Buch, Englisch, Band 7186, 458 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 709 g
Second international Conference, RV 2011, San Francisco, USA, September 27-30, 2011, Revised Selected Papers
Buch, Englisch, Band 7186, 458 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 709 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-642-29859-2
Verlag: Springer
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011.
The 24 revised full papers presented together with 3 invited papers, 4 tutorials and 4 tool demonstrations were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on parallelism and deadlocks, malware detection, temporal constraints and concurrency bugs, sampling and specification conformance, real-time, software and hardware systems, memory transactions, tools; foundational techniques and multi-valued approaches.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Tutorials.-Internal versus External DSLs for Trace Analysis (Extended Abstract).-Predicting Concurrency Failures in the Generalized Execution Traces of x86 Executables.-Runtime Monitoring of Time-Sensitive Systems [Tutorial Supplement] .-Teaching Runtime Verification.-Invited.-Runtime Verification: A Computer Architecture Perspective.-A: Parallelism and Deadlocks Isolating Determinism in Multi-threaded Programs.-Efficiency Optimizations for Implementations of Deadlock Immunity.-Permission Regions for Race-Free Parallelism.-Dynamic Race Detection with LLVM Compiler: Compile-Time Instrumentation for ThreadSanitizer.-B: Malware Detection NORT: Runtime Anomaly-Based Monitoring of Malicious Behavior for Windows.-C: Temporal Constraints and Concurrency Bugs Runtime Verification of LTL-Based Declarative Process Models.-Parametric Identification of Temporal Properties.-Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs.-Coverage Metrics for Saturation-Based and Search-Based Testing of Concurrent Software.-D: Sampling and Specification Conformance Runtime Verification with State Estimation.-Efficient Techniques for Near-Optimal Instrumentation in Time-Triggered Runtime Verification.-CoMA: Conformance Monitoring of Java Programs by Abstract State Machines.-Automated Test-Trace Inspection for Microcontroller Binary Code.-Invited What Is My Program Doing? Program Dynamics in Programmer’s Terms.-E: Real-Time Algorithms for Monitoring Real-Time Properties .-F: Software and Hardware Systems Runtime Monitoring of Stochastic Cyber-Physical Systems with Hybrid State .-Combining Time and Frequency Domain Specifications for Periodic Signals .-Runtime Verification for Ultra-Critical Systems.-Runtime Verification of Data-Centric Properties in Service Based Systems.-Invited Cooperative Concurrency for a Multicore World (Extended Abstract) .-G: Memory Transactions Monitoring Data Structures UsingHardware Transactional Memory.-Tools MONPOLY: Monitoring Usage-Control Policies.-MOPBox: A Library Approach to Runtime Verification (Tool Demonstration).-Elarva: A Monitoring Tool for Erlang.-DA-BMC: A Tool Chain Combining Dynamic Analysis and Bounded Model Checking.-H: Foundational Techniques and Multi-valued Approaches I Monitoring Finite State Properties: Algorithmic Approaches and Their Relative Strengths.-Unbounded Symbolic Execution for Program Verification.-Execution Trace Exploration and Analysis Using Ontologies.- I: Foundational Techniques and Multi-valued Approaches II.-Monitoring Realizability.-Runtime Verification of Traces under Recording Uncertainty.-