{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:26:58Z","timestamp":1725888418194},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319605876"},{"type":"electronic","value":"9783319605883"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60588-3_4","type":"book-chapter","created":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T12:35:27Z","timestamp":1496061327000},"page":"53-69","source":"Crossref","is-referenced-by-count":0,"title":["Enforcing Timeliness and Safety in Mission-Critical Systems"],"prefix":"10.1007","author":[{"given":"Ant\u00f3nio","family":"Casimiro","sequence":"first","affiliation":[]},{"given":"In\u00eas","family":"Gouveia","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Rufino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,30]]},"reference":[{"key":"4_CR1","unstructured":"Aeroflex Gaisler, A.B., Goteborg, Sweden: GRLIB IP Library User\u2019s Manual, April 2014"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/3-540-57318-6_37","volume-title":"Hybrid Systems","author":"PJ Antsaklis","year":"1993","unstructured":"Antsaklis, P.J., Stiver, J.A., Lemmon, M.: Hybrid system modeling and autonomous control systems. In: Grossman, R.L., Nerode, A., Ravn, A.P., Rischel, H. (eds.) HS 1991\u20131992. LNCS, vol. 736, pp. 366\u2013392. Springer, Heidelberg (1993). doi:\n10.1007\/3-540-57318-6_37"},{"key":"4_CR3","unstructured":"ARM: ARM CoreSight Architecture Specification, 2.0 edn., September 2013"},{"issue":"2","key":"4_CR4","first-page":"18","volume":"18","author":"R Backasch","year":"2013","unstructured":"Backasch, R., Hochberger, C., Weiss, A., Leucker, M., Lasslop, R.: Runtime verification for multicore SoC with high-quality trace data. ACM Trans. Design Autom. Electron. Syst. (TODAES) 18(2), 18 (2013)","journal-title":"ACM Trans. Design Autom. Electron. Syst. (TODAES)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Callow, G., Watson, G., Kalawsky, R.: System modelling for run-time verification and validation of autonomous systems. In: Proceeding of 5th International Conference on System of Systems Engineering, Loughborough, UK, pp. 1\u20137, June 2010","DOI":"10.1109\/SYSOSE.2010.5544117"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Casimiro, A., Kaiser, J., Schiller, E.M., Costa, P., Parizi, J., Johansson, R., Librino, R.: The KARYON project: predictable and safe coordination in cooperative vehicular systems. In: Proceeding of 43rd Annual IEEE\/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), pp. 1\u201312. IEEE (2013)","DOI":"10.1109\/DSNW.2013.6615530"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Casimiro, A., Rufino, J., Pinto, R.C., Vial, E., Schiller, E.M., Morales-Ponce, O., Petig, T.: A kernel-based architecture for safe cooperative vehicular functions. In: Proceeding of 9th IEEE International Symposium on Industrial Embedded Systems (SIES), pp. 228\u2013237, June 2014","DOI":"10.1109\/SIES.2014.6871208"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/3-540-36080-8_21","volume-title":"Dependable Computing EDCC-4","author":"M Correia","year":"2002","unstructured":"Correia, M., Ver\u00edssimo, P., Neves, N.F.: The design of a COTS real-time distributed security kernel. In: Bondavalli, A., Thevenod-Fosse, P. (eds.) EDCC 2002. LNCS, vol. 2485, pp. 234\u2013252. Springer, Heidelberg (2002). doi:\n10.1007\/3-540-36080-8_21"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Cotard, S., Faucou, S., Bechennec, J.L., Queudet, A., Trinquet, Y.: A data flow monitoring service based on runtime verification for AUTOSAR. In: Proceeding of 14th International Conference on High Performance Computing and Communications. IEEE, Liverpool, UK, June 2012","DOI":"10.1109\/HPCC.2012.220"},{"key":"4_CR10","unstructured":"IEC Standards: IEC 60027-2: Letter symbols to be used in electrical technology Part 2: telecommunications and electronics, August 2005"},{"key":"4_CR11","unstructured":"Kane, A.: Runtime monitoring for safety-critical embedded systems. Ph.D. thesis, Carnegie Mellon University, USA, February 2015"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Kane, A., Chowdhury, O., Datta, A., Koopman, P.: A case study on runtime monitoring of an autonomous research vehicle (ARV) system. In: Proceeding of 15th International Conference on Runtime Verification, Vienna, Austria, pp. 102\u2013117, September 2015","DOI":"10.1007\/978-3-319-23820-3_7"},{"key":"4_CR13","first-page":"42","volume":"20","author":"JC Lee","year":"2015","unstructured":"Lee, J.C., Lysecky, R.: System-level observation framework for non-intrusive runtime monitoring of embedded systems. ACM Trans. Design Autom. Electron. Syst. 20, 42 (2015)","journal-title":"ACM Trans. Design Autom. Electron. Syst."},{"key":"4_CR14","unstructured":"Obermaisser, R., Kopetz, H.: Genesys: A candidate for an ARTEMIS cross-domain reference architecture for embedded systems, September 2009"},{"key":"4_CR15","unstructured":"On-Line Applications Research Corporation: RTEMS C User\u2019s Guide, 4.9.4 edn. (2010)"},{"key":"4_CR16","unstructured":"Pinto, R.C., Rufino, J.: Towards non-invasive run-time verification of real-time systems. In: Proceeding of 26th Euromicro Conference on Real-Time Systems - WIP Session, Madrid, Spain, pp. 25\u201328, July 2014"},{"issue":"3","key":"4_CR17","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1007\/s10703-013-0199-z","volume":"24","author":"T Reinbacher","year":"2014","unstructured":"Reinbacher, T., Fugger, M., Brauer, J.: Runtime verification of embedded real-time systems. Formal Methods Syst. Design 24(3), 203\u2013239 (2014)","journal-title":"Formal Methods Syst. Design"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-642-54862-8_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"T Reinbacher","year":"2014","unstructured":"Reinbacher, T., Rozier, K.Y., Schumann, J.: Temporal-logic based runtime observer pairs for system health management of real-time systems. In: \u00c1brah\u00e1m, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 357\u2013372. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-642-54862-8_24"},{"key":"4_CR19","unstructured":"Rufino, J., Gouveia, I.: Timeliness runtime verification and adaptation in avionic systems. In: Proceeding of 12th workshop on Operating Systems Platforms for Embedded Real-Time applications (OSPERT), Toulouse, France, July 2016"},{"issue":"1","key":"4_CR20","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/2907972.2907981","volume":"13","author":"J Rufino","year":"2016","unstructured":"Rufino, J.: Towards integration of adaptability and non-intrusive runtime verification in avionic systems. SIGBED Rev. 13(1), 60\u201365 (2016). (Special Issue on 5th Embedded Operating Systems Workshop)","journal-title":"SIGBED Rev."},{"issue":"4","key":"4_CR21","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MS.2001.936213","volume":"18","author":"L Sha","year":"2001","unstructured":"Sha, L.: Using simplicity to control complexity. IEEE Software 18(4), 20\u201328 (2001)","journal-title":"IEEE Software"},{"key":"4_CR22","volume-title":"Raspberry Pi User Guide","author":"E Upton","year":"2012","unstructured":"Upton, E., Halfacree, G.: Raspberry Pi User Guide. Wiley, New York (2012)"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/3-540-37795-6_20","volume-title":"Future Directions in Distributed Computing","author":"P Ver\u00edssimo","year":"2003","unstructured":"Ver\u00edssimo, P.: Uncertainty and predictability: can they be reconciled? In: Schiper, A., Shvartsman, A.A., Weatherspoon, H., Zhao, B.Y. (eds.) Future Directions in DC 2002. LNCS, vol. 2584, pp. 108\u2013113. Springer, Heidelberg (2003). doi:\n10.1007\/3-540-37795-6_20"},{"issue":"1","key":"4_CR24","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/1122480.1122497","volume":"37","author":"P Verissimo","year":"2006","unstructured":"Verissimo, P.: Travelling through wormholes: a new look at distributed systems models. SIGACT News 37(1), 66\u201381 (2006)","journal-title":"SIGACT News"},{"issue":"8","key":"4_CR25","doi-asserted-by":"crossref","first-page":"916","DOI":"10.1109\/TC.2002.1024739","volume":"51","author":"P Verissimo","year":"2002","unstructured":"Verissimo, P., Casimiro, A.: The timely computing base model and architecture. IEEE Trans. Comput. 51(8), 916\u2013930 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-10557-4_5","volume-title":"Computer Safety, Reliability, and Security","author":"E Vial","year":"2014","unstructured":"Vial, E., Casimiro, A.: Evaluation of safety rules in a safety kernel-based architecture. In: Bondavalli, A., Ceccarelli, A., Ortmeier, F. (eds.) SAFECOMP 2014. LNCS, vol. 8696, pp. 27\u201335. Springer, Cham (2014). doi:\n10.1007\/978-3-319-10557-4_5"},{"issue":"5","key":"4_CR27","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1049\/iet-sen:20060076","volume":"1","author":"C Watterson","year":"2007","unstructured":"Watterson, C., Heffernan, D.: Runtime verification and monitoring of embedded systems. IET Software 1(5), 172\u2013179 (2007)","journal-title":"IET Software"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Zheng, X., Julien, C., Podorozhny, R., Cassez, F.: BraceAssertion: runtime verification of cyber-physical systems. In: Proceeding of 15th IEEE Real-Time and Embedded Technology and Applications Symposium, pp. 298\u2013306, October 2015","DOI":"10.1109\/MASS.2015.15"}],"container-title":["Lecture Notes in Computer Science","Reliable Software Technologies \u2013 Ada-Europe 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60588-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,29]],"date-time":"2017-05-29T12:36:27Z","timestamp":1496061387000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60588-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319605876","9783319605883"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60588-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}