{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T05:00:57Z","timestamp":1761541257667,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319195834"},{"type":"electronic","value":"9783319195841"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19584-1_5","type":"book-chapter","created":{"date-parts":[[2015,6,10]],"date-time":"2015-06-10T15:56:31Z","timestamp":1433951791000},"page":"66-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Novel Run-Time Monitoring Architecture for Safe and Efficient Inline Monitoring"],"prefix":"10.1007","author":[{"given":"Geoffrey","family":"Nelissen","sequence":"first","affiliation":[]},{"given":"David","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds Miguel","family":"Pinho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,9]]},"reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-24622-0_5","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"H Barringer","year":"2004","unstructured":"Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-Based Runtime Verification. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 44\u201357. Springer, Heidelberg (2004)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-04694-0_1","volume-title":"Runtime Verification","author":"H Barringer","year":"2009","unstructured":"Barringer, H., Havelund, K., Rydeheard, D., Groce, A.: Rule Systems for Runtime Verification: A Short Tutorial. In: Bensalem, S., Peled, D.A. (eds.) RV 2009. LNCS, vol. 5779, pp. 1\u201324. Springer, Heidelberg (2009)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Bauer, A., Leucker, M., Schallhart, C.: Runtime verification for ltl and tltl. ACM Trans. Softw. Eng. Methodol. 20(4), 14:1\u201314:64 (2011)","DOI":"10.1145\/2000799.2000800"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Chen, F., Ro\u015fu, G.: Mop: An efficient and generic runtime verification framework. In: Proceedings of the 22Nd Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems and Applications, OOPSLA, pp. 569\u2013588. ACM, New York (2007)","DOI":"10.1145\/1297027.1297069"},{"issue":"5","key":"5_CR5","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/503271.503223","volume":"26","author":"Y Coady","year":"2001","unstructured":"Coady, Y., Kiczales, G., Feeley, M., Smolyn, G.: Using aspectc to improve the modularity of path-specific customization in operating system code. SIGSOFT Softw. Eng. Notes 26(5), 88\u201398 (2001)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"issue":"4","key":"5_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1082983.1083249","volume":"30","author":"M d\u2019Amorim","year":"2005","unstructured":"d\u2019Amorim, M., Havelund, K.: Event-based runtime verification of java programs. SIGSOFT Softw. Eng. Notes 30(4), 1\u20137 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"issue":"12","key":"5_CR7","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1109\/TSE.2004.91","volume":"30","author":"N Delgado","year":"2004","unstructured":"Delgado, N., Gates, A.Q., Roach, S.: A taxonomy and catalog of runtime software-fault monitoring tools. IEEE Trans. Softw. Eng. 30(12), 859\u2013872 (2004)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Drusinsky, D.: The temporal rover and the atg rover. In: Havelund, K., Penix, J., Visser, W. (eds.) SPIN 2000. LNCS, vol. 1885, pp. 323\u2013330. Springer, Heidelberg (2000)","DOI":"10.1007\/10722468_19"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-3-540-68524-1_3","volume-title":"Testing of Software and Communicating Systems","author":"K Havelund","year":"2008","unstructured":"Havelund, K.: Runtime Verification of C Programs. In: Suzuki, K., Higashino, T., Ulrich, A., Hasegawa, T. (eds.) TestCom\/FATES 2008. LNCS, vol. 5047, pp. 7\u201322. Springer, Heidelberg (2008)"},{"issue":"2","key":"5_CR10","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1023\/B:FORM.0000017721.39909.4b","volume":"24","author":"K Havelund","year":"2004","unstructured":"Havelund, K., Ro\u015fu, G.: An overview of the runtime verification tool java pathexplorer. Form. Methods Syst. Des. 24(2), 189\u2013215 (2004)","journal-title":"Form. Methods Syst. Des."},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-46002-0_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"K Havelund","year":"2002","unstructured":"Havelund, K., Ro\u015fu, G.: Synthesizing Monitors for Safety Properties. In: Katoen, J.-P., Stevens, P. (eds.) TACAS 2002. LNCS, vol. 2280, pp. 342\u2013356. Springer, Heidelberg (2002)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Kiczales, G.: Aspect-oriented programming. ACM Comput. Surv. 28(4es) (1996)","DOI":"10.1145\/242224.242420"},{"issue":"2","key":"5_CR13","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1023\/B:FORM.0000017719.43755.7c","volume":"24","author":"M Kim","year":"2004","unstructured":"Kim, M., Viswanathan, M., Kannan, S., Lee, I., Sokolsky, O.: Java-mac: A run-time assurance approach for java programs. Form. Methods Syst. Des. 24(2), 129\u2013155 (2004)","journal-title":"Form. Methods Syst. Des."},{"key":"5_CR14","unstructured":"Kiselev, I.: Aspect-Oriented Programming with Aspect J. Sams, Indianapolis, IN, USA (2002)"},{"issue":"3","key":"5_CR15","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/s11704-013-2195-2","volume":"7","author":"S Konur","year":"2013","unstructured":"Konur, S.: A survey on temporal logics for specifying and verifying real-time systems. Front. Comput. Sci. 7(3), 370\u2013403 (2013)","journal-title":"Front. Comput. Sci."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. The Journal of Logic and Algebraic Programming 78(5), 293\u2013303 (2009), the 1st Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS 2007)","DOI":"10.1016\/j.jlap.2008.08.004"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-642-16612-9_12","volume-title":"Runtime Verification","author":"P Meredith","year":"2010","unstructured":"Meredith, P., Ro\u015fu, G.: Runtime Verification with the RV System. In: Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Ro\u015fu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. LNCS, vol. 6418, pp. 136\u2013152. Springer, Heidelberg (2010)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Sen, K.: Generating optimal monitors for extended regular expressions. In: Proc. of the 3rd Workshop on Runtime Verification (RV 2003). ENTCS, vol. 89 . pp. 162\u2013181. Elsevier Science (2003)","DOI":"10.1016\/S1571-0661(04)81051-X"},{"issue":"5","key":"5_CR19","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1145\/949952.940116","volume":"28","author":"K Sen","year":"2003","unstructured":"Sen, K., Rosu, G., Agha, G.: Runtime safety analysis of multithreaded programs. SIGSOFT Softw. Eng. Notes 28(5), 337\u2013346 (2003)","journal-title":"SIGSOFT Softw. Eng. Notes"}],"container-title":["Lecture Notes in Computer Science","Reliable Software Technologies \u2013 Ada-Europe 2015"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19584-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T02:00:54Z","timestamp":1676944854000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19584-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319195834","9783319195841"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19584-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}