{"id":"https://openalex.org/W4400939144","doi":"https://doi.org/10.1007/978-3-031-65630-9_7","title":"General Anticipatory Runtime Verification","display_name":"General Anticipatory Runtime Verification","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4400939144","doi":"https://doi.org/10.1007/978-3-031-65630-9_7"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-65630-9_7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-65630-9_7","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-65630-9_7.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-65630-9_7.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5105013841","display_name":"Raik Hipler","orcid":"https://orcid.org/0009-0007-8348-6163"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Raik Hipler","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063294497","display_name":"Hannes Kallwies","orcid":"https://orcid.org/0000-0002-8301-4752"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Hannes Kallwies","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002397514","display_name":"Martin Leucker","orcid":"https://orcid.org/0000-0002-3696-9222"},"institutions":[{"id":"https://openalex.org/I9341345","display_name":"University of L\u00fcbeck","ror":"https://ror.org/00t3r8h32","country_code":"DE","type":"education","lineage":["https://openalex.org/I9341345"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Martin Leucker","raw_affiliation_strings":["University of L\u00fcbeck, L\u00fcbeck, Germany"],"affiliations":[{"raw_affiliation_string":"University of L\u00fcbeck, L\u00fcbeck, Germany","institution_ids":["https://openalex.org/I9341345"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015623381","display_name":"C\u00e9sar S\u00e1nchez","orcid":"https://orcid.org/0000-0003-3927-4773"},"institutions":[{"id":"https://openalex.org/I4210162154","display_name":"IMDEA Software","ror":"https://ror.org/04xvfkh51","country_code":"ES","type":"facility","lineage":["https://openalex.org/I105140100","https://openalex.org/I4210162154"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"C\u00e9sar S\u00e1nchez","raw_affiliation_strings":["IMDEA Software Institute, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"IMDEA Software Institute, Madrid, Spain","institution_ids":["https://openalex.org/I4210162154"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5105013841"],"corresponding_institution_ids":["https://openalex.org/I9341345"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35386029,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"133","last_page":"155"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/runtime-verification","display_name":"Runtime verification","score":0.9301984310150146},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.893263041973114},{"id":"https://openalex.org/keywords/anticipation","display_name":"Anticipation (artificial intelligence)","score":0.7796169519424438},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.6013802886009216},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5397322177886963},{"id":"https://openalex.org/keywords/software-verification","display_name":"Software verification","score":0.43150582909584045},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.41658270359039307},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.40547263622283936},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.38151025772094727},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.11621904373168945},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11189362406730652},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10684317350387573},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.07685557007789612}],"concepts":[{"id":"https://openalex.org/C202973057","wikidata":"https://www.wikidata.org/wiki/Q7380130","display_name":"Runtime verification","level":3,"score":0.9301984310150146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.893263041973114},{"id":"https://openalex.org/C176777502","wikidata":"https://www.wikidata.org/wiki/Q4774623","display_name":"Anticipation (artificial intelligence)","level":2,"score":0.7796169519424438},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.6013802886009216},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5397322177886963},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.43150582909584045},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.41658270359039307},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.40547263622283936},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.38151025772094727},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.11621904373168945},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11189362406730652},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10684317350387573},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.07685557007789612},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-031-65630-9_7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-65630-9_7","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-65630-9_7.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-031-65630-9_7","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-65630-9_7","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-65630-9_7.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400939144.pdf"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W209085883","https://openalex.org/W1479233759","https://openalex.org/W1480909796","https://openalex.org/W1502122036","https://openalex.org/W1518884487","https://openalex.org/W1535889317","https://openalex.org/W1547304883","https://openalex.org/W1740522204","https://openalex.org/W1975880855","https://openalex.org/W2023808162","https://openalex.org/W2043100293","https://openalex.org/W2101623441","https://openalex.org/W2113012730","https://openalex.org/W2167340365","https://openalex.org/W2176100176","https://openalex.org/W2888811801","https://openalex.org/W2899781265","https://openalex.org/W2957290330","https://openalex.org/W2961558634","https://openalex.org/W2978783547","https://openalex.org/W2978933430","https://openalex.org/W3092183339","https://openalex.org/W3131101596","https://openalex.org/W3159412779","https://openalex.org/W3204551292","https://openalex.org/W4296900008","https://openalex.org/W4296900406","https://openalex.org/W4312552352","https://openalex.org/W4382239273","https://openalex.org/W4387211446","https://openalex.org/W6756486208"],"related_works":["https://openalex.org/W2006962382","https://openalex.org/W2809618173","https://openalex.org/W3036403349","https://openalex.org/W1563456403","https://openalex.org/W1968510839","https://openalex.org/W1522369122","https://openalex.org/W2148966220","https://openalex.org/W2117425003","https://openalex.org/W2149352546","https://openalex.org/W2108860137"],"abstract_inverted_index":{"Abstract":[0],"Runtime":[1],"verification":[2,48,55,61],"is":[3,28,49,102],"a":[4,8,12,50,129,133],"technique":[5],"for":[6,72,84],"monitoring":[7,59,71,85,118],"system\u2019s":[9],"behavior":[10],"against":[11],"formal":[13],"specification.":[14,26],"Monitors":[15],"must":[16],"produce":[17,33],"verdicts":[18,34],"that":[19],"are":[20],"sound":[21],"with":[22,82],"respect":[23],"to":[24,31,57,93,115],"the":[25,29,36,41,44,58],"Anticipation":[27],"ability":[30],"immediately":[32],"when":[35],"monitor":[37],"can":[38],"confidently":[39],"predict":[40],"inevitability":[42],"of":[43,53,62,86,132,136],"verdict.":[45],"Stream":[46],"runtime":[47,54,74],"specialized":[51],"form":[52],"tailored":[56],"and":[60,96],"data":[63],"streams.":[64],"In":[65],"this":[66],"paper":[67],"we":[68,78,90,107,121],"study":[69],"anticipatory":[70,117],"stream":[73],"verification.":[75],"More":[76],"specifically,":[77],"present":[79],"an":[80],"algorithm":[81],"anticipation":[83,101],"Lola":[87],"specifications,":[88],"which":[89],"then":[91],"extend":[92],"exploit":[94],"assumptions":[95],"tolerate":[97],"uncertainties.":[98],"As":[99],"perfect":[100],"in":[103],"general":[104],"not":[105],"computable,":[106],"use":[108],"techniques":[109],"from":[110],"abstract":[111],"interpretation,":[112],"especially":[113],"widening,":[114],"approximate":[116],"verdicts.":[119],"Finally,":[120],"report":[122],"on":[123],"three":[124],"empirical":[125],"cases":[126],"studies":[127],"using":[128],"prototype":[130],"implementation":[131],"symbolic":[134],"instantiation":[135],"our":[137],"approach.":[138]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
