{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T21:15:05Z","timestamp":1775769305819,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030781415","type":"print"},{"value":"9783030781422","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78142-2_7","type":"book-chapter","created":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T23:06:27Z","timestamp":1623107187000},"page":"106-120","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards Probabilistic Session-Type Monitoring"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0016-086X","authenticated-orcid":false,"given":"Christian","family":"Bartolo Burl\u00f2","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3829-7391","authenticated-orcid":false,"given":"Adrian","family":"Francalanza","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1153-6164","authenticated-orcid":false,"given":"Alceste","family":"Scalas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7675-6942","authenticated-orcid":false,"given":"Catia","family":"Trubiani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7032-3281","authenticated-orcid":false,"given":"Emilio","family":"Tuosto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,8]]},"reference":[{"issue":"POPL","key":"7_CR1","doi-asserted-by":"publisher","first-page":"52:1","DOI":"10.1145\/3290365","volume":"3","author":"L Aceto","year":"2019","unstructured":"Aceto, L., Achilleos, A., Francalanza, A., Ing\u00f3lfsd\u00f3ttir, A., Lehtinen, K.: Adventures in monitorability: from branching to linear time and back again. Proc. ACM Program. Lang. 3(POPL), 52:1\u201352:29 (2019). https:\/\/doi.org\/10.1145\/3290365","journal-title":"Proc. ACM Program. Lang."},{"issue":"2","key":"7_CR2","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10270-020-00860-z","volume":"20","author":"L Aceto","year":"2021","unstructured":"Aceto, L., Achilleos, A., Francalanza, A., Ing\u00f3lfsd\u00f3ttir, A., Lehtinen, K.: An operational guide to monitorability with applications to regular properties. Softw. Syst. Model. 20(2), 335\u2013361 (2021). https:\/\/doi.org\/10.1007\/s10270-020-00860-z","journal-title":"Softw. Syst. Model."},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s10260-005-0121-y","volume":"14","author":"A Agresti","year":"2005","unstructured":"Agresti, A., Hitchcock, D.B.: Bayesian inference for categorical data analysis. Stat. Methods Appl. 14(3), 297\u2013330 (2005). https:\/\/doi.org\/10.1007\/s10260-005-0121-y","journal-title":"Stat. Methods Appl."},{"key":"7_CR4","unstructured":"Bartolo Burl\u00f2, C., Francalanza, A., Scalas, A.: On the monitorability of session types, in theory and practice. In: 35th European Conference on Object-Oriented Programming, ECOOP 2021, 12\u201317 July 2021 (2021, to appear)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-030-50086-3_13","volume-title":"Formal Techniques for Distributed Objects, Components, and Systems","author":"C Bartolo Burl\u00f2","year":"2020","unstructured":"Bartolo Burl\u00f2, C., Francalanza, A., Scalas, A.: Towards a hybrid verification methodology for communication protocols (short paper). In: Gotsman, A., Sokolova, A. (eds.) FORTE 2020. LNCS, vol. 12136, pp. 227\u2013235. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50086-3_13"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.tcs.2017.02.009","volume":"669","author":"L Bocchi","year":"2017","unstructured":"Bocchi, L., Chen, T., Demangeon, R., Honda, K., Yoshida, N.: Monitoring networks through multiparty session types. Theor. Comput. Sci. 669, 33\u201358 (2017). https:\/\/doi.org\/10.1016\/j.tcs.2017.02.009","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"7_CR7","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1145\/322374.322380","volume":"30","author":"D Brand","year":"1983","unstructured":"Brand, D., Zafiropulo, P.: On communicating finite-state machines. J. ACM 30(2), 323\u2013342 (1983). https:\/\/doi.org\/10.1145\/322374.322380","journal-title":"J. ACM"},{"key":"7_CR8","unstructured":"Das, A., Wang, D., Hoffmann, J.: Probabilistic resource-aware session types. CoRR abs\/2011.09037 (2020). https:\/\/arxiv.org\/abs\/2011.09037"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-030-32079-9_12","volume-title":"Runtime Verification","author":"JH Dawes","year":"2019","unstructured":"Dawes, J.H., Reger, G.: Explaining violations of properties in control-flow temporal logic. In: Finkbeiner, B., Mariani, L. (eds.) RV 2019. LNCS, vol. 11757, pp. 202\u2013220. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32079-9_12"},{"key":"7_CR10","unstructured":"Esparza, J., Kiefer, S., Kret\u00ednsk\u00fd, J., Weininger, M.: Online monitoring $$\\omega $$-regular properties in unknown Markov chains. CoRR abs\/2010.08347 (2020). https:\/\/arxiv.org\/abs\/2010.08347"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/TSE.2015.2421318","volume":"42","author":"A Filieri","year":"2016","unstructured":"Filieri, A., Tamburrelli, G., Ghezzi, C.: Supporting self-adaptation via quantitative verification and sensitivity analysis at run time. IEEE Trans. Softw. Eng. 42(1), 75\u201399 (2016). https:\/\/doi.org\/10.1109\/TSE.2015.2421318","journal-title":"IEEE Trans. Softw. Eng."},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-642-35632-2_30","volume-title":"Runtime Verification","author":"V Forejt","year":"2013","unstructured":"Forejt, V., Kwiatkowska, M., Parker, D., Qu, H., Ujma, M.: Incremental runtime verification of probabilistic systems. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 314\u2013319. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35632-2_30"},{"key":"7_CR13","doi-asserted-by":"publisher","unstructured":"Francalanza, A.: A theory of monitors. Inf. Computa. 104704 (2021, to appear). https:\/\/doi.org\/10.1016\/j.ic.2021.104704","DOI":"10.1016\/j.ic.2021.104704"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s10703-017-0273-z","volume":"51","author":"A Francalanza","year":"2017","unstructured":"Francalanza, A., Aceto, L., Ing\u00f3lfsd\u00f3ttir, A.: Monitorability for the Hennessy-Milner logic with recursion. Formal Methods Syst. Des. 51(1), 87\u2013116 (2017). https:\/\/doi.org\/10.1007\/s10703-017-0273-z","journal-title":"Formal Methods Syst. Des."},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"100636","DOI":"10.1016\/j.jlamp.2020.100636","volume":"119","author":"A Francalanza","year":"2021","unstructured":"Francalanza, A., Cini, C.: Computer says no: verdict explainability for runtime monitors using a local proof system. J. Log. Algebraic Methods Program. 119, 100636 (2021). https:\/\/doi.org\/10.1016\/j.jlamp.2020.100636","journal-title":"J. Log. Algebraic Methods Program."},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-030-47361-7_6","volume-title":"Reversible Computation: Extending Horizons of Computing","author":"A Francalanza","year":"2020","unstructured":"Francalanza, A., Mezzina, C.A., Tuosto, E.: Towards choreographic-based monitoring. In: Ulidowski, I., Lanese, I., Schultz, U.P., Ferreira, C. (eds.) RC 2020. LNCS, vol. 12070, pp. 128\u2013150. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-47361-7_6"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/978-3-319-89884-1_27","volume-title":"Programming Languages and Systems","author":"H Gommerstadt","year":"2018","unstructured":"Gommerstadt, H., Jia, L., Pfenning, F.: Session-typed concurrent contracts. In: Ahmed, A. (ed.) ESOP 2018. LNCS, vol. 10801, pp. 771\u2013798. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89884-1_27"},{"issue":"3","key":"7_CR18","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.infsof.2010.10.003","volume":"53","author":"L Grunske","year":"2011","unstructured":"Grunske, L.: An effective sequential statistical test for probabilistic monitoring. Inf. Softw. Technol. 53(3), 190\u2013199 (2011). https:\/\/doi.org\/10.1016\/j.infsof.2010.10.003","journal-title":"Inf. Softw. Technol."},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Inverso, O., Melgratti, H.C., Padovani, L., Trubiani, C., Tuosto, E.: Probabilistic analysis of binary sessions. In: CONCUR. LIPIcs, vol. 171, pp. 14:1\u201314:21. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2020). https:\/\/doi.org\/10.4230\/LIPIcs.CONCUR.2020.14","DOI":"10.4230\/LIPIcs.CONCUR.2020.14"},{"key":"7_CR20","series-title":"CRC Biostatistics Series","doi-asserted-by":"publisher","DOI":"10.1201\/b12670","volume-title":"Confidence Intervals for Proportions and Related Measures of Effect Size","author":"RG Newcombe","year":"2012","unstructured":"Newcombe, R.G.: Confidence Intervals for Proportions and Related Measures of Effect Size. CRC Biostatistics Series. CRC Press, Chapman & Hall, Boca Raton (2012)"},{"issue":"11","key":"7_CR21","doi-asserted-by":"publisher","first-page":"3288","DOI":"10.1109\/TCAD.2020.3012643","volume":"39","author":"I Ruchkin","year":"2020","unstructured":"Ruchkin, I., Sokolsky, O., Weimer, J., Hedaoo, T., Lee, I.: Compositional probabilistic analysis of temporal properties over stochastic detectors. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 39(11), 3288\u20133299 (2020). https:\/\/doi.org\/10.1109\/TCAD.2020.3012643","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circ. Syst."},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Scalas, A., Yoshida, N.: Lightweight session programming in scala. In: ECOOP. LIPIcs, vol. 56, pp. 21:1\u201321:28. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2016). https:\/\/doi.org\/10.4230\/LIPIcs.ECOOP.2016.21","DOI":"10.4230\/LIPIcs.ECOOP.2016.21"},{"issue":"1","key":"7_CR23","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"FB Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30\u201350 (2000). https:\/\/doi.org\/10.1145\/353323.353382","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-642-29860-8_15","volume-title":"Runtime Verification","author":"SD Stoller","year":"2012","unstructured":"Stoller, S.D., et al.: Runtime verification with state estimation. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol. 7186, pp. 193\u2013207. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29860-8_15"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Wilson, E.B.: Probable inference, the law of succession, and statistical inference. J. Am. Stat. Assoc. 22(158), 209\u2013212 (1927). https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01621459.1927.10502953","DOI":"10.1080\/01621459.1927.10502953"},{"key":"7_CR26","doi-asserted-by":"publisher","unstructured":"Zhu, Y., Xu, M., Zhang, P., Li, W., Leung, H.: Bayesian probabilistic monitor: a new and efficient probabilistic monitoring approach based on Bayesian statistics. In: QSIC, pp. 45\u201354. IEEE (2013). https:\/\/doi.org\/10.1109\/QSIC.2013.55","DOI":"10.1109\/QSIC.2013.55"}],"container-title":["Lecture Notes in Computer Science","Coordination Models and Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78142-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T22:02:18Z","timestamp":1749333738000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78142-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030781415","9783030781422"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78142-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"8 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COORDINATION","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Coordination Languages and Models","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valletta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coordination2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.discotec.org\/2021\/coordination.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic this event was held virutally.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}