{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:50:30Z","timestamp":1743133830726,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030037680"},{"type":"electronic","value":"9783030037697"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03769-7_26","type":"book-chapter","created":{"date-parts":[[2018,11,7]],"date-time":"2018-11-07T07:09:20Z","timestamp":1541574560000},"page":"437-446","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Environment for the ParTraP Trace Property Language (Tool Demonstration)"],"prefix":"10.1007","author":[{"given":"Ansem","family":"Ben Cheikh","sequence":"first","affiliation":[]},{"given":"Yoann","family":"Blein","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Chehida","sequence":"additional","affiliation":[]},{"given":"German","family":"Vega","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Ledru","sequence":"additional","affiliation":[]},{"given":"Lydie","family":"du Bousquet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,8]]},"reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-32759-9_9","volume-title":"FM 2012: Formal Methods","author":"H Barringer","year":"2012","unstructured":"Barringer, H., Falcone, Y., Havelund, K., Reger, G., Rydeheard, D.: Quantified event automata: towards expressive and efficient runtime monitors. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 68\u201384. Springer, Heidelberg (2012). \n                      https:\/\/doi.org\/10.1007\/978-3-642-32759-9_9"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-24622-0_5","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"H Barringer","year":"2004","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-based runtime verification. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 44\u201357. Springer, Heidelberg (2004). \n                      https:\/\/doi.org\/10.1007\/978-3-540-24622-0_5"},{"issue":"11","key":"26_CR3","doi-asserted-by":"publisher","first-page":"365","DOI":"10.2514\/1.49356","volume":"7","author":"H Barringer","year":"2010","unstructured":"Barringer, H., Groce, A., Havelund, K., Smith, M.H.: Formal analysis of log files. JACIC 7(11), 365\u2013390 (2010). \n                      https:\/\/doi.org\/10.2514\/1.49356","journal-title":"JACIC"},{"issue":"3","key":"26_CR4","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1093\/logcom\/exn076","volume":"20","author":"H Barringer","year":"2010","unstructured":"Barringer, H., Rydeheard, D.E., Havelund, K.: Rule systems for run-time monitoring: from Eagle to RuleR. J. Log. Comput. 20(3), 675\u2013706 (2010). \n                      https:\/\/doi.org\/10.1093\/logcom\/exn076","journal-title":"J. Log. Comput."},{"issue":"2","key":"26_CR5","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2699444","volume":"62","author":"DA Basin","year":"2015","unstructured":"Basin, D.A., Klaedtke, F., M\u00fcller, S., Zalinescu, E.: Monitoring metric first-order temporal properties. J. ACM 62(2), 15 (2015). \n                      https:\/\/doi.org\/10.1145\/2699444","journal-title":"J. ACM"},{"issue":"4","key":"26_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/2000799.2000800","volume":"20","author":"A Bauer","year":"2011","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20(4), 14 (2011). \n                      https:\/\/doi.org\/10.1145\/2000799.2000800","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"26_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/11901433_41","volume-title":"Formal Methods and Software Engineering","author":"A Bauer","year":"2006","unstructured":"Bauer, A., Leucker, M., Streit, J.: SALT\u2014structured assertion language for temporal logic. In: Liu, Z., He, J. (eds.) ICFEM 2006. LNCS, vol. 4260, pp. 757\u2013775. Springer, Heidelberg (2006). \n                      https:\/\/doi.org\/10.1007\/11901433_41"},{"key":"26_CR8","doi-asserted-by":"publisher","unstructured":"Blein, Y., Ledru, Y., du Bousquet, L., Groz, R.: Extending specification patterns for verification of parametric traces. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering, FormaliSE 2018, collocated with ICSE 2018, Gothenburg, Sweden, 2 June 2018, pp. 10\u201319. ACM (2018). \n                      https:\/\/doi.org\/10.1145\/3193992.3193998","DOI":"10.1145\/3193992.3193998"},{"key":"26_CR9","unstructured":"Blein, Y., Ledru, Y., du Bousquet, L., Groz, R., Cl\u00e8re, A., Bertrand, F.: MODMED WP1\/D1: preliminary definition of a domain specific specification language. Technical report, LIG, MinMaxMedical, BlueOrtho (2017)"},{"key":"26_CR10","unstructured":"Blein, Y., Tabikh, M.A., Ledru, Y.: MODMED WP4\/D1: test assessment - preliminary study and tool prototype. Technical report, LIG, MinMaxMedical, BlueOrtho (2017)"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-642-29860-8_27","volume-title":"Runtime Verification","author":"D Basin","year":"2012","unstructured":"Basin, D., Harvan, M., Klaedtke, F., Z\u0103linescu, E.: MONPOLY: monitoring usage-control policies. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol. 7186, pp. 360\u2013364. Springer, Heidelberg (2012). \n                      https:\/\/doi.org\/10.1007\/978-3-642-29860-8_27"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-41498-0_1","volume-title":"Controlled Natural Language","author":"A Calafato","year":"2016","unstructured":"Calafato, A., Colombo, C., Pace, G.J.: A controlled natural language for tax fraud detection. In: Davis, B., Pace, G.J.J., Wyner, A. (eds.) CNL 2016. LNCS (LNAI), vol. 9767, pp. 1\u201312. Springer, Cham (2016). \n                      https:\/\/doi.org\/10.1007\/978-3-319-41498-0_1"},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/978-3-662-49674-9_54","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"N Decker","year":"2016","unstructured":"Decker, N., Harder, J., Scheffel, T., Schmitz, M., Thoma, D.: Runtime monitoring with union-find structures. In: Chechik, M., Raskin, J.-F. (eds.) TACAS 2016. LNCS, vol. 9636, pp. 868\u2013884. Springer, Heidelberg (2016). \n                      https:\/\/doi.org\/10.1007\/978-3-662-49674-9_54"},{"key":"26_CR14","doi-asserted-by":"publisher","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: Boehm, B.W., Garlan, D., Kramer, J. (eds.) Proceedings of the 1999 International Conference on Software Engineering, ICSE 1999, Los Angeles, CA, USA, 16\u201322 May 1999, pp. 411\u2013420. ACM (1999). \n                      https:\/\/doi.org\/10.1145\/302405.302672","DOI":"10.1145\/302405.302672"},{"key":"26_CR15","doi-asserted-by":"publisher","unstructured":"Hall\u00e9, S., Villemaire, R.: Runtime monitoring of message-based workflows with data. In: 12th International IEEE Enterprise Distributed Object Computing Conference, ECOC 2008, Munich, Germany, 15\u201319 September 2008, pp. 63\u201372. IEEE Computer Society (2008). \n                      https:\/\/doi.org\/10.1109\/EDOC.2008.32","DOI":"10.1109\/EDOC.2008.32"},{"issue":"2","key":"26_CR16","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10009-014-0309-2","volume":"17","author":"K Havelund","year":"2015","unstructured":"Havelund, K.: Rule-based runtime verification revisited. STTT 17(2), 143\u2013170 (2015). \n                      https:\/\/doi.org\/10.1007\/s10009-014-0309-2","journal-title":"STTT"},{"issue":"4","key":"26_CR17","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/242224.242380","volume":"28","author":"D Jackson","year":"1996","unstructured":"Jackson, D., Wing, J.: Lightweight formal methods. ACM Comput. Surv. 28(4), 121 (1996). \n                      https:\/\/doi.org\/10.1145\/242224.242380","journal-title":"ACM Comput. Surv."},{"key":"26_CR18","doi-asserted-by":"publisher","unstructured":"Jin, D., Meredith, P.O., Lee, C., Rosu, G.: JavaMOP: efficient parametric runtime monitoring framework. In: Glinz, M., Murphy, G.C., Pezz\u00e8, M. (eds.) 34th International Conference on Software Engineering, ICSE 2012, Zurich, Switzerland, 2\u20139 June 2012, pp. 1427\u20131430. IEEE Computer Society (2012). \n                      https:\/\/doi.org\/10.1109\/ICSE.2012.6227231","DOI":"10.1109\/ICSE.2012.6227231"},{"key":"26_CR19","unstructured":"Ledru, Y., Blein, Y., du Bousquet, L., Groz, R., Cl\u00e8re, A., Bertrand, F.: Requirements for a trace property language for medical devices. In: 2018 IEEE\/ACM International Workshop on Software Engineering in Healthcare Systems, SEHS@ICSE 2018, Gothenburg, Sweden, 28 May 2018, pp. 30\u201333. ACM (2018). \n                      http:\/\/ieeexplore.ieee.org\/document\/8452638"},{"key":"26_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1007\/978-3-662-46681-0_55","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G Reger","year":"2015","unstructured":"Reger, G., Cruz, H.C., Rydeheard, D.: MarQ: monitoring at runtime with QEA. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 596\u2013610. Springer, Heidelberg (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-662-46681-0_55"},{"key":"26_CR21","doi-asserted-by":"publisher","unstructured":"Regis, G., Degiovanni, R., D\u2019Ippolito, N., Aguirre, N.: Specifying event-based systems with a counting fluent temporal logic. In: ICSE (1), pp. 733\u2013743. IEEE Computer Society (2015). \n                      https:\/\/doi.org\/10.1109\/ICSE.2015.86","DOI":"10.1109\/ICSE.2015.86"},{"key":"26_CR22","unstructured":"Reinkemeier, P., Stierand, I., Rehkop, P., Henkler, S.: A pattern-based requirement specification language: mapping automotive specific timing requirements. In: Reussner, R.H., Pretschner, A., J\u00e4hnichen, S. (eds.) Software Engineering 2011 - Workshopband (inkl. Doktorandensymposium), Fachtagung des GI-Fachbereichs Softwaretechnik, 21.-25.02.2011, Karlsruhe. LNI, vol.\u00a0184, pp. 99\u2013108. GI (2011). \n                      http:\/\/subs.emis.de\/LNI\/Proceedings\/Proceedings184\/article6316.html"},{"key":"26_CR23","doi-asserted-by":"publisher","unstructured":"Smith, R.L., Avrunin, G.S., Clarke, L.A., Osterweil, L.J.: PROPEL: an approach supporting property elucidation. In: Proceedings of the 24th International Conference on Software Engineering, ICSE 2002, Orlando, Florida, USA, 19\u201325 May 2002, pp. 11\u201321 (2002). \n                      https:\/\/doi.org\/10.1145\/581339.581345","DOI":"10.1145\/581339.581345"},{"key":"26_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-77395-5_15","volume-title":"Runtime Verification","author":"V Stolz","year":"2007","unstructured":"Stolz, V.: Temporal assertions with parametrised propositions. In: Sokolsky, O., Ta\u015f\u0131ran, S. (eds.) RV 2007. LNCS, vol. 4839, pp. 176\u2013187. Springer, Heidelberg (2007). \n                      https:\/\/doi.org\/10.1007\/978-3-540-77395-5_15"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03769-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T02:52:09Z","timestamp":1583203929000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03769-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030037680","9783030037697"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03769-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"8 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Runtime Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rv2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rv2018.isp.uni-luebeck.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"49","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3 tool papers were also accepted and included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}