{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T09:35:09Z","timestamp":1766050509531,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031505201"},{"type":"electronic","value":"9783031505218"}],"license":[{"start":{"date-parts":[[2023,12,30]],"date-time":"2023-12-30T00:00:00Z","timestamp":1703894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,30]],"date-time":"2023-12-30T00:00:00Z","timestamp":1703894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-50521-8_12","type":"book-chapter","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T08:03:15Z","timestamp":1703836995000},"page":"249-263","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["TP-DejaVu: Combining Operational and\u00a0Declarative Runtime Verification"],"prefix":"10.1007","author":[{"given":"Klaus","family":"Havelund","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Katsaros","sequence":"additional","affiliation":[]},{"given":"Moran","family":"Omer","sequence":"additional","affiliation":[]},{"given":"Doron","family":"Peled","sequence":"additional","affiliation":[]},{"given":"Anastasios","family":"Temperekidis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,30]]},"reference":[{"issue":"3","key":"12_CR1","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/BF01782772","volume":"2","author":"B Alpern","year":"1987","unstructured":"Alpern, B., Schneider, F.B.: Recognizing safety and liveness. Distrib. Comput. 2(3), 117\u2013126 (1987)","journal-title":"Distrib. Comput."},{"key":"12_CR2","doi-asserted-by":"publisher","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-based runtime verification. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 44\u201357. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24622-0_5","DOI":"10.1007\/978-3-540-24622-0_5"},{"key":"12_CR3","doi-asserted-by":"publisher","unstructured":"Barringer, H., Havelund, K.: TraceContract: a scala DSL for trace analysis. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol. 6664, pp. 57\u201372. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21437-0_7","DOI":"10.1007\/978-3-642-21437-0_7"},{"key":"12_CR4","doi-asserted-by":"publisher","unstructured":"Barringer, H., Rydeheard, D., Havelund, K.: Rule systems for run-time monitoring: from Eagle to RuleR. In: Sokolsky, O., Ta\u015f\u0131ran, S. (eds.) RV 2007. LNCS, vol. 4839, pp. 111\u2013125. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77395-5_10","DOI":"10.1007\/978-3-540-77395-5_10"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Basin, D.A., Klaedtke, F., Marinovic, S., Zalinescu, E.: Monitoring of temporal first-order properties with aggregations. Formal Methods Syst. Des. 46(3), 262\u2013285 (2015)","DOI":"10.1007\/s10703-015-0222-7"},{"issue":"2","key":"12_CR6","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/2699444","volume":"62","author":"DA Basin","year":"2015","unstructured":"Basin, D.A., Klaedtke, F., M\u00fcller, S., Zalinescu, E.: Monitoring metric first-order temporal properties. J. ACM 62(2), 45 (2015)","journal-title":"J. ACM"},{"issue":"3","key":"12_CR7","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1145\/136035.136043","volume":"24","author":"RE Bryant","year":"1992","unstructured":"Bryant, R.E.: Symbolic boolean manipulation with ordered binary-decision diagrams. ACM Comput. Surv. 24(3), 293\u2013318 (1992)","journal-title":"ACM Comput. Surv."},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Burch, J.R., Clarke, E.M., McMillan, K.L., Dill, D.L., Hwang, L.J.: Symbolic model checking: $$10^{20}$$ states and beyond, LICS, pp. 428\u2013439 (1990)","DOI":"10.1109\/LICS.1990.113767"},{"key":"12_CR9","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking, 1st edn, pp. 1\u2013314, I\u2013XIV. MIT Press (2001). ISBN 978-0-262-03270-4"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Colombo, C., Gauci, A., Pace, G.J.: LarvaStat: monitoring of statistical properties (RV 2010), pp. 480\u2013484 (2010)","DOI":"10.1007\/978-3-642-16612-9_38"},{"key":"12_CR11","doi-asserted-by":"publisher","unstructured":"Dams, D., Havelund, K., Kauffman, S.: A Python library for trace analysis. In: Dang, T., Stolz, V. (eds.) Proceedings of the Runtime Verification: 22nd International Conference, RV 2022, Tbilisi, 28\u201330 September 2022, pp. 264\u2013273. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17196-3_15","DOI":"10.1007\/978-3-031-17196-3_15"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"D\u2019Angelo, B., et al.: LOLA: runtime monitoring of synchronous systems. In: 12th International Symposium on Temporal Representation and Reasoning (TIME), pp. 166\u2013174. IEEE (2005)","DOI":"10.1109\/TIME.2005.26"},{"issue":"2","key":"12_CR13","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s10009-015-0380-3","volume":"18","author":"N Decker","year":"2016","unstructured":"Decker, N., Leucker, M., Thoma, D.: Monitoring modulo theories. Softw. Tools Technol. Transf. 18(2), 205\u2013225 (2016)","journal-title":"Softw. Tools Technol. Transf."},{"key":"12_CR14","doi-asserted-by":"publisher","unstructured":"Duckett, B., Havelund, K., Stewart, L.: Space telemetry analysis with PyContract. In: Haxthausen, A.E., Huang, W.-l., Roggenbach, M. (eds.) Applicable Formal Methods for Safe Industrial Products: Essays Dedicated to Jan Peleska on the Occasion of His 65th Birthday, pp. 272\u2013288. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-40132-9_17","DOI":"10.1007\/978-3-031-40132-9_17"},{"key":"12_CR15","unstructured":"Fowler, M., Parsons, R.: Domain-Specific Languages. Addison-Wesley (2010)"},{"key":"12_CR16","doi-asserted-by":"publisher","unstructured":"Gorostiaga, F., S\u00e1nchez, C.: HStriver: a very functional extensible tool for the runtime verification of real-time event streams. In: Huisman, M., P\u0103s\u0103reanu, C., Zhan, N. (eds.) FM 2021. LNCS, vol. 13047, pp. 563\u2013580. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90870-6_30","DOI":"10.1007\/978-3-030-90870-6_30"},{"issue":"2","key":"12_CR17","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/TSC.2011.10","volume":"5","author":"S Hall\u00e9","year":"2012","unstructured":"Hall\u00e9, S., Villemaire, R.: Runtime enforcement of web service message contracts with data. IEEE Trans. Serv. Comput. 5(2), 192\u2013206 (2012)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Havelund, K.: Data Automata in Scala, Theoretical Aspects of Software Engineering Conference (TASE), pp. 1\u20139. IEEE Computer Society (2014)","DOI":"10.1109\/TASE.2014.37"},{"key":"12_CR19","doi-asserted-by":"publisher","unstructured":"Havelund, K.: Rule-based runtime verification revisited. Int. J. Softw. Tools Technol. Transf. 17(2), 143\u2013170 (2014). https:\/\/doi.org\/10.1007\/s10009-014-0309-2","DOI":"10.1007\/s10009-014-0309-2"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Havelund, K., Peled, D., Ulus, D.: First-order temporal logic monitoring with BDDs. In: FMCAD 2017, pp. 116\u2013123 (2017)","DOI":"10.23919\/FMCAD.2017.8102249"},{"issue":"4","key":"12_CR21","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s10009-021-00626-y","volume":"23","author":"K Havelund","year":"2021","unstructured":"Havelund, K., Peled, D.: An extension of first-order LTL with rules with application to runtime verification. Int. J. Softw. Tools Technol. Transf. 23(4), 547\u2013563 (2021)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"12_CR22","doi-asserted-by":"publisher","unstructured":"Havelund, K., Ro\u015fu, G.: Synthesizing monitors for safety properties. In: Katoen, J.-P., Stevens, P. (eds.) TACAS 2002. LNCS, vol. 2280, pp. 342\u2013356. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-46002-0_24","DOI":"10.1007\/3-540-46002-0_24"},{"key":"12_CR23","doi-asserted-by":"publisher","unstructured":"Kallwies, H., Leucker, M., Schmitz, M., Schulz, A., Thoma, D., Weiss, A.: TeSSLa \u2013 an ecosystem for\u00a0runtime verification. In: Dang, T., Stolz, V. (eds.) RV 2022. LNCS 13498, pp. 314\u2013324. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17196-3_20","DOI":"10.1007\/978-3-031-17196-3_20"},{"key":"12_CR24","unstructured":"Kim, M., Kannan, S., Lee, I., Sokolsky, O.: Java-MaC: a run-time assurance tool for Java. In: 1st International Workshop on Runtime Verification (RV), ENTCS, vol. 55, no. 2. Elsevier (2001)"},{"key":"12_CR25","volume-title":"Copilot 3","author":"I Perez","year":"2020","unstructured":"Perez, I., Dedden, F., Goodloe, A.: Copilot 3. Technical report, NASA Langley Research Center (2020)"},{"key":"12_CR26","doi-asserted-by":"publisher","unstructured":"Reger, G, Cruz, H.C., Rydeheard, D.: MarQ: monitoring at runtime with QEA. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 596\u2013610. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46681-0_55","DOI":"10.1007\/978-3-662-46681-0_55"},{"issue":"1\/2","key":"12_CR27","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/S0019-9958(83)80051-5","volume":"56","author":"P Wolper","year":"1983","unstructured":"Wolper, P.: Temporal logic can be more expressive. Inf. Control 56(1\/2), 72\u201399 (1983)","journal-title":"Inf. Control"},{"key":"12_CR28","doi-asserted-by":"publisher","unstructured":"TP-DejaVu Tool Source Code. https:\/\/doi.org\/10.5281\/zenodo.8322559","DOI":"10.5281\/zenodo.8322559"},{"key":"12_CR29","unstructured":"DejaVu Tool Source Code. https:\/\/github.com\/havelund\/dejavu"}],"container-title":["Lecture Notes in Computer Science","Verification, Model Checking, and Abstract Interpretation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50521-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T01:11:49Z","timestamp":1730941909000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50521-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,30]]},"ISBN":["9783031505201","9783031505218"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50521-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,12,30]]},"assertion":[{"value":"30 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VMCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Verification, Model Checking, and Abstract Interpretation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 January 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 January 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vmcai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/popl24.sigplan.org\/home\/VMCAI-2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"74","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}