<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Learning How to Monitor: Pairing Monitoring and Learning for Online System Verification *</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Brunello</surname></persName>
							<email>andrea.brunello@uniud.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Udine</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Dario</forename><surname>Della</surname></persName>
							<email>dario.dellamonica@uniud.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Udine</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Angelo</forename><surname>Montanari</surname></persName>
							<email>angelo.montanari@uniud.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Udine</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrea</forename><surname>Urgolo</surname></persName>
							<email>urgolo.andrea@spes.uniud.it</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Udine</orgName>
								<address>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Learning How to Monitor: Pairing Monitoring and Learning for Online System Verification *</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">A7B1A9813AFE0EF9EBB1E453465DDAEA</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T22:29+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In several domains, the execution of a system is associated with the generation of continuous streams of data. Such streams may contain important telemetry information, which can be used to perform tasks like predictive maintenance and preemptive failure detection, in order to issue early warnings. In critical contexts, formal methods have been recognized as an effective approach to ensure the correct behaviour of a system. However, they have at least two significant weaknesses: (i) a complete, hand-made specification of all the properties that have to be guaranteed during the execution of the system turns out to be often out of reach when complex systems have to be handled and, for the same complexity reasons, (ii) it may be difficult to derive a complete model of the system against which to check the properties of interest. In this paper, to overcome these limitations, we extend a recently presented framework that pairs monitoring with machine learning, in order to allow for the preemptive detection of critical system behaviours in an on-line setting. The framework is tested on a practical use-case based on the public NASA C-MAPSS dataset, and is shown to obtain promising performance in terms of its ability to forecast the approach of failures, and to provide interpretable results.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Typically, during its execution a system generates several streams of data, which may contain important telemetry information. This is the case, for instance, with logs produced by web servers, smart sensors, or machinery in modern industrial plants. System behaviours may be arbitrarily convoluted, as they can be the result of the interaction among several components as well as with the surrounding environment.</p><p>In such a complex setting, formal methods can be exploited as effective tools for the automatic verification of software and hardware systems, a task which is of paramount importance in many critical domains. However, the inherent complexity of system's components and of their interactions make it very difficult (and sometimes impossible) to specify in advance all the relevant properties that have to be guaranteed (or, dually, avoided) during their execution. In addition, the definition of a complete model of the system against which to check the properties of interest may also be out of reach.</p><p>To overcome these limitations, some approaches that complement formal verification with model-based testing and monitoring have been recently proposed in the literature (see, for instance, <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>). In this work, we focus on monitoring <ref type="bibr" target="#b7">[8]</ref>, a runtime verification technique whose key feature is that of allowing one to detect the satisfaction or violation of a property (usually expressed in terms of some temporal logic formula) by analyzing a single run of the system, which makes such a technique naturally applicable to data streaming contexts. Specifically, we extend a recently-proposed framework for online system verification <ref type="bibr" target="#b2">[3]</ref> that integrates monitoring with machine learning and can be applied to preemptive failure detection and predictive maintenance tasks in data streaming contexts. The framework is evaluated on a use-case based on the public NASA C-MAPSS (Commercial Modular Aero-Propulsion System Simulation) dataset <ref type="bibr" target="#b13">[14]</ref>, and is shown to obtain promising results regarding the preemptive detection of engine failures. Moreover, the approach is highly interpretable, meaning that a domain expert can easily read and validate the generated model. Last but not least, by looking at the formulas extracted by the framework, it may be possible to gain some insights on the causes that ultimately led to a failure, and act accordingly.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Learning How to Monitor</head><p>As we already pointed out, the framework combines machine learning with monitoring, in order to obtain a system that can be exploited for online system verification. Its operation consists of five main steps.</p><p>1. Specification of the initial set of properties. Domain experts are asked to specify the most significant (monitorable) properties that the system under consideration should exhibit. The latter are then formalized in a suitable temporal logic and a monitor that checks them against incoming execution traces is synthesized.</p><p>2. Monitoring of system properties. The monitor checks whether the system satisfies/violates the specified properties during its execution.</p><p>3. Detection of a failure. Upon the detection of a failure, the part of the system trace for which the monitor reaches a verdict of failure is extracted, and considered to be a failure trace. Intuitively, it corresponds to the subtrace that is closer to the failure event. In addition, the remaining part of the trace, generated by the system during previous normal execution is extracted, and considered to be a normal trace. Of course, the length of the time window that is used to distinguish between normal and failure traces depends on the specific application domain, and it must be carefully chosen according to the results of a dedicated tuning phase, possibly with the help of domain experts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4.</head><p>Mining of the relevant behaviour patterns. Failure and normal traces are put together to generate a dataset for supervised machine learning. Each of the two instances is characterized by a (possibly multivariate) trace that can contain numerical (as in the case of a temperature signal) or categorical (e.g., a sequence of system calls made in a Unix system) values. Traces are first converted into timelines (see, e.g., <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b14">15]</ref>); then, pattern mining algorithms are run, with the goal of extracting the (temporal) logic formulas that best characterize and discriminate between normal and failure traces (following, for instance, the approaches described in <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b9">10]</ref>). In doing that, some attention has to be paid to avoid overfitting, for instance putting a constraint on the maximum nesting level of the extracted formulas, or considering only a set of predefined patterns (see, e.g., <ref type="bibr" target="#b11">[12]</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Extension of the pool of properties.</head><p>The temporal logic formulas extracted during the mining phase are added to the pool of properties to be monitored, and the process restarts from the monitoring phase. Notice that it might be possible for the added formulas to be redundant (i.e., entailed by other ones) but they cannot be in contradiction with the existing ones.</p><p>The framework works in an iterative way, which we may refer to as its online phase, in which incoming traces are considered. It starts from a set of basic properties, and new, related ones are then added over time, with the idea that, in principle, they should allow the system to discover anomalous behaviours earlier and with ever increasing accuracy and coverage. In order for the pool of properties to converge, we are investigating the possibility to define some stopping criteria, e.g., based on the accuracy of the extracted formula or the complexity of the corresponding decision trees. Based on the organization of the above five steps, two different framework phases and learning modes may be identified. Warmup and online execution phases. Sometimes, data pertaining to past system failures may be available, or approximate data may be generated by means of simulations. In that case, it makes sense to exploit these pieces of information to perform monitor learning even before its online phase. To do that, intuitively, it is sufficient to mimic the continual arrival of the available traces, and to iteratively follow the five steps which we described. Thanks to this initial warmup phase, the framework can then deal with the subsequent online phase starting with an already-extended pool of properties. Semi-supervised and unsupervised learning. Let us focus on the task of preemptive machinery fault detection. According to the first step of the framework, a domain expert may be required to specify an initial set of properties to be monitored against the execution of the system, thus acting, in her/his vision, as fault early warnings. Since there is, at first, a human intervention, we can refer to this strategy as a kind of semi-supervised learning. Nevertheless, domain expert knowledge may sometimes not be available. In such a case, the monitor is initialized with just a single, trivial property, that is, "the machinery is in operation". Then, once a failure is detected (indeed not in a preemptive way), the framework may proceed with the usual steps in order to detect some properties that may help it in forecasting the fault before it actually happens. Since in this operation mode there is no human intervention (except for the trivial, initial, "machinery in operation" property), we can refer to it as a kind of unsupervised learning.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Application</head><p>In order to better describe the operation of the framework, we now turn our attention to its application to the NASA C-MAPSS FD001 dataset <ref type="bibr" target="#b13">[14]</ref>, which includes run-to-failure simulated data of turbo fan jet engines and is considered as a benchmark in the literature (see, for example, <ref type="bibr" target="#b12">[13]</ref>). Specifically, in dataset FD001, engines are simulated according to a single condition (called Sea level), and their failures are attributable to one possible cause (HPC degradation). Each engine simulation is represented by a multivariate time series obtained from 21 engine's sensors and 3 operational settings. Although each instance represents the simulation of a different engine, the data can be considered to be from a fleet of engines of the same type. Data are sampled at one value per second, and the average time series length is 206. The dataset includes 100 training and 100 test instances. However, test instances are not ideal for our purposes as they do not end at a failure, but at an arbitrary preceding point. Thus, for the sake of this early stage evaluation, we focus on training set instances with at least 200 points, and we randomly split them into training and test instances. As a result, we end up using 30 training and 18 test samples.</p><p>The main goal of this experiment is the extraction of temporal properties in order to enhance the preemptiveness of engine failure predictions. In order to encode the temporal properties extracted by the framework, we chose here to rely on Linear Temporal Logic (LTL) <ref type="bibr" target="#b10">[11]</ref> and, for this reason, before applying the framework, time series are converted into discrete-valued timelines. Intuitively, given a real-valued time series, we want to translate it into a sequence of symbols belonging to a finite dictionary. In order to perform the translation, we chose to rely on Symbolic Aggregate approXimation (SAX) <ref type="bibr" target="#b8">[9]</ref>, a well-established solution which has already been used in several data mining applications.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Experiment setup</head><p>As for the execution of the framework, we proceed as follows. The monitoring pool is set up with just a single, trivial, "engine in operation" property (unsupervised setting). Then, the arrival of engine telemetry data is simulated, as in the warmup phase. To do so, considering that only one kind of engine is included in the dataset, we act as if we were observing a single instance: we concatenate all training timelines one after the other, choosing their order by means of a random seed. Then, the monitoring phase is started, and the framework is fed with the incoming data one point at a time. Upon the detection of a failure, two sub-traces are extracted: the failure window, which is the portion of the time series that immediately precedes the failure event, and the normal trace, which lasts from the beginning of the timeline or from the last failure occurrence until the failure window. Next, contrastive LTL specifications describing how the two traces differ are generated by means of a publicly available tool <ref type="bibr" target="#b0">[1]</ref> based on a probabilistic Bayesian generative model <ref type="bibr" target="#b6">[7]</ref> which exploits a Markov Chain Monte Carlo (MCMC) algorithm with linear complexity with reference to traces length × number of iterations. Such specifications are based on a set of predefined LTL templates representing the basic operators and properties globally, eventually, until, release, response, stability, and sometimes before. It should be noticed that the generated formulas capture high-level qualitative temporal relations and are unable to fully store the analyzed traces (e.g., formulas like p 1 ∧ Xp 2 ∧ XXp 3 ∧ XXXp 4 . . . are never generated), thus they are not able to distinguish between failure and normal sub-traces based on their difference in length. At this point, by means of a decision tree trained to distinguish between the two kinds of traces, the most useful specifications are selected and combined into two Boolean formulas. Finally, once fitted, the resulting decision tree is added to the monitoring pool. After that, the monitoring process resumes its operation on the remaining concatenated data, as if the engine was fixed and started again. Each time the monitor reaches a verdict of failure (due to a decision tree in the pool predicting it, or to observing an actual engine breakdown), the remaining useful lifetime (RUL) of the engine is calculated. The entire process is run 100 times varying the random seed, so to collect statistical data regarding the evolution of RUL. In this way, based on the collected statistics, it is possible to decide when to interrupt the warmup phase of the framework, according to the desired preemptiveness level of failure prediction. Operationally, for the procedure we empirically chose a time window of 30 seconds and a desired preemptiveness threshold of 140 seconds.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Results</head><p>As shown in Figure <ref type="figure" target="#fig_0">1</ref>, in the warmup phase the 140 second threshold is reached after 16 iterations of the framework, with a standard deviation of 24.34 seconds and 32 LTL formulas learned. Moreover, it can be noticed that a law of diminishing returns applies regarding the pool size and RUL estimates. In order to confirm the consistency of the RUL values, we applied one of the trained monitors to the 18 test instances, obtaining an average RUL of 142.0 seconds with a standard deviation of 25.36. Considering the interpretability of the results, we may refer to the formulas f 1 = (sensor 12 _B ∧ ¬sensor 2 _E)R ¬sensor 2 _E and f 2 = sensor 15 _D U sensor 2 _E learned respectively in the iteration 1 and 2: f 1 means that if sensor 2 _E occurs then sensor_12_B occurred in the past and f 2 means that sensor 15 _D has to be true until sensor 2 _E eventually becomes true. A monitor execution on a test set trace is shown in Figure <ref type="figure" target="#fig_1">2</ref>. While f 1 identifies the window immediately preceding the failure, f 2 , which </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions and future work</head><p>In this paper, a novel framework that integrates machine learning with monitoring to perform tasks such as predictive maintenance and preemptive failure detection in an online setting is discussed. One of its major strengths and distinguishing characteristics with respect to other solutions is the interpretability of the extracted properties that are used to predict the failures. The framework, tested on the NASA C-MAPSS FD001 dataset, is shown to provide encouraging results. As for future work, it includes (i) the development of a metric that would allow to estimate the RUL of the monitored system without relying on the warmup phase, (ii) the testing of other, more sophisticated time series preprocessing techniques, and (iii) a thorough comparison with other state-of-the-art predictive maintenance approaches.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Average and standard deviation of RUL, and number of LTL formulas in the monitoring pool for each framework iteration (warmup phase).</figDesc><graphic coords="4,109.42,97.80,376.43,109.88" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Example of a trace portion with predicted failure windows.</figDesc><graphic coords="4,86.74,652.90,421.80,62.38" type="bitmap" /></figure>
		</body>
		<back>

			<div type="funding">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>* The authors acknowledge the partial support by the Italian INdAM-GNCS project Ragionamento Strategico e Sintesi Automatica di Sistemi Multi-Agente.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<ptr target="https://github.com/IBM/BayesLTL" />
		<title level="m">BayesLTL GitHub reference</title>
				<imprint>
			<date type="published" when="2020-08-21">21 August 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Extracting interval temporal logic rules: A first approach</title>
		<author>
			<persName><forename type="first">D</forename><surname>Bresolin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Cominato</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Muñoz-Velasco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Sciavicco</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 25th International Symposium on Temporal Representation and Reasoning</title>
				<meeting>the 25th International Symposium on Temporal Representation and Reasoning</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">120</biblScope>
			<biblScope unit="page">15</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Pairing monitoring with machine learning for smart system verification and predictive maintenance</title>
		<author>
			<persName><forename type="first">A</forename><surname>Brunello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">Della</forename><surname>Monica</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Montanari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1st Workshop on Artificial Intelligence and Formal Verification, Logic, Automata, and Synthesis</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<meeting>the 1st Workshop on Artificial Intelligence and Formal Verification, Logic, Automata, and Synthesis</meeting>
		<imprint>
			<date type="published" when="2019">2509. 2019</date>
			<biblScope unit="page" from="71" to="76" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Interval temporal logic decision tree learning</title>
		<author>
			<persName><forename type="first">A</forename><surname>Brunello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Sciavicco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">E</forename><surname>Stan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 16th European Conference on Logics in Artificial Intelligence</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting>the 16th European Conference on Logics in Artificial Intelligence</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">11468</biblScope>
			<biblScope unit="page" from="778" to="793" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A survey of runtime monitoring instrumentation techniques</title>
		<author>
			<persName><forename type="first">I</forename><surname>Cassar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Francalanza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Aceto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ingólfsdóttir</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2nd International Workshop on Pre-Post-Deployment Verification Techniques</title>
				<meeting>the 2nd International Workshop on Pre-Post-Deployment Verification Techniques</meeting>
		<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="15" to="28" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Model-based testing of stochastically timed systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gerhold</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Hartmanns</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Stoelinga</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Innovations in Systems and Software Engineering</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">3-4</biblScope>
			<biblScope unit="page" from="207" to="233" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Bayesian inference of linear temporal logic specifications for contrastive explanations</title>
		<author>
			<persName><forename type="first">J</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Muise</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Shah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Agarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Shah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 28th International Joint Conference on Artificial Intelligence</title>
				<meeting>the 28th International Joint Conference on Artificial Intelligence</meeting>
		<imprint>
			<publisher>AAAI Press</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="5591" to="5598" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A brief account of Runtime Verification</title>
		<author>
			<persName><forename type="first">M</forename><surname>Leucker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Schallhart</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Logical and Algebraic Methods in Programming</title>
		<imprint>
			<biblScope unit="volume">78</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="293" to="303" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Experiencing SAX: A novel symbolic representation of time series</title>
		<author>
			<persName><forename type="first">J</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Keogh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Wei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lonardi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data Mining and knowledge discovery</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="107" to="144" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Learning linear temporal properties</title>
		<author>
			<persName><forename type="first">D</forename><surname>Neider</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Gavran</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 18th Conference on Formal Methods in Computer Aided Design</title>
				<meeting>the 18th Conference on Formal Methods in Computer Aided Design</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="1" to="10" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">The temporal logic of programs</title>
		<author>
			<persName><forename type="first">A</forename><surname>Pnueli</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedins of the 18th Annual Symposium on Foundations of Computer Science</title>
				<meeting>eedins of the 18th Annual Symposium on Foundations of Computer Science</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="1977">1977</date>
			<biblScope unit="page" from="46" to="57" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<ptr target="https://matthewbdwyer.github.io/psp/.KansasState" />
		<title level="m">Analysis, and Transformation of Software (SAnToS Laboratory)</title>
				<imprint>
			<date type="published" when="2020-07-17">on 17 July 2020</date>
		</imprint>
		<respStmt>
			<orgName>University CIS Department, Laboratory for Specification</orgName>
		</respStmt>
	</monogr>
	<note>Property pattern mappings for LTL</note>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Performance benchmarking and analysis of prognostic methods for CMAPSS datasets</title>
		<author>
			<persName><forename type="first">E</forename><surname>Ramasso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Saxena</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Prognostics and Health Management</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="1" to="15" />
			<date type="published" when="2014">11 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Damage propagation modeling for aircraft engine run-to-failure simulation</title>
		<author>
			<persName><forename type="first">A</forename><surname>Saxena</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Goebel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Simon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Eklund</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2008 International Conference on Prognostics and Health Management</title>
				<meeting>the 2008 International Conference on Prognostics and Health Management</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="1" to="9" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Towards a general method for logical rule extraction from time series</title>
		<author>
			<persName><forename type="first">G</forename><surname>Sciavicco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">E</forename><surname>Stan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Vaccari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 8th International Work-Conference on the Interplay Between Natural and Artificial Computation</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting>the 8th International Work-Conference on the Interplay Between Natural and Artificial Computation</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">11487</biblScope>
			<biblScope unit="page" from="3" to="12" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
