{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:34:06Z","timestamp":1766050446913,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":66,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031442667"},{"type":"electronic","value":"9783031442674"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44267-4_26","type":"book-chapter","created":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:03:27Z","timestamp":1696118607000},"page":"461-487","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Learning-Based Approaches to\u00a0Predictive Monitoring with\u00a0Conformal Statistical Guarantees"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6994-6553","authenticated-orcid":false,"given":"Francesca","family":"Cairoli","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8874-4001","authenticated-orcid":false,"given":"Luca","family":"Bortolussi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4723-5363","authenticated-orcid":false,"given":"Nicola","family":"Paoletti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,1]]},"reference":[{"key":"26_CR1","volume-title":"Principles of Cyber-Physical Systems","author":"R Alur","year":"2015","unstructured":"Alur, R.: Principles of Cyber-Physical Systems. MIT Press, Cambridge (2015)"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-642-19835-9_21","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"Y Annpureddy","year":"2011","unstructured":"Annpureddy, Y., Liu, C., Fainekos, G., Sankaranarayanan, S.: S-TaLiRo: a tool for temporal logic falsification for hybrid systems. In: Abdulla, P.A., Leino, K.R.M. (eds.) TACAS 2011. LNCS, vol. 6605, pp. 254\u2013257. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19835-9_21"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-030-32079-9_7","volume-title":"Runtime Verification","author":"R Babaee","year":"2019","unstructured":"Babaee, R., Ganesh, V., Sedwards, S.: Accelerated learning of predictive runtime monitors for rare failure. In: Finkbeiner, B., Mariani, L. (eds.) RV 2019. LNCS, vol. 11757, pp. 111\u2013128. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32079-9_7"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-030-03769-7_11","volume-title":"Runtime Verification","author":"R Babaee","year":"2018","unstructured":"Babaee, R., Gurfinkel, A., Fischmeister, S.: Predictive run-time verification of discrete-time reachability properties in black-box systems using trace-level abstraction and statistical learning. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 187\u2013204. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_11"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-031-13188-2_2","volume-title":"Computer Aided Verification","author":"TS Badings","year":"2022","unstructured":"Badings, T.S., Jansen, N., Junges, S., Stoelinga, M., Volk, M.: Sampling-based verification of CTMCs with uncertain rates. In: Shoham, S., Vizel, Y. (eds.) CAV 2022. LNCS, vol. 13372, pp. 26\u201347. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-13188-2_2"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Bak, S., Duggirala, P.S.: HyLAA: a tool for computing simulation-equivalent reachability for linear systems. In: Proceedings of the 20th International Conference on Hybrid Systems: Computation and Control, pp. 173\u2013178 (2017)","DOI":"10.1145\/3049797.3049808"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Bak, S., Johnson, T.T., Caccamo, M., Sha, L.: Real-time reachability for verified simplex design. In: Real-Time Systems Symposium (RTSS), 2014 IEEE, pp. 138\u2013148. IEEE (2014)","DOI":"10.1109\/RTSS.2014.21"},{"key":"26_CR8","volume-title":"Conformal Prediction for Reliable Machine Learning: Theory, Adaptations and Applications","author":"V Balasubramanian","year":"2014","unstructured":"Balasubramanian, V., Ho, S.S., Vovk, V.: Conformal Prediction for Reliable Machine Learning: Theory, Adaptations and Applications. Newnes, Oxford (2014)"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-75632-5_5","volume-title":"Lectures on Runtime Verification","author":"E Bartocci","year":"2018","unstructured":"Bartocci, E., et al.: Specification-based monitoring of cyber-physical systems: a survey on theory, tools and applications. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 135\u2013175. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_5"},{"issue":"2","key":"26_CR10","doi-asserted-by":"publisher","first-page":"8960","DOI":"10.3182\/20080706-5-KR-1001.01513","volume":"41","author":"L Benvenuti","year":"2008","unstructured":"Benvenuti, L., et al.: Reachability computation for hybrid systems with Ariadne. IFAC Proc. Volumes 41(2), 8960\u20138965 (2008)","journal-title":"IFAC Proc. Volumes"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Bogomolov, S., Forets, M., Frehse, G., Potomkin, K., Schilling, C.: JuliaReach: a toolbox for set-based reachability. In: Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control, pp. 39\u201344 (2019)","DOI":"10.1145\/3302504.3311804"},{"key":"26_CR12","unstructured":"Bortolussi, L., Cairoli, F., Carbone, G., Pulcini, P.: Stochastic variational smoothed model checking. arXiv preprint arXiv:2205.05398 (2022)"},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-030-32079-9_8","volume-title":"Runtime Verification","author":"L Bortolussi","year":"2019","unstructured":"Bortolussi, L., Cairoli, F., Paoletti, N., Smolka, S.A., Stoller, S.D.: Neural predictive monitoring. In: Finkbeiner, B., Mariani, L. (eds.) RV 2019. LNCS, vol. 11757, pp. 129\u2013147. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32079-9_8"},{"issue":"4","key":"26_CR14","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s10009-021-00623-1","volume":"23","author":"L Bortolussi","year":"2021","unstructured":"Bortolussi, L., Cairoli, F., Paoletti, N., Smolka, S.A., Stoller, S.D.: Neural predictive monitoring and a comparison of frequentist and Bayesian approaches. Int. J. Softw. Tools Technol. Transfer 23(4), 615\u2013640 (2021)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"26_CR15","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.ic.2016.01.004","volume":"247","author":"L Bortolussi","year":"2016","unstructured":"Bortolussi, L., Milios, D., Sanguinetti, G.: Smoothed model checking for uncertain continuous-time Markov chains. Inf. Comput. 247, 235\u2013253 (2016)","journal-title":"Inf. Comput."},{"key":"26_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-642-22012-8_33","volume-title":"Automata, Languages and Programming","author":"T Brihaye","year":"2011","unstructured":"Brihaye, T., Doyen, L., Geeraerts, G., Ouaknine, J., Raskin, J.-F., Worrell, J.: On reachability for hybrid automata over bounded time. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011. LNCS, vol. 6756, pp. 416\u2013427. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22012-8_33"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-030-88494-9_7","volume-title":"Runtime Verification","author":"F Cairoli","year":"2021","unstructured":"Cairoli, F., Bortolussi, L., Paoletti, N.: Neural predictive monitoring under partial observability. In: Feng, L., Fisman, D. (eds.) RV 2021. LNCS, vol. 12974, pp. 121\u2013141. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88494-9_7"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/978-3-031-19759-8_3","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Adaptation and Learning","author":"F Cairoli","year":"2022","unstructured":"Cairoli, F., Paoletti, N., Bortolussi, L.: Neural predictive monitoring for collective adaptive systems. In: Margaria, T., Steffen, B. (eds.) ISoLA 2022. LNCS, vol. 13703, pp. 30\u201346. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19759-8_3"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Cairoli, F., Paoletti, N., Bortolussi, L.: Conformal quantitative predictive monitoring of STL requirements for stochastic processes. In: Proceedings of the 26th ACM International Conference on Hybrid Systems: Computation and Control, pp. 1\u201311 (2023)","DOI":"10.1145\/3575870.3587113"},{"key":"26_CR20","unstructured":"Cauchois, M., Gupta, S., Ali, A., Duchi, J.C.: Robust validation: confident predictions even when distributions shift. arXiv preprint arXiv:2008.04267 (2020)"},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s00236-016-0265-2","volume":"54","author":"M \u010ce\u0161ka","year":"2017","unstructured":"\u010ce\u0161ka, M., Dannenberg, F., Paoletti, N., Kwiatkowska, M., Brim, L.: Precise parameter synthesis for stochastic biochemical systems. Acta Informatica 54, 589\u2013623 (2017)","journal-title":"Acta Informatica"},{"key":"26_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-031-15839-1_7","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"H Chen","year":"2022","unstructured":"Chen, H., Lin, S., Smolka, S.A., Paoletti, N.: An STL-based formulation of resilience in cyber-physical systems. In: Bogomolov, S., Parker, D. (eds.) FORMATS 2022. LNCS, vol. 13465, pp. 117\u2013135. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15839-1_7"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Chen, X., Sankaranarayanan, S.: Model predictive real-time monitoring of linear systems. In: Real-Time Systems Symposium (RTSS), 2017 IEEE, pp. 297\u2013306. IEEE (2017)","DOI":"10.1109\/RTSS.2017.00035"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Chou, Y., Yoon, H., Sankaranarayanan, S.: Predictive runtime monitoring of vehicle models using Bayesian estimation and reachability analysis. In: International Conference on Intelligent Robots and Systems (IROS) (2020)","DOI":"10.1109\/IROS45743.2020.9340755"},{"issue":"1","key":"26_CR25","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10703-017-0286-7","volume":"51","author":"JV Deshmukh","year":"2017","unstructured":"Deshmukh, J.V., Donz\u00e9, A., Ghosh, S., Jin, X., Juniwal, G., Seshia, S.A.: Robust online monitoring of signal temporal logic. Formal Meth. Syst. Des. 51(1), 5\u201330 (2017)","journal-title":"Formal Meth. Syst. Des."},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Djeridane, B., Lygeros, J.: Neural approximation of PDE solutions: an application to reachability computations. In: Proceedings of the 45th IEEE Conference on Decision and Control, pp. 3034\u20133039. IEEE (2006)","DOI":"10.1109\/CDC.2006.377184"},{"key":"26_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-319-11164-3_19","volume-title":"Runtime Verification","author":"A Dokhanchi","year":"2014","unstructured":"Dokhanchi, A., Hoxha, B., Fainekos, G.: On-line monitoring for temporal logic robustness. In: Bonakdarpour, B., Smolka, S.A. (eds.) RV 2014. LNCS, vol. 8734, pp. 231\u2013246. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11164-3_19"},{"key":"26_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-14295-6_17","volume-title":"Computer Aided Verification","author":"A Donz\u00e9","year":"2010","unstructured":"Donz\u00e9, A.: Breach, a toolbox for verification and parameter synthesis of hybrid systems. In: Touili, T., Cook, B., Jackson, P. (eds.) CAV 2010. LNCS, vol. 6174, pp. 167\u2013170. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14295-6_17"},{"key":"26_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-15297-9_9","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"A Donz\u00e9","year":"2010","unstructured":"Donz\u00e9, A., Maler, O.: Robust satisfaction of temporal logic over real-valued signals. In: Chatterjee, K., Henzinger, T.A. (eds.) FORMATS 2010. LNCS, vol. 6246, pp. 92\u2013106. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15297-9_9"},{"key":"26_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-662-46681-0_5","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"PS Duggirala","year":"2015","unstructured":"Duggirala, P.S., Mitra, S., Viswanathan, M., Potok, M.: C2E2: a verification tool for stateflow models. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 68\u201382. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46681-0_5"},{"key":"26_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-31954-2_17","volume-title":"Hybrid Systems: Computation and Control","author":"G Frehse","year":"2005","unstructured":"Frehse, G.: PHAVer: algorithmic verification of hybrid systems past HyTech. In: Morari, M., Thiele, L. (eds.) HSCC 2005. LNCS, vol. 3414, pp. 258\u2013273. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31954-2_17"},{"key":"26_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-642-22110-1_30","volume-title":"Computer Aided Verification","author":"G Frehse","year":"2011","unstructured":"Frehse, G., et al.: SpaceEx: scalable verification of hybrid systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 379\u2013395. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_30"},{"issue":"2","key":"26_CR33","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1093\/comjnl\/bxl065","volume":"50","author":"A Gammerman","year":"2007","unstructured":"Gammerman, A., Vovk, V.: Hedging predictions in machine learning. Comput. J. 50(2), 151\u2013163 (2007)","journal-title":"Comput. J."},{"key":"26_CR34","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s10009-021-00633-z","volume":"24","author":"C Hensel","year":"2021","unstructured":"Hensel, C., Junges, S., Katoen, J.P., Quatmann, T., Volk, M.: The probabilistic model checker storm. Int. J. Softw. Tools Technol. Transfer 24, 589\u2013610 (2021)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"26_CR35","doi-asserted-by":"crossref","unstructured":"Henzinger, T.A., Kopke, P.W., Puri, A., Varaiya, P.: What\u2019s decidable about hybrid automata? In: Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, pp. 373\u2013382 (1995)","DOI":"10.1145\/225058.225162"},{"key":"26_CR36","doi-asserted-by":"crossref","unstructured":"Ivanov, R., Weimer, J., Alur, R., Pappas, G.J., Lee, I.: Verisig: verifying safety properties of hybrid systems with neural network controllers. In: Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control, pp. 169\u2013178 (2019)","DOI":"10.1145\/3302504.3311806"},{"issue":"2","key":"26_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2723871","volume":"15","author":"TT Johnson","year":"2016","unstructured":"Johnson, T.T., Bak, S., Caccamo, M., Sha, L.: Real-time reachability for verified simplex design. ACM Trans. Embed. Comput. Syst. (TECS) 15(2), 1\u201327 (2016)","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"26_CR38","unstructured":"Kuleshov, V., Fenner, N., Ermon, S.: Accurate uncertainties for deep learning using calibrated regression. In: International Conference on Machine Learning, pp. 2796\u20132804. PMLR (2018)"},{"key":"26_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-642-22110-1_47","volume-title":"Computer Aided Verification","author":"M Kwiatkowska","year":"2011","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: verification of probabilistic real-time systems. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 585\u2013591. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_47"},{"key":"26_CR40","doi-asserted-by":"crossref","unstructured":"Lindemann, L., Qin, X., Deshmukh, J.V., Pappas, G.J.: Conformal prediction for STL runtime verification. In: Proceedings of the ACM\/IEEE 14th International Conference on Cyber-Physical Systems (with CPS-IoT Week 2023), pp. 142\u2013153 (2023)","DOI":"10.1145\/3576841.3585927"},{"issue":"5s","key":"26_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3477032","volume":"20","author":"M Ma","year":"2021","unstructured":"Ma, M., Stankovic, J., Bartocci, E., Feng, L.: Predictive monitoring with logic-calibrated uncertainty for cyber-physical systems. ACM Trans. Embed. Comput. Syst. (TECS) 20(5s), 1\u201325 (2021)","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"26_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-30206-3_12","volume-title":"Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems","author":"O Maler","year":"2004","unstructured":"Maler, O., Nickovic, D.: Monitoring temporal properties of continuous signals. In: Lakhnech, Y., Yovine, S. (eds.) FORMATS\/FTRTFT -2004. LNCS, vol. 3253, pp. 152\u2013166. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30206-3_12"},{"key":"26_CR43","doi-asserted-by":"crossref","unstructured":"Muthali, A., et al.: Multi-agent reachability calibration with conformal prediction. arXiv preprint arXiv:2304.00432 (2023)","DOI":"10.1109\/CDC49753.2023.10383723"},{"key":"26_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1007\/978-3-030-59152-6_34","volume-title":"Automated Technology for Verification and Analysis","author":"D Ni\u010dkovi\u0107","year":"2020","unstructured":"Ni\u010dkovi\u0107, D., Yamaguchi, T.: RTAMT: online robustness monitors from STL. In: Hung, D.V., Sokolsky, O. (eds.) ATVA 2020. LNCS, vol. 12302, pp. 564\u2013571. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59152-6_34"},{"key":"26_CR45","doi-asserted-by":"crossref","unstructured":"Papadopoulos, H.: Inductive conformal prediction: theory and application to neural networks. In: Tools in Artificial Intelligence. InTech (2008)","DOI":"10.5772\/6078"},{"issue":"8","key":"26_CR46","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1016\/j.neunet.2011.05.008","volume":"24","author":"H Papadopoulos","year":"2011","unstructured":"Papadopoulos, H., Haralambous, H.: Reliable prediction intervals with regression neural networks. Neural Netw.: J. Int. Neural Net. Soc. 24(8), 842\u201351 (2011)","journal-title":"Neural Netw.: J. Int. Neural Net. Soc."},{"key":"26_CR47","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1613\/jair.3198","volume":"40","author":"H Papadopoulos","year":"2014","unstructured":"Papadopoulos, H., Vovk, V., Gammerman, A.: Regression conformal prediction with nearest neighbours. J. Artif. Intell. Res. 40, 815\u2013840 (2014)","journal-title":"J. Artif. Intell. Res."},{"key":"26_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-030-01090-4_25","volume-title":"Automated Technology for Verification and Analysis","author":"D Phan","year":"2018","unstructured":"Phan, D., Paoletti, N., Zhang, T., Grosu, R., Smolka, S.A., Stoller, S.D.: Neural state classification for hybrid systems. In: Lahiri, S.K., Wang, C. (eds.) ATVA 2018. LNCS, vol. 11138, pp. 422\u2013440. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01090-4_25"},{"key":"26_CR49","doi-asserted-by":"crossref","unstructured":"Qin, X., Deshmukh, J.V.: Predictive monitoring for signal temporal logic with probabilistic guarantees. In: Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control, pp. 266\u2013267. ACM (2019)","DOI":"10.1145\/3302504.3313353"},{"key":"26_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-030-57628-8_11","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"X Qin","year":"2020","unstructured":"Qin, X., Deshmukh, J.V.: Clairvoyant monitoring for signal temporal logic. In: Bertrand, N., Jansen, N. (eds.) FORMATS 2020. LNCS, vol. 12288, pp. 178\u2013195. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57628-8_11"},{"key":"26_CR51","doi-asserted-by":"crossref","unstructured":"Rasmussen, C.E., Williams, C.K.: Gaussian Processes for Machine Learning. vol. 1. MIT Press, Cambridge (2006)","DOI":"10.7551\/mitpress\/3206.001.0001"},{"key":"26_CR52","doi-asserted-by":"crossref","unstructured":"Rodionova, A., Lindemann, L., Morari, M., Pappas, G.J.: Time-robust control for STL specifications. In: 2021 60th IEEE Conference on Decision and Control (CDC), pp. 572\u2013579. IEEE (2021)","DOI":"10.1109\/CDC45484.2021.9683477"},{"key":"26_CR53","unstructured":"Romano, Y., Patterson, E., Candes, E.: Conformalized quantile regression. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"key":"26_CR54","unstructured":"Royo, V.R., Fridovich-Keil, D., Herbert, S., Tomlin, C.J.: Classification-based approximate reachability with guarantees applied to safe trajectory tracking. arXiv preprint arXiv:1803.03237 (2018)"},{"key":"26_CR55","unstructured":"Sauter, G., Dierks, H., Fr\u00e4nzle, M., Hansen, M.R.: Lightweight hybrid model checking facilitating online prediction of temporal properties. In: Proceedings of the 21st Nordic Workshop on Programming Theory, pp. 20\u201322 (2009)"},{"key":"26_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-319-57288-8_20","volume-title":"NASA Formal Methods","author":"S Schupp","year":"2017","unstructured":"Schupp, S., \u00c1brah\u00e1m, E., Makhlouf, I.B., Kowalewski, S.: HyPro: A C++\u00a0Library of state set representations for hybrid systems reachability analysis. In: Barrett, C., Davies, M., Kahsai, T. (eds.) NFM 2017. LNCS, vol. 10227, pp. 288\u2013294. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57288-8_20"},{"key":"26_CR57","first-page":"371","volume":"9","author":"G Shafer","year":"2008","unstructured":"Shafer, G., Vovk, V.: A tutorial on conformal prediction. J. Mach. Learn. Res. 9, 371\u2013421 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"26_CR58","unstructured":"Stankeviciute, K., Alaa, A.M., van der Schaar, M.: Conformal time-series forecasting. In: Advances in Neural Information Processing Systems, vol. 34, pp. 6216\u20136228 (2021)"},{"key":"26_CR59","unstructured":"Tibshirani, R.J., Foygel Barber, R., Candes, E., Ramdas, A.: Conformal prediction under covariate shift. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"},{"issue":"3","key":"26_CR60","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/s10994-018-5754-9","volume":"108","author":"P Toccaceli","year":"2019","unstructured":"Toccaceli, P., Gammerman, A.: Combination of inductive Mondrian conformal predictors. Mach. Learn. 108(3), 489\u2013510 (2019)","journal-title":"Mach. Learn."},{"key":"26_CR61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06649-8","volume-title":"Algorithmic Learning in a Random World","author":"V Vovk","year":"2005","unstructured":"Vovk, V., Gammerman, A., Shafer, G.: Algorithmic Learning in a Random World. Springer, Cham (2005). https:\/\/doi.org\/10.1007\/978-3-031-06649-8"},{"issue":"2","key":"26_CR62","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MRA.2020.2981114","volume":"27","author":"E Yel","year":"2020","unstructured":"Yel, E., et al.: Assured runtime monitoring and planning: toward verification of neural networks for safe autonomous operations. IEEE Robot. Autom. Mag. 27(2), 102\u2013116 (2020)","journal-title":"IEEE Robot. Autom. Mag."},{"key":"26_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-030-32079-9_20","volume-title":"Runtime Verification","author":"H Yoon","year":"2019","unstructured":"Yoon, H., Chou, Y., Chen, X., Frew, E., Sankaranarayanan, S.: Predictive runtime monitoring for linear stochastic systems and applications to geofence enforcement for UAVs. In: Finkbeiner, B., Mariani, L. (eds.) RV 2019. LNCS, vol. 11757, pp. 349\u2013367. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32079-9_20"},{"key":"26_CR64","doi-asserted-by":"crossref","unstructured":"Yoon, H., Sankaranarayanan, S.: Predictive runtime monitoring for mobile robots using logic-based Bayesian intent inference. In: 2021 IEEE International Conference on Robotics and Automation (ICRA), pp. 8565\u20138571. IEEE (2021)","DOI":"10.1109\/ICRA48506.2021.9561193"},{"key":"26_CR65","doi-asserted-by":"crossref","unstructured":"Yu, X., Dong, W., Yin, X., Li, S.: Model predictive monitoring of dynamic systems for signal temporal logic specifications. arXiv preprint arXiv:2209.12493 (2022)","DOI":"10.1109\/CDC51059.2022.9993114"},{"key":"26_CR66","unstructured":"Zaffran, M., F\u00e9ron, O., Goude, Y., Josse, J., Dieuleveut, A.: Adaptive conformal predictions for time series. In: International Conference on Machine Learning, pp. 25834\u201325866. PMLR (2022)"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44267-4_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:35:24Z","timestamp":1730230524000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44267-4_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031442667","9783031442674"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44267-4_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Runtime Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thessaloniki","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rv2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rv23.csd.auth.gr","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,15","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The proceedings includes also 4 Tutorial Papers and 2 Invited Papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}