Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/91292
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Colombo, Christian | - |
dc.contributor.author | Falcone, Yliès | - |
dc.contributor.author | Leucker, Martin | - |
dc.contributor.author | Reger, Giles | - |
dc.contributor.author | Sanchez, Cesar | - |
dc.contributor.author | Schneider, Gerardo | - |
dc.contributor.author | Stolz, Volker | - |
dc.date.accessioned | 2022-03-14T11:17:35Z | - |
dc.date.available | 2022-03-14T11:17:35Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Colombo, C., Falcone, Y., Leucker, M., Reger, G., Sanchez, C., Schneider, G., & Stolz, V. (2018). COST Action IC1402 runtime verification beyond monitoring. In C. Colombo & M. Leucker (Eds.), Runtime verification (pp. 18-26). Cham: Springer. | en_GB |
dc.identifier.uri | https://www.um.edu.mt/library/oar/handle/123456789/91292 | - |
dc.description.abstract | In this paper we report on COST Action IC1402 which studies Runtime Verification approaches beyond Monitoring. COST Actions are funded by the European Union and are an efficient networking instrument for researchers, engineers and scholars to cooperate and coordinate research activities. This COST action IC1402 lasted over the past four years, involved researchers from 27 different European countries and Australia and allowed to have many different working group meetings, workshops and individual visits. | en_GB |
dc.language.iso | en | en_GB |
dc.publisher | Springer | en_GB |
dc.rights | info:eu-repo/semantics/restrictedAccess | en_GB |
dc.subject | Computer software -- Verification | en_GB |
dc.subject | Software engineering | en_GB |
dc.subject | Computer software -- Security measures | en_GB |
dc.subject | Software architecture | en_GB |
dc.title | COST Action IC1402 runtime verification beyond monitoring | en_GB |
dc.title.alternative | Runtime verification | en_GB |
dc.type | bookPart | en_GB |
dc.rights.holder | The copyright of this work belongs to the author(s)/publisher. The rights of this work are as defined by the appropriate Copyright Legislation or as modified by any successive legislation. Users may access this work and can make use of the information contained in accordance with the Copyright Legislation provided that the author must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the prior permission of the copyright holder. | en_GB |
dc.description.reviewed | peer-reviewed | en_GB |
dc.identifier.doi | 10.1007/978-3-030-03769-7_2 | - |
Appears in Collections: | Scholarly Works - FacICTCS |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
COST_Action_IC1402_runtime_verification_beyond_monitoring_2018.pdf Restricted Access | 144.47 kB | Adobe PDF | View/Open Request a copy |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.