{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T07:53:44Z","timestamp":1720166024747},"reference-count":114,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,2,1]],"date-time":"2017-02-01T00:00:00Z","timestamp":1485907200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1016\/j.jss.2016.08.095","type":"journal-article","created":{"date-parts":[[2016,9,12]],"date-time":"2016-09-12T19:25:53Z","timestamp":1473708353000},"page":"169-186","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":19,"special_numbering":"C","title":["Modern software cybernetics: New trends"],"prefix":"10.1016","volume":"124","author":[{"given":"Hongji","family":"Yang","sequence":"first","affiliation":[]},{"given":"Feng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Suleiman","family":"Aliyu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2016.08.095_bib0001","series-title":"ACM International Conference on Computer Science and Software Engineering","first-page":"67","article-title":"SimSOTA: engineering and simulating feedback loops for self-adaptive systems","author":"Abeywickrama","year":"2013"},{"key":"10.1016\/j.jss.2016.08.095_bib0002","series-title":"6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","first-page":"70","article-title":"Towards a framework for testing and simulating self-adaptive systems","author":"Abuseta","year":"2015"},{"key":"10.1016\/j.jss.2016.08.095_bib0003","series-title":"IEEE International Conference on Communications (ICC 2015)","first-page":"6074","article-title":"A network control application enabling software-defined quality of service","author":"Adami","year":"2015"},{"key":"10.1016\/j.jss.2016.08.095_bib0004","article-title":"Application of cybernetics and control theory for a new paradigm in cyber security","author":"Adams","year":"2013","journal-title":"CoRR"},{"key":"10.1016\/j.jss.2016.08.095_bib0005","series-title":"IEEE conference on Reliability and Maintainability Symposium (RAMS 2013)","first-page":"1","article-title":"Optimal software rejuvenation policies","author":"Agepati","year":"2013"},{"key":"10.1016\/j.jss.2016.08.095_bib0006","series-title":"IEEE International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT 2014)","first-page":"471","article-title":"Autonomic Computing: An emerging perspective and issues","author":"Ahuja","year":"2014"},{"key":"10.1016\/j.jss.2016.08.095_bib0007","series-title":"IEEE International Conference on Autonomic Computing (ICAC 2015)","first-page":"187","article-title":"Behavioural model-based control for autonomic software components","author":"Alvares","year":"2015"},{"key":"10.1016\/j.jss.2016.08.095_bib0008","series-title":"An Introduction to Cybernetics","author":"Ashby","year":"1956"},{"key":"10.1016\/j.jss.2016.08.095_bib0009","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.scico.2013.11.016","article-title":"The role of supervisory controller synthesis in automatic control software development","volume":"97","author":"Baeten","year":"2015","journal-title":"Sci. Comput. Programm."},{"key":"10.1016\/j.jss.2016.08.095_bib0010","series-title":"31st Annual IEEE International Computer Software and Applications Conference (COMPSAC 2007)","first-page":"233","article-title":"Adaptive web services testing","author":"Bai","year":"2007"},{"issue":"1","key":"10.1016\/j.jss.2016.08.095_bib0011","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MCS.2003.1172826","article-title":"Software-enabled control: an introduction to the special section","volume":"23","author":"Bay","year":"2003","journal-title":"IEEE Control Syst. Mag."},{"key":"10.1016\/j.jss.2016.08.095_bib0012","series-title":"NESSI Working Group: Networked European Software and Services Initiative","article-title":"Software engineering key enabler for innovation","author":"Bellavista","year":"2014"},{"issue":"11","key":"10.1016\/j.jss.2016.08.095_bib0013","doi-asserted-by":"crossref","first-page":"1483","DOI":"10.1016\/j.jss.2006.03.037","article-title":"Introduction to the special section on software cybernetics","volume":"79","author":"Belli","year":"2006","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2016.08.095_bib0014","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MC.1987.1663532","article-title":"No silver bullet: essence and accidents of software engineering","volume":"20","author":"Brooks","year":"1987","journal-title":"IEEE Comput."},{"key":"10.1016\/j.jss.2016.08.095_bib0015","series-title":"Software Engineering for Self-Adaptive Systems, Springer Berlin Heidelberg","first-page":"48","article-title":"Engineering self-adaptive systems through feedback loops","author":"Brun","year":"2009"},{"key":"10.1016\/j.jss.2016.08.095_bib0016","series-title":"Third International Conference on Emerging Applications of Information Technology (EAIT2012)","first-page":"3","article-title":"Autonomic cloud computing: open challenges and architectural elements","author":"Buyya","year":"2012"},{"issue":"14","key":"10.1016\/j.jss.2016.08.095_bib0017","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/S0950-5849(02)00108-8","article-title":"Optimal software testing and adaptive software testing in the context of software cybernetics","volume":"44","author":"Cai","year":"2002","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.jss.2016.08.095_bib0018","series-title":"7th IEEE International Symposium on High Assurance Systems Engineering (HASE\u201902)","first-page":"240","article-title":"Towards research on software cybernetics","author":"Cai","year":"2002"},{"key":"10.1016\/j.jss.2016.08.095_bib0019","series-title":"Eleventh Annual IEEE International Workshop on Software Technology and Engineering Practice","first-page":"77","article-title":"An overview of software cybernetics","author":"Cai","year":"2003"},{"key":"10.1016\/j.jss.2016.08.095_bib0021","series-title":"Fourth International Conference on Quality Software (QSIC 2004)","first-page":"198","article-title":"Towards a control-theoretical approach to software fault-tolerance","author":"Cai","year":"2004"},{"issue":"8","key":"10.1016\/j.jss.2016.08.095_bib0023","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1016\/j.jss.2006.11.008","article-title":"Adaptive software testing with fixed memory feedback","volume":"80","author":"Cai","year":"2007","journal-title":"J. Syst. Softw."},{"issue":"8","key":"10.1016\/j.jss.2016.08.095_bib0024","doi-asserted-by":"crossref","first-page":"1406","DOI":"10.1016\/j.jss.2007.11.721","article-title":"An experimental study of adaptive testing for software reliability assessment","volume":"81","author":"Cai","year":"2008","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2016.08.095_bib0025","series-title":"12th International Symposium on Software Reliability Engineering (ISSRE 2001)","first-page":"232","article-title":"Feedback control of the software test process through measurements of software reliability","author":"Cangussu","year":"2001"},{"issue":"5","key":"10.1016\/j.jss.2016.08.095_bib0026","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/TSE.2002.1027800","article-title":"A formal model of the software test process","volume":"28","author":"Cangussu","year":"2002","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2016.08.095_bib0028","doi-asserted-by":"crossref","DOI":"10.1002\/9780470050118.ecse707","article-title":"Software cybernetics","author":"Cangussu","year":"2007","journal-title":"Wiley Encyclopedia Comput. Sci. Eng."},{"key":"10.1016\/j.jss.2016.08.095_bib0029","series-title":"International Conference on Computational Intelligence and Software Engineering (CiSE 2009)","first-page":"1","article-title":"A risk control optimization model for software project","author":"Cao","year":"2009"},{"key":"10.1016\/j.jss.2016.08.095_bib0030","first-page":"1","article-title":"A Cybernetics social cloud","author":"Chang","year":"2015","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2016.08.095_bib0031","series-title":"International Conference on Intelligent Human-Machine Systems and Cybernetics, 2009 (IHMSC'09)","first-page":"274","article-title":"Cybernetics in software system verification","author":"Chen","year":"2009"},{"issue":"99","key":"10.1016\/j.jss.2016.08.095_bib0032","first-page":"1","article-title":"Recent development in big data analytics for business operations and risk management","author":"Choi","year":"2016","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.jss.2016.08.095_bib0033","series-title":"2nd International Symposium on Resilient Control Systems (ISRCS'09)","first-page":"19","article-title":"A lightweight software control system for cyber awareness and security","author":"Co","year":"2009"},{"key":"10.1016\/j.jss.2016.08.095_bib0034","series-title":"IEEE Third International Workshop on Software Aging and Rejuvenation (WoSAR 2011)","first-page":"1","article-title":"Software aging and rejuvenation: where we are and where we are going","author":"Cotroneo","year":"2011"},{"key":"10.1016\/j.jss.2016.08.095_bib0035","series-title":"IEEE Latin American Network Operations and Management Symposium (LANOMS 2015)","first-page":"111","article-title":"An autonomic computing-based architecture for cloud computing elasticity","author":"Coutinho","year":"2015"},{"issue":"10","key":"10.1016\/j.jss.2016.08.095_bib0036","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1145\/355604.361591","article-title":"The humble programmer - ACM turing lecture 1972","volume":"15","author":"Dijkstra","year":"1972","journal-title":"Commun. ACM"},{"key":"10.1016\/j.jss.2016.08.095_bib0037","article-title":"A software cybernetics approach to self-tuning performance of on-line transaction processing systems","author":"Ding","year":"2016","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2016.08.095_bib0038","series-title":"12th IEEE International Conference on Engineering Complex Computer Systems","first-page":"229","article-title":"A first approach to the closed-form specification and analysis of an autonomic control system","author":"Dobson","year":"2007"},{"issue":"6","key":"10.1016\/j.jss.2016.08.095_bib0039","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1002\/sres.1014","article-title":"Programming in the complex: Cybernetic insights into software process and architecture","volume":"27","author":"Donaires","year":"2010","journal-title":"Syst. Res. Behav. Sci."},{"key":"10.1016\/j.jss.2016.08.095_bib0040","series-title":"10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems","first-page":"71","article-title":"Software engineering meets control theory","author":"Filieri","year":"2015"},{"key":"10.1016\/j.jss.2016.08.095_bib0041","series-title":"Developments in E-systems Engineering (DeSE)","first-page":"370","article-title":"Evolutionary environmental modelling in self-managing software systems","author":"Forsyth","year":"2011"},{"key":"10.1016\/j.jss.2016.08.095_bib0042","series-title":"International Conference on Information Technology, Computer Engineering and Management Sciences (ICM 2011)","first-page":"171","article-title":"A process model of software evolution requirement based on feedback","author":"Gao","year":"2011"},{"key":"10.1016\/j.jss.2016.08.095_bib0043","series-title":"IEEE Software Engineering Workshop (SEW)","first-page":"97","article-title":"Software maintenance through supervisory control","author":"Gaudin","year":"2011"},{"key":"10.1016\/j.jss.2016.08.095_bib0044","series-title":"Socio-cybernetics","author":"Geyer","year":"1978"},{"issue":"5","key":"10.1016\/j.jss.2016.08.095_bib0045","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/TAC.2007.895849","article-title":"Approximation metrics for discrete and continuous systems","volume":"52","author":"Girard","year":"2007","journal-title":"IEEE Trans. Autom. Control"},{"issue":"3","key":"10.1016\/j.jss.2016.08.095_bib0046","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/s10489-012-0380-x","article-title":"Agent-based cloud service composition","volume":"38","author":"Gutierrez-Garcia","year":"2013","journal-title":"Appl. Intell."},{"issue":"14","key":"10.1016\/j.jss.2016.08.095_bib0047","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/S0950-5849(01)00189-6","article-title":"Search-based software engineering","volume":"43","author":"Harman","year":"2001","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.jss.2016.08.095_bib0048","series-title":"10th European Conference on Software Maintenance and Reengineering (CSMR 2006)","first-page":"1","article-title":"Search-based software engineering for maintenance and reengineering","author":"Harman","year":"2006"},{"key":"10.1016\/j.jss.2016.08.095_bib0049","series-title":"First International Workshop on Realizing AI Synergies in Software Engineering","first-page":"1","article-title":"The role of artificial intelligence in software engineering","author":"Harman","year":"2012"},{"issue":"1","key":"10.1016\/j.jss.2016.08.095_bib0050","article-title":"Search-based software engineering: trends, techniques, and applications","volume":"45","author":"Harman","year":"2012","journal-title":"J. ACM Comput. Surv. (CSUR)"},{"issue":"9","key":"10.1016\/j.jss.2016.08.095_bib0051","doi-asserted-by":"crossref","first-page":"2225","DOI":"10.1016\/j.jss.2012.10.027","article-title":"Cloud engineering is search based software engineering too","volume":"86","author":"Harman","year":"2013","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2016.08.095_bib0052","series-title":"American Control Conference","first-page":"3433","article-title":"Software enabled control: background and motivation (I)","author":"Heck","year":"2001"},{"key":"10.1016\/j.jss.2016.08.095_bib0053","series-title":"Encyclopaedia of Physical Science & Technology","article-title":"Cybernetics and second-order cybernetics","author":"Heylighen","year":"2001"},{"key":"10.1016\/j.jss.2016.08.095_bib0054","series-title":"32nd Annual IEEE International Computer Software and Applications (COMPSAC'08)","first-page":"853","article-title":"Adaptive software testing in the context of an improved controlled Markov chain model","author":"Hu","year":"2008"},{"issue":"3","key":"10.1016\/j.jss.2016.08.095_bib0055","article-title":"A survey of autonomic computing - degrees, models, and applications","volume":"40","author":"Huebscher","year":"2008","journal-title":"J. ACM Comput. Surv. (CSUR)"},{"key":"10.1016\/j.jss.2016.08.095_bib0056","series-title":"33rd IEEE\/AIAA Digital Avionics Systems Conference","article-title":"Autonomic control architecture for avionics software of unmanned space vehicles","author":"Insaurralde","year":"2014"},{"key":"10.1016\/j.jss.2016.08.095_bib0057","series-title":"3rd IEEE International Symposium on Logistics and Industrial Informatics","article-title":"Autonomic computing: the path towards controlling cloud computing services","author":"Ionescu","year":"2011"},{"key":"10.1016\/j.jss.2016.08.095_bib0058","series-title":"International Workshop on Scenarios and State Machines, Scenarios and State Machines (SCESM, 2007)","first-page":"2","article-title":"Designing tool support for translating Use Cases and UML 2.0 sequence diagrams into a coloured petri net","author":"Joao","year":"2007"},{"issue":"6","key":"10.1016\/j.jss.2016.08.095_bib0059","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/TAC.2009.2019791","article-title":"Approximations of stochastic hybrid systems","volume":"54","author":"Julius","year":"2009","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.jss.2016.08.095_bib0060","series-title":"Seventh IEEE International Conference on Global Software Engineering (ICGSE \u201912)","first-page":"169","article-title":"Enterprise architecture cybernetics for complex global software development: reducing the complexity of global software development using extended axiomatic design theory","author":"Kandjani","year":"2012"},{"key":"10.1016\/j.jss.2016.08.095_bib0061","series-title":"35th IEEE Annual Computer Software and Applications Conference Workshops","first-page":"43","article-title":"Future directions of software cybernetics: A position paper","author":"Kenett","year":"2011"},{"key":"10.1016\/j.jss.2016.08.095_bib0062","first-page":"1287","article-title":"Cyber\u2013physical systems: a perspective at the centennial","author":"Kim","year":"2012","journal-title":"IEEE Special Centennial Issue"},{"issue":"3","key":"10.1016\/j.jss.2016.08.095_bib0063","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1109\/TCC.2014.2325034","article-title":"Elastic admission control for federated cloud services","volume":"2","author":"Konstanteli","year":"2014","journal-title":"IEEE Trans. Cloud Comput."},{"key":"10.1016\/j.jss.2016.08.095_bib0064","series-title":"Recent Advances and Innovations in Engineering (ICRAIE)","first-page":"1","article-title":"Self-Healing model for software application","author":"Kumar","year":"2014"},{"key":"10.1016\/j.jss.2016.08.095_bib0065","series-title":"The Fourth Conference on Emerging Applications of Information Technology (EAIT)","first-page":"127","article-title":"Implementation of software cybernetics for efficient resource usage in software maintenance project","author":"Kundu","year":"2014"},{"key":"10.1016\/j.jss.2016.08.095_bib0066","series-title":"11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC)","first-page":"363","article-title":"Cyber-physical systems: design challenges","author":"Lee","year":"2008"},{"key":"10.1016\/j.jss.2016.08.095_bib0067","article-title":"Software cybernetics in BPM: modeling software behaviour as feedback for evolution by a novel discovery method based on augmented event logs","author":"Li","year":"2016","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2016.08.095_bib0068","series-title":"IEEE International Conference on Computational Intelligence and Software Engineering (CiSE 2009)","first-page":"1","article-title":"A self-evolving control method for software in complex avionics system","author":"Li","year":"2009"},{"issue":"6","key":"10.1016\/j.jss.2016.08.095_bib0069","doi-asserted-by":"crossref","first-page":"2067","DOI":"10.1109\/TCST.2012.2226034","article-title":"Eliminating concurrency bugs in multithreaded software: a new approach based on discrete-event control","volume":"21","author":"Liao","year":"2013","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"10.1016\/j.jss.2016.08.095_bib0070","series-title":"2005 Australian Software Engineering Conference","first-page":"88","article-title":"Defining autonomic computing: a software engineering perspective","author":"Lin","year":"2005"},{"key":"10.1016\/j.jss.2016.08.095_bib0071","series-title":"33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC'09)","first-page":"473","article-title":"A control-based approach to balance services performance and security for adaptive service-based systems (ASBS)","author":"Liu","year":"2009"},{"key":"10.1016\/j.jss.2016.08.095_bib0072","series-title":"19th Asia-Pacific Software Engineering Conference (APSEC)","first-page":"440","article-title":"A problem-oriented approach to modelling feedback loops for self-adaptive software systems","author":"Liu","year":"2012"},{"key":"10.1016\/j.jss.2016.08.095_bib0073","article-title":"The verification of program relationships in the context of software cybernetics","author":"Liu","year":"2016","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2016.08.095_bib0074","series-title":"8th IEEE International Conference on Cloud Computing (CLOUD)","first-page":"1115","article-title":"Software Rejuvenation based fault tolerance scheme for cloud applications","author":"Liu","year":"2015"},{"key":"10.1016\/j.jss.2016.08.095_bib0075","series-title":"31st Annual International Computer Software and Applications Conference (COMPSAC 2007)","first-page":"229","article-title":"Towards controllable requirements engineering processes based on cybernetics","author":"Liu","year":"2007"},{"key":"10.1016\/j.jss.2016.08.095_bib0076","article-title":"Requirements cybernetics: elicitation based on user behavioural data","author":"Liu","year":"2016","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2016.08.095_bib0077","series-title":"30th International ACM Conference on Software Engineering","first-page":"501","article-title":"Automatic generation of software behavioural models","author":"Lorenzoli","year":"2008"},{"key":"10.1016\/j.jss.2016.08.095_bib0078","series-title":"Second IEEE International Workshop on Software Aging and Rejuvenation (WoSAR)","first-page":"1","article-title":"Modeling and analysis of software rejuvenation in a server virtualized system","author":"Machida","year":"2010"},{"key":"10.1016\/j.jss.2016.08.095_bib0079","series-title":"7th IEEE International Conference on Self-Adaptation and Self-Organizing Systems Workshops (SASOW)","first-page":"89","article-title":"The autonomic cloud: a vision of voluntary, peer-2-peer cloud computing","author":"Mayer","year":"2013"},{"issue":"11","key":"10.1016\/j.jss.2016.08.095_bib0080","doi-asserted-by":"crossref","first-page":"1486","DOI":"10.1016\/j.jss.2006.03.033","article-title":"A control-theoretic approach to the management of the software system test phase","volume":"79","author":"Miller","year":"2006","journal-title":"J. Syst. Softw."},{"issue":"5","key":"10.1016\/j.jss.2016.08.095_bib0081","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/TSMCC.2010.2090141","article-title":"Biologically inspired network systems: a review and future prospects","volume":"41","author":"Nakano","year":"2011","journal-title":"IEEE Trans. Syst. Man Cybern. Part C"},{"key":"10.1016\/j.jss.2016.08.095_bib0082","series-title":"Cybernetics: From Past to Future","author":"Novikov","year":"2016"},{"key":"10.1016\/j.jss.2016.08.095_bib0083","series-title":"10th International Symposium on Autonomous Decentralized Systems (ISADS)","first-page":"647","article-title":"Application of reinforcement learning to software rejuvenation","author":"Okamura","year":"2011"},{"key":"10.1016\/j.jss.2016.08.095_bib0084","series-title":"37th Annual Computer Software and Applications Conference Workshops (COMPSACW)","first-page":"41","article-title":"A feedback-based approach to validate SWRL rules for developing situation-aware software","author":"Park","year":"2013"},{"key":"10.1016\/j.jss.2016.08.095_bib0085","series-title":"IEEE\/ACM 4th SEMAT Workshop on General Theory of Software Engineering (GTSE)","first-page":"33","article-title":"Essence-based, goal-driven adaptive software engineering","author":"Park","year":"2015"},{"key":"10.1016\/j.jss.2016.08.095_bib0086","series-title":"7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (IEEE Press)","first-page":"33","article-title":"A systematic survey on the design of self-adaptive software systems using control engineering approaches","author":"Patikirikorala","year":"2012"},{"key":"10.1016\/j.jss.2016.08.095_bib0087","series-title":"18th IEEE International Requirements Engineering Conference (RE)","first-page":"104","article-title":"Self-tuning of software systems through goal-based feedback loop control","author":"Peng","year":"2010"},{"key":"10.1016\/j.jss.2016.08.095_bib0088","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2016.06.030","article-title":"A knowledge-based resource discovery for Internet of Things","author":"Perera","year":"2016","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.jss.2016.08.095_bib0089","series-title":"Quantitative Measure for Discrete Event Supervisory Control","first-page":"207","article-title":"Supervisory control of software systems","author":"Phoha","year":"2005"},{"issue":"5","key":"10.1016\/j.jss.2016.08.095_bib0090","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1049\/iet-sen.2011.0199","article-title":"Metrics-based control in outsourced software development projects","volume":"6","author":"Ponisio","year":"2012","journal-title":"Softw. IET"},{"key":"10.1016\/j.jss.2016.08.095_bib0091","series-title":"Brazilian Symposium on Computing Systems Engineering (SBESC)","first-page":"37","article-title":"Designing self-adaptive embedded real-time software\u2013towards system engineering of self-adaptation","author":"Rammig","year":"2014"},{"key":"10.1016\/j.jss.2016.08.095_bib0092","series-title":"Fourth IEEE International Conference on the Network of the Future","first-page":"1","article-title":"Software cybernetics to infuse adaptation intelligence in networked systems","author":"Ravindran","year":"2013"},{"key":"10.1016\/j.jss.2016.08.095_bib0093","series-title":"23rd IEEE International Conference on Computer Communication and Networks (ICCCN)","first-page":"1","article-title":"Software cybernetics to manage adaptation behaviour of complex network systems","author":"Ravindran","year":"2014"},{"key":"10.1016\/j.jss.2016.08.095_bib0094","series-title":"2nd IEEE International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE)","first-page":"21","article-title":"Pareto-optimal search-based software engineering (POSBSE): a literature survey","author":"Sayyad","year":"2013"},{"key":"10.1016\/j.jss.2016.08.095_bib0095","series-title":"IEEE International Conference on Computational Intelligence and Cybernetics (CyberneticsCom)","first-page":"83","article-title":"The cybernetics of enabling competence in people competence building to ensure quality and productivity in people in software industries","author":"Shankar","year":"2012"},{"issue":"4","key":"10.1016\/j.jss.2016.08.095_bib0096","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1109\/TSC.2011.52","article-title":"Agent-based cloud computing","volume":"5","author":"Sim","year":"2012","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"10.1016\/j.jss.2016.08.095_bib0097","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1109\/TCC.2015.2389839","article-title":"Agent-based interactions and economic encounters in an intelligent InterCloud","volume":"3","author":"Sim","year":"2015","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"3","key":"10.1016\/j.jss.2016.08.095_bib0098","doi-asserted-by":"crossref","DOI":"10.1145\/2843889","article-title":"QoS-aware autonomic resource management in cloud computing: a systematic review","volume":"48","author":"Singh","year":"2015","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10.1016\/j.jss.2016.08.095_bib0099","series-title":"IEEE International Workshop on Software Engineering for Adaptive and Self-Managing Systems","first-page":"10","article-title":"Towards a real-time reference architecture for autonomic systems","author":"Solomon","year":"2007"},{"key":"10.1016\/j.jss.2016.08.095_bib0100","series-title":"34th International Conference on Software Engineering (IEEE)","first-page":"1635","article-title":"A requirements-based approach for the design of adaptive systems","author":"Souza","year":"2012"},{"key":"10.1016\/j.jss.2016.08.095_bib0101","series-title":"IEEE International Conference on Computational Intelligence and Cybernetics (CYBERNETICSCOM)","first-page":"85","article-title":"A cybernetics paradigms framework for cyberspace: key lens to cyber security","author":"Vinnakota","year":"2013"},{"key":"10.1016\/j.jss.2016.08.095_bib0102","series-title":"Communication and Control in Society","first-page":"5","article-title":"Cybernetics of cybernetics","author":"Von Foerster","year":"1979"},{"key":"10.1016\/j.jss.2016.08.095_bib0103","series-title":"36th Annual IEEE Computer Software and Applications Conference Workshops (COMPSACW)","first-page":"158","article-title":"Towards a general supporting framework for self-adaptive software systems","author":"Wang","year":"2012"},{"key":"10.1016\/j.jss.2016.08.095_bib0104","series-title":"Sixth IEEE International Conference on Quality Software (QSIC 2006)","first-page":"159","article-title":"Representing extended finite state machines for SDL by a novel control model of discrete event systems","author":"Wang","year":"2006"},{"key":"10.1016\/j.jss.2016.08.095_bib0105","series-title":"24th IEEE Chinese Control and Decision Conference (CCDC)","first-page":"775","article-title":"Supervisory control of a kind of extended finite state machines","author":"Wang","year":"2012"},{"key":"10.1016\/j.jss.2016.08.095_bib0106","series-title":"Cybernetics: or Control and Communication in the Animal and the Machine","author":"Wiener","year":"1948"},{"issue":"11","key":"10.1016\/j.jss.2016.08.095_bib0107","doi-asserted-by":"crossref","first-page":"1504","DOI":"10.1016\/j.jss.2006.03.050","article-title":"Requirement process establishment and improvement from the viewpoint of cybernetics","volume":"79","author":"Xu","year":"2006","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2016.08.095_bib0108","series-title":"The China Information Technology Handbook","first-page":"1","article-title":"Software evolution for evolving China","author":"Yang","year":"2008"},{"key":"10.1016\/j.jss.2016.08.095_bib0109","series-title":"IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)","first-page":"19","article-title":"Controlling and being creative: software cybernetics and creative computing","author":"Yang","year":"2014"},{"key":"10.1016\/j.jss.2016.08.095_bib0110","series-title":"IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW)","first-page":"13","article-title":"Fuzzy control-based software self-adaptation: a case study in mission critical systems","author":"Yang","year":"2011"},{"key":"10.1016\/j.jss.2016.08.095_bib0111","series-title":"IEEE International Conference on Automation Science and Engineering","first-page":"410","article-title":"Embedded supervisory control of discrete-event systems","author":"Yang","year":"2005"},{"key":"10.1016\/j.jss.2016.08.095_bib0112","series-title":"11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007 (FTDCS'07)","first-page":"149","article-title":"A software cybernetics approach to deploying and scheduling","author":"Yau","year":"2007"},{"key":"10.1016\/j.jss.2016.08.095_bib0113","series-title":"15th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'09)","first-page":"87","article-title":"On the computational complexity of parameter estimation in adaptive testing strategies","author":"Ye","year":"2009"},{"key":"10.1016\/j.jss.2016.08.095_bib0114","series-title":"IEEE international Conference on Information and Automation (ICIA)","first-page":"548","article-title":"A framework to specify big data driven complex cyber physical control systems","author":"Zhang","year":"2014"},{"key":"10.1016\/j.jss.2016.08.095_bib0115","series-title":"IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)","first-page":"31","article-title":"A history-based dynamic random software testing","author":"Zhang","year":"2014"},{"key":"10.1016\/j.jss.2016.08.095_bib0116","series-title":"IET Communications Security Conference (CSC 2014)","first-page":"1","article-title":"Research on software behavior modeling based on extended finite state automata","author":"Zhao","year":"2014"},{"key":"10.1016\/j.jss.2016.08.095_bib0117","series-title":"Speech at the 9th IEEE International Conference on Software Cybernetics (IWSC \u201809)","article-title":"Software cybernetics in the age of cloud computing - challenges and opportunities","author":"Zhu","year":"2012"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121216301595?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121216301595?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,8]],"date-time":"2018-09-08T10:26:27Z","timestamp":1536402387000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121216301595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":114,"alternative-id":["S0164121216301595"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2016.08.095","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2017,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Modern software cybernetics: New trends","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2016.08.095","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}