2018
DOI: 10.1007/978-3-030-03769-7_1
|View full text |Cite
|
Sign up to set email alerts
|

Runtime Verification - 17 Years Later

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 52 publications
0
8
0
Order By: Relevance
“…Runtime assurance is essential in the deployment of safety-critical (cyberphysical) systems [12,29,45,49,50]. Monitors observe system behavior and indicate when the system is at risk to violate system specifications.…”
Section: Introductionmentioning
confidence: 99%
“…Runtime assurance is essential in the deployment of safety-critical (cyberphysical) systems [12,29,45,49,50]. Monitors observe system behavior and indicate when the system is at risk to violate system specifications.…”
Section: Introductionmentioning
confidence: 99%
“…Path checking is generally much easier than model checking [3], particularly for infinite state models, for which the model checking problem is usually undecidable. Hence runtime verification, a popular approach to formal system verification [4], abandons model checking in favour of path checking, at the expense of exhaustive coverage. Path checking algorithms for discrete words are well studied [1,3,5].…”
Section: Introductionmentioning
confidence: 99%
“…Runtime assurance is essential in deployment of safety-critical (cyber-physical) systems [44,12,29,48]. Monitors observe system behavior and indicate when the system is at risk to violate system specifications.…”
Section: Introductionmentioning
confidence: 99%