Search dblp for Publications

export results for "toc:db/conf/rv/rv2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/rv/BaranB08,
  author       = {Joachim Baran and
                  Howard Barringer},
  editor       = {Martin Leucker},
  title        = {Forays into Sequential Composition and Concatenation in Eagle},
  booktitle    = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  pages        = {69--85},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2\_5},
  doi          = {10.1007/978-3-540-89247-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/BaranB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/BelhaouariP08,
  author       = {Hakim Belhaouari and
                  Fr{\'{e}}d{\'{e}}ric Peschanski},
  editor       = {Martin Leucker},
  title        = {A Lightweight Container Architecture for Runtime Verification},
  booktitle    = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  pages        = {173--187},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2\_11},
  doi          = {10.1007/978-3-540-89247-2\_11},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/BelhaouariP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/DineshJLS08,
  author       = {Nikhil Dinesh and
                  Aravind K. Joshi and
                  Insup Lee and
                  Oleg Sokolsky},
  editor       = {Martin Leucker},
  title        = {Checking Traces for Regulatory Conformance},
  booktitle    = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  pages        = {86--103},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2\_6},
  doi          = {10.1007/978-3-540-89247-2\_6},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rv/DineshJLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/GopinathanR08,
  author       = {Madhu Gopinathan and
                  Sriram K. Rajamani},
  editor       = {Martin Leucker},
  title        = {Runtime Monitoring of Object Invariants with Guarantee},
  booktitle    = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  pages        = {158--172},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2\_10},
  doi          = {10.1007/978-3-540-89247-2\_10},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/GopinathanR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/Goubault-LarrecqO08,
  author       = {Jean Goubault{-}Larrecq and
                  Julien Olivain},
  editor       = {Martin Leucker},
  title        = {A Smell of Orchids},
  booktitle    = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2\_1},
  doi          = {10.1007/978-3-540-89247-2\_1},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/Goubault-LarrecqO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/JulaC08,
  author       = {Horatiu Jula and
                  George Candea},
  editor       = {Martin Leucker},
  title        = {A Scalable, Sound, Eventually-Complete Algorithm for Deadlock Immunity},
  booktitle    = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  pages        = {119--136},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2\_8},
  doi          = {10.1007/978-3-540-89247-2\_8},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/JulaC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/Jurjens08,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Martin Leucker},
  title        = {Model-Based Run-Time Checking of Security Permissions Using Guarded
                  Objects},
  booktitle    = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2\_3},
  doi          = {10.1007/978-3-540-89247-2\_3},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/Jurjens08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/Nir-BuchbinderTU08,
  author       = {Yarden Nir{-}Buchbinder and
                  Rachel Tzoref and
                  Shmuel Ur},
  editor       = {Martin Leucker},
  title        = {Deadlocks: From Exhibiting to Healing},
  booktitle    = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2\_7},
  doi          = {10.1007/978-3-540-89247-2\_7},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/Nir-BuchbinderTU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/RosuCB08,
  author       = {Grigore Rosu and
                  Feng Chen and
                  Thomas Ball},
  editor       = {Martin Leucker},
  title        = {Synthesizing Monitors for Safety Properties: This Time with Calls
                  and Returns},
  booktitle    = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  pages        = {51--68},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2\_4},
  doi          = {10.1007/978-3-540-89247-2\_4},
  timestamp    = {Tue, 09 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/RosuCB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/Rushby08,
  author       = {John M. Rushby},
  editor       = {Martin Leucker},
  title        = {Runtime Certification},
  booktitle    = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  pages        = {21--35},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2\_2},
  doi          = {10.1007/978-3-540-89247-2\_2},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/Rushby08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/SimmondsCNLO08,
  author       = {Jocelyn Simmonds and
                  Marsha Chechik and
                  Shiva Nejati and
                  Elena Litani and
                  Bill O'Farrell},
  editor       = {Martin Leucker},
  title        = {Property Patterns for Runtime Monitoring of Web Service Conversations},
  booktitle    = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  pages        = {137--157},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2\_9},
  doi          = {10.1007/978-3-540-89247-2\_9},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/SimmondsCNLO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rv/2008,
  editor       = {Martin Leucker},
  title        = {Runtime Verification, 8th International Workshop, {RV} 2008, Budapest,
                  Hungary, March 30, 2008. Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5289},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89247-2},
  doi          = {10.1007/978-3-540-89247-2},
  isbn         = {978-3-540-89246-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rv/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics