Runtime verification for decentralised and distributed systems

A Francalanza, JA Pérez, C Sánchez - Lectures on Runtime Verification …, 2018 - Springer
This chapter surveys runtime verification research related to distributed systems. We report
solutions that study how to monitor system with some distributed characteristic, solutions that …

Introduction to runtime verification

E Bartocci, Y Falcone, A Francalanza… - Lectures on Runtime …, 2018 - Springer
The aim of this chapter is to act as a primer for those wanting to learn about Runtime
Verification (RV). We start by providing an overview of the main specification languages …

A survey of statistical model checking

G Agha, K Palmskog - ACM Transactions on Modeling and Computer …, 2018 - dl.acm.org
Interactive, distributed, and embedded systems often behave stochastically, for example,
when inputs, message delays, or failures conform to a probability distribution. However …

A survey of challenges for runtime verification from advanced application domains (beyond software)

C Sánchez, G Schneider, W Ahrendt, E Bartocci… - Formal Methods in …, 2019 - Springer
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …

Run-time monitoring of instances and classes of web service compositions

F Barbon, P Traverso, M Pistore… - 2006 IEEE International …, 2006 - ieeexplore.ieee.org
The run-time monitoring of Web service compositions has been widely acknowledged as a
significant and challenging problem. In this paper, we propose a novel solution to the …

Run-time enforcement of nonsafety policies

J Ligatti, L Bauer, D Walker - ACM Transactions on Information and …, 2009 - dl.acm.org
A common mechanism for ensuring that software behaves securely is to monitor programs at
run time and check that they dynamically adhere to constraints specified by a security policy …

Proving non-termination

A Gupta, TA Henzinger, R Majumdar… - Proceedings of the 35th …, 2008 - dl.acm.org
The search for proof and the search for counterexamples (bugs) are complementary
activities that need to be pursued concurrently in order to maximize the practical success …

Smart monitors for composed services

L Baresi, C Ghezzi, S Guinea - … of the 2nd international conference on …, 2004 - dl.acm.org
Service-based approaches are widely used to integrate heterogenous systems. Web
services allow for the definition of highly dynamic systems where components (services) can …

Mc3d: Motion contrast 3d scanning

N Matsuda, O Cossairt, M Gupta - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Structured light 3D scanning systems are fundamentally constrained by limited sensor
bandwidth and light source power, hindering their performance in real-world applications …

Cyber-physical systems and events

C Talcott - Software-Intensive Systems and New Computing …, 2008 - Springer
Cyber-Physical Systems and Events Page 1 Cyber-Physical Systems and Events Carolyn Talcott
SRI International Menlo Park, CA 94025-3493, USA clt@cs.stanford.edu Abstract. This paper …