{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T02:47:48Z","timestamp":1764557268643},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642338250"},{"type":"electronic","value":"9783642338267"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33826-7_15","type":"book-chapter","created":{"date-parts":[[2012,9,25]],"date-time":"2012-09-25T22:46:25Z","timestamp":1348613185000},"page":"218-232","source":"Crossref","is-referenced-by-count":18,"title":["polyLarva: Runtime Verification with Configurable Resource-Aware Monitoring Boundaries"],"prefix":"10.1007","author":[{"given":"Christian","family":"Colombo","sequence":"first","affiliation":[]},{"given":"Adrian","family":"Francalanza","sequence":"additional","affiliation":[]},{"given":"Ruth","family":"Mizzi","sequence":"additional","affiliation":[]},{"given":"Gordon J.","family":"Pace","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1145\/1449955.1449776","volume":"43","author":"M. Arnold","year":"2008","unstructured":"Arnold, M., Vechev, M., Yahav, E.: Qvm: an efficient runtime for detecting defects in deployed systems. SIGPLAN Not.\u00a043, 143\u2013162 (2008)","journal-title":"SIGPLAN Not."},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","volume-title":"Runtime Verification","year":"2010","unstructured":"Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Ro\u015fu, G., Sokolsky, O., Tillmann, N. (eds.): RV 2010. LNCS, vol.\u00a06418. Springer, Heidelberg (2010)"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Bodden, E., Chen, F., Rosu, G.: Dependent advice: a general approach to optimizing history-based aspects. In: Proceedings of the 8th ACM International Conference on Aspect-Oriented Software Development, AOSD 2009, pp. 3\u201314. ACM (2009)","DOI":"10.1145\/1509239.1509243"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-540-73589-2_25","volume-title":"ECOOP 2007 \u2013 Object-Oriented Programming","author":"E. Bodden","year":"2007","unstructured":"Bodden, E., Hendren, L., Lhot\u00e1k, O.: A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring. In: Bateni, M. (ed.) ECOOP 2007. LNCS, vol.\u00a04609, pp. 525\u2013549. Springer, Heidelberg (2007)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: Larva \u2014 safer monitoring of real-time java programs (tool paper). In: Seventh IEEE International Conference on Software Engineering and Formal Methods (SEFM), pp. 33\u201337. IEEE (2009)","DOI":"10.1109\/SEFM.2009.13"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Diep, M., Elbaum, S.: Reducing the cost of path property monitoring through sampling. In: Proceedings of the 2008 23rd IEEE\/ACM International Conference on Automated Software Engineering, ASE 2008, pp. 228\u2013237. IEEE (2008)","DOI":"10.1109\/ASE.2008.33"},{"issue":"2","key":"15_CR7","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/S1571-0661(04)00252-X","volume":"55","author":"M. Geilen","year":"2001","unstructured":"Geilen, M.: On the construction of monitors for temporal logic properties. Electr. Notes Theor. Comput. Sci.\u00a055(2), 181\u2013199 (2001)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1023\/B:FORM.0000017719.43755.7c","volume":"24","author":"M. Kim","year":"2004","unstructured":"Kim, M., Viswanathan, M., Kannan, S., Lee, I., Sokolsky, O.: Java-mac: A run-time assurance approach for java programs. Formal Methods in System Design\u00a024, 129\u2013155 (2004)","journal-title":"Formal Methods in System Design"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Meredith, P.O., Jin, D., Griffith, D., Chen, F., Ro\u015fu, G.: An overview of the MOP runtime verification framework. International Journal on Software Techniques for Technology Transfer (2011) (to appear)","DOI":"10.1007\/s10009-011-0198-6"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/978-3-540-40965-6_17","volume-title":"Advances in Computing Science \u2013 ASIAN 2003. Progamming Languages and Distributed Computation Programming Languages and Distributed Computation","author":"K. Sen","year":"2003","unstructured":"Sen, K., Ro\u015fu, G., Agha, G.: Generating Optimal Linear Temporal Logic Monitors by Coinduction. In: Saraswat, V.A. (ed.) ASIAN 2003. LNCS, vol.\u00a02896, pp. 260\u2013275. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33826-7_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:22:10Z","timestamp":1620130930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33826-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642338250","9783642338267"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33826-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}