{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T20:26:23Z","timestamp":1770236783618,"version":"3.49.0"},"reference-count":78,"publisher":"Association for Computing Machinery (ACM)","issue":"FSE","license":[{"start":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T00:00:00Z","timestamp":1720742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62025202, 61932021"],"award-info":[{"award-number":["62025202, 61932021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"The Leading-edge Technology Program of Jiangsu Natural Science Foundation","award":["BK20202001"],"award-info":[{"award-number":["BK20202001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. ACM Softw. Eng."],"published-print":{"date-parts":[[2024,7,12]]},"abstract":"<jats:p>Control-based self-adaptive systems (control-SAS) are susceptible to deviations from their pre-identified nominal models. If this model deviation exceeds a threshold, the optimal performance and theoretical guarantees of the control-SAS can be compromised. Existing approaches detect these deviations by locating the mismatch between the control signal of the managing system and the response output of the managed system. However, vague observations may mask a potential mismatch where the explicit system behavior does not reflect the implicit variation of the nominal model. In this paper, we propose the Active Monitoring Mechanism (AMM for short) as a solution to this issue. The basic intuition of AMM is to stimulate the control-SAS with an active control signal when vague observations might mask model deviations. To determine the appropriate time for triggering the active signals, AMM proposes a stochastic framework to quantify the relationship between the implicit variation of a control-SAS and its explicit observation. Based on this framework, AMM\u2019s monitor and remediator enhance model deviation detection by generating active control signals of well-designed timing and intensity. Results from empirical evaluations on three representative systems demonstrate AMM\u2019s effectiveness (33.0% shorter detection delay, 18.3% lower FN rate, 16.7% lower FP rate) and usefulness (19.3% lower abnormal rates and 88.2% higher utility).<\/jats:p>\n                  <jats:p>CCS Concepts: \u2212 Software and its engineering \u2192 Operational analysis.<\/jats:p>","DOI":"10.1145\/3660789","type":"journal-article","created":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T10:22:09Z","timestamp":1720779729000},"page":"1841-1864","source":"Crossref","is-referenced-by-count":2,"title":["Active Monitoring Mechanism for Control-Based Self-Adaptive Systems"],"prefix":"10.1145","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1643-0043","authenticated-orcid":false,"given":"Yi","family":"Qin","sequence":"first","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9263-1714","authenticated-orcid":false,"given":"Yanxiang","family":"Tong","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7737-4615","authenticated-orcid":false,"given":"Yifei","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3207-4059","authenticated-orcid":false,"given":"Chun","family":"Cao","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7970-1384","authenticated-orcid":false,"given":"Xiaoxing","family":"Ma","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,12]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.0710.3742"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100082"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2897053.2897054"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3105748"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/65.844498"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/233008.233034"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2011.6090413"},{"key":"e_1_3_1_9_2","article-title":"Secure water treatment testbed (SWaT): an overview","author":"Aung Kaung Myat","year":"2015","unstructured":"Kaung MyatAung. 2015. Secure water treatment testbed (SWaT): an overview. Singapore University of Technology and Design (2015).","journal-title":"Singapore University of Technology and Design"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2009.04.007"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7962986"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127402004152"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127406015209"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.2884864"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950328"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","unstructured":"MicheleBasseville and IgorNikiforov. 1993. Detection of abrupt changes: theory and application. Vol. 104. https:\/\/doi.org\/10.1016\/0005-1098(96)82332-6 10.1016\/0005-1098(96)82332-6","DOI":"10.1016\/0005-1098(96)82332-6"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2012.6224391"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2593929.2593933"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00015"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1730"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00019"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1214\/18-AOS1718"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00016"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2008.2007313"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00362-016-0863-7"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/1998582.1998628"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025147"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.3390\/w11061210"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568272"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786833"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2015.12"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/0040-9383(85)90002-3"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.175"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS51251.2021.00037"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2010.11.016"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","unstructured":"FredrikGustafsson and FredrikGustafsson. 2000. Adaptive filtering and change detection. Vol. 1. Citeseer. https:\/\/doi.org\/10.1002\/0470841613.ch5 10.1002\/0470841613.ch5","DOI":"10.1002\/0470841613.ch5"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1979.tb01072.x"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7525048"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2018.03.040"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","unstructured":"MichielHazewinkel and Jan CWillems. [n. d.]. Stochastic Systems: The Mathematics of Filtering and Identification and Applications. ([n. d.]). https:\/\/doi.org\/10.1007\/978-94-009-8546-9 10.1007\/978-94-009-8546-9","DOI":"10.1007\/978-94-009-8546-9"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00029"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","unstructured":"JosephHellerstein YixinDiao SujayParekh and DawnTilbury. 2004. Feedback control of computing systems. Wiley Online Library. https:\/\/doi.org\/10.1002\/047166880X 10.1002\/047166880X","DOI":"10.1002\/047166880X"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.1990.4790968"},{"key":"e_1_3_1_45_2","unstructured":"RolfIsermann. 2013. Digital control systems. Springer Science & Business Media."},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","unstructured":"MichaelJohnson and MohammadMoradi. 2005. PID control. Springer. https:\/\/doi.org\/10.1007\/1-84628-148-2_1 10.1007\/1-84628-148-2_1","DOI":"10.1007\/1-84628-148-2_1"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","unstructured":"J\u00fcrgenJost. 2005. Dynamical systems: examples of complex behaviour. Springer Science & Business Media. https:\/\/doi.org\/10.5860\/choice.43-3436 10.5860\/choice.43-3436","DOI":"10.5860\/choice.43-3436"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568227"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-009-8546-9_20"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2017.06.008"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-018-9437-3"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106247"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409685"},{"key":"e_1_3_1_54_2","unstructured":"DouglasMontgomery. 2020. Introduction to statistical quality control. John Wiley & Sons."},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786853"},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2017.2"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","unstructured":"Nhan TNguyen and Nhan TNguyen. 2018. Model-reference adaptive control. Springer. https:\/\/doi.org\/10.1007\/978-3-319-56393-0_5 10.1007\/978-3-319-56393-0_5","DOI":"10.1007\/978-3-319-56393-0_5"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.29"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.1994.10476030"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.11079042"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2933324"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2725955"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0208927"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1066"},{"key":"e_1_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICICET.2018.8533713"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2704579"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/2804337.2804338"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950301"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3328730"},{"key":"e_1_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-013-4915-5"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468548"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1080\/03610926.2011.608476"},{"key":"e_1_3_1_73_2","article-title":"A hybrid controller for safe and efficient longitudinal collision avoidance control","author":"Wang Qiang","year":"2022","unstructured":"QiangWang, XinleiZheng, JiyongZhang, and JosephSifakis. 2022. A hybrid controller for safe and efficient longitudinal collision avoidance control. Journal of Systems Architecture 125 (2022), 102432. https:\/\/doi.org\/10.1016\/j.sysarc.2022. 102432","journal-title":"Journal of Systems Architecture"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549136"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2015.27"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642999"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2017.02.002"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.2022.2054861"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/1496909.1496922"}],"container-title":["Proceedings of the ACM on Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660789","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T07:57:39Z","timestamp":1770191859000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660789"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,12]]},"references-count":78,"journal-issue":{"issue":"FSE","published-print":{"date-parts":[[2024,7,12]]}},"alternative-id":["10.1145\/3660789"],"URL":"https:\/\/doi.org\/10.1145\/3660789","relation":{},"ISSN":["2994-970X"],"issn-type":[{"value":"2994-970X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,12]]}}}