{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T22:56:07Z","timestamp":1776552967642,"version":"3.51.2"},"publisher-location":"Cham","reference-count":63,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031426254","type":"print"},{"value":"9783031426261","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-42626-1_10","type":"book-chapter","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T14:05:02Z","timestamp":1693231502000},"page":"158-180","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Model Predictive Runtime Verification for Cyber-Physical Systems with Real-Time Deadlines"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9560-2175","authenticated-orcid":false,"given":"Pei","family":"Zhang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2008-673X","authenticated-orcid":false,"given":"Alexis","family":"Aurandt","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7152-8115","authenticated-orcid":false,"given":"Rohit","family":"Dureja","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8220-7552","authenticated-orcid":false,"given":"Phillip H.","family":"Jones","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6718-2828","authenticated-orcid":false,"given":"Kristin Yvonne","family":"Rozier","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"10_CR1","unstructured":"Zynq-7000 SoC Data Sheet: Overview (2018). https:\/\/www.xilinx.com\/support\/documentation\/data_sheets\/ds190-Zynq-7000-Overview.pdf"},{"key":"10_CR2","unstructured":"Vivado design suite user guide (2019). https:\/\/www.xilinx.com\/support\/documentation\/sw_manuals\/xilinx2019_2\/ug973-vivado-release-notes-install-license.pdf"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-319-67531-2_3","volume-title":"Runtime Verification","author":"F-M Adolf","year":"2017","unstructured":"Adolf, F.-M., Faymonville, P., Finkbeiner, B., Schirmer, S., Torens, C.: Stream runtime monitoring on UAS. In: Lahiri, S., Reger, G. (eds.) RV 2017. LNCS, vol. 10548, pp. 33\u201349. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67531-2_3"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Alur, R., Henzinger, T.A.: Real-time logics: complexity and expressiveness. In: LICS, pp. 390\u2013401. IEEE (1990)","DOI":"10.21236\/ADA323441"},{"key":"10_CR5","doi-asserted-by":"publisher","unstructured":"Aurandt, A., Jones, P.H., Rozier, K.Y.: Runtime verification triggers real-time, autonomous fault recovery on the CySat-I. In: Deshmukh, J.V., Havelund, K., Perez, I. (eds.) NASA Formal Methods Symposium, NFM 2022. LNCS, vol. 13260, pp. 816\u2013825. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06773-0_45","DOI":"10.1007\/978-3-031-06773-0_45"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-030-32079-9_7","volume-title":"Runtime Verification","author":"R Babaee","year":"2019","unstructured":"Babaee, R., Ganesh, V., Sedwards, S.: Accelerated learning of predictive runtime monitors for rare failure. In: Finkbeiner, B., Mariani, L. (eds.) RV 2019. LNCS, vol. 11757, pp. 111\u2013128. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32079-9_7"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-319-92970-5_13","volume-title":"Software Engineering and Formal Methods","author":"R Babaee","year":"2018","unstructured":"Babaee, R., Gurfinkel, A., Fischmeister, S.: $$\\cal{P}revent$$: a predictive run-time verification framework using statistical learning. In: Johnsen, E.B., Schaefer, I. (eds.) SEFM 2018. LNCS, vol. 10886, pp. 205\u2013220. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92970-5_13"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-030-03769-7_11","volume-title":"Runtime Verification","author":"R Babaee","year":"2018","unstructured":"Babaee, R., Gurfinkel, A., Fischmeister, S.: Predictive run-time verification of discrete-time reachability properties in black-box systems using trace-level abstraction and statistical learning. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 187\u2013204. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_11"},{"key":"10_CR9","unstructured":"Balas, C., Whidborne, J., Cranfield University School of Engineering: Modelling and linear control of a quadrotor. Theses 2007, Cranfield University, School of Engineering (2007). https:\/\/books.google.com\/books?id=7PIYyAEACAAJ"},{"issue":"2","key":"10_CR10","first-page":"90","volume":"8","author":"MR Banaei","year":"2016","unstructured":"Banaei, M.R., Alizadeh, R.: Simulation-based modeling and power management of all-electric ships based on renewable energy generation using model predictive control strategy. ITSM 8(2), 90\u2013103 (2016)","journal-title":"ITSM"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-75632-5_5","volume-title":"Lectures on Runtime Verification","author":"E Bartocci","year":"2018","unstructured":"Bartocci, E., et al.: Specification-based monitoring of cyber-physical systems: a survey on theory, tools and applications. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 135\u2013175. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_5"},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Bemporad, A., Morari, M.: Robust model predictive control: a survey. In: Garulli, A., Tesi, A. (eds.) Robustness in Identification and Control, vol. 245, pp. 207\u2013226. Springer, Cham (2007). https:\/\/doi.org\/10.1007\/BFb0109870","DOI":"10.1007\/BFb0109870"},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"335","DOI":"10.4236\/ica.2013.43039","volume":"4","author":"H Bolandi","year":"2013","unstructured":"Bolandi, H., Rezaei, M., Mohsenipour, R., Nemati, H., Smailzadeh, S.M.: Attitude control of a quadrotor with optimized PID controller. Intell. Control Autom. 4, 335\u2013342 (2013)","journal-title":"Intell. Control Autom."},{"issue":"6","key":"10_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMAG.2017.2660760","volume":"53","author":"M Bonotto","year":"2017","unstructured":"Bonotto, M., Bettini, P., Cenedese, A.: Model-order reduction of large-scale state-space models in fusion machines via Krylov methods. IEEE Trans. Magn. 53(6), 1\u20134 (2017)","journal-title":"IEEE Trans. Magn."},{"key":"10_CR15","unstructured":"Brown, R.G., Hwang, P.Y.C.: Introduction to Random Signals and Applied Kalman Filtering with MATLAB Exercises, 4th edn. Wiley, New York (2012). ISBN-13 978-0-470-60969-9"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Bujarbaruah, M., Rosolia, U., St\u00fcrz, Y.R., Borrelli, F.: A simple robust MPC for linear systems with parametric and additive uncertainty. In: 2021 American Control Conference (ACC), pp. 2108\u20132113. IEEE (2021)","DOI":"10.23919\/ACC50511.2021.9482957"},{"key":"10_CR17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-030-59155-7_26","volume-title":"Software Architecture","author":"M Cauwels","year":"2020","unstructured":"Cauwels, M., Hammer, A., Hertz, B., Jones, P.H., Rozier, K.Y.: Integrating runtime verification into an automated UAS traffic management system. In: Muccini, H., et al. (eds.) ECSA 2020. CCIS, vol. 1269, pp. 340\u2013357. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59155-7_26"},{"key":"10_CR18","unstructured":"Chen, C.: Linear System Theory and Design, 3rd edn. Oxford University Press Inc., Oxford (1999). ISBN-13 978-0-19-511777-6"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-030-32079-9_10","volume-title":"Runtime Verification","author":"A Cimatti","year":"2019","unstructured":"Cimatti, A., Tian, C., Tonetta, S.: Assumption-based runtime verification with partial observability and resets. In: Finkbeiner, B., Mariani, L. (eds.) RV 2019. LNCS, vol. 11757, pp. 165\u2013184. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32079-9_10"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Dabney, J.B., Badger, J.M., Rajagopal, P.: Adding a verification view for an autonomous real-time system architecture. In: Proceedings of SciTech Forum, pp. 2021\u20130566. AIAA, January 2021. https:\/\/doi.org\/10.2514\/6.2021-0566","DOI":"10.2514\/6.2021-0566"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"D\u2019Angelo, B., et al.: LOLA: runtime monitoring of synchronous systems. In: TIME, pp. 166\u2013174 (2005)","DOI":"10.1109\/TIME.2005.26"},{"issue":"42","key":"10_CR22","doi-asserted-by":"publisher","first-page":"4262","DOI":"10.1016\/j.tcs.2009.06.021","volume":"410","author":"GE Fainekos","year":"2009","unstructured":"Fainekos, G.E., Pappas, G.J.: Robustness of temporal logic specifications for continuous-time signals. Theor. Comput. Sci. 410(42), 4262\u20134291 (2009)","journal-title":"Theor. Comput. Sci."},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/s10703-022-00395-7","volume":"59","author":"A Ferrando","year":"2022","unstructured":"Ferrando, A., et al.: Bridging the gap between single-and multi-model predictive runtime verification. Formal Methods Syst. Des. 59, 44\u201376 (2022)","journal-title":"Formal Methods Syst. Des."},{"key":"10_CR24","unstructured":"Ferrando, A., Delzanno, G.: Incrementally predictive runtime verification. In: CILC, pp. 92\u2013106 (2021)"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-04694-0_5","volume-title":"Runtime Verification","author":"B Finkbeiner","year":"2009","unstructured":"Finkbeiner, B., Kuhtz, L.: Monitor circuits for LTL with bounded and unbounded future. In: Bensalem, S., Peled, D.A. (eds.) RV 2009. LNCS, vol. 5779, pp. 60\u201375. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04694-0_5"},{"key":"10_CR26","unstructured":"F\u00f6rster, J.: System identification of the Crazyflie 2.0 Nano Quadrocopter (2015)"},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-319-11164-3_18","volume-title":"Runtime Verification","author":"J Geist","year":"2014","unstructured":"Geist, J., Rozier, K.Y., Schumann, J.: Runtime observer pairs and Bayesian network reasoners on-board FPGAs: flight-certifiable system health management for embedded systems. In: Bonakdarpour, B., Smolka, S.A. (eds.) RV 2014. LNCS, vol. 8734, pp. 215\u2013230. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11164-3_18"},{"issue":"7","key":"10_CR28","first-page":"1195","volume":"51","author":"W Greblicki","year":"2006","unstructured":"Greblicki, W.: Continuous-time Hammerstein system identification from sampled data. TAC 51(7), 1195\u20131200 (2006)","journal-title":"TAC"},{"key":"10_CR29","doi-asserted-by":"publisher","unstructured":"Hariharan, G., Kempa, B., Wongpiromsarn, T., Jones, P.H., Rozier, K.Y.: MLTL multi-type (MLTLM): a logic for reasoning about signals of different types. In: Isac, O., Ivanov, R., Katz, G., Narodytska, N., Nenzi, L. (eds.) International Workshop on Numerical Software Verification, Workshop on Formal Methods for ML-Enabled Autonomous Systems, vol. 13466, pp. 187\u2013204. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-21222-2_11","DOI":"10.1007\/978-3-031-21222-2_11"},{"issue":"5","key":"10_CR30","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1049\/iet-sen.2013.0236","volume":"8","author":"D Heffernan","year":"2014","unstructured":"Heffernan, D., Macnamee, C., Fogarty, P.: Runtime verification monitoring for automotive embedded systems using the ISO 26262 functional safety standard as a guide for the definition of the monitored properties. IET Softw. 8(5), 193\u2013203 (2014). https:\/\/doi.org\/10.1049\/iet-sen.2013.0236","journal-title":"IET Softw."},{"key":"10_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-030-76384-8_10","volume-title":"NASA Formal Methods","author":"B Hertz","year":"2021","unstructured":"Hertz, B., Luppen, Z., Rozier, K.Y.: Integrating runtime verification into a sounding rocket control system. In: Dutle, A., Moscato, M.M., Titolo, L., Mu\u00f1oz, C.A., Perez, I. (eds.) NFM 2021. LNCS, vol. 12673, pp. 151\u2013159. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-76384-8_10"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Jaksic, S., Bartocci, E., Grosu, R., Kloibhofer, R., Nguyen, T., Nickovic, D.: From signal temporal logic to FPGA monitors. In: MEMOCODE, pp. 218\u2013227, September 2015","DOI":"10.1109\/MEMCOD.2015.7340489"},{"issue":"6","key":"10_CR33","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MCS.2016.2602089","volume":"36","author":"J Kapinski","year":"2016","unstructured":"Kapinski, J., Deshmukh, J.V., Jin, X., Ito, H., Butts, K.: Simulation-based approaches for verification of embedded control systems: an overview of traditional and advanced modeling, testing, and verification techniques. Control Syst. Mag. 36(6), 45\u201364 (2016)","journal-title":"Control Syst. Mag."},{"key":"10_CR34","doi-asserted-by":"publisher","unstructured":"Kempa, B., Zhang, P., Jones, P.H., Zambreno, J., Rozier, K.Y.: Embedding online runtime verification for fault disambiguation on Robonaut2. In: Bertrand, N., Jansen, N. (eds.) Proceedings of the 18th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS), FORMATS 2020. LNCS, vol. 12288, pp. 196\u2013214. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57628-8_12, http:\/\/research.temporallogic.org\/papers\/KZJZR20.pdf","DOI":"10.1007\/978-3-030-57628-8_12"},{"issue":"1","key":"10_CR35","first-page":"63","volume":"6","author":"S Kurak","year":"2018","unstructured":"Kurak, S., Hodzic, M.: Control and estimation of a quadcopter dynamical model. Periodicals Eng. Nat. Sci. 6(1), 63\u201375 (2018)","journal-title":"Periodicals Eng. Nat. Sci."},{"key":"10_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-35632-2_10","volume-title":"Runtime Verification","author":"M Leucker","year":"2013","unstructured":"Leucker, M.: Sliding between model checking and runtime verification. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 82\u201387. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35632-2_10"},{"key":"10_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-25543-5_1","volume-title":"Computer Aided Verification","author":"J Li","year":"2019","unstructured":"Li, J., Vardi, M.Y., Rozier, K.Y.: Satisfiability checking for Mission-Time LTL. In: Dillig, I., Tasiran, S. (eds.) CAV 2019. LNCS, vol. 11562, pp. 3\u201322. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25543-5_1"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Lindemann, L., Qin, X., Deshmukh, J.V., Pappas, G.J.: Conformal prediction for STL runtime verification. arXiv preprint arXiv:2211.01539 (2022)","DOI":"10.1145\/3576841.3585927"},{"key":"10_CR39","unstructured":"Lu, H., Forin, A.: The design and implementation of P2V, an architecture for zero-overhead online verification of software programs. Technical report, MSR-TR-2007-99, Microsoft Research, August 2007"},{"key":"10_CR40","unstructured":"Maciejowski, J.M.: Predictive Control: with Constraints. Pearson Education, London (2002)"},{"key":"10_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-30206-3_12","volume-title":"Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems","author":"O Maler","year":"2004","unstructured":"Maler, O., Nickovic, D.: Monitoring temporal properties of continuous signals. In: Lakhnech, Y., Yovine, S. (eds.) FORMATS\/FTRTFT -2004. LNCS, vol. 3253, pp. 152\u2013166. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30206-3_12"},{"key":"10_CR42","unstructured":"McInerney, I.: Development of a multi-agent quadrotor research platform with distributed computational capabilities. Ph.D. thesis, Iowa State University (2017)"},{"issue":"3","key":"10_CR43","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s10009-011-0198-6","volume":"14","author":"PO Meredith","year":"2012","unstructured":"Meredith, P.O., Jin, D., Griffith, D., Chen, F., Ro\u015fu, G.: An overview of the MOP runtime verification framework. STTT 14(3), 249\u2013289 (2012)","journal-title":"STTT"},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"Naung, Y., Schagin, A., Oo, H.L., Ye, K.Z., Khaing, Z.M.: Implementation of data driven control system of dc motor by using system identification process. In: EIConRus, pp. 1801\u20131804 (2018)","DOI":"10.1109\/EIConRus.2018.8317455"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Pant, Y.V., Abbas, H., Quaye, R.A., Mangharam, R.: Fly-by-logic: control of multi-drone fleets with temporal logic objectives. In: 2018 ACM\/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS), pp. 186\u2013197. IEEE (2018)","DOI":"10.1109\/ICCPS.2018.00026"},{"key":"10_CR46","doi-asserted-by":"crossref","unstructured":"Pellizzoni, R., Meredith, P., Caccamo, M., Rosu, G.: Hardware runtime monitoring for dependable COTS-based real-time embedded systems. In: RTSS, pp. 481\u2013491 (2008)","DOI":"10.1109\/RTSS.2008.43"},{"key":"10_CR47","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.jss.2017.06.060","volume":"132","author":"S Pinisetty","year":"2017","unstructured":"Pinisetty, S., J\u00e9ron, T., Tripakis, S., Falcone, Y., Marchand, H., Preoteasa, V.: Predictive runtime verification of timed properties. J. Syst. Softw. 132, 353\u2013365 (2017)","journal-title":"J. Syst. Softw."},{"key":"10_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-642-54862-8_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"T Reinbacher","year":"2014","unstructured":"Reinbacher, T., Rozier, K.Y., Schumann, J.: Temporal-logic based runtime observer pairs for system health management of real-time systems. In: \u00c1brah\u00e1m, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 357\u2013372. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54862-8_24"},{"key":"10_CR49","unstructured":"Rozier, K.Y., Schumann, J., Ippolito, C.: Intelligent hardware-enabled sensor and software safety and health management for autonomous UAS. Technical Memorandum NASA\/TM-2015-218817, NASA, May 2015"},{"key":"10_CR50","unstructured":"Rozier, K.Y., Schumann, J.: R2U2: tool overview. In: Proceedings of International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools (RV-CUBES), vol. 3, pp. 138\u2013156. Kalpa Publications, Seattle, WA, USA, September 2017"},{"key":"10_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-319-23820-3_15","volume-title":"Runtime Verification","author":"J Schumann","year":"2015","unstructured":"Schumann, J., Moosbrugger, P., Rozier, K.Y.: R2U2: monitoring and diagnosis of security threats for unmanned aerial systems. In: Bartocci, E., Majumdar, R. (eds.) RV 2015. LNCS, vol. 9333, pp. 233\u2013249. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23820-3_15"},{"key":"10_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-319-46982-9_35","volume-title":"Runtime Verification","author":"J Schumann","year":"2016","unstructured":"Schumann, J., Moosbrugger, P., Rozier, K.Y.: Runtime analysis with R2U2: a tool exhibition report. In: Falcone, Y., S\u00e1nchez, C. (eds.) RV 2016. LNCS, vol. 10012, pp. 504\u2013509. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46982-9_35"},{"key":"10_CR53","doi-asserted-by":"crossref","unstructured":"Schumann, J., Rozier, K.Y., Reinbacher, T., Mengshoel, O.J., Mbaya, T., Ippolito, C.: Towards real-time, on-board, hardware-supported sensor and software health management for unmanned aerial systems. In: PHM, pp. 381\u2013401, October 2013","DOI":"10.36001\/phmconf.2013.v5i1.2275"},{"issue":"1","key":"10_CR54","first-page":"1","volume":"6","author":"J Schumann","year":"2015","unstructured":"Schumann, J., Rozier, K.Y., Reinbacher, T., Mengshoel, O.J., Mbaya, T., Ippolito, C.: Towards real-time, on-board, hardware-supported sensor and software health management for unmanned aerial systems. IJPHM 6(1), 1\u201327 (2015)","journal-title":"IJPHM"},{"key":"10_CR55","doi-asserted-by":"crossref","unstructured":"Selyunin, K., Nguyen, T., Bartocci, E., Nickovic, D., Grosu, R.: Monitoring of MTL specifications with IBM\u2019s spiking-neuron model. In: DATE, pp. 924\u2013929, March 2016","DOI":"10.3850\/9783981537079_0139"},{"key":"10_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/978-3-319-46982-9_30","volume-title":"Runtime Verification","author":"K Selyunin","year":"2016","unstructured":"Selyunin, K., Nguyen, T., Bartocci, E., Grosu, R.: Applying runtime monitoring for automotive electronic development. In: Falcone, Y., S\u00e1nchez, C. (eds.) RV 2016. LNCS, vol. 10012, pp. 462\u2013469. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46982-9_30"},{"key":"10_CR57","doi-asserted-by":"crossref","unstructured":"Tiger, M., Heintz, F.: Stream reasoning using temporal logic and predictive probabilistic state models. In: TIME, pp. 196\u2013205. IEEE (2016)","DOI":"10.1109\/TIME.2016.28"},{"key":"10_CR58","doi-asserted-by":"crossref","unstructured":"Todman, T., Stilkerich, S., Luk, W.: In-circuit temporal monitors for runtime verification of reconfigurable designs. In: DAC, pp. 50:1\u201350:6. ACM, New York, NY, USA (2015)","DOI":"10.1145\/2744769.2744856"},{"issue":"3","key":"10_CR59","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/JSYST.2013.2282479","volume":"9","author":"AJ Torabi","year":"2015","unstructured":"Torabi, A.J., et al.: A survey on artificial intelligence-based modeling techniques for high speed milling processes. IEEE Syst. J. 9(3), 1069\u20131080 (2015)","journal-title":"IEEE Syst. J."},{"key":"10_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-030-32079-9_20","volume-title":"Runtime Verification","author":"H Yoon","year":"2019","unstructured":"Yoon, H., Chou, Y., Chen, X., Frew, E., Sankaranarayanan, S.: Predictive runtime monitoring for linear stochastic systems and applications to geofence enforcement for UAVs. In: Finkbeiner, B., Mariani, L. (eds.) RV 2019. LNCS, vol. 11757, pp. 349\u2013367. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32079-9_20"},{"key":"10_CR61","doi-asserted-by":"crossref","unstructured":"Yu, X., Dong, W., Yin, X., Li, S.: Model predictive monitoring of dynamic systems for signal temporal logic specifications. arXiv preprint arXiv:2209.12493 (2022)","DOI":"10.1109\/CDC51059.2022.9993114"},{"key":"10_CR62","doi-asserted-by":"crossref","unstructured":"Zhang, P., Zambreno, J., Jones, P.H.: An embedded scalable linear model predictive hardware-based controller using ADMM. In: ASAP, pp. 176\u2013183. IEEE (2017)","DOI":"10.1109\/ASAP.2017.7995276"},{"key":"10_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/978-3-642-28891-3_37","volume-title":"NASA Formal Methods","author":"X Zhang","year":"2012","unstructured":"Zhang, X., Leucker, M., Dong, W.: Runtime verification with predictive semantics. In: Goodloe, A.E., Person, S. (eds.) NFM 2012. LNCS, vol. 7226, pp. 418\u2013432. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28891-3_37"}],"container-title":["Lecture Notes in Computer Science","Formal Modeling and Analysis of Timed Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-42626-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T23:34:34Z","timestamp":1729985674000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-42626-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031426254","9783031426261"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-42626-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FORMATS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Modeling and Analysis of Timed Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Antwerp","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"formats2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.uantwerpen.be\/en\/conferences\/confest-2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.143","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.063","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}