{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:35:00Z","timestamp":1730342100455,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["ECCS-2015403,CNS-2039062"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,10]]},"DOI":"10.23919\/acc60939.2024.10644795","type":"proceedings-article","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:19Z","timestamp":1725558979000},"page":"4657-4662","source":"Crossref","is-referenced-by-count":0,"title":["Falsification via Barrier Certificates"],"prefix":"10.23919","author":[{"given":"Vishnu","family":"Murali","sequence":"first","affiliation":[{"name":"University of Colorado,Department of Computer Science,Boulder,USA"}]},{"given":"Ashutosh","family":"Trivedi","sequence":"additional","affiliation":[{"name":"University of Colorado,Department of Computer Science,Boulder,USA"}]},{"given":"Majid","family":"Zamani","sequence":"additional","affiliation":[{"name":"University of Colorado,Department of Computer Science,Boulder,USA"}]}],"member":"263","reference":[{"volume-title":"Principles of cyber-physical systems","year":"2015","author":"Alur","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0224-5"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-10575-8","volume-title":"Handbook of model checking.","volume":"10","author":"Clarke","year":"2018"},{"volume-title":"Principles of model checking","year":"2008","author":"Baier","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2465787.2465797"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-75632-5_5"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24743-2_32"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19835-9_21"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17524-9_10"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38574-2_14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-003-0387-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2638961"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.29007\/r74f"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3049797.3049804"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.29007\/t85q"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011254632723"},{"key":"ref19","article-title":"Ltlf satisfiability checking","author":"Li","year":"2014","journal-title":"arXiv preprint"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454076"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2511722"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01090-4_11"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3013916"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2694351"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2923049"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3371078"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48989-6_12"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2656045.2656054"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31365-3_23"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-40922-X_8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2022.3184661"},{"key":"ref32","article-title":"Compositional synthesis of control barrier certificates for networks of stochastic systems against omega-regular specifications","author":"Anand","year":"2021","journal-title":"arXiv preprint"}],"event":{"name":"2024 American Control Conference (ACC)","start":{"date-parts":[[2024,7,10]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2024,7,12]]}},"container-title":["2024 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10644130\/10644150\/10644795.pdf?arnumber=10644795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:32:52Z","timestamp":1725769972000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10644795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.23919\/acc60939.2024.10644795","relation":{},"subject":[],"published":{"date-parts":[[2024,7,10]]}}}