{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T13:46:54Z","timestamp":1773668814181,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,11,7]],"date-time":"2010-11-07T00:00:00Z","timestamp":1289088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,11,7]]},"DOI":"10.1145\/1882291.1882328","type":"proceedings-article","created":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T14:38:38Z","timestamp":1289572718000},"page":"247-256","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Guided recovery for web service applications"],"prefix":"10.1145","author":[{"given":"Jocelyn","family":"Simmonds","sequence":"first","affiliation":[{"name":"University of Toronto, Toronto, ON, Canada"}]},{"given":"Shoham","family":"Ben-David","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, ON, Canada"}]},{"given":"Marsha","family":"Chechik","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2010,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138953.1138959"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSECOMPANION.2007.31"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of ICAPS'09","author":"Bertoli P.","year":"2009","unstructured":"P. Bertoli , R. Kazhamiakin , M. Paolucci , M. Pistore , H. Raik , and M. Wagner . Continuous Orchestration of Web Services via Planning . In Proc. of ICAPS'09 , 2009 . P. Bertoli, R. Kazhamiakin, M. Paolucci, M. Pistore, H. Raik, and M. Wagner. Continuous Orchestration of Web Services via Planning. In Proc. of ICAPS'09, 2009."},{"issue":"1","key":"e_1_3_2_1_4_1","first-page":"166","volume":"1","author":"Bozga M.","year":"1997","unstructured":"M. Bozga , J.-C. Fernandez , A. Kerbrat , and L. Mounier . Protocol Verification with the ALD\u00c9BARAN Toolset. STTT , 1 ( 1-2 ): 166 -- 184 , 1997 . M. Bozga, J.-C. Fernandez, A. Kerbrat, and L. Mounier. Protocol Verification with the ALD\u00c9BARAN Toolset. STTT, 1(1-2):166--184, 1997.","journal-title":"Protocol Verification with the ALD\u00c9BARAN Toolset. STTT"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WWV.2006.10"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-008-0088-8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUROMICRO.2006.63"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622876.1622939"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287657"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134408"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988756"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of SMR'06","author":"Fugini M.","year":"2006","unstructured":"M. Fugini and E. Mussi . Recovery of Faulty Web Applications through Service Discovery . In Proc. of SMR'06 , 2006 . M. Fugini and E. Mussi. Recovery of Faulty Web Applications through Service Discovery. In Proc. of SMR'06, 2006."},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"Proc. of ECP'99","author":"Giunchiglia F.","year":"1999","unstructured":"F. Giunchiglia and P. Traverso . Planning as Model Checking . In Proc. of ECP'99 , pages 1 -- 20 , 1999 . F. Giunchiglia and P. Traverso. Planning as Model Checking. In Proc. of ECP'99, pages 1--20, 1999."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSD.2005.31"},{"key":"e_1_3_2_1_16_1","volume-title":"Testing Linear Temporal Logic Formulae on Finite Execution Traces. Technical report","author":"Havelund K.","year":"2001","unstructured":"K. Havelund and G. Rosu . Testing Linear Temporal Logic Formulae on Finite Execution Traces. Technical report , 2001 . K. Havelund and G. Rosu. Testing Linear Temporal Logic Formulae on Finite Execution Traces. Technical report, 2001."},{"key":"e_1_3_2_1_17_1","series-title":"LNCS","first-page":"220","volume-title":"Proc. of BPM'05","author":"Hinz S.","year":"2005","unstructured":"S. Hinz , K. Schmidt , and C. Stahl . Transforming BPEL to Petri Nets . In Proc. of BPM'05 , volume 3649 of LNCS , pages 220 -- 235 , 2005 . 10.1007\/11538394_15 S. Hinz, K. Schmidt, and C. Stahl. Transforming BPEL to Petri Nets. In Proc. of BPM'05, volume 3649 of LNCS, pages 220--235, 2005. 10.1007\/11538394_15"},{"key":"e_1_3_2_1_18_1","first-page":"318","volume-title":"Proceedings of IJCAI'99","author":"Kautz H. A.","year":"1999","unstructured":"H. A. Kautz and B. Selman . Unifying SAT-based and Graph-based Planning . In Proceedings of IJCAI'99 , pages 318 -- 325 , 1999 . H. A. Kautz and B. Selman. Unifying SAT-based and Graph-based Planning. In Proceedings of IJCAI'99, pages 318--325, 1999."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.03.002"},{"key":"e_1_3_2_1_21_1","first-page":"1","volume-title":"LNCS","author":"Simmonds J.","year":"2010","unstructured":"J. Simmonds , S. Ben-David , and M. Chechik . Monitoring and Recovery of Web Service Applications. In Smart Internet , LNCS , pages 1 -- 35 . Springer , 2010 . To appear. J. Simmonds, S. Ben-David, and M. Chechik. Monitoring and Recovery of Web Service Applications. In Smart Internet, LNCS, pages 1--35. Springer, 2010. To appear."},{"key":"e_1_3_2_1_22_1","volume-title":"Optimizing Computation of Recovery Plans for BPEL Applications","author":"Simmonds J.","year":"2010","unstructured":"J. Simmonds , S. Ben-David , and M. Chechik . Optimizing Computation of Recovery Plans for BPEL Applications , 2010 . Submited . J. Simmonds, S. Ben-David, and M. Chechik. Optimizing Computation of Recovery Plans for BPEL Applications, 2010. Submited."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859068"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2009.16"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.07.003"}],"event":{"name":"SIGSOFT\/FSE'10: 18th ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Santa Fe New Mexico USA","acronym":"SIGSOFT\/FSE'10","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the eighteenth ACM SIGSOFT international symposium on Foundations of software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1882291.1882328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1882291.1882328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:29Z","timestamp":1750244369000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1882291.1882328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,7]]},"references-count":23,"alternative-id":["10.1145\/1882291.1882328","10.1145\/1882291"],"URL":"https:\/\/doi.org\/10.1145\/1882291.1882328","relation":{},"subject":[],"published":{"date-parts":[[2010,11,7]]},"assertion":[{"value":"2010-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}