We study the problem of monitoring rich properties of real-time event streams, and propose a solution based on Stream Runtime Verification (SRV), where observations are described as output streams of data computed from input streams of data. SRV allows a clean separation between the temporal dependencies among incoming events, and the concrete operations that are performed during the monitoring. SRV specification languages typically assume that all streams share a global synchronous clock and input events arrive in a synchronous manner. In this paper we generalize the time assumption to cover real-time event streams, but keep the essential explicit time dependencies present in synchronous SRV languages. We introduce Striver, which shares w...
Abstract. Runtime verification is the process of checking a property on a trace of events produced b...
International audienceRuntime enforcement refers to the theories, techniques, and tools for enforcin...
International audienceEnsuring the correctness of distributed cyber-physical systems can be done at ...
In this thesis, we study the problem of monitoring rich properties of real-time event streams, and ...
Software verification is the employment of formal methods to ensure the absence of errors in a progr...
We revisit Stream Runtime Verification for synchronous systems. Stream Runtime Verification (SRV) ...
Abstract. Stream runtime verification (SRV), pioneered by the tool LOLA, is a declarative approach t...
Abstract. This tutorial focuses on issues involved in runtime monitoring of time-sensitive systems, ...
Runtime monitoring of embedded systems is a method to safeguard their reliable operation by detectin...
We study the problem of decentralized monitoring of stream runtime verification specifications. Dece...
Work in Progress Session, IEEE Real-Time Systems Symposium (RTSS 2016). 29, Nov to 2, Dec, 2016. Por...
Part of the research described in this publication was carried out at Jet Propulsion Laboratory, Cal...
We present a formally specified event specification language (Solicitor). Solicitor is suitable for ...
Runtime Verification is a lightweight automatic verification technique. We introduce Assumption-Base...
Abstract. Given the intractability of exhaustively verifying software, the use of runtime-verificati...
Abstract. Runtime verification is the process of checking a property on a trace of events produced b...
International audienceRuntime enforcement refers to the theories, techniques, and tools for enforcin...
International audienceEnsuring the correctness of distributed cyber-physical systems can be done at ...
In this thesis, we study the problem of monitoring rich properties of real-time event streams, and ...
Software verification is the employment of formal methods to ensure the absence of errors in a progr...
We revisit Stream Runtime Verification for synchronous systems. Stream Runtime Verification (SRV) ...
Abstract. Stream runtime verification (SRV), pioneered by the tool LOLA, is a declarative approach t...
Abstract. This tutorial focuses on issues involved in runtime monitoring of time-sensitive systems, ...
Runtime monitoring of embedded systems is a method to safeguard their reliable operation by detectin...
We study the problem of decentralized monitoring of stream runtime verification specifications. Dece...
Work in Progress Session, IEEE Real-Time Systems Symposium (RTSS 2016). 29, Nov to 2, Dec, 2016. Por...
Part of the research described in this publication was carried out at Jet Propulsion Laboratory, Cal...
We present a formally specified event specification language (Solicitor). Solicitor is suitable for ...
Runtime Verification is a lightweight automatic verification technique. We introduce Assumption-Base...
Abstract. Given the intractability of exhaustively verifying software, the use of runtime-verificati...
Abstract. Runtime verification is the process of checking a property on a trace of events produced b...
International audienceRuntime enforcement refers to the theories, techniques, and tools for enforcin...
International audienceEnsuring the correctness of distributed cyber-physical systems can be done at ...