LEADER 04588nam 22007095 450 001 996465976803316 005 20200703171357.0 010 $a3-319-67531-1 024 7 $a10.1007/978-3-319-67531-2 035 $a(CKB)4100000000587153 035 $a(DE-He213)978-3-319-67531-2 035 $a(MiAaPQ)EBC6301700 035 $a(MiAaPQ)EBC5590561 035 $a(Au-PeEL)EBL5590561 035 $a(OCoLC)1003646050 035 $a(PPN)204533708 035 $a(EXLCZ)994100000000587153 100 $a20170905d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRuntime Verification$b[electronic resource] $e17th International Conference, RV 2017, Seattle, WA, USA, September 13-16, 2017, Proceedings /$fedited by Shuvendu Lahiri, Giles Reger 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XIX, 432 p. 147 illus.) 225 1 $aProgramming and Software Engineering ;$v10548 311 $a3-319-67530-3 327 $aStream Runtime Monitoring on UAS -- Probabilistic Black-Box Reachability Checking -- Combining Symbolic Runtime Enforcers for Cyber-Physical Systems -- Almost Event-Rate Independent Monitoring of Metric Dynamic Logic -- Annotation Guided Collection of Context-Sensitive Parallel Execution Profiles -- Signal Clustering using Temporal Logics -- Space Efficient Breadth-First and Level Traversals of Consistent Global States of Parallel Programs -- Witnessing Network Transformations -- Combining Model Checking and Runtime Verification for Safe Robotics -- Monitoring Hyperproperties -- TeLEx: Passive STL Learning Using Only Positive Examples -- From Model Checking to Runtime Verification and Back Verifying Policy Enforcers -- Hierarchical Non-Intrusive In-Situ Requirements Monitoring for Embedded Systems -- Monitoring Partially Synchronous Distributed Systems using SMT Solvers -- Runtime Detection of Temporal Memory Errors -- Control Dependencies in Interpretive Systems -- Monitoring Time Intervals. 330 $aThis book constitutes the refereed proceedings of the 17th International Conference on Runtime Verification, RV 2017, held in Seattle, WA, USA, in September 2017. The 18 revised full papers presented together with 3 invited presentations, 4 short papers, 5 tool papers, and 3 tutorials, were carefully reviewed and selected from 58 submissions. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. Runtime verification techniques are lightweight techniques to assess correctness, reliability, and robustness; these techniques are significantly more powerful and versatile than conventional testing, and more practical than exhaustive formal verification. 410 0$aProgramming and Software Engineering ;$v10548 606 $aSoftware engineering 606 $aProgramming languages (Electronic computers) 606 $aComputer programming 606 $aComputer security 606 $aComputer system failures 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aProgramming Languages, Compilers, Interpreters$3https://scigraph.springernature.com/ontologies/product-market-codes/I14037 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 615 0$aSoftware engineering. 615 0$aProgramming languages (Electronic computers). 615 0$aComputer programming. 615 0$aComputer security. 615 0$aComputer system failures. 615 14$aSoftware Engineering. 615 24$aProgramming Languages, Compilers, Interpreters. 615 24$aProgramming Techniques. 615 24$aSystems and Data Security. 615 24$aSystem Performance and Evaluation. 676 $a004 702 $aLahiri$b Shuvendu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aReger$b Giles$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465976803316 996 $aRuntime Verification$9772115 997 $aUNISA