18
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Efficient online detection of temporal patterns

      research-article

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Identifying a temporal pattern of events is a fundamental task of online (real-time) verification. We present efficient schemes for online monitoring of events for identifying desired/undesired patterns of events. The schemes use preprocessing to ensure that the number of comparisons during run-time is minimized. In particular, the first comparison following the time point when an execution sub-sequence cannot be further extended to satisfy the temporal requirements halts the process that monitors the sub-sequence.

          Most cited references27

          • Record: found
          • Abstract: not found
          • Article: not found

          Model-Checking in Dense Real-Time

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Temporal constraint networks

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A brief account of runtime verification

                Bookmark

                Author and article information

                Contributors
                Journal
                peerj-cs
                PeerJ Computer Science
                PeerJ Comput. Sci.
                PeerJ Inc. (San Francisco, USA )
                2376-5992
                13 April 2016
                : 2
                : e53
                Affiliations
                [1 ]Department of Computer Science, Ben-Gurion University , Beer-Sheva, Israel
                [2 ]Telekom Innovation Laboratories, Ben-Gurion University , Beer Sheva, Israel
                [3 ]Department of Information Systems Engineering, Ben-Gurion University , Beer-Sheva, Israel
                Article
                cs-53
                10.7717/peerj-cs.53
                bfe48957-5e93-4509-887e-0d647a80aa47
                ©2016 Dolev et al.

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.

                History
                : 11 June 2015
                : 6 March 2016
                Funding
                Funded by: Deutsche Telekom
                Funded by: Rita Altura Trust Chair in Computer Sciences
                Funded by: Lynne and William Frankel Center for Computer Sciences
                Funded by: Israel Science Foundation
                Award ID: 428/11
                Funded by: Cabarnit Cyber Security MAGNET Consortium
                Funded by: Institute for Future Defense Technologies Research
                Funded by: Israeli Internet Association
                Funded by: Israeli Defense Secretary (MAFAT)
                This work is partially supported by Deutsche Telekom, the Rita Altura Trust Chair in Computer Sciences, the Lynne and William Frankel Center for Computer Sciences, the Israel Science Foundation (grant number 428/11), the Cabarnit Cyber Security MAGNET Consortium, a grant from the Institute for Future Defense Technologies Research named for the Medvedi of the Technion, the Israeli Internet Association, and the Israeli Defense Secretary (MAFAT). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
                Categories
                Algorithms and Analysis of Algorithms
                Theory and Formal Methods

                Computer science
                Pattern matching,Verification,Time series
                Computer science
                Pattern matching, Verification, Time series

                Comments

                Comment on this article