{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:56:48Z","timestamp":1725742608928},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642402289"},{"type":"electronic","value":"9783642402296"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40229-6_1","type":"book-chapter","created":{"date-parts":[[2013,7,23]],"date-time":"2013-07-23T01:47:40Z","timestamp":1374544060000},"page":"1-15","source":"Crossref","is-referenced-by-count":5,"title":["Precise Robustness Analysis of Time Petri Nets with Inhibitor Arcs"],"prefix":"10.1007","author":[{"given":"\u00c9tienne","family":"Andr\u00e9","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Pellegrino","sequence":"additional","affiliation":[]},{"given":"Laure","family":"Petrucci","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-33365-1_3","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"S. Akshay","year":"2012","unstructured":"Akshay, S., H\u00e9lou\u00ebt, L., Jard, C., Lime, D., Roux, O.H.: Robustness of time petri nets under architectural constraints. In: Jurdzi\u0144ski, M., Ni\u010dkovi\u0107, D. (eds.) FORMATS 2012. LNCS, vol.\u00a07595, pp. 11\u201326. Springer, Heidelberg (2012)"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-33512-9_9","volume-title":"Reachability Problems","author":"S. Akshay","year":"2012","unstructured":"Akshay, S., H\u00e9lou\u00ebt, L., Jard, C., Reynier, P.-A.: Robustness of time Petri nets under guard enlargement. In: Finkel, A., Leroux, J., Potapov, I. (eds.) RP 2012. LNCS, vol.\u00a07550, pp. 92\u2013106. Springer, Heidelberg (2012)"},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R. Alur","year":"1994","unstructured":"Alur, R., Dill, D.L.: A theory of timed automata. Theoretical Computer Science\u00a0126(2), 183\u2013235 (1994)","journal-title":"Theoretical Computer Science"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Andr\u00e9, \u00c9., Soulat, R.: The Inverse Method. FOCUS Series in Computer Engineering and Information Technology. ISTE Ltd and John Wiley & Sons Inc. (2013)","DOI":"10.1002\/9781118569351"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-23217-6_6","volume-title":"CONCUR 2011 \u2013 Concurrency Theory","author":"P. Bouyer","year":"2011","unstructured":"Bouyer, P., Larsen, K.G., Markey, N., Sankur, O., Thrane, C.: Timed automata can always be made implementable. In: Katoen, J.-P., K\u00f6nig, B. (eds.) CONCUR 2011. LNCS, vol.\u00a06901, pp. 76\u201391. Springer, Heidelberg (2011)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-642-31585-5_15","volume-title":"Automata, Languages, and Programming","author":"P. Bouyer","year":"2012","unstructured":"Bouyer, P., Markey, N., Sankur, O.: Robust reachability in timed automata: A game-based approach. In: Czumaj, A., Mehlhorn, K., Pitts, A., Wattenhofer, R. (eds.) ICALP 2012, Part II. LNCS, vol.\u00a07392, pp. 128\u2013140. Springer, Heidelberg (2012)"},{"issue":"2","key":"1_CR7","first-page":"233","volume":"24","author":"L. Fribourg","year":"2013","unstructured":"Fribourg, L., K\u00fchne, U.: Parametric verification and test coverage for hybrid automata using the inverse method. IJFCS\u00a024(2), 233\u2013249 (2013)","journal-title":"IJFCS"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-19805-2_16","volume-title":"Foundations of Software Science and Computational Structures","author":"R. Jaubert","year":"2011","unstructured":"Jaubert, R., Reynier, P.-A.: Quantitative robustness analysis of flat timed automata. In: Hofmann, M. (ed.) FOSSACS 2011. LNCS, vol.\u00a06604, pp. 229\u2013244. Springer, Heidelberg (2011)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Markey, N.: Robustness in real-time systems. In: SIES, pp. 28\u201334. IEEE Computer Society Press (2011)","DOI":"10.1109\/SIES.2011.5953652"},{"key":"1_CR10","unstructured":"Merlin, P.M.: A study of the recoverability of computing systems. PhD thesis, University of California, Irvine, CA, USA (1974)"},{"key":"1_CR11","unstructured":"Sankur, O.: Shrinktech: A tool for the robustness analysis of timed automata. In: CAV. LNCS. Springer (to appear, 2013)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Traonouez, L.-M.: A parametric counterexample refinement approach for robust timed specifications. In: FIT. EPTCS, vol.\u00a087, pp. 17\u201333 (2012)","DOI":"10.4204\/EPTCS.87.3"},{"issue":"17","key":"1_CR13","first-page":"3273","volume":"15","author":"L.-M. Traonouez","year":"2009","unstructured":"Traonouez, L.-M., Lime, D., Roux, O.H.: Parametric model-checking of stopwatch Petri nets. Journal of Universal Computer Science\u00a015(17), 3273\u20133304 (2009)","journal-title":"Journal of Universal Computer Science"}],"container-title":["Lecture Notes in Computer Science","Formal Modeling and Analysis of Timed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40229-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T02:08:48Z","timestamp":1558318128000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/link.springer.com\/10.1007\/978-3-642-40229-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642402289","9783642402296"],"references-count":13,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1007\/978-3-642-40229-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}