{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:25:21Z","timestamp":1761611121724},"reference-count":17,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2001,10,1]],"date-time":"2001-10-01T00:00:00Z","timestamp":1001894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2014,11,20]],"date-time":"2014-11-20T00:00:00Z","timestamp":1416441600000},"content-version":"vor","delay-in-days":4798,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2001,10]]},"DOI":"10.1016\/s1571-0661(04)00254-3","type":"journal-article","created":{"date-parts":[[2004,1,29]],"date-time":"2004-01-29T10:14:39Z","timestamp":1075371279000},"page":"218-235","source":"Crossref","is-referenced-by-count":64,"title":["Java-MaC"],"prefix":"10.1016","volume":"55","author":[{"given":"M.","family":"Kim","sequence":"first","affiliation":[]},{"given":"S.","family":"Kannan","sequence":"additional","affiliation":[]},{"given":"I.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"O.","family":"Sokolsky","sequence":"additional","affiliation":[]},{"given":"M.","family":"Viswanathan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB1","unstructured":"Time rover home page, 1997. http:\/\/www.time-rover.com\/."},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB2","unstructured":"D. Bartetzko, C. Fischer, M. Moller, and H. Wehrheim. Jass- Java with Assertions. First Workshop on Runtime Verification, July 2001."},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB3","article-title":"Verisim: Formal analysis of network simulations","author":"Bhargavan","year":"2001","journal-title":"IEEE Transaction on Software Engineering"},{"issue":"4","key":"10.1016\/S1571-0661(04)00254-3_NEWBIB4","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1145\/242223.242257","article-title":"Formal methods: State of the art and future directions","volume":"28","author":"Edmund Clarke","year":"1996","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB5","doi-asserted-by":"crossref","unstructured":"J. Corbett, M. Dwyer, J. Hatcliff, S. Laubach, C. P\u0103sareanu, Robby, and H. Zheng. Bandera: Extracting finite-state models from java source code. In Proc. of the 22nd Int. Conf. on Software Engineering, June 2000.","DOI":"10.1145\/337180.337234"},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB6","doi-asserted-by":"crossref","unstructured":"D. Gordon, W. Spears, O. Sokolsky, and I. Lee. Distributed spatial control and global monitoring of mobile agents. In IEEE Int. Conf. on Information, Intelligence, and Systems, Nov 1999.","DOI":"10.1109\/ICIIS.1999.810365"},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB7","doi-asserted-by":"crossref","unstructured":"F. Jahanian and A. Goyal. A formalism for monitoring real-time constraints at run-time. 20th Int. Symp. on Fault-Tolerant Computing Systems (FTCS\u201320), pages 148\u201355, 1990.","DOI":"10.1109\/FTCS.1990.89350"},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB8","doi-asserted-by":"crossref","DOI":"10.1145\/277631.277644","article-title":"A lightweight architecture for program execution monitoring","author":"Jeffery","year":"1998","journal-title":"Program Analysis for Software Tools and Engineering"},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB9","unstructured":"M. Kim, M. Viswanathan, H. Ben-Abdallah, S. Kannan, I. Lee, and O. Sokolsky. Formally specified monitoring of temporal properties. In European Conf. on Real-Time Systems, 1999."},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB10","unstructured":"Moonjoo Kim. Information Extraction for Run-time Formal Analysis. PhD thesis, CIS Dept. Univ. of Pennsylvania, 2001. In preparation."},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB11","unstructured":"I. Lee, S. Kannan, M. Kim, O. Sokolsky, and M. Viswanathan. Runtime assurance based on formal specifications. In Proc. of the Int. Conf. on Parallel and Distributed Processing Techniques and Applications, 1999."},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB12","unstructured":"G. Liu, A. K. Mok, and P. C. Konana. A unified approach for specifying timing constraints and composite events in active real-time database systems. In RTAS, June 1998."},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB13","doi-asserted-by":"crossref","unstructured":"Guangtian Liu and Aloysius K. Mok. Implementation of jem - a java composite event package. In RTAS, 1999.","DOI":"10.1109\/RTTAS.1999.777662"},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB14","series-title":"The Temporal Logic of Reactive and Concurrent Systems","author":"Manna","year":"1992"},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB15","doi-asserted-by":"crossref","unstructured":"Aloysius K. Mok and Guangtian Liu. Early detection of timing constraint violation at runtime. In RTSS, Dec 1997.","DOI":"10.1109\/REAL.1997.641280"},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB16","unstructured":"President's Information Technology Advisory Commitee. Information Technology Research: Investing in Our Future, 1999. http:\/\/www.ccic.gov\/."},{"key":"10.1016\/S1571-0661(04)00254-3_NEWBIB17","doi-asserted-by":"crossref","unstructured":"W. Visser, K. Havelund, G. Brat, and S. Park. Model checking programs. In Int. Conf. on Automated Software Engineering, September 2000.","DOI":"10.1109\/ASE.2000.873645"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104002543?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104002543?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T20:11:53Z","timestamp":1682626313000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104002543"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,10]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2001,10]]}},"alternative-id":["S1571066104002543"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)00254-3","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2001,10]]}}}