Runtime Verification for Stream Processing Applications

  • Christian Colombo
  • Gordon J. Pace
  • Luke Camilleri
  • Claire Dimech
  • Reuben Farrugia
  • Jean Paul Grech
  • Alessio Magro
  • Andrew C. Sammut
  • Kristian Zarb Adami
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9953)

Abstract

Runtime verification (RV) has long been applied beyond its strict delineation of verification, through the notion of monitor-oriented programming. In this paper we present a portfolio of real-life case studies where RV is used to program stream-processing systems directly — where all the logic of the implemented system is defined in terms of monitors. The systems include the processing of Facebook events for business intelligence, analysing users’ activity log for detecting UI usability issues, video frame analysis for human movement detection, and telescope signals processing for pulsar identification.

References

  1. 1.
    Runtime Verification Conference, Yearly LNCS Proceedings Since (2010)Google Scholar
  2. 2.
    Benfold, B., Reid, I.: Stable multi-target tracking in real-time surveillance video. In: Computer Vision and Pattern Recognition (CVPR), pp. 3457–3464. IEEE (2011)Google Scholar
  3. 3.
    Colombo, C., Gauci, A., Pace, G.J.: LarvaStat: monitoring of statistical properties. In: Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Roşu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. LNCS, vol. 6418, pp. 480–484. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  4. 4.
    Colombo, C., Grech, J.-P., Pace, G.: A controlled natural language for business intelligence monitoring. In: Biemann, C., Handschuh, S., Freitas, A., Meziane, F., Métais, E. (eds.) NLDB 2015. LNCS, vol. 9103, pp. 300–306. Springer, Heidelberg (2015) (to appear)Google Scholar
  5. 5.
    Colombo, C., Pace, G.J., Schneider, G.: Larva – safer monitoring of real-time java programs (tool paper). In: Seventh IEEE International Conference on Software Engineering and Formal Methods (SEFM), pp. 33–37. IEEE (2009)Google Scholar
  6. 6.
    Colombo, C., Pace, G.J., Schneider, G.: Resource-bounded runtime verification of java programs with real-time properties. Technical report CS2009-01, Department of Computer Science, University of Malta (2009). http://www.cs.um.edu.mt/~reports
  7. 7.
    D’Angelo, B., Sankaranarayanan, S., Sánchez, C., Robinson, W., Finkbeiner, B., Sipma, H.B., Mehrotra, S., Manna, Z.: LOLA: runtime monitoring of synchronous systems. In: TIME, pp. 166–174. IEEE (2005)Google Scholar
  8. 8.
    Kuhn, T.: A survey and classification of controlled natural languages. Comput. Linguist. 40(1), 121–170 (2014)CrossRefGoogle Scholar
  9. 9.
    Meredith, P.O., Jin, D., Griffith, D., Chen, F., Roşu, G.: An overview of the MOP runtime verification framework. STTT 14, 249–289 (2012)CrossRefGoogle Scholar
  10. 10.
    Rao, K.R., Kim, D.N., Hwang, J.J.: Fast Fourier Transform - Algorithms and Applications, 1st edn. Springer, Netherlands (2010)CrossRefMATHGoogle Scholar
  11. 11.
    Rodriguez, M., Laptev, I., Sivic, J., Audibert, J.Y.: Density-aware person detection and tracking in crowds. In: Computer Vision (ICCV), pp. 2423–2430. IEEE (2011)Google Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  • Christian Colombo
    • 1
  • Gordon J. Pace
    • 1
  • Luke Camilleri
    • 2
  • Claire Dimech
    • 1
  • Reuben Farrugia
    • 3
  • Jean Paul Grech
    • 1
  • Alessio Magro
    • 4
  • Andrew C. Sammut
    • 3
  • Kristian Zarb Adami
    • 4
  1. 1.Department of Computer ScienceUniversity of MaltaMsidaMalta
  2. 2.Ixaris System LtdSan ĠwannMalta
  3. 3.Department of Communications and Computer EngineeringUniversity of MaltaMsidaMalta
  4. 4.Institute of Space Sciences and AstronomyUniversity of MaltaMsidaMalta

Personalised recommendations