{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:05:02Z","timestamp":1755907502241,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T00:00:00Z","timestamp":1581984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,18]]},"DOI":"10.1145\/3384544.3384609","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T03:58:24Z","timestamp":1588564704000},"page":"313-320","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Stream-Monitoring Automata"],"prefix":"10.1145","author":[{"given":"Hernan","family":"Palombo","sequence":"first","affiliation":[{"name":"University of South Florida"}]},{"given":"Egor","family":"Dolzhenko","sequence":"additional","affiliation":[{"name":"Illumina"}]},{"given":"Jay","family":"Ligatti","sequence":"additional","affiliation":[{"name":"University of South Florida"}]},{"given":"Hao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of South Florida"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"volume-title":"Share. Industry Report","year":"2018","key":"e_1_3_2_1_1_1","unstructured":"2018. Serverless Architecture Market Size, Share. Industry Report, 2018--2025. https:\/\/www.grandviewresearch.com\/industry-analysis\/serverless-architecture-market."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Serverless. The Serverless Application Framework powered by AWS Lambda API Gateway and more. https:\/\/serverless.com\/."},{"key":"e_1_3_2_1_3_1","volume-title":"37th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS","author":"Aceto Luca","year":"2018","unstructured":"Luca Aceto, Antonis Achilleos, Adrian Francalanza, and Anna Ing\u00f3lfsd\u00f3ttir. 2018. Monitoring for silent actions. In 37th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2017). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_4_1","volume-title":"Defining liveness. Information processing letters 21, 4","author":"Alpern Bowen","year":"1985","unstructured":"Bowen Alpern and Fred B Schneider. 1985. Defining liveness. Information processing letters 21, 4 (1985), 181--185."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926454"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2013.65"},{"key":"e_1_3_2_1_7_1","volume-title":"Streamable regular transductions. arXiv preprint arXiv:1807.03865","author":"Alur Rajeev","year":"2018","unstructured":"Rajeev Alur, Dana Fisman, Konstantinos Mamouras, Mukund Raghothaman, and Caleb Stanford. 2018. Streamable regular transductions. arXiv preprint arXiv:1807.03865 (2018)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487222.2487225"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(91)90258-4"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0137-2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0393"},{"volume-title":"International Colloquium on Theoretical Aspects of Computing","author":"Diekert Volker","key":"e_1_3_2_1_12_1","unstructured":"Volker Diekert, Anca Muscholl, and Igor Walukiewicz. 2015. A Note on Monitors and B\u00fcchi automata. In International Colloquium on Theoretical Aspects of Computing. Springer, 39--57."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0239-8"},{"volume-title":"Handbook of weighted automata","author":"Droste Manfred","key":"e_1_3_2_1_14_1","unstructured":"Manfred Droste, Werner Kuich, and Heiko Vogler. 2009. Handbook of weighted automata. Springer Science & Business Media."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301314"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(16)30076-9"},{"key":"e_1_3_2_1_17_1","volume-title":"International Symposium on Foundations and Practice of Security. Springer, 102--116","author":"Khoury Rapha\u00ebl","year":"2015","unstructured":"Rapha\u00ebl Khoury and Sylvain Hall\u00e9. 2015. Runtime enforcement with partial control. In International Symposium on Foundations and Practice of Security. Springer, 102--116."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2015.073011"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.714"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.229904"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0046-8"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455526.1455532"},{"volume-title":"An introduction to input\/output automata. Laboratory for Computer Science","author":"Lynch Nancy A","key":"e_1_3_2_1_23_1","unstructured":"Nancy A Lynch and Mark R Tuttle. 1988. An introduction to input\/output automata. Laboratory for Computer Science, Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_24_1","volume-title":"International Workshop on Security and Trust Management. Springer, 17--32","author":"Mallios Yannis","year":"2012","unstructured":"Yannis Mallios, Lujo Bauer, Dilsun Kaynar, and Jay Ligatti. 2012. Enforcing more with less: Formalizing target-aware run-time monitors. In International Workshop on Security and Trust Management. Springer, 17--32."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.76"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1955.tb03788.x"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Shanmugavelayutham Muthukrishnan et al. 2005. Data streams: Algorithms and applications. Foundations and Trends\u00ae in Theoretical Computer Science 1 2 (2005) 117--236.","DOI":"10.1561\/0400000002"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2676978"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-017-0271-1"},{"volume-title":"International Colloquium on Theoretical Aspects of Computing","author":"Renard Matthieu","key":"e_1_3_2_1_30_1","unstructured":"Matthieu Renard, Yli\u00e8s Falcone, Antoine Rollet, Srinivas Pinisetty, Thierry J\u00e9ron, and Herv\u00e9 Marchand. 2015. Enforcement of (timed) properties with uncontrollable events. In International Colloquium on Theoretical Aspects of Computing. Springer, 542--560."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.07.009"},{"volume-title":"International Colloquium on Theoretical Aspects of Computing","author":"Viswanathan Mahesh","key":"e_1_3_2_1_33_1","unstructured":"Mahesh Viswanathan and Moonzoo Kim. 2004. Foundations for the run-time monitoring of reactive systems-fundamentals of the mac language. In International Colloquium on Theoretical Aspects of Computing. Springer, 543--556."}],"event":{"name":"ICSCA 2020: 2020 9th International Conference on Software and Computer Applications","acronym":"ICSCA 2020","location":"Langkawi Malaysia"},"container-title":["Proceedings of the 2020 9th International Conference on Software and Computer Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384544.3384609","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3384544.3384609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:18:24Z","timestamp":1755839904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3384544.3384609"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,18]]},"references-count":33,"alternative-id":["10.1145\/3384544.3384609","10.1145\/3384544"],"URL":"https:\/\/doi.org\/10.1145\/3384544.3384609","relation":{},"subject":[],"published":{"date-parts":[[2020,2,18]]},"assertion":[{"value":"2020-04-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}