{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:22:33Z","timestamp":1725830553047},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238197"},{"type":"electronic","value":"9783319238203"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23820-3_12","type":"book-chapter","created":{"date-parts":[[2015,9,19]],"date-time":"2015-09-19T10:21:39Z","timestamp":1442658099000},"page":"185-200","source":"Crossref","is-referenced-by-count":1,"title":["Runtime Verification Through Forward Chaining"],"prefix":"10.1007","author":[{"given":"Alan","family":"Perotti","sequence":"first","affiliation":[]},{"given":"Guido","family":"Boella","sequence":"additional","affiliation":[]},{"given":"Artur d\u2019Avila","family":"Garcez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,15]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1093\/logcom\/exn076","volume":"20","author":"H Barringer","year":"2010","unstructured":"Barringer, H., Rydeheard, D.E., Havelund, K.: Rule systems for run-time monitoring: from eagle to ruler. J. Logic Comput. 20, 675\u2013706 (2010)","journal-title":"J. Logic Comput."},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-77395-5_11","volume-title":"Runtime Verification","author":"A Bauer","year":"2007","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: The good, the bad, and the ugly, but how ugly is ugly? In: Sokolsky, O., Ta\u015f\u0131ran, S. (eds.) RV 2007. LNCS, vol. 4839, pp. 126\u2013138. Springer, Heidelberg (2007)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/11944836_25","volume-title":"FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science","author":"A Bauer","year":"2006","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Monitoring of real-time properties. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 260\u2013272. Springer, Heidelberg (2006)"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/TNSM.2011.020111.00055","volume":"8","author":"D Breitgand","year":"2011","unstructured":"Breitgand, D., Goldstein, M., Shehory, E.H.: Efficient control of false negative and false positive errors with separate adaptive thresholds. IEEE Trans. Netw. Serv. Manage. 8, 128\u2013140 (2011)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1023\/A:1008328630915","volume":"11","author":"AS d\u2019Avila Garcez","year":"1999","unstructured":"d\u2019Avila Garcez, A.S., Zaverucha, G.: The connectionist inductive learning and logic programming system. Appl. Intell. 11, 59\u201377 (1999)","journal-title":"Appl. Intell."},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/10722468_19","volume-title":"SPIN Model Checking and Software Verification","author":"A Drusinsky","year":"2000","unstructured":"Drusinsky, A.: The temporal rover and the ATG rover. In: Havelund, K., Penix, J., Visser, W. (eds.) SPIN 2000. LNCS, vol. 1885, pp. 323\u2013330. Springer, Heidelberg (2000)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-540-45069-6_3","volume-title":"Computer Aided Verification","author":"C Eisner","year":"2003","unstructured":"Eisner, C., Fisman, D., Havlicek, J., Lustig, Y., McIsaac, A., Van Campenhout, D.: Reasoning with temporal logic on truncated paths. In: Hunt Jr., W.A., Somenzi, F. (eds.) CAV 2003. LNCS, vol. 2725, pp. 27\u201339. Springer, Heidelberg (2003)"},{"key":"12_CR8","doi-asserted-by":"crossref","first-page":"47","DOI":"10.18564\/jasss.1750","volume":"14","author":"CD Hollander","year":"2011","unstructured":"Hollander, C.D., Annie, S.W.: The current state of normative agent-based systems. J. Artif. Soc. Soc. Simul. 14, 47\u201362 (2011)","journal-title":"J. Artif. Soc. Soc. Simul."},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"14","DOI":"10.2307\/2268661","volume":"16","author":"A Horn","year":"1951","unstructured":"Horn, A.: On sentences which are true of direct unions of algebras. J. Symb. Log. 16, 14\u201321 (1951)","journal-title":"J. Symb. Log."},{"key":"12_CR10","first-page":"83","volume":"16","author":"SA Kripke","year":"1963","unstructured":"Kripke, S.A.: Semantical considerations on modal logic. Acta Philosophica Fennica 16, 83\u201394 (1963)","journal-title":"Acta Philosophica Fennica"},{"key":"12_CR11","unstructured":"Lassez, J.-L., Maher, M.J.: The denotational semantics of horn clauses as aproduction system. In: Proceedings of the Association for the Advancement of Artificial Intelligence 1983, pp. 229\u2013231 (1983)"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Logic Algebraic Program. 78, 293\u2013303 (2009)","journal-title":"J. Logic Algebraic Program."},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-15648-8_16","volume-title":"Logics of Programs","author":"O Lichtenstein","year":"1985","unstructured":"Lichtenstein, O., Pnueli, A., Zuck, L.: The glory of the past. In: Parikh, R. (ed.) Logics of Programs. Lecture Notes in Computer Science, vol. 193, pp. 196\u2013218. Springer, Heidelberg (1985)"},{"key":"12_CR14","unstructured":"Lukasiewicz, J.: O logice trjwartosciowej (On Three-Valued Logic) (1920)"},{"key":"12_CR15","unstructured":"Perotti, A., d\u2019Avila Garcez, A.S., Boella, G.: Neural networks for runtime verification. In: 2014 International Joint Conference on Neural Networks, IJCNN 2014, Beijing, China, July 6\u201311, 2014, pp. 2637\u20132644. IEEE (2014)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Pesic, M., Schonenberg, H., van der Aalst, W.M.P.: Declare: full support for loosely-structured processes. In: 11th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2007, pp. 287\u2013287 (2007)","DOI":"10.1109\/EDOC.2007.4384001"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: Proceedings of the Annual Symposium on Foundations of Computer Science 1977, pp. 46\u201357 (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"12_CR18","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-28108-2_19","volume-title":"Business Process Management Workshops","author":"W Aalst van der","year":"2012","unstructured":"van der Aalst, W., et al.: Process mining Manifesto. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM Workshops 2011, Part I. LNBIP, vol. 99, pp. 169\u2013194. Springer, Heidelberg (2012)"},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1145\/321978.321991","volume":"23","author":"MH Emden Van","year":"1976","unstructured":"Van Emden, M.H., Kowalski, R.A.: The semantics of predicate logic as a programming language. J. ACM 23, 733\u2013742 (1976)","journal-title":"J. ACM"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23820-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:45:29Z","timestamp":1559249129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23820-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238197","9783319238203"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23820-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}