{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:44Z","timestamp":1773655904476,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319076010","type":"print"},{"value":"9783319076027","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07602-7_15","type":"book-chapter","created":{"date-parts":[[2014,6,12]],"date-time":"2014-06-12T11:29:08Z","timestamp":1402572548000},"page":"234-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Adapting Component-Based Systems at Runtime via Policies with Temporal Patterns"],"prefix":"10.1007","author":[{"given":"Olga","family":"Kouchnarenko","sequence":"first","affiliation":[]},{"given":"Jean-Fran\u00e7ois","family":"Weber","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,13]]},"reference":[{"key":"15_CR1","unstructured":"Chauvel, F., Barais, O., Plouzeau, N., Borne, I., J\u00e9z\u00e9quel, J.: Composition et expression qualitative de politiques d\u2019adaptation pour les composants Fractal. In: Actes des Journ\u00e9es nationales du GDR GPL 2009 (2009)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Dormoy, J., Kouchnarenko, O.: Event-based adaptation policies for fractal components. In: IEEE\/ACS International Conference on Computer Systems and Applications 2010, AICCSA 2010, pp. 1\u20138. IEEE (2010)","DOI":"10.1109\/AICCSA.2010.5586944"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-27269-1_12","volume-title":"Formal Aspects of Component Software","author":"J Dormoy","year":"2012","unstructured":"Dormoy, J., Kouchnarenko, O., Lanoix, A.: Using temporal logic for dynamic reconfigurations of components. In: Barbosa, L.S., Lumpe, M. (eds.) FACS 2010. LNCS, vol. 6921, pp. 200\u2013217. Springer, Heidelberg (2012)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Gonnord, L., Babau, J.P.: Quantity of resource properties expression and runtime assurance for embedded systems. In: IEEE\/ACS International Conference on Computer Systems and Applications 2009, AICCSA 2009, pp. 428\u2013435. IEEE (2009)","DOI":"10.1109\/AICCSA.2009.5069360"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: ICSE, pp. 411\u2013420 (1999)","DOI":"10.1145\/302405.302672"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1093\/logcom\/exn075","volume":"20","author":"A Bauer","year":"2010","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Comparing LTL semantics for runtime verification. J. Log. Comput. 20, 651\u2013674 (2010)","journal-title":"J. Log. Comput."},{"key":"15_CR7","first-page":"43","volume":"279","author":"A Lanoix","year":"2011","unstructured":"Lanoix, A., Dormoy, J., Kouchnarenko, O.: Combining proof and model-checking to validate reconfigurable architectures. ENTCS 279, 43\u201357 (2011)","journal-title":"ENTCS"},{"key":"15_CR8","unstructured":"Baille, G., Garnier, P., Mathieu, H., Pissard-Gibollet, R.: The INRIA Rh\u00f4ne-Alpes CyCab. Technical Report RT-0229, INRIA (1999)"},{"key":"15_CR9","volume-title":"Logic for Mathematicians","author":"AG Hamilton","year":"1978","unstructured":"Hamilton, A.G.: Logic for Mathematicians. Cambridge University Press, Cambridge (1978)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-642-32759-9_10","volume-title":"FM 2012: Formal Methods","author":"A Bauer","year":"2012","unstructured":"Bauer, A., Falcone, Y.: Decentralised LTL monitoring. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 85\u2013100. Springer, Heidelberg (2012)"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1018985923441","volume":"22","author":"F Bacchus","year":"1998","unstructured":"Bacchus, F., Kabanza, F.: Planning for temporally extended goals. Ann. Math. Artif. Intell. 22, 5\u201327 (1998)","journal-title":"Ann. Math. Artif. Intell."},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-642-35743-5_8","volume-title":"Formal Aspects of Component Software","author":"J Dormoy","year":"2012","unstructured":"Dormoy, J., Kouchnarenko, O., Lanoix, A.: Runtime verification of temporal patterns for dynamic reconfigurations of components. In: Arbab, F., \u00d6lveczky, P.C. (eds.) FACS 2011. LNCS, vol. 7253, pp. 115\u2013132. Springer, Heidelberg (2012)"},{"key":"15_CR13","first-page":"95","volume":"70","author":"M Kim","year":"2002","unstructured":"Kim, M., Lee, I., Shin, J., Sokolsky, O., et al.: Monitoring, checking, and steering of real-time systems. ENTCS 70, 95\u2013111 (2002)","journal-title":"ENTCS"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Manna, Z., Pnueli, A.: A hierarchy of temporal properties (invited paper, 1989). In: Proceedings of the 9th ACM Symposium on Principles of Distributed Computing, pp. 377\u2013410. ACM (1990)","DOI":"10.1145\/93385.93442"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/3-540-55719-9_97","volume-title":"Automata, Languages and Programming","author":"E Chang","year":"1992","unstructured":"Chang, E., Manna, Z., Pnueli, A.: Characterization of temporal property classes. In: Kuich, W. (ed.) Automata, Languages and Programming. LNCS, vol. 623, pp. 474\u2013486. Springer, Heidelberg (1992)"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-04694-0_4","volume-title":"Runtime Verification","author":"Y Falcone","year":"2009","unstructured":"Falcone, Y., Fernandez, J.-C., Mounier, L.: Runtime verification of safety-progress properties. In: Bensalem, S., Peled, D.A. (eds.) RV 2009. LNCS, vol. 5779, pp. 40\u201359. Springer, Heidelberg (2009)"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"19:1","DOI":"10.1145\/1455526.1455532","volume":"12","author":"J Ligatti","year":"2009","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM TISSEC 12, 19:1\u201319:41 (2009)","journal-title":"ACM TISSEC"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Bloom, B., Istrail, S., Meyer, A.R.: Bisimulation can\u2019t be traced. In: Ferrante, J., Mager, P. (eds.) POPL, pp. 229\u2013239. ACM Press (1988)","DOI":"10.1145\/73560.73580"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-32759-9_16","volume-title":"FM 2012: Formal Methods","author":"J Dormoy","year":"2012","unstructured":"Dormoy, J., Kouchnarenko, O., Lanoix, A.: When structural refinement of components keeps temporal properties over reconfigurations. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 171\u2013186. Springer, Heidelberg (2012)"},{"key":"15_CR20","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"J Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4, 2\u201316 (2005)","journal-title":"Int. J. Inf. Secur."},{"key":"15_CR21","volume-title":"Modeling Embedded Systems and SoC\u2019s: Concurrency and Time in Models of Computation","author":"A Jantsch","year":"2004","unstructured":"Jantsch, A.: Modeling Embedded Systems and SoC\u2019s: Concurrency and Time in Models of Computation. Morgan Kaufmann, San Francisco (2004)"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/3-540-45719-4_23","volume-title":"Algebraic Methodology and Software Technology","author":"K Trentelman","year":"2002","unstructured":"Trentelman, K., Huisman, M.: Extending JML specifications with temporal logic. In: Kirchner, H., Ringeissen, Ch. (eds.) AMAST 2002. LNCS, vol. 2422, pp. 334\u2013348. Springer, Heidelberg (2002)"},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/S0065-2458(03)58003-2","volume":"58","author":"A Biere","year":"2003","unstructured":"Biere, A., Cimatti, A., Clarke, E.M., Strichman, O., Zhu, Y.: Bounded model checking. Adv. Comput. 58, 117\u2013148 (2003)","journal-title":"Adv. Comput."},{"key":"15_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-642-24690-6_15","volume-title":"Software Engineering and Formal Methods","author":"Y Falcone","year":"2011","unstructured":"Falcone, Y., Jaber, M., Nguyen, T.-H., Bozga, M., Bensalem, S.: Runtime verification of component-based systems. In: Barthe, G., Pardo, A., Schneider, G. (eds.) SEFM 2011. LNCS, vol. 7041, pp. 204\u2013220. Springer, Heidelberg (2011)"},{"key":"15_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-04694-0_7","volume-title":"Runtime Verification","author":"K K\u00e4hk\u00f6nen","year":"2009","unstructured":"K\u00e4hk\u00f6nen, K., Lampinen, J., Heljanko, K., Niemel\u00e4, I.: The LIME interface specification language and runtime monitoring tool. In: Bensalem, S., Peled, D.A. (eds.) RV 2009. LNCS, vol. 5779, pp. 93\u2013100. Springer, Heidelberg (2009)"},{"key":"15_CR26","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1002\/spe.1077","volume":"42","author":"L Seinturier","year":"2012","unstructured":"Seinturier, L., Merle, P., Rouvoy, R., Romero, D., Schiavoni, V., Stefani, J.B.: A component-based middleware platform for reconfigurable service-oriented architectures. Softw. Pract. Exper. 42, 559\u2013583 (2012)","journal-title":"Softw. Pract. Exper."}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Component Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07602-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T23:57:57Z","timestamp":1675814277000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07602-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076010","9783319076027"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07602-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"13 June 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}