{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:05:23Z","timestamp":1730221523168,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/ewdts.2019.8884402","type":"proceedings-article","created":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T11:34:05Z","timestamp":1572953645000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Multidimensional Hierarchical Model of Behavioral Testing of Distributed Information Systems"],"prefix":"10.1109","author":[{"given":"Oleksandr","family":"Martynyuk","sequence":"first","affiliation":[]},{"given":"Oleksandr","family":"Drozd","sequence":"additional","affiliation":[]},{"given":"Hanna","family":"Suhak","sequence":"additional","affiliation":[]},{"given":"Dmitry","family":"Martynyuk","sequence":"additional","affiliation":[]},{"given":"Lyudmila","family":"Sugak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"292","article-title":"Calculation Methods of the Prognostication of the Computer Systems State under Different Level of Information Uncertainty","volume":"1614","author":"atamanyuk","year":"0","journal-title":"CEUR Workshop Proceedings"},{"key":"ref38","article-title":"Behavioral Modeling for Embrdded Systems and Technologies: Applications for Design and Implementation:","author":"gomes","year":"2010","journal-title":"Information Science Reference"},{"key":"ref33","article-title":"Handling Combinatorial Explosion in Software Testing","author":"grindal","year":"2007","journal-title":"Printed by LiU-Tryck Link&#x00F6;ping"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095215"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7341411"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/978-3-642-17545-9_13","article-title":"Evolutionary test generation methods for digital devices","author":"skobtsov","year":"2011","journal-title":"Design of Digital Systems and Devices"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55595-9_11"},{"key":"ref36","first-page":"683","article-title":"On Theorem Prover-based Testing","author":"achim","year":"2012","journal-title":"Formal Aspects of Computing"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10958-010-0058-z"},{"journal-title":"Functional Safety of Electrical \/ Electronic \/ Programmable Electronic Safety Related Systems - Part 1 General requirements Geneva International Electrotechnical Commission","article-title":"IEC 61508-1:2010","year":"2010","key":"ref34"},{"key":"ref10","article-title":"Stability and Control in Complex Networks of Dynamical Systems","author":"manaffam","year":"2015","journal-title":"Dissertation"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2015.7341410"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3384\/diss.diva-98107"},{"key":"ref12","article-title":"Manufacturing intelligence for industrial engineering: methods for system self-organization, learning, and adaptation","author":"zhou","year":"2010","journal-title":"Engineering Science Reference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831228"},{"key":"ref14","first-page":"1644","article-title":"Trusted AI and the Contribution of Trust Modeling in Multiagent Systems","author":"cohen","year":"2019","journal-title":"AAMAS Montr&#x00E9;al"},{"key":"ref15","article-title":"Multiagent systems","author":"shoham","year":"2009","journal-title":"Algorithmic Game-Theoretic and Logical Foundations"},{"key":"ref16","first-page":"287","article-title":"A Trust-based Decisionmaking Approach Applied to Agents in Collaborative Environments","author":"callebert","year":"0","journal-title":"International Conference on Agents and Artificial Intelligence Science and Technology Publications"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DT.2013.6566310"},{"key":"ref18","first-page":"3","article-title":"Embedded method of SoC diagnosis","author":"hahanov","year":"2008","journal-title":"Elektronoka Elektrotechnika"},{"key":"ref19","first-page":"476","article-title":"Features of Hidden Fault Detection in Pipeline Components of Safety-Related System","volume":"1356","author":"drozd","year":"0","journal-title":"CEUR Workshop Proceedings"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/S0950-5849(01)00190-2","article-title":"Evolutionary test environment for automatic structural testing","author":"wegener","year":"2001","journal-title":"Information and Software Technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.16.4.911"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISED.2010.52"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97044-8_3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"596","DOI":"10.23919\/DATE.2017.7927056","article-title":"Probabilistic Schedulability Analysis for Fixed Priority Mixed Criticality Real-Time Systems","author":"abdedda\u00efm","year":"2017","journal-title":"Design Automation and Test in Europe - DATE 2017"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICVD.2005.150"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"72","DOI":"10.47839\/ijc.15.2.840","article-title":"Parallelism and Complexity of a Small-World Network Model","volume":"15","author":"hiromoto","year":"2016","journal-title":"International Journal of Computing"},{"key":"ref8","article-title":"Artificial Intelligence: a Modern Approach, Prentice-Hall","author":"stuart","year":"2010","journal-title":"A Simon & Schuster Company Englewood Cliffs"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2017.00050"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1007\/s00607-016-0508-7","article-title":"A brief introduction to distributed systems","author":"van steen","year":"2016","journal-title":"Computing"},{"key":"ref9","article-title":"A Field Guide to Genetic Programming","author":"poli","year":"2008","journal-title":"Creative Commons Attribution-NoncommercialNo Derivative Works"},{"journal-title":"Distributed Systems Concepts and Design","year":"2011","author":"coulouris","key":"ref1"},{"key":"ref20","article-title":"The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Pravtice","author":"jason","year":"2014","journal-title":"Syngress"},{"key":"ref22","first-page":"654","article-title":"Improving of a Circuit Checkability and Trustworthiness of Data Processing Results in LUT-based FPGA Components of Safety-Related Systems","volume":"1844","author":"drozd","year":"0","journal-title":"CEUR Workshop Proceedings"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2001.915042"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSET.2018.8336255"},{"key":"ref41","first-page":"322","article-title":"Use of Natural LUT Redundancy to Improve Trustworthiness of FPGA Design","volume":"1614","author":"drozd","year":"0","journal-title":"CEUR Workshop Proceedings"},{"key":"ref23","first-page":"498","article-title":"The control technology of integrity and legitimacy of LUT-oriented information object usage by selfrecovering digital watermark","volume":"1356","author":"zashcholkin","year":"0","journal-title":"CEUR Workshop Proceedings"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/DAAS.2016.7492594"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3068281"}],"event":{"name":"2019 IEEE East-West Design & Test Symposium (EWDTS)","start":{"date-parts":[[2019,9,13]]},"location":"Batumi, Georgia","end":{"date-parts":[[2019,9,16]]}},"container-title":["2019 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8871308\/8884369\/08884402.pdf?arnumber=8884402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:45:37Z","timestamp":1658155537000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8884402\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/ewdts.2019.8884402","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}