{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:46:55Z","timestamp":1750308415217,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,2]],"date-time":"2018-06-02T00:00:00Z","timestamp":1527897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Science Foundation Ireland","award":["13\/RC\/2094"],"award-info":[{"award-number":["13\/RC\/2094"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,2]]},"DOI":"10.1145\/3193992.3194001","type":"proceedings-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T13:05:12Z","timestamp":1532005512000},"page":"64-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Self-adaptive automata"],"prefix":"10.1145","author":[{"given":"Aimee","family":"Borda","sequence":"first","affiliation":[{"name":"Trinity College Dublin, Dublin, Ireland"}]},{"given":"Vasileios","family":"Koutavas","sequence":"additional","affiliation":[{"name":"Trinity College Dublin, Dublin, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2018,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.09.008"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.09.008"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35362-8_22"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1988008.1988030"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlamp.2017.02.007"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022067.2022073"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.11.043"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381823"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2013.33"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2009.5069082"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Model Checking Adaptive Software with Featured Transition Systems","author":"Cordy Maxime","year":"2013","unstructured":"Maxime Cordy , Andreas Classen , Patrick Heymans , Axel Legay , and Pierre-Yves Schobbens . Model Checking Adaptive Software with Featured Transition Systems . pages 1 -- 29 . Springer Berlin Heidelberg , 2013 . Maxime Cordy, Andreas Classen, Patrick Heymans, Axel Legay, and Pierre-Yves Schobbens. Model Checking Adaptive Software with Featured Transition Systems. pages 1--29. Springer Berlin Heidelberg, 2013."},{"key":"e_1_3_2_1_12_1","first-page":"143","volume-title":"Liveness and Run-Time Refinement for Modular Process-Aware Information Systems with Dynamic Sub Processes","author":"Debois S\u00f8ren","year":"2015","unstructured":"S\u00f8ren Debois , Thomas Hildebrandt , and Tijs Slaats . Safety , Liveness and Run-Time Refinement for Modular Process-Aware Information Systems with Dynamic Sub Processes , pages 143 -- 160 . Springer International Publishing , Cham , 2015 . S\u00f8ren Debois, Thomas Hildebrandt, and Tijs Slaats. Safety, Liveness and Run-Time Refinement for Modular Process-Aware Information Systems with Dynamic Sub Processes, pages 143--160. Springer International Publishing, Cham, 2015."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2433892"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.175"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2823345"},{"key":"e_1_3_2_1_16_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/978-3-642-54862-8_13","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"Gibson-Robinson Thomas","year":"2014","unstructured":"Thomas Gibson-Robinson , Philip Armstrong , Alexandre Boulgakov , and A.W. Roscoe . FDR3 --- A Modern Refinement Checker for CSP . In Erika Abraham and Klaus Havelund, editors, Tools and Algorithms for the Construction and Analysis of Systems , volume 8413 of Lecture Notes in Computer Science , pages 187 -- 201 , 2014 . Thomas Gibson-Robinson, Philip Armstrong, Alexandre Boulgakov, and A.W. Roscoe. FDR3 --- A Modern Refinement Checker for CSP. In Erika Abraham and Klaus Havelund, editors, Tools and Algorithms for the Construction and Analysis of Systems, volume 8413 of Lecture Notes in Computer Science, pages 187--201, 2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87875-9_40"},{"key":"e_1_3_2_1_18_1","first-page":"157","volume-title":"Refinement-Based Modelling and Verification of Design Patterns for Self-adaptive Systems","author":"G\u00f6thel Thomas","year":"2017","unstructured":"Thomas G\u00f6thel , Nils J\u00e4hnig , and Simon Seif . Refinement-Based Modelling and Verification of Design Patterns for Self-adaptive Systems , pages 157 -- 173 . Springer International Publishing , Cham , 2017 . Thomas G\u00f6thel, Nils J\u00e4hnig, and Simon Seif. Refinement-Based Modelling and Verification of Design Patterns for Self-adaptive Systems, pages 157--173. Springer International Publishing, Cham, 2017."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2016.7844853"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809036.1809042"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/359576.359585"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"e_1_3_2_1_23_1","volume-title":"A case study on formal verification of self-adaptive behaviors in a decentralized system. arXiv preprint arXiv:1208.4635","author":"Usman Iftikhar M","year":"2012","unstructured":"M Usman Iftikhar and Danny Weyns . A case study on formal verification of self-adaptive behaviors in a decentralized system. arXiv preprint arXiv:1208.4635 , 2012 . M Usman Iftikhar and Danny Weyns. A case study on formal verification of self-adaptive behaviors in a decentralized system. arXiv preprint arXiv:1208.4635, 2012."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593929.2593944"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2011.09.004"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2015.32"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45234-9_23"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.033"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.48"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2015.03.004"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1540607"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393618"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(95)00157-8"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2010.09.001"},{"key":"e_1_3_2_1_37_1","article-title":"On the Interplay Between Cyber and Physical Spaces for Adaptive Security","author":"Tsigkanos Christos","year":"2017","unstructured":"Christos Tsigkanos , Liliana Pasquale , Carlo Ghezzi , and Bashar Nuseibeh . On the Interplay Between Cyber and Physical Spaces for Adaptive Security . IEEE Transactions on Dependable and Secure Computing, PP(99) , 2017 . Christos Tsigkanos, Liliana Pasquale, Carlo Ghezzi, and Bashar Nuseibeh. On the Interplay Between Cyber and Physical Spaces for Adaptive Security. IEEE Transactions on Dependable and Secure Computing, PP(99), 2017.","journal-title":"IEEE Transactions on Dependable and Secure Computing, PP(99)"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134337"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.02.008"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/EASe.2011.13"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Gothenburg Sweden","acronym":"ICSE '18"},"container-title":["Proceedings of the 6th Conference on Formal Methods in Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193992.3194001","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3193992.3194001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:15Z","timestamp":1750268955000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3193992.3194001"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,2]]},"references-count":39,"alternative-id":["10.1145\/3193992.3194001","10.1145\/3193992"],"URL":"https:\/\/doi.org\/10.1145\/3193992.3194001","relation":{},"subject":[],"published":{"date-parts":[[2018,6,2]]},"assertion":[{"value":"2018-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}