{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T17:41:27Z","timestamp":1749318087402},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642342806"},{"type":"electronic","value":"9783642342813"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34281-3_34","type":"book-chapter","created":{"date-parts":[[2012,10,29]],"date-time":"2012-10-29T18:38:09Z","timestamp":1351535889000},"page":"494-509","source":"Crossref","is-referenced-by-count":19,"title":["Towards Certified Runtime Verification"],"prefix":"10.1007","author":[{"given":"Jan Olaf","family":"Blech","sequence":"first","affiliation":[]},{"given":"Yli\u00e8s","family":"Falcone","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Becker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Allan, C., Avgustinov, P., Christensen, A.S., Hendren, L., Kuzins, S., Lhot\u00e1k, O., de Moor, O., Sereni, D., Sittampalam, G., Tibble, J.: Adding trace matching with free variables to AspectJ. SIGPLAN Notices (October 2005)","DOI":"10.1145\/1094811.1094839"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Arden, D.N.: Delayed-logic and finite-state machines, pp. 133\u2013151. IEEE (1961)","DOI":"10.1109\/FOCS.1961.13"},{"key":"34_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-24622-0_5","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"H. Barringer","year":"2004","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-Based Runtime Verification. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol.\u00a02937, pp. 44\u201357. Springer, Heidelberg (2004)"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Barringer, H., Groce, A., Havelund, K., Smith, M.: Formal analysis of log files. Journal of Aerospace Computing, Information, and Communication (2010)","DOI":"10.2514\/1.49356"},{"key":"34_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-21437-0_7","volume-title":"FM 2011: Formal Methods","author":"H. Barringer","year":"2011","unstructured":"Barringer, H., Havelund, K.: TraceContract: A Scala DSL for Trace Analysis. In: Butler, M., Schulte, W. (eds.) FM 2011. LNCS, vol.\u00a06664, pp. 57\u201372. Springer, Heidelberg (2011)"},{"key":"34_CR6","unstructured":"Barringer, H., Rydeheard, D., Havelund, K.: Rule systems for run-time monitoring: from EAGLE to RuleR. Journal of Logic and Computation (June 2010)"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Blech, J.O., Gr\u00e9goire, B.: Certifying compilers using higher-order theorem provers as certificate checkers. Formal Methods in System Design (2011)","DOI":"10.1007\/s10703-010-0108-7"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: Larva \u2014 safer monitoring of real-time Java programs (tool paper). In: Software Engineering and Formal Methods (SEFM 2009), pp. 33\u201337. IEEE Computer Society (2009)","DOI":"10.1109\/SEFM.2009.13"},{"key":"34_CR9","unstructured":"The Coq development team. The coq proof assistant reference manual v8.4 (2012), \n                    \n                      http:\/\/coq.inria.fr"},{"key":"34_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-04694-0_4","volume-title":"Runtime Verification","author":"Y. Falcone","year":"2009","unstructured":"Falcone, Y., Fernandez, J.-C., Mounier, L.: Runtime Verification of Safety-Progress Properties. In: Bensalem, S., Peled, D.A. (eds.) RV 2009. LNCS, vol.\u00a05779, pp. 40\u201359. Springer, Heidelberg (2009)"},{"key":"34_CR11","unstructured":"FlexRay communications system protocol specification version 2.1, FlexRay Consortium (May 2005)"},{"key":"34_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1007\/978-3-540-69149-5_40","volume-title":"Verified Software: Theories, Tools, Experiments","author":"K. Havelund","year":"2008","unstructured":"Havelund, K., Goldberg, A.: Verify Your Runs. In: Meyer, B., Woodcock, J. (eds.) VSTTE 2005. LNCS, vol.\u00a04171, pp. 374\u2013383. Springer, Heidelberg (2008)"},{"key":"34_CR13","unstructured":"Kaiser, R., Wagner, S.: The PikeOS Concept: History and Design. SysGO AG White Paper, \n                    \n                      http:\/\/www.sysgo.com"},{"key":"34_CR14","unstructured":"Kim, M., Viswanathan, M., Lee, I., Ben-Abdellah, H., Kannan, S., Sokolsky, O.: Formally Specified Monitoring of Temporal Properties. In: European Conference on Real-Time Systems (ECRTS) (1999)"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Kopetz, H.: TTP - A time-triggered protocol for fault-tolerant real-time systems. In: Fault-Tolerant Computing. IEEE (1993)","DOI":"10.1109\/2.248873"},{"key":"34_CR16","unstructured":"Lee, I., Kannan, S., Kim, M., Sokolsky, O., Viswanathan, M.: Runtime Assurance Based On Formal Specifications. In: International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas (1999)"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Meredith, P., Jin, D., Griffith, D., Chen, F., Ro\u015fu, G.: An overview of the MOP runtime verification framework. International Journal on Software Tools for Technology Transfer (2011)","DOI":"10.1007\/s10009-011-0198-6"},{"key":"34_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/11813040_38","volume-title":"FM 2006: Formal Methods","author":"A. Pnueli","year":"2006","unstructured":"Pnueli, A., Zaks, A.: PSL Model Checking and Run-Time Verification Via Testers. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. LNCS, vol.\u00a04085, pp. 573\u2013586. Springer, Heidelberg (2006)"},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Rosu, G., Chen, F.: Semantics and Algorithms for Parametric Monitoring. Logical Methods in Computer Science (2012)","DOI":"10.2168\/LMCS-8(1:9)2012"},{"key":"34_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-540-89247-2_2","volume-title":"Runtime Verification","author":"J. Rushby","year":"2008","unstructured":"Rushby, J.: Runtime Certification. In: Leucker, M. (ed.) RV 2008. LNCS, vol.\u00a05289, pp. 21\u201335. Springer, Heidelberg (2008)"},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"Steinbach, T., Korf, F., Schmidt, T.C.: Comparing time-triggered Ethernet with FlexRay: An evaluation of competing approaches to real-time for invehicle networks. In: 8th IEEE International Workshop on Factory Communication Systems (2010)","DOI":"10.1109\/WFCS.2010.5548606"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Stolz, V., Bodden, E.: Temporal assertions using AspectJ. In: Proc. of the 5th Int. Workshop on Runtime Verification, RV 2005. ENTCS, vol.\u00a0144(4). Elsevier (2006)","DOI":"10.1016\/j.entcs.2006.02.007"},{"key":"34_CR23","doi-asserted-by":"crossref","unstructured":"Sridhar, M., Hamlen, K.W.: Flexible in-lined reference monitor certification: challenges and future directions. In: Programming Languages meets Program Verification. ACM (2011)","DOI":"10.1145\/1929529.1929537"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34281-3_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:50:56Z","timestamp":1620132656000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34281-3_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642342806","9783642342813"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34281-3_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}