{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T06:39:54Z","timestamp":1768977594026,"version":"3.49.0"},"reference-count":163,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2017,2,3]],"date-time":"2017-02-03T00:00:00Z","timestamp":1486080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Auton. Adapt. Syst."],"published-print":{"date-parts":[[2017,2,3]]},"abstract":"<jats:p>The pervasiveness and growing complexity of software systems are challenging software engineering to design systems that can adapt their behavior to withstand unpredictable, uncertain, and continuously changing execution environments. Control theoretical adaptation mechanisms have received growing interest from the software engineering community in the last few years for their mathematical grounding, allowing formal guarantees on the behavior of the controlled systems. However, most of these mechanisms are tailored to specific applications and can hardly be generalized into broadly applicable software design and development processes.<\/jats:p><jats:p>This article discusses a reference control design process, from goal identification to the verification and validation of the controlled system. A taxonomy of the main control strategies is introduced, analyzing their applicability to software adaptation for both functional and nonfunctional goals. A brief extract on how to deal with uncertainty complements the discussion. Finally, the article highlights a set of open challenges, both for the software engineering and the control theory research communities.<\/jats:p>","DOI":"10.1145\/3024188","type":"journal-article","created":{"date-parts":[[2017,2,3]],"date-time":"2017-02-03T14:52:35Z","timestamp":1486133555000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Control Strategies for Self-Adaptive Software Systems"],"prefix":"10.1145","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9646-646X","authenticated-orcid":false,"given":"Antonio","family":"Filieri","sequence":"first","affiliation":[{"name":"Imperial College London, UK"}]},{"given":"Martina","family":"Maggio","sequence":"additional","affiliation":[{"name":"Lund University, SE"}]},{"given":"Konstantinos","family":"Angelopoulos","sequence":"additional","affiliation":[]},{"given":"Nicol\u00e1s","family":"D\u2019ippolito","sequence":"additional","affiliation":[]},{"given":"Ilias","family":"Gerostathopoulos","sequence":"additional","affiliation":[]},{"given":"Andreas Berndt","family":"Hempel","sequence":"additional","affiliation":[]},{"given":"Henry","family":"Hoffmann","sequence":"additional","affiliation":[]},{"given":"Pooyan","family":"Jamshidi","sequence":"additional","affiliation":[]},{"given":"Evangelia","family":"Kalyvianaki","sequence":"additional","affiliation":[]},{"given":"Cristian","family":"Klein","sequence":"additional","affiliation":[]},{"given":"Filip","family":"Krikava","sequence":"additional","affiliation":[]},{"given":"Sasa","family":"Misailovic","sequence":"additional","affiliation":[]},{"given":"Alessandro V.","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Suprio","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Amir M.","family":"Sharifloo","sequence":"additional","affiliation":[]},{"given":"Stepan","family":"Shevtsov","sequence":"additional","affiliation":[]},{"given":"Mateusz","family":"Ujma","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Vogel","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2017,2,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2019136.2019177"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-79361-0_7"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.10.001"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038642.2038685"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/1022026"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74358-3_9"},{"key":"e_1_2_1_7_1","unstructured":"K. \u00c5str\u00f6m and T. H\u00e4gglund. 2006. Advanced PID Control. ISA-The Instrumentation Systems and Automation Society Research Triangle Park NC. K. \u00c5str\u00f6m and T. H\u00e4gglund. 2006. Advanced PID Control. ISA-The Instrumentation Systems and Automation Society Research Triangle Park NC."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400828739"},{"key":"e_1_2_1_9_1","unstructured":"K. \u00c5str\u00f6m and B. Wittenmark. 2013. Adaptive Control. Dover Publications. K. \u00c5str\u00f6m and B. Wittenmark. 2013. Adaptive Control. Dover Publications."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806620"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 3rd International Conference on Theoretical Computer Science (IFIP\/TCS). Springer, 493--506","author":"Baier C."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.9"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.362"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11494713_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0109870"},{"key":"e_1_2_1_16_1","volume-title":"Companion Proceedings of the 36th International Conference on Software Engineering. ACM, 460--463","author":"Bencomo N."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_3"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.52229"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2804337.2804339"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70583-3_13"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2362755"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68951-5"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02161-9_3"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(02)00108-8"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330686"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2010.5472664"},{"key":"e_1_2_1_27_1","unstructured":"E. Camacho and C. Alba. 2013. Model Predictive Control. Springer London. E. Camacho and C. Alba. 2013. Model Predictive Control. Springer London."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/LADC.2013.17"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS\u201915)","author":"C\u00e1mara J."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10957-010-9754-6"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2009.07.001"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699430"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45220-1_11"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the 15th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA\u201904)","author":"Chatterjee K."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78499-9_22"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2013.01.004"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"B. Cheng R. Lemos H. Giese P. Inverardi J. Magee J. Andersson B. Becker N. Bencomo Y. Brun B. Cukic G. Marzo Serugendo S. Dustdar A. Finkelstein C. Gacek K. Geihs V. Grassi G. Karsai H. Kienle J. Kramer M. Litoiu S. R. Mirandola H. M\u00fcller S. Park M. Shaw M. Tichy M. Tivoli D. Weyns and J. Whittle. 2009. Software engineering for self-adaptive systems. In Software Engineering for Self-Adaptive Systems. Springer-Verlag Berlin 1--26. B. Cheng R. Lemos H. Giese P. Inverardi J. Magee J. Andersson B. Becker N. Bencomo Y. Brun B. Cukic G. Marzo Serugendo S. Dustdar A. Finkelstein C. Gacek K. Geihs V. Grassi G. Karsai H. Kienle J. Kramer M. Litoiu S. R. Mirandola H. M\u00fcller S. Park M. Shaw M. Tichy M. Tivoli D. Weyns and J. Whittle. 2009. Software engineering for self-adaptive systems. In Software Engineering for Self-Adaptive Systems. Springer-Verlag Berlin 1--26.","DOI":"10.1007\/978-3-642-02161-9_1"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the International Workshop on Living with Uncertainties (IWLU\u201907)","author":"Cheng S.-W."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35632-2_27"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535874"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/582128.582133"},{"key":"e_1_2_1_42_1","volume-title":"PROPhESY: A PRObabilistic ParamEter SYnthesis Tool","author":"Dehnert C."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10626-013-0163-5"},{"key":"e_1_2_1_44_1","volume-title":"ECBS Workshop. 441--448","author":"Diao Y."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.857206"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591113"},{"key":"e_1_2_1_47_1","doi-asserted-by":"crossref","unstructured":"N. D\u2019ippolito V. Braberman N. Piterman and S. Uchitel. 2013. Synthesising non-anomalous event-based controllers for liveness goals. ACM Tranactions on Software Engineering Methodologies 22 Article 9 (2013) 36 pages. N. D\u2019ippolito V. Braberman N. Piterman and S. Uchitel. 2013. Synthesising non-anomalous event-based controllers for liveness goals. ACM Tranactions on Software Engineering Methodologies 22 Article 9 (2013) 36 pages.","DOI":"10.1145\/2430536.2430543"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882305"},{"key":"e_1_2_1_49_1","unstructured":"R. Dorf and R. Bishop. 2008. Modern Control Systems. Prentice Hall. R. Dorf and R. Bishop. 2008. Modern Control Systems. Prentice Hall."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254066"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2002.805829"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070513"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025147"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35813-5_9"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4054-9"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100064"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985840"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568272"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786833"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2015.12"},{"key":"e_1_2_1_61_1","volume-title":"Refactoring: Improving the Design of Existing Code","author":"Fowler M.","year":"1999"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-006-0031-0"},{"key":"e_1_2_1_63_1","doi-asserted-by":"crossref","unstructured":"S. Gao S. Kong and E. Clarke. 2013. Satisfiability modulo ODEs. In Formal Methods in Computer-Aided Design (FMCAD\u201913). 105--112. S. Gao S. Kong and E. Clarke. 2013. Satisfiability modulo ODEs. In Formal Methods in Computer-Aided Design (FMCAD\u201913). 105--112.","DOI":"10.1109\/FMCAD.2013.6679398"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.175"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.175"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08915-7_3"},{"key":"e_1_2_1_67_1","doi-asserted-by":"crossref","unstructured":"R. Goebel R. Sanfelice and A. Teel. 2012. Hybrid Dynamical Systems: Modeling Stability and Robustness. Princeton University Press. R. Goebel R. Sanfelice and A. Teel. 2012. Hybrid Dynamical Systems: Modeling Stability and Robustness. Princeton University Press.","DOI":"10.23943\/princeton\/9780691153896.001.0001"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/23307706.2014.913837"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038938"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-501-9"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_56"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593929.2600116"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2013.2271791"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2012.6425820"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207170701506919"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555228.1555254"},{"key":"e_1_2_1_77_1","doi-asserted-by":"crossref","unstructured":"J. L. Hellerstein Y. Diao S. Parekh and D. M. Tilbury. 2004. Feedback Control of Computing Systems. John Wiley 8 Sons. J. L. Hellerstein Y. Diao S. Parekh and D. M. Tilbury. 2004. Feedback Control of Computing Systems. John Wiley 8 Sons.","DOI":"10.1002\/047166880X"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1710115.1710123"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-63166-6_48"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1998.1581"},{"key":"e_1_2_1_81_1","unstructured":"H. Hermes and J. P. Lasalle. 1969. Functional Analysis and Time Optimal Control. Elsevier Science. H. Hermes and J. P. Lasalle. 1969. Functional Analysis and Time Optimal Control. Elsevier Science."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2014.32"},{"key":"e_1_2_1_83_1","volume-title":"Proceedings of the 25th International Symposium on Operating Systems (SOSP\u201915)","author":"Hoffmann H.","year":"2015"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950390"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39800-4_6"},{"key":"e_1_2_1_86_1","volume-title":"DSVerifier: A Bounded Model Checking Tool for Digital Systems","author":"Ismail H. I."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593929.2593940"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/QoSA.2016.13"},{"key":"e_1_2_1_89_1","volume-title":"Foundations of Fuzzy Control: A Practical Approach","author":"Jantzen J."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194014500090"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECC.2014.6862630"},{"key":"e_1_2_1_93_1","unstructured":"H. Khalil. 2015. Nonlinear Control. Pearson Education. H. Khalil. 2015. Nonlinear Control. Pearson Education."},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568227"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462187"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/581630.581678"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.19"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2555020"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.5555\/40665"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02444-8_2"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1367-5788(97)00019-9"},{"key":"e_1_2_1_102_1","first-page":"9","article-title":"Autonomic provisioning with self-adaptive neural fuzzy control for percentile-based delay guarantee","volume":"8","author":"Lama P.","year":"2013","journal-title":"Transactions on Autonomous and Adaptive Systems (TAAS)"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45627-9_7"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568239"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1049\/PBCE089E"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2013.07.010"},{"key":"e_1_2_1_107_1","volume-title":"The Control Systems Handbook: Control System Advanced Methods","author":"Levine W.","edition":"2"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0017-8"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2004.824310"},{"key":"e_1_2_1_110_1","volume-title":"System Identification: Theory for the User","author":"Ljung L.","edition":"2"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807930"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2009.10.035"},{"key":"e_1_2_1_113_1","volume-title":"Predictive Control: With Constraints. Pearson Education.","author":"Maciejowski J.","year":"2002"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382570.2382572"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884797"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470599655"},{"key":"e_1_2_1_117_1","unstructured":"M. Morari and E. Zafiriou. 1989. Robust Process Control. Prentice Hall Englewood Cliffs NJ. M. Morari and E. Zafiriou. 1989. Robust Process Control. Prentice Hall Englewood Cliffs NJ."},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370700.1370707"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47666-6_2"},{"key":"e_1_2_1_120_1","volume-title":"Proceedings of the 12th International Conference on Generative Programming: Concepts 8 Experiences. 10","author":"Ofenbeck G."},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.769885"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1080\/13873954.2014.942785"},{"key":"e_1_2_1_123_1","article-title":"PEAS: A performance evaluation framework for auto-scaling strategies in cloud applications","volume":"1","author":"Papadopoulos A. V.","year":"2016","journal-title":"ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS)"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015350520175"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2012.6224389"},{"key":"e_1_2_1_127_1","volume-title":"Lecture Notes in Computer Science","volume":"3855","author":"Piterman N."},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/75277.75293"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.5555\/2958031.2958115"},{"key":"e_1_2_1_131_1","volume-title":"Markov Decision Processes: Discrete Stochastic Dynamic Programming","author":"Puterman M. L."},{"key":"e_1_2_1_132_1","volume-title":"2014 IEEE 22nd International Requirements Engineering Conference (RE\u201914)","author":"Qian W."},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.21072"},{"key":"e_1_2_1_135_1","volume-title":"Relaxing Claims: Coping with Uncertainty While Evaluating Assumptions at Run Time","author":"Ramirez A. J.","year":"2012"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2012.6224396"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS.2011.5931341"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868294.1868314"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516533.1516538"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541948"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2003.1200245"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2009.02.003"},{"key":"e_1_2_1_143_1","unstructured":"S. Skogestad and I. Postlethwaite. 2007. Multivariable Feedback Control: Analysis and Design. Vol. 2. Wiley. S. Skogestad and I. Postlethwaite. 2007. Multivariable Feedback Control: Analysis and Design. Vol. 2. Wiley."},{"key":"e_1_2_1_144_1","unstructured":"V. E. S. Souza A. Lapouchnian and J. Mylopoulos. 2011. System identification for adaptive software systems: A requirements engineering perspective. In Conceptual Modeling (ER\u201911). Vol. 6998. V. E. S. Souza A. Lapouchnian and J. Mylopoulos. 2011. System identification for adaptive software systems: A requirements engineering perspective. In Conceptual Modeling (ER\u201911). Vol. 6998."},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2003.1213600"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSSE.2008.1219"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2007.904277"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2007.21"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.66"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1145\/1988008.1988020"},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1145\/2555612"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2258165"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2015.41"},{"key":"e_1_2_1_154_1","volume-title":"Proceedings of the IEEE 15th Annual Joint Conference of the IEEE Computer Societies, Networking the Next Generation (INFOCOM\u201996)","volume":"1","author":"Wang W.-P."},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/151299.151326"},{"key":"e_1_2_1_156_1","volume-title":"Computer Control: An Overview. Technical Report.","author":"Wittenmark B.","year":"2002"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2007.28"},{"key":"e_1_2_1_158_1","unstructured":"R. Yager and L. Zadeh. 2012. An Introduction to Fuzzy Logic Applications in Intelligent Systems. Springer. R. Yager and L. Zadeh. 2012. An Introduction to Fuzzy Logic Applications in Intelligent Systems. Springer."},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cta:20050178"},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39721-9_5"},{"key":"e_1_2_1_161_1","first-page":"2015","article-title":"Understanding Uncertainty in Cyber-Physical Systems","author":"Zhang M.","year":"2016","journal-title":"A Conceptual Model. Technical Report. Simula Research Laboratory"},{"key":"e_1_2_1_162_1","unstructured":"K. Zhou J. C. Doyle and K. Glover. 1996. Robust and Optimal Control. Prentice-Hall Upper Saddle River NJ. K. Zhou J. C. Doyle and K. Glover. 1996. Robust and Optimal Control. Prentice-Hall Upper Saddle River NJ."},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1145\/1496909.1496922"},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755952.1755987"}],"container-title":["ACM Transactions on Autonomous and Adaptive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3024188","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3024188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:03Z","timestamp":1750273503000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3024188"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,3]]},"references-count":163,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,2,3]]}},"alternative-id":["10.1145\/3024188"],"URL":"https:\/\/doi.org\/10.1145\/3024188","relation":{},"ISSN":["1556-4665","1556-4703"],"issn-type":[{"value":"1556-4665","type":"print"},{"value":"1556-4703","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,3]]},"assertion":[{"value":"2015-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-02-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}