{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T19:42:47Z","timestamp":1757706167713,"version":"3.37.3"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"TU Vienna Research Cluster SmartCT"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/jproc.2019.2917314","type":"journal-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T20:07:15Z","timestamp":1559938035000},"page":"1520-1536","source":"Crossref","is-referenced-by-count":12,"title":["Dependable Resource Coordination on the Edge at Runtime"],"prefix":"10.1109","volume":"107","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9493-3404","authenticated-orcid":false,"given":"Christos","family":"Tsigkanos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0240-3834","authenticated-orcid":false,"given":"Ilir","family":"Murturi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6872-8821","authenticated-orcid":false,"given":"Schahram","family":"Dustdar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.98"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.30"},{"key":"ref33","first-page":"125","article-title":"Efficient implementation of property directed reachability","author":"een","year":"2011","journal-title":"Proc Int Conf Formal Methods Comput -Aided Design"},{"journal-title":"Model checking","year":"1999","author":"clarke","key":"ref32"},{"key":"ref31","first-page":"317","article-title":"Symbolic model checking using SAT procedures instead of BDDs","author":"biere","year":"1999","journal-title":"Proc ACM 36th Annu ACM\/IEEE Design Autom Conf"},{"key":"ref30","volume":"10","author":"lamsweerde","year":"2009","journal-title":"Requirements Engineering From System Goals to UML Models to Software Specifications"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2599880"},{"key":"ref36","first-page":"222","article-title":"Measuring the hardness of SAT instances","volume":"8","author":"ans\u00f3tegui","year":"2008","journal-title":"Proc AAAI"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30201-8_33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_14"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2016.2533321"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2948071"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2738640"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-015-4362-0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04425-0_36"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.19"},{"journal-title":"Requirements Engineering From System Goals to UML Models to Software Specifications","year":"2009","author":"van lamsweerde","key":"ref27"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00761-4_4"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-017-0639-0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.26"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2017.5"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/32.328995"},{"key":"ref2","first-page":"1","article-title":"Towards resilient Internet of Things: Vision, challenges, and research roadmap","author":"tsigkanos","year":"2019","journal-title":"Proc 39th IEEE Int Conf Distrib Comput Syst (ICDCS)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-805395-9.00004-6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00761-4_6"},{"journal-title":"Automated Planning Theory & Practice","year":"2004","author":"ghallab","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1613\/jair.855"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.04.054"},{"journal-title":"Service-Oriented Architecture Concepts Technology and Design","year":"2005","author":"erl","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSD.1998.667919"},{"key":"ref25","first-page":"949","article-title":"Service modelling for the Internet of Things","author":"de","year":"2011","journal-title":"Proc Fed Conf Comput Sci Inf Syst (FedCSIS)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/11925071_13"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/MPRV.2005.87","article-title":"Service discovery in pervasive computing environments","volume":"4","author":"zhu","year":"2005","journal-title":"IEEE Pervasive Comput"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2991561.2991573"},{"key":"ref58","first-page":"236","article-title":"A service mining scheme based on semantic for Internet of Things","volume":"23","author":"li","year":"2014","journal-title":"Chin J Electron"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.038"},{"key":"ref56","first-page":"20","article-title":"Model-driven development of adaptive IoT systems","author":"hussein","year":"2017","journal-title":"Proc 4th Int Workshop Interplay Model-Driven Compon -Based Softw Eng (ModComp) Workshop"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00761-4_6"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/11431053_5"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.65"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2013.057466"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2014.24"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2019.8767395"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38709-8_6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700030"},{"journal-title":"Workshop on Satisfiability Modulo Theories","year":"2018","author":"barrett","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/S0065-2458(03)58003-2","article-title":"Bounded model checking","volume":"58","author":"biere","year":"2003","journal-title":"Adv Comput"},{"key":"ref15","first-page":"43","article-title":"A survey of automated Web service composition methods","author":"rao","year":"2004","journal-title":"Proc Semantic Web Services Web Process Composition"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48005-6_27"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/4236.991449"},{"key":"ref18","first-page":"2004","article-title":"Owl Web ontology language overview","volume":"10","author":"mcguinness","year":"2004","journal-title":"W3C Recommendation"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011276507260"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-934613-63-7.50034-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2019.00021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106299"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2983528"},{"key":"ref7","first-page":"18","article-title":"Reference model for service oriented architecture 1.0","volume":"12","author":"mackenzie","year":"2006","journal-title":"OASIS Standard"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.030"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.3"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2016.7457097"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-011-0112-x"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICIECS.2010.5678388"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2014.280"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2014.88"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2541171"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40316-3_4"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2387155"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5\/8789751\/08733059.pdf?arnumber=8733059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:58:45Z","timestamp":1657745925000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8733059\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":68,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2019.2917314","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"type":"print","value":"0018-9219"},{"type":"electronic","value":"1558-2256"}],"subject":[],"published":{"date-parts":[[2019,8]]}}}