2016
DOI: 10.1007/s10703-016-0242-y
|View full text |Cite
|
Sign up to set email alerts
|

Scalable offline monitoring of temporal specifications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 24 publications
(23 citation statements)
references
References 30 publications
0
23
0
Order By: Relevance
“…Another line of work [61,56] similarly splits the logged events into slices, but it avoids grounding first-order properties altogether. This is enabled by using a more powerful monitor, MonPoly [58,62,64,65], to process the slices.…”
Section: Scalabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…Another line of work [61,56] similarly splits the logged events into slices, but it avoids grounding first-order properties altogether. This is enabled by using a more powerful monitor, MonPoly [58,62,64,65], to process the slices.…”
Section: Scalabilitymentioning
confidence: 99%
“…The usage of negation is a candidate for restriction while the first-order aspect of MFOTL is a candidate for removal (or for replacement with freeze quantifiers). Many works [56,63,64,65,67] had to define (efficiently) monitorable fragments using similar restrictions. A syntactic restriction (e.g., of the allowed occurrences of negation) is preferable over a modification of the semantics as seen on the example of negation in many data stream management systems (DSMS).…”
Section: Expressivenessmentioning
confidence: 99%
See 1 more Smart Citation
“…Given the data's high sensitivity, usage-control policies govern what actions may and must not be performed on the collected data. The second case study was in collaboration with Google [4], where we checked policies over huge distributed log files. In comparison to the Nokia case study, the logs were 100 times larger in terms of the number of events and 50 times larger in data volume.…”
Section: Tool Historymentioning
confidence: 99%
“…Adaption [10] E-ACSL [14] C E-ACSL [14] Integrated with Frama-C [21] Larva [12] Java DATEs [11] Case studies & extensions Lola [13] Logs/streams Lola Stream processing MonPoly [8] Log files MFOTL [7] Highly scalable [6] TemPsy-Check CSV logs TemPsy Based on spec patterns R2U2 [28] UAS MTL, Bayes Net etc Deployed on a drone! Valour Outline Rules MarQ [25] Outline (Java) QEA [3] Parametric trace slicing LogFire [19] Outline (Scala) Rule system Internal DSL TraceContract [4] Outline (Scala) TL, FSM, rules etc Internal DSL…”
Section: Toolmentioning
confidence: 99%