From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) by sympa.inria.fr (Postfix) with ESMTPS id C92967EEF8; Mon, 13 Jul 2015 11:09:58 +0200 (CEST) Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of Dejan.Nickovic@ait.ac.at) identity=pra; client-ip=62.218.164.132; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="Dejan.Nickovic@ait.ac.at"; x-sender="Dejan.Nickovic@ait.ac.at"; x-conformance=sidf_compatible Received-SPF: Pass (mail2-smtp-roc.national.inria.fr: domain of Dejan.Nickovic@ait.ac.at designates 62.218.164.132 as permitted sender) identity=mailfrom; client-ip=62.218.164.132; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="Dejan.Nickovic@ait.ac.at"; x-sender="Dejan.Nickovic@ait.ac.at"; x-conformance=sidf_compatible; x-record-type="v=spf1" Received-SPF: None (mail2-smtp-roc.national.inria.fr: no sender authenticity information available from domain of postmaster@MX2.ait.ac.at) identity=helo; client-ip=62.218.164.132; receiver=mail2-smtp-roc.national.inria.fr; envelope-from="Dejan.Nickovic@ait.ac.at"; x-sender="postmaster@MX2.ait.ac.at"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0BOAgD5f6NVmYSk2j5bgkchgQBdDAEFqVORN4IDGQEJgkODNAIogQlMAQEBAQEBEgEBAQEBCAsLByEuhBsKBR0QOwUeASoWAQY5FBIBFwiFaoI9AwmjE6A+hRABAQgBAQEBHo0JgmYKBwEgDx0Lgi4MPgMdgRQFhV2HB4dNhGmCXoQ+THJFg1OPNYNfEYIhBBiBU28BgQMJFyOBBAEBBQ X-IPAS-Result: A0BOAgD5f6NVmYSk2j5bgkchgQBdDAEFqVORN4IDGQEJgkODNAIogQlMAQEBAQEBEgEBAQEBCAsLByEuhBsKBR0QOwUeASoWAQY5FBIBFwiFaoI9AwmjE6A+hRABAQgBAQEBHo0JgmYKBwEgDx0Lgi4MPgMdgRQFhV2HB4dNhGmCXoQ+THJFg1OPNYNfEYIhBBiBU28BgQMJFyOBBAEBBQ X-IronPort-AV: E=Sophos;i="5.15,461,1432591200"; d="scan'208,217";a="170015523" Received: from mx2.ait.ac.at ([62.218.164.132]) by mail2-smtp-roc.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-SHA; 13 Jul 2015 11:09:57 +0200 Received: from pps.filterd (MX2.ait.ac.at [127.0.0.1]) by MX2.ait.ac.at (8.14.7/8.14.7) with SMTP id t6D98AL6005179; Mon, 13 Jul 2015 11:08:10 +0200 Received: from mail.ait.ac.at ([172.30.249.112]) by MX2.ait.ac.at with ESMTP id 1vjrf90dg7-1 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Mon, 13 Jul 2015 11:08:10 +0200 Received: from S0MSMAIL111.arc.local ([fe80::15d2:6d5:afe6:87a1]) by S0MSMAIL112.arc.local ([fe80::21c5:500c:ccf2:8b91%24]) with mapi id 14.03.0224.002; Mon, 13 Jul 2015 11:08:10 +0200 From: Nickovic Dejan Thread-Topic: RV 2015: Call for Participation Thread-Index: AdC9S2WEuEH9FPQFSleppBj5H2GlqA== Date: Mon, 13 Jul 2015 09:08:08 +0000 Message-ID: Accept-Language: en-US, de-AT Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [172.30.249.121] Content-Type: multipart/alternative; boundary="_000_E9A60D06A406E34890136020CF973BA71D750E6ES0MSMAIL111arcl_" MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.14.151,1.0.33,0.0.0000 definitions=2015-07-13_06:2015-07-11,2015-07-13,1970-01-01 signatures=0 X-Validation-by: dejan.nickovic@ait.ac.at Subject: [Caml-list] RV 2015: Call for Participation --_000_E9A60D06A406E34890136020CF973BA71D750E6ES0MSMAIL111arcl_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable ****************************************************************** CALL FOR PARTICIPATION RV 2015: 15th International Conference on Runtime Verification September 22= - September 25, 2015, Vienna, Austria http://rv2015.conf.tuwien.ac.at/ ****************************************************************** ***************** OVERVIEW ***************** Runtime verification is concerned with monitoring and analysis of software = and hardware system executions. Runtime verification techniques are importa= nt for system correctness, reliability, and robustness; they are complement= ary to conventional testing, and more practical than exhaustive formal veri= fication. Runtime verification can be used prior to deployment, for testing= , verification, and debugging purposes, and after deployment for ensuring r= eliability, safety, and security and for providing fault containment and re= covery as well as online system repair. Topics of interest to the conferenc= e include: - specification languages - specification mining - program instrumentation - monitor construction techniques - logging, recording, and replay - fault detection, localization, containment, recovery and repair - program steering and adaptation - metrics and statistical information gathering - combination of static and dynamic analyses - program execution visualization - monitoring techniques for safety/mission-critical systems - monitoring distributed systems, cloud services, and big data applications - monitoring security and privacy policies Application areas of runtime verification include safety/mission-critical s= ystems, enterprise and systems software, autonomous and reactive control sy= stems, health management and diagnosis systems, and system security and pri= vacy. ***************** INVITED TALKS ***************** - Patrice Godefroid, Microsoft Research, USA 20 Years of Dynamic Software Model Checking - Sriram Sankaranarayanan, University of Colorado Boulder, USA Simulation-Based Falsification of Cyber-Physical Systems - Georg Weissenbacher, Vienna University of Technology, Austria Heisenbugs - When Programs Fail ***************** TUTORIALS ***************** - M. Isberner, B. Steffen, F. Howar LearnLib - An Open Source Java Library for Active Automata Learning - P. Daian, Y. Falcone, P. Meredith, T. F. Serbanuta, S. Shiriashi, A. Iw= ai, G. Rosu RV-Android: Efficient Parametric Android Runtime Verification - D. Nickovic Monitoring and Measuring Hybrid Behaviors - L. Bortolussi, D. Milos, G. Sanguinetti Machine Learning Methods in Statistical Model Checking and System Design ***************** VENUE ***************** Vienna University of Technology Prechtlsaal, Karlsplatz 13, 1040 Vienna, Austria http://rv2015.conf.tuwien.ac.at/?page_id=3D36 ***************** REGISTRATION ***************** - Tutorials + RERS Challenge fees 187 Euro, after Aug. 20 231 Euro - Full Regular Registration fees 649 Euro, after Aug. 20 759 Euro - Only Conference Registration fees 594 Euro, after Aug, 20 704 Euro - Student Full Regular Registration fees 440 Euro, after Aug. 20 550 Euro - Student Only Conference Registration fees 396 Euro, after Aug, 20 506 Euro Registration link: http://rv2015.conf.tuwien.ac.at/?page_id=3D522 ***************** ACCEPTED PAPERS ***************** Regular Papers =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D - Adrian Francalanza, Luca Aceto and Anna Ingolfsdottir, On Verifying The Hennessy-Milner Logic with Recursion at Runtime - Johann Schumann, Patrick Moosbrugger and Kristin Rozier, R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial = Systems - Jyotirmoy Deshmukh, Alexandre Donz=E9, Shromona Ghosh, Xiaoqing Jin, Ga= rvit Juniwal and Sanjit A. Seshia, Robust Online Monitoring of Signal Temporal Logic - Samaneh Navabpour, Borzoo Bonakdarpour and Sebastian Fischmeister, Time-triggered Runtime Verification of Component-Based Multi-core Syste= ms - Ali Kassem, Ylies Falcone and Pascal Lafourcade, Monitoring Electronic Exams - Ian Cassar and Adrian Francalanza, Runtime Adaptation for Actor Systems - Alwyn Goodloe, Jonathan Laurent and Lee Pike, Assuring the Guardians - Giles Reger and David Rydeheard, From First-Order Temporal Logic to Parametric Trace Slicing - Jan-Christoph Kuester and Andreas Bauer, Monitoring real Android malware - Alan Perotti, Artur D'Avila Garcez and Guido Boella, Runtime Verification Through Forward Chaining - Andr=E9 De Matos Pedro, David Pereira, Luis Miguel Pinho and Jorge Sous= a Pinto, Monitoring for a decidable fragment of MTLD - Aaron Kane, Omar Chowdhury, Anupam Datta and Phil Koopman, A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (A= RV) System - Dung Phan, Junxing Yang, Denise Ratasich, Radu Grosu, Scott A. Smolka a= nd Scott Stoller, Collision Avoidance for Mobile Robots with Limited Sensing in Unknown E= nvironments - Shaohui Wang, Yoann Geoffroy, Gregor Goessler, Oleg Sokolsky and Insup = Lee, A Hybrid Approach to Causality Analysis - Luca Bortolussi, Michele Loreti, Laura Nenzi, Vincenzo Ciancia and Miek= e Massink, Qualitative and Quantitative Monitoring of Spatio-Temporal Properties Short Papers =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D - Giles Reger, Suggesting Edits to Explain Failing Traces - David Kyle, Jeffery Hansen and Sagar Chaki, Statistical Model Checking of Distributed Adaptive Real-Time Software - Luan Nguyen, Christian Schilling, Sergiy Bogomolov and Taylor T Johnso= n, Runtime Verification of Model-based Development Environments - Athanasios Naskos, Panagiotis Katsaros and Anastasios Gounaris, Probabilistic Model Checking at Runtime for the Provisioning of Cloud = Resources Tool Papers =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D - Jesus Mauricio Chimento, Wolfgang Ahrendt, Gordon Pace and Gerardo Sc= hneider, StaRVOOrS - A Tool for Combined Static and Runtime Verification of Ja= va - Srinivas Pinisetty, Ylies Falcone, Thierry J=E9ron and Herv=E9 Marcha= nd, TIPEX: a tool chain for Timed Property Enforcement during eXecution ***************** CHAIRS AND ORGANIZERS ***************** General Chair: Radu Grosu (Vienna University of Technology, Austria). PC co-Chairs: Ezio Bartocci (Vienna University of Technology, Austria) Rupak Majumdar (Max Planck Institute, Germany) Tools Track Chair: Dejan Nickovic (Austrian Institute of Technology, Aust= ria) Runtime Monitoring Competition Co-Chairs: Yli=E8s Falcone (Universit=E9 Joseph Fourier, France) Dejan Nickovic (AIT Austrian Institute of Technology GmbH, Austria) Giles Reger (University of Manchester, UK) Daniel Thoma (University of Luebeck, Germany) Publicity Chair: Dejan Nickovic (Austrian Institute of Technology, Austri= a) ***************** FURTHER INFORMATION ***************** More information about RV2015 is available from the conference web site: http://rv2015.conf.tuwien.ac.at/ Dejan Nickovic Senior Scientist Department Safety and Security Business Unit Safe and Autonomous Systems AIT Austrian Institute of Technology GmbH Donau-City-Stra=DFe 1 | 1220 Vienna | Austria T +43(0) 50550-4021 | M +43(0) 66488-390038 | F +43(0) 50550-4150 dejan.nickovic@ait.ac.at | http://www.ai= t.ac.at FN: 115980 i HG Wien | UID: ATU14703506 This email and any attachments thereto, is intended only for use by the add= ressee(s) named herein and may contain legally privileged and/or confidenti= al information. If you are not the intended recipient, please notify the se= nder by return e-mail or by telephone and delete this message from your sys= tem and any printout thereof. Any unauthorized use, reproduction, or dissem= ination of this message is strictly prohibited. Please note that e-mails ar= e susceptible to change. AIT Austrian Institute of Technology GmbH shall no= t be liable for the improper or incomplete transmission of the information = contained in this communication, nor shall it be liable for any delay in it= s receipt. --_000_E9A60D06A406E34890136020CF973BA71D750E6ES0MSMAIL111arcl_ Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable

*************************************************= *****************

 

CALL FOR PARTICIPATION

 

RV 2015: 15th International Conference on Runtime= Verification September 22 - September 25, 2015, Vienna, Austria=

 

http= ://rv2015.conf.tuwien.ac.at/

 

*************************************************= *****************

 

 

*****************

 

OVERVIEW

 

*****************

 

Runtime verification is concerned with monitoring= and analysis of software and hardware system executions. Runtime verificat= ion techniques are important for system correctness, reliability, and robus= tness; they are complementary to conventional testing, and more practical than exhaustive formal verification. Runtime v= erification can be used prior to deployment, for testing, verification, and= debugging purposes, and after deployment for ensuring reliability, safety,= and security and for providing fault containment and recovery as well as online system repair. Topics of = interest to the conference include:

 

- specification languages

- specification mining

- program instrumentation

- monitor construction techniques

- logging, recording, and replay

- fault detection, localization, containment, rec= overy and repair

- program steering and adaptation

- metrics and statistical information gathering

- combination of static and dynamic analyses=

- program execution visualization

- monitoring techniques for safety/mission-critic= al systems

- monitoring distributed systems, cloud services,= and big data applications

- monitoring security and privacy policies

 

Application areas of runtime verification include= safety/mission-critical systems, enterprise and systems software, autonomo= us and reactive control systems, health management and diagnosis systems, a= nd system security and privacy.

 

*****************

 

INVITED TALKS

 

*****************

 

- Patrice Godefroid, Microsoft Research, USA=

   20 Years of Dynamic Software Model C= hecking

 

- Sriram Sankaranarayanan, University of Colorado= Boulder, USA

   Simulation-Based Falsification of Cy= ber-Physical Systems

 

- Georg Weissenbacher, Vienna University of Techn= ology, Austria

   Heisenbugs – When Programs Fai= l

 

*****************

 

TUTORIALS

 

*****************

 

  - M. Isberner, B. Steffe= n, F. Howar

    Learn= Lib – An Open Source Java Library for Active Automata Learning

 

  - P. Daian, Y. Falcone, P. Meredith, T. F.= Serbanuta, S. Shiriashi, A. Iwai, G. Rosu

    RV-Android: Efficient Parametr= ic Android Runtime Verification

 

  - D. Nickovic

    Monitoring and Measuring Hybri= d Behaviors

 

  - L. Bortolussi, D. Milos, G. Sanguinetti<= o:p>

    Machine Learning Methods in St= atistical Model Checking and System Design

 

 

*****************

 

VENUE

 

*****************

 

Vienna University of Technology

 

Prechtlsaal, Karlsplatz 13, 1040 Vienna, Austria<= o:p>

 

http://rv2015.conf.tuwien.ac.at/?page_id=3D36

 

 

 

*****************

 

REGISTRATION

 

*****************

 

- Tutorials + RERS Challenge fees 187 Euro, a= fter Aug. 20 231 Euro

 

- Full Regular Registration fees 649 Euro, after = Aug. 20 759 Euro

- Only Conference Registration fees 594 Euro, aft= er Aug, 20 704 Euro

 

- Student Full Regular Registration fees 440 Euro= , after Aug. 20 550 Euro

- Student Only Conference Registration fees 396 E= uro, after Aug, 20 506 Euro

 

Registration link:

 

http://rv2015.conf.tuwien.ac.at/?page_id=3D522

 

 

*****************

 

ACCEPTED PAPERS

 

*****************

 

Regular Papers

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D

 

  - Adrian Francalanza, Luca Aceto and Anna = Ingolfsdottir,

    On Verifying The Hennessy-Miln= er Logic with Recursion at Runtime

 

  - Johann Schumann, Patri= ck Moosbrugger and Kristin Rozier,

    R2U2:= Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

 

  - Jyotirmoy Deshmukh, Alexandre Donz=E9, S= hromona Ghosh, Xiaoqing Jin, Garvit Juniwal and Sanjit A. Seshia,

    Robust Online Monitoring of Si= gnal Temporal Logic

 

  - Samaneh Navabpour, Borzoo Bonakdarpour a= nd Sebastian Fischmeister,

    Time-triggered Runtime Verific= ation of Component-Based Multi-core Systems

 

  - Ali Kassem, Ylies Falcone and Pascal Laf= ourcade,

    Monitoring Electronic Exams

 

  - Ian Cassar and Adrian Francalanza,<= /o:p>

    Runtime Adaptation for Actor S= ystems

 

  - Alwyn Goodloe, Jonathan Laurent and Lee = Pike,

    Assuring the Guardians

 

  - Giles Reger and David Rydeheard,

    From First-Order Temporal Logi= c to Parametric Trace Slicing

 

  - Jan-Christoph Kuester and Andreas Bauer,=

    Monitoring real Android malwar= e

 

  - Alan Perotti, Artur D’Avila Garcez= and Guido Boella,

    Runtime Verification Through F= orward Chaining

 

  - Andr=E9 De Matos Pedro, David Pereira, L= uis Miguel Pinho and Jorge Sousa Pinto,

    Monitoring for a decidable fra= gment of MTLD

 

  - Aaron Kane, Omar Chowdhury, Anupam Datta= and Phil Koopman,

    A Case Study on Runtime Monito= ring of an Autonomous Research Vehicle (ARV) System

 

  - Dung Phan, Junxing Yang, Denise Ratasich= , Radu Grosu, Scott A. Smolka and Scott Stoller,

    Collision Avoidance for Mobile= Robots with Limited Sensing in Unknown Environments

 

  - Shaohui Wang, Yoann Geoffroy, Gregor Goe= ssler, Oleg Sokolsky and Insup Lee,

    A Hybrid Approach to Causality= Analysis

 

  - Luca Bortolussi, Michele Loreti, Laura N= enzi, Vincenzo Ciancia and Mieke Massink,

    Qualitative and Quantitative M= onitoring of Spatio-Temporal Properties

 

 

Short Papers

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D

 

   - Giles Reger,

     Suggesting Edits to Expl= ain Failing Traces

 

   - David Kyle, Jeffery Hansen and Sag= ar Chaki,

     Statistical Model Checki= ng of Distributed Adaptive Real-Time Software

 

   - Luan Nguyen, Christian Schilling, = Sergiy Bogomolov and Taylor T Johnson,

     Runtime Verification of = Model-based Development Environments

 

   - Athanasios Naskos, Panagiotis Kats= aros and Anastasios Gounaris,

     Probabilistic Model Chec= king at Runtime for the Provisioning of Cloud Resources

 

Tool Papers

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D

 

    - Jesus Mauricio Chimento, Wol= fgang Ahrendt, Gordon Pace and Gerardo Schneider,

      StaRVOOrS – = A Tool for Combined Static and Runtime Verification of Java

 

    - Srinivas Pinisetty, Ylies Fa= lcone, Thierry J=E9ron and Herv=E9 Marchand,

      TIPEX: a tool chai= n for Timed Property Enforcement during eXecution

 

 

*****************

 

CHAIRS AND ORGANIZERS

 

*****************

 

  General Chair: Radu Grosu (Vienna Universi= ty of Technology, Austria).

 

  PC co-Chairs:

      Ezio Bartocci (Vie= nna University of Technology, Austria)

      Rupak Majumdar (Ma= x Planck Institute, Germany)

 

  Tools Track Chair: Dejan Nickovic (Austria= n Institute of Technology, Austria)

 

  Runtime Monitoring Competition Co-Chairs:<= o:p>

      Yli=E8s Falcone (U= niversit=E9 Joseph Fourier, France)

      Dejan Nickovic (AI= T Austrian Institute of Technology GmbH, Austria)

     Giles Reger (Univer= sity of Manchester, UK)

      Daniel Thoma (Univ= ersity of Luebeck, Germany)

 

  Publicity Chair: Dejan Nickovic (Austrian = Institute of Technology, Austria)

 

 

*****************

 

FURTHER INFORMATION

 

*****************

 

More information about RV2015 is available from t= he conference web site:

 

http://= rv2015.conf.tuwien.ac.at/

 

Dejan Nickovic=
Senior Scientist
Department Safety and Security

Business Unit Safe and Autonomous Systems

AIT Austrian Inst= itute of Technology GmbH
Donau-City-Stra=DFe 1  | &n= bsp;1220 Vienna  | Austria
T +43(0) 50550-4021 | M +43(0) 66488-390038  |  F +43= (0) 50550-4150
dejan.nickovic@ait.ac.at  |  http:= //www.ait.ac.at

 

FN: = 115980 i HG Wien  |  UID: ATU14703506
This email and any attachments thereto, is intended only for use by the add= ressee(s) named herein and may contain legally privileged and/or confidenti= al information. If you are not the intended recipient, please notify the se= nder by return e-mail or by telephone and delete this message from your system and any printout thereof. Any una= uthorized use, reproduction, or dissemination of this message is strictly p= rohibited. Please note that e-mails are susceptible to change. AIT Austrian= Institute of Technology GmbH shall not be liable for the improper or incomplete transmission of the informati= on contained in this communication, nor shall it be liable for any delay in= its receipt.

 

 

--_000_E9A60D06A406E34890136020CF973BA71D750E6ES0MSMAIL111arcl_--