• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 120
Next 10 →

Synthesizing Monitors for Safety Properties – This Time With Calls and Returns –

by Feng Chen, Thomas Ball
"... Abstract. We present an extension of past time LTL with call/return atoms, called ptCaRet, together with a monitor synthesis algorithm for it. ptCaRet includes abstract variants of past temporal operators, which can express properties over traces in which terminated function or procedure executions ..."
Abstract - Cited by 12 (2 self) - Add to MetaCart
Abstract. We present an extension of past time LTL with call/return atoms, called ptCaRet, together with a monitor synthesis algorithm for it. ptCaRet includes abstract variants of past temporal operators, which can express properties over traces in which terminated function or procedure executions

D.: Impartiality and anticipation for monitoring of visibly context-free properties

by Normann Decker , Martin Leucker , Daniel Thoma - In: RV. LNCS , 2013
"... Abstract. We study monitoring of visibly context-free properties. These properties reflect the common concept of nesting which arises naturally in software systems. They can be expressed e.g. in the temporal logic CaRet which extends LTL by means of matching calls and returns. The future fragment o ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
Abstract. We study monitoring of visibly context-free properties. These properties reflect the common concept of nesting which arises naturally in software systems. They can be expressed e.g. in the temporal logic CaRet which extends LTL by means of matching calls and returns. The future fragment

The LIME Interface Specification Language and Runtime Monitoring Tool ⋆

by Kari Kähkönen, Jani Lampinen, Keijo Heljanko, Ilkka Niemelä
"... Abstract. This paper describes an interface specification language designed in the LIME project (LIME ISL) and the supporting runtime monitoring tool. The interface specification language is tailored for the Java programming language and supports two kinds of specifications: (i) call specifications ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
that specify requirements for the allowed call sequences to a Java object instance and (ii) return specifications that specify the allowed behaviors of the Java object instance. Both the call and return specifications can be expressed with Java annotations in several different ways: as past time LTL formulas

Event-based runtime verification of java programs

by Klaus Havelund - SIGSOFT Softw. Eng. Notes , 2005
"... We introduce the temporal logic HAWK and its supporting tool for runtime verification of Java programs. A monitor for a HAWK for-mula checks if a finite trace of program events satisfies the formula. HAWK is a programming-oriented extension of the rule-based EA-GLE logic that has been shown capable ..."
Abstract - Cited by 48 (8 self) - Add to MetaCart
of defining and implement-ing a range of finite trace monitoring logics, including future and past time temporal logic, metric (real-time) temporal logics, inter-val logics, forms of quantified temporal logics, extended regular expressions, state machines, and others. Monitoring is achieved on a state

Multi-Guarded Safe Zone: An Effective Technique to Monitor Moving Circular Range Queries

by Muhammad Aamir Cheema, Ljiljana Brankovic, Wenjie Zhang
"... Abstract — Given a positive value r, a circular range query returns the objects that lie within the distance r of the query location. In this paper, we study the circular range queries that continuously change their locations. We present an efficient and effective technique to monitor such moving ra ..."
Abstract - Cited by 21 (10 self) - Add to MetaCart
Abstract — Given a positive value r, a circular range query returns the objects that lie within the distance r of the query location. In this paper, we study the circular range queries that continuously change their locations. We present an efficient and effective technique to monitor such moving

DETERMINING THE CRITICAL NEW SNOW DEPTH FOR A DESTRUCTIVE AVALANCHE BY CON- SIDERING THE RETURN PERIOD

by Jürg Schweizer, Christoph Mitterer, Lukas Stoffel
"... ABSTRACT: Snow avalanche danger assessment for avalanche paths threatening a highway or a residential area is usually related to new snow depth. Given the extensive protection work in the Alps, the avalanche control service (also called avalanche commission) responsible for danger assessment will us ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
will usually monitor the avalanche situation throughout the winter, but only become active in case of a major snow fall. Related safety concepts describing the procedures and measures to be taken in a given danger situation are therefore typically based on threshold values for new snow. By analysing

M nite Attitudes to Property

by unknown authors
"... The ability of human beings to enjoy life on this earth is threatened at all times, in all places, by a simple fact: each human being must have access to the earth's limited physical resources. For this reason, questions of property- who has aright to own what and under what conditions- are fun ..."
Abstract - Add to MetaCart
The ability of human beings to enjoy life on this earth is threatened at all times, in all places, by a simple fact: each human being must have access to the earth's limited physical resources. For this reason, questions of property- who has aright to own what and under what conditions

ANY-TIME FUZZY CONTROLLER

by Edward Shmukler, Dr. Gal, A. Kaminka , 2006
"... Fuzzy logic has been successfully applied in various fields. However, as fuzzy controllers increase in size and complexity, the number of control rules increases exponentially and real-time behavior becomes more difficult. This thesis introduces an any-time fuzzy controller. Much work has been done ..."
Abstract - Add to MetaCart
Fuzzy logic has been successfully applied in various fields. However, as fuzzy controllers increase in size and complexity, the number of control rules increases exponentially and real-time behavior becomes more difficult. This thesis introduces an any-time fuzzy controller. Much work has been done

A Theory of Runtime Enforcement, with Results

by Jay Ligatti, Srikar Reddy
"... Abstract—In many systems, security-relevant actions produce security-relevant results, and an application attempting to execute an action may not be able to make progress until it receives a result for that action. However, current models of runtime enforcement are limited to reasoning about policie ..."
Abstract - Cited by 10 (5 self) - Add to MetaCart
safety properties in highly uncertain environments. In more certain, but often realistic, environments, monitors can enforce a larger set of policies that includes all of what we call the action-life properties. We present an algorithm for converting any action-life property into a monitor guaranteed

Automatic program repair with evolutionary computation,”

by Stephanie Forrest , Westley Weimer , Stephanie Forrest , Claire Le Goues , Thanhvu Nguyen - Commun. ACM, , 2010
"... Abstract There are many methods for detecting and mitigating software errors but few generic methods for automatically repairing errors once they are discovered. This paper highlights recent work combining program analysis methods with evolutionary computation to automatically repair bugs in off-th ..."
Abstract - Cited by 34 (5 self) - Add to MetaCart
range of extant software for which formal specifications rarely exist. INTRODUCTION Fixing bugs is a difficult, time-consuming, and manual process. Some reports place software maintenance, traditionally defined as any modification made on a system after its delivery, at up to 90% of the total cost of a
Next 10 →
Results 1 - 10 of 120
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University