{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T13:12:58Z","timestamp":1773148378157,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642298592","type":"print"},{"value":"9783642298608","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29860-8_15","type":"book-chapter","created":{"date-parts":[[2012,5,11]],"date-time":"2012-05-11T13:38:03Z","timestamp":1336743483000},"page":"193-207","source":"Crossref","is-referenced-by-count":71,"title":["Runtime Verification with State Estimation"],"prefix":"10.1007","author":[{"given":"Scott D.","family":"Stoller","sequence":"first","affiliation":[]},{"given":"Ezio","family":"Bartocci","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Seyster","sequence":"additional","affiliation":[]},{"given":"Radu","family":"Grosu","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Havelund","sequence":"additional","affiliation":[]},{"given":"Scott A.","family":"Smolka","sequence":"additional","affiliation":[]},{"given":"Erez","family":"Zadok","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Arnold, M., Vechev, M., Yahav, E.: QVM: An efficient runtime for detecting defects in deployed systems. In: Proc. 23rd ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2008), pp. 143\u2013162. ACM (October 2008)","DOI":"10.1145\/1449764.1449776"},{"key":"15_CR2","unstructured":"Baier, C., Katoen, J.P.: Principles of Model Checking. MIT Press (2008)"},{"issue":"11","key":"15_CR3","doi-asserted-by":"crossref","first-page":"365","DOI":"10.2514\/1.49356","volume":"7","author":"H. Barringer","year":"2010","unstructured":"Barringer, H., Groce, A., Havelund, K., Smith, M.: Formal analysis of log files. Journal of Aerospace Computing, Information, and Communication\u00a07(11), 365\u2013390 (2010)","journal-title":"Journal of Aerospace Computing, Information, and Communication"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-21437-0_7","volume-title":"FM 2011: Formal Methods","author":"H. Barringer","year":"2011","unstructured":"Barringer, H., Havelund, K.: TraceContract: A Scala DSL for Trace Analysis. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol.\u00a06664, pp. 57\u201372. Springer, Heidelberg (2011)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-21437-0_9","volume-title":"FM 2011: Formal Methods","author":"B. Bonakdarpour","year":"2011","unstructured":"Bonakdarpour, B., Navabpour, S., Fischmeister, S.: Sampling-Based Runtime Verification. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol.\u00a06664, pp. 88\u2013102. Springer, Heidelberg (2011)"},{"key":"15_CR6","unstructured":"Buss, E., Henshaw, J.: Experiences in program understanding. In: Proc. Second Conference of the Centre for Advanced Studies on Collaborative Research (CASCON 1992), pp. 157\u2013189. IBM Press (1992)"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-642-16612-9_38","volume-title":"Runtime Verification","author":"C. Colombo","year":"2010","unstructured":"Colombo, C., Gauci, A., Pace, G.J.: LarvaStat: Monitoring of Statistical Properties. In: Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Ro\u015fu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. LNCS, vol.\u00a06418, pp. 480\u2013484. Springer, Heidelberg (2010)"},{"key":"15_CR8","volume-title":"Software Visualization: Visualizing the Structure, Behavior, and Evolution of Software","author":"S. Diehl","year":"2007","unstructured":"Diehl, S.: Software Visualization: Visualizing the Structure, Behavior, and Evolution of Software. Springer, Heidelberg (2007)"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/1133981.1133992","volume-title":"Proc. 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2006)","author":"L. Fei","year":"2006","unstructured":"Fei, L., Midkiff, S.P.: Artemis: Practical runtime monitoring of applications for execution anomalies. In: Proc. 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2006), pp. 84\u201395. ACM, Ottawa (2006)"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s10703-005-3399-3","volume":"27","author":"B. Finkbeiner","year":"2005","unstructured":"Finkbeiner, B., Sankaranarayanan, S., Sipma, H.B.: Collecting statistics over runtime executions. Form. Methods Syst. Des.\u00a027, 253\u2013274 (2005)","journal-title":"Form. Methods Syst. Des."},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.infsof.2010.10.003","volume":"53","author":"L. Grunske","year":"2011","unstructured":"Grunske, L.: An effective sequential statistical test for probabilistic monitoring. Information and Software Technology\u00a053, 190\u2013199 (2011)","journal-title":"Information and Software Technology"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Hangal, S., Lam, M.S.: Tracking down software bugs using automatic anomaly detection. In: Proc. 24th International Conference on Software Engineering (ICSE 2002), pp. 291\u2013301. ACM (2002)","DOI":"10.1145\/581376.581377"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Hauswirth, M., Chilimbi, T.M.: Low-overhead memory leak detection using adaptive statistical profiling. In: Proc. 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2004), pp. 156\u2013164 (October 2004)","DOI":"10.1145\/1037187.1024412"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Huang, X., Seyster, J., Callanan, S., Dixit, K., Grosu, R., Smolka, S.A., Stoller, S.D., Zadok, E.: Software monitoring with controllable overhead. International Journal on Software Tools for Technology Transfer (2011)","DOI":"10.1007\/s10009-010-0184-4"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-72522-0_6","volume-title":"Formal Methods for Performance Evaluation","author":"M. Kwiatkowska","year":"2007","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: Stochastic Model Checking. In: Bernardo, M., Hillston, J. (eds.) SFM 2007. LNCS, vol.\u00a04486, pp. 220\u2013270. Springer, Heidelberg (2007)"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Lee, C., Chen, F., Ro\u015fu, G.: Mining parametric specifications. In: Proc. 33rd International Conference on Software Engineering (ICSE 2011), pp. 591\u2013600. ACM (2011)","DOI":"10.1145\/1985793.1985874"},{"issue":"2","key":"15_CR17","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L.R. Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE\u00a077(2), 257\u2013286 (1989)","journal-title":"Proceedings of the IEEE"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-540-77395-5_14","volume-title":"Runtime Verification","author":"U. Sammapun","year":"2007","unstructured":"Sammapun, U., Lee, I., Sokolsky, O., Regehr, J.: Statistical Runtime Checking of Probabilistic Properties. In: Sokolsky, O., Ta\u015f\u0131ran, S. (eds.) RV 2007. LNCS, vol.\u00a04839, pp. 164\u2013175. Springer, Heidelberg (2007)"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zaki, M., Tahar, S.: Statistical runtime verification of analog and mixed signal designs. In: Proc. Third International Conference on Signals, Circuits and Systems (SCS 2009), pp. 1\u20136. IEEE (November 2009)","DOI":"10.1109\/ICSCS.2009.5412620"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/11562436_9","volume-title":"Formal Techniques for Networked and Distributed Systems - FORTE 2005","author":"L. Zhang","year":"2005","unstructured":"Zhang, L., Hermanns, H., Jansen, D.N.: Logic and Model Checking for Hidden Markov Models. In: Wang, F. (ed.) FORTE 2005. LNCS, vol.\u00a03731, pp. 98\u2013112. Springer, Heidelberg (2005)"},{"key":"15_CR21","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1002\/spe.1038","volume":"41","author":"P. Zhang","year":"2011","unstructured":"Zhang, P., Ki, W., Wan, D., Grunske, L.: Monitoring of probabilistic timed property sequence charts. Software: Practice and Experience\u00a041, 841\u2013866 (2011)","journal-title":"Software: Practice and Experience"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29860-8_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:18:59Z","timestamp":1620127139000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29860-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642298592","9783642298608"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29860-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}