{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T07:46:02Z","timestamp":1766043962776,"version":"3.48.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032054340"},{"type":"electronic","value":"9783032054357"}],"license":[{"start":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T00:00:00Z","timestamp":1757635200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T00:00:00Z","timestamp":1757635200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05435-7_7","type":"book-chapter","created":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T01:30:27Z","timestamp":1757727027000},"page":"101-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DynSRV: Dynamically Updated Properties for\u00a0Stream Runtime Verification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8467-7567","authenticated-orcid":false,"given":"Morten Haahr","family":"Kristensen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8035-0884","authenticated-orcid":false,"given":"Thomas","family":"Wright","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2692-9742","authenticated-orcid":false,"given":"Cl\u00e1udio","family":"Gomes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0248-1552","authenticated-orcid":false,"given":"Lukas","family":"Esterle","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4589-1500","authenticated-orcid":false,"given":"Peter Gorm","family":"Larsen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,12]]},"reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-24622-0_5","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"H Barringer","year":"2004","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-based runtime verification. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 44\u201357. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24622-0_5"},{"key":"7_CR2","unstructured":"Bierman, G., Hicks, M., Sewell, P., Stoyle, G.: Formalizing Dynamic Software Updating (2023)"},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Carwehl, M., Vogel, T., Rodrigues, G.N., Grunske, L.: Runtime verification of self- adaptive systems with changing requirements. In: IEEE\/ACM Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), pp. 104\u2013 114 (2023). https:\/\/doi.org\/10.1109\/SEAMS59076.2023.00024","DOI":"10.1109\/SEAMS59076.2023.00024"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-319-33693-0_12","volume-title":"Integrated Formal Methods","author":"I Cassar","year":"2016","unstructured":"Cassar, I., Francalanza, A.: On implementing a monitor-oriented programming framework for actor systems. In: \u00c1brah\u00e1m, E., Huisman, M. (eds.) IFM 2016. LNCS, vol. 9681, pp. 176\u2013192. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33693-0_12"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-319-23820-3_3","volume-title":"Runtime Verification","author":"I Cassar","year":"2015","unstructured":"Cassar, I., Francalanza, A.: Runtime adaptation for actor systems. In: Bartocci, E., Majumdar, R. (eds.) RV 2015. LNCS, vol. 9333, pp. 38\u201354. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23820-3_3"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-030-00302-9_8","volume-title":"Programming with Actors","author":"T Clark","year":"2018","unstructured":"Clark, T., Kulkarni, V., Barat, S., Barn, B.: A homogeneous actor-based monitor language for adaptive behaviour. In: Ricci, A., Haller, P. (eds.) Programming with Actors. LNCS, vol. 10789, pp. 216\u2013244. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00302-9_8"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Clark, T., Kulkarni, V., Barat, S., Barn, B.: Actor monitors for adaptive behaviour. In: Proceedings of the Innovations in Software Engineering Conference, pp. 85\u201395 (2017). https:\/\/doi.org\/10.1145\/3021460.3021469","DOI":"10.1145\/3021460.3021469"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"D\u2019Angelo, B., et al.: LOLA: runtime monitoring of synchronous systems. In: Proceedings of the International Symposium on Temporal Representation and Reasoning, pp. 166\u2013174 (2005). https:\/\/doi.org\/10.1109\/TIME.2005.26","DOI":"10.1109\/TIME.2005.26"},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Distefano, D., Rensink, A., Katoen, J.-P.: Model checking birth and death. In: Proceedings of IFIP International Conference on Theoretical Computer Science (TCS), pp. 435\u2013447 (2002). https:\/\/doi.org\/10.1007\/978-0-387-35608-2_36","DOI":"10.1007\/978-0-387-35608-2_36"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Esterle, L., Brown, J.N.: The competence awareness window: knowing what i can and cannot do. In: 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C), pp. 62\u201363 (2020). https:\/\/doi.org\/10.1109\/ACSOS-C51401.2020.00031","DOI":"10.1109\/ACSOS-C51401.2020.00031"},{"issue":"3","key":"7_CR11","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s11334-022-00447-5","volume":"18","author":"B Finkbeiner","year":"2022","unstructured":"Finkbeiner, B., Klein, F., Metzger, N.: Live synthesis. Innov. Syst. Softw. Eng. 18(3), 443\u2013454 (2022). https:\/\/doi.org\/10.1007\/s11334-022-00447-5","journal-title":"Innov. Syst. Softw. Eng."},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-030-60508-7_24","volume-title":"Runtime Verification","author":"B Finkbeiner","year":"2020","unstructured":"Finkbeiner, B., Oswald, S., Passing, N., Schwenger, M.: Verified rust monitors for lola specifications. In: Deshmukh, J., Ni\u010dkovi\u0107, D. (eds.) RV 2020. LNCS, vol. 12399, pp. 431\u2013450. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60508-7_24"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-030-03769-7_7","volume-title":"Runtime Verification","author":"K Havelund","year":"2018","unstructured":"Havelund, K., Peled, D.: Runtime verification: from propositional to first-order temporal logic. In: Colombo, C., Leucker, M. (eds.) RV 2018. LNCS, vol. 11237, pp. 90\u2013112. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_7"},{"key":"7_CR14","doi-asserted-by":"publisher","unstructured":"Hicks, M., Moore, J.T., Nettles, S.: Dynamic software updating. ACM SIGPLAN Not. 36(5), 13\u201323 (2001). https:\/\/doi.org\/10.1145\/381694.378798","DOI":"10.1145\/381694.378798"},{"key":"7_CR15","doi-asserted-by":"publisher","unstructured":"Iftikhar, M.U.,Weyns, D.: ActivFORMS: active formal models for self-adaptation. In: Proceedings of the International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), pp. 125\u2013134 (2014). https:\/\/doi.org\/10.1145\/2593929.2593944","DOI":"10.1145\/2593929.2593944"},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Kephart, J., Chess, D.: The vision of autonomic computing. Computer 36(1), 41\u2013 50 (2003). https:\/\/doi.org\/10.1109\/mc.2003.1160055","DOI":"10.1109\/mc.2003.1160055"},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Larsen, P.G., et al.: Robotic safe adaptation in unprecedented situations: the RoboSAPIENS project. In: Research Directions: Cyber-Physical Systems, vol. 2 (2024). https:\/\/doi.org\/10.1017\/cbp.2024.4","DOI":"10.1017\/cbp.2024.4"},{"key":"7_CR18","doi-asserted-by":"publisher","unstructured":"Leucker, M., S\u00e1nchez, C., Scheffel, T., Schmitz, M., Schramm, A.: TeSSLa: runtime verification of non-synchronized real-time streams. In: Proceedings of the Annual ACM Symposium on Applied Computing, pp. 1925\u20131933 (2018). https:\/\/doi.org\/10.1145\/3167132.3167338","DOI":"10.1145\/3167132.3167338"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Li, Y., Duan, X., Xu, Y., Zhao, C.: Dynamic assessment approach for intelligent power distribution systems based on runtime verification with requirements updates. In: High-Confidence Computing (2024). https:\/\/doi.org\/10.1016\/j.hcc.2024.100255","DOI":"10.1016\/j.hcc.2024.100255"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Lounas, R., Mezghiche, M., Lanet, J.-L.: Formal methods in dynamic software updating: a survey. Int. J. Crit. Comput.-Based Syst. 9(1\u20132), 76\u2013114 (2019). https:\/\/doi.org\/10.1504\/IJCCBS.2019.098794","DOI":"10.1504\/IJCCBS.2019.098794"},{"key":"7_CR21","doi-asserted-by":"publisher","unstructured":"Nahabedian, L., et al.: Assured and correct dynamic update of controllers. In: 2016 IEEE\/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), pp. 96\u2013107 (2016). https:\/\/doi.org\/10.1145\/2897053.2897056. https:\/\/ieeexplore.ieee.org\/document\/7830552. Accessed 25 July 2025","DOI":"10.1145\/2897053.2897056"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Pedregal, P., Gorostiaga, F., S\u00e1nchez, C.: A stream runtime verification tool with nested and retroactive parametrization. In: Runtime Verification, pp. 351\u2013 362 (2023). https:\/\/doi.org\/10.1007\/978-3-031-44267-4_19","DOI":"10.1007\/978-3-031-44267-4_19"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Seifzadeh, H., Abolhassani, H., Moshkenani, M.S.: A survey of dynamic software updating. J. Softw. Evol. Process 25(5), 535\u2013568 (2012). https:\/\/doi.org\/10.1002\/smr.1556","DOI":"10.1002\/smr.1556"},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Sokolsky, O., Sammapun, U., Lee, I., Kim, J.: Run-time checking of dynamic properties. Electron. Notes Theor. Comput. Sci. 144(4), 91\u2013108 (2006). https:\/\/doi.org\/10.1016\/j.entcs.2006.02.006","DOI":"10.1016\/j.entcs.2006.02.006"},{"key":"7_CR25","doi-asserted-by":"publisher","unstructured":"Subramanian, S., Hicks, M., McKinley, K.S.: Dynamic software updates: a VMcentric approach. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 1\u201312 (2009). https:\/\/doi.org\/10.1145\/1542476.1542478","DOI":"10.1145\/1542476.1542478"},{"key":"7_CR26","unstructured":"Walton, C., Krl, D., Gilmore, S.: An abstract machine for module replacement. In: Proceedings of the Workshop on Principles of Abstract Machines (1998)"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Weyns, D.: Engineering self-adaptive software systems an organized tour. In: Proceedings of the IEEE International Workshops on Foundations and Applications of Self* Systems (FAS*W), pp. 1\u20132 (2018). https:\/\/doi.org\/10.1109\/FASW.2018.00012","DOI":"10.1109\/FASW.2018.00012"},{"key":"7_CR28","doi-asserted-by":"publisher","unstructured":"Wong, T., Wagner, M., Treude, C.: Self-adaptive systems: a systematic literature review across categories and domains. Inf. Softw. Technol. 148, 106934 (2022). https:\/\/doi.org\/10.1016\/j.infsof.2022.106934","DOI":"10.1016\/j.infsof.2022.106934"},{"issue":"10","key":"7_CR29","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.1016\/j.jss.2006.02.062","volume":"79","author":"J Zhang","year":"2006","unstructured":"Zhang, J., Cheng, B.H.C.: Using temporal logic to specify adaptive program semantics. J. Syst. Softw. 79(10), 1361\u20131369 (2006). https:\/\/doi.org\/10.1016\/j.jss.2006.02.062","journal-title":"J. Syst. Softw."}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05435-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T07:43:16Z","timestamp":1766043796000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05435-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,12]]},"ISBN":["9783032054340","9783032054357"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05435-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,9,12]]},"assertion":[{"value":"12 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Runtime Verification","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Graz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/rv25.isec.tugraz.at\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}