{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:41:54Z","timestamp":1776444114226,"version":"3.51.2"},"reference-count":22,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icse.2004.1317464","type":"proceedings-article","created":{"date-parts":[[2004,9,28]],"date-time":"2004-09-28T13:50:22Z","timestamp":1096379422000},"page":"418-427","source":"Crossref","is-referenced-by-count":76,"title":["Efficient decentralized monitoring of safety in distributed systems"],"prefix":"10.1109","author":[{"given":"K.","family":"Sen","sequence":"first","affiliation":[]},{"given":"A.","family":"Vardhan","sequence":"additional","affiliation":[]},{"given":"G.","family":"Agha","sequence":"additional","affiliation":[]},{"given":"G.","family":"Rosu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","article-title":"Local knowledge assertions in a changing world","author":"ramanujam","year":"1996","journal-title":"Theoretical Aspects of Rationality and Knowledge (TARK'96)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.1997.614946"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/8.1.87"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(05)82524-1"},{"key":"15","first-page":"215","article-title":"Virtual time and global states of distributed systems","author":"mattern","year":"1989","journal-title":"Proceedings of the International Workshop on Parallel and Distributed Algorithms"},{"key":"16","first-page":"487","article-title":"Reasoning about message passing in finite state environments","volume":"1853","author":"meenakshi","year":"2000","journal-title":"International Colloquium on Automata Languages and Programming (ICALP'00) Volume 1853 of Lecture Notes in Computer Science"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0931-7"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4222-2"},{"key":"11","article-title":"Java-mac: A run-time assurance tool for java","volume":"55","author":"kim","year":"2001","journal-title":"Proceedings of Runtime Verification (RV'01) Volume 55 of Electronic Notes in Theoretical Computer Science"},{"key":"12","article-title":"Logics for mazurkiewicz traces","volume":"aib 2002 10","author":"leucker","year":"2002","journal-title":"Technical Report"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139168724"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1017\/S095679689700261X"},{"key":"20","article-title":"Runtime safety analysis of multithreaded programs","author":"sen","year":"2003","journal-title":"ACM SIGSOFT Conference on the Foundations of Software Engineering \/ European Software Engineering Conference (FSE \/ ESEC'03)"},{"key":"2","author":"agha","year":"1986","journal-title":"Actors A Model of Concurrent Computation"},{"key":"1","volume":"55 89","year":"2001","journal-title":"1st 2nd and 3rd CAV Workshops on Runtime Verification (RV'01 - RV'03) Volume 55(2) 70(4) 89(2) of Electronic Notes in Theoretical Computer Science"},{"key":"10","first-page":"342","article-title":"Synthesizing monitors for safety properties","volume":"2280","author":"havelund","year":"2002","journal-title":"Tools and Algorithms for Construction and Analysis of Systems (TACAS'02) Volume 2280 of Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5803.001.0001","author":"fagin","year":"1995","journal-title":"Reasoning About Knowledge"},{"key":"6","first-page":"44","article-title":"Rule-based runtime verification","volume":"2937","author":"barringer","year":"2004","journal-title":"Proceedings of 5th International Conference on Verification Model Checking and Abstract Interpretation (VMCAI'04) Volume 2937 of Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176343654"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.1995.523247"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1023\/B:FORM.0000017721.39909.4b"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/68210.69233"}],"event":{"name":"Proceedings. 26th International Conference on Software Engineering","location":"Edinburgh, UK","acronym":"ICSE-04"},"container-title":["Proceedings. 26th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9201\/29176\/01317464.pdf?arnumber=1317464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T19:17:25Z","timestamp":1734549445000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1317464\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icse.2004.1317464","relation":{},"subject":[]}}