{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T20:13:47Z","timestamp":1774988027930,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,11]]},"DOI":"10.1109\/fmcad.2009.5351139","type":"proceedings-article","created":{"date-parts":[[2009,12,11]],"date-time":"2009-12-11T13:55:16Z","timestamp":1260539716000},"page":"85-92","source":"Crossref","is-referenced-by-count":49,"title":["Synthesizing robust systems"],"prefix":"10.1109","author":[{"given":"Roderick","family":"Bloem","sequence":"first","affiliation":[]},{"given":"Karin","family":"Greimel","sequence":"additional","affiliation":[]},{"given":"Thomas A.","family":"Henzinger","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Jobstmann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"240","article-title":"Ranking automata and games for prioritized requirements","author":"alur","year":"2008","journal-title":"C AV"},{"key":"18","first-page":"97","article-title":"Using symbolic model checking to verify the railway stations of Hoorn-Kersenboogerd and Heerhugowaard","author":"eisner","year":"1999","journal-title":"CHARME"},{"key":"15","first-page":"147","article-title":"Environment assumptions for synthesis","author":"chatterjee","year":"2008","journal-title":"Concurrency"},{"key":"16","first-page":"227","article-title":"Conflict-tolerant features","author":"d'souza","year":"2008","journal-title":"CAV"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/963778.963782"},{"key":"14","article-title":"Games you cannot win","author":"faella","year":"2007","journal-title":"Workshop on Games and Automata for Synthesis and Validation"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2008.0141"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/949344.949402"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"2","author":"ghezzi","year":"1991","journal-title":"Fundamentals of Software Engineering"},{"key":"1","author":"davis","year":"1990","journal-title":"Software Requirements Analysis and Specification"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2006.23"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(95)00188-3"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/11539452_33"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1287\/opre.18.2.300"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2006.22"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1999.781227"},{"key":"8","author":"lawler","year":"1976","journal-title":"Combinatorial Optimization Networks and Matroids"}],"event":{"name":"2009 Formal Methods in Computer-Aided Design (FMCAD)","location":"Austin, TX, USA","start":{"date-parts":[[2009,11,15]]},"end":{"date-parts":[[2009,11,18]]}},"container-title":["2009 Formal Methods in Computer-Aided Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5344684\/5351113\/05351139.pdf?arnumber=5351139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T15:18:48Z","timestamp":1489850328000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5351139\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/fmcad.2009.5351139","relation":{},"subject":[],"published":{"date-parts":[[2009,11]]}}}