{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T02:59:26Z","timestamp":1722999566370},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SICS Softw.-Inensiv. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s00450-019-00425-6","type":"journal-article","created":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T10:03:07Z","timestamp":1572688987000},"page":"225-236","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards runtime verification of collaborative embedded systems"],"prefix":"10.1007","volume":"34","author":[{"given":"Samira","family":"Akili","sequence":"first","affiliation":[]},{"given":"Felix","family":"Lorenz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,2]]},"reference":[{"key":"425_CR1","unstructured":"Ancona D, Briola D, Ferrando A, Mascardi V (2016) MAS-drive: a practical approach to decentralized runtime verification of agent interaction protocols. In: WOA, pp. 35\u201343"},{"key":"425_CR2","doi-asserted-by":"crossref","unstructured":"Ancona D, Ferrando A, Mascardi V (2016) Comparing trace expressions and linear temporal logic for runtime verification. In: Theory and practice of formal methods. Springer, pp 47\u201364","DOI":"10.1007\/978-3-319-30734-3_6"},{"key":"425_CR3","unstructured":"Ancona D, Ferrando A, Mascardi V (2017) Parametric runtime verification of multiagent systems. In: Proceedings of the 16th conference on autonomous agents and multiagent systems, pp 1457\u20131459"},{"key":"425_CR4","doi-asserted-by":"crossref","unstructured":"Bartocci E, Deshmukh J, Donz\u00e9 A, Fainekos G, Maler O, Ni\u010dkovi\u0107 D, Sankaranarayanan S (2018) Specification-based monitoring of cyber-physical systems: a survey on theory, tools and applications. In: Lectures on runtime verification. Springer, pp 135\u2013175","DOI":"10.1007\/978-3-319-75632-5_5"},{"key":"425_CR5","doi-asserted-by":"crossref","unstructured":"Bauer A, Falcone Y (2012) Decentralised LTL monitoring. In: International symposium on formal methods. Springer, pp 85\u2013100","DOI":"10.1007\/978-3-642-32759-9_10"},{"issue":"1\u20132","key":"425_CR6","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/s10703-016-0253-8","volume":"48","author":"A Bauer","year":"2016","unstructured":"Bauer A, Falcone Y (2016) Decentralised LTL monitoring. Form Methods Syst Des 48(1\u20132):46\u201393","journal-title":"Form Methods Syst Des"},{"key":"425_CR7","doi-asserted-by":"crossref","unstructured":"Bocchi L, Chen TC, Demangeon R, Honda K, Yoshida N (2013) Monitoring networks through multiparty session types. In: Formal techniques for distributed systems. Springer, pp 50\u201365","DOI":"10.1007\/978-3-642-38592-6_5"},{"issue":"4","key":"425_CR8","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/TRO.2009.2022423","volume":"25","author":"HL Choi","year":"2009","unstructured":"Choi HL, Brunet L, How JP (2009) Consensus-based decentralized auctions for robust task allocation. IEEE Trans Rob 25(4):912\u2013926","journal-title":"IEEE Trans Rob"},{"issue":"3","key":"425_CR9","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s10703-014-0218-8","volume":"46","author":"R Demangeon","year":"2015","unstructured":"Demangeon R, Honda K, Hu R, Neykova R, Yoshida N (2015) Practical interruptible conversations: distributed dynamic verification with multiparty session types and Python. Form Methods Syst Des 46(3):197\u2013225","journal-title":"Form Methods Syst Des"},{"key":"425_CR10","doi-asserted-by":"crossref","unstructured":"Desai A, Dreossi T, Seshia SA (2017) Combining model checking and runtime verification for safe robotics. In: International conference on runtime verification. Springer, pp 172\u2013189","DOI":"10.1007\/978-3-319-67531-2_11"},{"key":"425_CR11","unstructured":"Ferrando A (2017) Rivertools: an IDE for runtime verification of MASs, and beyond. PRIMA demo track"},{"key":"425_CR12","unstructured":"Ferrando A, Ancona D, Mascardi V (2017) Decentralizing MAS monitoring with decamon. In: Proceedings of the 16th conference on autonomous agents and multiagent systems. International foundation for autonomous agents and multiagent systems, pp 239\u2013248"},{"key":"425_CR13","doi-asserted-by":"crossref","unstructured":"Francalanza A, P\u00e9rez JA, S\u00e1nchez C (2018) Runtime verification for decentralised and distributed systems. In: Lectures on runtime verification. Springer, pp 176\u2013210","DOI":"10.1007\/978-3-319-75632-5_6"},{"key":"425_CR14","unstructured":"Huget MP (2002) Extending agent UML sequence diagrams. In: International workshop on agent-oriented software engineering. Springer, pp 150\u2013161"},{"key":"425_CR15","doi-asserted-by":"crossref","unstructured":"Lorenz F, Schlingloff H (2018) Online-monitoring autonomous transport robots with an R-valued temporal logic. In: 14th IEEE international conference on automation science and engineering","DOI":"10.1109\/COASE.2018.8560421"},{"key":"425_CR16","unstructured":"Luckcuck M, Farrell M, Dennis L, Dixon C, Fisher M (2018) Formal specification and verification of autonomous robotic systems: a survey. arXiv preprint \narXiv:1807.00048"},{"key":"425_CR17","doi-asserted-by":"crossref","unstructured":"V\u00f6llinger K (2017) Verifying the output of a distributed algorithm using certification. In: International conference on runtime verification. Springer, pp 424\u2013430","DOI":"10.1007\/978-3-319-67531-2_29"},{"key":"425_CR18","unstructured":"V\u00f6llinger K, Akili S (2018) A case study on certifying distributed algorithms: reducing intrusiveness in monitoring cyber-physical systems"},{"key":"425_CR19","doi-asserted-by":"crossref","unstructured":"V\u00f6llinger K, Akili S (2018) On a verification framework for certifying distributed algorithms: distributed checking and consistency. In: International conference on formal techniques for distributed objects, components, and systems. Springer, pp 161\u2013180","DOI":"10.1007\/978-3-319-92612-4_9"},{"key":"425_CR20","doi-asserted-by":"crossref","unstructured":"V\u00f6llinger K, Reisig W (2015) Certification of distributed algorithms solving problems with optimal substructure. In: Software engineering and formal methods. Springer, pp 190\u2013195","DOI":"10.1007\/978-3-319-22969-0_14"},{"key":"425_CR21","doi-asserted-by":"crossref","unstructured":"Zheng X, Julien C (2015) Verification and validation in cyber physical systems: research challenges and a way forward. In: IEEE\/ACM 1st international workshop on software engineering for smart cyber-physical systems (SEsCPS). IEEE, pp 15\u201318","DOI":"10.1109\/SEsCPS.2015.11"},{"key":"425_CR22","doi-asserted-by":"crossref","unstructured":"Zheng X, Julien C, Podorozhny R, Cassez F (2015) BraceAssertion: runtime verification of cyber-physical systems. In: IEEE 12th international conference on mobile ad hoc and sensor systems (MASS). IEEE, pp 298\u2013306","DOI":"10.1109\/MASS.2015.15"}],"container-title":["SICS Software-Intensive Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00450-019-00425-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00450-019-00425-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00450-019-00425-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:54:33Z","timestamp":1604192073000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00450-019-00425-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,2]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["425"],"URL":"https:\/\/doi.org\/10.1007\/s00450-019-00425-6","relation":{},"ISSN":["2524-8510","2524-8529"],"issn-type":[{"value":"2524-8510","type":"print"},{"value":"2524-8529","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,2]]},"assertion":[{"value":"2 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}