{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:41:32Z","timestamp":1729633292455,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/ijcnn.2014.6889961","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T10:30:33Z","timestamp":1410345033000},"page":"2637-2644","source":"Crossref","is-referenced-by-count":2,"title":["Neural Networks for Runtime Verification"],"prefix":"10.1109","author":[{"given":"Alan","family":"Perotti","sequence":"first","affiliation":[]},{"given":"Artur","family":"d'Avila Garcez","sequence":"additional","affiliation":[]},{"given":"Guido","family":"Boella","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"An Introduction to Multiagent Systems","year":"2009","author":"wooldridge","key":"19"},{"key":"17","first-page":"169","article-title":"Process mining manifesto","author":"van der aalst","year":"2011","journal-title":"Business Process Management Workshops (1)"},{"journal-title":"Deontic Logic in Computer Science Normative System Specification","year":"1993","author":"meyer","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exn076"},{"journal-title":"RuleRunner Technical Report","year":"2013","author":"perotti","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008328630915"},{"key":"14","first-page":"68","article-title":"Towards a new massively parallel computational model for logic programming","author":"hoelldobler","year":"1994","journal-title":"ECAI94 Workshop on Combining Symbolic and Connectioninst Processing"},{"key":"11","first-page":"27","article-title":"Reasoning with temporal logic on truncated paths","author":"eisner","year":"2003","journal-title":"CAV'03"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(94)90105-8"},{"key":"21","first-page":"607","article-title":"Drake: An efficient executive for temporal plans with choice","volume":"42","author":"conrad","year":"2011","journal-title":"J Artif Intell Res (JAIR)"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.18564\/jasss.1750","article-title":"The current state of normative agent-based systems","volume":"14","author":"hollander","year":"2011","journal-title":"J Artificial Societies and Social Simulation"},{"key":"22","article-title":"Partial satisfaction (over-subscription) planning as heuristic search","author":"do","year":"2004","journal-title":"Proceedings of KBCS-04"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1082473.1082761"},{"key":"24","first-page":"1331","article-title":"Cooperation among malicious agents: A general quantitative congestion game framework","author":"rui","year":"2012","journal-title":"Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 3 Ser AAMAS'12"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1068\/b35051"},{"key":"3","article-title":"Building high-level features using large scale unsupervised learning","author":"le","year":"2012","journal-title":"ICML"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"10","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/11944836_25","article-title":"Monitoring of real-time properties","volume":"4337","author":"bauer","year":"2006","journal-title":"FSTTCS Ser Lecture Notes in Computer Science"},{"journal-title":"Understanding Big Data Analytics for Enterprise Class Hadoop and Streaming Data","year":"2011","author":"zikopoulos","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2008.08.004"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2008.08.004"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"4","first-page":"1337","article-title":"Deep learning with cots hpc systems","author":"coates","year":"2013","journal-title":"ICML (3)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77395-5_11"},{"key":"8","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1007\/3-540-15648-8_16","article-title":"The glory of the past","volume":"193","author":"lichtenstein","year":"1985","journal-title":"Logics of Programs Lecture Notes in Computer Science"}],"event":{"name":"2014 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2014,7,6]]},"location":"Beijing, China","end":{"date-parts":[[2014,7,11]]}},"container-title":["2014 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6880678\/6889358\/06889961.pdf?arnumber=6889961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T17:26:40Z","timestamp":1565803600000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6889961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2014.6889961","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}