Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
25
views
10
references
Top references
cited by
7
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,884
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Runtime Verification
Reducing Configurations to Monitor in a Software Product Line
other
Author(s):
Chang Hwan Peter Kim
,
Eric Bodden
,
Don Batory
,
Sarfraz Khurshid
Publication date
(Print):
2010
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Genomic Prediction: Software
Most cited references
10
Record
: found
Abstract
: not found
Article
: not found
Enforceable security policies
Fred B. Schneider
(2000)
0
comments
Cited
64
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Feature Models, Grammars, and Propositional Formulas
Don Batory
(2005)
0
comments
Cited
58
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Scaling Java Points-to Analysis Using Spark
Ondřej Lhoták
,
Laurie Hendren
(2003)
0
comments
Cited
19
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2010
Pages
: 285-299
DOI:
10.1007/978-3-642-16612-9_22
SO-VID:
11dd633c-ee0f-421a-99fd-6d38cd749a98
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Automatic Requirement Extraction from Test Cases
pp. 16
Code Contracts for .NET: Runtime Verification and So Much More
pp. 18
Visual Debugging for Stream Processing Applications
pp. 36
Runtime Verification in Context: Can Optimizing Error Detection Improve Fault Diagnosis?
pp. 51
Contracts for Scala
pp. 58
Runtime Analysis and Instrumentation for Securing Software
pp. 59
Run-Time Verification of Networked Software
pp. 74
Clara: Partially Evaluating Runtime Monitors at Compile Time
pp. 89
You Should Better Enforce Than Verify
pp. 106
Runtime Verification for the Web
pp. 136
Runtime Verification with the RV System
pp. 153
A Meta-Aspect Protocol for Developing Dynamic Analyses
pp. 168
Behavior Abstraction in Malware Analysis
pp. 183
Clara: A Framework for Partially Evaluating Finite-State Runtime Monitors Ahead of Time
pp. 198
Checking the Correspondence between UML Models and Implementation
pp. 214
Compensation-Aware Runtime Monitoring
pp. 229
Recovery Tasks: An Automated Approach to Failure Recovery
pp. 245
Formally Efficient Program Instrumentation
pp. 253
Interval Analysis for Concurrent Trace Programs Using Transaction Sequence Graphs
pp. 270
Causality Analysis in Contract Violation
pp. 285
Reducing Configurations to Monitor in a Software Product Line
pp. 300
Runtime Instrumentation for Precise Flow-Sensitive Type Analysis
pp. 315
Trace Recording for Embedded Systems: Lessons Learned from Five Industrial Projects
pp. 330
Verification of an AFDX Infrastructure Using Simulations and Probabilities
pp. 345
Copilot: A Hard Real-Time Runtime Monitor
pp. 360
StealthWorks: Emulating Memory Errors
pp. 368
Efficient Data Race Detection for Async-Finish Parallelism
pp. 384
Run-Time Verification of Optimistic Concurrency
pp. 399
Who Guards the Guardians? — Toward V&V of Health Management Software
pp. 405
Aspect-Oriented Instrumentation with GCC
pp. 421
Runtime Verification for Software Transactional Memories
pp. 436
Optimized Temporal Monitors for SystemC
pp. 452
Runtime Verification of Stochastic, Faulty Systems
pp. 460
Low-Overhead Bug Fingerprinting for Fast Debugging
pp. 469
ESAT: A Tool for Animating Logic-Based Specifications of Evolvable Component Systems
pp. 475
A Tool Which Mines Partial Execution Traces to Improve Static Analysis
pp. 480
LarvaStat: Monitoring of Statistical Properties
pp. 485
WS-PSC Monitor: A Tool Chain for Monitoring Temporal and Timing Properties in Composite Service Based on Property Sequence Chart
Similar content
1,884
Finite Element-Predicted Effects of Screw Configuration in Proximal Humerus Fracture Fixation
Authors:
Maryam Tilton
,
April Armstrong
,
Hwabok Wee
…
The generalized active space concept for the relativistic treatment of electron correlation. I. Kramers-restricted two-component configuration interaction
Authors:
Timo Fleig
,
Jeppe A. Olsen
,
Christel Marian
A Māori specific RFC1 pathogenic repeat configuration in CANVAS, likely due to a founder allele.
Authors:
Sarah Beecroft
,
Andrea Cortese
,
Roisin Sullivan
…
See all similar
Cited by
7
Featured Transition Systems: Foundations for Verifying Variability-Intensive Systems and Their Application to LTL Model Checking
Authors:
Pierre-Yves Schobbens
,
Andreas Classen
,
Maxime Cordy
…
A Classification and Survey of Analysis Strategies for Software Product Lines
Authors:
Christian Kastner
,
Gunter Saake
,
Ina Schaefer
…
Reducing Configurations to Monitor in a Software Product Line
Authors:
Chang Hwan Peter Kim
,
Eric Bodden
,
Don Batory
…
See all cited by