{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:21:09Z","timestamp":1726060869386},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/ase.2013.6693067","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T17:07:25Z","timestamp":1389028045000},"page":"70-80","source":"Crossref","is-referenced-by-count":10,"title":["Efficient parametric runtime verification with deterministic string rewriting"],"prefix":"10.1109","author":[{"given":"Patrick","family":"Meredith","sequence":"first","affiliation":[]},{"given":"Grigore","family":"Rosu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083249"},{"journal-title":"All About Maude-A High-Performance Logical Framework How to Specify Program and Verify Systems in Rewriting Logic","year":"2007","author":"clavel","key":"17"},{"key":"18","first-page":"33","article-title":"Larva - Safer monitoring of real-time java programs (tool paper)","author":"colombo","year":"2009","journal-title":"Software Engineering and Formal Methods (SEFM'09)"},{"key":"15","article-title":"Towards monitoring-oriented programming: A paradigm combining specification and implementation","author":"chen","year":"2003","journal-title":"Runtime Verification(RV'03)"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297069"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73370-6_20"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.50"},{"key":"11","first-page":"525","article-title":"A staged static program analysis to improve the performance of runtime monitoring","author":"bodden","year":"2007","journal-title":"ECOOP'07"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-9771-7"},{"key":"21","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1145\/1094811.1094841","article-title":"Relational queries over program traces","author":"goldsmith","year":"2005","journal-title":"OOPSLA'05"},{"journal-title":"Temporal Rover 1997-2009","year":"0","author":"drusinsky","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)00253-1"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993547"},{"key":"24","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1007\/3-540-45337-7_18","article-title":"An overview of aspectJ","author":"kiczales","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1023\/B:FORM.0000017719.43755.7c"},{"key":"26","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1145\/1094811.1094840","article-title":"Finding application errors and security flaws using PQL: A program query language","author":"martin","year":"2005","journal-title":"OOPSLA'07"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0063-y"},{"key":"28","article-title":"An overview of the MOP runtime verification framework","author":"meredith","year":"2011","journal-title":"International Journal on Software Techniques for Technology Transfer"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"3","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1145\/1297027.1297070","article-title":"Making trace monitors feasible","author":"avgustinov","year":"2007","journal-title":"OOPSLA'07"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094839"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1509239.1509243"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312929"},{"key":"7","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-642-16612-9_14","article-title":"Behavior abstraction in malware analysis","author":"beaucamps","year":"2010","journal-title":"Runtime Verification (RV'10)"},{"key":"6","first-page":"360","article-title":"Monpoly: Monitoring usage-control policies","author":"basin","year":"2011","journal-title":"Runtime Verification (RV'11)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exn076"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16612-9"},{"journal-title":"J-lo A tool for runtime-checking temporal assertions","year":"2005","author":"bodden","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"}],"event":{"name":"2013 IEEE\/ACM 28th International Conference on Automated Software Engineering (ASE)","start":{"date-parts":[[2013,11,11]]},"location":"Silicon Valley, CA, USA","end":{"date-parts":[[2013,11,15]]}},"container-title":["2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6684409\/6693054\/06693067.pdf?arnumber=6693067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T13:23:23Z","timestamp":1688909003000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6693067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ase.2013.6693067","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}