{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:33:39Z","timestamp":1766050419026,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031401312"},{"type":"electronic","value":"9783031401329"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40132-9_17","type":"book-chapter","created":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T11:02:20Z","timestamp":1692183740000},"page":"272-288","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Space Telemetry Analysis with\u00a0PyContract"],"prefix":"10.1007","author":[{"given":"Bevin","family":"Duckett","sequence":"first","affiliation":[]},{"given":"Klaus","family":"Havelund","sequence":"additional","affiliation":[]},{"given":"Luke","family":"Stewart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,17]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2021.102610","volume":"205","author":"D Ancona","year":"2021","unstructured":"Ancona, D., Franceschini, L., Ferrando, A., Mascardi, V.: RML: theory and practice of a domain specific language for runtime verification. Sci. Comput. Prog. 205, 102610 (2021)","journal-title":"Sci. Comput. Prog."},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-24622-0_5","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"H Barringer","year":"2004","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-based runtime verification. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 44\u201357. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24622-0_5"},{"key":"17_CR3","doi-asserted-by":"publisher","unstructured":"Barringer, H., Havelund, K.: TraceContract: a Scala DSL for trace analysis. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol. 6664, pp. 57\u201372. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21437-0_7","DOI":"10.1007\/978-3-642-21437-0_7"},{"key":"17_CR4","doi-asserted-by":"publisher","unstructured":"Barringer, H., Rydeheard, D., Havelund, K.: Rule systems for run-time monitoring: from Eagle to RuleR. In: Sokolsky, O., Ta\u015f\u0131ran, S. (eds.) RV 2007. LNCS, vol. 4839, pp. 111\u2013125. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77395-5_10","DOI":"10.1007\/978-3-540-77395-5_10"},{"issue":"3","key":"17_CR5","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/s10703-015-0222-7","volume":"46","author":"D Basin","year":"2015","unstructured":"Basin, D., Klaedtke, F., Marinovic, S., Z\u0103linescu, E.: Monitoring of temporal first-order properties with aggregations. Formal Method. Syst. Des. 46(3), 262\u2013285 (2015). https:\/\/doi.org\/10.1007\/s10703-015-0222-7","journal-title":"Formal Method. Syst. Des."},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-77395-5_11","volume-title":"Runtime Verification","author":"A Bauer","year":"2007","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: The good, the bad, and the ugly, but how ugly is ugly? In: Sokolsky, O., Ta\u015f\u0131ran, S. (eds.) RV 2007. LNCS, vol. 4839, pp. 126\u2013138. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77395-5_11"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Castano, R., et al.: Operations for autonomous spacecraft. In: 2022 IEEE Aerospace Conference (AERO). IEEE (2022)","DOI":"10.1109\/AERO53065.2022.9843352"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, K.-T., Krishnakumar, A.: Automatic functional test generation using the extended finite state machine model. In: 30th ACM\/IEEE Design Automation Conference, pp. 86\u201391 (1993)","DOI":"10.1145\/157485.164585"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: LARVA \u2013 safer monitoring of real-time Java programs (tool paper). In: Proceedings of the 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods (SEFM 2009), Washington, DC, pp. 33\u201337. IEEE Computer Society (2009)","DOI":"10.1109\/SEFM.2009.13"},{"key":"17_CR10","doi-asserted-by":"publisher","unstructured":"Dams, D., Havelund, K., Kauffman, S.: A Python library for trace analysis. In: Dang, T., Stolz, V. (eds.) Proceedings of the 22nd International Conference on Runtime Verification (RV). LNCS, vol. 13498, pp. 264\u2013273. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17196-3_15","DOI":"10.1007\/978-3-031-17196-3_15"},{"key":"17_CR11","doi-asserted-by":"publisher","unstructured":"Dams, D., Havelund, K., Kauffman, S.: Runtime verification as documentation. In: Margaria, T., Steffen, B. (eds.) Leveraging Applications of Formal Methods, Verification and Validation. Software Engineering (ISoLA). LNCS, vol. 13702, pp. 157\u2013173. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19756-7_9","DOI":"10.1007\/978-3-031-19756-7_9"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"D\u2019Angelo, B., et al.: LOLA: runtime monitoring of synchronous systems. In: Proceedings of TIME 2005: The 12th International Symposium on Temporal Representation and Reasoning, pp. 166\u2013174. IEEE (2005)","DOI":"10.1109\/TIME.2005.26"},{"key":"17_CR13","unstructured":"Dash. https:\/\/plotly.com\/dash"},{"key":"17_CR14","unstructured":"Daut. https:\/\/github.com\/havelund\/daut"},{"issue":"2","key":"17_CR15","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/s10009-015-0380-3","volume":"18","author":"N Decker","year":"2016","unstructured":"Decker, N., Leucker, M., Thoma, D.: Monitoring modulo theories. Softw. Tools Technol. Transf. 18(2), 205\u2013225 (2016)","journal-title":"Softw. Tools Technol. Transf."},{"key":"17_CR16","unstructured":"Europa Clipper Mission. https:\/\/europa.nasa.gov"},{"key":"17_CR17","unstructured":"Fowler, M., Parsons, R.: Domain-Specific Languages. Addison-Wesley (2010)"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Gibbons, J., Wu, N.: Folding domain-specific languages: deep and shallow embeddings (functional pearl). In: Proceedings of the 19th ACM SIGPLAN International Conference on Functional Programming (ICFP 2014), New York, pp. 339\u2013347. Association for Computing Machinery (2014)","DOI":"10.1145\/2628136.2628138"},{"issue":"2","key":"17_CR19","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/TSC.2011.10","volume":"5","author":"S Hall\u00e9","year":"2012","unstructured":"Hall\u00e9, S., Villemaire, R.: Runtime enforcement of web service message contracts with data. IEEE Trans. Serv. Comput. 5(2), 192\u2013206 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Havelund, K.: Data automata in Scala. In: 2014 Theoretical Aspects of Software Engineering Conference, TASE 2014, Changsha, 1\u20133 Sept 2014, pp. 1\u20139. IEEE Computer Society (2014)","DOI":"10.1109\/TASE.2014.37"},{"issue":"2","key":"17_CR21","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s10009-014-0309-2","volume":"17","author":"K Havelund","year":"2015","unstructured":"Havelund, K.: Rule-based runtime verification revisited. Softw. Tools Technol. Transf. 17(2), 143\u2013170 (2015)","journal-title":"Softw. Tools Technol. Transf."},{"key":"17_CR22","doi-asserted-by":"publisher","unstructured":"Kauffman, S., Havelund, K., Joshi, R.: nfer \u2013 a notation and system for inferring event stream abstractions. In: Falcone, Y., S\u00e1nchez, C. (eds.) RV 2016. LNCS, vol. 10012, pp. 235\u2013250. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46982-9_15","DOI":"10.1007\/978-3-319-46982-9_15"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Kim, M., Kannan, S., Lee, I., Sokolsky, O.: Java-MaC: a run-time assurance tool for Java. In: Proceedings of the 1st International Workshop on Runtime Verification (RV 2001). Electronic Notes in Theoretical Computer Science, vol. 55, no. 2. Elsevier (2001)","DOI":"10.1016\/S1571-0661(04)00254-3"},{"key":"17_CR24","doi-asserted-by":"publisher","unstructured":"Kurklu, E., Havelund, K.: A flight rule checker for the LADEE lunar spacecraft. In: Pun, V.K.I., Stolz, V., Simao, A. (eds.) ICTAC 2020. LNCS, vol. 12545, pp. 3\u201320. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64276-1_1","DOI":"10.1007\/978-3-030-64276-1_1"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Meredith, P.O., Jin, D., Griffith, D., Chen, F., Ro\u015fu, G.: An overview of the MOP runtime verification framework. Int. J. Softw. Techniq. Technol. Transf. 249\u2013289 (2011)","DOI":"10.1007\/s10009-011-0198-6"},{"key":"17_CR26","unstructured":"Pandas. https:\/\/pandas.pydata.org"},{"key":"17_CR27","unstructured":"PlantUML. http:\/\/plantuml.com"},{"key":"17_CR28","unstructured":"PyContract. https:\/\/github.com\/pyrv\/pycontract"},{"key":"17_CR29","unstructured":"Python Pattern Matching. https:\/\/peps.python.org\/pep-0636"},{"key":"17_CR30","doi-asserted-by":"publisher","unstructured":"Reger, G., Cruz, H.C., Rydeheard, D.: MarQ: monitoring at runtime with QEA. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 596\u2013610. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46681-0_55","DOI":"10.1007\/978-3-662-46681-0_55"}],"container-title":["Lecture Notes in Computer Science","Applicable Formal Methods for Safe Industrial Products"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40132-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:44:32Z","timestamp":1729925072000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40132-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031401312","9783031401329"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-40132-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"17 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}