Sampling-based Decentralized Monitoring for Networked Embedded Systems, Proceedings Third International Workshop on Hybrid Autonomous Systems, HAS 2013, pp.85-99, 2013. ,
DOI : 10.1007/3-540-44667-2_7
First international Competition on Runtime Verification: rules, benchmarks, tools, and final results of CRV 2014, International Journal on Software Tools for Technology Transfer, vol.53, issue.4, pp.1-40, 2017. ,
DOI : 10.1016/j.comnet.2008.09.022
Failure-aware Runtime Verification of Distributed Systems, 35th IARCS Annual Conference on Foundation of Software Technology and Theoretical Computer Science Prahladh Schloss Dagstuhl -Leibniz-Zentrum fuer Informatik, pp.590-603, 2015. ,
Runtime Verification for LTL and TLTL, ACM Transactions on Software Engineering and Methodology, vol.20, issue.4, 2011. ,
DOI : 10.1145/2000799.2000800
Decentralised LTL Monitoring, FM 2012: Formal Methods -18th International Symposium, pp.85-100, 2012. ,
DOI : 10.1007/978-3-642-32759-9_10
URL : https://hal.archives-ouvertes.fr/hal-00857286
Challenges in Fault-Tolerant Distributed Runtime Verification, See, pp.363-370978, 2016. ,
DOI : 10.1007/978-3-319-47169-3_27
The Complexity of Boolean Formula Minimization, Automata, Languages and Programming, 35th International Colloquium Proceedings, Part I: Tack A: Algorithms, Automata, Complexity, and Games, 2008. ,
Organising LTL monitors over distributed systems with a global clock Formal Methods in System Design, pp.1-2, 2016. ,
A Data Flow Monitoring Service Based on Runtime Verification for AUTOSAR, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems, pp.1508-1515, 2012. ,
DOI : 10.1109/HPCC.2012.220
Topology, monitorable properties and runtime verification, Theoretical Computer Science, vol.537, pp.29-41, 2011. ,
DOI : 10.1016/j.tcs.2014.02.052
On Distributed Monitoring of Asynchronous Systems, Logic, Language, Information and Computation -19th International Workshop, WoLLIC 2012, Buenos Aires, Argentina, pp.70-84, 2012. ,
DOI : 10.1007/978-3-642-32621-9_5
URL : https://hal.archives-ouvertes.fr/hal-00825771
Manipulating LTL Formulas Using Spot 1.0, Proceedings of the 11th International Symposium on Automated Technology for Verification and Analysis (ATVA'13), pp.442-445, 2013. ,
DOI : 10.1007/978-3-319-02444-8_31
URL : http://www.lrde.epita.fr/~adl/dl/adl/duret.13.atva.pdf
THEMIS: a tool for decentralized monitoring algorithms, Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis , ISSTA 2017, 2017. ,
DOI : 10.1007/s10515-005-6205-y
URL : https://hal.archives-ouvertes.fr/hal-01653727
You Should Better Enforce Than Verify, Runtime Verification -First International Conference, pp.89-105, 2010. ,
DOI : 10.1007/978-3-642-04766-4_20
URL : https://hal.archives-ouvertes.fr/hal-00523653
Efficient and Generalized Decentralized Monitoring of Regular Languages, Formal Techniques for Distributed Objects, Components, and Systems -34th IFIP WG 6.1 International Conference, pp.66-83978, 2014. ,
DOI : 10.1007/978-3-662-43613-4_5
URL : https://hal.archives-ouvertes.fr/hal-00972559
What can you verify and enforce at runtime? STTT, pp.349-382, 2012. ,
DOI : 10.1007/s10009-011-0196-8
URL : http://www.irisa.fr/vertecs/Publis/Ps/STTT-2011.pdf
A Tutorial on Runtime Verification NATO science for peace and security series, d: information and communication security, pp.141-175978, 2013. ,
An Overview of AspectJ, ECOOP 2001 -Object- Oriented Programming, 15th European Conference Proceedings (Lecture Notes in Computer Science), pp.327-353, 2001. ,
DOI : 10.1007/3-540-45337-7_18
Formally specified monitoring of temporal properties, 11th Euromicro Conference on Real-Time Systems, pp.9-11, 1999. ,
A brief account of runtime verification, The Journal of Logic and Algebraic Programming, vol.78, issue.5, pp.293-303, 2009. ,
DOI : 10.1016/j.jlap.2008.08.004
Runtime Verification for Interconnected Medical Devices, See, pp.380-387978, 2016. ,
DOI : 10.1007/978-3-319-47169-3_29
PSL Model Checking and Run-Time Verification Via Testers, FM 2006: Formal Methods, 14th International Symposium on Formal Methods Proceedings (Lecture Notes in Computer Science), Jayadev Misra, pp.573-586, 2006. ,
DOI : 10.1007/11813040_38
Rewriting-Based Techniques for Runtime Verification, Automated Software Engineering, vol.32, issue.3, pp.151-197, 2005. ,
DOI : 10.1007/978-1-4612-4222-2
Three-valued asynchronous distributed runtime verification, 2014 Twelfth ACM/IEEE Conference on Formal Methods and Models for Codesign (MEMOCODE), pp.52-61, 2014. ,
DOI : 10.1109/MEMCOD.2014.6961843
Efficient decentralized monitoring of safety in distributed systems, Proceedings. 26th International Conference on Software Engineering, pp.23-28, 2004. ,
DOI : 10.1109/ICSE.2004.1317464
Conflict-Free Replicated Data Types, Stabilization, Safety, and Security of Distributed Systems -13th International Symposium Proceedings (Lecture Notes in Computer Science), Xavier Défago, pp.386-400, 2011. ,
DOI : 10.1145/800222.806750
URL : https://hal.archives-ouvertes.fr/hal-00932836
Monitoring Algorithms for Metric Temporal Logic Specifications, Electronic Notes in Theoretical Computer Science, vol.113, pp.145-162, 2005. ,
DOI : 10.1016/j.entcs.2004.01.029
URL : https://doi.org/10.1016/j.entcs.2004.01.029
A Bridging Model for Parallel Computation, Commun. ACM, vol.33, issue.8, pp.103-11179181, 1990. ,
Efficient Solutions to the Replicated Log and Dictionary Problems, Operating Systems Review, vol.20, issue.1, pp.57-66, 1986. ,