{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T21:16:48Z","timestamp":1770499008938,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Horizon 2020 Framework Programme","award":["957254"],"award-info":[{"award-number":["957254"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,10]]},"DOI":"10.1145\/3663529.3663845","type":"proceedings-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T19:43:13Z","timestamp":1720640593000},"page":"255-265","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Checking Complex Source Code-Level Constraints using Runtime Verification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2289-1620","authenticated-orcid":false,"given":"Joshua Heneage","family":"Dawes","sequence":"first","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4854-685X","authenticated-orcid":false,"given":"Domenico","family":"Bianculli","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]}],"member":"320","published-online":{"date-parts":[[2024,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Stanley Bak. 2023. The AeroBenchVVPython GitHub Repository. https:\/\/github.com\/stanleybak\/AeroBenchVVPython Accessed: 2023-08-11"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-018-00328-3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-016-0242-y"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000799.2000800"},{"key":"e_1_3_2_1_5_1","volume-title":"Clara: A Framework for Partially Evaluating Finite-State Runtime Monitors Ahead of Time","author":"Bodden Eric","year":"2010","unstructured":"Eric Bodden, Patrick Lam, and Laurie Hendren. 2010. Clara: A Framework for Partially Evaluating Finite-State Runtime Monitors Ahead of Time. In Runtime Verification, Howard Barringer, Ylies Falcone, Bernd Finkbeiner, Klaus Havelund, Insup Lee, Gordon Pace, Grigore Ro\u015fu, Oleg Sokolsky, and Nikolai Tillmann (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg. 183\u2013197. isbn:978-3-642-16612-9"},{"key":"e_1_3_2_1_6_1","volume-title":"Sampling-Based Runtime Verification. In FM 2011: Formal Methods, Michael Butler and Wolfram Schulte (Eds.). Springer Berlin Heidelberg","author":"Bonakdarpour Borzoo","year":"2011","unstructured":"Borzoo Bonakdarpour, Samaneh Navabpour, and Sebastian Fischmeister. 2011. Sampling-Based Runtime Verification. In FM 2011: Formal Methods, Michael Butler and Wolfram Schulte (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg. 88\u2013102. isbn:978-3-642-21437-0"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3242588"},{"key":"e_1_3_2_1_8_1","volume-title":"Runtime Verification","author":"Chattopadhyay Agnishom","unstructured":"Agnishom Chattopadhyay and Konstantinos Mamouras. 2020. A Verified Online Monitor for Metric Temporal Logic with Quantitative Semantics. In Runtime Verification. Springer International Publishing, Cham. 383\u2013403. isbn:978-3-030-60508-7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-019-00721-4"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2859926"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Joshua Dawes and Domenico Bianculli. 2024. Checking Complex Source Code-level Constraints using Runtime Verification - FSE 2024 (Industry papers track) - Artefact. https:\/\/doi.org\/10.6084\/m9.figshare.25783266.v1 10.6084\/m9.figshare.25783266.v1","DOI":"10.6084\/m9.figshare.25783266.v1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Joshua Dawes and Alexander Vatov. 2024. SCSL-Trace-Checker - Source Code. https:\/\/doi.org\/10.6084\/m9.figshare.25784355.v1 10.6084\/m9.figshare.25784355.v1","DOI":"10.6084\/m9.figshare.25784355.v1"},{"key":"e_1_3_2_1_13_1","volume-title":"Source Code Level Behaviour of Programs. In Runtime Verification","author":"Dawes Joshua Heneage","unstructured":"Joshua Heneage Dawes and Domenico Bianculli. 2021. Specifying Properties over Inter-procedural, Source Code Level Behaviour of Programs. In Runtime Verification, Lu Feng and Dana Fisman (Eds.). Springer International Publishing, Cham. 23\u201341. isbn:978-3-030-88494-9"},{"key":"e_1_3_2_1_14_1","volume-title":"Source Code Level Behaviour of Programs. In Runtime Verification","author":"Dawes Joshua Heneage","unstructured":"Joshua Heneage Dawes and Domenico Bianculli. 2021. Specifying Properties over Inter-procedural, Source Code Level Behaviour of Programs. In Runtime Verification. Springer International Publishing, Cham. 23\u201341. isbn:978-3-030-88494-9"},{"key":"e_1_3_2_1_15_1","volume-title":"Formal Aspects of Component Software","author":"Dawes Joshua Heneage","year":"2087","unstructured":"Joshua Heneage Dawes and Domenico Bianculli. 2022. Specifying Source Code and Signal-based Behaviour of Cyber-Physical System Components. In Formal Aspects of Component Software. Springer International Publishing, Cham. 20\u201338. isbn:978-3-031-20872-0"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60508-7_4"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297497"},{"key":"e_1_3_2_1_18_1","volume-title":"On-Line Monitoring for Temporal Logic Robustness. CoRR, abs\/1408.0045","author":"Dokhanchi Adel","year":"2014","unstructured":"Adel Dokhanchi, Bardh Hoxha, and Georgios Fainekos. 2014. On-Line Monitoring for Temporal Logic Robustness. CoRR, abs\/1408.0045 (2014), arXiv:1408.0045. arxiv:1408.0045"},{"key":"e_1_3_2_1_19_1","volume-title":"Reasoning with Temporal Logic on Truncated Paths","author":"Eisner Cindy","unstructured":"Cindy Eisner, Dana Fisman, John Havlicek, Yoad Lustig, Anthony McIsaac, and David Van Campenhout. 2003. Reasoning with Temporal Logic on Truncated Paths. In Computer Aided Verification, Warren A. Hunt and Fabio Somenzi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg. 27\u201339. isbn:978-3-540-45069-6"},{"key":"e_1_3_2_1_20_1","volume-title":"International Symposium on Automated Technology for Verification and Analysis. Springer, Cham. 241\u2013258","author":"Ferr\u00e8re Thomas","year":"2015","unstructured":"Thomas Ferr\u00e8re, Oded Maler, and Dejan Ni\u010dkovi\u0107. 2015. Trace diagnostics using temporal implicants. In International Symposium on Automated Technology for Verification and Analysis. Springer, Cham. 241\u2013258."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)00252-X"},{"key":"e_1_3_2_1_22_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"Havelund Klaus","unstructured":"Klaus Havelund and Grigore Ro\u015fu. 2002. Synthesizing Monitors for Safety Properties. In Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidelberg, Berlin, Heidelberg. 342\u2013356. isbn:978-3-540-46002-2"},{"key":"e_1_3_2_1_23_1","volume-title":"Runtime Verification","author":"Ho Hsi-Ming","unstructured":"Hsi-Ming Ho, Jo\u00ebl Ouaknine, and James Worrell. 2014. Online Monitoring of Metric Temporal Logic. In Runtime Verification. Springer International Publishing, Cham. 178\u2013192. isbn:978-3-319-11164-3"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:FORM.0000017719.43755.7c"},{"key":"e_1_3_2_1_25_1","volume-title":"Runtime Verification","author":"Mamouras Konstantinos","unstructured":"Konstantinos Mamouras, Agnishom Chattopadhyay, and Zhifu Wang. 2021. A Compositional Framework for Quantitative Online Monitoring over Continuous-Time Signals. In Runtime Verification. Springer International Publishing, Cham. 142\u2013163. isbn:978-3-030-88494-9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2134243.2134246"},{"key":"e_1_3_2_1_27_1","volume-title":"Helena Cuenca Cruz, and David Rydeheard","author":"Reger Giles","year":"2015","unstructured":"Giles Reger, Helena Cuenca Cruz, and David Rydeheard. 2015. MarQ: Monitoring at Runtime with QEA. In Tools and Algorithms for the Construction and Analysis of Systems. Springer Berlin Heidelberg, Berlin, Heidelberg. 596\u2013610. isbn:978-3-662-46681-0"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31784-3_8"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-021-00607-1"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 2024 International Conference on Formal Methods in Software Engineering (FormaliSE 2024), co-located with ICSE 2024","author":"Stratan Cristina","year":"2024","unstructured":"Cristina Stratan, Joshua Dawes, and Domenico Bianculli. 2024. Diagnosing Violations of Time-based Properties Captured in iCFTL. In Proceedings of the 2024 International Conference on Formal Methods in Software Engineering (FormaliSE 2024), co-located with ICSE 2024, Lisbon, Portugal. ACM."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/239519.239527"}],"event":{"name":"FSE '24: 32nd ACM International Conference on the Foundations of Software Engineering","location":"Porto de Galinhas Brazil","acronym":"FSE '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3663529.3663845","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3663529.3663845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:21Z","timestamp":1750290261000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3663529.3663845"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":31,"alternative-id":["10.1145\/3663529.3663845","10.1145\/3663529"],"URL":"https:\/\/doi.org\/10.1145\/3663529.3663845","relation":{},"subject":[],"published":{"date-parts":[[2024,7,10]]},"assertion":[{"value":"2024-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}