{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T22:22:41Z","timestamp":1773526961245,"version":"3.50.1"},"reference-count":8,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2002,12,1]],"date-time":"2002-12-01T00:00:00Z","timestamp":1038700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2002,12,1]],"date-time":"2002-12-01T00:00:00Z","timestamp":1038700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":3893,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2002,12]]},"DOI":"10.1016\/s1571-0661(04)80578-4","type":"journal-article","created":{"date-parts":[[2004,9,29]],"date-time":"2004-09-29T12:47:47Z","timestamp":1096462067000},"page":"80-94","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":22,"title":["Computational Analysis of Run-time Monitoring"],"prefix":"10.1016","volume":"70","author":[{"given":"Moonjoo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Sampath","family":"Kannan","sequence":"additional","affiliation":[]},{"given":"Insup","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Oleg","family":"Sokolsky","sequence":"additional","affiliation":[]},{"given":"Mahesh","family":"Viswanathan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)80578-4_NEWBIB1","doi-asserted-by":"crossref","unstructured":"P. Br\u00e9mond-Gr\u00e9goire, I. Lee, and R. Gerber. ACSR: An Algebra of Communicating Shared Resources with Dense Time and Priorities. In Proc. of CONCUR '93, 1993","DOI":"10.1007\/3-540-57208-2_29"},{"key":"10.1016\/S1571-0661(04)80578-4_NEWBIB2","series-title":"Software - Practice and Experience","article-title":"Implementation of the Sentry System","author":"Chodrow","year":"1995"},{"key":"10.1016\/S1571-0661(04)80578-4_NEWBIB3","doi-asserted-by":"crossref","unstructured":"K. Havelund and G. Rosu. Synthesizing monitors for safety properties. In International Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS), 2002","DOI":"10.1007\/3-540-46002-0_24"},{"key":"10.1016\/S1571-0661(04)80578-4_NEWBIB4","doi-asserted-by":"crossref","unstructured":"M. Kim, S. Kannan, I. Lee, O. Sokolsky, and M. Viswanathan. Java-Mac: a run-time assurance tool for java programs. Runtime Verification Paris France, 2001","DOI":"10.1016\/S1571-0661(04)00254-3"},{"key":"10.1016\/S1571-0661(04)80578-4_NEWBIB5","unstructured":"Moonjoo Kim. Information Extraction for Run-time Formal Analysis. PhD thesis, Department of Computer and Information Science, University of Pennsylvania, 2001"},{"key":"10.1016\/S1571-0661(04)80578-4_NEWBIB6","series-title":"Communication and Concurrency","author":"Milner","year":"1989"},{"key":"10.1016\/S1571-0661(04)80578-4_NEWBIB7","doi-asserted-by":"crossref","unstructured":"T. Savor and R. E. Seviora. An approach to automatic detection of software failures in real-time systems. In IEEE Real-Time Technology and Applications Symposium, pages 136\u2013146, June 1997","DOI":"10.1109\/RTTAS.1997.601351"},{"key":"10.1016\/S1571-0661(04)80578-4_NEWBIB8","unstructured":"Mahesh Viswanathan. Foundations for the Run-time Analysis of Software Systems. PhD thesis, Department of Computer and Information Science, University of Pennsylvania, 2000"}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104805784?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104805784?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:06:19Z","timestamp":1761609979000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104805784"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,12]]},"references-count":8,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2002,12]]}},"alternative-id":["S1571066104805784"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)80578-4","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2002,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Computational Analysis of Run-time Monitoring","name":"articletitle","label":"Article Title"},{"value":"Electronic Notes in Theoretical Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/S1571-0661(04)80578-4","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"converted-article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2002 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}