{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T04:01:46Z","timestamp":1751774506668,"version":"3.41.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,6,21]],"date-time":"2018-06-21T00:00:00Z","timestamp":1529539200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100000921","name":"European Cooperation in Science and Technology","doi-asserted-by":"publisher","award":["IC 1402"],"award-info":[{"award-number":["IC 1402"]}],"id":[{"id":"10.13039\/501100000921","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Form Methods Syst Des"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s10703-018-0320-4","type":"journal-article","created":{"date-parts":[[2018,6,21]],"date-time":"2018-06-21T07:32:46Z","timestamp":1529566366000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Introduction to the special issue on runtime verification"],"prefix":"10.1007","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0114-0641","authenticated-orcid":false,"given":"Yli\u00e8s","family":"Falcone","sequence":"first","affiliation":[]},{"given":"C\u00e9sar","family":"S\u00e1nchez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,21]]},"reference":[{"key":"320_CR1","unstructured":"Kim M, Viswanathan M, Ben-Abdallah H, Kannan S, Lee I, Sokolsky O (1999) Formally specified monitoring of temporal properties. In: Proceedings of the 11th Euromicro conference on real-time systems (ECRTS 1999), pp 114\u2013122. IEEE Computer Society"},{"key":"320_CR2","doi-asserted-by":"crossref","unstructured":"Sokolsky O, Kannan S, Kim M, Lee I, Viswanathan M (1999) Steering of real-time systems based on monitoring and checking. In: Proceedings of the Fifth international workshop on object-oriented real-time dependable systems, WORDS\u201999, pp 11\u201318. IEEE Computer Society","DOI":"10.1109\/WORDSF.1999.842327"},{"key":"320_CR3","doi-asserted-by":"crossref","unstructured":"Havelund K, Rosu G (2001) Monitoring programs using rewriting. In: Proceedings of the 16th IEEE international conference on automated software engineering (ASE 2001), pp 135\u2013143. IEEE Computer Society","DOI":"10.1109\/ASE.2001.989799"},{"key":"320_CR4","unstructured":"Giannakopoulou D, Havelund K (2001) Automata-based verification of temporal properties on running programs. In: Proceedings of the 16th IEEE international conference on automated software engineering (ASE 2001), pp 412\u2013416. IEEE Computer Society"},{"key":"#cr-split#-320_CR5.1","doi-asserted-by":"crossref","unstructured":"Viswanathan M, Kim M (2004) Foundations for the run-time monitoring of reactive systems-fundamentals of the MaC language. In: Zhiming L, Keijiro A","DOI":"10.1007\/978-3-540-31862-0_38"},{"key":"#cr-split#-320_CR5.2","unstructured":"(ed) Revised selected papers from the first international colloquium on theoretical aspects of computing (ICTAC 2004), volume 3407 of LNCS. Springer, Berlin, pp 543-556"},{"key":"320_CR6","unstructured":"Havelund K, Goldberg A (2005) Verify your runs. In: Bertrand M, Jim W (eds) Revised selected papers and discussions from the first IFIP TC 2\/WG 2.3 conference on verified software: theories, tools, experiments, (VSTTE 2005), volume 4171 of LNCS. Springer, Berlin, pp 374\u2013383"},{"issue":"5","key":"320_CR7","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker M, Schallhart C (2009) A brief account of runtime verification. J Log Algebr Program 78(5):293\u2013303","journal-title":"J Log Algebr Program"},{"key":"320_CR8","doi-asserted-by":"crossref","unstructured":"Falcone Y (2010) You should better enforce than verify. In: Barringer et\u00a0al. [18], pp 89\u2013105","DOI":"10.1007\/978-3-642-16612-9_9"},{"key":"320_CR9","unstructured":"Falcone Y, Havelund K, Reger G (2013) A tutorial on runtime verification. In: Manfred B, Peled DS, Georg K (eds) Engineering dependable software systems, volume\u00a034 of NATO science for peace and security series, d: information and communication security . IOS Press, pp 141\u2013175"},{"key":"320_CR10","unstructured":"Falcone Y, Jean-Claude F, Mounier L (2014) On the expressiveness of some runtime validation techniques. In: Andrei V, Margarita VK (eds) HOWARD-60: a Festschrift on the occasion of Howard Barringer\u2019s 60th birthday, volume\u00a042 of EPiC series in computing. EasyChair, pp 112\u2013123"},{"key":"320_CR11","doi-asserted-by":"crossref","unstructured":"Bartocci E, Falcone Y, Francalanza A, Reger G. (2018) Introduction to runtime verification. In: Bartocci, Falcone [12], pp 1\u201333","DOI":"10.1007\/978-3-319-75632-5_1"},{"key":"320_CR12","doi-asserted-by":"crossref","unstructured":"Bartocci E, Falcone Y (eds) (2018) Lectures on runtime verification\u2014introductory and advanced topics, volume 10457 of LNCS. Springer","DOI":"10.1007\/978-3-319-75632-5"},{"key":"320_CR13","doi-asserted-by":"crossref","unstructured":"Bartocci E, Deshmukh JV, Donz\u00e9 A, Fainekos GE, Maler O, Dejan N, Sriram S (2018) Specification-based monitoring of cyber-physical systems: a survey on theory, tools and applications. In: Bartocci, Falcone [12], pp 135\u2013175","DOI":"10.1007\/978-3-319-75632-5_5"},{"key":"320_CR14","doi-asserted-by":"crossref","unstructured":"Falcone Y, Mariani L, Rollet A, Saha S. (2018) Runtime failure prevention and reaction. In: Bartocci, Falcone [12], pp 103\u2013134","DOI":"10.1007\/978-3-319-75632-5_4"},{"key":"320_CR15","doi-asserted-by":"crossref","unstructured":"Louren\u00e7o JM, Fiedor J, Krena B, Vojnar T (2018) Discovering concurrency errors. In: Bartocci, Falcone [12], pp 34\u201360","DOI":"10.1007\/978-3-319-75632-5_2"},{"key":"320_CR16","doi-asserted-by":"crossref","unstructured":"Francalanza A, P\u00e9rez JA, S\u00e1nchez C (2018) Runtime verification for decentralised and distributed systems. In: Bartocci, Falcone [12], pp 176\u2013210","DOI":"10.1007\/978-3-319-75632-5_6"},{"key":"320_CR17","doi-asserted-by":"crossref","unstructured":"Colombo C, Pace GJ (2018) Industrial experiences with runtime verification of financial transaction systems: lessons learnt and standing challenges. In: Bartocci, Falcone [12], pp 211\u2013232","DOI":"10.1007\/978-3-319-75632-5_7"},{"key":"320_CR18","doi-asserted-by":"crossref","unstructured":"Barringer H, Falcone Y, Finkbeiner B, Havelund K, Lee I, Pace GJ, Rosu G, Sokolsky O, Tillmann N (eds) (2010) Proceedings of the first international conference on runtime verification (RV 2010), volume 6418 of LNCS. Springer, Berlin","DOI":"10.1007\/978-3-642-16612-9"},{"key":"320_CR19","doi-asserted-by":"crossref","unstructured":"Bartocci E, Bonakdarpour B, Falcone Y (2014) First international competition on software for runtime verification. In: Borzoo B, Scott\u00a0AS (eds) Proceedings of the fifth international conference on runtime verification (RV 2014), volume 8734 of LNCS. Springer, Berlin, pp 1\u20139","DOI":"10.1007\/978-3-319-11164-3_1"},{"key":"320_CR20","unstructured":"Falcone Y, Nickovic D, Reger G, Thoma D (2015) Second international competition on runtime verification CRV 2015. In: Ezio B, Rupak M (eds) Proceedings of the 6th international conference on runtime verification (RV 2015), volume 9333 of LNCS. Springer, Berlin, pp 405\u2013422"},{"key":"320_CR21","unstructured":"Reger G, Hall\u00e9 S, Falcone Y (2016) Third international competition on runtime verification\u2014CRV 2016. In: Falcone, S\u00e1nchez [28], pp 21\u201337"},{"key":"320_CR22","unstructured":"Bartocci E, Falcone Y, Bonakdarpour B, Colombo C, Decker N, Havelund K, Joshi Y, Klaedtke F, Milewicz R, Reger G, Rosu G, Signoles J, Thoma D, Zalinescu E, Zhang Y (2017) First international competition on runtime verification: rules, benchmarks, tools, and final results of crv 2014. In: International journal on software tools for technology transfer, Apr 2017"},{"key":"320_CR23","doi-asserted-by":"crossref","unstructured":"Reger G (2017) A report of RV-CuBES 2017. In: Giles Reger and Klaus Havelund, editors, RV-CuBES 2017. An International Workshop on Competitions, Usability, Benchmarks, Evaluation, and Standardisation for Runtime Verification Tools, September 15, 2017, Seattle, WA, USA, volume\u00a03 of Kalpa Publications in Computing, pp 1\u20139. EasyChair","DOI":"10.29007\/2496"},{"key":"320_CR24","unstructured":"Colombo, Falcone Y (2016) First international summer school on runtime verification\u2014as part of the arvi COST action 1402. In: Falcone, S\u00e1nchez [28], pp 17\u201320"},{"key":"#cr-split#-320_CR25.1","doi-asserted-by":"crossref","unstructured":"Falcone Y, Zuck LD (2012) Runtime verification: The application perspective. In: Tiziana M, Bernhard S","DOI":"10.1007\/978-3-642-34026-0_21"},{"key":"#cr-split#-320_CR25.2","unstructured":"(ed) Proceedings of the 5th international symposium on leveraging applications of formal methods, verification and validation technologies for mastering change (ISoLA 2012), Part I, volume 7609 of LNCS. Springer, Berlin, pp 284-291"},{"issue":"2","key":"320_CR26","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10009-014-0360-z","volume":"17","author":"Y Falcone","year":"2015","unstructured":"Falcone Y, Zuck LD (2015) Runtime verification: the application perspective. STTT 17(2):121\u2013123","journal-title":"STTT"},{"key":"320_CR27","unstructured":"Bartocci E , Falcone Y (2016) Runtime verification and enforcement, the (industrial) application perspective (track introduction). In: Proceedings of the 7th international symposium on leveraging applications of formal methods, verification and validation: discussion, dissemination, applications (ISoLA 2016), Part II, volume 9953 of LNCS, pp 333\u2013338"},{"key":"320_CR28","doi-asserted-by":"crossref","unstructured":"Falcone Y, S\u00e1nchez C eds (2016) Proceedings of the 16th international conference on runtime verification (RV 2016), volume 10012 of LNCS. Springer","DOI":"10.1007\/978-3-319-46982-9"},{"key":"320_CR29","doi-asserted-by":"crossref","unstructured":"Goubault-Larrecq J, Lachance J-P (2017) On the complexity of monitoring orchids signatures, and recurrence equations. Formal methods in system design","DOI":"10.1007\/s10703-017-0303-x"},{"key":"320_CR30","doi-asserted-by":"crossref","unstructured":"Shi J, Lahiri SK, Chandra R, Challen G (2017) Wireless protocol validation under uncertainty. Formal methods in system design","DOI":"10.1007\/s10703-017-0309-4"},{"key":"320_CR31","doi-asserted-by":"crossref","unstructured":"Kauffman S, Havelund K, Joshi R, Fischmeister S (2018) Inferring event stream abstractions. Formal methods in system design","DOI":"10.1007\/s10703-018-0317-z"},{"key":"320_CR32","doi-asserted-by":"crossref","unstructured":"Jak\u0161i\u0107 S, Bartocci E, Grosu R, Nguyen R, Ni\u010dkovi\u0107 D (2018) Quantitative monitoring of STL with edit distance. Formal methods in system design","DOI":"10.1007\/s10703-018-0319-x"},{"key":"320_CR33","doi-asserted-by":"crossref","unstructured":"Moreno C, Fischmeister S (2017) Non-intrusive runtime monitoring through power consumption to enforce safety and security properties in embedded systems. Formal methods in system design","DOI":"10.1007\/s10703-017-0298-3"},{"key":"320_CR34","doi-asserted-by":"crossref","unstructured":"Rosu G (2018) Finite-trace linear temporal logic: Coinductive completeness. Formal methods in system design","DOI":"10.1007\/s10703-018-0321-3"}],"container-title":["Formal Methods in System Design"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10703-018-0320-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10703-018-0320-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10703-018-0320-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T07:13:44Z","timestamp":1751699624000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10703-018-0320-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,21]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["320"],"URL":"https:\/\/doi.org\/10.1007\/s10703-018-0320-4","relation":{},"ISSN":["0925-9856","1572-8102"],"issn-type":[{"type":"print","value":"0925-9856"},{"type":"electronic","value":"1572-8102"}],"subject":[],"published":{"date-parts":[[2018,6,21]]},"assertion":[{"value":"21 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}