{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:56:39Z","timestamp":1742928999436,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319662831"},{"type":"electronic","value":"9783319662848"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66284-8_38","type":"book-chapter","created":{"date-parts":[[2017,9,2]],"date-time":"2017-09-02T08:14:30Z","timestamp":1504340070000},"page":"447-461","source":"Crossref","is-referenced-by-count":6,"title":["Modeling Rover Communication Using Hierarchical State Machines with Scala"],"prefix":"10.1007","author":[{"given":"Klaus","family":"Havelund","sequence":"first","affiliation":[]},{"given":"Rajeev","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,27]]},"reference":[{"key":"38_CR1","unstructured":"Akka FSMs. \nhttp:\/\/doc.akka.io\/docs\/akka\/current\/scala\/fsm.html"},{"key":"38_CR2","unstructured":"Unified Modeling Language. \nhttp:\/\/www.uml.org\n\n. Accessed 06 Aug 2017"},{"key":"38_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-32759-9_9","volume-title":"FM 2012: Formal Methods","author":"H Barringer","year":"2012","unstructured":"Barringer, H., Falcone, Y., Havelund, K., Reger, G., Rydeheard, D.: Quantified event automata: towards expressive and efficient runtime monitors. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 68\u201384. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-32759-9_9"},{"key":"38_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-21437-0_7","volume-title":"FM 2011: Formal Methods","author":"H Barringer","year":"2011","unstructured":"Barringer, H., Havelund, K.: TraceContract: a scala DSL for trace analysis. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol. 6664, pp. 57\u201372. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-21437-0_7"},{"key":"38_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-40787-1_3","volume-title":"Runtime Verification","author":"D Basin","year":"2013","unstructured":"Basin, D., Klaedtke, F., Marinovic, S., Z\u0103linescu, E.: Monitoring of temporal first-order properties with aggregations. In: Legay, A., Bensalem, S. (eds.) RV 2013. LNCS, vol. 8174, pp. 40\u201358. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-40787-1_3"},{"key":"38_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-319-47169-3_17","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications","author":"M Broy","year":"2016","unstructured":"Broy, M., Havelund, K., Kumar, R.: Towards a unified view of modeling and programming. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9953, pp. 238\u2013257. Springer, Cham (2016). doi:\n10.1007\/978-3-319-47169-3_17"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Deligiannis, P., Donaldson, A.F., Ketema, J., Lal, A., Thomson, P.: Asynchronous programming, analysis and testing with state machines. In: Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2015, NY, USA, pp. 154\u2013164 (2015). \nhttp:\/\/doi.acm.org\/10.1145\/2737924.2737996","DOI":"10.1145\/2737924.2737996"},{"key":"38_CR8","unstructured":"Desai, A., Gupta, V., Jackson, E., Qadeer, S., Rajamani, S., Zufferey, D.: P: Safe asynchronous event-driven programming. In: Proceedings of PLDI 2013, pp. 321\u2013332 (2013). \nhttp:\/\/doi.acm.org\/10.1145\/2491956.2462184"},{"key":"38_CR9","unstructured":"Drusinsky, D.: Modeling and Verification using UML Statecharts. Elsevier, ISBN-13: 978-0-7506-7949-7, 400 p (2006)"},{"key":"38_CR10","volume-title":"Design Patterns: Elements of Reusable Object-oriented Software","author":"E Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-oriented Software. Addison-Wesley, Boston (1995)"},{"key":"38_CR11","series-title":"ASTE Series in Science Education","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-94-007-6763-8_20","volume-title":"Science Teacher Educators as K-12 Teachers","author":"J Hassard","year":"2014","unstructured":"Hassard, J.: Closing. In: Dias, M., Eick, C.J., Brantley-Dias, L. (eds.) Science Teacher Educators as K-12 Teachers. ASSE, vol. 1, pp. 287\u2013302. Springer, Dordrecht (2014). doi:\n10.1007\/978-94-007-6763-8_20"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Havelund, K.: Data automata in Scala. In: Proceedings of the 8th International Symposium on Theoretical Aspects of Software Engineering, TASE 2014 (2014)","DOI":"10.1109\/TASE.2014.37"},{"issue":"2","key":"38_CR13","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s10009-014-0309-2","volume":"17","author":"K Havelund","year":"2015","unstructured":"Havelund, K.: Rule-based runtime verification revisited. Int. J. Softw. Tools Technol. Transf. 17(2), 143\u2013170 (2015)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"38_CR14","unstructured":"Havelund, K., Joshi, R.: Modeling and monitoring of hierarchical state machines in Scala. In preparation"},{"issue":"1","key":"38_CR15","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1007\/s10009-002-0080-7","volume":"4","author":"K Havelund","year":"2002","unstructured":"Havelund, K., Visser, W.: Program model checking as a new trend. STTT 4(1), 8\u201320 (2002)","journal-title":"STTT"},{"key":"38_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-319-46982-9_15","volume-title":"Runtime Verification","author":"S Kauffman","year":"2016","unstructured":"Kauffman, S., Havelund, K., Joshi, R.: nfer \u2013 a notation and system for inferring event stream abstractions. In: Falcone, Y., S\u00e1nchez, C. (eds.) RV 2016. LNCS, vol. 10012, pp. 235\u2013250. Springer, Cham (2016). doi:\n10.1007\/978-3-319-46982-9_15"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Meredith, P., Jin, D., Griffith, D., Chen, F., Ro\u015fu, G.: An overview of the MOP runtime verification framework. J. Softw. Tools Technol. Transf. pp. 1\u201341 (2011). \nhttp:\/\/dx.doi.org\/10.1007\/s10009-011-0198-6","DOI":"10.1007\/s10009-011-0198-6"},{"key":"38_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-662-49122-5_2","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"P M\u00fcller","year":"2016","unstructured":"M\u00fcller, P., Schwerhoff, M., Summers, A.J.: Viper: a verification infrastructure for permission-based reasoning. In: Jobstmann, B., Leino, K.R.M. (eds.) VMCAI 2016. LNCS, vol. 9583, pp. 41\u201362. Springer, Heidelberg (2016). doi:\n10.1007\/978-3-662-49122-5_2"},{"key":"38_CR19","volume-title":"Practical UML Statecharts in C\/C++, Event-Driven Programming for Embedded Systems","author":"M Samek","year":"2009","unstructured":"Samek, M.: Practical UML Statecharts in C\/C++, Event-Driven Programming for Embedded Systems, 2nd edn. Newnes, MA, USA (2009)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66284-8_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,27]],"date-time":"2017-09-27T12:46:13Z","timestamp":1506516373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66284-8_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319662831","9783319662848"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66284-8_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}