References

  1. Matthew Arnold, Martin Vechev & Eran Yahav (2008): QVM: An Efficient Runtime for Detecting Defects in Deployed Systems. In: Proc. 23rd ACM SIGPLAN International Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2008). ACM, pp. 143–162, doi:10.1145/1449955.1449776.
  2. H. Barringer, Y. Falcone, B. Finkbeiner, K. Havelund, I. Lee, G.J. Pace, G. Rosu, O. Sokolsky & N. Tillmann (2010): Preface. In: Proc. of RV 2010, the First International Conference on Runtime Verification, St. Julians, Malta, November 1-4, 2010, Lecture Notes in Computer Science 6418. Springer, doi:10.1007/978-3-642-16612-9.
  3. E. Bartocci, R. Grosu, A. Karmarkar, S. A. Smolka, S. D. Stoller, E. Zadok & J. Seyster (2012): Adaptive Runtime Verification. In: Proc. of RV 2012, the third International Conference on Runtime Verification, September, 2012 Istanbul, Turkey, Lecture Notes in Computer Science 7687. Springer, pp. 168–182, doi:10.1007/978-3-642-35632-2_18.
  4. B. Bonakdarpour, S. Navabpour & S. Fischmeister (2011): Sampling-Based Runtime Verification. In: Proc. FM 2011: Formal Methods, the 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011, Lecture Notes in Computer Science 6664. Springer, pp. 88–102, doi:10.1007/978-3-642-21437-0_9.
  5. E. M. Clarke & E. Emerson (1982): Design and Synthesis of Synchronization Skeletons Using Branching Time Temporal Logic. In: Dexter Kozen: Logics of Programs, Lecture Notes in Computer Science 131. Springer Berlin / Heidelberg, pp. 52–71, doi:10.1007/BFb0025774.
  6. L. Fei & S.P. Midkiff (2006): Artemis: Practical Runtime Monitoring of Applications for Execution Anomalies. In: Proc. 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2006). ACM, Ottawa, Canada, pp. 84–95, doi:10.1145/1133981.1133992.
  7. N.J. Gordon, D.J. Salmond & A.F.M. Smith (1993): Novel approach to nonlinear/non-Gaussian Bayesian state estimation. In: IEEE Proceedings on Radar and Signal Processing 140. IEEE, pp. 107–127.
  8. M. Hauswirth & T. M. Chilimbi (2004): Low-Overhead Memory Leak Detection using Adaptive Statistical Profiling. In: Proc. 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2004), pp. 156–164, doi:10.1145/1024393.1024412.
  9. K. Havelund & G. Rosu (2002): Runtime Verification, RV 2002: Preface. Electr. Notes Theor. Comput. Sci. 70(4), pp. 201–202, doi:10.1016/S1571-0661(05)80585-7.
  10. X. Huang, J. Seyster, S. Callanan, K. Dixit, R. Grosu, S. A. Smolka, S. D. Stoller & E. Zadok (2012): Software Monitoring with Controllable Overhead. STTT 14(3), pp. 327–347, doi:10.1007/s10009-010-0184-4.
  11. K. Kalajdzic, E. Bartocci, S. A. Smolka, Scott Stoller & G. Grosu (2013): Runtime Verification with Particle Filtering. In: Proc. of RV 2013, the fourth International Conference on Runtime Verification, INRIA Rennes, France, 24-27 September, 2013, Lecture Notes in Computer Science. Springer, pp. To Appear.
  12. J.P. Queille & J. Sifakis (1982): Specification and verification of concurrent systems in CESAR. In: Proc. of the 5th Colloquium on International Symposium on Programming. Springer-Verlag, pp. 337–351, doi:10.1007/3-540-11494-7_22.
  13. Lawrence R. Rabiner (1989): A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of the IEEE 77(2), pp. 257–286, doi:10.1109/5.18626.
  14. Stuart Russell & Peter Norvig (2010): Artificial Intelligence: A Modern Approach, 3rd edition. Prentice-Hall.
  15. S. D. Stoller, E. Bartocci, J. Seyster, R. Grosu, K. Havelund, S. A. Smolka & E. Zadok (2011): Runtime Verification with State Estimation. In: Proc. of RV 2011, the Second international conference on Runtime verification, San Francisco, CA, USA, Lecture Notes in Computer Science 7186. Springer-Verlag, pp. 193–207, doi:10.1007/978-3-642-29860-8_15.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org