F. Bacchus and F. Kabanza, Planning for temporally extended goals, Annals of Mathematics and Artificial Intelligence, vol.22, issue.1/2, pp.5-27, 1998.
DOI : 10.1023/A:1018985923441

G. Baille, P. Garnier, H. Mathieu, and R. Pissard-gibollet, The INRIA Rhône-Alpes CyCab, 1999.

A. Bauer and Y. Falcone, Decentralised LTL monitoring, FM 2012: Formal Methods, pp.85-100, 2012.
DOI : 10.1007/978-3-642-32759-9_10

URL : https://hal.archives-ouvertes.fr/hal-00857286

A. Bauer, M. Leucker, and C. Schallhart, Comparing LTL Semantics for Runtime Verification, Journal of Logic and Computation, vol.20, issue.3, pp.651-674, 2010.
DOI : 10.1093/logcom/exn075

A. Biere, A. Cimatti, E. M. Clarke, O. Strichman, and Y. Zhu, Bounded model checking Advances in computers 58, pp.117-148, 2003.

B. Bloom, S. Istrail, and A. R. Meyer, Bisimulation can't be traced, pp.229-239, 1988.
DOI : 10.1145/200836.200876

URL : http://ecommons.cornell.edu/bitstream/1813/6990/1/90-1150.pdf

E. Chang, Z. Manna, and A. Pnueli, Characterization of temporal property classes, Automata, Languages and Programming, pp.474-486, 1992.
DOI : 10.1007/3-540-55719-9_97

F. Chauvel, O. Barais, N. Plouzeau, I. Borne, and J. Jézéquel, Composition et expression qualitative de politiques d'adaptation pour les composants Fractal, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00542773

J. Dormoy and O. Kouchnarenko, Event-based adaptation policies for Fractal components, ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010, pp.1-8, 2010.
DOI : 10.1109/AICCSA.2010.5586944

J. Dormoy, O. Kouchnarenko, and A. Lanoix, Runtime Verification of Temporal Patterns for Dynamic Reconfigurations of Components, FACS LNCS, vol.7253, pp.115-132, 2012.
DOI : 10.1007/978-3-642-35743-5_8

URL : https://hal.archives-ouvertes.fr/hal-00642345

J. Dormoy, O. Kouchnarenko, and A. Lanoix, Using Temporal Logic for Dynamic Reconfigurations of Components, FACS LNCS, vol.36, issue.1, pp.200-217, 2012.
DOI : 10.1007/3-540-45719-4_23

URL : https://hal.archives-ouvertes.fr/hal-00662875

J. Dormoy, O. Kouchnarenko, and A. Lanoix, When Structural Refinement of Components Keeps Temporal Properties over Reconfigurations, FM 2012: Formal Methods, pp.171-186, 2012.
DOI : 10.1007/978-3-642-32759-9_16

M. B. Dwyer, G. S. Avrunin, and J. C. Corbett, Patterns in property specifications for finite-state verification, pp.411-420, 1999.

Y. Falcone, M. Jaber, T. H. Nguyen, M. Bozga, and S. Bensalem, Runtime Verification of Component-Based Systems, In: Software Engineering and Formal Methods, vol.15, pp.204-220, 2011.
DOI : 10.1007/978-3-642-16901-4_29

URL : https://hal.archives-ouvertes.fr/hal-00642969

Y. Falcone, J. C. Fernandez, and L. Mounier, Runtime Verification of Safety-Progress Properties, Runtime Verification, pp.40-59, 2009.
DOI : 10.1137/0201010

URL : https://hal.archives-ouvertes.fr/hal-00420487

L. Gonnord and J. P. Babau, Quantity of resource properties expression and runtime assurance for embedded systems, 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp.428-435, 2009.
DOI : 10.1109/AICCSA.2009.5069360

URL : https://hal.archives-ouvertes.fr/inria-00349918

A. G. Hamilton, Logic for mathematicians, 1978.

A. Jantsch, Modeling Embedded Systems and SoC's: Concurrency and Time in Models of Computation, 2004.

K. Kähkönen, J. Lampinen, K. Heljanko, and I. Niemelä, The lime interface specification language and runtime monitoring tool, pp.93-100, 2009.

M. Kim, I. Lee, J. Shin, and O. Sokolsky, Monitoring, Checking, and Steering of Real-Time Systems, Electronic Notes in Theoretical Computer Science, vol.70, issue.4, pp.95-111, 2002.
DOI : 10.1016/S1571-0661(04)80579-6

A. Lanoix, J. Dormoy, and O. Kouchnarenko, Combining Proof and Model-checking to Validate Reconfigurable Architectures, Electronic Notes in Theoretical Computer Science, vol.279, issue.2, pp.43-57, 2011.
DOI : 10.1016/j.entcs.2011.11.011

URL : https://hal.archives-ouvertes.fr/hal-00642348

J. Ligatti, L. Bauer, and D. Walker, Run-Time Enforcement of Nonsafety Policies, ACM Transactions on Information and System Security, vol.12, issue.3, pp.1-1941, 2009.
DOI : 10.1145/1455526.1455532

J. Ligatti, L. Bauer, and D. Walker, Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005.
DOI : 10.1007/s10207-004-0046-8

Z. Manna and A. Pnueli, A hierarchy of temporal properties, Proceedings of the sixth annual ACM Symposium on Principles of distributed computing , PODC '87, pp.377-410, 1989.
DOI : 10.1145/41840.41857

L. Seinturier, P. Merle, R. Rouvoy, D. Romero, V. Schiavoni et al., A component-based middleware platform for reconfigurable service-oriented architectures, Software: Practice and Experience, vol.2, issue.5, pp.559-583, 2012.
DOI : 10.1002/spe.1077

URL : https://hal.archives-ouvertes.fr/inria-00567442

K. Trentelman and M. Huisman, Extending JML Specifications with Temporal Logic, AMAST 2002, pp.334-348, 2002.
DOI : 10.1007/3-540-45719-4_23