Runtime verification

Results: 98



#Item
51Abstract Runtime Monitoring with USE Lars Hamann L´aszl´o Vid´acs  Martin Gogolla

Abstract Runtime Monitoring with USE Lars Hamann L´aszl´o Vid´acs Martin Gogolla

Add to Reading List

Source URL: www.db.informatik.uni-bremen.de

Language: English - Date: 2012-01-27 03:50:41
52Dr. Ezio Bartocci Curriculum Vitae Personal Information Gender:

Dr. Ezio Bartocci Curriculum Vitae Personal Information Gender:

Add to Reading List

Source URL: www.eziobartocci.com

Language: English - Date: 2015-04-10 06:06:57
53Runtime Model Checking of Multithreaded C Programs using Automated Instrumentation Dynamic Partial Order Reduction and Distributed Checking ⋆ Ganesh Gopalakrishnan

Runtime Model Checking of Multithreaded C Programs using Automated Instrumentation Dynamic Partial Order Reduction and Distributed Checking ⋆ Ganesh Gopalakrishnan

Add to Reading List

Source URL: www.fm2008.abo.fi

Language: English - Date: 2007-12-21 11:36:45
54Curriculum Vitae1 Radu Grosu Address Institute of Computer Engineering Head of Dependable Systems GroupFaculty of Informatics

Curriculum Vitae1 Radu Grosu Address Institute of Computer Engineering Head of Dependable Systems GroupFaculty of Informatics

Add to Reading List

Source URL: ti.tuwien.ac.at

Language: English - Date: 2012-08-24 05:32:58
55Specifying and Checking Java using CSP? Michael M¨oller Universit¨ at Oldenburg, Fachbereich Informatik Postfach 2503, D–26111 Oldenburg, Germany

Specifying and Checking Java using CSP? Michael M¨oller Universit¨ at Oldenburg, Fachbereich Informatik Postfach 2503, D–26111 Oldenburg, Germany

Add to Reading List

Source URL: www.cs.kun.nl

Language: English - Date: 2002-05-29 03:53:26
56Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University

Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University

Add to Reading List

Source URL: www.gilvegliach.it

Language: English - Date: 2014-02-20 13:15:14
576th Symposium on Security Analytics and Automation, IEEEDiscovering Emergent Norms in Security Logs Olgierd Pieczul∗† , Simon N. Foley† ∗ Ireland † Computer

6th Symposium on Security Analytics and Automation, IEEEDiscovering Emergent Norms in Security Logs Olgierd Pieczul∗† , Simon N. Foley† ∗ Ireland † Computer

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2013-11-08 09:08:56
58Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University

Runtime Verification meets Android Security Andreas Bauer1,2 , Jan-Christoph K¨uster1,2 , and Gil Vegliach1 1 NICTA Software Systems Research Group · 2 The Australian National University

Add to Reading List

Source URL: kuester.multics.org

Language: English - Date: 2015-05-08 04:15:01
59CURRICULUM VITAE August 2014 Willem Conradie Visser Professor Computer Science

CURRICULUM VITAE August 2014 Willem Conradie Visser Professor Computer Science

Add to Reading List

Source URL: www.cs.sun.ac.za

Language: English - Date: 2014-09-18 08:45:52
60Making Aspects Natural: Events and Composition Christoph Bockisch, Somayeh Malakuti, Mehmet Ak¸sit Software Engineering group, University of Twente, 7500 AE Enschede, The Netherlands

Making Aspects Natural: Events and Composition Christoph Bockisch, Somayeh Malakuti, Mehmet Ak¸sit Software Engineering group, University of Twente, 7500 AE Enschede, The Netherlands

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2011-04-03 09:06:12