{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T06:31:13Z","timestamp":1762929073653,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031626449"},{"type":"electronic","value":"9783031626456"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62645-6_11","type":"book-chapter","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T05:01:51Z","timestamp":1718168511000},"page":"197-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptable Configuration of\u00a0Decentralized Monitors"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1146-4850","authenticated-orcid":false,"given":"Ennio","family":"Visconti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8004-6601","authenticated-orcid":false,"given":"Ezio","family":"Bartocci","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0114-0641","authenticated-orcid":false,"given":"Yli\u00e8s","family":"Falcone","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2263-9342","authenticated-orcid":false,"given":"Laura","family":"Nenzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,13]]},"reference":[{"key":"11_CR1","unstructured":"Asudani, D.S., Nagwani, N.K., Singh, P.: Impact of word embedding models on text analytics in deep learning environment: a review. Artif. Intell. Rev., 1\u201381 (2023). https:\/\/api.semanticscholar.org\/CorpusID:257098478"},{"key":"11_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-75632-5_1","volume-title":"Lectures on Runtime Verification","author":"E Bartocci","year":"2018","unstructured":"Bartocci, E., Falcone, Y., Francalanza, A., Reger, G.: Introduction to runtime verification. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 1\u201333. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_1"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Bartocci, E., Mateis, C., Nesterini, E., Nickovic, D.: Survey on mining signal temporal logic specifications. Inf. Comput. 289(Part), 104957 (2022)","DOI":"10.1016\/j.ic.2022.104957"},{"key":"11_CR4","unstructured":"Basin, D., Klaedtke, F., Zalinescu, E.: Failure-aware Runtime Verification of Distributed Systems. In: Harsha, P., Ramalingam, G. (eds.) 35th IARCS Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2015), Dagstuhl, Germany (2015)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-642-32759-9_10","volume-title":"FM 2012: Formal Methods","author":"A Bauer","year":"2012","unstructured":"Bauer, A., Falcone, Y.: Decentralised LTL monitoring. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 85\u2013100. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32759-9_10"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Bombara, G., Belta, C.: Offline and online learning of signal temporal logic formulae using decision trees. ACM Trans. Cyber Phys. Syst. 5(3), 22:1\u201322:23 (2021)","DOI":"10.1145\/3433994"},{"issue":"5","key":"11_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3550483","volume":"69","author":"B Bonakdarpour","year":"2022","unstructured":"Bonakdarpour, B., Fraigniaud, P., Rajsbaum, S., Rosenblueth, D., Travers, C.: Decentralized asynchronous crash-resilient runtime verification. J. ACM 69(5), 1\u201331 (2022)","journal-title":"J. ACM"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Bornholt, J., et\u00a0al.: Using lightweight formal methods to validate a key-value storage node in amazon S3. In: SOSP 2021 (2021)","DOI":"10.1145\/3477132.3483540"},{"issue":"4","key":"11_CR9","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s10009-021-00623-1","volume":"23","author":"L Bortolussi","year":"2021","unstructured":"Bortolussi, L., Cairoli, F., Paoletti, N., Smolka, S.A., Stoller, S.D.: Neural predictive monitoring and a comparison of frequentist and Bayesian approaches. Int. J. Softw. Tools Technol. Transf. 23(4), 615\u2013640 (2021)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"11_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-030-99524-9_15","volume-title":"TACAS 2022","author":"L Bortolussi","year":"2022","unstructured":"Bortolussi, L., Gallo, G.M., Kret\u00ednsk\u00fd, J., Nenzi, L.: Learning model checking and the kernel trick for signal temporal logic on stochastic processes. In: Fisman, D., Rosu, G. (eds.) TACAS 2022. LNCS, vol. 13243, pp. 281\u2013300. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99524-9_15"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-319-11164-3_12","volume-title":"Runtime Verification","author":"C Colombo","year":"2014","unstructured":"Colombo, C., Falcone, Y.: Organising LTL monitors over distributed systems with a global clock. In: Bonakdarpour, B., Smolka, S.A. (eds.) RV 2014. LNCS, vol. 8734, pp. 140\u2013155. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11164-3_12"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10703-017-0286-7","volume":"51","author":"JV Deshmukh","year":"2015","unstructured":"Deshmukh, J.V., Donz\u00e9, A., Ghosh, S., Jin, X., Juniwal, G., Seshia, S.A.: Robust online monitoring of signal temporal logic. Formal Methods Syst. Des. 51, 5\u201330 (2015)","journal-title":"Formal Methods Syst. Des."},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: Proceedings of the 21st International Conference on Software Engineering, ICSE 1999. Association for Computing Machinery (1999)","DOI":"10.1145\/302405.302672"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-540-45069-6_3","volume-title":"Computer Aided Verification","author":"C Eisner","year":"2003","unstructured":"Eisner, C., Fisman, D., Havlicek, J., Lustig, Y., McIsaac, A., Van Campenhout, D.: Reasoning with temporal logic on truncated paths. In: Hunt, W.A., Somenzi, F. (eds.) CAV 2003. LNCS, vol. 2725, pp. 27\u201339. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45069-6_3"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3355181","volume":"29","author":"A El-Hokayem","year":"2020","unstructured":"El-Hokayem, A., Falcone, Y.: On the monitoring of decentralized specifications: semantics, properties, analysis, and simulation. ACM Trans. Softw. Eng. Methodol. 29, 1\u201357 (2020)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-98850-0_1","volume-title":"Verification and Evaluation of Computer and Communication Systems","author":"Y Falcone","year":"2022","unstructured":"Falcone, Y.: On decentralized monitoring. In: Nouri, A., Wu, W., Barkaoui, K., Li, Z.W. (eds.) VECoS 2021. LNCS, vol. 13187, pp. 1\u201316. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-98850-0_1"},{"key":"11_CR17","unstructured":"Falcone, Y.: DecentMon: an OCaml benchmark for decentralised monitoring of LTL (2023). https:\/\/gricad-gitlab.univ-grenoble-alpes.fr\/falconey\/decentmon"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-319-11164-3_9","volume-title":"Runtime Verification","author":"P Fraigniaud","year":"2014","unstructured":"Fraigniaud, P., Rajsbaum, S., Travers, C.: On the number of opinions needed for fault-tolerant run-time monitoring in distributed systems. In: Bonakdarpour, B., Smolka, S.A. (eds.) RV 2014. LNCS, vol. 8734, pp. 92\u2013107. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11164-3_9"},{"key":"11_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-319-75632-5_6","volume-title":"Lectures on Runtime Verification","author":"A Francalanza","year":"2018","unstructured":"Francalanza, A., P\u00e9rez, J.A., S\u00e1nchez, C.: Runtime verification for decentralised and distributed systems. In: Bartocci, E., Falcone, Y. (eds.) Lectures on Runtime Verification. LNCS, vol. 10457, pp. 176\u2013210. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_6"},{"issue":"3","key":"11_CR20","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/BF00342633","volume":"20","author":"K Fukushima","year":"1975","unstructured":"Fukushima, K.: Cognitron: a self-organizing multilayered neural network. Biol. Cybern. 20(3), 121\u2013136 (1975)","journal-title":"Biol. Cybern."},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Gruhn, V., Laue, R.: Patterns for timed property specifications. Electron. Notes Theoret. Comput. Sci. 153(2), 117\u2013133 (2006). Proc. of QAPL 2005","DOI":"10.1016\/j.entcs.2005.10.035"},{"key":"11_CR22","unstructured":"HABS VA,2-ALB,1- (sheet 2 of 8): Company House, State Route 719, Alberene, Albemarle County, VA, HABS VA,2-ALB,1- (Sheet 2 of 8)"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Jantsch, A.: Chapter four - the synchronous model of computation. In: Modeling Embedded Systems and SoC\u2019s. Systems on Silicon. Morgan Kaufmann (2003)","DOI":"10.1016\/B978-155860925-9\/50006-8"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-030-88494-9_8","volume-title":"Runtime Verification","author":"K Mamouras","year":"2021","unstructured":"Mamouras, K., Chattopadhyay, A., Wang, Z.: A compositional framework for\u00a0quantitative online monitoring over\u00a0continuous-time signals. In: Feng, L., Fisman, D. (eds.) RV 2021. LNCS, vol. 12974, pp. 142\u2013163. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88494-9_8"},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-319-99154-2_20","volume-title":"Quantitative Evaluation of Systems","author":"L Nenzi","year":"2018","unstructured":"Nenzi, L., Silvetti, S., Bartocci, E., Bortolussi, L.: A robust genetic algorithm for learning temporal specifications from data. In: McIver, A., Horvath, A. (eds.) QEST 2018. LNCS, vol. 11024, pp. 323\u2013338. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99154-2_20"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Neto, W.L., Moreira, M.T., Amar\u00f9, L.G., Yu, C., Gaillardon, P.E.: Read your circuit: leveraging word embedding to guide logic optimization. In: 2021 26th Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 530\u2013535 (2021). https:\/\/api.semanticscholar.org\/CorpusID:231730639","DOI":"10.1145\/3394885.3431560"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science (SFCS 1977), pp. 46\u201357 (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Racharak, T.: On approximation of concept similarity measure in description logic ELH with pre-trained word embedding. IEEE Access 9, 61429\u201361443 (2021). https:\/\/api.semanticscholar.org\/CorpusID:233433689","DOI":"10.1109\/ACCESS.2021.3073730"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Rufino, J.: Towards integration of adaptability and non-intrusive runtime verification in avionic systems. SIGBED Rev. 13(1), 60\u201365 (2016)","DOI":"10.1145\/2907972.2907981"},{"key":"11_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-13185-1_1","volume-title":"Computer Aided Verification","author":"N Rungta","year":"2022","unstructured":"Rungta, N.: A billion SMT queries a day (invited paper). In: Shoham, S., Vizel, Y. (eds.) CAV 2022. LNCS, Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-13185-1_1"},{"issue":"3","key":"11_CR31","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s10703-019-00337-w","volume":"54","author":"C S\u00e1nchez","year":"2019","unstructured":"S\u00e1nchez, C., et al.: A survey of challenges for runtime verification from advanced application domains (beyond software). Formal Methods Syst. Des. 54(3), 279\u2013335 (2019)","journal-title":"Formal Methods Syst. Des."},{"issue":"7","key":"11_CR32","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/3503914","volume":"65","author":"SA Seshia","year":"2022","unstructured":"Seshia, S.A., Sadigh, D., Sastry, S.S.: Toward verified artificial intelligence. Commun. ACM 65(7), 46\u201355 (2022)","journal-title":"Commun. ACM"},{"key":"11_CR33","doi-asserted-by":"publisher","unstructured":"Visconti, E., Bartocci, E., Falcone, Y., Nenzi, L.: Predicting Decentmon (Source code + Docker Image), March 2024. https:\/\/doi.org\/10.6084\/m9.figshare.25465243.v2","DOI":"10.6084\/m9.figshare.25465243.v2"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Visconti, E., Bartocci, E., Loreti, M., Nenzi, L.: Online monitoring of spatio-temporal properties for imprecise signals. In: Proceedings of MEMOCODE 2021. ACM (2021)","DOI":"10.1145\/3487212.3487344"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Distributed Objects, Components, and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62645-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T05:03:20Z","timestamp":1718168600000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62645-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031626449","9783031626456"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62645-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FORTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Techniques for Distributed Objects, Components, and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Groningen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"forte2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}