{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:06:38Z","timestamp":1746158798396,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642540127"},{"type":"electronic","value":"9783642540134"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54013-4_20","type":"book-chapter","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T01:08:09Z","timestamp":1388711289000},"page":"357-375","source":"Crossref","is-referenced-by-count":4,"title":["Monitoring Parametric Temporal Logic"],"prefix":"10.1007","author":[{"given":"Peter","family":"Faymonville","sequence":"first","affiliation":[]},{"given":"Bernd","family":"Finkbeiner","sequence":"additional","affiliation":[]},{"given":"Doron","family":"Peled","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"D\u2019Angelo, B., Sankaranarayanan, S., S\u00e1nchez, C., Robinson, W., Finkbeiner, B., Sipma, H.B., Mehrotra, S., Manna, Z.: Lola: Runtime Monitoring of Synchronous Systems. In: TIME 2005, pp. 166\u2013174 (2005)","DOI":"10.1109\/TIME.2005.26"},{"issue":"3","key":"20_CR2","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1145\/377978.377990","volume":"2","author":"R. Alur","year":"2001","unstructured":"Alur, R., Etessami, K., La Torre, S., Peled, D.: Parametric temporal logic for \u201cmodel measuring\u201d. ACM Trans. Comput. Log.\u00a02(3), 388\u2013407 (2001)","journal-title":"ACM Trans. Comput. Log."},{"issue":"4","key":"20_CR3","first-page":"14","volume":"20","author":"A. Bauer","year":"2011","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Runtime Verification for LTL and TLTL. ACM Trans. Software Engineering Methodologies\u00a020(4), 14 (2011)","journal-title":"ACM Trans. Software Engineering Methodologies"},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/S0020-0190(00)00113-7","volume":"75","author":"K. Etessami","year":"2000","unstructured":"Etessami, K.: A note on a question of Peled and Wilke regarding stutter-invariant LTL. Information Processing Letters\u00a075, 261\u2013263 (2000)","journal-title":"Information Processing Letters"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Gerth, R., Peled, D., Vardi, M.Y., Wolper, P.: Simple on-the-fly automatic verification of linear temporal logic. In: PSTV 1995, pp. 3\u201318 (1995)","DOI":"10.1007\/978-0-387-34892-6_1"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-46002-0_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"K. Havelund","year":"2002","unstructured":"Havelund, K., Ro\u015fu, G.: Synthesizing Monitors for Safety Properties. In: Katoen, J.-P., Stevens, P. (eds.) TACAS 2002. LNCS, vol.\u00a02280, pp. 342\u2013356. Springer, Heidelberg (2002)"},{"issue":"4","key":"20_CR7","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/S1571-0661(04)80576-0","volume":"70","author":"B. Finkbeiner","year":"2002","unstructured":"Finkbeiner, B., Sankaranarayanan, S., Sipma, H.: Collecting statistics over runtime executions. Proceedings of Runtime Verification (RV 2002), Electronic Notes in Theoretical Computer Science\u00a070(4), 36\u201354 (2002)","journal-title":"Proceedings of Runtime Verification (RV 2002), Electronic Notes in Theoretical Computer Science"},{"issue":"2","key":"20_CR8","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1023\/B:FORM.0000017718.28096.48","volume":"24","author":"B. Finkbeiner","year":"2004","unstructured":"Finkbeiner, B., Sipma, H.: Checking Finite Traces Using Alternating Automata. Formal Methods in System Design\u00a024(2), 101\u2013127 (2004)","journal-title":"Formal Methods in System Design"},{"issue":"2","key":"20_CR9","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10703-009-0067-z","volume":"34","author":"O. Kupferman","year":"2009","unstructured":"Kupferman, O., Piterman, N., Vardi, M.Y.: From Liveness to Promptness. Formal Methods in System Design\u00a034(2), 83\u2013103 (2009)","journal-title":"Formal Methods in System Design"},{"issue":"3","key":"20_CR10","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1023\/A:1011254632723","volume":"19","author":"O. Kupferman","year":"2001","unstructured":"Kupferman, O., Vardi, M.Y.: Model Checking of Safety Properties. Formal Methods in System Design\u00a019(3), 291\u2013314 (2001)","journal-title":"Formal Methods in System Design"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Maidl, M.: The Common Fragment of CTL and LTL. In: FOCS 2000, Rodendo Beach, CA, USA, pp. 643\u2013652 (2000)","DOI":"10.1109\/SFCS.2000.892332"},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/0304-3975(91)90041-Y","volume":"83","author":"Z. Manna","year":"1991","unstructured":"Manna, Z., Pnueli, A.: Completing the Temporal Picture. Theoretical Computer Science\u00a083, 91\u2013130 (1991)","journal-title":"Theoretical Computer Science"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/11813040_38","volume-title":"FM 2006: Formal Methods","author":"A. Pnueli","year":"2006","unstructured":"Pnueli, A., Zaks, A.: PSL Model Checking and Run-Time Verification Via Testers. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006. LNCS, vol.\u00a04085, pp. 573\u2013586. Springer, Heidelberg (2006)"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2168\/LMCS-8(1:9)2012","volume":"8","author":"G. Rosu","year":"2012","unstructured":"Rosu, G., Chen, F.: Semantics and Algorithms for Parametric Monitoring. Logical Methods in Computer Science\u00a08, 1 (2012)","journal-title":"Logical Methods in Computer Science"},{"key":"20_CR15","unstructured":"Vardi, M., Wolper, P.: An Automata-Theoretic Approach to Automatic Program Verification. In: LICS 1986, Cambridge, MA, pp. 332\u2013344 (1986)"}],"container-title":["Lecture Notes in Computer Science","Verification, Model Checking, and Abstract Interpretation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54013-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T10:40:06Z","timestamp":1746096006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54013-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642540127","9783642540134"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54013-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}