From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id 1EC1D7EE6B for ; Thu, 21 Nov 2013 10:38:31 +0100 (CET) Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of ylies.falcone@ujf-grenoble.fr) identity=pra; client-ip=129.88.30.17; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="ylies.falcone@ujf-grenoble.fr"; x-sender="ylies.falcone@ujf-grenoble.fr"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of ylies.falcone@ujf-grenoble.fr) identity=mailfrom; client-ip=129.88.30.17; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="ylies.falcone@ujf-grenoble.fr"; x-sender="ylies.falcone@ujf-grenoble.fr"; x-conformance=sidf_compatible Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of postmaster@rominette.imag.fr) identity=helo; client-ip=129.88.30.17; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="ylies.falcone@ujf-grenoble.fr"; x-sender="postmaster@rominette.imag.fr"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgIEABjTjVKBWB4Rh2dsb2JhbABZgz+/Ag4BAQEIDQkHFiiDEgIKXXuIAQ2gV6Agji2EZYESA5lCkkqBP4FpJA X-IPAS-Result: AgIEABjTjVKBWB4Rh2dsb2JhbABZgz+/Ag4BAQEIDQkHFiiDEgIKXXuIAQ2gV6Agji2EZYESA5lCkkqBP4FpJA X-IronPort-AV: E=Sophos;i="4.93,743,1378850400"; d="scan'208";a="36930830" Received: from mx2.imag.fr (HELO rominette.imag.fr) ([129.88.30.17]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-SHA; 21 Nov 2013 10:38:30 +0100 Received: from globule.imag.fr (globule.imag.fr [129.88.34.238]) by rominette.imag.fr (8.13.8/8.13.8) with ESMTP id rAL9cPY4029923 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Thu, 21 Nov 2013 10:38:25 +0100 Received: from eduroam-032038.grenet.fr (eduroam-032038.grenet.fr [130.190.32.38]) (authenticated bits=0) by globule.imag.fr (8.13.8/8.13.8) with ESMTP id rAL9cQm2020572 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Thu, 21 Nov 2013 10:38:26 +0100 From: Ylies Falcone Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable Message-Id: <10BE78A6-F2C7-474B-8A41-3AE34794A3F1@ujf-grenoble.fr> Date: Thu, 21 Nov 2013 10:38:26 +0100 To: caml-list@inria.fr Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\)) X-Mailer: Apple Mail (2.1822) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.2.2 (rominette.imag.fr [129.88.30.17]); Thu, 21 Nov 2013 10:38:25 +0100 (CET) X-IMAG-MailScanner-Information: Please contact MI2S MIM for more information X-MailScanner-ID: rAL9cPY4029923 X-IMAG-MailScanner: Found to be clean X-IMAG-MailScanner-SpamCheck: X-IMAG-MailScanner-From: ylies.falcone@ujf-grenoble.fr MailScanner-NULL-Check: 1385631509.26113@FqQ/ezQKRubN8+MAeqL05Q X-Validation-by: ylies.falcone@ujf-grenoble.fr Subject: [Caml-list] =?WINDOWS-1252?Q?1st_CFP=3A_14th_International_Confer?= =?WINDOWS-1252?Q?ence_on_Runtime_Verification_September_22_=96_25=2C_2014?= =?WINDOWS-1252?Q?_Toronto=2C_Canada?= [Apologizes for duplicates] 14th International Conference on Runtime Verification September 22 =96 25, 2014 Toronto, Canada http://rv2014.imag.fr/ Scope: Runtime verification is concerned with monitoring and analysis of software = and hardware system executions. Runtime verification techniques are crucial= for system correctness, reliability, and robustness; they are significantl= y more powerful and versatile than conventional testing, and more practical= than exhaustive formal verification. Runtime verification can be used prio= r to deployment, for testing, verification, and debugging purposes, and aft= er deployment for ensuring reliability, safety, and security and for provid= ing fault containment and recovery as well as online system repair. Topics = of interest to the conference include: =95 specification languages =95 specification mining =95 program instrumentation =95 monitor construction techniques =95 logging, recording, and replay =95 fault detection, localization, containment, recovery and repair =95 program steering and adaptation =95 metrics and statistical information gathering =95 combination of static and dynamic analyses =95 program execution visualization =95 monitoring techniques for safety/mission-critical systems =95 monitoring distributed systems, cloud services, and big data applicati= ons =95 monitoring security and privacy policies Application areas of runtime verification include safety/mission-critical s= ystems, enterprise and systems software, autonomous and reactive control sy= stems, health management and diagnosis systems, and system security and pri= vacy. =20 Technical Research Papers Track: Technical research papers can be submitted in two categories: regular and s= hort papers. Papers in both categories will be reviewed by the conference P= rogram Committee. All accepted technical papers will appear in an LNCS volu= me. Submitted papers must use the LNCS style. At least one author of each a= ccepted paper must attend RV=9214 to present the paper. Papers must be subm= itted electronically using theEasyChair system. =95 Regular papers (up to 15 pages) should present original unpublished re= sults. Theoretical and experimental papers as well as papers on application= s of runtime verification and case studies are all welcome. A non-monetary = Best Paper Award will be given. A selection of accepted regular papers will= be invited to appear in a special issue of the Springer Journal on Formal = Methods in System Design. =95 Short papers (up to 5 pages) may present novel but not necessarily tho= roughly worked out ideas, for example emerging runtime verification techniq= ues and applications, or techniques and applications that establish relatio= nships between runtime verification and other domains. Accepted short paper= s will be presented in special short talk (10 minutes) and poster sessions. =20 Program committee Borzoo Bonakdarpour (University of Waterloo, Canada), co-chair Scott Smolka (Stony Brook Universtiy, USA), co-chair =20 Gul Agha (University of Illinois at Urbana-Champaign, USA) Thomas Ball (Microsoft Research, Redmond, USA) Howard Barringer (The University of Manchester, UK) Ezio Bartocci (TU Wien, Austria) David Basin (ETH Zurich, Switzerland) Saddek Bensalem (Verimag, France) Eric Bodden (TU =96 Darmstadt, Germany) Ivona Brandic (TU Wien, Austria) Marsha Chechik (University of Toronto, Canada) Michael Clarkson (George Washington University, USA) Laura Dillon (Michigan State University, USA) Shlomi Dolev (Ben Gurion University, Israel) Alastair Donaldson (Imperial College London, UK) Dawson Engler (Stanford University, USA) Ylies Falcone (Universit=E9 Joseph Fourier, France) Vijay Garg (University of Texas at Austin, USA) Steve Goddard (University of Nebraska-Lincoln, USA) Ganesh Gopalakrishnan (University of Utah, USA) Wolfgang Grieskamp (Google, USA) Radu Grosu (TU- Wien, Austria) Klaus Havelund (NASA/JPL, USA) Mats Heimdahl (University of Minnesota, USA) Laurie Hendren (McGill University, Canada) Gerard Holzmann (NASA/JPL, USA) Daniel Keren (Haifa University, Israel) Sandeep Kulkarni (Michigan State University, USA) Marta Kwiatkowska (University of Oxford, UK) Insup Lee (University of Pennsylvania, USA)=20=20=20=20=20=20=20=20=20=20= =20=20=20 Axel Legay (IRISA/INRIA, France Martin Leucker (University of L=FCbeck, Germany) Leonardo Mariani (University of Milano Bicocca, Italy) Patrick Meredith (University of Illinois at Urbana-Champaign, USA) David Naumann (Stevens Institute of Technology, USA) Doron Peled (Bar Ilan University, Israel) Mauro Pezze (University of Lugano, Switzerland) Lee Pike (Galois Inc., USA) Zvonimir Rakamaric (University of Utah, USA) Grigore Rosu (University of Illinois at Urbana-Champaign, USA) Andrey Rybalchenko (TU-Munich, Germany) Andre Schiper (EPFL, Switzerland) Oleg Sokolsky (University of Pennsylvania, USA) Scott Stoller (Stony Brook University, USA) Serdar Tasiran (Koc University, Turkey) Michael Whalen (University of Minnesota, USA) Lenore Zuck (University of Illinois at Chicago, USA) =20 Tool Demonstrations Track: The aim of the RV 2014 tool demonstration track is to provide an opportunit= y for researchers and practitioners to show and to discuss the latest advan= ces, experiences and challenges in devising and developing reliable softwar= e tools for runtime verification. Tool demonstration papers will be reviewe= d by the Tools Track Program Committee. All accepted tool demonstration pap= ers will appear in the conference proceedings LNCS volume. Submitted papers= must use the LNCS style. At least one author of each accepted paper must a= ttend RV=9214 to present the paper. Papers must be submitted electronically= using the EasyChair system. Tool papers should meet the following criteria: =95 A tool paper should present a new tool, a new tool component or novel = extensions to existing tools supporting runtime verification. Each submissi= on should be original and not published previously in a tool paper form. =95 Each submission must not exceed 8 pages in the LNCS/Springer proceedin= g format, including all text, references and figures. The paper must be wri= tten in English and provided in PDF format. =95 Each submission must be accompanied at the time of the submission by a= short screencast (between 5-10 minutes), with voice and overlay text comme= ntary illustrating the demonstration of the tool (a link to it should be pr= ovided in the paper). =95 The paper must include information on tool availability, maturity, sel= ected experimental results and it should provide a link to a website contai= ning the theoretical background and user guide. Furthermore, we strongly en= courage authors to make their tools and benchmarks available with their sub= mission. =95 Each tool paper must include a script in an appendix (not included in = the page count) describing how the demo will be conducted during the confer= ence presentation with screenshots presenting step-by-step the tool=92s cap= abilities, highlighting the main characteristics and the usage. =20 Evaluation Each submission will be reviewed by at least four members of the tool demon= stration track program committee. The evaluation criteria will include: =95 the presentation quality =95 the availability (possibly in a open-source format) of the software. =95 the relevance for the Runtime Verification audience =95 the technical soundness of the presented tool =95 the originality of the underlying ideas =20 Tool Demonstration Committee Ezio Bartocci, (TU-Vienna, Austria), Chair Eric Bodden (TU =96 Darmstadt, Germany) Alastair Donaldson (Imperial College London, UK) Dawson Engler (Stanford University, USA) Ylies Falcone (Universit=E9 Joseph Fourier, France) Klaus Havelund (NASA/JPL, USA) Michael Whalen (University of Minnesota, USA) Important Dates: Both research papers and tool demonstration tracks will follow the followin= g timeline: =95 Abstract deadline: April 8, 2014 =95 Full paper deadline: April 15, 2014 =95 Rebuttal phase: May 18-20, 2014 =95 Acceptance notification: June 10, 2014 =95 Camera ready submission: June 25, 2014 =95 Conference dates: 22-25 September, 2014 =20 Competition on Software for Runtime Verification (CSRV-2014) A satellite event of RV=9214 is the first International Competition on Sof= tware for Runtime Verification (CRVS=9214). The main aims of CSRV-2014 comp= etition are to: =95 Stimulate the development of new efficient and practical runtime verif= ication tools and the maintenance of the already developed ones. =95 Produce a benchmark suite for runtime verification tools, by sharing c= ase studies and programs that researchers and developers can use in the fut= ure to test and to validate their prototypes. =95 Discuss the metrics employed for comparing the tools. =95 Provide a comparison of the tools running with different benchmarks an= d evaluating using different criteria. =95 Enhance the visibility of presented tools among the different communit= ies (software engineering, formal methods and automated verification, distr= ibuted computing, security, and safety-critical systems) involved in softwa= re monitoring. CRVS=9214 will follow the following time line: =95 Declaration of intent: December 15, 2013 =95 Deadline for submission of benchmarks: March 1, 2014 =95 Monitoring tool submission: June 1, 2014 =95 Notification: July 1, 2014 For more information, visit http://rv2014.imag.fr/monitoring-competition or= contact the event organizers: =95 Ezio Bartocci (TU-Wien, Austria), ezio.bartocci@tuwien.ac.at =95 Borzoo Bonakdarpour (U. Waterloo, Canada), borzoo@cs.uwaterloo.ca =95 Ylies Falcone (U. Joseph Fourier, France), ylies.falcone@ujf-grenoble.= fr=