{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:48Z","timestamp":1740099048634,"version":"3.37.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319756318"},{"type":"electronic","value":"9783319756325"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-75632-5_7","type":"book-chapter","created":{"date-parts":[[2018,2,9]],"date-time":"2018-02-09T20:09:21Z","timestamp":1518206961000},"page":"211-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Industrial Experiences with Runtime Verification of Financial Transaction Systems: Lessons Learnt and Standing Challenges"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2844-5728","authenticated-orcid":false,"given":"Christian","family":"Colombo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0743-6272","authenticated-orcid":false,"given":"Gordon J.","family":"Pace","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,11]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Abela, P., Colombo, C., Pace, G.J.: Offline runtime verification with real-time properties: a case study. In: University of Malta Workshop in ICT (WICT 2009) (2009)","DOI":"10.1007\/978-3-642-04368-0_10"},{"issue":"2\u20133","key":"7_CR2","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.tcs.2004.11.007","volume":"336","author":"C Artho","year":"2005","unstructured":"Artho, C., Barringer, H., Goldberg, A., Havelund, K., Khurshid, S., Lowry, M.R., Pasareanu, C.S., Rosu, G., Sen, K., Visser, W., Washington, R.: Combining test case generation and runtime verification. Theor. Comput. Sci. 336(2\u20133), 209\u2013234 (2005). https:\/\/doi.org\/10.1016\/j.tcs.2004.11.007","journal-title":"Theor. Comput. Sci."},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2005.01.018","volume":"131","author":"C Artho","year":"2005","unstructured":"Artho, C., Biere, A.: Combined static and dynamic analysis. Electr. Notes Theor. Comput. Sci. 131, 3\u201314 (2005). https:\/\/doi.org\/10.1016\/j.entcs.2005.01.018","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-319-47166-2_29","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques","author":"S Azzopardi","year":"2016","unstructured":"Azzopardi, S., Colombo, C., Pace, G.: A model-based approach to combining static and dynamic verification techniques. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016, Part I. LNCS, vol. 9952, pp. 416\u2013430. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47166-2_29"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-319-41591-8_23","volume-title":"Software Engineering and Formal Methods","author":"S Azzopardi","year":"2016","unstructured":"Azzopardi, S., Colombo, C., Pace, G.J., Vella, B.: Compliance checking in the open payments ecosystem. In: De Nicola, R., K\u00fchn, E. (eds.) SEFM 2016. LNCS, vol. 9763, pp. 337\u2013343. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41591-8_23"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Baresi, L., Ghezzi, C.: The disappearing boundary between development-time and run-time. In: Proceedings of the FSE\/SDP Workshop on Future of Software Engineering Research, FoSER 2010, pp. 17\u201322. ACM, New York (2010). http:\/\/doi.acm.org\/10.1145\/1882362.1882367","DOI":"10.1145\/1882362.1882367"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-642-35632-2_18","volume-title":"Runtime Verification","author":"E Bartocci","year":"2013","unstructured":"Bartocci, E., Grosu, R., Karmarkar, A., Smolka, S.A., Stoller, S.D., Zadok, E., Seyster, J.: Adaptive runtime verification. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 168\u2013182. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35632-2_18"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Berkovich, S., Bonakdarpour, B., Fischmeister, S.: GPU-based runtime verification. In: 27th IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2013, Cambridge, MA, USA, 20\u201324 May 2013 (2013). https:\/\/doi.org\/10.1109\/IPDPS.2013.105","DOI":"10.1109\/IPDPS.2013.105"},{"issue":"3","key":"7_CR9","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1093\/logcom\/exn077","volume":"20","author":"E Bodden","year":"2010","unstructured":"Bodden, E., Hendren, L., Lam, P., Lhot\u00e1k, O., Naeem, N.A.: Collaborative runtime verification with tracematches. J. Log. Comput. 20(3), 707\u2013723 (2010). https:\/\/doi.org\/10.1093\/logcom\/exn077","journal-title":"J. Log. Comput."},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-540-73589-2_25","volume-title":"ECOOP 2007 \u2013 Object-Oriented Programming","author":"E Bodden","year":"2007","unstructured":"Bodden, E., Hendren, L., Lhot\u00e1k, O.: A staged static program analysis to improve the performance of runtime monitoring. In: Ernst, E. (ed.) ECOOP 2007. LNCS, vol. 4609, pp. 525\u2013549. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73589-2_25"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-16612-9_15","volume-title":"Runtime Verification","author":"E Bodden","year":"2010","unstructured":"Bodden, E., Lam, P., Hendren, L.: Clara: a framework for partially evaluating finite-state runtime monitors ahead of time. In: Barringer, H., et al. (eds.) RV 2010. LNCS, vol. 6418, pp. 183\u2013197. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16612-9_15"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-41498-0_1","volume-title":"Controlled Natural Language","author":"A Calafato","year":"2016","unstructured":"Calafato, A., Colombo, C., Pace, G.J.: A controlled natural language for tax fraud detection. In: Davis, B., Pace, G.J.J., Wyner, A. (eds.) CNL 2016. LNCS (LNAI), vol. 9767, pp. 1\u201312. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41498-0_1"},{"key":"7_CR13","unstructured":"Cauchi, A., Colombo, C., Francalanza, A., Micallef, M., Pace, G.J.: Using gherkin to extract tests and monitors for safer medical device interaction design. In: Proceedings of the 8th ACM SIGCHI Symposium on Engineering Interactive Computing Systems, EICS 2016, Brussels, Belgium, 21\u201324 June 2016, pp. 275\u2013280. ACM, New York (2016). http:\/\/doi.acm.org\/10.1145\/2933242.2935868"},{"key":"7_CR14","doi-asserted-by":"publisher","unstructured":"Centonze, P., Flynn, R.J., Pistoia, M.: Combining static and dynamic analysis for automatic identification of precise access-control policies. In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), Miami Beach, Florida, USA, 10\u201314 December 2007, pp. 292\u2013303 (2007). https:\/\/doi.org\/10.1109\/ACSAC.2007.14","DOI":"10.1109\/ACSAC.2007.14"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-23820-3_21","volume-title":"Runtime Verification","author":"JM Chimento","year":"2015","unstructured":"Chimento, J.M., Ahrendt, W., Pace, G.J., Schneider, G.: StaRVOOrS: a tool for combined static and runtime verification of Java. In: Bartocci, E., Majumdar, R. (eds.) RV 2015. LNCS, vol. 9333, pp. 297\u2013305. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23820-3_21"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Chircop, L., Colombo, C., Micallef, M.: Exploring the link between automatic specification inference and test suite quality (2017). Submitted for publication","DOI":"10.4204\/EPTCS.254.4"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-319-22969-0_7","volume-title":"Software Engineering and Formal Methods","author":"C Colombo","year":"2015","unstructured":"Colombo, C., Dimech, G., Francalanza, A.: Investigating instrumentation techniques for ESB runtime verification. In: Calinescu, R., Rumpe, B. (eds.) SEFM 2015. LNCS, vol. 9276, pp. 99\u2013107. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22969-0_7"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-642-29860-8_29","volume-title":"Runtime Verification","author":"C Colombo","year":"2012","unstructured":"Colombo, C., Francalanza, A., Gatt, R.: Elarva: a monitoring tool for erlang. In: Khurshid, S., Sen, K. (eds.) RV 2011. LNCS, vol. 7186, pp. 370\u2013374. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29860-8_29"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-33826-7_15","volume-title":"Software Engineering and Formal Methods","author":"C Colombo","year":"2012","unstructured":"Colombo, C., Francalanza, A., Mizzi, R., Pace, G.J.: polyLarva: runtime verification with configurable resource-aware monitoring boundaries. In: Eleftherakis, G., Hinchey, M., Holcombe, M. (eds.) SEFM 2012. LNCS, vol. 7504, pp. 218\u2013232. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33826-7_15"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-319-19581-0_27","volume-title":"Natural Language Processing and Information Systems","author":"C Colombo","year":"2015","unstructured":"Colombo, C., Grech, J.-P., Pace, G.J.: A controlled natural language for business intelligence monitoring. In: Biemann, C., Handschuh, S., Freitas, A., Meziane, F., M\u00e9tais, E. (eds.) NLDB 2015. LNCS, vol. 9103, pp. 300\u2013306. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19581-0_27"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-35632-2_22","volume-title":"Runtime Verification","author":"C Colombo","year":"2013","unstructured":"Colombo, C., Pace, G.J.: Fast-forward runtime monitoring \u2014 an industrial case study. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 214\u2013228. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35632-2_22"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-16612-9_17","volume-title":"Runtime Verification","author":"C Colombo","year":"2010","unstructured":"Colombo, C., Pace, G.J., Abela, P.: Compensation-aware runtime monitoring. In: Barringer, H., et al. (eds.) RV 2010. LNCS, vol. 6418, pp. 214\u2013228. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16612-9_17"},{"issue":"3","key":"7_CR23","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10703-012-0142-8","volume":"41","author":"C Colombo","year":"2012","unstructured":"Colombo, C., Pace, G.J., Abela, P.: Safer asynchronous runtime monitoring using compensations. Formal Methods Syst. Des. 41(3), 269\u2013294 (2012). https:\/\/doi.org\/10.1007\/s10703-012-0142-8","journal-title":"Formal Methods Syst. Des."},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-03240-0_13","volume-title":"Formal Methods for Industrial Critical Systems","author":"C Colombo","year":"2009","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: Dynamic event-based runtime monitoring of real-time and contextual properties. In: Cofer, D., Fantechi, A. (eds.) FMICS 2008. LNCS, vol. 5596, pp. 135\u2013149. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03240-0_13"},{"key":"7_CR25","doi-asserted-by":"publisher","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: LARVA \u2013 safer monitoring of real-time Java programs (tool paper). In: Seventh IEEE International Conference on Software Engineering and Formal Methods, SEFM 2009, Hanoi, Vietnam, 23\u201327 November 2009, pp. 33\u201337 (2009). https:\/\/doi.org\/10.1109\/SEFM.2009.13","DOI":"10.1109\/SEFM.2009.13"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-642-38209-3_3","volume-title":"Model-Based Methodologies for Pervasive and Embedded Software","author":"K Falzon","year":"2013","unstructured":"Falzon, K., Pace, G.J.: Combining testing and runtime verification techniques. In: Machado, R.J., Maciel, R.S.P., Rubin, J., Botterweck, G. (eds.) MOMPES 2012. LNCS, vol. 7706, pp. 38\u201357. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38209-3_3"},{"key":"7_CR27","unstructured":"Giannakopoulou, D., Pasareanu, C.S., Lowry, M., Washington, R.: Lifecycle verification of the NASA ames K9 rover executive. Technical report, NASA (2004). http:\/\/ti.arc.nasa.gov\/publications"},{"key":"7_CR28","unstructured":"Hoare, C.: Programming is an engineering profession. In: Wallis, P. (ed.) State of the Art Report 11, No. 3: Software Engineering, pp. 77\u201384. Pergamon\/Infotech (1983). Also Oxford PRG Monograph No. 27; and IEEE Softw. 1(2)"},{"key":"7_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/978-3-662-49665-7_24","volume-title":"Fundamental Approaches to Software Engineering","author":"R Hu","year":"2016","unstructured":"Hu, R., Yoshida, N.: Hybrid session verification through endpoint API generation. In: Stevens, P., W\u0105sowski, A. (eds.) FASE 2016. LNCS, vol. 9633, pp. 401\u2013418. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49665-7_24"},{"key":"7_CR30","doi-asserted-by":"publisher","unstructured":"Jaksic, S., Bartocci, E., Grosu, R., Kloibhofer, R., Nguyen, T., Nickovic, D.: From signal temporal logic to FPGA monitors. In: 13th ACM\/IEEE International Conference on Formal Methods and Models for Codesign, MEMOCODE 2015, Austin, TX, USA, 21\u201323 September 2015, pp. 218\u2013227 (2015). https:\/\/doi.org\/10.1109\/MEMCOD.2015.7340489","DOI":"10.1109\/MEMCOD.2015.7340489"},{"key":"7_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume-title":"ECOOP\u201997 \u2014 Object-Oriented Programming","author":"G Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.-M., Irwin, J.: Aspect-oriented programming. In: Ak\u015fit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220\u2013242. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0053381"},{"key":"7_CR32","unstructured":"Kuhn, T.: A survey and classification of controlled natural languages. CoRR abs\/1507.01701 (2015). http:\/\/arxiv.org\/abs\/1507.01701"},{"key":"7_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-46982-9_16","volume-title":"Runtime Verification","author":"R Medhat","year":"2016","unstructured":"Medhat, R., Bonakdarpour, B., Fischmeister, S., Joshi, Y.: Accelerated runtime verification of LTL specifications with counting semantics. In: Falcone, Y., S\u00e1nchez, C. (eds.) RV 2016. LNCS, vol. 10012, pp. 251\u2013267. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46982-9_16"},{"key":"7_CR34","doi-asserted-by":"publisher","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science, Providence, Rhode Island, USA, 31 October\u20131 November 1977, pp. 46\u201357 (1977). https:\/\/doi.org\/10.1109\/SFCS.1977.32","DOI":"10.1109\/SFCS.1977.32"},{"key":"7_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-73770-4_1","volume-title":"Tests and Proofs","author":"Y Smaragdakis","year":"2007","unstructured":"Smaragdakis, Y., Csallner, C.: Combining static and dynamic reasoning for bug detection. In: Gurevich, Y., Meyer, B. (eds.) TAP 2007. LNCS, vol. 4454, pp. 1\u201316. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73770-4_1"},{"key":"7_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-35813-5_5","volume-title":"Software Engineering for Self-Adaptive Systems II","author":"G Tamura","year":"2013","unstructured":"Tamura, G., et al.: Towards practical runtime verification and validation of self-adaptive software systems. In: de Lemos, R., Giese, H., M\u00fcller, H.A., Shaw, M. (eds.) Software Engineering for Self-Adaptive Systems II. LNCS, vol. 7475, pp. 108\u2013132. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35813-5_5"},{"key":"7_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-40561-7_17","volume-title":"Software Engineering and Formal Methods","author":"D Wonisch","year":"2013","unstructured":"Wonisch, D., Schremmer, A., Wehrheim, H.: Zero overhead runtime monitoring. In: Hierons, R.M., Merayo, M.G., Bravetti, M. (eds.) SEFM 2013. LNCS, vol. 8137, pp. 244\u2013258. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40561-7_17"}],"container-title":["Lecture Notes in Computer Science","Lectures on Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-75632-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T15:12:18Z","timestamp":1570720338000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-75632-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319756318","9783319756325"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-75632-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}