Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Spanoudakis, G.; Kloukinas, C.; Androutsopoulos, K.
Languages: English
Types: Unknown
Subjects: QA75
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Androutsellis-Theotokis, S., Spinellis, D., 2004, A survey of peer-to-peer content distribution technologies. ACM Computing Surveys, 36(4):335-371
    • [2] Barringer, H., et al. 2004, Rule-Based Runtime Verification, In Proc. of 5th Int. Conf. on Verification, Model Checking, and Abstract Interpretation
    • [3] Brörkens, M. and Möller, M. 2002a, Dynamic event generation for runtime checking using the JDI, In Proc. of the Federated Logic Conference Satellite Workshops, Electronic Notes in Theoretical Computer Science, 70 (4)
    • [4] Brörkens, M. and Möller, M. 2002b, Jassda trace assertions, runtime checking the dynamic of Java programs, In Proc of Inter. Conf. on Testing of Communicating Systems, Berlin, Germany, 39-48
    • [5] Carzaniga, A., Rosenblum, D. S., Wolf, A. L., 2000, Achieving scalability and expressiveness in an internet-scale event notification service, In Proc. of the 19th ACM Symposium on Principles of Distributed Computing
    • [6] Chen, F. and Roşu, G. 2007. Mop: an efficient and generic runtime verification framework. In Proc. of the 22nd ACM SIGPLAN Conference on Object Oriented Programming Systems and Applications, 569-588
    • [7] Damiani E. et al., A reputation-based approach for choosing reliable resources in peer-to-peer networks, 2002. Proc. of 9th ACM Conf. on Computer and communications security, 207 - 216
    • [8] D'Amorim, M., Havelund, K., 2005, Event-based runtime verification of Java programs, In Proc. of 3rd Int. Workshop on Dynamic Analysis (WODA'05)
    • [9] Fenkam, P. Dustdar, S. Kirda, E. Reif, G. Gall, H., 2002. Towards an access control system for mobile peer-topeer collaborative environments, WET ICE 2002 - Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
    • [10] Freier, A. O., Karlton, P., Kocher, P. C., 1996. The SSL Protocol Version 3.0, Internet draft, available at: http://wp.netscape.com/eng/ssl3/draft302.txt
    • [11] Ghezzi C., Guinea S., 2007, Runtime Monitoring in Service Oriented Architectures, In Test and Analysis of Web Services, (eds) Baresi L. & di Nitto E., Springer, 237-264.
    • [12] Groce, V. et al. 2007. Framework and Security Verification Tools, Deliverable D6, PEPERS, FP6-26901
    • [13] Havelund, K., Roşu, G., 2004, An Overview of the Runtime Verification Tool Java PathExplorer, Formal Methods Syst. Des. 24: 189-215
    • [14] Kim, M., Kannan, S., Lee, I., Sokolsky, O. and Viswanathan, M., 2001, Java-mac: a run-time assurance tool for Java programs, In Electronic Notes in Theoretical Computer Science, 55. Elsevier Science Publishers
    • [15] Koulouris, T., Tsigritis, T., and Spanoudakis, G., 2006, Dynamic Verification Support Framework, Deliverable D4, PEPERS Project, IST-2004-026901
    • [16] Mahbub K., 2006. Runtime monitoring of service based systems, PhD, Dep. of Computing, City University
    • [17] Pistore M, Traverso, P., 2007, Assumption Based Composition and Monitoring of Web Services, In Test and Analysis of Web Services, (eds) Baresi L. & di Nitto E., Springer Verlang, 307-335.
    • [18] Raiciu C., Rosenblum, D. S., 2006, Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures, In Proc. of IEEE Securecomm '06
    • [19] Shanahan, M.P., 1999, The Event Calculus Explained, in Artificial Intelligence Today, LNAI 1600:409-430
    • [20] Song, S., Hwang, K., Zhou, R., and Kwok, Y., 2005. Trusted P2P Transactions with Fuzzy Reputation Aggregation. IEEE Internet Computing, 9(6):24-34.
    • [21] Mahbub K., Spanoudakis G., 2007. Monitoring WSAgreements: An Event Calculus Based Approach, In Test and Analysis of Web Services, (eds) Baresi L. & di Nitto E., Springer Verlang, 265-306.
    • [22] Srivatsa, M., Liu, L., 2005, Securing PublishSubscribe Overlay Services With EventGuard, In Proc. of 12th ACM Conf. on Computer and Communication Security
    • [23] Saxena N., Tsudik G., Yi J.H., 2003. Admission control in Peer-to-Peer: design and performance evaluation, 1st ACM W. on Sec. of ad hoc and sensor networks, 104-113
    • [24] Xiaolin, Catania, B. Kian-Lee T., 2003. Securing your data in agent-based P2P systems, In 8th Int. Conf. on Database Systems for Advanced Applications, 55- 62
    • [25] Law, Y.W., Corin, R., Etalle, S. and Hartel, P., 2003. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks, Personal Wireless Communications, LNCS 2775: 27-39
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article