Sciweavers

194 search results - page 6 / 39
» Rule-Based Runtime Verification
Sort
View
RV
2010
Springer
153views Hardware» more  RV 2010»
13 years 7 months ago
Run-Time Verification of Networked Software
Most applications that are in use today inter-operate with other applications, so-called peers, over a network. The analysis of such distributed applications requires that the effe...
Cyrille Valentin Artho
FORMATS
2009
Springer
14 years 1 months ago
Safe Runtime Verification of Real-Time Properties
Abstract. Introducing a monitor on a system typically changes the system's behaviour by slowing the system down and increasing memory consumption. This may possibly result in ...
Christian Colombo, Gordon J. Pace, Gerardo Schneid...
ISSA
2004
13 years 11 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
LOGCOM
2010
128views more  LOGCOM 2010»
13 years 4 months ago
Comparing LTL Semantics for Runtime Verification
When monitoring a system wrt. a property defined in a temporal logic such as LTL, a major concern is to settle with an adequate interpretation of observable system events; that is,...
Andreas Bauer 0002, Martin Leucker, Christian Scha...
FMCAD
2009
Springer
14 years 4 months ago
MCC: A runtime verification tool for MCAPI user applications
Subodh Sharma, Ganesh Gopalakrishnan, Eric Mercer,...