{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T12:39:33Z","timestamp":1722947973197},"reference-count":33,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Theoretical Computer Science"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1016\/j.tcs.2020.09.028","type":"journal-article","created":{"date-parts":[[2020,9,16]],"date-time":"2020-09-16T11:38:41Z","timestamp":1600256321000},"page":"160-173","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["Fundamental results for learning deterministic extended finite state machines from queries"],"prefix":"10.1016","volume":"862","author":[{"given":"Florentin","family":"Ipate","sequence":"first","affiliation":[]},{"given":"Marian","family":"Gheorghe","sequence":"additional","affiliation":[]},{"given":"Raluca","family":"Lefticaru","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.tcs.2020.09.028_br0010","series-title":"Handbook of Formal Languages","year":"1997"},{"key":"10.1016\/j.tcs.2020.09.028_br0020","series-title":"An Introduction to Automata Theory, Languages, and Computation","author":"Hopcroft","year":"1979"},{"issue":"4","key":"10.1016\/j.tcs.2020.09.028_br0030","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1080\/03081079.2012.757437","article-title":"Automated formal analysis and verification: an overview","volume":"42","author":"Krena","year":"2013","journal-title":"Int. J. Gen. Syst."},{"key":"10.1016\/j.tcs.2020.09.028_br0040","series-title":"Foundations of Software Testing","author":"Mathur","year":"2014"},{"issue":"2","key":"10.1016\/j.tcs.2020.09.028_br0050","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","article-title":"Learning regular sets from queries and counterexamples","volume":"75","author":"Angluin","year":"1987","journal-title":"Inf. Comput."},{"key":"10.1016\/j.tcs.2020.09.028_br0060","series-title":"CAV","first-page":"315","article-title":"Domain-specific optimization in automata learning","author":"Hungar","year":"2003"},{"key":"10.1016\/j.tcs.2020.09.028_br0070","series-title":"FASE","first-page":"107","article-title":"Regular inference for state machines with parameters","author":"Berg","year":"2006"},{"issue":"1","key":"10.1016\/j.tcs.2020.09.028_br0080","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.jcss.2011.04.002","article-title":"Learning finite cover automata from queries","volume":"78","author":"Ipate","year":"2012","journal-title":"J. Comput. Syst. Sci."},{"key":"10.1016\/j.tcs.2020.09.028_br0090","series-title":"Machine Learning for Dynamic Software Analysis","first-page":"123","article-title":"Active automata learning in practice - an annotated bibliography of the years 2011 to 2016","volume":"vol. 11025","author":"Howar","year":"2018"},{"key":"10.1016\/j.tcs.2020.09.028_br0100","series-title":"Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change - 5th International Symposium, ISoLA 2012, Heraklion, Crete, Greece, October 15-18, 2012, Proceedings, Part I","first-page":"539","article-title":"Model learning and test generation for Event-B decomposition","author":"Dinca","year":"2012"},{"key":"10.1016\/j.tcs.2020.09.028_br0110","series-title":"DSV-IS 2003: Proceedings of 10th International Workshop on Interactive Systems. Design, Specification, and Verification","first-page":"34","article-title":"Applying extended finite state machines in software testing of interactive systems","volume":"vol. 2844","author":"Fantinato","year":"2003"},{"issue":"4","key":"10.1016\/j.tcs.2020.09.028_br0120","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1142\/S0218194015300018","article-title":"EFSM-based test case generation: sequence, data, and oracle","volume":"25","author":"Yang","year":"2015","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"10.1016\/j.tcs.2020.09.028_br0130","article-title":"Correct Systems - Building a Business Process Solution","author":"Holcombe","year":"1998"},{"issue":"1","key":"10.1016\/j.tcs.2020.09.028_br0140","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s00165-005-0085-6","article-title":"Testing methods for X-machines: a review","volume":"18","author":"Bogdanov","year":"2006","journal-title":"Form. Asp. Comput."},{"issue":"37","key":"10.1016\/j.tcs.2020.09.028_br0150","doi-asserted-by":"crossref","first-page":"3372","DOI":"10.1016\/j.tcs.2010.05.014","article-title":"Checking experiments for stream X-machines","volume":"411","author":"Hierons","year":"2010","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"10.1016\/j.tcs.2020.09.028_br0160","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s10270-009-0126-3","article-title":"Testing timed systems modeled by stream X-machines","volume":"10","author":"Merayo","year":"2011","journal-title":"Softw. Syst. Model."},{"issue":"6","key":"10.1016\/j.tcs.2020.09.028_br0170","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1007\/s00165-008-0087-2","article-title":"Testing a deterministic implementation against a non-controllable non-deterministic stream X-machine","volume":"20","author":"Hierons","year":"2008","journal-title":"Form. Asp. Comput."},{"issue":"1\u20133","key":"10.1016\/j.tcs.2020.09.028_br0180","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.tcs.2005.12.002","article-title":"Testing against a non-controllable stream X-machine using state counting","volume":"353","author":"Ipate","year":"2006","journal-title":"Theor. Comput. Sci."},{"issue":"2\u20133","key":"10.1016\/j.tcs.2020.09.028_br0190","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.tcs.2008.02.045","article-title":"Testing data processing-oriented systems from stream X-machine models","volume":"403","author":"Ipate","year":"2008","journal-title":"Theor. Comput. Sci."},{"issue":"1","key":"10.1016\/j.tcs.2020.09.028_br0200","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00165-015-0345-z","article-title":"A unified integration and component testing approach from deterministic stream X-machine specifications","volume":"28","author":"Ipate","year":"2016","journal-title":"Form. Asp. Comput."},{"issue":"1","key":"10.1016\/j.tcs.2020.09.028_br0210","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1109\/TII.2017.2695370","article-title":"Model-based testing of PLC programs with appropriate conformance relations","volume":"14","author":"Guignard","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"7019","key":"10.1016\/j.tcs.2020.09.028_br0220","doi-asserted-by":"crossref","first-page":"907","DOI":"10.1038\/nature03105","article-title":"Trail geometry gives polarity to ant foraging networks","volume":"432","author":"Jackson","year":"2004","journal-title":"Nature"},{"key":"10.1016\/j.tcs.2020.09.028_br0230","series-title":"Proceedings of the 2006 IEEE International Symposium on Biomedical Imaging: from Nano to Macro","first-page":"816","article-title":"The epitheliome project: multiscale agent-based modeling of epithelial cells","author":"Smallwood","year":"2006"},{"issue":"1","key":"10.1016\/j.tcs.2020.09.028_br0250","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1006\/jcss.1999.1693","article-title":"Computing with membranes","volume":"61","author":"P\u0103un","year":"2000","journal-title":"J. Comput. Syst. Sci."},{"key":"10.1016\/j.tcs.2020.09.028_br0260","series-title":"The Oxford Handbook of Membrane Computing","year":"2010"},{"issue":"1\u20133","key":"10.1016\/j.tcs.2020.09.028_br0270","first-page":"17","article-title":"P systems with replicated rewriting and stream X-machines (Eilenberg machines)","volume":"49","author":"Aguado","year":"2002","journal-title":"Fundam. Inform."},{"issue":"4","key":"10.1016\/j.tcs.2020.09.028_br0280","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1007\/s11047-008-9103-y","article-title":"Transforming communicating X-machines into P systems","volume":"8","author":"Kefalas","year":"2009","journal-title":"Nat. Comput."},{"key":"10.1016\/j.tcs.2020.09.028_br0290","series-title":"Tools and Algorithms for the Construction and Analysis of Systems, 15th International Conference, TACAS 2009, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009, York, UK, March 22-29, 2009, Proceedings","first-page":"31","article-title":"Learning minimal separating DFA's for compositional verification","author":"Chen","year":"2009"},{"key":"10.1016\/j.tcs.2020.09.028_br0300","series-title":"Automated Reasoning, Third International Joint Conference, IJCAR 2006, Seattle, WA, USA, August 17-20, 2006, Proceedings","first-page":"483","article-title":"Inferring network invariants automatically","author":"Grinchtein","year":"2006"},{"issue":"3","key":"10.1016\/j.tcs.2020.09.028_br0310","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/s10703-008-0050-0","article-title":"Automated assumption generation for compositional verification","volume":"32","author":"Gupta","year":"2008","journal-title":"Form. Methods Syst. Des."},{"issue":"11","key":"10.1016\/j.tcs.2020.09.028_br0320","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1109\/43.806807","article-title":"A new algorithm for exact reduction of incompletely specified finite state machines","volume":"18","author":"Pena","year":"1999","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."},{"issue":"3","key":"10.1016\/j.tcs.2020.09.028_br0330","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1109\/TEC.1959.5222697","article-title":"Minimizing the number of states in incompletely specified sequential switching functions","volume":"8","author":"Paull","year":"1959","journal-title":"IRE Trans. Electron. Comput."},{"key":"10.1016\/j.tcs.2020.09.028_br0340","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1016\/j.ins.2016.08.028","article-title":"Testing based on identifiable P systems using cover automata and X-machines","volume":"372","author":"Gheorghe","year":"2016","journal-title":"Inf. Sci."}],"container-title":["Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0304397520305272?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0304397520305272?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T18:01:22Z","timestamp":1614967282000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0304397520305272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":33,"alternative-id":["S0304397520305272"],"URL":"https:\/\/doi.org\/10.1016\/j.tcs.2020.09.028","relation":{},"ISSN":["0304-3975"],"issn-type":[{"value":"0304-3975","type":"print"}],"subject":[],"published":{"date-parts":[[2021,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Fundamental results for learning deterministic extended finite state machines from queries","name":"articletitle","label":"Article Title"},{"value":"Theoretical Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.tcs.2020.09.028","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}