{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T16:02:11Z","timestamp":1740153731968,"version":"3.37.3"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National High Technology Development 863 Program of China","award":["2015AA01A203"],"award-info":[{"award-number":["2015AA01A203"]}]},{"name":"National Research Foundation, Prime Minister&#x2019;s Office, Singapore"},{"name":"National Cybersecurity R&amp;D Program","award":["NRF2014NCR-NCR001-30"],"award-info":[{"award-number":["NRF2014NCR-NCR001-30"]}]},{"name":"National Cybersecurity R&amp;D Directorate"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2019,1,1]]},"DOI":"10.1109\/tsc.2016.2593459","type":"journal-article","created":{"date-parts":[[2016,7,20]],"date-time":"2016-07-20T18:18:24Z","timestamp":1469038704000},"page":"73-87","source":"Crossref","is-referenced-by-count":5,"title":["Architecture-Based Behavioral Adaptation with Generated Alternatives and Relaxed Constraints"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7238-7492","authenticated-orcid":false,"given":"Bihuan","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3376-2581","authenticated-orcid":false,"given":"Xin","family":"Peng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7300-9215","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Songzheng","family":"Song","sequence":"additional","affiliation":[]},{"given":"Jiahuan","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Wenyun","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985840"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-010-0146-x"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.29"},{"journal-title":"Practical Genetic Algorithms","year":"2004","author":"haupt","key":"ref32"},{"journal-title":"Nature-Inspired Metaheuristic Algorithms","year":"2010","author":"yang","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/9781118627372"},{"key":"ref37","first-page":"280","article-title":"Symbolic and parametric model checking of discrete-time Markov chains","author":"daws","year":"0","journal-title":"Proc 1st Int Conf Theoretical Aspects Comput"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2001.948416"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1998.671114"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-011-0207-2"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068189"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100064"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2013.6595494"},{"key":"ref28","first-page":"1","article-title":"Proactive self-adaptation under uncertainty: A probabilistic model checking approach","author":"moreno","year":"0","journal-title":"Proceedings of the Joint Meeting on Foundations of Software Engineering"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568048"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.04.079"},{"journal-title":"Business Analysis and Valuation","year":"2007","author":"palepu","key":"ref29"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.189"},{"key":"ref1","first-page":"1","article-title":"Software engineering for self-adaptive systems: A research roadmap","author":"cheng","year":"2009","journal-title":"Software Engineering for Self-Adaptive Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16901-4_26"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2007.6"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-642-02161-9_3","article-title":"Engineering self-adaptive systems through feedback loops","author":"brun","year":"2009","journal-title":"Software Engineering for Self-Adaptive Systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741114"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070513"},{"key":"ref26","first-page":"313","article-title":"Stronger semantics for low-latency geo-replicated storage","author":"lloyd","year":"0","journal-title":"Proc 10th USENIX Conf Networked Syst Des Implementation"},{"journal-title":"Principles of Model Checking","year":"2008","author":"baier","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345796"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2011.6051650"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330686"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.41"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21292-5_7"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2010.60"},{"key":"ref55","first-page":"468","article-title":"A goal-based modeling approach to develop requirements of an adaptive system with environmental uncertainty","author":"cheng","year":"0","journal-title":"Proceedings of the 12th International Conference on Model Driven Engineering Languages and Systems"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.25"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345794"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-015-0227-1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2298866"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070512"},{"key":"ref40","first-page":"314","article-title":"Incremental runtime verification of probabilistic systems","author":"forejt","year":"0","journal-title":"Proc 3rd Int Conf Runtime Verification"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.21"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1880050.1880056"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.21"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0101-0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/638750.638776"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2012.12"},{"key":"ref18","first-page":"709","article-title":"PAT: Towards flexible verification under fairness","author":"sun","year":"0","journal-title":"Proc 21st Int Conf Comput Aided Verification"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/258077.258078"},{"key":"ref4","first-page":"1","article-title":"Software engineering for self-adaptive systems: A second research roadmap","author":"lemos","year":"0","journal-title":"Proc Int Seminar Softw Eng Self-Adaptive Syst II"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-008-0032-x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882296"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.175"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.92"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595718"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.66"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606549"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568310"},{"key":"ref45","first-page":"688","article-title":"Hope for the best, prepare for the worst: Multi-tier control for adaptive systems","author":"braberman","year":"0","journal-title":"Proc 36th Int Conf Softw Eng"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02144-2_22"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5307-9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-013-5050-z"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02161-9_7"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070514"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.61"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/8635407\/07517402.pdf?arnumber=7517402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:54:13Z","timestamp":1657745653000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7517402\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,1]]},"references-count":64,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2016.2593459","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"type":"electronic","value":"1939-1374"},{"type":"electronic","value":"2372-0204"}],"subject":[],"published":{"date-parts":[[2019,1,1]]}}}