{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T21:59:00Z","timestamp":1774475940610,"version":"3.50.1"},"publisher-location":"Cham","reference-count":93,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319756318","type":"print"},{"value":"9783319756325","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-75632-5_6","type":"book-chapter","created":{"date-parts":[[2018,2,9]],"date-time":"2018-02-09T20:09:21Z","timestamp":1518206961000},"page":"176-210","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":57,"title":["Runtime Verification for Decentralised and Distributed Systems"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Francalanza","sequence":"first","affiliation":[]},{"given":"Jorge A.","family":"P\u00e9rez","sequence":"additional","affiliation":[]},{"given":"C\u00e9sar","family":"S\u00e1nchez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,11]]},"reference":[{"issue":"8","key":"6_CR1","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/32.940566","volume":"27","author":"S Alagar","year":"2001","unstructured":"Alagar, S., Venkatesan, S.: Techniques to tackle state explosion in global predicate detection. IEEE Trans. Softw. Eng. (TSE) 27(8), 704\u2013714 (2001)","journal-title":"IEEE Trans. Softw. Eng. (TSE)"},{"issue":"2\u20133","key":"6_CR2","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1561\/2500000031","volume":"3","author":"D Ancona","year":"2016","unstructured":"Ancona, D., Bono, V., Bravetti, M., Campos, J., Castagna, G., Deni\u00e9lou, P., Gay, S.J., Gesbert, N., Giachino, E., Hu, R., Johnsen, E.B., Martins, F., Mascardi, V., Montesi, F., Neykova, R., Ng, N., Padovani, L., Vasconcelos, V.T., Yoshida, N.: Behavioral types in programming languages. Found. Trends Program. Lang. 3(2\u20133), 95\u2013230 (2016)","journal-title":"Found. Trends Program. Lang."},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-3-319-46982-9_31","volume-title":"Runtime Verification","author":"DP Attard","year":"2016","unstructured":"Attard, D.P., Francalanza, A.: A monitoring tool for a branching-time logic. In: Falcone, Y., S\u00e1nchez, C. (eds.) RV 2016. LNCS, vol. 10012, pp. 473\u2013481. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46982-9_31"},{"key":"6_CR4","doi-asserted-by":"crossref","DOI":"10.1002\/0471478210","volume-title":"Distributed Computing: Fundamentals, Simulations and Advanced Topics","author":"H Attiya","year":"2004","unstructured":"Attiya, H., Welch, J.L.: Distributed Computing: Fundamentals, Simulations and Advanced Topics. Wiley, Hoboken (2004)"},{"issue":"4","key":"6_CR5","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.jal.2014.09.001","volume":"12","author":"F Baader","year":"2014","unstructured":"Baader, F., Lippmann, M.: Runtime verification using the temporal description logic ALC-LTL revisited. J. Appl. Logic 12(4), 584\u2013613 (2014)","journal-title":"J. Appl. Logic"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Bartocci, E.: Sampling-based decentralized monitoring for networked embedded systems. In: Bortolussi, L., Bujorianu, M.L., Pola, G. (eds.) Proceedings of the 3rd International Workshop on Hybrid Autonomous Systems (HAS 2013). EPTCS, vol. 124, pp. 85\u201399 (2013)","DOI":"10.4204\/EPTCS.124.9"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-35632-2_17","volume-title":"Runtime Verification","author":"D Basin","year":"2013","unstructured":"Basin, D., Klaedtke, F., Marinovic, S., Z\u0103linescu, E.: Monitoring compliance policies over incomplete and disagreeing logs. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 151\u2013167. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35632-2_17"},{"key":"6_CR8","unstructured":"Basin, D.A., Klaedtke, F., Zalinescu, E.: Failure-aware runtime verification of distributed systems. In: Proceedings of FSTTCS 2015, pp. 590\u2013603 (2015)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Basu, A., Bozga, M., Sifakis, J.: Modeling heterogeneous real-time components in BIP. In: Proceedings of the 4th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2006), pp. 3\u201312. IEEE Computer Society (2006)","DOI":"10.1109\/SEFM.2006.27"},{"key":"6_CR10","unstructured":"Bauer, A.K.: Monitorability of $$\\omega $$ \u03c9 -regular languages. arXiv:1006.3638v1 (2010)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-642-32759-9_10","volume-title":"FM 2012: Formal Methods","author":"A Bauer","year":"2012","unstructured":"Bauer, A., Falcone, Y.: Decentralised LTL monitoring. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 85\u2013100. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32759-9_10"},{"issue":"1\u20132","key":"6_CR12","first-page":"49","volume":"48","author":"AK Bauer","year":"2016","unstructured":"Bauer, A.K., Falcone, Y.: Decentralised LTL monitoring. Formal Methods Syst. Des. 48(1\u20132), 49\u201393 (2016)","journal-title":"Formal Methods Syst. Des."},{"key":"6_CR13","doi-asserted-by":"crossref","first-page":"14:1","DOI":"10.1145\/2000799.2000800","volume":"20","author":"AK Bauer","year":"2011","unstructured":"Bauer, A.K., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20, 14:1\u201314:64 (2011)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"3","key":"6_CR14","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1007\/s10703-015-0226-3","volume":"46","author":"S Berkovich","year":"2015","unstructured":"Berkovich, S., Bonakdarpour, B., Fischmeister, S.: Runtime verification with minimal intrusion through parallelism. Formal Methods Syst. Des. 46(3), 317\u2013348 (2015)","journal-title":"Formal Methods Syst. Des."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Bocchi, L., Chen, T., Demangeon, R., Honda, K., Yoshida, N.: Monitoring networks through multiparty session types. In: Proceedings of FMOODS\/FORTE 2013, pp. 50\u201365 (2013)","DOI":"10.1007\/978-3-642-38592-6_5"},{"key":"6_CR16","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.tcs.2017.02.009","volume":"669","author":"L Bocchi","year":"2017","unstructured":"Bocchi, L., Chen, T., Demangeon, R., Honda, K., Yoshida, N.: Monitoring networks through multiparty session types. Theor. Comput. Sci. 669, 33\u201358 (2017)","journal-title":"Theor. Comput. Sci."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Bonakdarpour, B., Bozga, M., Jaber, M., Quilbeuf, J., Sifakis, J.: Automated conflict-free distributed implementation of component-based models. In: Proceedings of the IEEE 5th International Symposium on Industrial Embedded Systems (SIES 2010), pp. 108\u2013117. IEEE (2010)","DOI":"10.1109\/SIES.2010.5551377"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Bonakdarpour, B., Bozga, M., Jaber, M., Quilbeuf, J., Sifakis, J.: From high-level component-based models to distributed implementations. In: Proceedings of EMSOFT 2010, pp. 209\u2013218. ACM (2010)","DOI":"10.1145\/1879021.1879049"},{"key":"6_CR19","unstructured":"Bonakdarpour, B., Fraigniaud, P., Rajsbaum, S., Rosenblueth, D., Travers, C.: Decentralised asynchronous crash-resilient runtime verification. In: Proceedings of the 27th International Conference on Concurrency Theory (CONCUR 2016). LIPIcs, vol. 59, pp. 16:1\u201316:15. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik (2016)"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-319-47169-3_27","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications","author":"B Bonakdarpour","year":"2016","unstructured":"Bonakdarpour, B., Fraigniaud, P., Rajsbaum, S., Travers, C.: Challenges in fault-tolerant distributed runtime verification. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016, Part II. LNCS, vol. 9953, pp. 363\u2013370. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47169-3_27"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Carbone, M. (ed.): Proceedings of the Third Workshop on Behavioural Types (BEAT 2014). EPTCS, vol. 162 (2014)","DOI":"10.4204\/EPTCS.162.0"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Cassar, I., Francalanza, A.: On synchronous and asynchronous monitor instrumentation for actor systems. In: Proceedings of FOCLASA 2014, vol. 175, pp. 54\u201368 (2014)","DOI":"10.4204\/EPTCS.175.4"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-319-23820-3_3","volume-title":"Runtime Verification","author":"I Cassar","year":"2015","unstructured":"Cassar, I., Francalanza, A.: Runtime adaptation for actor systems. In: Bartocci, E., Majumdar, R. (eds.) RV 2015. LNCS, vol. 9333, pp. 38\u201354. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23820-3_3"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-319-33693-0_12","volume-title":"Integrated Formal Methods","author":"I Cassar","year":"2016","unstructured":"Cassar, I., Francalanza, A.: On implementing a monitor-oriented programming framework for actor systems. In: \u00c1brah\u00e1m, E., Huisman, M. (eds.) IFM 2016. LNCS, vol. 9681, pp. 176\u2013192. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33693-0_12"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Cassar, I., Francalanza, A., Said, S.: Improving runtime overheads for detector. In: Buhnova, B., Happe, L., Kofron, J. (eds.) Proceedings of the 12th International Workshop on Formal Engineering approaches to Software Components and Architectures (FESCA 2015). EPTCS, vol. 178, pp. 1\u20138 (2015)","DOI":"10.4204\/EPTCS.178.0"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Castellani, I., Dezani-Ciancaglini, M., P\u00e9rez, J.A.: Self-adaptation and secure information flow in multiparty structured communications: a unified perspective. In: [21], pp. 9\u201318","DOI":"10.4204\/EPTCS.162.2"},{"issue":"4","key":"6_CR27","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1007\/s00165-016-0381-3","volume":"28","author":"I Castellani","year":"2016","unstructured":"Castellani, I., Dezani-Ciancaglini, M., P\u00e9rez, J.A.: Self-adaptation and secure information flow in multiparty communications. Formal Asp. Comput. 28(4), 669\u2013696 (2016)","journal-title":"Formal Asp. Comput."},{"issue":"1","key":"6_CR28","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/214451.214456","volume":"3","author":"KM Chandy","year":"1985","unstructured":"Chandy, K.M., Lamport, L.: Distributed snapshots: determining global states of distributed systems. ACM Trans. Comput. Syst. 3(1), 63\u201375 (1985)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"4","key":"6_CR29","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s004460050049","volume":"11","author":"CM Chase","year":"1998","unstructured":"Chase, C.M., Garg, V.K.: Detection of global predicates: techniques and their limitations. Distrib. Comput. 11(4), 191\u2013201 (1998)","journal-title":"Distrib. Comput."},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Chauhan, H., Garg, V.K., Natarajan, A., Mittal, N.: A distributed abstraction algorithm for online predicate detection. In: IEEE 32nd Symposium on Reliable Distributed Systems (SRDS 2013), pp. 101\u2013110. IEEE Computer Society (2013)","DOI":"10.1109\/SRDS.2013.19"},{"key":"6_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-642-00768-2_23","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"F Chen","year":"2009","unstructured":"Chen, F., Ro\u015fu, G.: Parametric trace slicing and monitoring. In: Kowalewski, S., Philippou, A. (eds.) TACAS 2009. LNCS, vol. 5505, pp. 246\u2013261. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00768-2_23"},{"key":"6_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-319-22969-0_7","volume-title":"Software Engineering and Formal Methods","author":"C Colombo","year":"2015","unstructured":"Colombo, C., Dimech, G., Francalanza, A.: Investigating instrumentation techniques for ESB runtime verification. In: Calinescu, R., Rumpe, B. (eds.) SEFM 2015. LNCS, vol. 9276, pp. 99\u2013107. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22969-0_7"},{"key":"6_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-319-11164-3_12","volume-title":"Runtime Verification","author":"C Colombo","year":"2014","unstructured":"Colombo, C., Falcone, Y.: Organising LTL monitors over distributed systems with a global clock. In: Bonakdarpour, B., Smolka, S.A. (eds.) RV 2014. LNCS, vol. 8734, pp. 140\u2013155. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11164-3_12"},{"issue":"1\u20132","key":"6_CR34","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s10703-016-0251-x","volume":"49","author":"C Colombo","year":"2016","unstructured":"Colombo, C., Falcone, Y.: Organising LTL monitors over distributed systems with a global clock. Formal Methods Syst. Des. 49(1\u20132), 109\u2013158 (2016)","journal-title":"Formal Methods Syst. Des."},{"key":"6_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-642-29860-8_29","volume-title":"Runtime Verification","author":"C Colombo","year":"2012","unstructured":"Colombo, C., Francalanza, A., Gatt, R.: Elarva: a monitoring tool for Erlang. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol. 7186, pp. 370\u2013374. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29860-8_29"},{"key":"6_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-33826-7_15","volume-title":"Software Engineering and Formal Methods","author":"C Colombo","year":"2012","unstructured":"Colombo, C., Francalanza, A., Mizzi, R., Pace, G.J.: polyLarva: runtime verification with configurable resource-aware monitoring boundaries. In: Eleftherakis, G., Hinchey, M., Holcombe, M. (eds.) SEFM 2012. LNCS, vol. 7504, pp. 218\u2013232. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33826-7_15"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Cooper, R., Marzullo, K.: Consistent detection of global predicates. In: Proceedings of the ACM\/ONR Workshop on Parallel and Distributed Debugging, pp. 163\u2013173 (1991)","DOI":"10.1145\/122759.122774"},{"key":"6_CR38","volume-title":"Distributed Systems: Concepts and Design","author":"G Coulouris","year":"2011","unstructured":"Coulouris, G.: Distributed Systems: Concepts and Design. Addison-Wesley, Boston (2011)"},{"issue":"6","key":"6_CR39","doi-asserted-by":"crossref","first-page":"642","DOI":"10.1109\/71.774912","volume":"10","author":"F Cristian","year":"1999","unstructured":"Cristian, F., Fetzer, C.: The timed asynchronous distributed system model. IEEE Trans. Parallel Distrib. Syst. 10(6), 642\u2013657 (1999)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"D\u2019Angelo, B., Sankaranarayanan, S., S\u00e1nchez, C., Robinson, W., Finkbeiner, B., Sipma, H.B., Mehrotra, S., Manna, Z.: LOLA: runtime monitoring of synchronous systems. In: Proceedings of the 12th International Symposium of Temporal Representation and Reasoning (TIME 2005), pp. 166\u2013174. IEEE CS Press (2005)","DOI":"10.1109\/TIME.2005.26"},{"issue":"3","key":"6_CR41","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s10703-014-0218-8","volume":"46","author":"R Demangeon","year":"2015","unstructured":"Demangeon, R., Honda, K., Hu, R., Neykova, R., Yoshida, N.: Practical interruptible conversations: distributed dynamic verification with multiparty session types and python. Formal Methods Syst. Des. 46(3), 197\u2013225 (2015)","journal-title":"Formal Methods Syst. Des."},{"key":"6_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-319-33612-1_5","volume-title":"Web Services, Formal Methods, and Behavioral Types","author":"C Di Giusto","year":"2016","unstructured":"Di Giusto, C., P\u00e9rez, J.A.: An event-based approach to runtime adaptation in communication-centric systems. In: Hildebrandt, T., Ravara, A., van der Werf, J.M., Weidlich, M. (eds.) WS-FM 2014-2015. LNCS, vol. 9421, pp. 67\u201385. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33612-1_5"},{"issue":"4","key":"6_CR43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00165-016-0377-z","volume":"28","author":"C Giusto Di","year":"2016","unstructured":"Di Giusto, C., P\u00e9rez, J.A.: Event-based run-time adaptation in communication-centric systems. Formal Aspects Comput. 28(4), 1\u201336 (2016)","journal-title":"Formal Aspects Comput."},{"key":"6_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-25150-9_3","volume-title":"Theoretical Aspects of Computing - ICTAC 2015","author":"V Diekert","year":"2015","unstructured":"Diekert, V., Muscholl, A., Walukiewicz, I.: A note on monitors and B\u00fcchi automata. In: Leucker, M., Rueda, C., Valencia, F.D. (eds.) ICTAC 2015. LNCS, vol. 9399, pp. 39\u201357. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25150-9_3"},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"El-Hokayem, A., Falcone, Y.: Monitoring decentralized specifications. In: Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2017), pp. 125\u2013135. ACM (2017)","DOI":"10.1145\/3092703.3092723"},{"key":"6_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-662-43613-4_5","volume-title":"Formal Techniques for Distributed Objects, Components, and Systems","author":"Y Falcone","year":"2014","unstructured":"Falcone, Y., Cornebize, T., Fernandez, J.-C.: Efficient and generalized decentralized monitoring of regular languages. In: \u00c1brah\u00e1m, E., Palamidessi, C. (eds.) FORTE 2014. LNCS, vol. 8461, pp. 66\u201383. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43613-4_5"},{"key":"6_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-04694-0_4","volume-title":"Runtime Verification","author":"Y Falcone","year":"2009","unstructured":"Falcone, Y., Fernandez, J.-C., Mounier, L.: Runtime verification of safety-progress properties. In: Bensalem, S., Peled, D.A. (eds.) RV 2009. LNCS, vol. 5779, pp. 40\u201359. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04694-0_4"},{"issue":"3","key":"6_CR48","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/s10009-011-0196-8","volume":"14","author":"Y Falcone","year":"2012","unstructured":"Falcone, Y., Fernandez, J.C., Mounier, L.: What can you verify and enforce at runtime? STTT 14(3), 349\u2013382 (2012)","journal-title":"STTT"},{"issue":"1","key":"6_CR49","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s10270-013-0323-y","volume":"14","author":"Y Falcone","year":"2015","unstructured":"Falcone, Y., Jaber, M., Nguyen, T.H., Bozga, M., Bensalem, S.: Runtime verification of component-based systems in the BIP framework with formally-proved sound and complete instrumentation. Softw. Syst. Model. 14(1), 173\u2013199 (2015)","journal-title":"Softw. Syst. Model."},{"issue":"6","key":"6_CR50","doi-asserted-by":"crossref","first-page":"1118","DOI":"10.1109\/JPROC.2005.849720","volume":"93","author":"M Felser","year":"2005","unstructured":"Felser, M.: Real-time Ethernet - industry prospective. Proc. IEEE 93(6), 1118\u20131129 (2005)","journal-title":"Proc. IEEE"},{"key":"6_CR51","unstructured":"Fidge, C.: Timestamps in message-passing systems that preserve the partial ordering. In: Proceedings of the 11th Australian Computer Science Conference, pp. 55\u201366 (1989)"},{"issue":"8","key":"6_CR52","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/2.84874","volume":"24","author":"C Fidge","year":"1991","unstructured":"Fidge, C.: Logical time in distributed computer systems. Computer 24(8), 28\u201333 (1991)","journal-title":"Computer"},{"key":"6_CR53","doi-asserted-by":"crossref","unstructured":"Fraigniaud, P., Rajsbaum, S., Travers, C.: On the number of opinions needed for fault-tolerant run-time monitoring in distributed systems. In: RV (2014)","DOI":"10.1007\/978-3-319-11164-3_9"},{"key":"6_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-662-49630-5_9","volume-title":"Foundations of Software Science and Computation Structures","author":"A Francalanza","year":"2016","unstructured":"Francalanza, A.: A theory of monitors. In: Jacobs, B., L\u00f6ding, C. (eds.) FoSSaCS 2016. LNCS, vol. 9634, pp. 145\u2013161. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49630-5_9"},{"issue":"1","key":"6_CR55","first-page":"1","volume":"51","author":"A Francalanza","year":"2017","unstructured":"Francalanza, A., Aceto, L., Ingolfsdottir, A.: Monitorability for the Hennessy-Milner logic with recursion. FMSD 51(1), 1\u201330 (2017)","journal-title":"FMSD"},{"key":"6_CR56","doi-asserted-by":"crossref","unstructured":"Francalanza, A., Gauci, A., Pace, G.J.: Distributed system contract monitoring. In: Pimentel, E., Valero, V. (eds.) Proceedings of the Fifth Workshop on Formal Languages and Analysis of Contract-Oriented Software, FLACOS 2011, M\u00e1laga, Spain, 22\u201323 September 2011. EPTCS, vol. 68, pp. 23\u201337 (2011)","DOI":"10.4204\/EPTCS.68.4"},{"issue":"5\u20137","key":"6_CR57","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/j.jlap.2013.04.001","volume":"82","author":"A Francalanza","year":"2013","unstructured":"Francalanza, A., Gauci, A., Pace, G.J.: Distributed system contract monitoring. J. Logic Algebraic Program. 82(5\u20137), 186\u2013215 (2013)","journal-title":"J. Logic Algebraic Program."},{"issue":"6","key":"6_CR58","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1016\/j.ic.2007.12.002","volume":"206","author":"A Francalanza","year":"2008","unstructured":"Francalanza, A., Hennessy, M.: A theory of system behaviour in the presence of node and link failure. Inf. Comput. 206(6), 711\u2013759 (2008)","journal-title":"Inf. Comput."},{"key":"6_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-642-40787-1_7","volume-title":"Runtime Verification","author":"A Francalanza","year":"2013","unstructured":"Francalanza, A., Seychell, A.: Synthesising correct concurrent runtime monitors. In: Legay, A., Bensalem, S. (eds.) RV 2013. LNCS, vol. 8174, pp. 112\u2013129. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40787-1_7"},{"issue":"3","key":"6_CR60","first-page":"226","volume":"46","author":"A Francalanza","year":"2015","unstructured":"Francalanza, A., Seychell, A.: Synthesising correct concurrent runtime monitors. FMSD 46(3), 226\u2013261 (2015)","journal-title":"FMSD"},{"key":"6_CR61","doi-asserted-by":"crossref","unstructured":"Garg, D., Jia, L., Datta, A.: Policy auditing over incomplete logs: theory, implementation and applications. In: Proceedings of CCS 2011, pp. 151\u2013162 (2011)","DOI":"10.1145\/2046707.2046726"},{"key":"6_CR62","volume-title":"Elements of Distributed Computing","author":"VK Garg","year":"2002","unstructured":"Garg, V.K.: Elements of Distributed Computing. Wiley-IEEE Press, New York (2002)"},{"key":"6_CR63","doi-asserted-by":"crossref","unstructured":"Garg, V.K., Mittal, N.: On slicing a distributed computation. In: Proceedings of the 21st IEEE International Conference on Distributed Computing Systems (ICDCS 2001), pp. 322\u2013329. IEEE CS Press (2001)","DOI":"10.1109\/ICDSC.2001.918962"},{"issue":"3","key":"6_CR64","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1109\/71.277788","volume":"5","author":"VK Garg","year":"1994","unstructured":"Garg, V.K., Waldecker, B.: Detection of weak unstable predicates in distributed programs. IEEE Trans. Parallel Distrib. Syst. 5(3), 299\u2013307 (1994)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"6_CR65","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0053567","volume-title":"Programming Languages and Systems","author":"K Honda","year":"1998","unstructured":"Honda, K., Vasconcelos, V.T., Kubo, M.: Language primitives and type discipline for structured communication-based programming. In: Hankin, C. (ed.) ESOP 1998. LNCS, vol. 1381, pp. 122\u2013138. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0053567"},{"issue":"1","key":"6_CR66","doi-asserted-by":"crossref","first-page":"9:1","DOI":"10.1145\/2827695","volume":"63","author":"K Honda","year":"2016","unstructured":"Honda, K., Yoshida, N., Carbone, M.: Multiparty asynchronous session types. J. ACM 63(1), 9:1\u20139:67 (2016)","journal-title":"J. ACM"},{"key":"6_CR67","doi-asserted-by":"crossref","unstructured":"Hu, R., Neykova, R., Yoshida, N., Demangeon, R., Honda, K.: Practical interruptible conversations - distributed dynamic verification with session types and python. In: [72], pp. 130\u2013148","DOI":"10.1007\/978-3-642-40787-1_8"},{"issue":"1","key":"6_CR68","doi-asserted-by":"crossref","first-page":"3:1","DOI":"10.1145\/2873052","volume":"49","author":"H H\u00fcttel","year":"2016","unstructured":"H\u00fcttel, H., Lanese, I., Vasconcelos, V.T., Caires, L., Carbone, M., Deni\u00e9lou, P., Mostrous, D., Padovani, L., Ravara, A., Tuosto, E., Vieira, H.T., Zavattaro, G.: Foundations of session types and behavioural contracts. ACM Comput. Surv. 49(1), 3:1\u20133:36 (2016)","journal-title":"ACM Comput. Surv."},{"key":"6_CR69","doi-asserted-by":"crossref","unstructured":"Jia, L., Gommerstadt, H., Pfenning, F.: Monitors and blame assignment for higher-order session types. In: Bod\u00edk, R., Majumdar, R. (eds.) Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2016, St. Petersburg, FL, USA, 20\u201322 January 2016, pp. 582\u2013594. ACM (2016)","DOI":"10.1145\/2837614.2837662"},{"issue":"2","key":"6_CR70","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/13677.22723","volume":"5","author":"J Joyce","year":"1987","unstructured":"Joyce, J., Lomow, G., Slind, K., Unger, B.W.: Monitoring distributed systems. ACM Trans. Comput. Syst. 5(2), 121\u2013150 (1987)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"7","key":"6_CR71","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L Lamport","year":"1978","unstructured":"Lamport, L.: Time, clocks and the ordering of events in distributed systems. Commun. ACM 21(7), 558\u2013565 (1978)","journal-title":"Commun. ACM"},{"key":"6_CR72","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40787-1","volume-title":"Runtime Verification","year":"2013","unstructured":"Legay, A., Bensalem, S. (eds.): RV 2013. LNCS, vol. 8174. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40787-1"},{"key":"6_CR73","doi-asserted-by":"crossref","unstructured":"Luo, Q., Ro\u015fu, G.: EnforceMOP: a runtime property enforcement system for multithreaded programs. In: ISSTA. ACM, New York (2013)","DOI":"10.1145\/2483760.2483766"},{"key":"6_CR74","unstructured":"Mattern, F.: Virtual time and global states of distributed systems. In: Proceedings of the Workshop on Parallel and Distributed Algorithms, pp. 215\u2013226. Elsevier (1989)"},{"key":"6_CR75","doi-asserted-by":"crossref","unstructured":"Mezzina, C.A., P\u00e9rez, J.A.: Reversible sessions using monitors. In: Orchard, D.A., Yoshida, N. (eds.) Proceedings of the Ninth Workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software (PLACES 2016). EPTCS, vol. 211, pp. 56\u201364 (2016)","DOI":"10.4204\/EPTCS.211.6"},{"key":"6_CR76","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1016\/j.jlamp.2017.03.003","volume":"90","author":"CA Mezzina","year":"2017","unstructured":"Mezzina, C.A., P\u00e9rez, J.A.: Reversibility in session-based concurrency: a fresh look. J. Log. Algebraic Methods Program. 90, 2\u201330 (2017)","journal-title":"J. Log. Algebraic Methods Program."},{"issue":"1","key":"6_CR77","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0890-5401(92)90008-4","volume":"100","author":"R Milner","year":"1992","unstructured":"Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, I. Inf. Comput. 100(1), 1\u201340 (1992)","journal-title":"Inf. Comput."},{"issue":"3","key":"6_CR78","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s00446-004-0117-0","volume":"17","author":"N Mittal","year":"2005","unstructured":"Mittal, N., Garg, V.K.: Techniques and applications of computation slicing. Distrib. Comput. 17(3), 251\u2013277 (2005)","journal-title":"Distrib. Comput."},{"issue":"12","key":"6_CR79","doi-asserted-by":"crossref","first-page":"1700","DOI":"10.1109\/TPDS.2007.1077","volume":"18","author":"N Mittal","year":"2007","unstructured":"Mittal, N., Sen, A., Garg, V.K.: Solving computation slicing using predicate detection. IEEE Trans. Parallel Distrib. Systems (TPDS) 18(12), 1700\u20131713 (2007)","journal-title":"IEEE Trans. Parallel Distrib. Systems (TPDS)"},{"key":"6_CR80","doi-asserted-by":"crossref","unstructured":"Mostafa, M., Bonakdarpour, B.: Decentralized runtime verification of LTL specifications in distributed systems. In: Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium (IPDPS 2015), pp. 494\u2013503. IEEE Computer Society (2015)","DOI":"10.1109\/IPDPS.2015.95"},{"key":"6_CR81","doi-asserted-by":"crossref","unstructured":"Neykova, R., Bocchi, L., Yoshida, N.: Timed runtime monitoring for multiparty conversations. In: [21], pp. 19\u201326","DOI":"10.4204\/EPTCS.162.3"},{"key":"6_CR82","doi-asserted-by":"crossref","unstructured":"Neykova, R., Yoshida, N., Hu, R.: SPY: local verification of global protocols. In: [72], pp. 358\u2013363","DOI":"10.1007\/978-3-642-40787-1_25"},{"key":"6_CR83","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-540-75142-7_32","volume-title":"Distributed Computing","author":"VA Ogale","year":"2007","unstructured":"Ogale, V.A., Garg, V.K.: Detecting temporal logic predicates on distributed computations. In: Pelc, A. (ed.) DISC 2007. LNCS, vol. 4731, pp. 420\u2013434. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75142-7_32"},{"key":"6_CR84","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/11813040_38","volume-title":"FM 2006: Formal Methods","author":"A Pnueli","year":"2006","unstructured":"Pnueli, A., Zaks, A.: PSL model checking and run-time verification via testers. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. LNCS, vol. 4085, pp. 573\u2013586. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11813040_38"},{"issue":"2","key":"6_CR85","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s10515-005-6205-y","volume":"12","author":"G Ro\u015fu","year":"2005","unstructured":"Ro\u015fu, G., Havelund, K.: Rewriting-based techniques for runtime verification. Autom. Softw. Eng. 12(2), 151\u2013197 (2005)","journal-title":"Autom. Softw. Eng."},{"key":"6_CR86","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-540-27860-3_17","volume-title":"Principles of Distributed Systems","author":"A Sen","year":"2004","unstructured":"Sen, A., Garg, V.K.: Detecting temporal logic predicates in distributed programs using computation slicing. In: Papatriantafilou, M., Hunel, P. (eds.) OPODIS 2003. LNCS, vol. 3144, pp. 171\u2013183. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-27860-3_17"},{"issue":"2","key":"6_CR87","first-page":"22","volume":"89","author":"A Sen","year":"2003","unstructured":"Sen, A., Garg, V.K.: Partial order trace analyzer (POTA) for distributed programs. ENTCS 89(2), 22\u201343 (2003). Proceedings of Workshop on Runtime Verification (RV 2003)","journal-title":"ENTCS"},{"key":"6_CR88","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1109\/TC.2007.1011","volume":"56","author":"A Sen","year":"2007","unstructured":"Sen, A., Garg, V.K.: Formal verification of simulation traces using computation slicing. IEEE Trans. Comput. 56, 511\u2013527 (2007)","journal-title":"IEEE Trans. Comput."},{"key":"6_CR89","doi-asserted-by":"crossref","unstructured":"Sen, K., Vardhan, A., Agha, G., Rosu, G.: Efficient decentralized monitoring of safety in distributed systems. In: Proceedings of ICSE 2004. IEEE CS Press (2004)","DOI":"10.1109\/ICSE.2004.1317464"},{"key":"6_CR90","doi-asserted-by":"crossref","unstructured":"Sen, K., Vardhan, A., Agha, G., Rosu, G.: Decentralized runtime analysis of multithreaded applications. In: Proceedings of the 20th IEEE International Parallel and Distributed Processing Symposium (IPDPS 2006). IEEE (2006)","DOI":"10.1109\/IPDPS.2006.1639591"},{"key":"6_CR91","unstructured":"Viswanathan, M.: Foundations for the run-time analysis of software systems. Ph.D. thesis, University of Pennsylvania (2000)"},{"key":"6_CR92","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-319-05119-2_3","volume-title":"Trustworthy Global Computing","author":"N Yoshida","year":"2014","unstructured":"Yoshida, N., Hu, R., Neykova, R., Ng, N.: The scribble protocol language. In: Abadi, M., Lluch Lafuente, A. (eds.) TGC 2013. LNCS, vol. 8358, pp. 22\u201341. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05119-2_3"},{"key":"6_CR93","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1007\/978-3-319-46982-9_32","volume-title":"Runtime Verification","author":"T Zhang","year":"2016","unstructured":"Zhang, T., Gebhard, P., Sokolsky, O.: SMEDL: combining synchronous and asynchronous monitoring. In: Falcone, Y., S\u00e1nchez, C. (eds.) RV 2016. LNCS, vol. 10012, pp. 482\u2013490. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46982-9_32"}],"container-title":["Lecture Notes in Computer Science","Lectures on Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-75632-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T15:12:45Z","timestamp":1570720365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-75632-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319756318","9783319756325"],"references-count":93,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-75632-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}