{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T19:56:54Z","timestamp":1762459014621},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,9,5]],"date-time":"2012-09-05T00:00:00Z","timestamp":1346803200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Form Methods Syst Des"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s10703-012-0174-0","type":"journal-article","created":{"date-parts":[[2012,9,4]],"date-time":"2012-09-04T12:24:53Z","timestamp":1346761493000},"page":"233-235","source":"Crossref","is-referenced-by-count":3,"title":["Introduction to the special issue on runtime verification"],"prefix":"10.1007","volume":"41","author":[{"given":"Oleg","family":"Sokolsky","sequence":"first","affiliation":[]},{"given":"Grigore","family":"Ro\u015fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,9,5]]},"reference":[{"key":"174_CR1","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1145\/1094811.1094839","volume-title":"Proceedings of the 20th ACM SIGPLAN conference on object-oriented programming, systems, languages, and applications (OOPSLA\u201905)","author":"C Allan","year":"2005","unstructured":"Allan C, Avgustinov P, Kuzins S, de Moor O, Sereni D, Sittampalam G, Tibble J, Christensen AS, Hendren L, Lhot\u00e1k O (2005) Adding trace matching with free variables to AspectJ. In: Proceedings of the 20th ACM SIGPLAN conference on object-oriented programming, systems, languages, and applications (OOPSLA\u201905), pp 345\u2013364"},{"issue":"3","key":"174_CR2","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1093\/logcom\/exn075","volume":"20","author":"A Bauer","year":"2010","unstructured":"Bauer A, Leucker M, Schallhart C (2010) Comparing ltl semantics for runtime verification. J Log Comput 20(3):651\u2013674","journal-title":"J Log Comput"},{"key":"174_CR3","series-title":"LNCS","first-page":"525","volume-title":"Proceedings of the 21st European conference on object-oriented programming (ECOOP\u201907)","author":"E Bodden","year":"2007","unstructured":"Bodden E, Hendren L, Lhot\u00e1k O (2007) A staged static program analysis to improve the performance of runtime monitoring. In: Proceedings of the 21st European conference on object-oriented programming (ECOOP\u201907). LNCS, vol 4609, pp 525\u2013549"},{"key":"174_CR4","first-page":"750","volume-title":"International symposium on quality electronic design","author":"K Chen","year":"2008","unstructured":"Chen K, Malik S, Patra P (2008) Runtime validation of transactional memory systems. In: International symposium on quality electronic design, pp 750\u2013756"},{"key":"174_CR5","volume-title":"Proceedings of the workshop on formal approaches to testing and runtime verification (FATES\/RV\u201906)","author":"T Elmas","year":"2006","unstructured":"Elmas T, Qadeer S, Tasiran S (2006) Goldilocks: efficiently computing the happens-before relation using locksets. In: Proceedings of the workshop on formal approaches to testing and runtime verification (FATES\/RV\u201906)"},{"issue":"3","key":"174_CR6","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/MC.2010.76","volume":"43","author":"S Hall\u00e9","year":"2010","unstructured":"Hall\u00e9 S, Bultan T, Hughes G, Alkhalaf M, Villemaire R (2010) Runtime verification of web service interface contracts. IEEE Comput 43(3):59\u201366","journal-title":"IEEE Comput"},{"key":"174_CR7","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1007\/3-540-46002-0_24","volume-title":"Proceedings of tools and algorithms for construction and analysis of systems (TACAS\u201902)","author":"K Havelund","year":"2002","unstructured":"Havelund K, Ro\u015fu G (2002) Synthesizing monitors for safety properties. In: Proceedings of tools and algorithms for construction and analysis of systems (TACAS\u201902). LNCS, vol 2280, pp 342\u2013356"},{"issue":"2","key":"174_CR8","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1023\/B:FORM.0000017719.43755.7c","volume":"24","author":"M Kim","year":"2004","unstructured":"Kim M, Kannan S, Lee I, Sokolsky O, Viswanathan M (2004) Java-MaC: a run-time assurance approach for Java programs. Form Methods Syst Des 24(2):129\u2013155","journal-title":"Form Methods Syst Des"},{"issue":"3","key":"174_CR9","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s10009-011-0198-6","volume":"14","author":"P Meredith","year":"2011","unstructured":"Meredith P, Jin D, Griffith D, Chen F, Ro\u015fu G (2011) An overview of the MOP runtime verification framework. Int J Softw Tools Technol Transf 14(3):249\u2013289. Special Section on Runtime Verification","journal-title":"Int J Softw Tools Technol Transf"},{"key":"174_CR10","series-title":"LNCS","volume-title":"International conference on runtime verification (RV 2010)","author":"L Pike","year":"2010","unstructured":"Pike L, Goodloe A, Morisset R, Niller S (2010) Copilot: a hard real-time runtime monitor. In: International conference on runtime verification (RV 2010). LNCS, vol 6418"},{"key":"174_CR11","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TSE.2006.1599419","volume":"32","author":"L Wang","year":"2006","unstructured":"Wang L, Stoller SD (2006) Runtime analysis of atomicity for multi-threaded programs. IEEE Trans Softw Eng 32:93\u2013110","journal-title":"IEEE Trans Softw Eng"}],"container-title":["Formal Methods in System Design"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10703-012-0174-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10703-012-0174-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10703-012-0174-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T22:05:53Z","timestamp":1559253953000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10703-012-0174-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,5]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["174"],"URL":"https:\/\/doi.org\/10.1007\/s10703-012-0174-0","relation":{},"ISSN":["0925-9856","1572-8102"],"issn-type":[{"value":"0925-9856","type":"print"},{"value":"1572-8102","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9,5]]}}}