LEADER 02884nam 2200577 450 001 996466242003316 005 20220504144114.0 010 $a3-540-89247-8 024 7 $a10.1007/978-3-540-89247-2 035 $a(CKB)1000000000490938 035 $a(SSID)ssj0000319893 035 $a(PQKBManifestationID)11224634 035 $a(PQKBTitleCode)TC0000319893 035 $a(PQKBWorkID)10338998 035 $a(PQKB)10239736 035 $a(DE-He213)978-3-540-89247-2 035 $a(MiAaPQ)EBC3063595 035 $a(MiAaPQ)EBC6706046 035 $a(Au-PeEL)EBL6706046 035 $a(PPN)130186074 035 $a(EXLCZ)991000000000490938 100 $a20220504d2008 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aRuntime verification $e8th international workshop, RV 2008, Budapest, Hungary, March 30, 2008 : selected papers /$fMartin Leucker (editor) 205 $a1st ed. 2008. 210 1$aBerlin ;$aHeidelberg ;$aNew York :$cSpringer,$d[2008] 210 4$dİ2008 215 $a1 online resource (VII, 189 p.) 225 1 $aLecture notes in computer science ;$v5289 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-89246-X 320 $aIncludes bibliographical references and index. 327 $aA Smell of Orchids -- Runtime Certification -- Model-Based Run-Time Checking of Security Permissions Using Guarded Objects -- Synthesizing Monitors for Safety Properties: This Time with Calls and Returns -- Forays into Sequential Composition and Concatenation in Eagle -- Checking Traces for Regulatory Conformance -- Deadlocks: From Exhibiting to Healing -- A Scalable, Sound, Eventually-Complete Algorithm for Deadlock Immunity -- Property Patterns for Runtime Monitoring of Web Service Conversations -- Runtime Monitoring of Object Invariants with Guarantee -- A Lightweight Container Architecture for Runtime Verification. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Runtime Verification, RV 2008, held in Budapest, Hungary, in March 2008 as satellite event of ETAPS 2008. The 9 revised full papers presented together with 2 invited papers were carefully selected from 27 initial submissions. The subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security and safety matters. 410 0$aLecture notes in computer science ;$v5289. 606 $aFormal methods (Computer science)$vCongresses 615 0$aFormal methods (Computer science) 676 $a004.0151 702 $aLeucker$b Martin 712 12$aRV 2008 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466242003316 996 $aRuntime Verification$9772115 997 $aUNISA