{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T23:28:58Z","timestamp":1687130938372},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2011,7,1]],"date-time":"2011-07-01T00:00:00Z","timestamp":1309478400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann Math Artif Intell"],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1007\/s10472-011-9259-5","type":"journal-article","created":{"date-parts":[[2011,8,5]],"date-time":"2011-08-05T06:36:08Z","timestamp":1312526168000},"page":"161-186","source":"Crossref","is-referenced-by-count":1,"title":["Observation strategies for event detection with incidence on runtime verification: theory, algorithms, experimentation"],"prefix":"10.1007","volume":"62","author":[{"given":"Marco","family":"Alberti","sequence":"first","affiliation":[]},{"given":"Pierangelo","family":"Dell\u2019Acqua","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds Moniz","family":"Pereira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,6]]},"reference":[{"issue":"4","key":"9259_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1380572.1380578","volume":"9","author":"M Alberti","year":"2008","unstructured":"Alberti, M., Chesani, F., Gavanelli, M., Lamma, E., Mello, P., Torroni, P.: Verifiable agent interaction in abductive logic programming: the SCIFF framework. ACM Trans. Comput. Log. (TOCL) 9(4), 1\u201341 (2008)","journal-title":"ACM Trans. Comput. Log. (TOCL)"},{"issue":"4","key":"9259_CR2","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1017\/S1471068403001960","volume":"4","author":"JJ Alferes","year":"2004","unstructured":"Alferes, J.J., Pereira, L.M., Swift, T.: Abduction in well-founded semantics and generalized stable models via tabled dual programs. Theory Pract. Log. Program. 4(4), 383\u2013428 (2004)","journal-title":"Theory Pract. Log. Program."},{"issue":"2","key":"9259_CR3","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1145\/1150334.1150336","volume":"2","author":"N Alon","year":"2006","unstructured":"Alon, N., Moshkovitz, D., Safra, S.: Algorithmic construction of sets for k-restrictions. ACM Trans. Algorithms 2(2), 153\u2013177 (2006)","journal-title":"ACM Trans. Algorithms"},{"key":"9259_CR4","unstructured":"Anh, H.T., Pereira, L.M.: Collective intention recognition and elder care. In: Proactive Assistant Agents: Papers from the AAAI Fall Symposium (FS-10-07), pp. 26\u201331. AAAI (2010)"},{"key":"9259_CR5","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1093\/logcom\/exn075","volume":"20","author":"A Bauer","year":"2010","unstructured":"Bauer, A., Leucker, M., Schallhart, S.: Comparing LTL semantics for runtime verification. J. Log. Comput. 20, 651\u2013674 (2010)","journal-title":"J. Log. Comput."},{"key":"9259_CR6","doi-asserted-by":"crossref","unstructured":"Bauer, A., Leucker, M., Schallhart, S.: Runtime verification for LTL and TLTL. ACM Trans. Softw. Eng. Methodol. 20(4) (2011)","DOI":"10.1145\/2000799.2000800"},{"key":"9259_CR7","doi-asserted-by":"crossref","unstructured":"Bodden, E.: A lightweight LTL runtime verification tool for Java. In: Companion to the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2004, Vancouver, BC, Canada, 24\u201328 October 2004, pp. 306\u2013307. ACM, ACM Student Research Competition (2004)","DOI":"10.1145\/1028664.1028776"},{"key":"9259_CR8","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1145\/1017753.1017779","volume-title":"Proceedings of the 4th ACM International Conference on Embedded Software","author":"J Carlson","year":"2004","unstructured":"Carlson, J., Lisper, B.: An event detection algebra for reactive systems. In: Proceedings of the 4th ACM International Conference on Embedded Software, pp. 147\u2013154. ACM, New York, NY, USA (2004)"},{"key":"9259_CR9","volume-title":"AI*IA 2007: Artificial Intelligence and Human-Oriented Computing, 10th Congress of the Italian Association for Artificial Intelligence. LNCS, vol. 4733","author":"S Costantini","year":"2007","unstructured":"Costantini, S., Tocchio, A., Toni, F., Tsintza, P.: A multi-layered general agent model. In: AI*IA 2007: Artificial Intelligence and Human-Oriented Computing, 10th Congress of the Italian Association for Artificial Intelligence. LNCS, vol. 4733. Springer, Berlin (2007)"},{"key":"9259_CR10","unstructured":"Costantini, S., Dell\u2019Acqua, P., Pereira, L.M.: A multi-layer framework for evolving and learning agents. In: Raja, A., Cox, M.T. (eds.) Proceedings of Metareasoning: Thinking About Thinking Workshop at AAAI 2008, Chicago, USA (2008)"},{"key":"9259_CR11","unstructured":"Costantini, S., Dell\u2019Acqua, P., Pereira, L.M., Tsintza, P.: Runtime verification of agent properties. In: Proc. of the Int. Conf. on Applications of Declarative Programming and Knowledge Management (INAP09) (2009)"},{"key":"9259_CR12","unstructured":"Costantini, S., Dell\u2019Acqua, P., Pereira, L.M., Toni, F.: Learning and evolving agents in user monitoring and training. In: Atti del Congresso Nazionale AICA 2010, L\u2019Aquila, Italy (2010). Available at http:\/\/centria.di.fct.unl.pt\/~lmp\/publications\/slides\/aica10\/aica-2010.pdf"},{"key":"9259_CR13","unstructured":"Dell\u2019Acqua, P., Lombardi, A., Pereira, L.M.: Modelling adaptive controllers with evolving logic programs. In: Andrade-Cetto, J., Ferrier, J.-L., Pereira, J.D., Filipe, J. (eds.) ICINCO 2006, Set\u00fabal, Portugal. INSTICC Press (2006)"},{"issue":"4","key":"9259_CR14","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1016\/j.jal.2006.03.010","volume":"5","author":"P Dell\u2019Acqua","year":"2007","unstructured":"Dell\u2019Acqua, P., Pereira, L.M.: Preferential theory revision. J. Appl. Log. 5(4), 586\u2013601(2007)","journal-title":"J. Appl. Log."},{"issue":"1","key":"9259_CR15","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1111\/j.1467-8640.2007.00295.x","volume":"23","author":"M Fisher","year":"2007","unstructured":"Fisher, M., Bordini, R.H., Hirsch, B., Torroni, P.: Computational logics and agents: a road map of current technologies and future trends. Comput. Intell. J. 23(1), 61\u201391 (2007)","journal-title":"Comput. Intell. J."},{"key":"9259_CR16","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/978-3-540-69073-3_23","volume-title":"Models in Software Engineering","author":"HJ Goldsby","year":"2008","unstructured":"Goldsby, H.J., Cheng, B.H., Zhang, J.: Amoeba-rt: run-time verification of adaptive software. In: Giese, H. (ed.) Models in Software Engineering, pp. 212\u2013224. Springer, Berlin, Heidelberg (2008)"},{"key":"9259_CR17","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/312129.312190","volume-title":"KDD \u201999: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"V Guralnik","year":"1999","unstructured":"Guralnik, V., Srivastava, J.: Event detection from time series data. In: KDD \u201999: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 33\u201342. ACM, New York, NY, USA (1999)"},{"key":"9259_CR18","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/ICDE.1996.492095","volume-title":"Proceedings of the Twelfth International Conference on Data Engineering, ICDE \u201996","author":"K H\u00e4t\u00f6nen","year":"1996","unstructured":"H\u00e4t\u00f6nen, K., Klemettinen, M., Mannila, H., Ronkainen, P., Toivonen, H.: Knowledge discovery from telecommunication network alarm databases. In: Proceedings of the Twelfth International Conference on Data Engineering, ICDE \u201996, pp. 115\u2013122. IEEE Computer Society, Washington, DC, USA (1996)"},{"key":"9259_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1619258.1619260","volume-title":"DEBS \u201909: Proceedings of the Third ACM International Conference on Distributed Event-Based Systems","author":"A Hinze","year":"2009","unstructured":"Hinze, A., Sachs, K., Buchmann, A.: Event-based applications and enabling technologies. In: DEBS \u201909: Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, pp. 1\u201315. ACM, New York, NY, USA (2009)"},{"key":"9259_CR20","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1145\/1014052.1014124","volume-title":"Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201904","author":"VS Iyengar","year":"2004","unstructured":"Iyengar, V.S.: On detecting space-time clusters. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201904, pp. 587\u2013592. ACM, New York, NY, USA (2004)"},{"key":"9259_CR21","unstructured":"Jin, Y., Dai, J., Lu, C.T.: Spatial-temporal data mining in traffic incident detection. In: In Proc. SIAM DM 2006 Workshop on Spatial Data Mining (2006)"},{"issue":"6","key":"9259_CR22","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1093\/logcom\/2.6.719","volume":"2","author":"AC Kakas","year":"1993","unstructured":"Kakas, A.C., Kowalski, R.A., Toni, F.: Abductive logic programming. J. Log. Comput. 2(6), 719\u2013770 (1993)","journal-title":"J. Log. Comput."},{"issue":"4","key":"9259_CR23","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1071-5819(03)00011-9","volume":"58","author":"T Kanno","year":"2003","unstructured":"Kanno, T., Nakata, K., Furuta, K.: A method for team intention inference. Int. J. Hum.-Comput. Stud. 58(4), 393\u2013413 (2003)","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"9259_CR24","unstructured":"Kautz, H., Allen, J.F.: Generalized plan recognition. In: Proceedings of the Conference of the American Association of Artificial Intelligence (AAAI-86), pp. 32\u201338. AAAI (1986)"},{"key":"9259_CR25","unstructured":"de Kleer, J.: Diagnosing multiple persistent and intermittent faults. In: Boutilier, C. (ed.) IJCAI 2009, Proceedings of the 21st International Joint Conference on Artificial Intelligence, Pasadena, California, USA, 11\u201317 July 2009, pp. 733\u2013738 (2009)"},{"issue":"2\u20133","key":"9259_CR26","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1016\/0004-3702(92)90027-U","volume":"56","author":"J Kleer de","year":"1992","unstructured":"de Kleer, J., Mackworth, A.K., Reiter, R.: Characterizing diagnoses and systems. Artif. Intell. 56(2\u20133), 197\u2013222 (1992)","journal-title":"Artif. Intell."},{"issue":"5","key":"9259_CR27","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, S.: A brief account of runtime verification. J. Log. Algebra Program. 78(5), 293\u2013303 (2009)","journal-title":"J. Log. Algebra Program."},{"key":"9259_CR28","unstructured":"Lopes, G., Pereira, L.M.: Prospective programming with acorda. In: Empirically Successful Computerized Reasoning (ESCoR\u201906) Workshop at the 3rd International Joint Conference on Automated Reasoning (IJCAR\u201906), Seattle, USA (2006)"},{"key":"9259_CR29","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1023\/A:1009748302351","volume":"1","author":"H Mannila","year":"1997","unstructured":"Mannila, H., Toivonen, H., Verkamo, A.I.: Discovery of frequent episodes in event sequences. Data Min. Knowl. Dis. 1, 259\u2013289 (1997)","journal-title":"Data Min. Knowl. Dis."},{"key":"9259_CR30","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1145\/1081870.1081897","volume-title":"Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, KDD \u201905","author":"DB Neill","year":"2005","unstructured":"Neill, D.B., Moore, A.W., Sabhnani, M., Daniel, K.: Detection of emerging space-time clusters. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, KDD \u201905, pp. 218\u2013227. ACM, New York, NY, USA (2005)"},{"key":"9259_CR31","unstructured":"Padmanabhan, B., Tuzhilin, A.: Pattern discovery in temporal databases: a temporal logic approach. In: Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, pp. 351\u2013354 (1996)"},{"key":"9259_CR32","first-page":"243","volume":"7","author":"F Pereira","year":"1981","unstructured":"Pereira, F.: Extraposition grammars. Comput. Linguist. 7, 243\u2013256 (1981)","journal-title":"Comput. Linguist."},{"key":"9259_CR33","doi-asserted-by":"crossref","unstructured":"Pereira, L.M., Anh, H.T.: Intention recognition via causal bayes networks plus plan generation. In: Lopes, L.S., Lau, N., Mariano, P., Rocha, L. (eds.) 14th Portuguese Intl. Conf. on Artificial Intelligence. LNAI, vol. 5816, pp. 138\u2013149. Springer (2009)","DOI":"10.1007\/978-3-642-04686-5_12"},{"key":"9259_CR34","doi-asserted-by":"crossref","unstructured":"Pereira, L.M., Anh, H.T.: Intention recognition with evolution prospection and causal bayesian networks. In: Madureira, A., Ferreira, J., Vale, Z. (eds.) Computational Intelligence for Engineering Systems: Emergent Applications. Intelligent Systems, Control and Automation: Science and Engineering Book Series, vol. 46, pp. 1\u201333. Springer (2010). Select updated papers from Intl. Symp. on Computational Intelligence for Engineering Systems. http:\/\/www.amazon.ca\/Computational-Intelligence-Engineering-Systems-Applications\/dp\/940070092X","DOI":"10.1007\/978-94-007-0093-2_1"},{"key":"9259_CR35","first-page":"73","volume-title":"Progress in Artificial Intelligence, Procs. 13th Portuguese Intl.Conf. on Artificial Intelligence (EPIA\u201907). LNAI, vol. 4874","author":"LM Pereira","year":"2007","unstructured":"Pereira, L.M., Lopes, G.: Prospective logic agents. In: Neves, J.M., Santos, M.F., Machado, J.M. (eds.) Progress in Artificial Intelligence, Procs. 13th Portuguese Intl.Conf. on Artificial Intelligence (EPIA\u201907). LNAI, vol. 4874, pp. 73\u201386. Springer, Guimar\u00e3es (2007)"},{"key":"9259_CR36","unstructured":"Pereira, L.M., Ramli, C.D.P.K.: Modelling decision making with probabilistic causation. Intell. Decis. Technol. 4(2), 133\u2013148 (2010). http:\/\/centria.di.fct.unl.pt\/~lmp\/publications\/online-papers\/IDT-Probabilistic-Causation.pdf"},{"key":"9259_CR37","unstructured":"Pereira, L.M., Dell\u2019Acqua, P., Lopes, G.: On preferring and inspecting abductive models. In: Gill, A, Swift, T. (eds.) Practical Aspects of Declarative Languages, 11th International Symposium, PADL 2009, Savannah, GA, USA, 19\u201320 January 2009. Proceedings. Lecture Notes in Computer Science, vol. 5418, pp. 1\u201315. Springer (2009)"},{"key":"9259_CR38","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logics of programs. In: Proceedings of the 18th Symposium on the Foundations of Computer Science, pp. 46\u201357 (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"9259_CR39","first-page":"125","volume-title":"Proceedings of the 19th International Conference on Advanced Information Networking and Applications. AINA \u201905, vol. 1","author":"S Sheu","year":"2005","unstructured":"Sheu, S., Cheng, C.-Y., Chang, A.: Fast pattern detection in stream data. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications. AINA \u201905, vol. 1, pp. 125\u2013130. IEEE Computer Society, Washington, DC, USA (2005)"},{"key":"9259_CR40","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1145\/237814.237991","volume-title":"STOC \u201996: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing","author":"P Slav\u00edk","year":"1996","unstructured":"Slav\u00edk, P.: A tight analysis of the greedy algorithm for set cover. In: STOC \u201996: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 435\u2013441. ACM, New York, NY, USA (1996)"},{"issue":"2","key":"9259_CR41","first-page":"85","volume":"6","author":"M Wu","year":"2001","unstructured":"Wu, M., Adeli, H.: Wavelet-neural network model for automatic traffic incident detection. Math. Comput. Appl. 6(2), 85\u201396 (2001)","journal-title":"Math. Comput. Appl."}],"container-title":["Annals of Mathematics and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10472-011-9259-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10472-011-9259-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10472-011-9259-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T20:14:20Z","timestamp":1560456860000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10472-011-9259-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":41,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2011,7]]}},"alternative-id":["9259"],"URL":"https:\/\/doi.org\/10.1007\/s10472-011-9259-5","relation":{},"ISSN":["1012-2443","1573-7470"],"issn-type":[{"value":"1012-2443","type":"print"},{"value":"1573-7470","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7]]}}}