Normal view MARC view ISBD view

Runtime Verification [electronic resource] : Second International Conference, RV 2011, San Francisco, CA, USA, September 27-30, 2011, Revised Selected Papers / edited by Sarfraz Khurshid, Koushik Sen.

By: Khurshid, Sarfraz [editor.].
Contributor(s): Sen, Koushik [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 7186Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2012Description: XII, 458 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642298608.Subject(s): Computer science | Software engineering | Computer software | Logic design | Computer Science | Software Engineering | Algorithm Analysis and Problem Complexity | Logics and Meanings of Programs | Programming Techniques | Programming Languages, Compilers, Interpreters | Mathematical Logic and Formal LanguagesDDC classification: 005.1 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011. The 24 revised full papers presented together with 3 invited papers, 4 tutorials and 4 tool demonstrations were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on parallelism and deadlocks, malware detection, temporal constraints and concurrency bugs, sampling and specification conformance, real-time, software and hardware systems, memory transactions, tools; foundational techniques and multi-valued approaches.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011. The 24 revised full papers presented together with 3 invited papers, 4 tutorials and 4 tool demonstrations were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on parallelism and deadlocks, malware detection, temporal constraints and concurrency bugs, sampling and specification conformance, real-time, software and hardware systems, memory transactions, tools; foundational techniques and multi-valued approaches.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue