-
1
-
-
84944202148
-
Rule-based runtime verification
-
Verification, Model Checking, and Abstract Interpretation
-
Barringer, H., Goldberg, A., Havelund, K. and Sen, K. (2004) Rule-Based Runtime Verification. 5th Int. Conf. on Verification, Model Checking and Abstract Interpretation, LNCS 2937, Springer, pp. 44-57. (Pubitemid 38131366)
-
(2003)
Lecture Notes in Computer Science
, Issue.2937
, pp. 44-57
-
-
Barringer, H.1
Goldberg, A.2
Havelund, K.3
Sen, K.4
-
2
-
-
84877292372
-
Event-based runtime verification of java programs
-
St. Louis, MO. . ACM Press, NY.
-
d'Amorim, M. and Havelund, K. (2005) Event-based Runtime Verification of Java Programs. Proc. 3rd Int. Workshop on Dynamic Analysis, St. Louis, MO. pp. 1-7. ACM Press, NY.
-
(2005)
Proc. 3rd Int. Workshop on Dynamic Analysis
, pp. 1-7
-
-
D'amorim, M.1
Havelund, K.2
-
3
-
-
11144354549
-
An overview of the runtime verification tool Java PathExplorer
-
Havelund, K. and Rosu, G. (2004) An overview of the runtime verification tool Java PathExplorer. Methods in System Design, 24, 189-215.
-
(2004)
Methods in System Design
, vol.24
, pp. 189-215
-
-
Havelund, K.1
Rosu, G.2
-
4
-
-
33747106192
-
Non-intrusive monitoring of service-based systems
-
DOI 10.1142/S0218843006001384, PII S0218843006001384
-
Spanoudakis, G. and Mahub, K. (2006) Non-intrusive monitoring of service based systems. Int. J. Coop. Inf. Syst., 15, 325-358. (Pubitemid 44221751)
-
(2006)
International Journal of Cooperative Information Systems
, vol.15
, Issue.3
, pp. 325-358
-
-
Spanoudakis, G.1
Mahbub, K.2
-
5
-
-
35248828504
-
Aspect-oriented programming
-
ECOOP'97 - Object-Oriented Programming
-
Kiczales, G. and Lampig, J. (1997) Aspect-Oriented Programming. In Aksit, M. and Matsuika, S. (eds) Lecture Notes in Computer Science 1241, pp. 220-242. Xerox Palo Alto Research Center. (Pubitemid 127083932)
-
(1997)
Lecture Notes in Computer Science
, Issue.1241
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.5
Loingtier, J.-M.6
Irwin, J.7
-
6
-
-
18944375047
-
Towards monitoring-oriented programming: A paradigm combining specification and implementation
-
Elsevier
-
Chen, F. and Rosu. (2003) Towards Monitoring-Oriented Programming: A Paradigm Combining Specification and Implementation. Electronic Notes in Theoretical Computer Science 89, No. 2, Elsevier.
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.89
, Issue.2
-
-
Chen, F.1
Rosu2
-
7
-
-
34547435524
-
Jnuke: Efficient dynamic analysis for java
-
Boston, MA. LNCS 3114. Springer-Verlag.
-
Artho, C., Schuppan, V., Biere, A., Eugster, P., Baur, M. and Zweimuller, B. (2004) JNuke: Efficient Dynamic Analysis for Java. Proc. 16th Int. Conf. Computer Aided Verification, Boston, MA. LNCS 3114, pp. 462-465. Springer-Verlag.
-
(2004)
Proc. 16th Int. Conf. Computer Aided Verification
, pp. 462-465
-
-
Artho, C.1
Schuppan, V.2
Biere, A.3
Eugster, P.4
Baur, M.5
Zweimuller, B.6
-
8
-
-
85047040703
-
The temporal logic of programs
-
Los Alamitos, CA. . IEEE Computer Society.
-
Pnueli. A. (1977) The Temporal Logic of Programs. Proc. 18th IEEE Symp. Foundations of Computer Science, Los Alamitos, CA. pp. 46-77. IEEE Computer Society.
-
(1977)
Proc. 18th IEEE Symp. Foundations of Computer Science
, pp. 46-77
-
-
Pnueli, A.1
-
9
-
-
84947290593
-
The temporal rover and theatg rover
-
Havelund, K., Penix, J. andVisser,W. (eds) LNCS 1885. Springer.
-
Drusinsky, D. (2000) The Temporal Rover and theATG Rover. In Havelund, K., Penix, J. andVisser,W. (eds) SPIN Model Checking and Software Verification, LNCS 1885, pp. 323-330. Springer.
-
(2000)
SPIN Model Checking and Software Verification
, pp. 323-330
-
-
Drusinsky, D.1
-
10
-
-
0027969856
-
Compositional verification of real-time systems
-
Paris (France). . IEEE Computer Society Press.
-
Chang, E., Pnueli, A. and Manna, Z. (1994) Compositional Verification of Real-Time Systems. Proc. 9th IEEE Symp. Logic in Computer Science, Paris (France). pp. 458-465. IEEE Computer Society Press.
-
(1994)
Proc. 9th IEEE Symp. Logic in Computer Science
, pp. 458-465
-
-
Chang, E.1
Pnueli, A.2
Manna, Z.3
-
11
-
-
80455164429
-
Generating optimal monitors for extended regular expressions
-
Boulder, CO, USA. . Elsevier Science.
-
Sen, K. and Rosu, G. (2003) Generating Optimal Monitors for Extended Regular Expressions. Proc. 3rd Int. Workshop on Runtim Verification, Boulder, CO, USA. pp. 162-181. Elsevier Science.
-
(2003)
Proc. 3rd Int. Workshop on Runtim Verification
, pp. 162-181
-
-
Sen, K.1
Rosu, G.2
-
12
-
-
0009902282
-
Monitoring java programs with java pathexplorer
-
Paris (France). . Elsevier Science.
-
Havelund, K. and Rosu, G. (2001) Monitoring Java Programs with Java PathExplorer. 1st Int. Workshop on Runtime Verification, Paris (France). pp. 97-114. Elsevier Science.
-
(2001)
1st Int. Workshop on Runtime Verification
, pp. 97-114
-
-
Havelund, K.1
Rosu, G.2
-
13
-
-
85116922800
-
Monitoring programs using rewriting
-
San Diego, USA. . Institute of Electrical and Electronics Engineers. Institue of Electrical and Electronics Engineers.
-
Havelund, K. and Rosu, G. (2001). Monitoring Programs using Rewriting. Proc. Int. Conf. on Automated Software Engineering (ASE'01), San Diego, USA. pp. 135-143. Institute of Electrical and Electronics Engineers. Institue of Electrical and Electronics Engineers.
-
(2001)
Proc. Int. Conf. on Automated Software Engineering (ASE'01)
, pp. 135-143
-
-
Havelund, K.1
Rosu, G.2
-
15
-
-
84864673555
-
The maude system
-
Int. Conf. on Parallel and Distributed Processing Techniques and Applications, Las Vegas (USA)
-
Clavel, M., Durán, F.J., Eker, S., Lincoln Martí-Oliet, N., Meseguer, J. and Quesada, K.F. (1999) The Maude System. Proc. 10th Int. Conf. on Rewriting Techniques. Int. Conf. on Parallel and Distributed Processing Techniques and Applications, Las Vegas (USA).
-
(1999)
Proc. 10th Int. Conf. on Rewriting Techniques.
-
-
Clavel, M.1
Durán, F.J.2
Eker, S.3
Lincoln Martí-Oliet, N.4
Meseguer, J.5
Quesada, K.F.6
-
16
-
-
72849125151
-
Automata-based verification of temporal properties on running programs
-
Coronado Island, CA. ENTCS. IEEE Computer Society.
-
Giannakopoulou, D. and Havelund, K. (2001) Automata-Based Verification of Temporal Properties on Running Programs. Proc. Int. Conf. on Automated Software Engineering, Coronado Island, CA. pp. 412-416. ENTCS. IEEE Computer Society.
-
(2001)
Proc. Int. Conf. on Automated Software Engineering
, pp. 412-416
-
-
Giannakopoulou, D.1
Havelund, K.2
-
17
-
-
0003311357
-
Runtimeassurance based on formal specifications
-
Las Vegas (USA)
-
Lee, I., Kannan, S., Kim, M., Sokolsky, O. and Viswanathan, M. (1999) RuntimeAssurance Based on Formal Specifications. Proc. Int. Conf. on Parallel and Distributed Processing Techniques and Applications. Las Vegas (USA).
-
(1999)
Proc. Int. Conf. on Parallel and Distributed Processing Techniques and Applications
-
-
Lee, I.1
Kannan, S.2
Kim, M.3
Sokolsky, O.4
Viswanathan, M.5
-
18
-
-
19144373771
-
Java-mac: A runtime assurance tool for for java programs
-
Elsevier Science Publishers
-
Kim, M., Kannan, S., Lee, I., Sokolsky, O. and Viswanathan, M. (2001) Java-mac: A Runtime Assurance Tool for for Java Programs. Electronic Notes in Theoretical Computer Science, Vol. 55. Elsevier Science Publishers.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.55
-
-
Kim, M.1
Kannan, S.2
Lee, I.3
Sokolsky, O.4
Viswanathan, M.5
-
20
-
-
1642497296
-
-
Artificial Intelligence Today, LNAI 1600. Springer-Verlag.
-
Shanahan, M. (1999) The Event Calculus Explained. Artificial Intelligence Today, LNAI 1600, pp. 409-430. Springer-Verlag.
-
(1999)
The Event Calculus Explained
, pp. 409-430
-
-
Shanahan, M.1
-
22
-
-
84948681435
-
Monitoring software requirements using instrumented code
-
Big Island (Hawaii)
-
Robinson. W. (2002) Monitoring Software Requirements using Instrumented Code. Proc. Hawaii Int. Conf. on Systems Sciences, Big Island (Hawaii).
-
(2002)
Proc. Hawaii Int. Conf. on Systems Sciences
-
-
Robinson, W.1
-
23
-
-
0027574423
-
Goaldirected requirements acquisition
-
Dardenne, A., van Lamsweerde, A. and Fickas, S. (1993) Goaldirected requirements acquisition. Sci. Comput. Program., 20, pp. 3-50.
-
(1993)
Sci. Comput. Program.
, vol.20
, pp. 3-50
-
-
Dardenne, A.1
Van Lamsweerde, A.2
Fickas, S.3
-
24
-
-
85027197002
-
Reconciling system requirements and runtime behaviour
-
Mie (Japan)
-
Feather, M.S., Fickas, S., van Lamsweerde, A. and Ponsard, C. (1998) Reconciling System Requirements and Runtime Behaviour. Proc. 9th Int. Work. on Software Specification & Design, Mie (Japan).
-
(1998)
Proc. 9th Int. Work. on Software Specification & Design
-
-
Feather, M.S.1
Fickas, S.2
Van Lamsweerde, A.3
Ponsard, C.4
-
25
-
-
24644441365
-
Fault diagnosis using timed automata
-
Foundations of Software Science and Computational Structures - 8th Int. Conference, FOSSACS 2005, held as part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Proc.
-
Bouyer, P., Chevalier, F. and D'Souza, D. (2005) Fault Diagnosis using Timed Automata. Proc. 8th Int. Conf. on Foundations of Software Science and Computations Structures, Edinburg (UK). LNCS 3441, pp. 219-233. Springer. (Pubitemid 41273709)
-
(2005)
Lecture Notes in Computer Science
, vol.3441
, pp. 219-233
-
-
Bouyer, P.1
Chevalier, F.2
D'Souza, D.3
-
27
-
-
16244391819
-
A formal framework for the decentralised diagnosis of large scale discrete event systems & its application to telecommunication networks
-
Pencolé, Y. and Cordier, M. (2005) A formal framework for the decentralised diagnosis of large scale discrete event systems & its application to telecommunication networks. Artif. Intell., 164, 121-180.
-
(2005)
Artif. Intell.
, vol.164
, pp. 121-180
-
-
Pencolé, Y.1
Cordier, M.2
-
28
-
-
0030109707
-
Failure diagnosis using discrete-event models
-
PII S1063653696020702
-
Sampath, M., Sengupta, R., Lafortune, S., Sinnamohideen, K. and Teneketzis, D.C. (1996) Failure Diagnosis using Dicrete-Event Models. IEEE Trans. Control Syst. Technol., 4, 105-124. (Pubitemid 126782836)
-
(1996)
IEEE Transactions on Control Systems Technology
, vol.4
, Issue.2
, pp. 105-124
-
-
Sampath, M.1
Sengupta, R.2
Lafortune, S.3
Sinnamohideen, K.4
Teneketzis, D.C.5
-
30
-
-
85028755887
-
A determinizable class of timed automata
-
Stanford (USA). LNCS 818. Springer.
-
Alur, R., Fix, L. and Henziger, T.A. (1994) A Determinizable Class of Timed Automata. Proc. 6th Conf. on Computer Aided Verification, Stanford (USA). LNCS 818, pp. 1-13. Springer.
-
(1994)
Proc. 6th Conf. on Computer Aided Verification
, pp. 1-13
-
-
Alur, R.1
Fix, L.2
Henziger, T.A.3
-
33
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
Oakland (USA) . IEEE Society Press.
-
Ko, C., Ruschitzka, M. and Levitt, K. (1997) Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. IEEE Symp. on Security and Privacy, Oakland (USA). pp. 175-187. IEEE Society Press.
-
(1997)
IEEE Symp. on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
35
-
-
0023558367
-
Recognizing safety and liveness
-
Alpern, B. and Schneider, F.B. (1987) Recognizing safety and liveness. Distrib. Comput., 2, 117-126.
-
(1987)
Distrib. Comput.
, vol.2
, pp. 117-126
-
-
Alpern, B.1
Schneider, F.B.2
-
36
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
DOI 10.1007/s10207-004-0046-8
-
Ligatti, J., Bauer, L. and Walker, D. (2005) Edit Automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur., 4, 2-16. (Pubitemid 40347198)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
37
-
-
84856202162
-
Using event calculus to formalise policy specification and analysis
-
POLICY, Lake Como (Italy) . IEEE Computer Society.
-
Bandara, A.K., Lupu, E.C. and Russo, A. (2003) Using Event Calculus to Formalise Policy Specification and Analysis. Proc. Policies for Distributed Systems and Networks, POLICY, Lake Como (Italy). pp. 26-39. IEEE Computer Society.
-
(2003)
Proc. Policies for Distributed Systems and Networks
, pp. 26-39
-
-
Bandara, A.K.1
Lupu, E.C.2
Russo, A.3
-
38
-
-
84864673560
-
-
Presented at 18th Int. Conf. on Logic Programming, Copenhaguen (Denmark)
-
Russo, A., Miller, A., Nuseibeh, B., and Kramer, J. (2002) An Abductive Approach for Analysing Event-Based Requirements Specifications. Presented at 18th Int. Conf. on Logic Programming, Copenhaguen (Denmark).
-
(2002)
An Abductive Approach for Analysing Event-Based Requirements Specifications
-
-
Russo, A.1
Miller, A.2
Nuseibeh, B.3
Kramer, J.4
-
39
-
-
84864646673
-
-
Workshop on Defense Applications of Multi-Agent Systems, Utrecht (The Netherlands)
-
Janicke, H., Siewe, K., Jones, F., Cau, A. and Zedan, H. (2005) Analysis and Run-timeVerification of Dynamic Security Policies. Workshop on Defense Applications of Multi-Agent Systems, Utrecht (The Netherlands).
-
(2005)
Analysis and Run-timeVerification of Dynamic Security Policies
-
-
Janicke, H.1
Siewe, K.2
Jones, F.3
Cau, A.4
Zedan, H.5
-
40
-
-
18944370080
-
The programming language tempura
-
Moszkowski, B. (1996) The programming language Tempura. J. Symb. Comput., 22, 730-733.
-
(1996)
J. Symb. Comput.
, vol.22
, pp. 730-733
-
-
Moszkowski, B.1
-
41
-
-
84864718743
-
-
Appeared inWorkshop on Security, Middleware, and Languages, Stockholm
-
Brisset, P. (2000) A Case Study in Java Software Verification. Appeared inWorkshop on Security, Middleware, and Languages, Stockholm.
-
(2000)
A Case Study in Java Software Verification
-
-
Brisset, P.1
-
42
-
-
21644444136
-
-
ACM Symp. Operating Systems Principles, Bolton Landing (USA)
-
Sekar, R., Venkatakrishnan, V.N., Basu, S., Bhatkar, S. and Du Varney, D. (2003) Model-Carrying Code: A Practical Approach for Safe Execution of Untrusted Applications. ACM Symp. Operating Systems Principles, Bolton Landing (USA).
-
(2003)
Model-Carrying Code: A Practical Approach for Safe Execution of Untrusted Applications
-
-
Sekar, R.1
Venkatakrishnan, V.N.2
Basu, S.3
Bhatkar, S.4
Du Varney, D.5
-
43
-
-
84864700338
-
-
Presented at Policy, in Workshop on Policies for Distributed Systems and Networks, Bristol (UK)
-
Damianou, N., Dulay, N., Lupu, E.C. and Sloman, M.S. (2001) The Ponder Policy Specification Language. Presented at Policy, in Workshop on Policies for Distributed Systems and Networks, Bristol (UK).
-
(2001)
The Ponder Policy Specification Language
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.C.3
Sloman, M.S.4
-
44
-
-
0005371811
-
Reflective middleware solutions for context-aware applications
-
Yonezawa,A. and Matsuoka, S. (eds) , Kyoto (Japan). LNCS 2192. Springer.
-
Capra, L., Emmerich, W. and Mascolo, C. (2001) Reflective Middleware Solutions for Context-Aware Applications. In Yonezawa,A. and Matsuoka, S. (eds) Proc. Reflection.The 3rd Int. Conf. on Meta-level Architectures and Separation of Crosscutting Concerns, Kyoto (Japan). LNCS 2192. Springer.
-
(2001)
Proc. Reflection.The 3rd Int. Conf. on Meta-level Architectures and Separation of Crosscutting Concerns
-
-
Capra, L.1
Emmerich, W.2
Mascolo, C.3
-
45
-
-
0242579167
-
Carisma: Context aware reflective middleware system for mobile applications
-
Capra, L., Emmerich, W. and Mascolo, C. (2003) CARISMA: context aware reflective middleware system for mobile applications. IEEE Trans. Softw. Eng., 29, 929-945.
-
(2003)
IEEE Trans. Softw. Eng.
, vol.29
, pp. 929-945
-
-
Capra, L.1
Emmerich, W.2
Mascolo, C.3
-
46
-
-
0036282017
-
XMIDDLE: A data-sharing middleware for mobile computing
-
DOI 10.1023/A:1015584805733
-
Mascolo, C., Capra, L., Zachariadis, S. and Emmerich,W. (2002) XMIDDLE:A Data-Sharing Middleware for Mobile Computing. Int. J. Wirel. Pers. Commun., 21, pp. 77-103. Kluwer Academic Publisher. (Pubitemid 34630509)
-
(2002)
Wireless Personal Communications
, vol.21
, Issue.1
, pp. 77-103
-
-
Mascolo, C.1
Capra, L.2
Zachariadis, S.3
Emmerich, W.4
-
47
-
-
29844451140
-
Jassda trace assertions, runtime checking the dynamic of java programs
-
Schieferdecker, I., König, H. and Wolisz, A. (eds) . Berlin, Germany.
-
Brörkens, M. and Möller, M. (2002) Jassda Trace Assertions, Runtime Checking the Dynamic of Java Programs. In Schieferdecker, I., König, H. and Wolisz, A. (eds) Trends in Testing Communicating Systems, pp. 39-48. Berlin, Germany.
-
(2002)
Trends in Testing Communicating Systems
, pp. 39-48
-
-
Brörkens, M.1
Möller, M.2
-
49
-
-
0347807097
-
-
Formal Techniques for Java-like Programs.Technical Reports from ETH Zurich 408. ETH Zurich, Switzerland
-
Goldberg, A. and Havelund, K. (2003) Instrumentation of Java Bytecode for Runtime Analysis. Formal Techniques for Java-like Programs.Technical Reports from ETH Zurich 408. ETH Zurich, Switzerland.
-
(2003)
Instrumentation of Java Bytecode for Runtime Analysis
-
-
Goldberg, A.1
Havelund, K.2
-
51
-
-
0141641166
-
-
Technical Report CMU-CS-96-165. Carnegie Mellon University, Noviembre
-
Necula, G. and Lee, P. (1996) Proof-Carrying Code. Technical Report CMU-CS-96-165. Carnegie Mellon University, Noviembre.
-
(1996)
Proof-Carrying Code
-
-
Necula, G.1
Lee, P.2
|