Runtime verification for decentralised and distributed systems
This chapter surveys runtime verification research related to distributed systems. We report
solutions that study how to monitor system with some distributed characteristic, solutions that …
solutions that study how to monitor system with some distributed characteristic, solutions that …
Introduction to runtime verification
The aim of this chapter is to act as a primer for those wanting to learn about Runtime
Verification (RV). We start by providing an overview of the main specification languages …
Verification (RV). We start by providing an overview of the main specification languages …
A survey of statistical model checking
Interactive, distributed, and embedded systems often behave stochastically, for example,
when inputs, message delays, or failures conform to a probability distribution. However …
when inputs, message delays, or failures conform to a probability distribution. However …
A survey of challenges for runtime verification from advanced application domains (beyond software)
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …
execution traces against formal specifications. Typically, the two main activities in runtime …
Run-time monitoring of instances and classes of web service compositions
The run-time monitoring of Web service compositions has been widely acknowledged as a
significant and challenging problem. In this paper, we propose a novel solution to the …
significant and challenging problem. In this paper, we propose a novel solution to the …
Run-time enforcement of nonsafety policies
A common mechanism for ensuring that software behaves securely is to monitor programs at
run time and check that they dynamically adhere to constraints specified by a security policy …
run time and check that they dynamically adhere to constraints specified by a security policy …
Proving non-termination
The search for proof and the search for counterexamples (bugs) are complementary
activities that need to be pursued concurrently in order to maximize the practical success …
activities that need to be pursued concurrently in order to maximize the practical success …
Smart monitors for composed services
Service-based approaches are widely used to integrate heterogenous systems. Web
services allow for the definition of highly dynamic systems where components (services) can …
services allow for the definition of highly dynamic systems where components (services) can …
Mc3d: Motion contrast 3d scanning
Structured light 3D scanning systems are fundamentally constrained by limited sensor
bandwidth and light source power, hindering their performance in real-world applications …
bandwidth and light source power, hindering their performance in real-world applications …
Cyber-physical systems and events
C Talcott - Software-Intensive Systems and New Computing …, 2008 - Springer
Cyber-Physical Systems and Events Page 1 Cyber-Physical Systems and Events Carolyn Talcott
SRI International Menlo Park, CA 94025-3493, USA clt@cs.stanford.edu Abstract. This paper …
SRI International Menlo Park, CA 94025-3493, USA clt@cs.stanford.edu Abstract. This paper …