{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:33:43Z","timestamp":1772724823130,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014172899"],"award-info":[{"award-number":["N00014172899"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-23-C-0274"],"award-info":[{"award-number":["H98230-23-C-0274"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-2144860"],"award-info":[{"award-number":["CCF-2144860"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,15]]},"DOI":"10.1145\/3643915.3644090","type":"proceedings-article","created":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T14:11:05Z","timestamp":1717769465000},"page":"122-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Integrating Graceful Degradation and Recovery through Requirement-driven Adaptation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3976-0528","authenticated-orcid":false,"given":"Simon","family":"Chu","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5052-959X","authenticated-orcid":false,"given":"Justin","family":"Koe","sequence":"additional","affiliation":[{"name":"The Cooper Union, New York, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6735-8301","authenticated-orcid":false,"given":"David","family":"Garlan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7891-6885","authenticated-orcid":false,"given":"Eunsuk","family":"Kang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2016.7733561"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2015.10"},{"key":"e_1_3_2_1_3_1","volume-title":"Parametric Identification of Temporal Properties","author":"Asarin Eugene","unstructured":"Eugene Asarin, Alexandre Donz\u00e9, Oded Maler, and Dejan Nickovic. 2012. Parametric Identification of Temporal Properties. In Runtime Verification, Sarfraz Khurshid and Koushik Sen (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 147--160."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2019.00019"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SysEng.2016.7753185"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS59076.2023.00012"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC51059.2022.9992914"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s00165-020-00519-y","article-title":"A Weakness Measure for GR(1) Formulae","volume":"33","author":"Cavezza Davide G.","year":"2018","unstructured":"Davide G. Cavezza, Dalal Alrajeh, and Andr\u00e1s Gy\u00f6rgy. 2018. A Weakness Measure for GR(1) Formulae. Formal Aspects of Computing 33 (2018), 27 -- 63. https:\/\/api.semanticscholar.org\/CorpusID:13688783","journal-title":"Formal Aspects of Computing"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Hongkai Chen Scott A. Smolka Nicola Paoletti and Shan Lin. 2022. An STL-based Approach to Resilient Control for Cyber-Physical Systems. 10.48550\/ARXIV.2211.02794","DOI":"10.48550\/ARXIV.2211.02794"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS59076.2023.00025"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Frank Ciesinski and Marcus Gr\u00f6\u00dfer. 2004. On Probabilistic Computation Tree Logic. In Validation of Stochastic Systems. https:\/\/api.semanticscholar.org\/CorpusID:30548386","DOI":"10.1007\/978-3-540-24611-4_5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568264"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.06.021"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/964442.964469"},{"key":"e_1_3_2_1_15_1","volume-title":"International Symposium for ICS & SCADA Cyber Security Research. https:\/\/api.semanticscholar.org\/CorpusID:8835415","author":"Friedberg Ivo","year":"2016","unstructured":"Ivo Friedberg, Kieran Mclaughlin, Paul Smith, and Markus Wurzenberger. 2016. Towards a Resilience Metric Framework for Cyber-Physical Systems. In International Symposium for ICS & SCADA Cyber Security Research. https:\/\/api.semanticscholar.org\/CorpusID:8835415"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407183"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00011"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS59076.2023.00027"},{"key":"e_1_3_2_1_19_1","volume-title":"Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems","author":"Maler Oded","unstructured":"Oded Maler and Dejan Nickovic. 2004. Monitoring Temporal Properties of Continuous Signals. In Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems, Yassine Lakhnech and Sergio Yovine (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 152--166."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2021.713083"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1771668.1771709"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2349498"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"e_1_3_2_1_24_1","unstructured":"J.B. Rawlings and D.Q. Mayne. 2009. Model Predictive Control: Theory and Design. Nob Hill Pub."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-40923-3_13"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/09720510.2017.1395182"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10832-7_3"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/582128.582152"},{"key":"e_1_3_2_1_29_1","volume-title":"Ilias Gerostathopoulos, Einar Broch Johnsen, and Carlos Hern\u00e1ndez Corbato.","author":"Silva Gustavo Rezende","year":"2023","unstructured":"Gustavo Rezende Silva, Juliane P\u00e4\u00dfler, Jeroen Zwanepol, Elvin Alberts, S. Lizeth Tapia Tarifa, Ilias Gerostathopoulos, Einar Broch Johnsen, and Carlos Hern\u00e1ndez Corbato. 2023. SUAVE: An Exemplar for Self-Adaptive Underwater Vehicles. arXiv:2303.09220 [cs.RO]"},{"key":"e_1_3_2_1_30_1","volume-title":"IEEE International Conference on Requirements Engineering. 113--124","author":"Tun Thein Than","year":"2021","unstructured":"Thein Than Tun, Amel Bennaceur, and Bashar Nuseibeh. 2021. OASIS: Weakening user obligations for security-critical systems. In IEEE International Conference on Requirements Engineering. 113--124."},{"key":"e_1_3_2_1_31_1","unstructured":"Priya Venkitakrishnan. 2002. Rollback and Recovery Mechanisms In Distributed Systems. https:\/\/api.semanticscholar.org\/CorpusID:15179795"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0101-0"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524844.3528063"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCASIT50869.2020.9368667"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3513091"}],"event":{"name":"SEAMS '24: 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems","location":"Lisbon AA Portugal","acronym":"SEAMS '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643915.3644090","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643915.3644090","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:57:35Z","timestamp":1750291055000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643915.3644090"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,15]]},"references-count":35,"alternative-id":["10.1145\/3643915.3644090","10.1145\/3643915"],"URL":"https:\/\/doi.org\/10.1145\/3643915.3644090","relation":{},"subject":[],"published":{"date-parts":[[2024,4,15]]},"assertion":[{"value":"2024-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}