{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:10:22Z","timestamp":1766049022085},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030010898"},{"type":"electronic","value":"9783030010904"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01090-4_16","type":"book-chapter","created":{"date-parts":[[2018,9,29]],"date-time":"2018-09-29T11:23:23Z","timestamp":1538220203000},"page":"267-283","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Signal Convolution Logic"],"prefix":"10.1007","author":[{"given":"Simone","family":"Silvetti","sequence":"first","affiliation":[]},{"given":"Laura","family":"Nenzi","sequence":"additional","affiliation":[]},{"given":"Ezio","family":"Bartocci","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Bortolussi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,30]]},"reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-319-21668-3_21","volume-title":"Computer Aided Verification","author":"Takumi Akazaki","year":"2015","unstructured":"Akazaki, Takumi, Hasuo, Ichiro: Time robustness in MTL and expressivity in hybrid system falsification. In: Kroening, Daniel, P\u0103s\u0103reanu, Corina S. (eds.) CAV 2015. LNCS, vol. 9207, pp. 356\u2013374. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21668-3_21"},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-642-40708-6_13","volume-title":"Computational Methods in Systems Biology","author":"Ezio Bartocci","year":"2013","unstructured":"Bartocci, E., Bortolussi, L., Nenzi, L.: A temporal logic approach to modular design of synthetic biological circuits. In: Proceedings of CMSB, pp. 164\u2013177. Springer, Berlin (2013)"},{"key":"16_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.tcs.2015.02.046","volume":"587","author":"E Bartocci","year":"2015","unstructured":"Bartocci, E., Bortolussi, L., Nenzi, L., Sanguinetti, G.: System design of stochastic models using robustness of temporal properties. Theor. Comput. Sci. 587, 3\u201325 (2015)","journal-title":"Theor. Comput. Sci."},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-75632-5_5","volume-title":"Lectures on Runtime Verification","author":"Ezio Bartocci","year":"2018","unstructured":"Bartocci, Ezio, Deshmukh, Jyotirmoy, Donz\u00e9, Alexandre, Fainekos, Georgios, Maler, Oded, Ni\u010dkovi\u0107, Dejan, Sankaranarayanan, Sriram: Specification-based monitoring of cyber-physical systems: a survey on theory, tools and applications. In: Bartocci, Ezio, Falcone, Yli\u00e8s (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 135\u2013175. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_5"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-23820-3_1","volume-title":"Runtime Verification","author":"Fraser Cameron","year":"2015","unstructured":"Cameron, Fraser, Fainekos, Georgios, Maahs, David M., Sankaranarayanan, Sriram: Towards a verified artificial pancreas: challenges and solutions for runtime verification. In: Bartocci, Ezio, Majumdar, Rupak (eds.) RV 2015. LNCS, vol. 9333, pp. 3\u201317. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23820-3_1"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-14295-6_17","volume-title":"Computer Aided Verification","author":"Alexandre Donz\u00e9","year":"2010","unstructured":"Donz\u00e9, Alexandre: Breach, a toolbox for verification and parameter synthesis of hybrid systems. In: Touili, Tayssir, Cook, Byron, Jackson, Paul (eds.) CAV 2010. LNCS, vol. 6174, pp. 167\u2013170. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14295-6_17"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-15297-9_9","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"Alexandre Donz\u00e9","year":"2010","unstructured":"Donz\u00e9, Alexandre, Maler, Oded: Robust satisfaction of temporal logic over real-valued signals. In: Chatterjee, Krishnendu, Henzinger, Thomas A. (eds.) FORMATS 2010. LNCS, vol. 6246, pp. 92\u2013106. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15297-9_9"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Fainekos, G.E., Sankaranarayanan, S., Ueda, K., Yazarel, H.: Verification of automotive control applications using S-TaLiRo. In: Proceedings of ACC. IEEE (2012)","DOI":"10.1109\/ACC.2012.6315384"},{"issue":"42","key":"16_CR9","doi-asserted-by":"publisher","first-page":"4262","DOI":"10.1016\/j.tcs.2009.06.021","volume":"410","author":"GE Fainekos","year":"2009","unstructured":"Fainekos, G.E., Pappas, G.J.: Robustness of temporal logic specifications for continuous-time signals. Theor. Comput. Sci. 410(42), 4262\u20134291 (2009)","journal-title":"Theor. Comput. Sci."},{"issue":"4","key":"16_CR10","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1088\/0967-3334\/25\/4\/010","volume":"25","author":"R Hovorka","year":"2004","unstructured":"Hovorka, R., Canonico, V., Chassin, L.J., Haueter, U., Massi-Benedetti, M., Federici, M.O., Pieber, T.R., Schaller, H.C., Schaupp, L., Vering, T.: Nonlinear model predictive control of glucose concentration in subjects with type 1 diabetes. Physiol. Meas. 25(4), 905 (2004)","journal-title":"Physiol. Meas."},{"issue":"1","key":"16_CR11","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10817-017-9413-9","volume":"60","author":"S Jha","year":"2018","unstructured":"Jha, S., Raman, V., Sadigh, D., Seshia, S.A.: Safe autonomy under perception uncertainty using chance-constrained temporal logic. J. Autom. Reason. 60(1), 43\u201362 (2018)","journal-title":"J. Autom. Reason."},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Li, J., Nuzzo, P., Sangiovanni-Vincentelli, A., Xi, Y., Li, D.: Stochastic contracts for cyber-physical system design under probabilistic requirements. In: Proceedings of MEMOCODE, pp. 5\u201314. ACM (2017)","DOI":"10.1145\/3127041.3127045"},{"key":"16_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-30206-3_12","volume-title":"Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems","author":"Oded Maler","year":"2004","unstructured":"Maler, Oded, Nickovic, Dejan: Monitoring temporal properties of continuous signals. In: Lakhnech, Yassine, Yovine, Sergio (eds.) FORMATS\/FTRTFT -2004. LNCS, vol. 3253, pp. 152\u2013166. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30206-3_12"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Rodionova, A., Bartocci, E., Ni\u010dkovi\u0107, D., Grosu, R.: Temporal logic as filtering. In: Proceedings of HSCC 2016, pp. 11\u201320. ACM (2016)","DOI":"10.1145\/2883817.2883839"},{"key":"16_CR15","unstructured":"Sadigh, D., Kapoor, A.: Safe control under uncertainty with probabilistic signal temporal logic. In: Robotics: Science and Systems XII, University of Michigan, Ann Arbor, Michigan, USA, June 18 - June 22, 2016 (2016)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Sankaranarayanan, S., Fainekos, G.: Falsification of temporal properties of hybrid systems using the cross-entropy method. In: Proc. of HSCC. pp. 125\u2013134 (2012)","DOI":"10.1145\/2185632.2185653"},{"issue":"2","key":"16_CR17","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/3076125.3076128","volume":"14","author":"S Sankaranarayanan","year":"2017","unstructured":"Sankaranarayanan, S., Kumar, S.A., Cameron, F., Bequette, B.W., Fainekos, G., Maahs, D.M.: Model-based falsification of an artificial pancreas control system. SIGBED Rev. 14(2), 24\u201333 (2017). Mar","journal-title":"SIGBED Rev."},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-319-70389-3_9","volume-title":"Hardware and Software: Verification and Testing","author":"Fedor Shmarov","year":"2017","unstructured":"Shmarov, F., Paoletti, N., Bartocci, E., Lin, S., Smolka, S.A., Zuliani, P.: SMT-based synthesis of safe and robust PID controllers for stochastic hybrid systems. In: Proceedings of HVC, pp. 131\u2013146 (2017)"}],"container-title":["Lecture Notes in Computer Science","Automated Technology for Verification and Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01090-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T23:33:00Z","timestamp":1571959980000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01090-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030010898","9783030010904"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01090-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ATVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Automated Technology for Verification and Analysis","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Los Angeles, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atva2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/atva-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}