{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T04:34:50Z","timestamp":1771043690973,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642298592","type":"print"},{"value":"9783642298608","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29860-8_35","type":"book-chapter","created":{"date-parts":[[2012,5,11]],"date-time":"2012-05-11T13:38:03Z","timestamp":1336743483000},"page":"442-456","source":"Crossref","is-referenced-by-count":12,"title":["Runtime Verification of Traces under Recording Uncertainty"],"prefix":"10.1007","author":[{"given":"Shaohui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Anaheed","family":"Ayoub","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Sokolsky","sequence":"additional","affiliation":[]},{"given":"Insup","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Program monitoring with LTL in EAGLE. In: Parallel and Distributed Processing Symposium (2004)"},{"key":"35_CR2","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1093\/logcom\/exn075","volume":"20","author":"A. Bauer","year":"2010","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Comparing LTL Semantics for Runtime Verification. Journal of Logic and Computation (JLC)\u00a020, 651\u2013674 (2010)","journal-title":"Journal of Logic and Computation (JLC)"},{"key":"35_CR3","doi-asserted-by":"crossref","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for LTL and TLTL. ACM Transactions on Software Engineering and Methodology (2011)","DOI":"10.1145\/2000799.2000800"},{"key":"35_CR4","unstructured":"Bodden, E.: J-LO\u2014A tool for runtime-checking temporal assertions. Diploma thesis, RWTH Aachen University (November 2005)"},{"issue":"2","key":"35_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/S0169-023X(02)00136-2","volume":"44","author":"B. Bollig","year":"2003","unstructured":"Bollig, B., Leucker, M.: Deciding LTL over Mazurkiewicz traces. Data & Knowledge Engineering\u00a044(2), 219\u2013238 (2003)","journal-title":"Data & Knowledge Engineering"},{"key":"35_CR6","unstructured":"Clarke, E., Grumberg, O., Peled, D.: Model Checking. MIT Press (1999)"},{"key":"35_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/978-3-540-31980-1_33","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"B. Genest","year":"2005","unstructured":"Genest, B., Kuske, D., Muscholl, A., Peled, D.A.: Snapshot Verification. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol.\u00a03440, pp. 510\u2013525. Springer, Heidelberg (2005)"},{"key":"35_CR8","unstructured":"Havelund, K., Ro\u015fu, G.: Monitoring programs using rewriting. In: International Conference on Automated Software Engineering (2001)"},{"key":"35_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-46002-0_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"K. Havelund","year":"2002","unstructured":"Havelund, K., Ro\u015fu, G.: Synthesizing Monitors for Safety Properties. In: Katoen, J.-P., Stevens, P. (eds.) TACAS 2002. LNCS, vol.\u00a02280, pp. 342\u2013356. Springer, Heidelberg (2002)"},{"issue":"2","key":"35_CR10","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/s10009-003-0117-6","volume":"6","author":"K. Havelund","year":"2004","unstructured":"Havelund, K., Ro\u015fu, G.: Efficient monitoring of safety properties. Int. J. Softw. Tools Technol. Transf.\u00a06(2), 158\u2013173 (2004)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"35_CR11","unstructured":"Kleene, S.C.: Introduction to Metamathematics. D. Van Nostrand (1950)"},{"key":"35_CR12","unstructured":"Lee, I., Kannan, S., Kim, M., Sokolsky, O., Viswanathan, M.: Runtime assurance based on formal specifications. In: PDPTA 1999, pp. 279\u2013287 (1999)"},{"key":"35_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0931-7","volume-title":"The temporal logic of reactive and concurrent systems: specification","author":"Z. Manna","year":"1992","unstructured":"Manna, Z., Pnueli, A.: The temporal logic of reactive and concurrent systems: specification, vol.\u00a01. Springer, Heidelberg (1992)"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Mazurkiewicz, A.: Concurrent program schemes and their interpretations. Tech. rep., DAIMI Rep.\u00a0PB\u00a078, Aarhus University (1977)","DOI":"10.7146\/dpb.v6i78.7691"},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science, pp. 46\u201357. IEEE (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"35_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-73370-6_11","volume-title":"Model Checking Software","author":"K. Rozier","year":"2007","unstructured":"Rozier, K., Vardi, M.: LTL Satisfiability Checking. In: Bo\u0161na\u010dki, D., Edelkamp, S. (eds.) SPIN 2007. LNCS, vol.\u00a04595, pp. 149\u2013167. Springer, Heidelberg (2007)"},{"key":"35_CR17","unstructured":"SAnToS Lab, Kansas State University: Property pattern mappings for LTL, \n                      \n                        http:\/\/patterns.projects.cis.ksu.edu\/documentation\/patterns\/ltl.shtml"},{"key":"35_CR18","unstructured":"Spees, W.S.: Functional Requirement for LDR Component. Center for Devices and Radiological Health, FDA (2010)"},{"issue":"1","key":"35_CR19","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s100090200070","volume":"4","author":"H. Tauriainen","year":"2002","unstructured":"Tauriainen, H., Heljanko, K.: Testing LTL formula translation into B\u00fcchi automata. STTT\u00a04(1), 57\u201370 (2002)","journal-title":"STTT"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29860-8_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:19:11Z","timestamp":1620127151000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29860-8_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642298592","9783642298608"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29860-8_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}