Learn More
We introduce the tool RiTHM (Runtime Time-triggered Heterogeneous Monitoring). RiTHM takes a C program under inspection and a set of LTL properties as input and generates an instrumented C program that is verified at run time by a time-triggered monitor. RiTHM provides two techniques based on static analysis and control theory to minimize instrumentation of(More)
Broadly defined, disease, or health management, is a focused application of resources to improve patient outcomes; its premise: things can be better. In particular, the gap between what best care could be, and what usual care is, can be reduced and, consequently, care and outcomes can be improved. This paper reviews the evolution of the(More)
The first international Competition on Runtime Verification (CRV) was held in September 2014, in Toronto, Canada, as a satellite event of the 14th international conference on Runtime Verification (RV’14). The event was organized in three tracks: (1) offline monitoring, (2) online monitoring of C programs, and (3) online monitoring of Java programs. In this(More)
Runtime verification is an effective automated method for specification-based offline testing and analysis as well as online monitoring of complex systems. The specification language is often a variant of regular expressions or a popular temporal logic, such as Ltl. This paper presents a novel and efficient parallel algorithm for verifying a more expressive(More)
Dynamic behavior of a program can be assessed through examination of events emitted by the program during execution. Temporal properties define the order of occurrence and timing constraints on event occurrence. Such specifications are important for safety-critical real-time systems for which a delayed response to an emitted event may lead to a fault in the(More)
The spectrum of xenon excited in a low-inductance vacuum spark was photographed at high resolution in the region of 9.5-15.5 nm. The observed transitions were identified as belonging to ions from Xe8+ to Xe13+. In the region of importance for extreme-ultraviolet lithography around 13.4 nm, the strongest lines were identified as 4d8-4d7 5p transitions in(More)
Runtime verification techniques mostly assume the existence of complete execution traces. However, real-world systems often produce lossy traces due to network issues, partial instrumentation, sampling, and logging failures. A few verification techniques have recently emerged to handle systems with incomplete traces. Some of these techniques sacrifice(More)
  • 1