{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T05:22:31Z","timestamp":1676870551713},"reference-count":30,"publisher":"Allerton Press","issue":"7","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.3103\/s0146411622070021","type":"journal-article","created":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T14:03:26Z","timestamp":1676815406000},"page":"606-622","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Online Testing of Dynamic Reconfigurations w.r.t. Adaptation Policies"],"prefix":"10.3103","volume":"56","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0794-5819","authenticated-orcid":false,"given":"F.","family":"Dadeau","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5159-9442","authenticated-orcid":false,"given":"J.-Ph.","family":"Gros","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1482-9015","authenticated-orcid":false,"given":"O.","family":"Kouchnarenko","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2023,2,19]]},"reference":[{"key":"7518_CR1","doi-asserted-by":"publisher","unstructured":"Alvares, F., Rutten, E., and Seinturier, L., Behavioural model-based control for autonomic software components, IEEE Int. Conf. on Autonomic Computing, Grenoble, France, 2015, IEEE, 2015.https:\/\/doi.org\/10.1109\/ICAC.2015.31","DOI":"10.1109\/ICAC.2015.31"},{"key":"7518_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32759-9_10","volume-title":"Decentralised LTL monitoring, FM 2012: Formal Methods","author":"A. Bauer","year":"2012","unstructured":"Bauer, A. and Falcone, Y., Decentralised LTL monitoring, FM 2012: Formal Methods, Giannakopoulou, D. and M\u00e9ry, D., Eds., Lecture Notes in Computer Science, vol. 7436, Berlin: Springer, 2012, pp. 85\u2013100. \u00a0https:\/\/doi.org\/10.1007\/978-3-642-32759-9_10"},{"key":"7518_CR3","doi-asserted-by":"publisher","unstructured":"Camilli, M., Bellettini, C., Gargantini, A., and Scandurra, P., Online model-based testing under uncertainty, IEEE 29th Int. Symp. on Software Reliability Engineering (ISSRE), Memphis, Tenn., 2018, IEEE, 2018, pp. 36\u201346. \u00a0https:\/\/doi.org\/10.1109\/ISSRE.2018.00015","DOI":"10.1109\/ISSRE.2018.00015"},{"key":"7518_CR4","doi-asserted-by":"publisher","unstructured":"Chauvel, F., Barais, O., Borne, I., and Jezequel, J.-M., Composition of qualitative adaptation policies, 23rd\u00a0IEEE\/ACM Int. Conf. on Automated Software Engineering, L\u2019Aquila, Italy, 2008, IEEE, 2008, pp. 455\u2013458. \u00a0https:\/\/doi.org\/10.1109\/ASE.2008.72","DOI":"10.1109\/ASE.2008.72"},{"key":"7518_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08915-7_4","volume-title":"Using models at runtime to address assurance for self-adaptive systems, Models@run.time","author":"B.H.C. Chen","year":"2014","unstructured":"Chen, B.H.C., Eder, K.I., Gogolla, M., Grunske, L., Litoiu, M., M\u00fcller, H.A., Pelliccione,\u00a0P., Perini, A., Qureshi, N.A., Rumpe, B., Schneider, D., Trollmann, F., and Villegas, N.M., Using models at runtime to address assurance for self-adaptive systems, Models@run.time, Bencomo, N., France, R., Cheng, B.H.C., and A\u00dfmann, U., Eds., Cham: Springer, 2014, pp. 101\u2013136. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-08915-7_4"},{"key":"7518_CR6","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1007\/s11219-019-09487-w","volume":"28","author":"F. Dadeau","year":"2020","unstructured":"Dadeau, F., Gros, J.-P., and Kouchnarenko, O., Testing adaptation policies for software components, Software Qual. J., 2020, vol. 28, pp. 1347\u20131378. \u00a0https:\/\/doi.org\/10.1007\/s11219-019-09487-w","journal-title":"Software Qual. J."},{"key":"7518_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74183-3_1","volume-title":"Software engineering for self-adaptive systems: Research challenges in the provision of assurances, Software Engineering for Self-Adaptive Systems III. Assurances, de Lemos, R.","author":"R. De Lemos","year":"2018","unstructured":"De Lemos, R., Garlan, D., Ghezzi, C., Giese, H., Andersson, J., Litoiu, M., Schmerl, B., Weyns, D., Baresi, L., Bencomo, N., Brun, Yu., Camara, J., Calinescu, R., Cohen, M.B., Gorla, A., Grassi, V., Grunske, L., Inverardi, P., Jezequel, J.-M., Malek, S., Mirandola, R., Mori, M., M\u00fcller, H.A., Rouvoy, R., Rubira, C.M.F., Rutten, E., Shaw, M., Tamburelli, G., Tamura, G., Villegas, N.M., Vogel, T., and Zambonelli, F., Software engineering for self-adaptive systems: Research challenges in the provision of assurances, Software Engineering for Self-Adaptive Systems III. Assurances, de Lemos, R., Garlan, D., Ghezzi, C., and Giese, H., Eds., Lecture Notes in Computer Science, vol. 9640, Cham: Springer, 2018, pp. 3\u201330. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-74183-3_1"},{"key":"7518_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35813-5_1","volume-title":"Software engineering for self-adaptive systems: A second research roadmap, Software Engineering for Self-Adaptive Systems II, de Lemos, R.","author":"R. De Lemos","year":"2013","unstructured":"De Lemos, R., Giese, H., M\u00fcller, H.A., Shaw, M., Andersson, J., Litoiu, M., Schmerl, B., Tamura, G., Villegas, N.M., Vogel, T., Weyns, D., Baresi, L., Becker, B., Bencomo, N., Brun, Yu., Cukic, B., Desmarais, R., Dustdar, S., Gregor, E., Geihs, K., G\u00f6schka, K.M., Gorla, A., Grassi, V., Inverardi, P., Karsai, G., Kramer, J., Lopes, A., Magee, J., Malek, S., Mankovskii, S., Mirandola, R., Mylopoulos, J., Nierstrasz, O., Pezz\u00e8, M., Prehofer, C., Sch\u00e4fer, W., Schlichting, R., Smith, D.B., Sousa, J.P., Tahvildari, L., Wong, K., and Wuttke, J., Software engineering for self-adaptive systems: A second research roadmap, Software Engineering for Self-Adaptive Systems II, de Lemos, R., Giese, H., M\u00fcller, H.A., and Shaw, M., Eds., Lecture Notes in Computer Science, vol. 7475, Berlin: Springer, 2013, pp. 1\u201332. \u00a0https:\/\/doi.org\/10.1007\/978-3-642-35813-5_1"},{"key":"7518_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27269-1_12","volume-title":"Using temporal logic for dynamic reconfigurations of components, Formal Aspects of Component Software. FACS 2010","author":"J. Dormoy","year":"2012","unstructured":"Dormoy, J., Kouchnarenko, O., Lanoix, A., Using temporal logic for dynamic reconfigurations of components, Formal Aspects of Component Software. FACS 2010, Barbosa, L.S. and Lumpe, M., Eds., Lecture Notes in Computer Science, vol. 6921, Berlin: Springer, 2012, pp. 200\u2013217. \u00a0https:\/\/doi.org\/10.1007\/978-3-642-27269-1_12"},{"key":"7518_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91271-4_11","volume-title":"Proof-based approach to hybrid systems development: Dynamic logic and Event-B, Abstract State Machines, Alloy, B, TLA, VDM, and Z. ABZ 2018","author":"G. Dupong","year":"2018","unstructured":"Dupong, G., A\u00eft-Ameur, Ya., Pantel, M., and Singh, N.K., Proof-based approach to hybrid systems development: Dynamic logic and Event-B, Abstract State Machines, Alloy, B, TLA, VDM, and Z. ABZ 2018, Butler, M., Raschke, A., Hoang, T., and Reichl, K., Eds., Lecture Notes in Computer Science, vol. 10817, Cham: Springer, 2018, pp. 155\u2013170. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-91271-4_11"},{"key":"7518_CR11","doi-asserted-by":"publisher","unstructured":"Fredericks, E.M., Ramirez, A.J., and Cheng, B.H.C., Towards run-time testing of dynamic adaptive systems, 8th Int. Symp. on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), San Francisco, 2013, IEEE, 2013, pp. 169\u2013174. \u00a0https:\/\/doi.org\/10.1109\/SEAMS.2013.6595504","DOI":"10.1109\/SEAMS.2013.6595504"},{"key":"7518_CR12","doi-asserted-by":"publisher","unstructured":"Greiler, M., Gross, H.-G., and van Deursen, A., Evaluation of online testing for services: A case study, PESOS \u201910: Proc. 2nd Int. Workshop on Principles of Engineering Service-Oriented Systems, Cape Town, South Africa, 2010, New York: Association for Computing Machinery, 2010, pp. 36\u201342. \u00a0https:\/\/doi.org\/10.1145\/1808885.1808893","DOI":"10.1145\/1808885.1808893"},{"key":"7518_CR13","doi-asserted-by":"publisher","unstructured":"Gupta, S., Ansari, A., Feng, Sh., and Mahlke, S., Adaptive online testing for efficient hard fault detection, IEEE Int. Conf. on Computer Design, Lake Tahoe, Calif., 2009, IEEE, 2009, pp. 343\u2013349. \u00a0https:\/\/doi.org\/10.1109\/ICCD.2009.5413132","DOI":"10.1109\/ICCD.2009.5413132"},{"key":"7518_CR14","doi-asserted-by":"publisher","unstructured":"Helvensteijn, M., Dynamic delta modeling, SPLC \u201912: Proc. 16th Int. Software Product Line Conf., Salvador, Brazil, 2012, New York: Association for Computing Machinery, 2012, vol. 2, pp. 127\u2013134. \u00a0https:\/\/doi.org\/10.1145\/2364412.2364434","DOI":"10.1145\/2364412.2364434"},{"key":"7518_CR15","doi-asserted-by":"publisher","unstructured":"Johnson, B. and Larsen, K.G., Specification and refinement of probabilistic processes, Proc. Sixth Ann. IEEE Symp. on Logic in Computer Science, Amsterdam, 1991, IEEE, 1991, pp. 266\u2013277. \u00a0https:\/\/doi.org\/10.1109\/LICS.1991.151651","DOI":"10.1109\/LICS.1991.151651"},{"key":"7518_CR16","doi-asserted-by":"publisher","unstructured":"Kephart, J.O. and Walsh, W.E., An artificial intelligence perspective on autonomic computing policies, Proc. Fifth IEEE Int. Workshop on Policies for Distributed Systems and Networks. POLICY 2004, Yorktown Heights, N.Y., 2004, IEEE, 2004, pp. 3\u201312. \u00a0https:\/\/doi.org\/10.1109\/POLICY.2004.1309145","DOI":"10.1109\/POLICY.2004.1309145"},{"key":"7518_CR17","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/S1571-0661(04)80579-6","volume":"70","author":"M. Kim","year":"2002","unstructured":"Kim, M., Lee, I., Sammapun, U., Shin, J., and Sokolsky, O., Monitoring, checking, and steering of real-time systems, Electron. Notes Theor. Comput. Sci., 2002, vol. 70, no. 4, pp.\u00a095\u2013111. \u00a0https:\/\/doi.org\/10.1016\/S1571-0661(04)80579-6","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"7518_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07602-7_15","volume-title":"Adapting component-based systems at runtime via policies with temporal patterns, Formal Aspects of Component Software. FACS 2013","author":"O. Kouchnarenko","year":"2014","unstructured":"Kouchnarenko, O. and Weber, J.-F., Adapting component-based systems at runtime via policies with temporal patterns, Formal Aspects of Component Software. FACS 2013, Fiadeiro, J., Liu, Z., Xue, J., Eds., Lecture Notes in Computer Science, vol. 8348, Cham: Springer, 2014, pp. 234\u2013253. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-07602-7_15"},{"key":"7518_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15317-9_7","volume-title":"Decentralised evaluation of temporal patterns over component-based systems at runtime, Formal Aspects of Component Software. FACS 2014","author":"O. Kouchnarenko","year":"2015","unstructured":"Kouchnarenko, O. and Weber, J.-F., Decentralised evaluation of temporal patterns over component-based systems at runtime, Formal Aspects of Component Software. FACS 2014, Lanese, I. and Madelaine, E., Eds., Lecture Notes in Computer Science, vol. 8997, Cham: Springer, 2015, pp. 108\u2013126. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-15317-9_7"},{"key":"7518_CR20","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/BF03037383","volume":"4","author":"R. Kowalski","year":"1986","unstructured":"Kowalski, R. and Sergot, M., A logic-based calculus of events, New Gener. Comput., 1986, vol. 4, pp. 67\u201385. \u00a0https:\/\/doi.org\/10.1007\/BF03037383","journal-title":"New Gener. Comput."},{"key":"7518_CR21","doi-asserted-by":"publisher","unstructured":"Larsen, K.G. and Thomsen, B., A modal process logic, Proc. Third Ann. Symp. on Logic in Computer Sci., Edinburgh, 1988, IEEE, 1988, pp. 203\u2013210. \u00a0https:\/\/doi.org\/10.1109\/LICS.1988.5119","DOI":"10.1109\/LICS.1988.5119"},{"key":"7518_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45234-6_24","volume-title":"Revisiting semantics of interactions for trace validity analysis, Fundamental Approaches to Software Engineering. FASE 2020","author":"E. Mahe","year":"2020","unstructured":"Mahe, E., Gaston, C., and Le Gall, P., Revisiting semantics of interactions for trace validity analysis, Fundamental Approaches to Software Engineering. FASE 2020, Wehrheim, H. and Cabot, J., Eds., Lecture Notes in Computer Science, vol. 12076, Cham: Springer, 2020, pp.\u00a0482\u2013501. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-45234-6_24"},{"key":"7518_CR23","first-page":"77","volume":"3","author":"R. Miller","year":"1999","unstructured":"Miller, R. and Shanahan, M., The event calculus in classical logic\u2014Alternative axiomatisations, Electron. Trans. Artif. Intell., 1999, vol. 3, pp. 77\u2013105.","journal-title":"Electron. Trans. Artif. Intell."},{"key":"7518_CR24","unstructured":"Milner, R., Communication and Concurrency, PHI Series in Computer Science, Prentice Hall, 1989."},{"key":"7518_CR25","doi-asserted-by":"publisher","unstructured":"Poladian, V., Garlan, D., Shaw, M., and Satyanarayanan, M., Schmerl, B., and Sousa, J., Leveraging resource prediction for anticipatory dynamic configuration, First Int. Conf. on Self-Adaptive and Self-Organizing Systems (SASO 2007), Cambrdige, Mass., 2007, IEEE, 2007, pp. 214\u2013233. \u00a0https:\/\/doi.org\/10.1109\/SASO.2007.35","DOI":"10.1109\/SASO.2007.35"},{"key":"7518_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23727-5_25","volume-title":"SmartyCo: Managing cyber-physical systems for smart environments, Software Architecture. ECSA 2015","author":"D. Romero","year":"2015","unstructured":"Romero, D., Quinton, C., Duchien, L., Seinturier, L., and Valdez, C., SmartyCo: Managing cyber-physical systems for smart environments, Software Architecture. ECSA 2015, Weyns, D., Mirandola, R., and Crnkovic, I., Eds., Lecture Notes in Computer Science, vol. 9278, Cham: Springer, 2015, pp. 294\u2013302. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-23727-5_25"},{"key":"7518_CR27","doi-asserted-by":"publisher","unstructured":"Sinclair, A., Algorithms for Random Generation and Counting: A Markov Chain Approach, Progress in Theoretical Computer Science, Boston: Birkh\u00e4user, 1993. \u00a0https:\/\/doi.org\/10.1007\/978-1-4612-0323-0","DOI":"10.1007\/978-1-4612-0323-0"},{"key":"7518_CR28","doi-asserted-by":"publisher","unstructured":"Trollman, F., F\u00e4hndrich, J., and Albayrak, S., Hybrid adaptation policies: Towards a\u00a0framework for classification and modelling of different combinations of adaptation policies, SEAMS \u201918: Proc. 13th Int. Conf. on Software Engineering for Adaptive and Self-Managing Systems, Gothenburg, Sweden, 2018, New York: Association for Computing Machinery, 2018, pp. 76\u201386. \u00a0https:\/\/doi.org\/10.1145\/3194133.3194137","DOI":"10.1145\/3194133.3194137"},{"key":"7518_CR29","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1002\/spe.4380250106","volume":"25","author":"G.H. Walton","year":"1995","unstructured":"Walton, G.H., Poore, J.H., and Trammell, C.J., Statistical testing of software based on a usage model, Software: Pract. Exper., 1995, vol. 25, no. 1, pp. 97\u2013108. \u00a0https:\/\/doi.org\/10.1002\/spe.4380250106","journal-title":"Software: Pract. Exper."},{"key":"7518_CR30","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1109\/32.328991","volume":"20","author":"J.A. Whittaker","year":"1994","unstructured":"Whittaker, J.A. and Thomason, M.G., A Markov chain model for statistical software testing, IEEE Trans. Software Eng., 1994, vol. 20, no. 10, pp. 812\u2013824. \u00a0https:\/\/doi.org\/10.1109\/32.328991","journal-title":"IEEE Trans. Software Eng."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411622070021.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411622070021\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411622070021.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T14:03:41Z","timestamp":1676815421000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411622070021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":30,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["7518"],"URL":"https:\/\/doi.org\/10.3103\/s0146411622070021","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"3 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}