{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T19:30:04Z","timestamp":1725737404642},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/hase.2015.15","type":"proceedings-article","created":{"date-parts":[[2015,2,5]],"date-time":"2015-02-05T14:16:33Z","timestamp":1423145793000},"page":"36-43","source":"Crossref","is-referenced-by-count":11,"title":["Model-Checking and Game theory for Synthesis of Safety Rules"],"prefix":"10.1109","author":[{"given":"Mathilde","family":"Machin","sequence":"first","affiliation":[]},{"given":"Fanny","family":"Dufosse","sequence":"additional","affiliation":[]},{"given":"Jeremie","family":"Guiochet","sequence":"additional","affiliation":[]},{"given":"David","family":"Powell","sequence":"additional","affiliation":[]},{"given":"Matthieu","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Helene","family":"Waeselynck","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2009.2030225"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/0325013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICORR.2011.5975483"},{"journal-title":"Gambit Software Tools for Game Theory","year":"2006","author":"mckelvey","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1967701.1967748"},{"key":"ref15","first-page":"521","article-title":"Mocha: Modularity in model checking","author":"alur","year":"1998","journal-title":"Computer Aided Verification"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WODES.2006.382401"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/3-540-45657-0_29","article-title":"Nusmv 2: An opensource tool for symbolic model checking","author":"cimatti","year":"2002","journal-title":"Computer Aided Verification"},{"journal-title":"SAFECOMP LNCS","article-title":"Specifying safety monitors for autonomous systems","year":"2014","author":"machin","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2008.08.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73368-3_14"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/BFb0020949","article-title":"UPPAAL – a tool suite for automatic verification of real-time systems","author":"bengtsson","year":"1996","journal-title":"Hybrid Systems III"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2012.22"},{"journal-title":"Proc SSC Elsevier","article-title":"Controller synthesis for timed automata","year":"1998","author":"pnueli","key":"ref9"},{"journal-title":"Functional safety of electrical\/electronic\/programmable electronic safety-related systems – part 7 Overview of techniques and measures","first-page":"153","year":"2010","key":"ref1"}],"event":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering (HASE)","start":{"date-parts":[[2015,1,8]]},"location":"Daytona Beach Shores, FL","end":{"date-parts":[[2015,1,10]]}},"container-title":["2015 IEEE 16th International Symposium on High Assurance Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7027113\/7027398\/07027412.pdf?arnumber=7027412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T00:16:58Z","timestamp":1555028218000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7027412\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/hase.2015.15","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}