{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:08:46Z","timestamp":1725865726538},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319469812"},{"type":"electronic","value":"9783319469829"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46982-9_20","type":"book-chapter","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T11:41:08Z","timestamp":1474285268000},"page":"318-332","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging DTrace for Runtime Verification"],"prefix":"10.1007","author":[{"given":"Carl Martin","family":"Rosenberg","sequence":"first","affiliation":[]},{"given":"Martin","family":"Steffen","sequence":"additional","affiliation":[]},{"given":"Volker","family":"Stolz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"key":"20_CR1","unstructured":"Aalav, H., Avrunin, G., Corbett, J., Dillon, L., Dwyer, M., Pasareanu, C.: Specification patterns. http:\/\/patterns.projects.cis.ksu.edu\/ . Accessed 13 Aug 2015"},{"key":"20_CR2","unstructured":"Apache Software Foundation: ab - Apache HTTP server benchmarking tool. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/978-3-642-32759-9_9","volume-title":"FM 2012: Formal Methods","author":"H Barringer","year":"2012","unstructured":"Barringer, H., Falcone, Y., Havelund, K., Reger, G., Rydeheard, D.: Quantified event automata: towards expressive and efficient runtime monitors. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 68\u201384. Springer, Heidelberg (2012)"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Model-based runtime analysis of distributed reactive systems. In: 17th Australian Software Engineering Conference (ASWEC 2006). IEEE Computer Society (2006)","DOI":"10.1109\/ASWEC.2006.36"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/11944836_25","volume-title":"FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science","author":"A Bauer","year":"2006","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Monitoring of real-time properties. In: Arun-Kumar, S., Garg, N. (eds.) FSTTCS 2006. LNCS, vol. 4337, pp. 260\u2013272. Springer, Heidelberg (2006)"},{"issue":"4","key":"20_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2000799.2000800","volume":"20","author":"A Bauer","year":"2011","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20(4), 1\u201364 (2011)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/11821946_10","volume-title":"Software Composition","author":"E Bodden","year":"2006","unstructured":"Bodden, E., Stolz, V.: Tracechecks: defining semantic interfaces with temporal logic. In: L\u00f6we, W., S\u00fcdholt, M. (eds.) SC 2006. LNCS, vol. 4089, pp. 147\u2013162. Springer, Heidelberg (2006)"},{"issue":"1","key":"20_CR8","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/1117389.1117401","volume":"4","author":"B Cantrill","year":"2006","unstructured":"Cantrill, B.: Hidden in plain sight. ACM Queue 4(1), 26\u201336 (2006)","journal-title":"ACM Queue"},{"key":"20_CR9","unstructured":"Cantrill, B., Shapiro, M.W., Leventhal, A.H.: Dynamic instrumentation of production systems. In: ATEC 2004 Proceedings of the Annual Conference on USENIX Annual Technical Conference. USENIX (2004)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Chachmon, N., Richins, D., Christensson, M., Cohn, R., Cui, W., Reddi, V.J.: Simulation and analysis engine for scale-out workloads. In: Proceedings of the 30th ACM on International Conference on Supercomputing. ACM (2016)","DOI":"10.1145\/2925426.2926293"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1007\/3-540-45848-4_57","volume-title":"Graph Drawing","author":"J Ellson","year":"2002","unstructured":"Ellson, J., Gansner, E.R., Koutsofios, L., North, S.C., Woodhull, G.: Graphviz - open source graph drawing tools. In: Mutzel, P., J\u00fcnger, M., Leipert, S. (eds.) GD 2001. LNCS, vol. 2265, p. 483. Springer, Heidelberg (2002)"},{"key":"20_CR12","unstructured":"Gregg, B.: DTrace pid Provider Overhead (2011). http:\/\/dtrace.org\/blogs\/brendan\/2011\/02\/18\/dtrace-pid-provider-overhead\/"},{"key":"20_CR13","volume-title":"DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X, and FreeBSD","author":"B Gregg","year":"2011","unstructured":"Gregg, B., Mauro, J.: DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X, and FreeBSD. Prentice Hall Professional, Upper Saddle River (2011)"},{"key":"20_CR14","series-title":"Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-319-17581-2_1","volume-title":"Formal Techniques for Safety-Critical Systems","author":"K Havelund","year":"2015","unstructured":"Havelund, K., Joshi, R.: Experience with rule-based analysis of spacecraft logs. In: Artho, C., \u00d6lveczky, P.C. (eds.) FTSCS 2014. CCIS, vol. 476, pp. 1\u201316. Springer, Heidelberg (2015)"},{"issue":"3","key":"20_CR15","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1023\/A:1011254632723","volume":"19","author":"O Kupferman","year":"2001","unstructured":"Kupferman, O., Vardi, M.Y.: Model checking of safety properties. Formal Meth. Syst. Des. 19(3), 291\u2013314 (2001)","journal-title":"Formal Meth. Syst. Des."},{"key":"20_CR16","volume-title":"AspectJ in Action","author":"R Laddad","year":"2009","unstructured":"Laddad, R.: AspectJ in Action, 2nd edn. Manning Publications, Cherry Hill (2009)","edition":"2"},{"key":"20_CR17","unstructured":"Node.js Foundation. Node.js. https:\/\/nodejs.org\/en\/"},{"key":"20_CR18","volume-title":"DTrace Guide for Oracle Solaris 11","author":"Oracle Corporation","year":"2012","unstructured":"Oracle Corporation: DTrace Guide for Oracle Solaris 11. Oracle Corporation, Redwood City (2012)"},{"key":"20_CR19","unstructured":"PostgreSQL Global Development Group: PostgreSQL. http:\/\/www.postgresql.org\/"},{"key":"20_CR20","unstructured":"PostgreSQL Global Development Group: PostgreSQL Documentation: Dynamic Tracing. http:\/\/www.postgresql.org\/docs\/current\/static\/dynamic-trace.html"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Rosenberg, C.M.: Leveraging DTrace for runtime verification. Master thesis, Department of Informatics, Faculty of Mathematics and Natural Sciences, University of Oslo, May 2016","DOI":"10.1007\/978-3-319-46982-9_20"},{"key":"20_CR22","unstructured":"Scheffel, T., Schmitz, M., et al.: LamaConv-logics and automata converter library. http:\/\/www.isp.uni-luebeck.de\/lamaconv"},{"issue":"3","key":"20_CR23","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1093\/logcom\/exn078","volume":"20","author":"V Stolz","year":"2010","unstructured":"Stolz, V.: Temporal assertions with parametrized propositions. J. Log. Comput. 20(3), 743\u2013757 (2010)","journal-title":"J. Log. Comput."},{"issue":"4","key":"20_CR24","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.entcs.2006.02.007","volume":"144","author":"V Stolz","year":"2006","unstructured":"Stolz, V., Bodden, E.: Temporal assertions using AspectJ. Electron. Notes Theoret. Comput. Sci. 144(4), 109\u2013124 (2006)","journal-title":"Electron. Notes Theoret. Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46982-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T15:12:09Z","timestamp":1568387529000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46982-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319469812","9783319469829"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46982-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}