{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T00:11:44Z","timestamp":1699575104370},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T00:00:00Z","timestamp":1687737600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T00:00:00Z","timestamp":1687737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Softw Tools Technol Transfer"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s10009-023-00713-2","type":"journal-article","created":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T13:02:34Z","timestamp":1687784554000},"page":"481-501","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Concurrent runtime verification of data rich events"],"prefix":"10.1007","volume":"25","author":[{"given":"Nastaran","family":"Shafiei","sequence":"first","affiliation":[]},{"given":"Klaus","family":"Havelund","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Mehlitz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,26]]},"reference":[{"issue":"2","key":"713_CR1","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10270-020-00860-z","volume":"20","author":"L. Aceto","year":"2021","unstructured":"Aceto, L., Achilleos, A., Francalanza, A., Ing\u00f3lfsd\u00f3ttir, A., Lehtinen, K.: An operational guide to monitorability with applications to regular properties. Softw. Syst. Model. 20(2), 335\u2013361 (2021). https:\/\/doi.org\/10.1007\/s10270-020-00860-z","journal-title":"Softw. Syst. Model."},{"key":"713_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-71500-7_1","volume-title":"Fundamental Approaches to Software Engineering","author":"L. Aceto","year":"2021","unstructured":"Aceto, L., Attard, D.P., Francalanza, A., Ing\u00f3lfsd\u00f3ttir, A.: On benchmarking for concurrent runtime verification. In: Guerra, E., Stoelinga, M. (eds.) Fundamental Approaches to Software Engineering, pp.\u00a03\u201323. Springer, Berlin (2021). https:\/\/doi.org\/10.1007\/978-3-030-71500-7_1"},{"key":"713_CR3","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/CSF.2016.24","volume-title":"2016 IEEE 29th Computer Security Foundations Symposium (CSF)","author":"S. Agrawal","year":"2016","unstructured":"Agrawal, S., Bonakdarpour, B.: Runtime verification of k-safety hyperproperties in HyperLTL. In: 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.\u00a0239\u2013252 (2016). https:\/\/doi.org\/10.1109\/CSF.2016.24"},{"key":"713_CR4","unstructured":"Akka (2020). http:\/\/doc.akka.io\/docs\/akka\/current\/scala.html"},{"key":"713_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-25423-4_1","volume-title":"Formal Methods and Software Engineering","author":"C. Artho","year":"2015","unstructured":"Artho, C., Havelund, K., Kumar, R., Yamagata, Y.: Domain-specific languages with Scala. In: Butler, M., Conchon, S., Za\u00efdi, F. (eds.) Formal Methods and Software Engineering. Lecture Notes in Computer Science, vol.\u00a09407, pp.\u00a01\u201316. Springer, Berlin (2015). https:\/\/doi.org\/10.1007\/978-3-319-25423-4_1"},{"key":"713_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-319-66197-1_14","volume-title":"International Conference on Software Engineering and Formal Methods","author":"D.P. Attard","year":"2017","unstructured":"Attard, D.P., Francalanza, A.: Trace partitioning and local monitoring for asynchronous components. In: Cimatti, A., Sirjani, M. (eds.) International Conference on Software Engineering and Formal Methods. Lecture Notes in Computer Science, vol.\u00a010469, pp.\u00a0219\u2013235. Springer, Berlin (2017). https:\/\/doi.org\/10.1007\/978-3-319-66197-1_14"},{"key":"713_CR7","unstructured":"Avrekh, I., Matthews, B.L., Stewart, M.: RNAV adherence data integration system using aviation and environmental sources. Tech. rep., NASA Ames Research Center (2018)"},{"key":"713_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-35632-2_20","volume-title":"International Conference on Runtime Verification","author":"B. Barre","year":"2013","unstructured":"Barre, B., Klein, M., Soucy-Boivin, M., Ollivier, P.A., Hall\u00e9, S.: MapReduce for parallel trace validation of LTL properties. In: Qadeer, S., Tasiran, S. (eds.) International Conference on Runtime Verification. Lecture Notes in Computer Science, vol.\u00a07687, pp.\u00a0184\u2013198. Springer, Berlin (2013). https:\/\/doi.org\/10.1007\/978-3-642-35632-2_20"},{"key":"713_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-21437-0_7","volume-title":"International Symposium on Formal Methods","author":"H. Barringer","year":"2011","unstructured":"Barringer, H., Havelund, K.: TraceContract: a Scala DSL for trace analysis. In: Butler, M., Schulte, W. (eds.) International Symposium on Formal Methods. Lecture Notes in Computer Science, vol.\u00a06664, pp.\u00a057\u201372. Springer, Berlin (2011). https:\/\/doi.org\/10.1007\/978-3-642-21437-0_7"},{"key":"713_CR10","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s10703-016-0242-y","volume":"49","author":"D. Basin","year":"2016","unstructured":"Basin, D., Caronni, G., Ereth, S., Harvan, M., Klaedtke, F., Mantel, H.: Scalable offline monitoring of temporal specification. Form. Methods Syst. Des. 49, 75\u2013108 (2016). https:\/\/doi.org\/10.1007\/s10703-016-0242-y","journal-title":"Form. Methods Syst. Des."},{"key":"713_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-030-51074-9_25","volume-title":"Automated Reasoning","author":"D.A. Basin","year":"2020","unstructured":"Basin, D.A., Dardinier, T., Heimes, L., Krstic, S., Raszyk, M., Schneider, J., Traytel, D.: A formally verified, optimized monitor for metric first-order dynamic logic. In: Peltier, N., Sofronie-Stokkermans, V. (eds.) Automated Reasoning. Lecture Notes in Computer Science, vol.\u00a012166, pp.\u00a0432\u2013453. Springer, Berlin (2020). https:\/\/doi.org\/10.1007\/978-3-030-51074-9_25"},{"key":"713_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-030-60508-7_11","volume-title":"Runtime Verification - 20th International Conference, RV 2020","author":"D. Basin","year":"2020","unstructured":"Basin, D., Gras, M., Krsti\u0107, S., Schneider, J.: Scalable online monitoring of distributed systems. In: Deshmukh, J., Nickovic, D. (eds.) Runtime Verification - 20th International Conference, RV 2020, Los Angeles, CA, USA, October 6\u20139, 2020. Lecture Notes in Computer Science vol.\u00a012399, pp.\u00a0197\u2013220. Springer, Berlin (2020). https:\/\/doi.org\/10.1007\/978-3-030-60508-7_11"},{"key":"713_CR13","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s10703-015-0226-3","volume":"46","author":"S. Berkovich","year":"2015","unstructured":"Berkovich, S., Bonakdarpour, B., Fischmeister, S.: Runtime verification with minimal intrusion through parallelism. Form. Methods Syst. Des. 46, 317\u2013348 (2015). https:\/\/doi.org\/10.1007\/s10703-015-0226-3","journal-title":"Form. Methods Syst. Des."},{"key":"713_CR14","doi-asserted-by":"publisher","unstructured":"Burl\u00f2, C.B., Francalanza, A., Scalas, A.: On the monitorability of session types, in theory and practice (extended version). CoRR (2021). arXiv:2105.06291. https:\/\/doi.org\/10.4230\/LIPIcs.ECOOP.2021.20","DOI":"10.4230\/LIPIcs.ECOOP.2021.20"},{"issue":"6","key":"713_CR15","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.3233\/JCS-2009-0393","volume":"18","author":"M.R. Clarkson","year":"2010","unstructured":"Clarkson, M.R., Schneider, F.B.: Hyperprop. J. Comput. Secur. 18(6), 1157\u20131210 (2010). https:\/\/doi.org\/10.3233\/JCS-2009-0393","journal-title":"Hyperprop. J. Comput. Secur."},{"key":"713_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-33826-7_15","volume-title":"Software Engineering and Formal Methods","author":"C. Colombo","year":"2012","unstructured":"Colombo, C., Francalanza, A., Mizzi, R., Pace, G.J.: polyLarva: runtime verification with configurable resource-aware monitoring boundaries. In: Eleftherakis, G., Hinchey, M., Holcombe, M. (eds.) Software Engineering and Formal Methods. Lecture Notes in Computer Science, vol.\u00a07504, pp.\u00a0218\u2013232. Springer, Berlin (2012). https:\/\/doi.org\/10.1007\/978-3-642-33826-7_15"},{"key":"713_CR17","unstructured":"Department of Transportation, Federal Aviation Administration: Implementation of Descend via into Boston Terminal area from Boston ARTCC (2015)"},{"key":"713_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-030-03769-7_6","volume-title":"International Conference on Runtime Verification","author":"A. El-Hokayem","year":"2018","unstructured":"El-Hokayem, A., Falcone, Y.: Can we monitor all multithreaded programs? In: Colombo, C., Leucker, M. (eds.) International Conference on Runtime Verification. Lecture Notes in Computer Science, vol.\u00a011237, pp.\u00a064\u201389. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03769-7_6"},{"issue":"1","key":"713_CR19","doi-asserted-by":"publisher","first-page":"1:1","DOI":"10.1145\/3355181","volume":"29","author":"A. El-Hokayem","year":"2020","unstructured":"El-Hokayem, A., Falcone, Y.: On the monitoring of decentralized specifications: semantics, properties, analysis, and simulation. ACM Trans. Softw. Eng. Methodol. 29(1), 1:1\u20131:57 (2020). https:\/\/doi.org\/10.1145\/3355181","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"713_CR20","series-title":"NATO Science for Peace and Security Series - D: Information and Communication Security","doi-asserted-by":"publisher","first-page":"141","DOI":"10.3233\/978-1-61499-207-3-141","volume-title":"Engineering Dependable Software Systems","author":"Y. Falcone","year":"2013","unstructured":"Falcone, Y., Havelund, K., Reger, G.: A tutorial on runtime verification. In: Broy, M., Peled, D., Kalus, G. (eds.) Engineering Dependable Software Systems. NATO Science for Peace and Security Series - D: Information and Communication Security, vol.\u00a034, pp.\u00a0141\u2013175. IOS Press, Amsterdam (2013). https:\/\/doi.org\/10.3233\/978-1-61499-207-3-141"},{"issue":"3","key":"713_CR21","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/s10703-019-00334-z","volume":"54","author":"B. Finkbeiner","year":"2019","unstructured":"Finkbeiner, B., Hahn, C., Stenger, M., Tentrup, L.: Monitoring hyperproperties. Form. Methods Syst. Des. 54(3), 336\u2013363 (2019). https:\/\/doi.org\/10.1007\/s10703-019-00334-z","journal-title":"Form. Methods Syst. Des."},{"key":"713_CR22","doi-asserted-by":"publisher","unstructured":"Finkbeiner, B., Oswald, S., Passing, N., Schwenger, M.: Verified Rust monitors for Lola specifications. CoRR (2020). arXiv:2012.08961. https:\/\/doi.org\/10.1007\/978-3-030-60508-7_24","DOI":"10.1007\/978-3-030-60508-7_24"},{"issue":"3","key":"713_CR23","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/s10703-014-0217-9","volume":"46","author":"A. Francalanza","year":"2015","unstructured":"Francalanza, A., Seychell, A.: Synthesising correct concurrent runtime monitors. Form. Methods Syst. Des. 46(3), 226\u2013261 (2015). https:\/\/doi.org\/10.1007\/s10703-014-0217-9","journal-title":"Form. Methods Syst. Des."},{"key":"713_CR24","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-319-75632-5_6","volume-title":"Runtime Verification for Decentralised and Distributed Systems","author":"A. Francalanza","year":"2018","unstructured":"Francalanza, A., P\u00e9rez, J.A., S\u00e1nchez, C.: Runtime Verification for Decentralised and Distributed Systems pp.\u00a0176\u2013210. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75632-5_6"},{"key":"713_CR25","series-title":"Kalpa Publications in Computing","doi-asserted-by":"publisher","first-page":"81","DOI":"10.29007\/4cth","volume-title":"An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools","author":"S. Hall\u00e9","year":"2017","unstructured":"Hall\u00e9, S., Khoury, R.: Event stream processing with BeepBeep 3. In: Reger, G., Havelund, K. (eds.) An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools, Seattle, WA, USA, September 15, 2017. Kalpa Publications in Computing, vol.\u00a03, pp.\u00a081\u201388. EasyChair (2017). https:\/\/doi.org\/10.29007\/4cth"},{"key":"713_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/978-3-319-67531-2_22","volume-title":"International Conference on Runtime Verification","author":"S. Hall\u00e9","year":"2017","unstructured":"Hall\u00e9, S., Khoury, R., Gaboury, R.: Event stream processing with multiple threads. In: Lahiri, S., Reger, G. (eds.) International Conference on Runtime Verification. Lecture Notes in Computer Science, vol.\u00a010548, pp.\u00a0359\u2013369. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67531-2_22"},{"key":"713_CR27","unstructured":"Harris Corporation: FAA Telecommunications Infrastructure NEMS User Guide (2013)"},{"key":"713_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TASE.2014.37","volume-title":"Symposium on Theoretical Aspects of Software Engineering Conference","author":"K. Havelund","year":"2014","unstructured":"Havelund, K.: Data automata in Scala. In: Symposium on Theoretical Aspects of Software Engineering Conference, Changsha, China, pp.\u00a01\u20139 (2014). https:\/\/doi.org\/10.1109\/TASE.2014.37"},{"key":"713_CR29","unstructured":"Havelund, K.: Daut (2022). https:\/\/github.com\/havelund\/daut"},{"key":"713_CR30","unstructured":"Havelund, K.: TraceContract (2022). https:\/\/github.com\/havelund\/tracecontract"},{"key":"713_CR31","first-page":"235","volume-title":"Proceedings of the 3rd International Joint Conference on Artificial Intelligence","author":"C. Hewitt","year":"1973","unstructured":"Hewitt, C., Bishop, P., Steiger, R.: A universal modular ACTOR formalism for artificial intelligence. In: Proceedings of the 3rd International Joint Conference on Artificial Intelligence, pp.\u00a0235\u2013245. Kaufmann, San Francisco (1973)"},{"key":"713_CR32","unstructured":"HOCON: Human Optimized Config Object Notation (2020). https:\/\/github.com\/typesafehub\/config\/blob\/master\/HOCON.md"},{"key":"713_CR33","unstructured":"International Air Line Pilots Associations: FAA Suspends OPD Arrivals for Atlanta International Airport (2016)"},{"key":"713_CR34","unstructured":"International Civil Aviation Organization (ICAO): Performance-based Navigation (PBN) Manual, 3rd edn. (2008)"},{"key":"713_CR35","unstructured":"JMH - Java Microbenchmark Harness (2020). https:\/\/openjdk.java.net\/projects\/code-tools\/jmh\/"},{"issue":"2","key":"713_CR36","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/13677.22723","volume":"5","author":"J. Joyce","year":"1987","unstructured":"Joyce, J., Lomow, G., Slind, K., Unger, B.: Monitoring distributed systems. ACM Trans. Comput. Syst. 5(2), 121\u2013150 (1987). https:\/\/doi.org\/10.1145\/13677.22723","journal-title":"ACM Trans. Comput. Syst."},{"key":"713_CR37","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-64276-1_1","volume-title":"Theoretical Aspects of Computing - ICTAC 2020","author":"E. Kurklu","year":"2020","unstructured":"Kurklu, E., Havelund, K.: A flight rule checker for the LADEE Lunar spacecraft. In: Pun, V.K.I., Stolz, V., Simao, A. (eds.) Theoretical Aspects of Computing - ICTAC 2020, pp.\u00a03\u201320. Springer, Berlin (2020). https:\/\/doi.org\/10.1007\/978-3-030-64276-1_1"},{"key":"713_CR38","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1109\/SNPD.2017.8022750","volume-title":"International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing","author":"P. Lavery","year":"2017","unstructured":"Lavery, P., Watanabe, T.: An actor-based runtime monitoring system for web and desktop applications. In: Hochin, T., Hirata, H., Nomiya, H. (eds.) International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing, pp.\u00a0385\u2013390. IEEE Comput. Soc., Los Alamitos (2017). https:\/\/doi.org\/10.1109\/SNPD.2017.8022750"},{"issue":"5","key":"713_CR39","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M. Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Log. Algebraic Program. 78(5), 293\u2013303 (2009). https:\/\/doi.org\/10.1016\/j.jlap.2008.08.004","journal-title":"J. Log. Algebraic Program."},{"key":"713_CR40","unstructured":"Mehlitz, P.: RACE (2022). http:\/\/nasarace.github.io\/race\/"},{"key":"713_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/DASC.2016.7777991","volume-title":"Digital Avionics Systems Conference (DASC)","author":"P. Mehlitz","year":"2016","unstructured":"Mehlitz, P., Shafiei, N., Tkachuk, O., Davies, M.: RACE: building airspace simulations faster and better with actors. In: Digital Avionics Systems Conference (DASC), pp.\u00a01\u20139 (2016). https:\/\/doi.org\/10.1109\/DASC.2016.7777991"},{"issue":"3","key":"713_CR42","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s10009-011-0198-6","volume":"14","author":"P.O. Meredith","year":"2012","unstructured":"Meredith, P.O., Jin, D., Griffith, D., Chen, F., Ro\u015fu, G.: An overview of the MOP runtime verification framework. Int. J. Softw. Tools Technol. Transf. 14(3), 249\u2013289 (2012). https:\/\/doi.org\/10.1007\/s10009-011-0198-6","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"713_CR43","unstructured":"MESA - MEssage-based System Analysis (2022). https:\/\/github.com\/NASA-SW-VnV\/mesa"},{"key":"713_CR44","unstructured":"NASA WorldWind (2022). https:\/\/worldwind.arc.nasa.gov\/"},{"key":"713_CR45","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1145\/3033019.3033031","volume-title":"International Conference on Compiler Construction","author":"R. Neykova","year":"2017","unstructured":"Neykova, R., Yoshida, N.: Let it recover: multiparty protocol-induced recovery. In: Wu, P., Hack, S. (eds.) International Conference on Compiler Construction, pp.\u00a098\u2013108. ACM, New York (2017). https:\/\/doi.org\/10.1145\/3033019.3033031"},{"key":"713_CR46","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/ICUAS.2018.8453287","volume-title":"2018 International Conference on Unmanned Aircraft Systems (ICUAS)","author":"S. Rasmussen","year":"2018","unstructured":"Rasmussen, S., Kingston, D., Humphrey, L.: A brief introduction to unmanned systems autonomy services (UxAS). In: 2018 International Conference on Unmanned Aircraft Systems (ICUAS), pp.\u00a0257\u2013268 (2018). https:\/\/doi.org\/10.1109\/ICUAS.2018.8453287"},{"key":"713_CR47","unstructured":"Reger, G.: Rule-based runtime verification in a multicore system setting. Master\u2019s thesis, University of Manchester (2010)"},{"key":"713_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1007\/978-3-662-46681-0_55","volume-title":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Reger","year":"2015","unstructured":"Reger, G., Cruz, H.C., Rydeheard, D.: MarQ: monitoring at runtime with QEA. In: Baier, C., Tinelli, C. (eds.) International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science, vol.\u00a09035, pp.\u00a0596\u2013610. Springer, Berlin (2015). https:\/\/doi.org\/10.1007\/978-3-662-46681-0_55"},{"key":"713_CR49","unstructured":"Reger, G., Rydeheard, D., Barringer, H.: MAIL - an interaction layer for exploring the use of multicore in runtime monitoring. (unpublished)"},{"key":"713_CR50","volume-title":"Java Message Service","author":"M. Richards","year":"2009","unstructured":"Richards, M., Monson-Haefel, R., Chappell, D.A.: Java Message Service, 2nd edn. O\u2019Reilly Media, Inc., Newton (2009)","edition":"2"},{"key":"713_CR51","volume-title":"Akka in Action","author":"R. Roestenburg","year":"2015","unstructured":"Roestenburg, R., Bakker, R., Williams, R.: Akka in Action, 1st edn. Manning Publications Co., Greenwich (2015)","edition":"1"},{"key":"713_CR52","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-030-60508-7_12","volume-title":"Runtime Verification","author":"N. Shafiei","year":"2020","unstructured":"Shafiei, N., Havelund, K., Mehlitz, P.: Actor-based runtime verification with MESA. In: Deshmukh, J., Ni\u010dkovi\u0107, D. (eds.) Runtime Verification, pp.\u00a0221\u2013240. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60508-7_12"},{"key":"713_CR53","doi-asserted-by":"crossref","unstructured":"Shafiei, N., Havelund, K., Mehlitz, P.: Empirical Study of Actor-based Runtime Verification. Tech. rep., NASA Ames Research Center (2020)","DOI":"10.1007\/978-3-030-60508-7_12"},{"key":"713_CR54","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2017.8102034","volume-title":"DASC: Digital Avionics Systems Conference","author":"M. Stewart","year":"2017","unstructured":"Stewart, M., Matthews, B.: Objective assessment method for RNAV STAR adherence. In: DASC: Digital Avionics Systems Conference (2017). https:\/\/doi.org\/10.1109\/DASC.2017.8102034"},{"key":"713_CR55","unstructured":"SWIM flight data publication service (2020). https:\/\/www.faa.gov\/air_traffic\/technology\/swim\/sfdps\/"},{"key":"713_CR56","unstructured":"U.S. Department of Transportation. Federal Aviation Administration: Performance Based Navigation PBN NAS Navigation Strategy (2016)"},{"key":"713_CR57","unstructured":"U.S. Department of Transportation. Federal Aviation Administration: Instrument Procedures Handbook (IPH) (2017)"}],"container-title":["International Journal on Software Tools for Technology Transfer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-023-00713-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10009-023-00713-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-023-00713-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T09:04:54Z","timestamp":1699520694000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10009-023-00713-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,26]]},"references-count":57,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["713"],"URL":"https:\/\/doi.org\/10.1007\/s10009-023-00713-2","relation":{},"ISSN":["1433-2779","1433-2787"],"issn-type":[{"value":"1433-2779","type":"print"},{"value":"1433-2787","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,26]]},"assertion":[{"value":"30 May 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}