{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T14:52:51Z","timestamp":1772463171492,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1918140,CNS-1801546"],"award-info":[{"award-number":["CCF-1918140,CNS-1801546"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409753","type":"proceedings-article","created":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T06:03:47Z","timestamp":1604815427000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["A behavioral notion of robustness for software systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1689-6633","authenticated-orcid":false,"given":"Changjian","family":"Zhang","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"David","family":"Garlan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Eunsuk","family":"Kang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(85)90056-0"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781482289275"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.60"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2010.14"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIES.2011.5953660"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_14"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2017.06.006"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2009.5346067"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2256129"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2012.05.010"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2011.2109709"},{"key":"e_1_3_2_2_12_1","first-page":"274","volume-title":"11th International Conference, CAV '99, Trento, Italy, July 6-10, 1999","author":"Bruns G.","year":"1999"},{"key":"e_1_3_2_2_13_1","volume-title":"A survey of research into mixed criticality systems. ACM Comput. Surv., 50 ( 6 ):  82 : 1-82 : 37","author":"Burns A.","year":"2018"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-044450813-3\/50026-6"},{"key":"e_1_3_2_2_15_1","first-page":"331","volume-title":"Learning Assumptions for Compositional Verification. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems","author":"Cobleigh J. M.","year":"2003"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337290"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11430230_23"},{"key":"e_1_3_2_2_18_1","first-page":"374","volume":"32","author":"Fischer M. J.","year":"1985","journal-title":"Impossibility of distributed consensus with one faulty process. J. ACM"},{"key":"e_1_3_2_2_19_1","volume-title":"UK Programmable Networks and Telecommunications Workshop","author":"Giannakopoulou D.","year":"1998"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2002.1114984"},{"key":"e_1_3_2_2_21_1","first-page":"151","volume-title":"NDSS","volume":"8","author":"Godefroid P.","year":"2008"},{"key":"e_1_3_2_2_22_1","volume-title":"34th International Conference on Foundation of Software Technology and Theoretical Computer Science, FSTTCS 2014","author":"Henzinger T. A.","year":"2014"},{"key":"e_1_3_2_2_23_1","first-page":"250","volume-title":"VMCAI 2016, St. Petersburg, FL, USA, January 17-19, 2016. Proceedings","author":"Henzinger T. A.","year":"2016"},{"key":"e_1_3_2_2_24_1","volume-title":"Cognitive Reliability and Error Analysis Method (CREAM)","author":"Hollnagel E.","year":"1998"},{"key":"e_1_3_2_2_25_1","volume-title":"Introduction to automata theory, languages, and computation. Acm Sigact News, 32 ( 1 ):  60-65","author":"Hopcroft J. E.","year":"2001"},{"key":"e_1_3_2_2_26_1","first-page":"155","volume-title":"10th European Symposium on Programming, ESOP 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2001 Genova, Italy, April 2-6, 2001","author":"Huth M.","year":"2001"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882399"},{"key":"e_1_3_2_2_28_1","first-page":"321","volume-title":"Proceedings of the IFIP 9th World Computer Congress","author":"Jones C. B.","year":"1983"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.229904"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.1988.5119"},{"key":"e_1_3_2_2_32_1","first-page":"18","volume":"26","author":"Leveson N. G.","year":"1993","journal-title":"Investigation of the therac-25 accidents. IEEE Computer"},{"key":"e_1_3_2_2_33_1","volume-title":"State models and java programs. wiley Hoboken","author":"Magee J.","year":"1999"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35563-4_3"},{"key":"e_1_3_2_2_35_1","volume-title":"To engineer is human: The role of failure in successful design","author":"Petroski H.","year":"1985"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"e_1_3_2_2_37_1","volume-title":"a modelling problem. Safety Science, 27 ( 2 ): 183-213","author":"Rasmussen J.","year":"1997"},{"key":"e_1_3_2_2_38_1","volume-title":"Cambridge University Press","author":"Reason J.","year":"1990"},{"key":"e_1_3_2_2_39_1","volume-title":"A systematic review of software robustness. Information and Software Technology, 55 ( 1 ):  1-17","author":"Shahrokni A.","year":"2013"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380356.2380396"},{"key":"e_1_3_2_2_41_1","volume-title":"25th EACSL Annual Conference on Computer Science Logic, CSL 2016","author":"Tabuada P.","year":"2016"},{"key":"e_1_3_2_2_42_1","volume-title":"Cambridge University Press, 2 edition","author":"Tel G.","year":"2000"},{"key":"e_1_3_2_2_43_1","volume-title":"Essentials of Robust Control","author":"Zhou K.","year":"1998"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:57Z","timestamp":1750197717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":43,"alternative-id":["10.1145\/3368089.3409753","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409753","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}