• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Runtime Verification: Second International Conference, RV 2011, San Francisco, Usa, September 27-30, 2011, Revised Selected Papers » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [2952531]
• Literatura piękna
 [1815254]

  więcej...
• Turystyka
 [52246]
• Informatyka
 [151406]
• Komiksy
 [36554]
• Encyklopedie
 [23115]
• Dziecięca
 [612095]
• Hobby
 [104900]
• AudioBooki
 [1784]
• Literatura faktu
 [191556]
• Muzyka CD
 [380]
• Słowniki
 [2946]
• Inne
 [442645]
• Kalendarze
 [1505]
• Podręczniki
 [166084]
• Poradniki
 [422936]
• Religia
 [506774]
• Czasopisma
 [518]
• Sport
 [60387]
• Sztuka
 [242639]
• CD, DVD, Video
 [3428]
• Technologie
 [219359]
• Zdrowie
 [98539]
• Książkowe Klimaty
 [124]
• Zabawki
 [2509]
• Puzzle, gry
 [3809]
• Literatura w języku ukraińskim
 [261]
• Art. papiernicze i szkolne
 [8058]
Kategorie szczegółowe BISAC

Runtime Verification: Second International Conference, RV 2011, San Francisco, Usa, September 27-30, 2011, Revised Selected Papers

ISBN-13: 9783642298592 / Angielski / Miękka / 2012 / 458 str.

Koushik Sen; Sarfaz Khurshid
Runtime Verification: Second International Conference, RV 2011, San Francisco, Usa, September 27-30, 2011, Revised Selected Papers Sen, Koushik 9783642298592 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Runtime Verification: Second International Conference, RV 2011, San Francisco, Usa, September 27-30, 2011, Revised Selected Papers

ISBN-13: 9783642298592 / Angielski / Miękka / 2012 / 458 str.

Koushik Sen; Sarfaz Khurshid
cena 203,61
(netto: 193,91 VAT:  5%)

Najniższa cena z 30 dni: 192,74
Termin realizacji zamówienia:
ok. 16-18 dni roboczych.

Darmowa dostawa!

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011. The 24 revised full papers presented together with 3 invited papers, 4 tutorials and 4 tool demonstrations were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on parallelism and deadlocks, malware detection, temporal constraints and concurrency bugs, sampling and specification conformance, real-time, software and hardware systems, memory transactions, tools; foundational techniques and multi-valued approaches.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Mathematics > Logic
Computers > Programming - Algorithms
Computers > Languages - General
Wydawca:
Springer
Seria wydawnicza:
Lecture Notes in Computer Science / Programming and Software
Język:
Angielski
ISBN-13:
9783642298592
Rok wydania:
2012
Wydanie:
2012
Numer serii:
000379989
Ilość stron:
458
Waga:
0.72 kg
Oprawa:
Miękka
Wolumenów:
01

Tutorials.-Internal versus External DSLs for Trace Analysis (Extended Abstract).-Predicting Concurrency Failures in the Generalized Execution Traces of x86 Executables.-Runtime Monitoring of Time-Sensitive Systems  [Tutorial Supplement] .-Teaching Runtime Verification.-Invited.-Runtime Verification: A Computer Architecture Perspective.-A: Parallelism and Deadlocks Isolating Determinism in Multi-threaded Programs.-Efficiency Optimizations for Implementations of Deadlock Immunity.-Permission Regions for Race-Free Parallelism.-Dynamic Race Detection with LLVM Compiler: Compile-Time Instrumentation for ThreadSanitizer.-B: Malware Detection NORT: Runtime Anomaly-Based Monitoring of Malicious Behavior for Windows.-C: Temporal Constraints and Concurrency Bugs Runtime Verification of LTL-Based Declarative Process Models.-Parametric Identification of Temporal Properties.-Marathon: Detecting Atomic-Set Serializability Violations with Conflict Graphs.-Coverage Metrics for Saturation-Based and Search-Based Testing of Concurrent Software.-D: Sampling and Specification Conformance Runtime Verification with State Estimation.-Efficient Techniques for Near-Optimal Instrumentation in Time-Triggered Runtime Verification.-CoMA: Conformance Monitoring of Java Programs by Abstract State Machines.-Automated Test-Trace Inspection for Microcontroller Binary Code.-Invited What Is My Program Doing? Program Dynamics in Programmer’s Terms.-E: Real-Time Algorithms for Monitoring Real-Time Properties .-F: Software and Hardware Systems Runtime Monitoring of Stochastic Cyber-Physical Systems with Hybrid State .-Combining Time and Frequency Domain Specifications for Periodic Signals .-Runtime Verification for Ultra-Critical Systems.-Runtime Verification of Data-Centric Properties in Service Based Systems.-Invited Cooperative Concurrency for a Multicore World (Extended Abstract) .-G: Memory Transactions Monitoring Data Structures Using Hardware Transactional Memory.-Tools MONPOLY: Monitoring Usage-Control Policies.-MOPBox: A Library Approach to Runtime Verification (Tool Demonstration).-Elarva: A Monitoring Tool for Erlang.-DA-BMC: A Tool Chain Combining Dynamic Analysis and Bounded Model Checking.-H: Foundational Techniques and Multi-valued Approaches I Monitoring Finite State Properties: Algorithmic Approaches and Their Relative Strengths.-Unbounded Symbolic Execution for Program Verification.-Execution Trace Exploration and Analysis Using Ontologies.- I: Foundational Techniques and Multi-valued Approaches II.-Monitoring Realizability.-Runtime Verification of Traces under Recording Uncertainty.-

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Runtime Verification, RV 2011, held in San Francisco, USA, in September 2011.
The 24 revised full papers presented together with 3 invited papers, 4 tutorials and 4 tool demonstrations were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on parallelism and deadlocks, malware detection, temporal constraints and concurrency bugs, sampling and specification conformance, real-time, software and hardware systems, memory transactions, tools; foundational techniques and multi-valued approaches.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia