Advertisement

Runtime Verification

Second International Conference, RV 2011, San Francisco, CA, USA, September 27-30, 2011, Revised Selected Papers

  • Sarfraz Khurshid
  • Koushik Sen
Conference proceedings RV 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7186)

Table of contents

  1. Front Matter
  2. Tutorials

    1. Howard Barringer, Klaus Havelund
      Pages 1-3
    2. Borzoo Bonakdarpour, Sebastian Fischmeister
      Pages 19-33
    3. Martin Leucker
      Pages 34-48
  3. Invited

    1. A: Parallelism and Deadlocks

      1. Lukasz Ziarek, Siddharth Tiwary, Suresh Jagannathan
        Pages 63-77
      2. Horatiu Jula, Silviu Andrica, George Candea
        Pages 78-93
      3. Edwin Westbrook, Jisheng Zhao, Zoran Budimlić, Vivek Sarkar
        Pages 94-109
      4. Konstantin Serebryany, Alexander Potapenko, Timur Iskhodzhanov, Dmitriy Vyukov
        Pages 110-114
    2. B: Malware Detection

      1. Narcisa Andreea Milea, Siau Cheng Khoo, David Lo, Cristian Pop
        Pages 115-130
    3. C: Temporal Constraints and Concurrency Bugs

      1. Fabrizio Maria Maggi, Michael Westergaard, Marco Montali, Wil M. P. van der Aalst
        Pages 131-146
      2. Eugene Asarin, Alexandre Donzé, Oded Maler, Dejan Nickovic
        Pages 147-160
      3. William N. Sumner, Christian Hammer, Julian Dolby
        Pages 161-176
      4. Bohuslav Křena, Zdeněk Letko, Tomáš Vojnar
        Pages 177-192
    4. D: Sampling and Specification Conformance

      1. Scott D. Stoller, Ezio Bartocci, Justin Seyster, Radu Grosu, Klaus Havelund, Scott A. Smolka et al.
        Pages 193-207
      2. Samaneh Navabpour, Chun Wah Wallace Wu, Borzoo Bonakdarpour, Sebastian Fischmeister
        Pages 208-222
      3. Paolo Arcaini, Angelo Gargantini, Elvinia Riccobene
        Pages 223-238
      4. Thomas Reinbacher, Jörg Brauer, Daniel Schachinger, Andreas Steininger, Stefan Kowalewski
        Pages 239-244
  4. Invited

    1. Steven P. Reiss, Alexander Tarvo
      Pages 245-259
    2. E: Real-Time

      1. David Basin, Felix Klaedtke, Eugen Zălinescu
        Pages 260-275
    3. F: Software and Hardware Systems

      1. A. Prasad Sistla, Miloš Žefran, Yao Feng
        Pages 276-293
      2. Aleksandar Chakarov, Sriram Sankaranarayanan, Georgios Fainekos
        Pages 294-309
      3. Lee Pike, Sebastian Niller, Nis Wegmann
        Pages 310-324
      4. Guoquan Wu, Jun Wei, Chunyang Ye, Xiaozhe Shao, Hua Zhong, Tao Huang
        Pages 325-341
  5. Invited

    1. Jaeheon Yi, Caitlin Sadowski, Stephen N. Freund, Cormac Flanagan
      Pages 342-344
    2. G: Memory Transactions

      1. Shakeel Butt, Vinod Ganapathy, Arati Baliga, Mihai Christodorescu
        Pages 345-359
  6. Tools

    1. David Basin, Matúš Harvan, Felix Klaedtke, Eugen Zălinescu
      Pages 360-364
    2. Christian Colombo, Adrian Francalanza, Rudolph Gatt
      Pages 370-374
    3. Jan Fiedor, Vendula Hrubá, Bohuslav Křena, Tomáš Vojnar
      Pages 375-380
    4. H: Foundational Techniques and Multi-valued Approaches I

      1. Rahul Purandare, Matthew B. Dwyer, Sebastian Elbaum
        Pages 381-395
      2. Joxan Jaffar, Jorge A. Navas, Andrew E. Santosa
        Pages 396-411
      3. Newres Al Haider, Benoit Gaudin, John Murphy
        Pages 412-426
    5. I: Foundational Techniques and Multi-valued Approaches II

      1. Rüdiger Ehlers, Bernd Finkbeiner
        Pages 427-441
      2. Shaohui Wang, Anaheed Ayoub, Oleg Sokolsky, Insup Lee
        Pages 442-456
  7. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011.
The 24 revised full papers presented together with 3 invited papers, 4 tutorials and 4 tool demonstrations were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on parallelism and deadlocks, malware detection, temporal constraints and concurrency bugs, sampling and specification conformance, real-time, software and hardware systems, memory transactions, tools; foundational techniques and multi-valued approaches.

Keywords

concurrent object-oriented programming hardware transactional memory optimization run-time verification visualization

Editors and affiliations

  • Sarfraz Khurshid
    • 1
  • Koushik Sen
    • 2
  1. 1.Electrical and Computer EngineeringThe University of Texas at AustinAustinUSA
  2. 2.University of CaliforniaBerkeleyUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-29860-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-29859-2
  • Online ISBN 978-3-642-29860-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Engineering