{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T02:35:05Z","timestamp":1725590105242},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/icsmc.2012.6378114","type":"proceedings-article","created":{"date-parts":[[2012,12,18]],"date-time":"2012-12-18T21:52:04Z","timestamp":1355867524000},"page":"2469-2474","source":"Crossref","is-referenced-by-count":3,"title":["A method to detect and remove emergent behavior caused by overgeneralization"],"prefix":"10.1109","author":[{"given":"Mohammad","family":"Moshirpour","sequence":"first","affiliation":[]},{"given":"Seyedehmerhnaz","family":"Mireslami","sequence":"additional","affiliation":[]},{"given":"Armin","family":"Eberlein","sequence":"additional","affiliation":[]},{"given":"Behrouz H.","family":"Far","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Inference of Emergent Behaviors of Scenario-Based Specifications","year":"2009","author":"mousavi","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194012400104"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2009.43"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2008.4525507"},{"key":"13","first-page":"18","article-title":"The Ponder Policy Specification Language","author":"damianou","year":"0","journal-title":"Proc Policy 2001"},{"journal-title":"A Policy Framework for Mana Gement of Distributed Systems","year":"2002","author":"damianou","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/32.824414"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-70657-7_6"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.08.065"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.1998.732635"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)80481-X"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/SEFM.2010.14"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.28"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.11.007"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2000.870421"},{"key":"4","first-page":"74","article-title":"Detecting implied scenarios in message sequence chart specifications","author":"uchitel","year":"0","journal-title":"Proceedings of ESEC \/ SIGSOFT FSE 2001"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6084038"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)80481-X"}],"event":{"name":"2012 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2012,10,14]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2012,10,17]]}},"container-title":["2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6362338\/6377652\/06378114.pdf?arnumber=6378114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T21:44:52Z","timestamp":1490132692000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6378114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2012.6378114","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}