{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:09:34Z","timestamp":1760080174747,"version":"3.28.0"},"reference-count":77,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icphys.2018.8387644","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T19:28:02Z","timestamp":1529954882000},"page":"103-108","source":"Crossref","is-referenced-by-count":12,"title":["Data-driven and model-based design"],"prefix":"10.1109","author":[{"given":"Stavros","family":"Tripakis","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2510366"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.81"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2004.01.004"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2004.10.002"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/426"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2004.1319602"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s10009-016-0442-1","article-title":"Exact finite-state machine identification from scenarios and temporal properties","volume":"20","author":"ulyantsev","year":"2018","journal-title":"STTT"},{"key":"ref39","article-title":"Reluplex: An efficient SMT solver for verifying deep neural networks","volume":"abs 1702 1135","author":"katz","year":"2017","journal-title":"CoRR"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2967606"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.7249\/RR1478"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.364"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2003.1172829"},{"journal-title":"A Practitioner's Handbook for Real-Time Analysis Guide to Rate-Monotonic Analysis for Real-Time Systems","year":"1993","author":"harbour","key":"ref31"},{"key":"ref30","first-page":"1115","article-title":"Optimizing the implementation of real-time Simulink models onto distributed automotive architectures","volume":"59","author":"han","year":"2013","journal-title":"Journal of Systems Architecture-Embedded Systems Design"},{"key":"ref37","first-page":"327","article-title":"Learning of Automata Models Extended with Data","author":"jonsson","year":"2011","journal-title":"SFM 2011 Advanced Lectures"},{"key":"ref36","article-title":"Safety verification of deep neural networks","volume":"abs 1610 6940","author":"huang","year":"2016","journal-title":"CoRR"},{"key":"ref35","first-page":"251","article-title":"Inferring Canonical Register Automata","author":"howar","year":"2012","journal-title":"VMCAI"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2008.0141"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228425"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38856-9_21"},{"key":"ref61","first-page":"207","article-title":"Inferring Mealy Machines","author":"shahbaz","year":"2009","journal-title":"FM 2009"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2002.805820"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1561\/2500000010"},{"journal-title":"Program Synthesis by Sketching","year":"2008","author":"solar-lezama","key":"ref64"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(67)91165-5"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5535-3"},{"key":"ref66","article-title":"Intriguing properties of neural networks","volume":"abs 1312 6199","author":"szegedy","year":"2013","journal-title":"CoRR"},{"key":"ref29","first-page":"416","article-title":"Synthesizing java expressions from freeform queries","author":"gvero","year":"2015","journal-title":"2015 ACM SIGPLAN Intl Conf on Object-Oriented Programming Systems Languages and Applications ser OOPSLA ACM"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/2.585163"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161529"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0224-5"},{"key":"ref2","article-title":"Synthesizing Finite-state Protocols from Scenarios and Requirements","volume":"8855","author":"alur","year":"2014","journal-title":"Haifa Verification Conference (HVC) Ser LNCS"},{"journal-title":"Principles of Cyber-Physical Systems","year":"2015","author":"alur","key":"ref1"},{"key":"ref20","first-page":"173","article-title":"Learning symbolic automata","volume":"10205","author":"drews","year":"2017","journal-title":"Tools and Algorithms for the Construction and Analysis of Systems-23rd International Conference TACAS 2017 ser LNCS"},{"key":"ref22","first-page":"72","article-title":"Synthesis of reactive systems","volume":"45","author":"finkbeiner","year":"2016","journal-title":"Dependable Software Systems Engineering ser NATO Science for Peace and Security Series D Information and Communication Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10626-015-0223-0"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-319-02812-5_2","article-title":"Industrial cyber-physical systems-icyphy","author":"fisher","year":"2014","journal-title":"Complex Systems Design &amp; Management"},{"journal-title":"Research Challenge II Dependability Finnish Center for Artificial Intelligence","year":"0","key":"ref23"},{"key":"ref26","first-page":"291","article-title":"Learning Moore Machines from Input-Output Traces","volume":"9995","author":"giantamidis","year":"2016","journal-title":"21st International Symposium on Formal Methods (FM 2016) ser Lecture Notes in Computer Science"},{"key":"ref25","first-page":"69","article-title":"ICE: A Robust Framework for Learning Invariants","author":"garg","year":"2014","journal-title":"Computer Aided Verification"},{"journal-title":"Signals & Systems","year":"1996","author":"oppenheim","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/75277.75293"},{"key":"ref59","first-page":"3047","article-title":"Developing bug-free machine learning systems with formal mathematics","volume":"70","author":"selsam","year":"2017","journal-title":"34th International Conference on Machine Learning"},{"key":"ref58","first-page":"2503","article-title":"Hidden technical debt in machine learning systems","author":"sculley","year":"2015","journal-title":"28th International Conference on Neural Information Processing Systems-Volume 2 ser NIPS'15 MIT Press"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.890107"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677009"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/5.21072"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/978-3-642-14295-6_24","article-title":"An abstraction-refinement approach to verification of artificial neural networks","author":"pulina","year":"2010","journal-title":"CAV 2010 Computer Aided Verification"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2167449"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/FSCS.1990.89597"},{"journal-title":"Real-Time Systems and Programming Languages","year":"2001","author":"burns","key":"ref10"},{"journal-title":"Hard Real-Time Computing Systems","year":"1997","author":"buttazzo","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/43.898830"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/780732.780754"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1331331.1331339"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10431-7_18"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1561\/1000000037"},{"journal-title":"Model checking","year":"2000","author":"clarke","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/83"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139194655"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/355604.361591"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3061640.3061652"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/978-3-319-21668-3_23","article-title":"Automatic Completion of Distributed Protocols with Symmetry","volume":"9207","author":"alur","year":"2015","journal-title":"27th International Conference on Computer Aided Verification (CAV) ser LNCS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90052-6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503275"},{"key":"ref8","first-page":"84","article-title":"Formal Synthesis of Cyber-Physical Systems (Dagstuhl Seminar 17201)","volume":"7","author":"belta","year":"2017","journal-title":"Dagstuhl Reports"},{"journal-title":"Principles of Model Checking","year":"2008","author":"baier","key":"ref7"},{"journal-title":"Model-Based Design for Embedded Systems","year":"2010","author":"nicolescu","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429123"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/357084.357090"},{"key":"ref45","doi-asserted-by":"crossref","DOI":"10.1201\/b10928","author":"lo","year":"2011","journal-title":"Mining Software Specifications Methodologies and Applications"},{"key":"ref48","article-title":"Assured autonomy","author":"neema","year":"0","journal-title":"DARPA Research Program"},{"journal-title":"Machine Learning","year":"1997","author":"mitchell","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/5.533956"},{"journal-title":"Switching and Finite Automata Theory","year":"1978","author":"kohavi","key":"ref41"},{"journal-title":"System Identification Theory for the User","year":"1999","author":"ljung","key":"ref44"},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1201\/9781420011746","author":"lee","year":"2007","journal-title":"Handbook of Real-Time and Embedded Systems Chapman & Hall\/CRC"}],"event":{"name":"2018 IEEE Industrial Cyber-Physical Systems (ICPS)","start":{"date-parts":[[2018,5,15]]},"location":"St. Petersburg","end":{"date-parts":[[2018,5,18]]}},"container-title":["2018 IEEE Industrial Cyber-Physical Systems (ICPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376183\/8387624\/08387644.pdf?arnumber=8387644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:08:31Z","timestamp":1643202511000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8387644\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":77,"URL":"https:\/\/doi.org\/10.1109\/icphys.2018.8387644","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}