From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.io/gmane.science.mathematics.categories/9118 Path: news.gmane.org!.POSTED!not-for-mail From: Ayoub Nouri Newsgroups: gmane.comp.lang.lambda-prolog,gmane.comp.science.types.announce,gmane.comp.lang.caml.inria,gmane.science.mathematics.categories,gmane.comp.lang.haskell.general Subject: 2nd call RV2017: Runtime Verification, September 13 - 16 2017, Seattle USA Date: Wed, 15 Feb 2017 13:10:29 +0100 Message-ID: NNTP-Posting-Host: blaine.gmane.org Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="===============1015467738==" X-Trace: blaine.gmane.org 1487168360 28528 195.159.176.226 (15 Feb 2017 14:19:20 GMT) X-Complaints-To: usenet@blaine.gmane.org NNTP-Posting-Date: Wed, 15 Feb 2017 14:19:20 +0000 (UTC) User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.7.1 To: sbc-l@sbc.org.br, aco-list@iridia.ulb.ac.be, hipeac-publicity@hipeac.net, concurrency@listserver.tue.nl, concurrency@tue.nl, types-announce@lists.seas.upenn.edu, logic@math.uni-bonn.de, announce@informatics-europe.org, bigdata@lists.drexel.edu, bull-i3@irit.fr, announcements@lists.artist-embedded.org, caml-list@inria.fr, categories@mta.ca, cse-cfp@cse.stfx.ca, curry@informatik.rwth-aachen.de, csp@carlit.toulouse.inra.fr, dfsci@lists.dfrws.org, direch@ucad.sn, easst-members@mail.cs.uni-potsdam.de, easst-members@lists.le.ac.uk, ec-digest-l@metis3.gmu.edu, embedded_news@ira.uka.de, emo-list@dei.uc.pt, events@fmeurope.org, evolutionary-computing@jiscmail.ac.uk, CREATIVE-ROBOTICS-NETWORK-INFO@jiscmail.ac.uk, FACS@jiscmail.ac.uk, fmics@inrialpes.fr, fmindia@cmi.ac.in, games@lists.rwth-aachen.de, gdr-im@gdr-im.fr, gdr.gpl@imag.fr, haskell@haskell.org, HELLAS@LISTS.PSU.EDU, h Original-X-From: lprolog-bounces+gcll-lprolog=gmane.org@cs.umn.edu Wed Feb 15 15:19:10 2017 Return-path: Envelope-to: gcll-lprolog@gmane.org Original-Received: from mail.cs.umn.edu ([128.101.32.201]) by blaine.gmane.org with esmtp (Exim 4.84_2) (envelope-from ) id 1ce0QD-0006My-NH for gcll-lprolog@gmane.org; Wed, 15 Feb 2017 15:19:06 +0100 Original-Received: from localhost (enchanter.cs.umn.edu [160.94.22.228]) by mail.cs.umn.edu (Postfix) with ESMTP id 523E5406778 for ; Wed, 15 Feb 2017 08:19:10 -0600 (CST) X-Virus-Scanned: Debian amavisd-new at enchanter.cs.umn.edu Original-Received: from mail.cs.umn.edu ([128.101.32.201]) by localhost (enchanter.cs.umn.edu [160.94.22.228]) (amavisd-new, port 10024) with ESMTP id kcXSK30Ylg6u for ; Wed, 15 Feb 2017 08:19:07 -0600 (CST) Original-Received: from claudius.cs.umn.edu (localhost [127.0.0.1]) by mail.cs.umn.edu (Postfix) with ESMTP id 6AB5240666B for ; Wed, 15 Feb 2017 08:16:01 -0600 (CST) Original-Received: from localhost (enchanter.cs.umn.edu [160.94.22.228]) by mail.cs.umn.edu (Postfix) with ESMTP id 6825D36CB2D for ; Wed, 15 Feb 2017 06:17:00 -0600 (CST) X-Virus-Scanned: Debian amavisd-new at enchanter.cs.umn.edu Original-Received: from mail.cs.umn.edu ([128.101.32.201]) by localhost (enchanter.cs.umn.edu [160.94.22.228]) (amavisd-new, port 10024) with ESMTP id FPTRVI6fKMdd for ; Wed, 15 Feb 2017 06:16:55 -0600 (CST) X-Greylist: delayed 383 seconds by postgrey-1.35 at claudius; Wed, 15 Feb 2017 06:16:55 CST Original-Received: from zm23-mta-out-2.grenet.fr (zm23-mta-out-2.grenet.fr [130.190.191.53]) by mail.cs.umn.edu (Postfix) with ESMTP id 6DAA436CB25 for ; Wed, 15 Feb 2017 06:16:55 -0600 (CST) Original-Received: from zm23-mta-out.grenet.fr (zm23-mta-out.grenet.fr [130.190.191.35]) by zm23-mta-out-2.grenet.fr (Postfix) with ESMTP id E9984C837; Wed, 15 Feb 2017 13:10:29 +0100 (CET) Original-Received: from smtps.univ-grenoble-alpes.fr (smtps2.u-ga.fr [195.83.24.202]) by zm23-mta-out.grenet.fr (Postfix) with ESMTP id DDEB6100494; Wed, 15 Feb 2017 13:10:29 +0100 (CET) Original-Received: from [129.88.42.36] (leisse.imag.fr [129.88.42.36]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: nouria@univ-grenoble-alpes.fr) by smtps.univ-grenoble-alpes.fr (Postfix) with ESMTPSA id A89FB6038A; Wed, 15 Feb 2017 12:27:25 +0100 (CET) X-Greylist: Whitelist-UJF SMTP Authentifie (nouria@univ-grenoble-alpes.fr) via smtps.univ-grenoble-alpes.fr ACL (97) X-Mailman-Approved-At: Wed, 15 Feb 2017 08:15:57 -0600 X-BeenThere: lprolog@cs.umn.edu X-Mailman-Version: 2.1.14 Precedence: list List-Id: "List for discussions about Lambda Prolog, metalanguages, logical frameworks and computational logic aspects" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: lprolog-bounces+gcll-lprolog=gmane.org@cs.umn.edu Original-Sender: lprolog-bounces+gcll-lprolog=gmane.org@cs.umn.edu Xref: news.gmane.org gmane.comp.lang.lambda-prolog:3376 gmane.comp.science.types.announce:6562 gmane.comp.lang.caml.inria:66234 gmane.science.mathematics.categories:9118 gmane.comp.lang.haskell.general:21237 Archived-At: This is a multi-part message in MIME format. --===============1015467738== Content-Type: multipart/alternative; boundary="------------8D1B10A68A551F993A39151C" This is a multi-part message in MIME format. --------------8D1B10A68A551F993A39151C Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit RV 2017 *2nd Call for Papers and Tutorials* The 17th International Conference on Runtime Verification September 13-16, Seattle, WA, USA http://rv2017.cs.manchester.ac.uk rv2017@easychair.org Runtime verification is concerned with the monitoring and analysis of the runtime behaviour of software and hardware systems. Runtime verification techniques are crucial for system correctness, reliability, and robustness; they provide an additional level of rigor and effectiveness compared to conventional testing, and are generally more practical than exhaustive formal verification. Runtime verification can be used prior to deployment, for testing, verification, and debugging purposes, and after deployment for ensuring reliability, safety, and security and for providing fault containment and recovery as well as online system repair. Topics of interest to the conference include, but are not limited to: * specification languages * monitor construction techniques * program instrumentation * logging, recording, and replay * combination of static and dynamic analysis * specification mining and machine learning over runtime traces * monitoring techniques for concurrent and distributed systems * runtime checking of privacy and security policies * statistical model checking * metrics and statistical information gathering * program/system execution visualization * fault localization, containment, recovery and repair * integrated vehicle health management (IVHM) Application areas of runtime verification include cyber-physical systems, safety/mission-critical systems, enterprise and systems software, autonomous and reactive control systems, health management and diagnosis systems, and system security and privacy. We welcome contributions exploring the combination of runtime verification techniques with machine learning and static analysis. Whilst these are highlight topics, papers falling into these categories will not be treated differently from other contributions. An overview of previous RV conferences and earlier workshops can be found at: http://www.runtime-verification.org. RV 2017 will be held September 13-16 in Seattle, WA, USA. RV 2017 will feature a tutorial day (September 13), and three conference days (September 14-16). Important Dates *Papers*as well as *tutorial proposals*will follow the following timeline: * Abstract deadline: April 24, 2017 (Anywhere on Earth) * Paper and tutorial deadline: May 1, 2017 (Anywhere on Earth) * Tutorial notification: May 21, 2017 * Paper notification: June 26, 2017 * Conference: September 13-16, 2017 General Information on Submissions All papers and tutorials will appear in the conference proceedings in an LNCS volume. Submitted papers and tutorials must use the LNCS/Springer style detailed here: http://www.springer.de/comp/lncs/authors.html Papers must be original work and not be submitted for publication elsewhere. Papers must be written in English and submitted electronically (in PDF format) using the EasyChair submission page here: https://easychair.org/conferences/?conf=rv17 The page limitations mentioned below include all text and figures, but exclude references. Additional details omitted due to space limitations may be included in a clearly marked appendix, that will be reviewed at the discretion of reviewers, but not included in the proceedings. At least one author of each accepted paper and tutorial must attend RV 2017 to present. Paper Submissions There are three categories of papers which can be submitted: regular, short or tool papers. Papers in each category will be reviewed by at least 3 members of the Program Committee. * *Regular Papers* (up to 15 pages, not including references) should present original unpublished results. We welcome theoretical papers, system papers, papers describing domain-specific variants of RV, and case studies on runtime verification. * *Short Papers* (up to 6 pages, not including references) may present novel but not necessarily thoroughly worked out ideas, for example emerging runtime verification techniques and applications, or techniques and applications that establish relationships between runtime verification and other domains. * *Tool Demonstration Papers* (up to 8 pages, not including references) should present a new tool, a new tool component, or novel extensions to existing tools supporting runtime verification. The paper must include information on tool availability, maturity, selected experimental results and it should provide a link to a website containing the theoretical background and user guide. Furthermore, we strongly encourage authors to make their tools and benchmarks available with their submission. The Program Committee of RV 2017 will give a best paper award, and a selection of accepted regular papers will be invited to appear in a special issue of the Springer Journal on Formal Methods in System Design . Tutorial Submissions Tutorials are two-to-three-hour presentations on a selected topic. Additionally, tutorial presenters will be offered to publish a paper of up to 20 pages in the LNCS conference proceedings, not including references. A proposal for a tutorial must contain the subject of the tutorial, a proposed timeline, a note on previous similar tutorials (if applicable) and the differences to this incarnation, and a brief biography of the presenter. The proposal should not exceed 2 pages. Organization *General Chair* Klaus Havelund , NASA Jet Propulsion Laboratory, USA *Program Chairs* Giles Reger , University of Manchester, UK Shuvendu Lahiri , Microsoft Research, USA *Finance Chair* Oleg Sokolsky , University of Pennsylvania, USA *Publicity Chair* Ayoub Nour i, University of Grenoble Alpes, France *Local Organisation Chairs* Grigory Fedyukovich , University of Washington, USA Rahul Kumar , Microsoft Research, USA *Program Committee* Wolfgang Ahrendt , Chalmers Univ. of Technology/Univ. of Gothenburg, Sweden Cyrille Artho , KTH Royal Institute of Technology, Sweden Howard Barringer , The University of Manchester, UK Ezio Bartocci , Vienna University of Technology, Austria Andreas Bauer , KUKA Systems, Germany Saddek Bensalem , VERIMAG (University of Grenoble Alpes), France Eric Bodden , Fraunhofer SIT and Technische University Darmstadt, Germany Borzoo Bonakdarpour , McMaster University, Canada Christian Colombo , University of Malta, Malta Ylies Falcone , University of Grenoble Alpes, France Grigory Fedyukovich , University of Washington, USA Lu Feng , University of Virginia, USA Patrice Godefroid , Microsoft Research, USA Jean Goubault-Larrecq , CNRS& ENSde Cachan, France Alex Groce , Northern Arizona University, USA Radu Grosu , Vienna University of Technology, Austria Sylvain Hallé , University of Québec at Chicoutimi, Canada Marieke Huisman , University of Twente, Netherlands Franjo Ivancic , Google Bengt Jonsson , Uppsala University, Sweden Felix Klaedtke , NEC Europe Ltd. Rahul Kumar , Microsoft Research, USA Kim Larsen , Aalborg University, Denmark Insup Lee , University of Pennsylvania, USA Axel Legay , Inria Rennes, France Martin Leucker , University of Lübeck, Germany Ben Livshits , Microsoft Research, USA David Lo , Singapore Management University, Singapore Francesco Logozzo , Facebook Parthasarathy Madhusudan , University of Illinois at Urbana-Champaign, USA Leonardo Mariani , University of Milan Bicocca, Italy Madanlal Musuvathi , Microsoft Research Ayoub Nouri , University of Grenoble Alpes, France Gordon Pace , University of Malta, Malta Doron Peled , Bar Ilan University, Israel Grigore Rosu , University of Illinois at Urbana-Champaign, USA Veselin Raychev , ETH Zurich, Switzerland Cesar Sanchez , IMDEA Software Institute, Spain Gerardo Schneider, Chalmers Univ. of Technology/Univ. of Gothenburg, Sweden Rahul Sharma , Microsoft Research, USA Julien Signoles , CEA LIST, France Scott Smolka , Stony Brook University, USA Oleg Sokolsky , University of Pennsylvania, USA Bernhard Steffen , University of Dortmund, Germany Scott Stoller , Stony Brook University, USA Volker Stolz , University of Olso, Norway Frits Vaandrager , Radboud University, Netherlands Neil Walkinshaw , University of Leicester, UK Chao Wang , University of Southern California, USA Eugen Zalinescu , Technische Universitat München, Germany --------------8D1B10A68A551F993A39151C Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: 8bit

RV 2017

           2nd Call for Papers and Tutorials           

          The 17th International Conference on Runtime Verification

      September 13-16, Seattle, WA, USA

http://rv2017.cs.manchester.ac.uk

rv2017@easychair.org

Runtime verification is concerned with the monitoring and analysis of the runtime behaviour of software and hardware systems. Runtime verification techniques are crucial for system correctness, reliability, and robustness; they provide an additional level of rigor and effectiveness compared to conventional testing, and are generally more practical than exhaustive formal verification. Runtime verification can be used prior to deployment, for testing, verification, and debugging purposes, and after deployment for ensuring reliability, safety, and security and for providing fault containment and recovery as well as online system repair.

Topics of interest to the conference include, but are not limited to:

  • specification languages
  • monitor construction techniques
  • program instrumentation
  • logging, recording, and replay
  • combination of static and dynamic analysis
  • specification mining and machine learning over runtime traces
  • monitoring techniques for concurrent and distributed systems
  • runtime checking of privacy and security policies
  • statistical model checking
  • metrics and statistical information gathering
  • program/system execution visualization
  • fault localization, containment, recovery and repair
  • integrated vehicle health management (IVHM)

Application areas of runtime verification include cyber-physical systems, safety/mission-critical systems, enterprise and systems software, autonomous and reactive control systems, health management and diagnosis systems, and system security and privacy.

We welcome contributions exploring the combination of runtime verification techniques with machine learning and static analysis. Whilst these are highlight topics, papers falling into these categories will not be treated differently from other contributions.

An overview of previous RV conferences and earlier workshops can be found at: http://www.runtime-verification.org.

RV 2017 will be held September 13-16 in Seattle, WA, USA. RV 2017 will feature a tutorial day (September 13), and three conference days (September 14-16).

Important Dates

Papers as well as tutorial proposals will follow the following timeline:

  • Abstract deadline: April 24, 2017 (Anywhere on Earth)
  • Paper and tutorial deadline: May 1, 2017 (Anywhere on Earth)
  • Tutorial notification: May 21, 2017
  • Paper notification: June 26, 2017
  • Conference: September 13-16, 2017

General Information on Submissions

All papers and tutorials will appear in the conference proceedings in an LNCS volume. Submitted papers and tutorials must use the LNCS/Springer style detailed here:

http://www.springer.de/comp/lncs/authors.html

Papers must be original work and not be submitted for publication elsewhere. Papers must be written in English and submitted electronically (in PDF format) using the EasyChair submission page here:

https://easychair.org/conferences/?conf=rv17

The page limitations mentioned below include all text and figures, but exclude references. Additional details omitted due to space limitations may be included in a clearly marked appendix, that will be reviewed at the discretion of reviewers, but not included in the proceedings.

At least one author of each accepted paper and tutorial must attend RV 2017 to present.

Paper Submissions

There are three categories of papers which can be submitted: regular, short or tool papers. Papers in each category will be reviewed by at least 3 members of the Program Committee.

  • Regular Papers (up to 15 pages, not including references) should present original unpublished results. We welcome theoretical papers, system papers, papers describing domain-specific variants of RV, and case studies on runtime verification.
  • Short Papers (up to 6 pages, not including references) may present novel but not necessarily thoroughly worked out ideas, for example emerging runtime verification techniques and applications, or techniques and applications that establish relationships between runtime verification and other domains.
  • Tool Demonstration Papers (up to 8 pages, not including references) should present a new tool, a new tool component, or novel extensions to existing tools supporting runtime verification. The paper must include information on tool availability, maturity, selected experimental results and it should provide a link to a website containing the theoretical background and user guide. Furthermore, we strongly encourage authors to make their tools and benchmarks available with their submission.

The Program Committee of RV 2017 will give a best paper award, and a selection of accepted regular papers will be invited to appear in a special issue of the Springer Journal on Formal Methods in System Design.

Tutorial Submissions

Tutorials are two-to-three-hour presentations on a selected topic. Additionally, tutorial presenters will be offered to publish a paper of up to 20 pages in the LNCS conference proceedings, not including references.

A proposal for a tutorial must contain the subject of the tutorial, a proposed timeline, a note on previous similar tutorials (if applicable) and the differences to this incarnation, and a brief biography of the presenter. The proposal should not exceed 2 pages.

Organization

General Chair

Klaus Havelund, NASA Jet Propulsion Laboratory, USA

Program Chairs

Giles Reger, University of Manchester, UK
Shuvendu Lahiri, Microsoft Research, USA

Finance Chair

Oleg Sokolsky, University of Pennsylvania, USA

Publicity Chair

Ayoub Nouri, University of Grenoble Alpes, France

Local Organisation Chairs

Grigory Fedyukovich, University of Washington, USA
Rahul Kumar, Microsoft Research, USA

Program Committee

Wolfgang AhrendtChalmers Univ. of Technology/Univ. of Gothenburg, Sweden
Cyrille ArthoKTH Royal Institute of Technology, Sweden
Howard Barringer, The University of Manchester, UK
Ezio Bartocci, Vienna University of Technology, Austria
Andreas Bauer, KUKA Systems, Germany
Saddek Bensalem, VERIMAG (University of Grenoble Alpes), France
Eric Bodden, Fraunhofer SIT and Technische University Darmstadt, Germany

Borzoo Bonakdarpour, McMaster University, Canada
Christian Colombo, University of Malta, Malta
Ylies Falcone, University of Grenoble Alpes, France
Grigory Fedyukovich, University of Washington, USA
Lu Feng, University of Virginia, USA
Patrice Godefroid, Microsoft Research, USA
Jean Goubault-Larrecq, CNRS & ENS de Cachan, France
Alex Groce, Northern Arizona University, USA
Radu Grosu, Vienna University of Technology, Austria
Sylvain Hallé, University of Québec at Chicoutimi, Canada
Marieke Huisman, University of Twente, Netherlands
Franjo Ivancic, Google
Bengt Jonsson, Uppsala University, Sweden
Felix Klaedtke, NEC Europe Ltd.
Rahul Kumar, Microsoft Research, USA
Kim Larsen, Aalborg University, Denmark
Insup Lee, University of Pennsylvania, USA
Axel Legay, Inria Rennes, France
Martin Leucker, University of Lübeck, Germany
Ben Livshits, Microsoft Research, USA
David Lo, Singapore Management University, Singapore
Francesco Logozzo, Facebook
Parthasarathy Madhusudan, University of Illinois at Urbana-Champaign, USA
Leonardo Mariani, University of Milan Bicocca, Italy
Madanlal Musuvathi, Microsoft Research
Ayoub Nouri, University of Grenoble Alpes, France
Gordon Pace, University of Malta, Malta
Doron Peled, Bar Ilan University, Israel
Grigore Rosu, University of Illinois at Urbana-Champaign, USA
Veselin Raychev, ETH Zurich, Switzerland
Cesar Sanchez, IMDEA Software Institute, Spain
Gerardo Schneider, Chalmers Univ. of Technology/Univ. of Gothenburg, Sweden
Rahul Sharma, Microsoft Research, USA
Julien Signoles, CEA LIST, France
Scott Smolka, Stony Brook University, USA
Oleg Sokolsky, University of Pennsylvania, USA
Bernhard Steffen, University of Dortmund, Germany
Scott StollerStony Brook University, USA
Volker Stolz, University of Olso, Norway
Frits Vaandrager, Radboud University, Netherlands
Neil Walkinshaw, University of Leicester, UK
Chao Wang, University of Southern California, USA
Eugen Zalinescu, Technische Universitat München, Germany

--------------8D1B10A68A551F993A39151C-- --===============1015467738== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline _______________________________________________ Lprolog mailing list Lprolog@cs.umn.edu https://wwws.cs.umn.edu/mm-cs/listinfo/lprolog --===============1015467738==--