Sciweavers

443 search results - page 5 / 89
» Compensation-Aware Runtime Monitoring
Sort
View
RSP
2007
IEEE
139views Control Systems» more  RSP 2007»
14 years 5 months ago
Verifying Distributed Protocols using MSC-Assertions, Run-time Monitoring, and Automatic Test Generation
This paper addresses the need for formal specification and runtime verification of system-level requirements of distributed reactive systems. It describes a formalism for specifyi...
Doron Drusinsky, Man-tak Shing
EDOC
2008
IEEE
14 years 19 days ago
Runtime Monitoring of Message-Based Workflows with Data
We present an algorithm for the runtime monitoring of business process properties with data parameterization. The properties are expressed in LTL-FO+ , an extension to traditional...
Sylvain Hallé, Roger Villemaire
PATMOS
2004
Springer
14 years 4 months ago
Run-Time Software Monitor of the Power Consumption of Wireless Network Interface Cards
Abstract. In this paper we present a new approach to power modeling and runtime power estimation for wireless network interface cards (WNICs). We obtain run-time power estimates by...
Emanuele Lattanzi, Andrea Acquaviva, Alessandro Bo...
ECOOP
2007
Springer
14 years 5 months ago
A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Our work is based on tracematches, an extension to...
Eric Bodden, Laurie J. Hendren, Ondrej Lhotá...
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 7 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee