{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T23:40:08Z","timestamp":1749598808583,"version":"3.41.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319471655"},{"type":"electronic","value":"9783319471662"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47166-2_28","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T22:07:34Z","timestamp":1475618854000},"page":"402-415","source":"Crossref","is-referenced-by-count":3,"title":["StaRVOOrS \u2014 Episode II"],"prefix":"10.1007","author":[{"given":"Wolfgang","family":"Ahrendt","sequence":"first","affiliation":[]},{"given":"Gordon J.","family":"Pace","sequence":"additional","affiliation":[]},{"given":"Gerardo","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/978-3-319-19249-9_8","volume-title":"FM 2015: Formal Methods","author":"W Ahrendt","year":"2015","unstructured":"Ahrendt, W., Chimento, J.M., Pace, G.J., Schneider, G.: A specification language for static and runtime verification of data and control properties. In: Bj\u00f8rner, N., Boer, F. (eds.) FM 2015. LNCS, vol. 9109, pp. 108\u2013125. Springer, Heidelberg (2015)"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Ahrendt, W., Dylla, M.: A system for compositional verification of asynchronous objects. Sci. Comput. Program. (2012). http:\/\/dx.doi.org\/10.1016\/j.scico.2010.08.003","DOI":"10.1016\/j.scico.2010.08.003"},{"key":"28_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1007\/978-3-642-34026-0_24","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation","author":"W Ahrendt","year":"2012","unstructured":"Ahrendt, W., Pace, G.J., Schneider, G.: A unified approach for static and runtime verification: framework and applications. In: Steffen, B., Margaria, T. (eds.) ISoLA 2012, Part I. LNCS, vol. 7609, pp. 312\u2013326. Springer, Heidelberg (2012)"},{"issue":"4","key":"28_CR4","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/2000799.2000800","volume":"20","author":"A Bauer","year":"2011","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20(4), 14 (2011)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"28_CR5","series-title":"Lecture Notes in Computer Science","volume-title":"Verification of Object-Oriented Software: The KeY Approach","year":"2007","unstructured":"Beckert, B., H\u00e4hnle, R., Schmitt, P.H. (eds.): Verification of Object-Oriented Software: The KeY Approach. LNCS, vol. 4334. Springer, Heidelberg (2007)"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/978-3-642-16612-9_8","volume-title":"Runtime Verification","author":"E Bodden","year":"2010","unstructured":"Bodden, E., Lam, P.: Clara: partially evaluating runtime monitors at compile time. In: Barringer, H., et al. (eds.) RV 2010. LNCS, vol. 6418, pp. 74\u201388. Springer, Heidelberg (2010)"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/978-3-642-16612-9_15","volume-title":"Runtime Verification","author":"E Bodden","year":"2010","unstructured":"Bodden, E., Lam, P., Hendren, L.: Clara: a framework for partially evaluating finite-state runtime monitors ahead of time. In: Barringer, H., et al. (eds.) RV 2010. LNCS, vol. 6418, pp. 183\u2013197. Springer, Heidelberg (2010)"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-23820-3_21","volume-title":"Runtime Verification","author":"JM Chimento","year":"2015","unstructured":"Chimento, J.M., Ahrendt, W., Pace, G.J., Schneider, G.: StaRVOOrS: a tool for combined static and runtime verification of Java. In: Bartocci, E., Majumdar, R. (eds.) RV 2015. LNCS, vol. 9333, pp. 297\u2013305. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-23820-3_21"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-642-03240-0_13","volume-title":"Formal Methods for Industrial Critical Systems","author":"C Colombo","year":"2009","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: Dynamic event-based runtime monitoring of real-time and contextual properties. In: Cofer, D., Fantechi, A. (eds.) FMICS 2008. LNCS, vol. 5596, pp. 135\u2013149. Springer, Heidelberg (2009)"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: LARVA - a tool for runtime monitoring of Java programs. In: SEFM 2009, pp. 33\u201337. IEEE Computer Society (2009)","DOI":"10.1109\/SEFM.2009.13"},{"key":"28_CR11","unstructured":"de Roever, W.-P., de Boer, F., Hannemann, U., Hooman, J., Lakhnech, Y., Poel, M., Zwiers, J., Verification, C.: Introduction to compositional and noncompositional methods. In: Number 54 in Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, Cambridge, November 2001"},{"issue":"12","key":"28_CR12","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1109\/TSE.2004.91","volume":"30","author":"N Delgado","year":"2004","unstructured":"Delgado, N., Gates, A.Q., Roach, S.: A taxonomy and catalog of runtime software-fault monitoring tools. IEEE Trans. Softw. Eng. 30(12), 859\u2013872 (2004)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-319-25423-4_14","volume-title":"Formal Methods and Software Engineering","author":"CC Din","year":"2015","unstructured":"Din, C.C., Tapia Tarifa, S.L., H\u00e4hnle, R., Johnsen, E.B.: History-based specification and verification of scalable concurrent and distributed systems. In: Butler, M., Conchon, S., Za\u00efdi, F. (eds.) ICFEM 2015. LNCS, vol. 9407, pp. 217\u2013233. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-25423-4_14"},{"issue":"57","key":"28_CR14","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.jlap.2013.04.001","volume":"82","author":"A Francalanza","year":"2013","unstructured":"Francalanza, A., Gauci, A., Pace, G.J.: Distributed system contract monitoring. J. Logic Algebraic Programm. 82(57), 186\u2013215 (2013). Formal Languages and Analysis of Contract-Oriented Software (FLACOS 2011)","journal-title":"J. Logic Algebraic Programm."},{"issue":"5","key":"28_CR15","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/32.588521","volume":"23","author":"GJ Holzmann","year":"1997","unstructured":"Holzmann, G.J.: The model checker SPIN. Softw. Eng. 23(5), 279\u2013295 (1997)","journal-title":"Softw. Eng."},{"key":"28_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/978-3-642-25271-6_8","volume-title":"Formal Methods for Components and Objects","author":"EB Johnsen","year":"2011","unstructured":"Johnsen, E.B., H\u00e4hnle, R., Sch\u00e4fer, J., Schlatte, R., Steffen, M.: ABS: a core language for abstract behavioral specification. In: Aichernig, B.K., Boer, F.S., Bonsangue, M.M. (eds.) Formal Methods for Components and Objects. LNCS, vol. 6957, pp. 142\u2013164. Springer, Heidelberg (2011)"},{"issue":"1","key":"28_CR17","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s10270-006-0011-2","volume":"6","author":"EB Johnsen","year":"2007","unstructured":"Johnsen, E.B., Owe, O.: An asynchronous communication model for distributed concurrent objects. Softw. Syst. Model. 6(1), 35\u201358 (2007)","journal-title":"Softw. Syst. Model."},{"key":"28_CR18","unstructured":"Jones, C.B.: Development methods for computer programs including a notion of interference. Ph.D. thesis, Oxford University, UK (1981)"},{"key":"28_CR19","volume-title":"Pattern Languages of Program Design 2","author":"RG Lavender","year":"1996","unstructured":"Lavender, R.G., Schmidt, D.C.: Active object: an object behavioral pattern for concurrent programming. In: Vlissides, J.M., Coplien, J.O., Kerth, N.L. (eds.) Pattern Languages of Program Design 2. Addison-Wesley Longman Publishing Co., Inc., Boston (1996)"},{"issue":"2","key":"28_CR20","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.cosrev.2010.02.002","volume":"4","author":"A Lazouski","year":"2010","unstructured":"Lazouski, A., Martinelli, F., Mori, P.: Usage control in computer security: a survey. Comput. Sci. Rev. 4(2), 81\u201399 (2010)","journal-title":"Comput. Sci. Rev."},{"key":"28_CR21","unstructured":"Leavens, G.T., Poll, E., Clifton, C., Cheon, Y., Ruby, C., Cok, D., M\u00fcller, P., Kiniry, J., Chalin, P., Zimmerman, D.M., Dietl, W.: JML reference manual. Draft 2344 (2013). http:\/\/www.eecs.ucf.edu\/~leavens\/JML\/documentation.shtml"},{"issue":"1","key":"28_CR22","first-page":"1","volume":"2","author":"S Malakuti Khah Olun Abadi","year":"2011","unstructured":"Malakuti Khah Olun Abadi, S., Ak\u015fit, M., Bockisch, C.M.: Runtime verification in distributed computing. J. Convergence 2(1), 1\u201310 (2011)","journal-title":"J. Convergence"},{"issue":"7","key":"28_CR23","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1109\/TSE.1981.230844","volume":"7","author":"J Misra","year":"1981","unstructured":"Misra, J., Chandy, K.: Proofs of networks and processes. IEEE Trans. Softw. Eng. 7(7), 417\u2013426 (1981)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Mok, A.K., Liu, G.: Efficient run-time monitoring of timing constraints. In: RTAS 1997, pp. 252\u2013262. IEEE Computer Society (1997)","DOI":"10.1109\/RTTAS.1997.601363"},{"key":"28_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/978-3-642-23300-5_4","volume-title":"Availability, Reliability and Security for Business, Enterprise and Health Information Systems","author":"\u00c5A Nyre","year":"2011","unstructured":"Nyre, \u00c5.A.: Usage control enforcement - a survey. In: Tjoa, A.M., Quirchmayr, G., You, I., Xu, L. (eds.) ARES 2011. LNCS, vol. 6908, pp. 38\u201349. Springer, Heidelberg (2011)"},{"key":"28_CR26","volume-title":"Logics and Models of Concurrent Systems","author":"A Pnueli","year":"1985","unstructured":"Pnueli, A.: In transition from global to modular temporal reasoning about programs. In: Apt, K.R. (ed.) Logics and Models of Concurrent Systems. Springer, Heidelberg (1985)"},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Scheffel, T., Schmitz, M.: Three-valued asynchronous distributed runtime verification. In: 2014 Twelfth ACM\/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE), pp. 52\u201361, October 2014","DOI":"10.1109\/MEMCOD.2014.6961843"},{"key":"28_CR28","doi-asserted-by":"crossref","unstructured":"Sen, K., Vardhan, A., Agha, G., Rosu, G.: Efficient decentralized monitoring of safety in distributed systems. In: 26th International Conference on Software Engineering (ICSE 2004), 23\u201328 May 2004, Edinburgh, United Kingdom, pp. 418\u2013427 (2004)","DOI":"10.1109\/ICSE.2004.1317464"},{"key":"28_CR29","unstructured":"Tonin, I.: Verifying the mondex case study. The key approach. Technical report 2007\u20134, Universit\u00e4t Karlsruhe (2007)"},{"key":"28_CR30","doi-asserted-by":"crossref","unstructured":"Woodcock, J.: First steps in the verified software grand challenge. In: SEW 2006, pp. 203\u2013206. IEEE Computer Society (2006)","DOI":"10.1109\/SEW.2006.17"},{"key":"28_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/978-3-642-04694-0_13","volume-title":"Runtime Verification","author":"W Zhou","year":"2009","unstructured":"Zhou, W., Sokolsky, O., Loo, B.T., Lee, I.: DMaC: distributed monitoring and checking. In: Peled, D.A., Bensalem, S. (eds.) RV 2009. LNCS, vol. 5779, pp. 184\u2013201. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47166-2_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T23:10:20Z","timestamp":1749597020000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47166-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319471655","9783319471662"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47166-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}