References

  1. Andreas Bauer, Martin Leucker & Christian Schallhart (2011): Runtime Verification for LTL and TLTL. TOSEM, ACM 20(4), pp. 14:1–14:64, doi:10.1145/2000799.2000800.
  2. Giovanni Bernardi & Matthew Hennessy (2012): Modelling Session Types Using Contracts. SAC. ACM, pp. 1941–1946, doi:10.1145/2245276.2232097.
  3. Giovanni Bernardi & Matthew Hennessy (2015): Mutually Testing Processes. LMCS 11(2), doi:10.2168/LMCS-11(2:1)2015.
  4. Laura Bocchi, Tzu-Chun Chen, Romain Demangeon, Kohei Honda & Nobuko Yoshida (2013): Monitoring Networks through Multiparty Session Types. In: FMOODS/FORTE, LNCS 7892. Springer, pp. 50–65, doi:10.1007/978-3-642-38592-6_5.
  5. M. Bravetti & G. Zavattaro (2009): A theory of contracts for strong service compliance. MSCS 19(3), doi:10.1017/S0960129509007658.
  6. S. Carpineti, G. Castagna, C. Laneve & L. Padovani (2006): A Formal Account of Contracts for Web Services. In: WS-FM, LNCS 4184. Springer, pp. 148–162, doi:10.1007/11841197_10.
  7. Giuseppe Castagna, Nils Gesbert & Luca Padovani (2009): A Theory of Contracts for Web Services. TOPLAS, ACM 31(5), pp. 19:1–19:61, doi:10.1145/1538917.1538920.
  8. Clare Cini & Adrian Francalanza (2015): An LTL Proof System for Runtime Verification. In: TACAS, LNCS 9035. Springer, pp. 581–595, doi:10.1007/978-3-662-46681-0_54.
  9. Mariangiola Dezani-Ciancaglini & Ugo De'Liguoro (2009): Sessions and Session Types: An Overview. In: WS-FM, LNCS 6194. Springer, pp. 1–28, doi:10.1007/978-3-642-14458-5_1.
  10. Adrian Francalanza (2016): A Theory of Monitors (Extended Abstract). In: FoSSaCS, LNCS 9634. Springer, pp. 145–161, doi:10.1007/978-3-662-49630-5_9.
  11. Adrian Francalanza, Luca Aceto & Anna Ingólfsdóttir (2015): On Verifying Hennessy-Milner Logic with Recursion at Runtime. In: RV, LNCS 9333. Springer, pp. 71–86, doi:10.1007/978-3-319-23820-3_5.
  12. Limin Jia, Hannah Gommerstadt & Frank Pfenning (2016): Monitors and Blame Assignment for Higher-order Session Types. POPL. ACM, pp. 582–594, doi:10.1145/2837614.2837662.
  13. Martin Leucker & Christian Schallhart (2009): A brief account of runtime verification. JLAP 78(5), pp. 293–303, doi:10.1016/j.jlap.2008.08.004.
  14. Robin Milner (1989): Communication and Concurrency. Prentice Hall.
  15. Luca Padovani (2009): Contract-Based Discovery and Adaptation of Web Services. In: SFM, LNCS 5569. Springer, pp. 213–260, doi:10.1007/978-3-642-01918-0_6.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org