Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJuly 2013
Reducing lookups for invariant checking
ECOOP'13: Proceedings of the 27th European conference on Object-Oriented ProgrammingJuly 2013, Pages 426–450https://doi.org/10.1007/978-3-642-39038-8_18This paper helps reduce the cost of invariant checking in cases where access to data is expensive. Assume that a set of variables satisfy a given invariant and a request is received to update a subset of them. We reduce the set of variables to inspect, ...
- articleJuly 2013
Verifying Cyber-Physical Interactions in Safety-Critical Systems
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 11, Issue 4July 2013, Pages 28–37https://doi.org/10.1109/MSP.2013.77Safety-compromising bugs in software-controlled systems are often hard to detect. In a 2007 DARPA Urban Challenge vehicle, such a defect remained hidden during more than 300 miles of test-driving and hours of extensive simulations, manifesting for the ...
- research-articleOctober 2008
Modeling of correct self-adaptive systems: a graph transformation system based approach
CSTST '08: Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technologyOctober 2008, Pages 508–516https://doi.org/10.1145/1456223.1456326Software is always embedded in a social and technical context which change over time and therefore also the software has to be adjusted over time to preserve its value. Self-adaptive systems provide a vision how the systems can become capable of doing a ...
- chapterApril 2006
Using queries for distributed monitoring and forensics
EuroSys '06: Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006April 2006, Pages 389–402https://doi.org/10.1145/1217935.1217973Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system - to detect and analyze bugs, test for regressions, identify fault-tolerance problems or security compromises - can be difficult and error-prone. In this ...
Also Published in:
ACM SIGOPS Operating Systems Review: Volume 40 Issue 4, October 2006 - ArticleMarch 2005
Passive testing – a constrained invariant checking approach
TestCom'05: Proceedings of the 17th IFIP TC6/WG 6.1 international conference on Testing of Communicating SystemsMarch 2005, Pages 9–22https://doi.org/10.1007/11430230_2Passive testing of a network protocol is the process of detecting faults in the protocol implementation by passively observing its input/output behaviors (execution trace) without interrupting the normal network operations. In observing the trace, we ...