{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:56:11Z","timestamp":1725566171063},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642156427"},{"type":"electronic","value":"9783642156434"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15643-4_24","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T09:39:39Z","timestamp":1284975579000},"page":"325-340","source":"Crossref","is-referenced-by-count":5,"title":["Probabilistic Contracts for Component-Based Design"],"prefix":"10.1007","author":[{"given":"Dana N.","family":"Xu","sequence":"first","affiliation":[]},{"given":"Gregor","family":"G\u00f6ssler","sequence":"additional","affiliation":[]},{"given":"Alain","family":"Girault","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","volume-title":"Compilers \u2013 Principles, Techniques, and Tools","author":"A.V. Aho","year":"1986","unstructured":"Aho, A.V., Sethi, R., Ullman, J.D.: Compilers \u2013 Principles, Techniques, and Tools. Addison-Wesley, Reading (1986)"},{"doi-asserted-by":"crossref","unstructured":"Caillaud, B., Delahaye, B., Larsen, K.G., Legay, A., Pedersen, M., Wasowski, A.: Compositional design methodology with constraint markov chains. Research Report 6993, INRIA (2009)","key":"24_CR2","DOI":"10.1109\/QEST.2010.23"},{"unstructured":"Delahaye, B., Caillaud, B.: A model for probabilistic reasoning on assume\/guarantee contracts. Research Report 6719, INRIA (2008)","key":"24_CR3"},{"key":"24_CR4","first-page":"79","volume-title":"Proc. EMSOFT 2008","author":"L. Doyen","year":"2008","unstructured":"Doyen, L., Petrov, T., Henzinger, T.A., Jobstmann, B.: Interface theories with component reuse. In: Proc. EMSOFT 2008, pp. 79\u201388. ACM, New York (2008)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/11691617_5","volume-title":"Model Checking Software","author":"H. Fecher","year":"2006","unstructured":"Fecher, H., Leucker, M., Wolf, V.: Don\u2019t know in probabilistic systems. In: Valmari, A. (ed.) SPIN 2006. LNCS, vol.\u00a03925, pp. 71\u201388. Springer, Heidelberg (2006)"},{"key":"24_CR6","first-page":"295","volume-title":"Proc. SEFM 2009","author":"G. G\u00f6ssler","year":"2009","unstructured":"G\u00f6ssler, G., Raclet, J.-B.: Modal contracts for component-based design. In: Proc. SEFM 2009, pp. 295\u2013303. IEEE, Los Alamitos (2009)"},{"issue":"1-3","key":"24_CR7","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.scico.2004.05.014","volume":"55","author":"G. G\u00f6ssler","year":"2005","unstructured":"G\u00f6ssler, G., Sifakis, J.: Composition for component-based modeling. Science of Computer Programming\u00a055(1-3), 161\u2013183 (2005)","journal-title":"Science of Computer Programming"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/3-540-45804-2_4","volume-title":"Interactive Markov Chains: The Quest for Quantified Quality","author":"H. Hermanns","year":"2002","unstructured":"Hermanns, H.: Interactive Markov Chains: The Quest for Quantified Quality. LNCS, vol.\u00a02428, p. 57. Springer, Heidelberg (2002)"},{"key":"24_CR9","first-page":"266","volume-title":"LICS","author":"B. Jonsson","year":"1991","unstructured":"Jonsson, B., Larsen, K.G.: Specification and refinement of probabilistic processes. In: LICS, pp. 266\u2013277. IEEE Computer Society, Los Alamitos (1991)"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-04368-0_16","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"J.-P. Katoen","year":"2009","unstructured":"Katoen, J.-P., Klink, D., Neuh\u00e4u\u00dfer, M.R.: Compositional abstraction for stochastic systems. In: Ouaknine, J., Vaandrager, F.W. (eds.) FORMATS 2009. LNCS, vol.\u00a05813, pp. 195\u2013211. Springer, Heidelberg (2009)"},{"key":"24_CR11","first-page":"1","volume-title":"Advances in Object-Oriented Software Engineering","author":"B. Meyer","year":"1991","unstructured":"Meyer, B.: Design by Contract. In: Advances in Object-Oriented Software Engineering, pp. 1\u201350. Prentice Hall, Englewood Cliffs (1991)"},{"key":"24_CR12","volume-title":"Proc. ACSD 2009","author":"J.-B. Raclet","year":"2009","unstructured":"Raclet, J.-B., Badouel, E., Benveniste, A., Caillaud, B., Passerone, R.: Why modalities are good for interface theories? In: Proc. ACSD 2009. IEEE, Los Alamitos (2009)"},{"doi-asserted-by":"crossref","unstructured":"Ramadge, P.J., Wonham, W.M.: Supervisory control of a class of discrete event processes. SIAM J. Control and Optimization\u00a025(1) (1987)","key":"24_CR13","DOI":"10.1137\/0325013"},{"doi-asserted-by":"crossref","unstructured":"Xu, D.N., G\u00f6ssler, G., Girault, A.: Probabilistic contracts for component-based design. Research Report 7328, INRIA (2010)","key":"24_CR14","DOI":"10.1007\/978-3-642-15643-4_24"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1007\/3-540-58468-4_190","volume-title":"Formal Techniques in Real-Time and Fault-Tolerant Systems","author":"W. Yi","year":"1994","unstructured":"Yi, W.: Algebraic reasoning for real-time probabilistic processes with uncertain information. In: Langmaack, H., de Roever, W.-P., Vytopil, J. (eds.) FTRTFT 1994 and ProCoS 1994. LNCS, vol.\u00a0863, pp. 680\u2013693. Springer, Heidelberg (1994)"}],"container-title":["Lecture Notes in Computer Science","Automated Technology for Verification and Analysis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15643-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T18:58:23Z","timestamp":1558292303000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15643-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642156427","9783642156434"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15643-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}