{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:57:16Z","timestamp":1730260636320,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T00:00:00Z","timestamp":1632268800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,22]]},"DOI":"10.1109\/idaacs53288.2021.9660961","type":"proceedings-article","created":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T15:43:03Z","timestamp":1641397383000},"page":"984-989","source":"Crossref","is-referenced-by-count":0,"title":["Verification Model for Agent Coordination of Distributed Information Systems"],"prefix":"10.1109","author":[{"given":"Oleksandr","family":"Martynyuk","sequence":"first","affiliation":[{"name":"Odessa Polytechnic State University,Odessa,Ukraine,65044"}]},{"given":"Oleksandr","family":"Drozd","sequence":"additional","affiliation":[{"name":"Odessa Polytechnic State University,Odessa,Ukraine,65044"}]},{"given":"Anatoliy","family":"Sachenko","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Ternopil,Ukraine,46009"}]},{"given":"Hanna","family":"Stepova","sequence":"additional","affiliation":[{"name":"Odessa Polytechnic State University,Odessa,Ukraine,65044"}]},{"given":"Dmitry","family":"Martynyuk","sequence":"additional","affiliation":[{"name":"Join Venture &#x201C;Nippon Auto&#x201D;,Odessa,Ukraine,65000"}]},{"given":"Lyudmila","family":"Sugak","sequence":"additional","affiliation":[{"name":"Odessa Polytechnic State University,Odessa,Ukraine,65044"}]},{"given":"Iryna","family":"Turchenko","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Ternopil,Ukraine,46009"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1002\/jrsm.1396","article-title":"Adjudication rather than experience of data abstraction matters more in reducing errors in abstracting data in systematic reviews","volume":"11","author":"jian-yu","year":"2020","journal-title":"Research Synthesis Methods"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23391-3_18"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2019.00092"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07013-1_22"},{"journal-title":"Transactional Information Systems Theory Algorithms and the Practice of Concurrency Control and Recovery","year":"2002","author":"weikum","key":"ref31"},{"key":"ref30","first-page":"52s","volume":"20","author":"amersbach","year":"2019","journal-title":"Functional decomposition - A contribution to overcome the parameter space explosion during validation of highly automated driving Traffic Injury Prevention"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICGTSPICC.2016.7955308"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.08.002"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-014-1223-y"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1201\/b18378"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2007.7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2017.8095215"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07013-1_22"},{"journal-title":"NP and mathematics - a computational complexity perspective","year":"2021","author":"wigderson","key":"ref12"},{"journal-title":"System Decomposition for Distributed Data-Driven Process Monitoring","year":"2020","author":"khatib","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.86"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2017.8274212"},{"journal-title":"Testing Cloud Services","year":"2013","author":"blokland","key":"ref16"},{"key":"ref17","first-page":"30","article-title":"Development of Checkability in FPGA Components of Safety-Related Systems","volume":"2762","author":"drozd","year":"2020","journal-title":"CEUR Workshop Proceedings"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT50317.2020.9125050"},{"journal-title":"Database testing How to regression test a relational database","year":"2011","author":"ambler","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10575-8_4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/STC-CSIT.2018.8526730"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-53291-8_6"},{"key":"ref3","article-title":"It's Official: The &#x2018;Internet&#x2019; Is Over","author":"corbett","year":"2020","journal-title":"The New York Times"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.02.006"},{"key":"ref29","article-title":"Chapter 5: Prozessalgebra - Parallele und kommunizierende Prozesse","author":"valk","year":"2019","journal-title":"Formale Grundlagen der Informatik II Modellierung und Analyse von Informatiksystemen Theoretische Grundlagen der Informatik (in German) Part 2 University of Hamburg FGI2 2011 Archived from the original on 2019-07-09"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23850-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-016-0508-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VACE.2017.5"},{"key":"ref2","first-page":"513","author":"shoham","year":"2009","journal-title":"Multiagent Systems Algorithmic Game-Theoretic and Logical Foundations"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10958-010-0058-z"},{"key":"ref1","first-page":"1067","author":"coulouris","year":"2011","journal-title":"Distributed Systems Concepts and Design"},{"key":"ref20","article-title":"Forward Error-Correction Coding","volume":"3","author":"wang","year":"2012","journal-title":"Aerospace Corporation Crosslinks"},{"key":"ref22","first-page":"1662","author":"rami","year":"2018","journal-title":"A Survey on Malware Analysis Techniques Static Dynamic Hybrid and Memory Analysis"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1142\/S0218539311004093"},{"key":"ref42","first-page":"110","article-title":"Behavioral Agent Testing of Distributed Information Systems","author":"martynyuk","year":"2020","journal-title":"Proceedings of the 2nd International Workshop on Information-Communication Technologies & Embedded Systems (ICTES 2020)"},{"key":"ref24","first-page":"16","article-title":"-VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder","author":"yang","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-020-09492-5"},{"journal-title":"Devoxx 2011 presentation","year":"2017","author":"vanderkimpen","key":"ref23"},{"journal-title":"The Theory and Practice of Specification-Based Software Testing","year":"2018","author":"laycock","key":"ref26"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/IDAACS.2019.8924314"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/9781316771273"}],"event":{"name":"2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)","start":{"date-parts":[[2021,9,22]]},"location":"Cracow, Poland","end":{"date-parts":[[2021,9,25]]}},"container-title":["2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9660827\/9660386\/09660961.pdf?arnumber=9660961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T17:20:25Z","timestamp":1656350425000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9660961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,22]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/idaacs53288.2021.9660961","relation":{},"subject":[],"published":{"date-parts":[[2021,9,22]]}}}