Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 15 Oct 2024Bibliometrics
Skip Table Of Content Section
research-article
Introduction to the Special Issue on Runtime Verification
Abstract

Runtime verification (RV) refers to methods for formal reasoning about all aspects of the dynamic execution of systems, including hardware, software, and cyber-physical systems. RV includes techniques to assess and enforce correctness of a system ...

research-article
Program analysis using empirical abstraction
Abstract

Given a program analysis problem that consists of a program and a property of interest, we use an empirical approach to automatically construct a sequence of abstractions that approach an ideal abstraction suitable for solving that problem. This ...

research-article
Efficient and expressive bytecode-level instrumentation for Java programs
Abstract

We present an efficient and expressive tool for the instrumentation of Java programs at the bytecode level. BISM (Bytecode-Level Instrumentation for Software Monitoring) is a lightweight Java bytecode instrumentation tool that features an ...

research-article
Concurrent runtime verification of data rich events
Abstract

This paper presents the open-source runtime verification tool MESA (MEssage-based System Analysis), implemented in Scala, which supports concurrent monitors using the Actor model. Furthermore, the tool supports indexing (slicing) on the data ...

research-article
MoonLight: a lightweight tool for monitoring spatio-temporal properties
Abstract

We present MoonLight, a tool for monitoring temporal and spatio-temporal properties of mobile, spatially distributed, and interacting entities such as biological and cyber-physical systems. In MoonLight the space is represented as a weighted graph ...

research-article
Introduction to the Special Issue on Runtime Verification
Abstract

Runtime verification (RV) refers to methods for formal reasoning about all aspects of the dynamic execution of systems, including hardware, software, and cyber-physical systems. RV includes techniques to assess and enforce correctness of a system ...

research-article
Diamont: dynamic monitoring of uncertainty for distributed asynchronous programs
Abstract

Many application domains including graph analytics, the Internet-of-Things, precision agriculture, and media processing operate on noisy data and/or produce approximate results. These applications can distribute computation across multiple (often ...

research-article
Predicate monitoring in distributed cyber-physical systems
Abstract

This paper solves the problem of detecting violations of predicates over distributed continuous-time and continuous-valued signals in cyber-physical systems (CPS). CPS often operate in a safety-critical context, where their correctness is ...

research-article
A compositional framework for algebraic quantitative online monitoring over continuous-time signals
Abstract

We investigate online monitoring algorithms over dense-time and continuous-time signals for properties written in metric temporal logic (MTL). We consider an abstract algebraic semantics based on complete lattices. This semantics includes as ...

research-article
Into the unknown: active monitoring of neural networks (extended version)
Abstract

Neural-network classifiers achieve high accuracy when predicting the class of an input that they were trained to identify. Maintaining this accuracy in dynamic environments, where inputs frequently fall outside the fixed set of initially known ...

research-article
Monitoring with verified guarantees
Abstract

Runtime monitoring is generally considered a light-weight alternative to formal verification. In safety-critical systems, however, the monitor itself is a critical component. For example, if the monitor is responsible for initiating emergency ...

Comments