| |||||||||||||||||
RV 2014 : Runtime VerificationConference Series : Runtime Verification | |||||||||||||||||
Link: http://rv2014.imag.fr/ | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
Runtime verification is concerned with monitoring and analysis of software and hardware system executions. Runtime verification techniques are crucial for system correctness, reliability, and robustness; they are significantly more powerful and versatile than conventional testing, and more practical than exhaustive formal verification. Runtime verification can be used prior to deployment, for testing, verification, and debugging purposes, and after deployment for ensuring reliability, safety, and security and for providing fault containment and recovery as well as online system repair. Topics of interest to the conference include:
specification languages specification mining program instrumentation monitor construction techniques logging, recording, and replay fault detection, localization, containment, recovery and repair program steering and adaptation metrics and statistical information gathering combination of static and dynamic analyses program execution visualization monitoring techniques for safety-critical systems monitoring distributed systems, cloud services, and big data applications monitoring security and privacy policies Application areas of runtime verification include safety-critical systems, enterprise and systems software, autonomous and reactive control systems, health management and diagnosis systems, and system security and privacy. |
|