نتایج جستجو برای: run time verification

تعداد نتایج: 2009787  

Journal: :Int. J. Found. Comput. Sci. 2001
Edgar F. A. Lederer Romeo A. Dumitrescu

Received (received date) Revised (revised date) Communicated by Editor's name ABSTRACT Two-Stage Programming (2sp) is an experimental programming language, the rst implementation of the Speciication-Consistent Coordination Model (SCCM). The SCCM proposes a new, mixed-paradigm (functional/imperative) approach to developing reliable programs based on complete run-time checking of computations wit...

2008
Christian Colombo Gordon J. Pace Gerardo Schneider

Given the intractability of exhaustively verifying software, the use of runtime-verification, to verify single execution paths at runtime, is becoming popular. Although the use of runtime verification is increasing in industrial settings, various challenges still are to be faced to enable it to spread further. We present dynamic communicating automata with timers and events to describe properti...

2013
M. Radha R. Saranya

Transactional patterns are used to specify flexible and reliable composite Web services. A transactional pattern is a convergence concept between workflow patterns and advanced transactional models. These are of coordination patterns and as a structured transaction. This project proposes an event-driven approach to validate the transactional behavior of service compositions. The transactional b...

2004
Laurent Mauborgne

Everybody knows about failure problems in software: it is an admitted fact that most large software do contain bugs. The cost of such bugs can be very high for our society and many methods have been proposed to try to reduce these failures. While merely reducing the number of bugs may be economically sound in many areas, in critical software (such as found in power plants or aeronautics), no fa...

2005
Helge Janicke François Siewe Kevin I. Jones Antonio Cau Hussein Zedan

Ensuring the confidentiality, integrity and availability of information is the key issue in the battle for information superiority and thus is a decisive factor in modern warfare. Security policies and security mechanisms govern the access to information and other resources. Their correct specification, i.e. denial of potentially dangerous access and adherence to all established need-to-know re...

2006
MILENA MILENKOVIC Milena Milenkovic

Approval: Committee Chair _______________________________________ Department Chair _______________________________________ Graduate Dean _________________________________________

2017
David A. Basin Felix Klaedtke Eugen Zalinescu

We present a monitoring approach for verifying systems at runtime. Our approach targets systems whose components communicate with the monitors over unreliable channels, where messages can be delayed or lost. In contrast to prior works, whose property specification languages are limited to propositional temporal logics, our approach handles an extension of the real-time logic MTL with freeze qua...

2009
Brecht Wyseur

A major challenge in software security is preserving software integrity. Traditionally, this problem is addressed through the development of software (self-) checking techniques that verify the integrity of its code and execution. Unfortunately, no satisfactory solutions for run-time verification of software integrity have been presented. In this paper, we approach the problem of run-time softw...

Journal: :Electronic Commerce Research and Applications 2005
Hongchen Li Yun Yang

At present, workflow management systems have not sufficiently dealt with the issues of time, involving time modelling at build-time and time management at run-time. They are lack of the ability to support the checking of temporal constraints at run-time. Although some approaches have been devised to tackle this problem, they are limited to a single workflow and use only static techniques to ver...

2004
Hongchen Li Yun Yang

Today’s workflow management systems have not sufficiently dealt with time information, which involves time modeling at build-time and time management at run-time. As a consequence, workflow management systems are short of the ability to support the checking of temporal constraints at run-time. Although several approaches have been devised to tackle this problem, they are limited to a single wor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید