{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T12:04:04Z","timestamp":1762862644769,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642246890"},{"type":"electronic","value":"9783642246906"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24690-6_15","type":"book-chapter","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T01:35:37Z","timestamp":1319506537000},"page":"204-220","source":"Crossref","is-referenced-by-count":40,"title":["Runtime Verification of Component-Based Systems"],"prefix":"10.1007","author":[{"given":"Yli\u00e8s","family":"Falcone","sequence":"first","affiliation":[]},{"given":"Mohamad","family":"Jaber","sequence":"additional","affiliation":[]},{"given":"Thanh-Hung","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Marius","family":"Bozga","sequence":"additional","affiliation":[]},{"given":"Saddek","family":"Bensalem","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/978-3-540-85361-9_39","volume-title":"CONCUR 2008 - Concurrency Theory","author":"S. Bliudze","year":"2008","unstructured":"Bliudze, S., Sifakis, J.: A Notion of Glue Expressiveness for Component-Based Systems. In: van Breugel, F., Chechik, M. (eds.) CONCUR 2008. LNCS, vol.\u00a05201, pp. 508\u2013522. Springer, Heidelberg (2008)"},{"key":"15_CR2","unstructured":"Runtime Verification (2001-2010), http:\/\/www.runtime-verification.org"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1093\/logcom\/exn075","volume":"20","author":"A. Bauer","year":"2010","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Comparing ltl semantics for runtime verification. J. Log. Comput.\u00a020, 651\u2013674 (2010)","journal-title":"J. Log. Comput."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Falcone, Y., Fernandez, J.C., Mounier, L.: Runtime verification of safety-progress properties. In: [27], pp. 40\u201359","DOI":"10.1007\/978-3-642-04694-0_4"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Basu, A., Bozga, M., Sifakis, J.: Modeling heterogeneous real-time components in BIP. In: 4th IEEE Int. Conf. on Software Engineering and Formal Methods (SEFM 2006), pp. 3\u201312 (2006)","DOI":"10.1109\/SEFM.2006.27"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1109\/TC.2008.26","volume":"57","author":"S. Bliudze","year":"2008","unstructured":"Bliudze, S., Sifakis, J.: The algebra of connectors\u2014structuring interaction in BIP. IEEE Transactions on Computers\u00a057, 1315\u20131330 (2008)","journal-title":"IEEE Transactions on Computers"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-540-77395-5_15","volume-title":"Runtime Verification","author":"V. Stolz","year":"2007","unstructured":"Stolz, V.: Temporal assertions with parametrised propositions. In: Sokolsky, O., Ta\u015f\u0131ran, S. (eds.) RV 2007. LNCS, vol.\u00a04839, pp. 176\u2013187. Springer, Heidelberg (2007)"},{"key":"15_CR8","first-page":"842","volume-title":"Proceedings of Intelligent Robots and Systems, IROS 1997","author":"S. Fleury","year":"1997","unstructured":"Fleury, S., Herrb, M., Chatila, R.: GenoM: A Tool for the Specification and the Implementation of Operating Modules in a Distributed Robot Architecture. In: Proceedings of Intelligent Robots and Systems, IROS 1997, pp. 842\u2013848. IEEE, Los Alamitos (1997)"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MRA.2008.931631","volume":"16","author":"S. Bensalem","year":"2008","unstructured":"Bensalem, S., Gallien, M., Ingrand, F., Kahloul, I., Nguyen, T.H.: Toward a more dependable software architecture for autonomous robots. IEEE Robotics and Automaton Magazine, Special issue on Soft. Engineering for Robotics\u00a016, 67\u201377 (2008)","journal-title":"IEEE Robotics and Automaton Magazine, Special issue on Soft. Engineering for Robotics"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/DAC.1983.1585652","volume-title":"DAC 1983: Proceedings of the 20th Design Automation Conference","author":"Z.D. Umrigar","year":"1983","unstructured":"Umrigar, Z.D., Pitchumani, V.: Formal verification of a real-time hardware design. In: DAC 1983: Proceedings of the 20th Design Automation Conference, pp. 221\u2013227. IEEE Press, Los Alamitos (1983)"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-11494-7_22","volume-title":"International Symposium on Programming","author":"J.P. Queille","year":"1982","unstructured":"Queille, J.P., Sifakis, J.: Specification and verification of concurrent systems in CESAR. In: Dezani-Ciancaglini, M., Montanari, U. (eds.) Programming 1982. LNCS, vol.\u00a0137, pp. 337\u2013351. Springer, Heidelberg (1982)"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/BFb0025774","volume-title":"Logics of Programs","author":"E.M. Clarke","year":"1982","unstructured":"Clarke, E.M., Emerson, E.A.: Synthesis of synchronisation skeletons for branching time temporal logic. In: Kozen, D. (ed.) Logic of Programs 1981. LNCS, vol.\u00a0131, pp. 52\u201371. Springer, Heidelberg (1982)"},{"key":"15_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3190-6","volume-title":"Symbolic model checking","author":"K. McMillan","year":"1993","unstructured":"McMillan, K.: Symbolic model checking. Kluwer Academic Publishers, Boston (1993)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Burch, J., Clarke, E., McMillan, K., Dill, D., Hwang, L.: Symbolic model checking: 1020 states and beyond. In: Proceedings of the 5th Syposium on Logic in Computer science, pp. 428\u2013439 (1990)","DOI":"10.1109\/LICS.1990.113767"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1011276507260","volume":"19","author":"E. Clarke","year":"2001","unstructured":"Clarke, E., Biere, A., Raimi, R., Zhu, Y.: Bounded model checking using satisfiability solving. Form. Methods Syst. Des.\u00a019, 7\u201334 (2001)","journal-title":"Form. Methods Syst. Des."},{"key":"15_CR16","first-page":"353","volume-title":"Proceedings of the 4th Annual Symposium on LICS","author":"E. Clarke","year":"1989","unstructured":"Clarke, E., Long, D., McMillan, K.: Compositional model checking. In: Proceedings of the 4th Annual Symposium on LICS, pp. 353\u2013362. IEEE Computer Society Press, Los Alamitos (1989)"},{"key":"15_CR17","volume-title":"Symposium on Logic in Computer Science","author":"E. Chang","year":"1994","unstructured":"Chang, E., Manna, Z., Pnueli, A.: Compositional verification of real-time systems. In: Symposium on Logic in Computer Science. IEEE, Los Alamitos (1994)"},{"key":"15_CR18","unstructured":"Long, D.E.: Model Checking, Abstraction, and Compositional Reasoning. PhD thesis, Carnegie Mellon (1993)"},{"key":"15_CR19","first-page":"181","volume":"4","author":"S. Bensalem","year":"2010","unstructured":"Bensalem, S., Bozga, M., Sifakis, J., Nguyen, T.H.: Compositional verification for component-based systems and application. Software Journal, Special Issue on Automated Compositional Verification\u00a04, 181\u2013193 (2010)","journal-title":"Software Journal, Special Issue on Automated Compositional Verification"},{"key":"15_CR20","unstructured":"Bensalem, S., Bogza, M., Legay, A., Nguyen, T.H., Sifakis, J., Yan, R.: Incremental component-based construction and verification using invariants. In: FMCAD (2010)"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/2.161279","volume":"25","author":"B. Meyer","year":"1992","unstructured":"Meyer, B.: Applying design by contract. Computer\u00a025, 40\u201351 (1992)","journal-title":"Computer"},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/151646.151649","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Lamport, L.: Composing specifications. ACM Transaction on Programming Languages and Systems\u00a015, 73\u2013132 (1993)","journal-title":"ACM Transaction on Programming Languages and Systems"},{"key":"15_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-642-16901-4_29","volume-title":"Formal Methods and Software Engineering","author":"I. Ben-Hafaiedh","year":"2010","unstructured":"Ben-Hafaiedh, I., Graf, S., Quinton, S.: Reasoning about safety and progress using contracts. In: Dong, J.S., Zhu, H. (eds.) ICFEM 2010. LNCS, vol.\u00a06447, pp. 436\u2013451. Springer, Heidelberg (2010)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"K\u00e4hk\u00f6nen, K., Lampinen, J., Heljanko, K., Niemel\u00e4, I.: The lime interface specification language and runtime monitoring tool. In: [27], pp. 93\u2013100","DOI":"10.1007\/978-3-642-04694-0_7"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Bodden, E., Lam, P., Hendren, L.J.: Clara: A framework for partially evaluating finite-state runtime monitors ahead of time. In: [28], pp. 183\u2013197","DOI":"10.1007\/978-3-642-16612-9_15"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Falcone, Y.: You should better enforce than verify. In: [28], pp. 89\u2013105","DOI":"10.1007\/978-3-642-16612-9_9"},{"key":"15_CR27","series-title":"Lecture Notes in Computer Science","volume-title":"Runtime Verification","year":"2009","unstructured":"Bensalem, S., Peled, D. (eds.): RV 2009. LNCS, vol.\u00a05779. Springer, Heidelberg (2009)"},{"key":"15_CR28","series-title":"Lecture Notes in Computer Science","volume-title":"Runtime Verification","year":"2010","unstructured":"Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G.J., Rosu, G., Sokolsky, O., Tillmann, N. (eds.): RV 2010. LNCS, vol.\u00a06418. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24690-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T07:10:25Z","timestamp":1741849825000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24690-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642246890","9783642246906"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24690-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}