{"id":"https://openalex.org/W1964200934","doi":"https://doi.org/10.1145/1086228.1086291","title":"Passive mid-stream monitoring of real-time properties","display_name":"Passive mid-stream monitoring of real-time properties","publication_year":2005,"publication_date":"2005-09-18","ids":{"openalex":"https://openalex.org/W1964200934","doi":"https://doi.org/10.1145/1086228.1086291","mag":"1964200934"},"language":"en","primary_location":{"id":"doi:10.1145/1086228.1086291","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1086228.1086291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM international conference on Embedded software","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063404392","display_name":"Lalita Jategaonkar Jagadeesan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lalita Jategaonkar Jagadeesan","raw_affiliation_strings":["Bell Laboratories Research, Lucent Technologies, Lisle, IL"],"affiliations":[{"raw_affiliation_string":"Bell Laboratories Research, Lucent Technologies, Lisle, IL","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081527160","display_name":"Ramesh Viswanathan","orcid":"https://orcid.org/0000-0001-8434-385X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ramesh Viswanathan","raw_affiliation_strings":["Bell Laboratories Research, Lucent Technologies, Holmdel, NJ"],"affiliations":[{"raw_affiliation_string":"Bell Laboratories Research, Lucent Technologies, Holmdel, NJ","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063404392"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.089723,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"343","last_page":"352"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8318777680397034},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.717534601688385},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.5896475911140442},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5257642865180969},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5135776996612549},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.5024876594543457},{"id":"https://openalex.org/keywords/automaton","display_name":"Automaton","score":0.5022614002227783},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.4592362344264984},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43920913338661194},{"id":"https://openalex.org/keywords/software-fault-tolerance","display_name":"Software fault tolerance","score":0.4327140748500824},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.43076109886169434},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.417947381734848},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.4142172038555145},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.23740997910499573},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17295944690704346},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13845029473304749},{"id":"https://openalex.org/keywords/actuator","display_name":"Actuator","score":0.10113570094108582},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10052451491355896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8318777680397034},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.717534601688385},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.5896475911140442},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5257642865180969},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5135776996612549},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.5024876594543457},{"id":"https://openalex.org/C112505250","wikidata":"https://www.wikidata.org/wiki/Q787116","display_name":"Automaton","level":2,"score":0.5022614002227783},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.4592362344264984},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43920913338661194},{"id":"https://openalex.org/C50712370","wikidata":"https://www.wikidata.org/wiki/Q4269346","display_name":"Software fault tolerance","level":3,"score":0.4327140748500824},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.43076109886169434},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.417947381734848},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.4142172038555145},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.23740997910499573},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17295944690704346},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13845029473304749},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.10113570094108582},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10052451491355896},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1086228.1086291","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1086228.1086291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM international conference on Embedded software","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1482486776","https://openalex.org/W1489329521","https://openalex.org/W1516506771","https://openalex.org/W1521364045","https://openalex.org/W1548980824","https://openalex.org/W1563191395","https://openalex.org/W1825341937","https://openalex.org/W1872998830","https://openalex.org/W1962072139","https://openalex.org/W1991978415","https://openalex.org/W2048164876","https://openalex.org/W2083964867","https://openalex.org/W2084880396","https://openalex.org/W2101508170","https://openalex.org/W2107578943","https://openalex.org/W2113780769","https://openalex.org/W2115327632","https://openalex.org/W2126495607","https://openalex.org/W2137702965","https://openalex.org/W2153439859","https://openalex.org/W2160614176","https://openalex.org/W4241778508","https://openalex.org/W6628712087","https://openalex.org/W6673658301"],"related_works":["https://openalex.org/W1667647204","https://openalex.org/W2404647514","https://openalex.org/W4247536566","https://openalex.org/W4241418540","https://openalex.org/W2018477250","https://openalex.org/W3119814709","https://openalex.org/W1508895727","https://openalex.org/W2725786787","https://openalex.org/W1875930651","https://openalex.org/W1590965489"],"abstract_inverted_index":{"Passive":[0],"monitoring":[1,38,79],"or":[2],"testing":[3,61,128,161],"of":[4,23,47,77,91,114,117,141,158],"complex":[5],"systems":[6,142],"and":[7,32,58,62,101,180],"networks":[8],"running":[9],"in":[10,20,111,164,192],"the":[11,40,48,70,83,89,92,99,112,115,118,159,175],"field":[12],"can":[13,54,134,146],"provide":[14,154],"valuable":[15],"insights":[16],"into":[17],"their":[18],"behavior":[19],"actual":[21],"environments":[22],"use.":[24],"In":[25,120],"certain":[26],"contexts,":[27],"such":[28],"as":[29,149],"network":[30],"management":[31],"intrusion":[33],"detection":[34,64,85],"for":[35,44,129,166],"security,":[36],"passive":[37,78,160],"is":[39],"most":[41],"applicable":[42],"methodology":[43],"assuring":[45],"correctness":[46],"system's":[49],"behavior.":[50],"More":[51],"generally,":[52],"it":[53],"serve":[55],"to":[56,98,137,186],"complement":[57],"extend":[59],"functional":[60],"fault":[63,84,189],"efforts":[65],"that":[66,133,145],"take":[67],"place":[68],"during":[69],"software/product":[71],"development":[72],"lifecycle.":[73],"Two":[74],"distinguishing":[75],"aspects":[76],"are":[80,104],"that:":[81],"(a)":[82],"process":[86],"cannot":[87],"influence":[88],"execution":[90,116],"system":[93],"by":[94],"providing":[95],"particular":[96],"inputs":[97],"system,":[100],"(b)":[102],"observations":[103],"obtained":[105],"mid-stream,":[106],"from":[107],"an":[108],"unknown":[109],"state":[110],"middle":[113],"system.":[119],"this":[121],"paper,":[122],"we":[123,181],"present":[124],"results":[125,153],"on":[126,183],"passively":[127,187],"real-time":[130,176],"behavioral":[131],"properties":[132],"be":[135,147],"applied":[136],"a":[138,155,193],"large":[139],"class":[140],"including":[143],"those":[144],"modeled":[148],"timed":[150],"automata.":[151],"Our":[152],"natural":[156],"extension":[157],"study":[162],"conducted":[163],"[17]":[165],"untimed":[167],"properties.":[168],"We":[169],"have":[170],"implemented":[171],"our":[172],"approach":[173],"using":[174],"model":[177],"checker":[178],"UPPAAL,":[179],"report":[182],"its":[184],"application":[185],"test":[188],"tolerance":[190],"software":[191],"telecommunications":[194],"switch":[195],"developed":[196],"at":[197],"Lucent":[198],"Technologies.":[199]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
