{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:21:15Z","timestamp":1760170875632},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/tii.2014.2307531","type":"journal-article","created":{"date-parts":[[2014,2,20]],"date-time":"2014-02-20T19:02:36Z","timestamp":1392922956000},"page":"1670-1683","source":"Crossref","is-referenced-by-count":7,"title":["FTL-CFree: A Fuzzy Real-Time Language for Runtime Verification"],"prefix":"10.1109","volume":"10","author":[{"given":"Joaquin","family":"Perez","sequence":"first","affiliation":[]},{"given":"Jaime","family":"Jimenez","sequence":"additional","affiliation":[]},{"given":"Asier","family":"Rabanal","sequence":"additional","affiliation":[]},{"given":"Armando","family":"Astarloa","sequence":"additional","affiliation":[]},{"given":"Jesus","family":"Lazaro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2103401"},{"key":"ref32","author":"massart","year":"2006","journal-title":"Efficient Online Monitoring of LTL Properties for Asynchronous Distributed Systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.45"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)00252-X"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2166777"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2010.2060732"},{"key":"ref10","author":"katoen","year":"2003","journal-title":"Principles of Model Checking"},{"key":"ref11","year":"0","journal-title":"Sisteplant homepage"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/32.988496"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"ref14","first-page":"580","article-title":"The Regular real-time languages","author":"henzinger","year":"1998","journal-title":"Proc 25th Int Colloq Automata Languages Program (ICALP) Lect Notes in Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2009.10.004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/227595.227602"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/32.910858"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511607202"},{"key":"ref19","first-page":"277","article-title":"Rule-based runtime verification","volume":"55","author":"barringer","year":"2004","journal-title":"Proc 5th Int Conf Verif Model Checking Abstract Interp (VMCAI?04)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.01.029"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2258165"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)00250-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2013.6622936"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2008.08.004"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2013.06.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2186585"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exn078"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-003-0107-8"},{"key":"ref2","author":"fujita","year":"2008","journal-title":"Verification Techniques for System-Level Design"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.91"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75292-9_32"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2000799.2000800"},{"key":"ref22","article-title":"Fuzzy time in LTL","author":"frigeri","year":"0","journal-title":"Logic Comput Sci"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2000.889888"},{"key":"ref24","first-page":"881","article-title":"LTL goal specifications revisited","volume":"215","author":"bauer","year":"2010","journal-title":"Proc Eur Conf Artif Intell"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.106"},{"key":"ref26","first-page":"1775","article-title":"A technique of automatic monitor generation based on FSM","author":"duoli","year":"2008","journal-title":"Proc IEEE Asia Pacific Conf Circuits Syst"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2001.989841"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/6866288\/06746228.pdf?arnumber=6746228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:20:57Z","timestamp":1642004457000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6746228\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":35,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tii.2014.2307531","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8]]}}}