Runtime Verification
Springer Berlin (Verlag)
978-3-642-29859-2 (ISBN)
Tutorials.-Internal versus External DSLs for Trace Analysis (Extended Abstract).-Predicting Concurrency Failures in the Generalized Execution Traces of x86 Executables.-Runtime Monitoring of Time-Sensitive Systems [Tutorial Supplement] .-Teaching Runtime Verification.-Invited.-Runtime Verification: A Computer Architecture Perspective.-A: Parallelism and Deadlocks Isolating Determinism in Multi-threaded Programs.-Efficiency Optimizations for Implementations of Deadlock Immunity.-Permission Regions for Race-Free Parallelism.-Dynamic Race Detection with LLVM Compiler: Compile-Time Instrumentation for ThreadSanitizer.-B: Malware Detection NORT: Runtime Anomaly-Based Monitoring of Malicious Behavior for Windows.-C: Temporal Constraints and Concurrency Bugs Runtime Verification of LTL-Based Declarative Process Models.-Parametric Identification of Temporal Properties.-Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs.-Coverage Metrics for Saturation-Based and Search-Based Testing of Concurrent Software.-D: Sampling and Specification Conformance Runtime Verification with State Estimation.-Efficient Techniques for Near-Optimal Instrumentation in Time-Triggered Runtime Verification.-CoMA: Conformance Monitoring of Java Programs by Abstract State Machines.-Automated Test-Trace Inspection for Microcontroller Binary Code.-Invited What Is My Program Doing? Program Dynamics in Programmer's Terms.-E: Real-Time Algorithms for Monitoring Real-Time Properties .-F: Software and Hardware Systems Runtime Monitoring of Stochastic Cyber-Physical Systems with Hybrid State .-Combining Time and Frequency Domain Specifications for Periodic Signals .-Runtime Verification for Ultra-Critical Systems.-Runtime Verification of Data-Centric Properties in Service Based Systems.-Invited Cooperative Concurrency for a Multicore World (Extended Abstract) .-G: Memory Transactions Monitoring Data Structures UsingHardware Transactional Memory.-Tools MONPOLY: Monitoring Usage-Control Policies.-MOPBox: A Library Approach to Runtime Verification (Tool Demonstration).-Elarva: A Monitoring Tool for Erlang.-DA-BMC: A Tool Chain Combining Dynamic Analysis and Bounded Model Checking.-H: Foundational Techniques and Multi-valued Approaches I Monitoring Finite State Properties: Algorithmic Approaches and Their Relative Strengths.-Unbounded Symbolic Execution for Program Verification.-Execution Trace Exploration and Analysis Using Ontologies.- I: Foundational Techniques and Multi-valued Approaches II.-Monitoring Realizability.-Runtime Verification of Traces under Recording Uncertainty.-
| Erscheint lt. Verlag | 11.5.2012 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Programming and Software Engineering |
| Zusatzinfo | XII, 458 p. 69 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Gewicht | 708 g |
| Themenwelt | Mathematik / Informatik ► Informatik ► Programmiersprachen / -werkzeuge |
| Mathematik / Informatik ► Informatik ► Software Entwicklung | |
| Informatik ► Theorie / Studium ► Algorithmen | |
| Schlagworte | Algorithm analysis and problem complexity • Concurrent Object-Oriented Programming • hardware transactional memory • Optimization • Run-time Verification • Visualization |
| ISBN-10 | 3-642-29859-1 / 3642298591 |
| ISBN-13 | 978-3-642-29859-2 / 9783642298592 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich