Cantitate/Preț
Produs

Runtime Verification: Second international Conference, RV 2011, San Francisco, USA, September 27-30, 2011, Revised Selected Papers: Lecture Notes in Computer Science, cartea 7186

Editat de Koushik Sen, Sarfaz Khurshid
en Limba Engleză Paperback – 11 mai 2012
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011.The 24 revised full papers presented together with 3 invited papers, 4 tutorials and 4 tool demonstrations were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on parallelism and deadlocks, malware detection, temporal constraints and concurrency bugs, sampling and specification conformance, real-time, software and hardware systems, memory transactions, tools; foundational techniques and multi-valued approaches.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 33142 lei

Preț vechi: 41428 lei
-20% Nou

Puncte Express: 497

Preț estimativ în valută:
6342 6671$ 5283£

Carte tipărită la comandă

Livrare economică 03-17 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642298592
ISBN-10: 3642298591
Pagini: 472
Ilustrații: XII, 458 p. 69 illus.
Greutate: 0.66 kg
Ediția:2012
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Programming and Software Engineering

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Tutorials.-Internal versus External DSLs for Trace Analysis (Extended Abstract).-Predicting Concurrency Failures in the Generalized Execution Traces of x86 Executables.-Runtime Monitoring of Time-Sensitive Systems  [Tutorial Supplement] .-Teaching Runtime Verification.-Invited.-Runtime Verification: A Computer Architecture Perspective.-A: Parallelism and Deadlocks Isolating Determinism in Multi-threaded Programs.-Efficiency Optimizations for Implementations of Deadlock Immunity.-Permission Regions for Race-Free Parallelism.-Dynamic Race Detection with LLVM Compiler: Compile-Time Instrumentation for ThreadSanitizer.-B: Malware Detection NORT: Runtime Anomaly-Based Monitoring of Malicious Behavior for Windows.-C: Temporal Constraints and Concurrency Bugs Runtime Verification of LTL-Based Declarative Process Models.-Parametric Identification of Temporal Properties.-Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs.-Coverage Metrics for Saturation-Based and Search-Based Testing of Concurrent Software.-D: Sampling and Specification Conformance Runtime Verification with State Estimation.-Efficient Techniques for Near-Optimal Instrumentation in Time-Triggered Runtime Verification.-CoMA: Conformance Monitoring of Java Programs by Abstract State Machines.-Automated Test-Trace Inspection for Microcontroller Binary Code.-Invited What Is My Program Doing? Program Dynamics in Programmer’s Terms.-E: Real-Time Algorithms for Monitoring Real-Time Properties .-F: Software and Hardware Systems Runtime Monitoring of Stochastic Cyber-Physical Systems with Hybrid State .-Combining Time and Frequency Domain Specifications for Periodic Signals .-Runtime Verification for Ultra-Critical Systems.-Runtime Verification of Data-Centric Properties in Service Based Systems.-Invited Cooperative Concurrency for a Multicore World (Extended Abstract) .-G: Memory Transactions Monitoring Data Structures UsingHardware Transactional Memory.-Tools MONPOLY: Monitoring Usage-Control Policies.-MOPBox: A Library Approach to Runtime Verification (Tool Demonstration).-Elarva: A Monitoring Tool for Erlang.-DA-BMC: A Tool Chain Combining Dynamic Analysis and Bounded Model Checking.-H: Foundational Techniques and Multi-valued Approaches I Monitoring Finite State Properties: Algorithmic Approaches and Their Relative Strengths.-Unbounded Symbolic Execution for Program Verification.-Execution Trace Exploration and Analysis Using Ontologies.- I: Foundational Techniques and Multi-valued Approaches II.-Monitoring Realizability.-Runtime Verification of Traces under Recording Uncertainty.-

Textul de pe ultima copertă

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011.
The 24 revised full papers presented together with 3 invited papers, 4 tutorials and 4 tool demonstrations were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on parallelism and deadlocks, malware detection, temporal constraints and concurrency bugs, sampling and specification conformance, real-time, software and hardware systems, memory transactions, tools; foundational techniques and multi-valued approaches.

Caracteristici

Fast-track conference proceedings State-of-the-art research Up-to-date results