Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/91292
Full metadata record
DC FieldValueLanguage
dc.contributor.authorColombo, Christian-
dc.contributor.authorFalcone, Yliès-
dc.contributor.authorLeucker, Martin-
dc.contributor.authorReger, Giles-
dc.contributor.authorSanchez, Cesar-
dc.contributor.authorSchneider, Gerardo-
dc.contributor.authorStolz, Volker-
dc.date.accessioned2022-03-14T11:17:35Z-
dc.date.available2022-03-14T11:17:35Z-
dc.date.issued2018-
dc.identifier.citationColombo, C., Falcone, Y., Leucker, M., Reger, G., Sanchez, C., Schneider, G., & Stolz, V. (2018). COST Action IC1402 runtime verification beyond monitoring. In C. Colombo & M. Leucker (Eds.), Runtime verification (pp. 18-26). Cham: Springer.en_GB
dc.identifier.urihttps://www.um.edu.mt/library/oar/handle/123456789/91292-
dc.description.abstractIn this paper we report on COST Action IC1402 which studies Runtime Verification approaches beyond Monitoring. COST Actions are funded by the European Union and are an efficient networking instrument for researchers, engineers and scholars to cooperate and coordinate research activities. This COST action IC1402 lasted over the past four years, involved researchers from 27 different European countries and Australia and allowed to have many different working group meetings, workshops and individual visits.en_GB
dc.language.isoenen_GB
dc.publisherSpringeren_GB
dc.rightsinfo:eu-repo/semantics/restrictedAccessen_GB
dc.subjectComputer software -- Verificationen_GB
dc.subjectSoftware engineeringen_GB
dc.subjectComputer software -- Security measuresen_GB
dc.subjectSoftware architectureen_GB
dc.titleCOST Action IC1402 runtime verification beyond monitoringen_GB
dc.title.alternativeRuntime verificationen_GB
dc.typebookParten_GB
dc.rights.holderThe copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder.en_GB
dc.description.reviewedpeer-revieweden_GB
dc.identifier.doi10.1007/978-3-030-03769-7_2-
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
COST_Action_IC1402_runtime_verification_beyond_monitoring_2018.pdf
  Restricted Access
144.47 kBAdobe PDFView/Open Request a copy


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.