koymans, R.: Specifying real-time properties with metric temporal logic. Real-Time Systems\u00a02(4), 255\u2013299 (1990)","journal-title":"Real-Time Systems"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Le, T.T.H., Passerone, R., Fahrenberg, U., Legay, A.: Tag machines for modeling heterogeneous systems. In: ACSD, pp. 186\u2013195. IEEE Computer Society (2013)","DOI":"10.1109\/ACSD.2013.23"},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/11691372_27","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"J. Ouaknine","year":"2006","unstructured":"Ouaknine, J., Worrell, J.: Safety metric temporal logic is fully decidable. In: Hermanns, H., Palsberg, J. (eds.) TACAS 2006. LNCS, vol.\u00a03920, pp. 411\u2013425. Springer, Heidelberg (2006)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Ponge, J., Benatallah, B., Casati, F., Toumani, F.: Analysis and applications of timed service protocols. ACM Trans. Softw. Eng. Methodol.\u00a019(4) (2010)","DOI":"10.1145\/1734229.1734230"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54804-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T12:00:24Z","timestamp":1558872024000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54804-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642548031","9783642548048"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54804-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}