Runtime verification: 4th international conference, RV 2013, Rennes, France, September 24 - 27, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
8174 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XVII, 426 S.) Ill., graph. Darst. |
ISBN: | 9783642407864 9783642407871 |
DOI: | 10.1007/978-3-642-40787-1 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041446132 | ||
003 | DE-604 | ||
005 | 20140221 | ||
007 | cr|uuu---uuuuu | ||
008 | 131127s2013 xx ad|| o|||| 10||| eng d | ||
020 | |a 9783642407864 |9 978-3-642-40786-4 | ||
020 | |a 9783642407871 |c eISBN |9 978-3-642-40787-1 | ||
024 | 7 | |a 10.1007/978-3-642-40787-1 |2 doi | |
035 | |a (OCoLC)861540801 | ||
035 | |a (DE-599)BVBBV041446132 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.1 | |
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 325f |2 stub | ||
245 | 1 | 0 | |a Runtime verification |b 4th international conference, RV 2013, Rennes, France, September 24 - 27, 2013 ; proceedings |c Axel Legay .... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XVII, 426 S.) |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 8174 | |
650 | 0 | 7 | |a Formale Methode |0 (DE-588)4333722-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hardwareverifikation |0 (DE-588)4214982-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Laufzeitsystem |0 (DE-588)4343107-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Programmanalyse |0 (DE-588)4175841-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerarchitektur |0 (DE-588)4048717-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Programmverifikation |0 (DE-588)4135576-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Systemanalyse |0 (DE-588)4116673-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwarearchitektur |0 (DE-588)4121677-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Programmlaufzeit |0 (DE-588)4745613-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Rennes |2 gnd-content | |
689 | 0 | 0 | |a Systemanalyse |0 (DE-588)4116673-5 |D s |
689 | 0 | 1 | |a Computerarchitektur |0 (DE-588)4048717-9 |D s |
689 | 0 | 2 | |a Laufzeitsystem |0 (DE-588)4343107-0 |D s |
689 | 0 | 3 | |a Hardwareverifikation |0 (DE-588)4214982-4 |D s |
689 | 0 | 4 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Programmanalyse |0 (DE-588)4175841-9 |D s |
689 | 1 | 1 | |a Softwarearchitektur |0 (DE-588)4121677-5 |D s |
689 | 1 | 2 | |a Programmlaufzeit |0 (DE-588)4745613-9 |D s |
689 | 1 | 3 | |a Programmverifikation |0 (DE-588)4135576-3 |D s |
689 | 1 | 4 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Legay, Axel |e Sonstige |4 oth | |
711 | 2 | |a RV |n 4 |d 2013 |c Rennes |j Sonstige |0 (DE-588)1042305544 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 8174 |w (DE-604)BV014880109 |9 8174 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-40787-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026892800&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026892800&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026892800 |
Datensatz im Suchindex
_version_ | 1820875543825874944 |
---|---|
adam_text |
RUNTIME VERIFICATION
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INVITED PAPERS
EXECUTING SPECIFICATIONS USING SYNTHESIS AND CONSTRAINT SOLVING
RUNTIME VERIFICATION WITH DATA
PROGRAMMING WITHOUT BORDERS
REGULAR PAPERS
INFORMATIVE TYPES AND EFFECTS FOR HYBRID MIGRATION CONTROL
MONITORING OF TEMPORAL FIRST-ORDER PROPERTIES WITH AGGREGATIONS
FROM PROPOSITIONAL TO FIRST-ORDER MONITORING
RIGHT-UNIVERSALITY OF VISIBLY PUSHDOWN AUTOMATA
DISTRIBUTED FINITE-STATE RUNTIME MONITORING WITH AGGREGATED EVENTS
SYNTHESISING CORRECT CONCURRENT RUNTIME MONITORS (EXTENDED ABSTRACT)
PRACTICAL INTERRUPTIBLE CONVERSATIONS: DISTRIBUTED DYNAMIC VERIFICATION
WITH SESSION TYPES AND PYTHON
RUNTIME VERIFICATION WITH PARTICLE FILTERING
AN OPTIMIZED MEMORY MONITORING FOR RUNTIME ASSERTION CHECKING OF C
PROGRAMS
IMPARTIALITY AND ANTICIPATION FOR MONITORING OF VISIBLY CONTEXT-FREE
PROPERTIES
ACCELERATING DATA RACE DETECTION UTILIZING ON-CHIP DATA-PARALLEL CORES
EFFICIENT MODEL TO QUERY AND VISUALIZE THE SYSTEM STATES EXTRACTED FROM
TRACE DATA
REPAIR ABSTRACTIONS FOR MORE EFFICIENT DATA STRUCTURE REPAIR
TO RUN WHAT NO ONE HAS RUN BEFORE: EXECUTING AN INTERMEDIATE
VERIFICATION LANGUAGE
OPTIMIZING NOP-SHADOWS TYPESTATE ANALYSIS BY FILTERING INTERFERENTIAL
CONFIGURATIONS
A CAUSALITY ANALYSIS FRAMEWORK FOR COMPONENT-BASED REAL-TIME SYSTEMS
REDUCING MONITORING OVERHEAD BY INTEGRATING EVENT- AND TIME-TRIGGERED
TECHNIQUES
SHORT PAPERS
A SCALA DSL FOR RETE-BASED RUNTIME VERIFICATION
A LATE TREATMENT OF C PRECONDITION IN DYNAMIC SYMBOLIC EXECUTION TESTING
TOOLS
TOWARDS A GENERIC NON-INTRUSIVE FAULT DETECTION FRAMEWORK
A WITNESSING COMPILER: A PROOF OF CONCEPT
RUNTIME MONITORING OF TEMPORAL LOGIC PROPERTIES IN A PLATFORM GAME
TOOL PAPERS
SMOCK | A TEST PLATFORM FOR MONITORING TOOLS
SPY: LOCAL VERIFICATION OF GLOBAL PROTOCOLS
TUTORIALS
INSTRUMENTING ANDROID AND JAVA APPLICATIONS AS EASY AS ABC
ON SIGNAL TEMPORAL LOGIC
RUNTIME VERIFICATION AND REFUTATION FOR BIOLOGICAL SYSTEMS
A LESSON ON RUNTIME ASSERTION CHECKING WITH FRAMA-C
WITH REAL-TIME PERFORMANCE ANALYSIS AND MONITORING TO TIMING PREDICTABLE
USE OF MULTI-CORE ARCHITECTURES
DYNAMIC ANALYSIS AND DEBUGGING OF BINARY CODE FOR SECURITY APPLICATIONS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
RUNTIME VERIFICATION
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 4TH INTERNATIONAL
CONFERENCE ON RUNTIME VERIFICATION, RV 2013, HELD IN RENNES, FRANCE, IN
SEPTEMBER 2013. THE 24 REVISED FULL PAPERS PRESENTED TOGETHER WITH 3
INVITED PAPERS, 2 TOOL PAPERS, AND 6 TUTORIALS WERE CAREFULLY REVIEWED
AND SELECTED FROM 58 SUBMISSIONS. THE PAPERS ADDRESS A WIDE RANGE OF
SPECIFICATION LANGUAGES AND FORMALISMS FOR TRACES; SPECIFICATION MINING;
PROGRAM INSTRUMENTATION; MONITOR CONSTRUCTION TECHNIQUES; LOGGING,
RECORDING, AND REPLAY; FAULT DETECTION, LOCALIZATION, RECOVERY, AND
REPAIR; PROGRAM STEERING AND ADAPTATION; AS WELL AS METRICS AND
STATISTICAL INFORMATION GATHERING; COMBINATION OF STATIC AND DYNAMIC
ANALYSES AND PROGRAM EXECUTION VISUALIZATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV041446132 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 DAT 325f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)861540801 (DE-599)BVBBV041446132 |
dewey-full | 005.1 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1 |
dewey-search | 005.1 |
dewey-sort | 15.1 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-40787-1 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041446132</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140221</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131127s2013 xx ad|| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642407864</subfield><subfield code="9">978-3-642-40786-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642407871</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-40787-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-40787-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)861540801</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041446132</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 325f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Runtime verification</subfield><subfield code="b">4th international conference, RV 2013, Rennes, France, September 24 - 27, 2013 ; proceedings</subfield><subfield code="c">Axel Legay .... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVII, 426 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8174</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hardwareverifikation</subfield><subfield code="0">(DE-588)4214982-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Laufzeitsystem</subfield><subfield code="0">(DE-588)4343107-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmanalyse</subfield><subfield code="0">(DE-588)4175841-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerarchitektur</subfield><subfield code="0">(DE-588)4048717-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmverifikation</subfield><subfield code="0">(DE-588)4135576-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systemanalyse</subfield><subfield code="0">(DE-588)4116673-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmlaufzeit</subfield><subfield code="0">(DE-588)4745613-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Rennes</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Systemanalyse</subfield><subfield code="0">(DE-588)4116673-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerarchitektur</subfield><subfield code="0">(DE-588)4048717-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Laufzeitsystem</subfield><subfield code="0">(DE-588)4343107-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Hardwareverifikation</subfield><subfield code="0">(DE-588)4214982-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Programmanalyse</subfield><subfield code="0">(DE-588)4175841-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Softwarearchitektur</subfield><subfield code="0">(DE-588)4121677-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Programmlaufzeit</subfield><subfield code="0">(DE-588)4745613-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Programmverifikation</subfield><subfield code="0">(DE-588)4135576-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Legay, Axel</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">RV</subfield><subfield code="n">4</subfield><subfield code="d">2013</subfield><subfield code="c">Rennes</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1042305544</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">8174</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">8174</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-40787-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026892800&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026892800&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026892800</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Rennes gnd-content |
genre_facet | Konferenzschrift 2013 Rennes |
id | DE-604.BV041446132 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:17Z |
institution | BVB |
institution_GND | (DE-588)1042305544 |
isbn | 9783642407864 9783642407871 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026892800 |
oclc_num | 861540801 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVII, 426 S.) Ill., graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Runtime verification 4th international conference, RV 2013, Rennes, France, September 24 - 27, 2013 ; proceedings Axel Legay .... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (XVII, 426 S.) Ill., graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 8174 Formale Methode (DE-588)4333722-3 gnd rswk-swf Hardwareverifikation (DE-588)4214982-4 gnd rswk-swf Laufzeitsystem (DE-588)4343107-0 gnd rswk-swf Programmanalyse (DE-588)4175841-9 gnd rswk-swf Computerarchitektur (DE-588)4048717-9 gnd rswk-swf Programmverifikation (DE-588)4135576-3 gnd rswk-swf Systemanalyse (DE-588)4116673-5 gnd rswk-swf Softwarearchitektur (DE-588)4121677-5 gnd rswk-swf Programmlaufzeit (DE-588)4745613-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Rennes gnd-content Systemanalyse (DE-588)4116673-5 s Computerarchitektur (DE-588)4048717-9 s Laufzeitsystem (DE-588)4343107-0 s Hardwareverifikation (DE-588)4214982-4 s Formale Methode (DE-588)4333722-3 s DE-604 Programmanalyse (DE-588)4175841-9 s Softwarearchitektur (DE-588)4121677-5 s Programmlaufzeit (DE-588)4745613-9 s Programmverifikation (DE-588)4135576-3 s Legay, Axel Sonstige oth RV 4 2013 Rennes Sonstige (DE-588)1042305544 oth Lecture notes in computer science 8174 (DE-604)BV014880109 8174 https://doi.org/10.1007/978-3-642-40787-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026892800&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026892800&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Runtime verification 4th international conference, RV 2013, Rennes, France, September 24 - 27, 2013 ; proceedings Lecture notes in computer science Formale Methode (DE-588)4333722-3 gnd Hardwareverifikation (DE-588)4214982-4 gnd Laufzeitsystem (DE-588)4343107-0 gnd Programmanalyse (DE-588)4175841-9 gnd Computerarchitektur (DE-588)4048717-9 gnd Programmverifikation (DE-588)4135576-3 gnd Systemanalyse (DE-588)4116673-5 gnd Softwarearchitektur (DE-588)4121677-5 gnd Programmlaufzeit (DE-588)4745613-9 gnd |
subject_GND | (DE-588)4333722-3 (DE-588)4214982-4 (DE-588)4343107-0 (DE-588)4175841-9 (DE-588)4048717-9 (DE-588)4135576-3 (DE-588)4116673-5 (DE-588)4121677-5 (DE-588)4745613-9 (DE-588)1071861417 |
title | Runtime verification 4th international conference, RV 2013, Rennes, France, September 24 - 27, 2013 ; proceedings |
title_auth | Runtime verification 4th international conference, RV 2013, Rennes, France, September 24 - 27, 2013 ; proceedings |
title_exact_search | Runtime verification 4th international conference, RV 2013, Rennes, France, September 24 - 27, 2013 ; proceedings |
title_full | Runtime verification 4th international conference, RV 2013, Rennes, France, September 24 - 27, 2013 ; proceedings Axel Legay .... (eds.) |
title_fullStr | Runtime verification 4th international conference, RV 2013, Rennes, France, September 24 - 27, 2013 ; proceedings Axel Legay .... (eds.) |
title_full_unstemmed | Runtime verification 4th international conference, RV 2013, Rennes, France, September 24 - 27, 2013 ; proceedings Axel Legay .... (eds.) |
title_short | Runtime verification |
title_sort | runtime verification 4th international conference rv 2013 rennes france september 24 27 2013 proceedings |
title_sub | 4th international conference, RV 2013, Rennes, France, September 24 - 27, 2013 ; proceedings |
topic | Formale Methode (DE-588)4333722-3 gnd Hardwareverifikation (DE-588)4214982-4 gnd Laufzeitsystem (DE-588)4343107-0 gnd Programmanalyse (DE-588)4175841-9 gnd Computerarchitektur (DE-588)4048717-9 gnd Programmverifikation (DE-588)4135576-3 gnd Systemanalyse (DE-588)4116673-5 gnd Softwarearchitektur (DE-588)4121677-5 gnd Programmlaufzeit (DE-588)4745613-9 gnd |
topic_facet | Formale Methode Hardwareverifikation Laufzeitsystem Programmanalyse Computerarchitektur Programmverifikation Systemanalyse Softwarearchitektur Programmlaufzeit Konferenzschrift 2013 Rennes |
url | https://doi.org/10.1007/978-3-642-40787-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026892800&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026892800&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT legayaxel runtimeverification4thinternationalconferencerv2013rennesfranceseptember24272013proceedings AT rvrennes runtimeverification4thinternationalconferencerv2013rennesfranceseptember24272013proceedings |