<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Behavioral Agent Testing of Distributed Information Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Martynyuk</surname></persName>
							<email>anmartynyuk@ukr.net</email>
							<affiliation key="aff1">
								<orgName type="institution" key="instit1">Odessa</orgName>
								<orgName type="institution" key="instit2">National Polytechnic University</orgName>
								<address>
									<addrLine>Ave. Shevchenko 1</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Drozd</surname></persName>
							<email>drozd@ukr.net</email>
							<affiliation key="aff1">
								<orgName type="institution" key="instit1">Odessa</orgName>
								<orgName type="institution" key="instit2">National Polytechnic University</orgName>
								<address>
									<addrLine>Ave. Shevchenko 1</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hanna</forename><surname>Stepova</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution" key="instit1">Odessa</orgName>
								<orgName type="institution" key="instit2">National Polytechnic University</orgName>
								<address>
									<addrLine>Ave. Shevchenko 1</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Viktor</forename><surname>Antonyuk</surname></persName>
							<email>viktor.v.antoniuk@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution" key="instit1">Odessa</orgName>
								<orgName type="institution" key="instit2">National Polytechnic University</orgName>
								<address>
									<addrLine>Ave. Shevchenko 1</addrLine>
									<postCode>65044</postCode>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Dmitry</forename><surname>Martynyuk</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Join Venture &quot;Nippon Auto&quot;</orgName>
								<address>
									<addrLine>Academician Williams str. 71a</addrLine>
									<settlement>Odessa</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="department">Information-Communication Technologies &amp; Embedded Systems</orgName>
								<address>
									<addrLine>November 12</addrLine>
									<postCode>2020</postCode>
									<settlement>Mykolaiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Behavioral Agent Testing of Distributed Information Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">7B3788278B7833D061EFB8E4A8CA0109</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T23:45+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Distributed information system</term>
					<term>online and offline testing</term>
					<term>behavioral testing</term>
					<term>agent</term>
					<term>multi-agent system</term>
					<term>evolutionary check model</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The use of multi-agent technologies in modern distributed information systems, that due to the increasingly demanded properties of autonomy, mobility, intelligence, cooperation, determines their appearance in the tools of online and offline testing. This work presents an agent-based check model of behavioral testing of a component of a distributed information system in its resource environment. This agent check model has the features of the composition of the reactive online and deliberative offline components of testing, suggesting deterministic and evolutionary methods of decomposition behavioral testing. To ensure autonomy and mobility, the agent-based check model defines the resource model of the component deployment environment, models of its goals and test strategies, signatures of multi-agent operations, as part of observation, strategy execution and adaptation, as well as initial models, goals and test strategies of the component. For the intelligence of the agent-based check model, its main components are also defined as individuals in the population of evolutionary test generation, which is proposed as an implementation of the deliberative component testing strategy. For the cooperation of agent-based check models in the network and multi-level interaction of their reactive and deliberative components, there are cooperative definitions for resource models of placement, goals and strategies, operations and initializations, realizability and transportability into the network DIS model, inheritance into the hierarchical DIS model. The check model defines the formal conditions/requirements for the performance of the behavioral online and offline testing, that performed by the multi-agent system of testing, and can be taken as the basic one, when constructing methods and special distributed behavioral test systems.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Modern effective distributed information systems (DIS) <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref> are based on the joint use of many promising computer, communication, computing, information subject technologies, and some of which are rapidly developing service-oriented architectures, as Web services <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>, cluster, cloud, multi-agent <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>and GRID systems <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>, super-large data and knowledge systems <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10]</ref> intelligent systems <ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref>, the avalanche-growing world of the Internet of things <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>. One of the most important reasons for this growth is the significant successes of fundamental mathematical computer sciences, in particular, in the field of complex, decomposition, functional, fuzzy, intellectual, concurrent methods of analysis and synthesis of DIS.</p><p>At the same time, the quality of their functioning, which is determined not only by the general completeness, accuracy and efficiency of the results, but also their reliability, and the performance of the DIS as a whole <ref type="bibr" target="#b1">[2]</ref>. One of the most important ways to ensure the operability of computer systems is the technology of technical verification of projects, testing and diagnosing of DIS implementations, which allows developing and applying various tools, as part of automated technical diagnostic systems (ASTD) <ref type="bibr" target="#b15">[16]</ref>. Among these tools, as a rule, there is an online and offline testing. Currently, there are developed tools of structural, functional-behavioral, deterministic, pseudo-random, evolutionarygenetic, logical, symbolic, fuzzy, intelligent, abstract, decomposition analysis and synthesis to provide the necessary level of DIS reliability of projects and the operability of functioning of its implementations, in particular, the tools of online and offline testing of DIS.</p><p>Most often, to achieve greater efficiency, these tools are used in a comprehensive manner, tuning their aggregates to the features of specific tested systems and the tasks they solve. The properties of the DIS, that adopted from the applied technologies, are reflected also in the properties of ASTD tools. Moreover, the complexity of constructing technical tools ASTD often exceeds the complexity of the DIS <ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref> itself. It is often and naturally, for example, for systems of critical applications <ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref><ref type="bibr" target="#b21">[22]</ref>.</p><p>At the same time, there is transfer of the basic methods of DIS analysis and synthesis to a systemic, abstract-symbolic, structural-behavioral level, which has mappings to many possible technologies of physical implementation.</p><p>Additionally, the degree of dimensionality, uncertainty and intelligence of DIS behavior, of scalability, autonomy, mobility and situational dynamic the goal formation and the cooperation of DIS components for solving objective problems in a multi-level, multi-platform global network is increasing. This increasing degree requires appropriate improvement of verification and test tools, in particular, in the abstract, behavioral, decomposition, intelligent directions.</p><p>Thus, we can conclude, that the development of effective tools for ASTD new DIS is non-trivial and relevant.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Review of the known approaches</head><p>Formal behavioral analysis and synthesis of computer systems (CS), usually characterized by NPcomplexity <ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref>, is becoming increasingly important in systemic, structural and functional verification of projects of CS and check of its implementation.</p><p>The ongoing development of the mathematical theory of experiments with automata class models <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b23">24]</ref>, which define a formal methodology of behavioral checking and recognition, gradually raises the upper limits of applicability of check automata models.</p><p>Generally, these limits are determined by exponential (NP-complex) dependences of the complexity of such an analysis from the dimension of input models <ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref><ref type="bibr" target="#b16">[17]</ref><ref type="bibr" target="#b17">[18]</ref><ref type="bibr" target="#b18">[19]</ref>.</p><p>To reduce the complexity, in particular, the time of preparation and execution of the behavioral testing in the class of errors of functional automata mappings with preserved values of the completeness of the testing itself, a common (mathematical) and special (taking into account architectural solutions) network and hierarchical decomposition are used <ref type="bibr" target="#b24">[25]</ref><ref type="bibr" target="#b25">[26]</ref><ref type="bibr" target="#b26">[27]</ref><ref type="bibr" target="#b27">[28]</ref><ref type="bibr" target="#b28">[29]</ref> for checked systems most often.</p><p>They allow to reduce (usually polynomially) the exponential dependence of the dimension of complexity (computational resources) and time of constructing and performing of testing at a formal model level. Special probabilistic-statistical <ref type="bibr" target="#b29">[30]</ref><ref type="bibr" target="#b30">[31]</ref><ref type="bibr" target="#b31">[32]</ref>, fuzzy <ref type="bibr" target="#b32">[33]</ref><ref type="bibr" target="#b33">[34]</ref><ref type="bibr" target="#b34">[35]</ref><ref type="bibr" target="#b35">[36]</ref>, intelligent <ref type="bibr" target="#b36">[37,</ref><ref type="bibr" target="#b37">38]</ref>, in particular, evolutionary-genetic <ref type="bibr" target="#b24">[25,</ref><ref type="bibr" target="#b27">28,</ref><ref type="bibr" target="#b28">29,</ref><ref type="bibr" target="#b37">38]</ref> models and methods give experimental values for the complexity of behavioral testing for most real systems, that polynomially smaller, than the upper theoretical boundaries of deterministic methods, with a slight decrease in the completeness of this testing.</p><p>As a result, depending on the involved computing tools, behavioral check of acceptable completeness of checking for DIS of medium complexity becomes achievable, nevertheless, as noted, such a decrease does not remove this problem from the class of NP-complex ones.</p><p>The above circumstances determine the expediency of further development of verification and testing of CS, in particular, complex, formal, decomposition, intelligent, parallel check models and methods with the total effect of reducing the complexity of the computational costs of its preparation and implementation.</p><p>The growing tendency to classify a significant part of modern DIS to real-time and critical application systems, significantly strengthens the requirements for completeness, accuracy and relevance of operational checking of their performance, for resources, that necessary for its implementation.</p><p>This trend also encourages the use of complex ASTD, which include tools of online and offline testing, acting from the upper systemic, structural and functional level. In this case, the work of ASTD is inevitably based on formal models and methods of behavioral testing <ref type="bibr" target="#b23">[24,</ref><ref type="bibr" target="#b27">28,</ref><ref type="bibr" target="#b28">29,</ref><ref type="bibr" target="#b38">[39]</ref><ref type="bibr" target="#b39">[40]</ref><ref type="bibr" target="#b40">[41]</ref>, whether their analytical or intuitive expert implementations.</p><p>Behavioral testing of the CS makes it possible both for the online testing <ref type="bibr" target="#b28">[29]</ref>, that is backgrounding to the main functioning and performing the accumulation of check presentability of passive recognition experiments, as well as the special offline testing, that is interrupting the main functioning of the CS and performing active check experiments <ref type="bibr" target="#b27">[28]</ref>. Typically, both modes involve a previous (preprocessor) check analysis of the reference behavior of the CS with external or internal (own) procurement of elements of behavioral check.</p><p>The foregoing does not remove the advisability of continuing research on decomposition, compatible, dynamically integrated online and offline behavioral testing, especially for distributed, critical, intellectual CS, in particular, DIS, with dynamically reconfigurable of model representation, structure, composition and migration of components, general and component behavior.</p><p>These features, in particular, become characteristic of DIS and cause the expanding use of multiagent technologies. For such systems, a distributed, fuzzy, dynamic definition of the class of checked properties, completeness, accuracy and relevance of the checking are also characteristic. The consequence of this condition, in particular, can be considered the emergence of the class of ASTD DIS, essentially relying on models and methods of multi-agent technologies <ref type="bibr" target="#b41">[42]</ref>.</p><p>Taking into account the aforementioned, the tasks of system-functional, network and multi-level, integrated online and offline behavioral testing of DIS can be considered relevant and carried out. This testing executes on the basis of the dynamic cooperation of intelligent agents in the conditions of variable resources, that provided by the environment of the DIS itself. Also, this behavioral testing has variable check controllability, observability and heritability of own results, bases on agent, decomposition, deterministic and evolutionary models and methods.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Main researched tasks</head><p>A multilevel network modela extended hierarchical Petri net, adopted as the basic input model of checking agent for DIS,is characterized by a two-dimensional structure, alphabets and mappings of components, data and knowledge structures, that can change in the life cycle of a checked DIS, that hosts checking agents from MAS.</p><p>Online and offline testing of DIS is carried out by cooperations of agents from a set of Ag, that located into DIS environment. Atomic element, MAS agent agiAg, is the MAS model of the first level.</p><p>The goal of this work is the construction an agent check model agi, as a formalization of the representation of agent online and offline behavioral testing, performed on the basis of the Petri net S(f)ian automata class model for some DIS component.</p><p>These representations are selected in accordance with the contexts for MAC testing, namely: autonomous; mobile; purposeful or intellectual; cooperative.</p><p>To achieve this goal, the tasks of behavioral testing for PN S(f)i are formalized. These tasks are solved by the agent agiAg of a certain components of DIS and include: behavioral testing for an component Petri net S(f)i; controllability and observability of testing for the component Petri net S(f)i into the network model nS(f)i of DIS; inheritance of the elements of behavioral testing of a single-level Petri net S(f)i into the hierarchical model iS(f)i of DIS.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Formal model of behavioral testing</head><p>The model of behavioral agent-based testing is built on the basis of an extended Petri netan input automata class model <ref type="bibr" target="#b25">[26,</ref><ref type="bibr" target="#b27">28,</ref><ref type="bibr" target="#b28">29]</ref> for some i-th component of DIS of the form:</p><formula xml:id="formula_0">S(f)i=(P, T, Ev, Ac, X, Y, Ep, Et, Em, F, S, M, M0), (<label>1</label></formula><formula xml:id="formula_1">)</formula><p>where P, Tpositions and transitions, respectively; Ev, Acevents for positions and actions for transitions; X@Co, Y@Fuexternal controlled events and observed actions, supplemented by @an unknown event or action; Epthe set of variables for the energy costs, represented as triples epnep= <ref type="bibr">(</ref>  <ref type="figure">F:((B(P),S(B(P)</ref>))T×Ac×Et)B(P)))the incidence relation for subsets of positions from the Boolean {p1,…,pip}B(P) and transitions from T, that is depended from current events, actions and energy costs; S:(PEv×EpTAc×Et)the correspondence of own, internal variables of events, as well as actions, expanded by the metric of energy costs in positions and transitions, included in F; M0:PEm-the initial marking of positions, taking into account the initial energy costs of initialization, M:P×EmEmfunction of the current marking of positions and transitions, taking into account the current energy costs, accumulated during the movement of chips.</p><p>The model agi of the behavioral agent-based testing, which contains two components for simulated Petri nets (1), the deterministic reactive agRi and the evolutionary deliberative agDi <ref type="bibr" target="#b41">[42]</ref> has the form:</p><formula xml:id="formula_2">agi=(agRi, agDi, Evi, Aci, i),<label>(2)</label></formula><p>where agRi, agDiits reactive and deliberative components, that interact with each other in space and in time, they are functioning in the Petri net S(f)ithe behavioral model of some i-th component of DIS in its space-network nS(f)i <ref type="bibr" target="#b27">[28]</ref> and temporal hierarchical iS(f)i <ref type="bibr" target="#b28">[29]</ref> models; Evi, Acithe events and actions of the components; i:iIAcRiEvDi)(AcDiEvRi)))the relation of the interaction for reactive agRi and deliberative agDi components, both parallel (in space) and serial (in time).</p><p>The type, complexity and state of the Petri net S(f)i of the DIS and the multi-agent system (MAS) of testing, these states, as well as own targeting and tasks of agent agi affect to the form, complexity, priority, activation of agRi and agDi components.</p><p>The difference between reactive agRi and deliberative agDi of the check agent agi consists in the features of check tasks, models and methods, which are used into definition, constructing, and recognizing of the check objects.</p><p>In general, the agent model agi has information about the objects of check for reference checked properties Pri, identifiers Cii, check Cpi and link Lpi primitives, realized S(f)i(R Ac ) and transported</p><formula xml:id="formula_3">S(f)i(Tr Ev ) Petri nets, realizing T -1 (S(f)i) and transporting T(S(f)i) nodal subnets, realized S(f)i(R X T -1 (S(f)i))</formula><p>and transported S(f)i(Tr Y T(S(f)i)) nodal Petri nets necessary, inherited properties iPri , identifiers iCii, check iCpi and iLpi primitives, check fragments Cfi, realized Cfi R and transported Cfi Tr check fragments, inherited check fragments iCfi.</p><p>The intelligence of the check agent agi for its deliberative component agDi can be based on evolutionary approaches to check a type of check evolution <ref type="bibr" target="#b27">[28]</ref>:</p><formula xml:id="formula_4">Cei=(Cfi, Cpi, Lpi, Sgti, Cffi),<label>(3)</label></formula><p>where: Cfi, Cpi, Lpithe sets of check fragments, check and linking primitives, Сf0iinitial set of check fragments, Сf0i=СpiСfi, Сffifinal set of check fragments; SgtagDi={tagDi, tagDi, tagDi, tagDi, tagDi}the signature of operations and functions of check evolution, that contain special operations of mutation, crossover, immunity, fitness function, selection function, respectively. In the case of the presentation of DIS not only as checked, but also as a resource environment for hosting the checking MAS, the second extended model of the check agent agi (also agRi and agDi) <ref type="bibr" target="#b41">[42]</ref> is also presented as a system: agi=(cSi, cMi, Qi, Sti, {i, i, i}, {cs0i, cm0i, q0i, st0i}), <ref type="bibr" target="#b3">(4)</ref> where: -cSiagent check models for the i-th component of the placement in the DIS, which determine the check conditions; -cMiagent check methods for the i-th component of the placement in the DIS, which determine the implementation of check procedures; -Qiagent goals, for some qiQi, defined as:</p><p>qi:</p><formula xml:id="formula_5">((cSicMicSicMiQi, qi((csi,cmi),(csi',cmi'))= =(ki((i(csi')-i(csi)),(i(cmi')-i(cmi))), ki((i(csi')-i(csi)), (i(cmi')-i(cmi))), ki((i(csi')-i(csi)),(i(cmi')-i(cmi))), ki((i(csi')-i(csi)),(i(cmi')-i(cmi))), ki((i(csi')-i(csi)),(i(cmi')-i(cmi))), ki((i(csi')-i(csi)), (i(cmi')-i(cmi)))),<label>(5)</label></formula><p>where ki, ki, ki, ki, ki, ki, i, i, i, i=(i  , i  , i  ), i=(i  , i  , i  ), i=(i  , i  , i  )the weighted priority coefficients and determination functions, respectively, of completeness  of verification, length  (complexity), multiplicity , network realizability  and transportability , inter-level inheritance  of check (moreover, the functions of realizability, transportability, inheritance combine each of three own functions of preservation of completeness, lengths, multiples of check), csi and csi', cmi and cmi' -the initial and assumed next agent models and check methods for the placement component, respectively;  Sti -strategies for the agent's functioning -the agent's application of deterministic, pseudorandom, expert, evolutionary check methods in its life cycle, for some sti defined as:</p><p>sti:(jJ(csicmijjJcsicmi)j), (csi',cmi')=sti(csi,cmi);</p><p> {i, i, i}accent-agent operations directly displayed in the composition of check models from cMi, their signatures of operations and relations <ref type="bibr" target="#b4">(5)</ref>, in composition of check methods from cMi, their signatures of operations and relations (6), accordance with the models: a) abstract SgS(f)i={,,} -the signature of the check operations of identification, congruence, determination <ref type="bibr" target="#b23">[24]</ref>; b) network realizing and transporting compositions SgnS(f)i={@,,@',#} -the signature of the check compositionssequential, parallel, with feedback, DeMorgan half-convolution <ref type="bibr" target="#b27">[28,</ref><ref type="bibr" target="#b28">29]</ref>; c) hierarchical inheriting compositions SgiS(f)i={ p , t } -signature of check substitutions of macropositions and macro-transitions <ref type="bibr" target="#b28">[29]</ref>. Own agent operations include: 1. observation i:(jJ(csicmijVi(jJ(csicmij,</p><formula xml:id="formula_7">(csi,cmi)=i((jJ(csicmij,Vi)<label>(7)</label></formula><p>with the definition of the current agent check model and method, if necessary, the construction of identifiers Cii and check primitives Cpi in their composition, here Vi=(eni, agRi, Conni) is the complete environment of agent agi, for which: 1) eni=(S(f)i, nS(f)i, iS(f)i, Pli)abstract, twodimensional, network-hierarchical space of the agent world for the agent agi, provided by the ith component of DIS; </p><formula xml:id="formula_8">S(f)(R Ev T -1 (S(f)i))</formula><p>and output transportable S(f)(Tr Ac T(S(f)i)) nodal (for input and output topological subnets) partial Petri nets <ref type="bibr" target="#b25">[26,</ref><ref type="bibr" target="#b27">28]</ref>; 6) inherited, adjacent up or down for hierarchy, iS(f)i hierarchies of properties and transactions іPri, identifiers іCii, check iCpi and linking iLpi primitives, check fragments iCfi, respectively <ref type="bibr" target="#b28">[29]</ref>;  {cs0i, cm0i, q0i, st0i}initial agent check model, method, goal, strategy.</p><p>Then the combined agent check model csicSi from the above set models cSi for components of abstract S(f)i, network nS(f)i and hierarchical iS(f)i models is defined as:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>csi=((Wi ^,Cii,Cpi,Lpi,Cfi, SgS(f)i), (S(f)i(R Ac i),S(f)i(Tr Ev i),T -1 (S(f)i),T(S(f)i),S(f)i(R Ev</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>T -1 (S(f)i)),S(f)i(Tr Ac T(S(f)i)),SgnS(f)i ), (iPri,iCii,iCpi,iLpi,iCfi,SgiS(f)i)).</head><p>(</p><formula xml:id="formula_9">)<label>10</label></formula><p>The representation of the abstract component agent meta-method of behavioral check cmicMi as a special, asynchronous-event parallel behavioral procedure with many realizations, that is satisfying the conditions of the corresponding component agent check model csicSi, can be formally determined by using the special Petri net -a special kind of the Rabin-Scott automata, the components of which individually and the relationships for them were mostly determined earlier:</p><formula xml:id="formula_10">cmi=({W ^,Evi,Aci},jJ(Wij ^,Cfij,Prij,{ij,ij,ij}),{Pri,Cii,Cpi,Cfi},Mmi,</formula><p>{i,i,i},{i,i,i},{i,i,i},{i,i0},(Wi0 ^=Cfi0,Pri0=, {i0=0,i0=0,i0=0}),(WiF ^,CfiF,PriF,{iF,iF,iF})), <ref type="bibr" target="#b10">(11)</ref> where: a) {Evi,Aci </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Notes for method and implementation</head><p>The meta-method can be implemented in deterministic, pseudo-random, evolutionary, and also combined methods based on the search in depth and/or in width.</p><p>So, model evolutionary concretization and modification of the component agent method of behavioral testing cemiceMi has specialized view for evolutionary operations -i,-i and functions -i,-i,-i,-i,-i,-i: cemi=({W ^,Evi,Aci},jJ(Wij ^,Cfij,Prij,{ij,ij,ij}),{Pri,Cii,Cpi,Cfi},Mmi, {i,i,i},{i-i,-i,-i,i},{-i,-i,-i,-i,-i,-i},{i,i0}, (Wi0 ^=Cfi0,Pri0=,{i0=0,i0=0,i0=0}),(WiF ^,CfiF,PriF,{iF,iF,iF})), <ref type="bibr" target="#b11">(12)</ref> here modified objectsoperations and functions <ref type="bibr" target="#b23">[24,</ref><ref type="bibr" target="#b27">28,</ref><ref type="bibr" target="#b28">29]</ref> The procedure of the component agent evolutionary method cemi of behavioral testing is an event model and does not determine the serial-parallel organization of check, in particular, the combined organization of search in width and depth. Such an organization can be determined by using relations for subjects and objects in their structures and locations, as well as for their operations/functions.</p><p>Relationships include special (dependencies, generalizations, implementations, associations, aggregations, inheritance), basic (precedence, order, equivalence, compatibility, incompatibility, uncertainty, indifference), properties (reflexivity, symmetry, transitivity connectivity), both forming and limiting the possible structures of the actions of the method. At the internal level, these relations are determined by abstract resources shared in a certain way, first of all, by basic computer-processors, information objects, and communication tools.</p><p>Computing processors and communication tools directly depend on the environment of the agent's location, therefore, their influence on the relationship between objects and operations/functions of the agent is indirect to the environment of placement and can be considered instrumental.</p><p>Information objects are abstracted from the placement environment, their influence on the relationship between objects and agent operations/functions is direct and can be considered methodological. In this regard, it is necessary to consider the current, previous and subsequent influences -temporary relationships for objects (including information) and operations/functions, as well as their instances in the agent's lifetime. In such relations, the input and output weight characteristics of the action object (usually an information object) performed by the subject of the action (usually an operation/function) are significant. These weight characteristics are essential precisely for the subjects of action and their instances, when organizing the system of priorities and parallelism, and also the corresponding system of method relations.</p><p>Own relations for operations/functions, as subjects of the current moment of time and the current shared object of action in the evolutionary method of cemi behavioral check, are general relations: firstly, of direct preceding (see table <ref type="table">1</ref>), which defines adjacent sequential subjects of actionoperations/functions with the transfer of a action object between them; secondly, compatibility (see table <ref type="table">2</ref>), which defines parallel subjects of the action -operations/functions with conflict-free separation of the objects of action. It is obvious, that in the evolutionary method of behavioral check cemi for operations/functions, as subjects of the current moment of time, the relation of indifference acts for different current individual objects of action not separated by subjects. That is, parallelism for such operations/functions and individual objects is methodologically not limited.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>The Relationship of the immediate preceding (quasiorder)</p><formula xml:id="formula_11">i i i i- i - i - i i - i, - i, - i - i, - i,</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>-i i</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2</head><p>The ratio of compatibility (tolerance): The specificity of the check functioning of the deterministic reactive component agRi of the agent agithe execution of its operations {i, i, i}can be based on the methods of depth and breadth search with local search optimization for behavioral testing, which bases on experiments with automata model, and is characterized by computational NP-complexity. This circumstance implies the limitation of the analysis spacea subset of the DIS components by objects of medium complexity (up to 1000 positions/ /transitions) to obtain the solution of check tasks of the required characteristics. These characteristics include high completeness i, acceptable properties of length i and multiplicity i, realizability i, transportation i, inheritance i for spent of time i and memory i, limited by the upper bounds of the allocated computing resources RagRi=(MaxagRi, MaxagRi) of the reactive component agRi.</p><p>The specificity of the functioning of the deliberative component of the agent for performance of its operations {i, i, i} can be based on a pseudo-random goal-oriented check evolutionary search. As result, this functioning retains the upper exponential analytical estimates of deterministic methods for experiments with automata and Petri nets, but it has experimental complexity, significantly less computational NP-complexity of the latter.</p><p>This leads to the possibility of solution of check tasks of acceptable completeness and length with time and memory costs lower, than average. This range is limited by the lower and upper boundaries of the resources RagDi=(MaxagDi, MaxagDi) of the deliberative component in the analysis space of the objects above an average degree of complexity (more, than 1000 positions/transitions) -a subset of the DIS components and DIS in as a whole. The results of analytical modeling made it possible to verify the models and assess the domain of their applicability, in particular, the possibility of moving the NPcomplexity of the behavioral check into the reachable area.</p><p>Petri nets S(f) are represented in the memory of the controllers for monitoring systems by using of the list structures. Let the following dimensions of the sets be adopted for the Petri net: |P|=np, |T|=nt, n= np+nt, |X|=m, |Y|=l. The structures require for the upper limit of the number of conditional fields:</p><formula xml:id="formula_12">ciS max =(nt(4np+3L+4)+np(3m+2))+(iI nt i(4npi +3Li +4)+npi (3mi +2))+ +(jJ ntj(4npj +3Lj +4)+npj(3mj +2)). (<label>13</label></formula><formula xml:id="formula_13">)</formula><p>The complexity of the check analysis of Petri net S(f) includes the preprocessor and main stages for each of evolutions and is determined by upper bound: cciS max =nt(4np+3L+4)+np(3m+2)+2ntnp(nt-1)+2(2Lmnpnt) nt -3)+(nt-1)(npnt)!+ +(iI nt(4npi +3Li +4)+npi (3mi +2)+2ntinpi(nti -1)+2(2Liminpinti) niti -3)+(nti-1)(npinti)!)+ +(jJ ntjntj(4npj+3Lj+4)+npj(3mj+2)++2ntjnpj(ntj-1)+2(2Ljmjnpjntj) njt j -3)+(ntj-1)(npjntj)!). <ref type="bibr" target="#b13">(14)</ref> These formulas contain the three parts for Petri net and Petri subnets. The comparison of the online testing programs, based on automata-deterministic and Petri-evolutionary models and methods for onboard automated control systems and terminal video surveillance confirmed a decrease for the computational complexity of online testing and reducing the its time. Upper computational complexity and length of the online testing for the Determination (solid) and Evolutional (dashed) models and methods in cases of simple Petri net () and hierarchical Petri net () are presents in Fig. <ref type="figure" target="#fig_2">1</ref>.  The comparison of the results of basic programs for automata-deterministic and Petri-evolutionary models and methods of online testing for onboard automated control systems (BSAC) and terminal video surveillance (TVS) confirmed: a) decrease in computational complexity of online testing; b) reducing timer time of the check with preservation of: c) the length of the check and their d) completeness.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>The proposed agent-based model of behavioral checking by taking into account the resource conditions of the deployment environment, when checking the DIS components allows to balance and perform distributed behavioral online and offline testing, based on its combined deterministic and evolutionary models and methods, as well as models of the agent deployment environment in the DIS itself.</p><p>The proposed combined models, due to the decomposition of the check processes of the distributed MAS, coordinated with the resources of the DIS, make it possible to reduce the time of the DIS check by up to 90% in comparison with the non-decomposition approach.</p><p>These models and methods increase the completeness, accuracy and efficiency of the checking of the structure and functioning of real DIS with acceptable computational costs of the MAS level built into DIS. Its exponential complexity, limiting the use of behavioral check, is polynomially reduced due to component (DIS) and agent-based (MAS) decomposition. This, in turn, allows to check more complex DIS.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>: a) i-iassociations of evolutionary events and actions with identifiers, based on check identification i; b) -ibinary operation of a modifying or expanding mutation based on the check congruence i; c) -ibinary operation of modifying or expanding crossing-over based on the control congruence i; d) -ithe posteriori unary fitness function for determining the completeness i of a new check fragment Cfi (a new individual of evolution), based on the function for determining of the check completeness i; e) -ithe posteriori unary fitness function for determining the length (complexity) i of the new check fragment Cfi, based on the function for determining the check length i; g) -ithe posteriori unary fitness function for determining the multiplicity i of the new check fragment Cfi, based on the function for determining the check multiplicity ii; h) -ithe priori binary selection function for determining the total completeness i of the check fragments Cfi1 and Cfi2possible parents of the new check fragment Cfi, based on function for determination of the check completeness i; i) -i,the priori binary selection function for determining the total length (complexity) i of the control fragments Cfi1 and Cfi2possible parents of the new check fragment Cfi, based on function for determination of the check length i; j) -ithe priori binary selection function for determining the total multiplicity i of the check fragments Cfi1 and Cfi2possible parents of the new check fragment Cfi, based on the function for determination of the check multiplicity i.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Computational complexity and length of online testing of the Determ-solid &amp; Evol-dashed (simple PN  &amp; Hierarch.PN )</figDesc><graphic coords="10,298.20,134.97,222.49,154.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>epinep,epnep,eptnep) with componentsthe upper values of the energy expenditures, calculated on the electricity epinep, temperature difference epnep, time interval eptnep; Etvariables for the energy costs, represented as the triples etnet=(etinet,etnet,ettnet) with components -upper of values of the energy costs calculated on the electricity epinep, temperature difference epnep, time interval eptnep; Emweighted mandates for forming events and performing actions, having the form of a triple emnem=(eminem,emnem,emtnem) with componentscumulative values of energy costs, that are calculated</figDesc><table><row><cell>on</cell><cell>the</cell><cell>electricity</cell><cell>epinep,</cell><cell>temperature</cell><cell>difference</cell><cell>epnep,</cell><cell>time</cell><cell>interval</cell><cell>eptnep;</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>placements of the agent agi of the basic types (input, output, input-output, nodal in the structure, sub-structure, senior, middle, junior in the hierarchy) in+ the space eni; 2. the implementation of the strategy the agent world eni', agent agi', relations of placement Conni') for the existing agent model csi and method cmi of check, with definition (if necessary) of linking primitives Lpi and inherited properties іPri, with constructing of check fragments Cfi and determining for the set of achieved check fragments the values of completeness i, length i, multiplicity i, realizability i, transportability i, inheritance i;</figDesc><table><row><cell>i:StiViVi,</cell><cell></cell></row><row><cell>V'=i(sti, Vi)</cell><cell>(8)</cell></row><row><cell cols="2">-with obtaining the modified environment Vi'=( eni', agi', Conni') (in its composition -</cell></row><row><cell>modified spaces of 3. adaptation</cell><cell></cell></row><row><cell>i=(smi,sti),</cell><cell></cell></row><row><cell>smi:((jJ(csicmij((jJ(csicmijjJ(csicmij(jJ(csicmij,</cell><cell></cell></row><row><cell>(csi',cmi')=smi((jJ(csicmij,(csi,cmi),(csi',cmi')),</cell><cell></cell></row><row><cell>sti:(Sti(jJ(csicmijjJ(csicmijSti,</cell><cell></cell></row><row><cell>Sti'=sti(Sti,(csi,cmi),(csi',cmi'))</cell><cell>(9)</cell></row></table><note>2) Connithe placement relation (on functional levelusually the inclusion relation) between the check agent agi and the space eni for the checked i-th component; 3) Pli={plsubi, plini, plouti, plioi, plnodei, plsubni, plupi, plmidi, pllowi}a set of basic, including initial,with fixing updated sets (bases) of agent check models methods cMi and strategies Sti, consisting of: 1) identifiers Cii and check primitives Cpi; 2) check fragments Cfi; 3) output realizable S(f)(R Ac ) and input transportable S(f)(Tr Ev ) component (autonomous) partial Petri nets; 4) input realizing T -1 (S(f)i) and output transporting T(S(f)i) nodal topological subnets; 5) input realizable</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>,W ^}events Evi, actions Aci, input-output words W ^EviAci with unmarked (unrecognized) non-terminals from Evi\Xi and Aci\Yi; b) jJ(Wij ^,Cfij,Prij,{ij,ij,ij})states of Rabin-Scott automata, as part of the current sets of input-output words Wij ^, verified properties Prij, ,nmm} with elements -current cumulative values of variables of completeness nmm, length (complexity, time)nmm, multiplicity nmm of check; e) {i,i,i}operations: -i:(Wij ^,Evi,Aci)(Wij ^,Evi,Aci)registration of input-output words, events and actions, as a part of input-output words; -i:associations of events and actions with reference properties, identifiers, check primitives; -icompatibility (intersection) of the contexts of the neighborhoods from the</figDesc><table><row><cell cols="8">corresponding input-output words; g) {i,i,i} -operations, presented earlier, respectively, of</cell></row><row><cell cols="8">identifying i, congruence i and determining i; h) {i,i,i} -previously defined functions of</cell></row><row><cell cols="8">determining, respectively, completeness i, length (complexity)i, multiplicity i;</cell></row><row><cell cols="8">i) i0:(Wi0 ^=Cfi0,Pri0=,{i0=0,i0=0,i0=0}) {i0=0,i0=0,i0=0}-initialization markup for the</cell></row><row><cell>initial</cell><cell>state,</cell><cell>taking</cell><cell>into</cell><cell>account</cell><cell>zero</cell><cell>results,</cell><cell>here</cell></row><row><cell cols="8">mmi0={i0=0,i0=0,i0=0},i:(jJ(Wij ^,Cfij,Prij,{ij,ij,ij}))jJ{ij,ij,ij}) -function of the</cell></row><row><cell cols="8">current markup of states, taking into account the current completeness, length, multiplicity of check,</cell></row><row><cell cols="8">which are accumulated during movement in state and modified chips, here mmi={i,i,i}, for some</cell></row><row><cell>current</cell><cell cols="4">(Wij ^,Cfij,Prij,{ij,ij,ij})jJ(Wij ^,Cfij,Prij,</cell><cell>{ij,ij,ij}),</cell><cell>that</cell><cell>is</cell></row><row><cell cols="8">mmi={ij,ij,ij}=i((Wij ^,Cfij,Prij,{ij,ij,ij})); j) (Wi0 ^=Cfi0,Pri0=,{i0=0,i0=0, i0=0}) -</cell></row><row><cell cols="8">initialization markup for the initial state, taking into account the initial state of the Rabin-Scott</cell></row><row><cell cols="5">automata, consisting of initial sets of input-output words Wi0</cell><cell></cell><cell></cell><cell></cell></row></table><note>reached values of completeness ij, length ij, multiplicity ij of the check; c) {Pri,Cii,Cpi,Cfi}properties and transactions Pri, identifiers Cii, check primitives Cpi and fragments Cpi, presented earlier; d) Mmi={mm1,mm2,…,mmnmm}chipsweighted mandates for forming events in states (nonterminals) and performing actions in check fragments, the chip has the form of a triple mmnmm={nmm,nmm^, verified properties Pri0, initial (zero) values of completeness i0=0, length i0=0, multiplicity i0=0 of the check; k) (WF ^,CfiF,PriF,{iF,iF,iF})the final state of the Rabin-Scott automata, as a part of finite sets of input-output words WiF ^, verified properties of PriF, achieved values of completeness iF=i(PriF), length iF=i(CfiF), multiplicity iF=i(CfiF) of check.</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 3</head><label>3</label><figDesc>Experimental values of computational complexity of check: Object Degree of decomposition Input complexity Complexity of check</figDesc><table><row><cell>Module BSAC</cell><cell>8</cell><cell>362</cell><cell>64980</cell></row><row><cell>Module TVS</cell><cell>2</cell><cell>50</cell><cell>4323</cell></row><row><cell>Module IP/IPSec</cell><cell>3</cell><cell>115</cell><cell>71871</cell></row><row><cell>Module of Naming</cell><cell>2</cell><cell>146</cell><cell>38150450</cell></row><row><cell>Module of Encaps.</cell><cell>3</cell><cell>180</cell><cell>1572123</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">* * * * i * * * i * * * * * * i-i * * * * * * * -i * * * * * -i * * * * * i * * * * -i, * * -i, * * -i * * -i, * * * -i, * * * -i * * *Relationships of indifferent is valid for operations/functions, as subjects of the current moment of time, for different current (individual) action objects, that are not separated by these operations/functions in the evolutionary behavioral check method cemi, therefore, the parallelism for such operations/functions and individual objects is unlimited methodologically.</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">M</forename><surname>Josuttis</surname></persName>
		</author>
		<title level="m">SOA in Practice: The Art of Distributed System Design (Theory in Practice</title>
				<imprint>
			<publisher>O&apos;Reilly Media</publisher>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">М</forename><forename type="middle">Tamer</forename><surname>Ozsu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valduriez</surname></persName>
		</author>
		<title level="m">Principles of Distributed Database Systems</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note>3rd Edition</note>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Ouzzani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bouguettaya</surname></persName>
		</author>
		<title level="m">Semantic Web Services for Web Databases</title>
				<imprint>
			<publisher>Springer Science+Business Media</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Web-service Discovery Methods and Techniques: a Review</title>
		<author>
			<persName><forename type="first">S</forename><surname>Pakari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Kheirkhah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jalali</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Science, Engineering &amp; Information Technology</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="1" to="14" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Multi-agent systems and their applications</title>
		<author>
			<persName><forename type="first">X</forename><surname>Jing</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chen-Ching</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of International Council on electrical engineering</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="188" to="197" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">Y</forename><surname>Shoham</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Leyton-Brown</surname></persName>
		</author>
		<title level="m">Multiagent systems. Algorithmic, Game-Theoretic, and Logical Foundations (Revision 1.1</title>
				<imprint>
			<publisher>Shoham and Leyton-Brown</publisher>
			<date type="published" when="2009">2009. 2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Grid Computing: Making the Global Infrastructure a Reality</title>
		<author>
			<persName><forename type="first">F</forename><surname>Berman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Fox</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Hey</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>John Wiley &amp; Sons Ltd</publisher>
			<pubPlace>England</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<ptr target="http://linksceem.cyi.ac.cy/ls2/images/stories/UNICORE_Admin_Workshop.pdf" />
		<title level="m">Installation Guide for UNICORE Server Components</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">J</forename><surname>Date</surname></persName>
		</author>
		<title level="m">Date on Database: Writings 2000-2006</title>
				<imprint>
			<publisher>Apress</publisher>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Intel &quot;big data&quot; science and technology center vision and execution plan</title>
		<author>
			<persName><forename type="first">M</forename><surname>Stonebraker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Madden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dubey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM SIGMOD Record</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="44" to="49" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Russell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Norvig</surname></persName>
		</author>
		<title level="m">Artificial Intelligence: a Modern Approach</title>
				<meeting><address><addrLine>New Jersey</addrLine></address></meeting>
		<imprint>
			<publisher>Prentice-Hall, A Simon &amp; Schuster Company Englewood Cliffs</publisher>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">H</forename><surname>Winston</surname></persName>
		</author>
		<title level="m">Artificial Intelligence (3rd Edition)</title>
				<imprint>
			<publisher>Addison-Wesley Pub Co</publisher>
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
	<note>3rd edition</note>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">P</forename><surname>Norvig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Russell</surname></persName>
		</author>
		<title level="m">Artificial Intelligence: A Modern Approach</title>
				<imprint>
			<publisher>Prentice Hall</publisher>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
	<note>2nd Edition</note>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">E</forename><surname>Friedman-Hill</surname></persName>
		</author>
		<title level="m">Jess in Action: Rule-Based Systems in Java</title>
				<imprint>
			<publisher>Manning Publications Company</publisher>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Complex Industrial Systems Automation Based on the Internet of Things Implementation</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Kondratenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kozlov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Korobko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Topalov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Information and Communication Technologies in Education, Research, and Industrial Applications: ICTERI&apos;2017</title>
				<editor>
			<persName><forename type="first">N</forename><surname>Bassiliades</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">826</biblScope>
			<biblScope unit="page" from="164" to="187" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Development of Models in Resilient Computing</title>
		<author>
			<persName><forename type="first">O</forename><surname>Drozd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rucinski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Kochanski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Garbos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Maevsky</surname></persName>
		</author>
		<idno type="DOI">10.1109/DESSERT.2019.8770035</idno>
	</analytic>
	<monogr>
		<title level="m">10th IEEE International Conference on Dependable Systems</title>
				<meeting><address><addrLine>Leeds, UK</addrLine></address></meeting>
		<imprint>
			<publisher>Services and Technologies</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="2" to="7" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Cyber-Social Computing</title>
		<author>
			<persName><forename type="first">V</forename><surname>Hahanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mishchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Soklakova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Abdullayev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chumachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Litvinova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Green IT Engineering: Social, Business and Industrial Applications</title>
				<editor>
			<persName><forename type="first">V</forename><surname>Kharchenko</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Kondratenko</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Kacprzyk</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">171</biblScope>
			<biblScope unit="page" from="489" to="515" />
		</imprint>
	</monogr>
	<note>Studies in Systems, Decisions and Control</note>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Structural Complexity and its Implications for Design of Cyber Physical Systems</title>
		<author>
			<persName><forename type="first">K</forename><surname>Sinha</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014-01-03">January 3, 2014</date>
		</imprint>
		<respStmt>
			<orgName>Massachusetts Institute of Technology, Engineering Systems Division</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Ph.D. thesis</note>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Algorithm for the simplification of solution to discrete optimization problems</title>
		<author>
			<persName><forename type="first">S</forename><surname>Chernov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Titov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chernova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Goginskii</surname></persName>
		</author>
		<author>
			<persName><surname>Lb</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Chernova</surname></persName>
		</author>
		<author>
			<persName><surname>Koles</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Eastern-European Journal of Enterprise Technologies</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1" to="12" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A method of the hidden faults elimination in FPGA projects for the critical applications</title>
		<author>
			<persName><forename type="first">O</forename><surname>Drozd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kuznietsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Martynyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drozd</surname></persName>
		</author>
		<idno type="DOI">10.1109/DESSERT.2018.8409131</idno>
	</analytic>
	<monogr>
		<title level="m">9th IEEE International Conference DESSERT</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="231" to="234" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Using natural version redundancy of FPGA projects in area of critical applications</title>
		<author>
			<persName><forename type="first">O</forename><surname>Drozd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Romankevich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kuznietsov</surname></persName>
		</author>
		<idno type="DOI">10.1109/DESSERT50317.2020.9125050</idno>
	</analytic>
	<monogr>
		<title level="m">11th IEEE International Conference DESSERT</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="58" to="63" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Hidden fault analysis of FPGA projects for critical applications</title>
		<author>
			<persName><forename type="first">O</forename><surname>Drozd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Perebeinos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Martynyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Zashcholkin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Ivanova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Drozd</surname></persName>
		</author>
		<idno type="DOI">10.1109/TCSET49122.2020.235591</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference TCSET</title>
				<meeting><address><addrLine>Lviv-Slavsko, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="467" to="471" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Analysis and synthesis of abstract automata</title>
		<author>
			<persName><forename type="first">V</forename><surname>Kudryavtsev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Grunskii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kozlovskii</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Mathematical Sciences</title>
		<imprint>
			<biblScope unit="volume">169</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="481" to="532" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Automated Software Testing Using Metaheuristic Technique Based on An Praveen Ranjan Ant Colony Optimization Electronic System Design</title>
		<author>
			<persName><forename type="first">R</forename><surname>Praveen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">Km</forename><surname>Baby</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ISED), International Symposium</title>
				<meeting><address><addrLine>Bhubaneswar</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010-12">Dec. 2010. 2010</date>
			<biblScope unit="page" from="235" to="240" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Toward the Minimal Universal Petri Net</title>
		<author>
			<persName><forename type="first">D</forename><surname>Zaitsev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Systems, Man, and Cybernetics: Systems</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="47" to="58" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Synthesis of multilevel structures with multiple outputs</title>
		<author>
			<persName><forename type="first">V</forename><surname>Opanasenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kryvyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proc. of the 10th International Conference of Programming</title>
				<meeting><address><addrLine>UkrPROG; Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016-05-24">2016. 24 May 2016. 2016</date>
			<biblScope unit="volume">1631</biblScope>
			<biblScope unit="page" from="32" to="37" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Multidimensional Hierarchical Model of Behavioral Check of Distributed Information Systems</title>
		<author>
			<persName><forename type="first">O</forename><surname>Martynyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Drozd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Stepova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Martynyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Sugak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of 2019 IEEE East-West Design &amp; Test Symposium (EWDTS)</title>
				<meeting>of 2019 IEEE East-West Design &amp; Test Symposium (EWDTS)<address><addrLine>Batumi</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="517" to="522" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Evolutionary Network Model of Testing of the Distributed Information Systems</title>
		<author>
			<persName><forename type="first">O</forename><surname>Martynyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sugak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Martynyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Drozd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</title>
				<meeting>9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications<address><addrLine>Bucharest, Romania</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="888" to="893" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Hierachical Model of Behavior On-line Testing for Distributed Information Systems</title>
		<author>
			<persName><forename type="first">O</forename><surname>Martynyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Drozd</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ahmesh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">V</forename><surname>Thuong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mykhailova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Dombrovskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</title>
				<meeting><address><addrLine>Metz, France</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="724" to="729" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Feedback-directed random test generation</title>
		<author>
			<persName><forename type="first">C</forename><surname>Pacheco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Shuvendu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lahiri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ernst</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ball</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 29th International Conference on Software Engineering</title>
				<meeting>of the 29th International Conference on Software Engineering</meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="75" to="84" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">On the number and nature of faults found by random testing, Software Testing</title>
		<author>
			<persName><forename type="first">I</forename><surname>Ciupa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pretschner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Oriol</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Leitner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Meyer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Verification and Reliability</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="3" to="28" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Nicol</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">European Symposium on Research in Computer Security</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="454" to="471" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Takanen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">D</forename><surname>Demott</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Miller</surname></persName>
		</author>
		<title level="m">Fuzzing for Software Security Testing and Quality Assurance (Second Edition)</title>
				<imprint>
			<publisher>Artech House</publisher>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">Generating Test Cases for Web Services Using Data Perturbation</title>
		<author>
			<persName><forename type="first">J</forename><surname>Offutt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Xu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM SIGSOFT Software Engineering Notes</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="1" to="10" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Soft Computing Analytic Models for Increasing Efficiency of Fuzzy Information Processing in Decision Support Systems</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Kondratenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kondratenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Decision Making: Processes, Behavioral Influences and Role in Business Management</title>
				<editor>
			<persName><forename type="first">R</forename><surname>Hudson</surname></persName>
		</editor>
		<meeting><address><addrLine>New York</addrLine></address></meeting>
		<imprint>
			<publisher>Nova Science Publishers</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="41" to="78" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Model-based whitebox fuzzing for program binaries</title>
		<author>
			<persName><forename type="first">V.-T</forename><surname>Pham</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Böhme</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Roychoudhury</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering -ASE 2016</title>
				<meeting>the 31st IEEE/ACM International Conference on Automated Software Engineering -ASE 2016</meeting>
		<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="543" to="553" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Computer models solving intelligence test problems programs and implications</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hernández-Orallo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Martínez-Plumed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Schmid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Siebers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">L</forename><surname>Dowe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artifficial Intelligence</title>
		<imprint>
			<biblScope unit="volume">230</biblScope>
			<biblScope unit="page" from="74" to="107" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<analytic>
		<title level="a" type="main">Evolutionary test generation methods for digital devices, Design of Digital Systems and Devices</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Skobtsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Skobtsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="s">Lecture Notes in Electrical Engineering</title>
		<editor>M.Adamski et al.</editor>
		<imprint>
			<biblScope unit="volume">79</biblScope>
			<biblScope unit="page" from="331" to="361" />
			<date type="published" when="2011">2011</date>
			<publisher>SpringerVerlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">Featured Transition Systems: Foundations for Verifying Variability-Intensive Systems and Their Application to LTL Model Checking</title>
		<author>
			<persName><forename type="first">A</forename><surname>Classen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Cordy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">Y</forename><surname>Schobbens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Heymans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Legay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-F</forename><surname>Raskin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Software Engineering</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="1069" to="1089" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">On Theorem Prover-based Testing</title>
		<author>
			<persName><forename type="first">D</forename><surname>Brucker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Achim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Burkhart</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Formal Aspects of Computing</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="683" to="721" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<monogr>
		<title level="m" type="main">Behavioral Modeling for Embedded Systems and Technologies: Applications for Design and Implementation</title>
		<author>
			<persName><forename type="first">L</forename><surname>Gomes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Fernandes</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
			<publisher>International Science Reference</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">The hybrid agent model of behavioral testing</title>
		<author>
			<persName><forename type="first">A</forename><surname>Sugak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Martynyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Drozd</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computing</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="234" to="246" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
