{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:07:08Z","timestamp":1758845228547,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,13]],"date-time":"2010-04-13T00:00:00Z","timestamp":1271116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000199","name":"U.S. Department of Agriculture","doi-asserted-by":"publisher","award":["USDA FCIC\/RMA2IE08310228"],"award-info":[{"award-number":["USDA FCIC\/RMA2IE08310228"]}],"id":[{"id":"10.13039\/100000199","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CAREER Award CNS0746643"],"award-info":[{"award-number":["CAREER Award CNS0746643"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,13]]},"DOI":"10.1145\/1795194.1795202","type":"proceedings-article","created":{"date-parts":[[2010,5,25]],"date-time":"2010-05-25T13:08:24Z","timestamp":1274792904000},"page":"50-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["A concept lattice-based event model for Cyber-Physical Systems"],"prefix":"10.1145","author":[{"given":"Ying","family":"Tan","sequence":"first","affiliation":[{"name":"University of Nebraska-Lincoln, Lincoln, NE"}]},{"given":"Mehmet C.","family":"Vuran","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln, Lincoln, NE"}]},{"given":"Steve","family":"Goddard","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln, Lincoln, NE"}]},{"given":"Yue","family":"Yu","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL"}]},{"given":"Miao","family":"Song","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL"}]},{"given":"Shangping","family":"Ren","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology, Chicago, IL"}]}],"member":"320","published-online":{"date-parts":[[2010,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009800916313"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2005.07.009"},{"key":"e_1_3_2_1_3_1","first-page":"277","article-title":"Rule-Based Runtime Verification. 5th International Conference on Verification","volume":"2937","author":"Barringer H.","year":"2004","unstructured":"H. Barringer , A. Goldberg , K. Havelund , and K. Sen . Rule-Based Runtime Verification. 5th International Conference on Verification , Model Checking and Abstract Interpretation , 2937 : 277 -- 306 , 2004 . H. Barringer, A. Goldberg, K. Havelund, and K. Sen. Rule-Based Runtime Verification. 5th International Conference on Verification, Model Checking and Abstract Interpretation, 2937:277--306, 2004.","journal-title":"Model Checking and Abstract Interpretation"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/253262.253409"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/0824-7935.00079"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/645804.669675"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647939.738767"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1444455.1445982"},{"key":"e_1_3_2_1_9_1","first-page":"2","volume-title":"Detecting Composite Events in Active Database Systems Using Petri Nets. RIDS'94: Proceedings 4th International Workshop on Active Database Systems","author":"Gatziu S.","year":"1994","unstructured":"S. Gatziu and K. R. Dittrich . Detecting Composite Events in Active Database Systems Using Petri Nets. RIDS'94: Proceedings 4th International Workshop on Active Database Systems , pages 2 -- 9 , 1994 . S. Gatziu and K. R. Dittrich. Detecting Composite Events in Active Database Systems Using Petri Nets. RIDS'94: Proceedings 4th International Workshop on Active Database Systems, pages 2--9, 1994."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781133"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/645918.672484"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/645492.657226"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/EMRTS.1999.777457","volume-title":"Proc. of the 11th Euromicro Conference on Real-Time Systems","author":"Kim M.","year":"1999","unstructured":"M. Kim and M. V. Etc . Formally specified monitoring of temporal properties . Proc. of the 11th Euromicro Conference on Real-Time Systems , pages 114 -- 122 , 1999 . M. Kim and M. V. Etc. Formally specified monitoring of temporal properties. Proc. of the 11th Euromicro Conference on Real-Time Systems, pages 114--122, 1999."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:FORM.0000017719.43755.7c"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037383"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_3_2_1_18_1","volume-title":"First Workshop on Event-based Semantics","author":"Lee I.","year":"2007","unstructured":"I. Lee and O. Sokolsky . Semantics of high-level event definition . In First Workshop on Event-based Semantics , 2007 . I. Lee and O. Sokolsky. Semantics of high-level event definition. In First Workshop on Event-based Semantics, 2007."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958506"},{"key":"e_1_3_2_1_20_1","first-page":"21","volume-title":"Concept-Based Component Retrieval. In Working Notes of the IJCAI-95 Workshop: Formal Approaches to the Reuse of Plans, Proofs, and Programs","author":"Lindig C.","year":"1995","unstructured":"C. Lindig and A. Softwaretechnologie . Concept-Based Component Retrieval. In Working Notes of the IJCAI-95 Workshop: Formal Approaches to the Reuse of Plans, Proofs, and Programs , pages 21 -- 25 , 1995 . C. Lindig and A. Softwaretechnologie. Concept-Based Component Retrieval. In Working Notes of the IJCAI-95 Workshop: Formal Approaches to the Reuse of Plans, Proofs, and Programs, pages 21--25, 1995."},{"key":"e_1_3_2_1_21_1","first-page":"305","volume-title":"Proc. of the 1998 Int. Conf. on Machine Learning","author":"Liquiere M.","year":"1998","unstructured":"M. Liquiere and J. Sallantin . Structural machine learning with Galois lattice and Graphs . In Proc. of the 1998 Int. Conf. on Machine Learning , pages 305 -- 313 , 1998 . M. Liquiere and J. Sallantin. Structural machine learning with Galois lattice and Graphs. In Proc. of the 1998 Int. Conf. on Machine Learning, pages 305--313, 1998."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/66926.66946"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.105"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/827272.829131"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435443"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345917"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2007.4374530"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/227607.227613"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/288195.288273"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89437-7_6"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2009.82"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2137739.2137741"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01815-2_23"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.70807"}],"event":{"name":"ICCPS '10: ACM\/IEEE 1st International Conference on Cyber-Physical Systems","sponsor":["IEEE-CS\\TCRT TC on Real-Time Systems","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Stockholm Sweden","acronym":"ICCPS '10"},"container-title":["Proceedings of the 1st ACM\/IEEE International Conference on Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1795194.1795202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1795194.1795202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:22:53Z","timestamp":1750245773000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1795194.1795202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,13]]},"references-count":34,"alternative-id":["10.1145\/1795194.1795202","10.1145\/1795194"],"URL":"https:\/\/doi.org\/10.1145\/1795194.1795202","relation":{},"subject":[],"published":{"date-parts":[[2010,4,13]]},"assertion":[{"value":"2010-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}