Browse Results

Showing 45,201 through 45,225 of 54,430 results

Rules of Play: Game Design Fundamentals (The\mit Press Ser.)

by Katie Salen Tekinbas Eric Zimmerman

An impassioned look at games and game design that offers the most ambitious framework for understanding them to date.As pop culture, games are as important as film or television—but game design has yet to develop a theoretical framework or critical vocabulary. In Rules of Play Katie Salen and Eric Zimmerman present a much-needed primer for this emerging field. They offer a unified model for looking at all kinds of games, from board games and sports to computer and video games. As active participants in game culture, the authors have written Rules of Play as a catalyst for innovation, filled with new concepts, strategies, and methodologies for creating and understanding games. Building an aesthetics of interactive systems, Salen and Zimmerman define core concepts like "play," "design," and "interactivity." They look at games through a series of eighteen "game design schemas," or conceptual frameworks, including games as systems of emergence and information, as contexts for social play, as a storytelling medium, and as sites of cultural resistance.Written for game scholars, game developers, and interactive designers, Rules of Play is a textbook, reference book, and theoretical guide. It is the first comprehensive attempt to establish a solid theoretical framework for the emerging discipline of game design.

The Rules of Programming

by Chris Zimmerman

This philosophy-of-programming guide presents a unique and entertaining take on how to think about programming. A collection of 21 pragmatic rules, each presented in a standalone chapter, captures the essential wisdom that every freshly minted programmer needs to know and provides thought-provoking insights for more seasoned programmers. Author Chris Zimmerman, cofounder of the video game studio Sucker Punch Productions, teaches basic truths of programming by wrapping them in memorable aphorisms and driving them home with examples drawn from real code. This practical guide also helps managers looking for ways to train new team members. The rules in this book include: As simple as possible, but no simplerLet your code tell its own storyLocalize complexityGeneralization takes three examplesWork backward from your result, not forward from your codeThe first lesson of optimization is don't optimizeA good name is the best documentationBugs are contagiousEliminate failure casesCode that isn't running doesn't workSometimes you just need to hammer the nails

Ruling the Root: Internet Governance and the Taming of Cyberspace

by Milton L. Mueller

In Ruling the Root, Milton Mueller uses the theoretical framework of institutional economics to analyze the global policy and governance problems created by the assignment of Internet domain names and addresses.

Run and Jump: The Meaning of the 2D Platformer (Playful Thinking)

by Peter D. McDonald

How abstract design decisions in 2D platform games create rich worlds of meaning for players.Since the 1980s, 2D platform games have captivated their audiences. Whether the player scrambles up the ladders in Donkey Kong or leaps atop an impossibly tall pipe in Super Mario Bros., this deceptively simple visual language has persisted in our cultural imagination of video games. In Run and Jump, Peter McDonald surveys the legacy of 2D platform games and examines how abstract and formal design choices have kept players playing. McDonald argues that there is a rich layer of meaning underneath, say, the quality of an avatar&’s movement, the pacing and rhythm of level design, the personalities expressed by different enemies, and the emotion elicited by collecting a coin.To understand these games, McDonald draws on technical discussions by game designers as well as theoretical work about the nature of signs from structuralist semiotics. Interspersed throughout are design exercises that show how critical interpretation can become a tool for game designers to communicate with their players. With examples drawn from over forty years of game history, and from games made by artists, hobbyists, iconic designers, and industry studios, Run and Jump presents a comprehensive—and engaging—vision of this slice of game history.

Run Grow Transform: Integrating Business and Lean IT

by Steven Bell

Today's customers want it all and they want it now: innovation, speed, agility, and value. How can you drive operational excellence, stimulate growth, and accelerate idea-to-value innovation throughout your enterprise? Shingo Prize-winning author Steve Bell, joined by other thought leaders, offers useful insights and examples you can start using now. Run Grow Transform takes the next logical step to driving enterprise value. This could be the game-changing playbook for IT 3.0. -Mark Katz, CIO & Senior Vice President, Esselte Corporation A powerful read detailing how companies can leverage their Lean IT transformation to supercharge the business. -Tom Paider, IT Build Capability Leader, Nationwide The consistent application of the practices described in this book has enabled Embraer to reap huge gains. I recommend this book as a desktop companion. -Alexandre Baule, Vice President Information Systems, Embraer Run Grow Transform takes the reader a leap forward, ready for immediate application to bridge Lean and innovation. -Melissa Barrett, Enterprise Architecture & IT Strategy, Premera Blue Cross This book focuses on the most critical and challenging issue for any aspect of the development or use of IT: creating a collaborative learning culture. -Jeffrey K. Liker, Shingo Prize-Winning Author of The Toyota Way Run Grow Transform sets out the principles and practices necessary for success in the new economy. -Jez Humble, author of Continuous Delivery Steve Bell has hit another home run with this book. Either your organization will adopt the wisdom contained in this book and thrive, or your competitors will do so and put you out of business. -Scott Ambler, author Disciplined Agile Delivery and 19 other books It's rare to see truly new insight added to the Lean discussion. Steve Bell does just that by continuing to push the frontiers of Lean thinking. -Alexander Brown, COO, Scrum Inc. A powerful read detailing how companies can leverage their Lean IT transformation to supercharge the business. -Tom Paider, IT Build Capability Leader, Nationwide Steve Bell has mapped a new trajectory. I challenge any CIO to read Bell's breakthrough work and not be compelled to start this journey to become a transformative leader in the creation of real and sustainable value. -Jeffrey Barnes, Society for Information Management (SIM), Regional Director, Advanced Practices Council All too often the IT organization is viewed as an impediment to lean transformation, when it truly can be a catalyst. Steve's book sorts out all the noise, the jargon, and the "hero culture", guiding the reader to what is so obvious, yet so hard to see: build your culture around your customer! -Josh Rapoza, Director of Web Strategy and Operations, Lean Enterprise Institute Aligning Lean and IT is a great challenge with a big payoff. This book really shows how Lean and IT can create a strong enterprise; it's a great inspiration. -Klaus Lyck Petersen, Solar A/S A must read for any organization that is pursuing continuous improvement. In today's world, real business improvement cannot be achieved without the IT factor; this book will help any organization achieve the improvement that they are seeking. -Barry J. Brunetto, Vice President, Information Systems, Blount International Precise, concise, and entertaining, this book provides the reader with crucial tips on how IT can help enterprises survive and thrive in a fast-paced technological and economic environment. This is mandatory reading not only for businesses and IT organizations, but also for universities and policy makers. -Fuat Alican, PhD, Vice President, Central American Scientific Research and Education Center Not just for Lean Practitioners, Run Grow Transform is a must-have reference for any IT organization, regardless of size, age or industry, looking to move to the next level of performance. -Sarah Topham, Lean Deployment Leader, Information Technology & Product Management, Paychex, Inc. This is a long overdue book that addresses the key challenges for today's IT organization and puts Lean IT into

Run-time Adaptation for Reconfigurable Embedded Processors

by Jörg Henkel Lars Bauer

Embedded processors are the heart of embedded systems. Reconfigurable embedded processors comprise an extended instruction set that is implemented using a reconfigurable fabric (similar to a field-programmable gate array, FPGA). This book presents novel concepts, strategies, and implementations to increase the run-time adaptivity of reconfigurable embedded processors. Concepts and techniques are presented in an accessible, yet rigorous context. A complex, realistic H.264 video encoder application with a high demand for adaptivity is presented and used as an example for motivation throughout the book. A novel, run-time system is demonstrated to exploit the potential for adaptivity and particular approaches/algorithms are presented to implement it.

Run Your Own Web Server Using Linux and Apache

by Tony Steidler-Dennison

This book is for Web Developers who want to learn how to use Linux and Apache for Website Hosting. The first chapters will teach you how to install Linux and Apache 2.0 on a home or office machine for testing purposes. Then you'll learn how to perform dozens of common tasks including: *Updating server software *Setting up new Websites, Email Accounts and Subdomains *Configuring various Linux and Apache files related to performance and security *Install spam filtering software *Perform automatic backups and crash recoveries And much more. This is the ideal book for anyone who wants to run Websites using a leased or co-located Linux server, without having to spends thousands of dollars annually on third party support and management.

Runescape: The First 20 Years--An Illustrated History

by Alex Calvin JagEx

A full-colour hardcover companion tome that offers a look behind the scenes as the iconic online fantasy RPG celebrates its 20th birthday!In 2001, RuneScape transformed the world of MMORPGs with a magical world that was free-to-play in your browser. Assuming any number of fantasy roles, players carved their own adventures in a fantasy land filled with vibrant characters, daring adventure and mystery. In an industry where success can often be short lived, RuneScape has defied the odds by not just surviving, but thriving over an incredible two decades. Now you can get an insider's look at the tremendous talent and enormous effort that went into creating the land of Gielinor and the magical races who inhabit it.Jagex and Dark Horse present a guide to the history of the RuneScape franchise, exploring the detailed tapestry of RuneScape and Old School RuneScape through exciting and exclusive art and behind the scenes interviews!

Runescape Gold Strategy Guide

by Lesley A. Harrison

A practical and concise tutorial leading the player to understand how to get the most out of their in game time. Packt Gold Strategy Guides are a workout, not a walkthrough! Newcomers or experienced players of the Runescape online game. Both free and pay-for members will benefit from the book.

Running ESXi on a Raspberry Pi: Installing VMware ESXi on Raspberry Pi 4 to run Linux virtual machines

by Thomas Fenton Patrick Kennedy

Gain foundational knowledge of ESXi technology and understand why it is such a dominant force in the datacenter. This book also looks beyond ESXi to other vSphere technologies, such as virtual machines (VMs), vMotion, and vCenter Server. Knowing how these technologies complement ESXi running on a Raspberry Pi will help you get the most out of ESXi on Arm technologies. This marks a significant change for ESXi, and has created new learning opportunities and use cases for both seasoned ESXi users and users completely new to the virtualization space. For those already familiar with ESXi but new to the Raspberry Pi, you’ll develop an in-depth understanding of this device and why it has become such a popular platform for technologists. Once you’ve learned the fundamentals, you’ll be introduced to enterprise, edge, and personal use-cases for this technology. Then, you’ll be walked through the process of installing ESXi on a Pi, as well as managing and monitoring it. You will also come to recognize its strengths and limitations and become familiar with the storage and networking options that are currently available. Lastly, given the fact that the sole purpose of running ESXi on a Pi is to run VMs on it, you’ll receive detailed step-by-step instructions for installing popular OSes including Ubuntu, CentOS, and Raspberry Pi OS. What You'll LearnBuild a fully functional ESXi server on a Raspberry PiSelect the correct hardware for particular use casesCreate and optimize virtual machines running on a PiRun Kubernetes on a Pi running ESXi Who This Book Is ForThose new to the datacenter who want a low-cost way to work with one of the most powerful datacenter technologies to experienced datacenter professionals who need to use ESXi on Arm to complement their enterprise’s long-term strategic goals.

Running Lean: Iterate from Plan A to a Plan That Works

by Ash Maurya

<div><p>We live in an age of unparalleled opportunity for innovation. We&#8217;re building more products than ever before, but most of them fail&#8212;not because we can&#8217;t complete what we set out to build, but because we waste time, money, and effort building the wrong product. What we need is a systematic process for quickly vetting product ideas and raising our odds of success. \n</p><p>\n\nIn this inspiring book, Ash Maurya takes you through an exacting strategy for achieving a "product/market fit" for your fledgling venture, based on his own experience in building a wide array of products from high-tech to no-tech. Throughout, he builds on the ideas and concepts of several innovative methodologies, including the Lean Startup, Customer Development, and bootstrapping.</p></div>

Running Linux

by Matthias Kalle Dalheimer Matt Welsh

You may be contemplating your first Linux installation. Or you may have been using Linux for years and need to know more about adding a network printer or setting up an FTP server. Running Linux, now in its fifth edition, is the book you'll want on hand in either case. Widely recognized in the Linux community as the ultimate getting-started and problem-solving book, it answers the questions and tackles the configuration issues that frequently plague users, but are seldom addressed in other books. This fifth edition of Running Linux is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics such as audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always have made the book popular. Running Linux covers basic communications such as mail, web surfing, and instant messaging, but also delves into the subtleties of network configuration--including dial-up, ADSL, and cable modems--in case you need to set up your network manually. The book can make you proficient on office suites and personal productivity applications--and also tells you what programming tools are available if you're interested in contributing to these applications. Other new topics in the fifth edition include encrypted email and filesystems, advanced shell techniques, and remote login applications. Classic discussions on booting, package management, kernel recompilation, and X configuration have also been updated. The authors of Running Linux have anticipated problem areas, selected stable and popular solutions, and provided clear instructions to ensure that you'll have a satisfying experience using Linux. The discussion is direct and complete enough to guide novice users, while still providing the additional information experienced users will need to progress in their mastery of Linux. Whether you're using Linux on a home workstation or maintaining a network server, Running Linux will provide expert advice just when you need it.

Running Linux, 4th Edition

by Matthias Kalle Dalheimer Terry Dawson Lar Kaufman Matt Welsh

The fourth edition of Running Linuxdelves deeper into installation, configuring the windowing system, system administration, and networking. A solid foundation text for any Linux user, the book also includes additional resources for dealing with special requirements imposed by hardware, advanced applications, and emerging technologies. Whether you are using Linux on a home workstation or maintaining a network server, Running Linuxwill provide expert advice just when you need it.

Running Linux, 5th Edition

by Matthias Kalle Dalheimer Matt Welsh

The fifth edition of Running Linux is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics such as audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always made the book popular.

Running Linux, 5th Edition

by Matthias Kalle Dalheimer Matt Welsh

The fifth edition of Running Linux is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics such as audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always made the book popular.

Running Mac OS X Panther

by James N. Davidson

Apple® has shown no mercy to the Macintosh® power user---that dedicated individual who knows their Mac® inside and out: what makes it tick, and what makes it tick better. In the rapid evolution of Mac OS® X, there have been three major releases, and each new release challenges the power user to once more stay ahead of the learning curve. Mac OS X Panther is no exception to that rule. With more than 100 new features, including a new Finder, Expos , FileVault, and an improved BSD Unix core, there's plenty here to master. Fortunately, power users have a secret weapon in Running Mac OS X Panther . This book takes readers deep inside Mac OS X's core, revealing the inner workings of Panther for those who want to get the most out of their system. Running Mac OS X Panther is the ultimate Swiss Army Knife⠢ for power users who want to customize, tweak, and generally rev up their Mac. The easy-to-follow format is organized into three primary parts: Getting Started introduces you to Mac OS X--where it came from, how it's put together, and how it works Administration Essentials gives you the tools you need to examine how your system is running and adjust all the knobs behind its operation Networking and Network Services covers all the ways Mac OS X interfaces with the world around it, including wireless and spontaneous networking Developer Tools, including Xcode, for Mac OS X are discussed throughout the book where needed to accomplish the task at hand. The appendices that follow include handy quick reference materials for things such as Open Firmware. Written for readers who are inquisitive and confident enough to dig into their Macintosh system, Running Mac OS X Panther doesn't waste time talking about silly Finder tips or glossing over the messier details. This book dives right in and explains how your Mac works. You may not be a Mac guru when you start this book, but once you've read it, you'll be well on your way.

Running Mac OS X Tiger

by Jason Deraleau James N. Davidson

Running Mac OS X Tiger is the ideal resource for power users and system administrators like you who want to tweak Tiger, the new release of Mac OS X, to run faster, better, or just differently. If you areready to dig deep into your Mac, this book expertly guides you to the core of Mac OS X. It helps you understand the inner workings of the operating system so you can know how to get the most out of it. And it gives you countless ideas--and step-by-step instruction--for customizing and revving up Tiger to your specific needs and your liking. Completely revised and updated for Mac OS X Tiger, Running Mac OS X Tiger covers all the new features and functionality of Tiger. You can count on authors Jason Deraleau and James Duncan Davidson to give what you need--and not bother with what you don't. They don't spend time on Finder tips and keyboard shortcuts; they focus on showing you what makes a Mac tick and, more importantly, how you can make it tick just the way you want it to. Easy to follow and intuitively organized, Running Mac OS X Tiger is divided into three parts: "Getting Started" introduces Mac OS X and explains how it's put together and why it works; "Administration Essentials" gives you the tools you need to examine how your system is running and adjust all the knobs behind its operation; and "Networking and Network Services" covers the ways Mac OS X interfaces with the world around it, including wireless and spontaneous networking. Developer Tools for Mac OS X, including Xcode, are discussed throughout the book as appropriate. For the growing number of intermediate to advanced users who are ready and eager to customize Mac OS X, Running Mac OS X Tiger delivers everything you need to become master of your Mac.

Running Microsoft Workloads on AWS: Active Directory, Databases, Development, and More

by Ryan Pothecary

Did you know that Amazon Web Services runs nearly double the amount of Microsoft Workloads in the cloud than any other provider?Running Microsoft Workloads in AWS is your single-source solution for learning the best practice skills and guidance that AWS consultants offer their customers in the field. Over 70% of enterprise workloads are based on Microsoft technologies and AWS has been running these technologies in the AWS Cloud for more than 12 years—far longer than Microsoft’s own Azure cloud platform. This book introduces AWS foundations and compares them to traditional Microsoft architectures, showing you how to design your AWS Cloud platform to run your current Microsoft solutions. It covers the crucial area of identity and access control, showing how to implement Active Directory inside the AWS platform and the most secure ways of enabling Single Sign On from your own data centers and from Microsoft AzureAD. The book goes in-depth and shows how developers across the globe are using their existing .NET skills to develop directly on top of AWS, using current AWS development services such as AWS Code Pipeline, AWS Code Build, and AWS Code Deploy to create the next generation of cloud-native applications using the most popular cloud serverless service—AWS Lambda. What You Will LearnBe familiar with the basic building blocks of AWS and how the terminology differs from your own data center and Microsoft AzureUnderstand Amazon Machine Images (AMI) strategies and solutions to best manage the trade-off between speed and manageabilityRun one of the most popular Microsoft products: SQL Server on AWSBe aware of the different database architecture designs for using Amazon RDS and Amazon EC2Read an overview of Serverless Development in the AWS cloud from a Microsoft .NET perspectiveKnow migration strategies for moving your Microsoft Workloads to the AWS Cloud Who This Book Is For Covers high-level concepts and solutions for CTOs and CCTOs; provides a solution for architects; and dives deep into the topic for administrators and DevOps engineers

Running Weblogs with Slash

by Brian Aker David Krieger

Slash is the open-source software system that drives the hugely popular Slashdot web site and many others. Slash implements the kind of web site that has come to be called a "weblog": a moderated list, in reverse-chronological order, of timely items, with links to further discussion on-site, or to further information off-site. Anyone who wants to get a weblog site up and running will want to read Running Weblogs with Slash.

Running Windows Containers on AWS: A complete guide to successfully running Windows containers on Amazon ECS, EKS, and AWS Fargate

by Marcio Morales

Scale up your Windows containers seamlessly on AWS powered by field-proven expertise and best practices on Amazon ECS, EKS, and FargatePurchase of the print or Kindle book includes a free PDF eBookKey FeaturesLeverage the most recent best practices to run and manage Windows containers on AWSLearn about AWS tools to containerize and run Windows containers on AWSDeeper understanding on how Amazon ECS, EKS, and Fargate supports Windows containersBook DescriptionWindows applications are everywhere, from basic intranet applications to high-traffic public APIs. Their prevalence underscores the importance of combining the same tools and experience for managing a modern containerized application with existing critical Windows applications to reduce costs, achieve outstanding operational excellence, and modernize quickly. This comprehensive guide to running and managing Windows containers on AWS looks at the best practices from years of customer interactions to help you stay ahead of the curve.Starting with Windows containers basics, you'll learn about the architecture design that powers Amazon ECS, EKS, and AWS Fargate for Windows containers. With the help of examples and best practices, you'll explore in depth how to successfully run and manage Amazon ECS, EKS, and AWS Fargate clusters with Windows containers support. Next, the book covers day 2 operations in detail, from logging and monitoring to using ancillary AWS tools that fully containerize existing legacy .NET Framework applications into containers without any code changes. The book also covers the most common Windows container operations, such as image lifecycle and working with ephemeral hosts.By the end of this book, you'll have mastered how to run Windows containers on AWS and be ready to start your modernization journey confidently.What you will learnGet acquainted with Windows container basicsRun and manage Windows containers on Amazon ECS, EKS, and AWS FargateEffectively monitor and centralize logs from Windows containersProperly maintain Windows hosts and keep container images up to dateManage ephemeral Windows hosts to reduce operational overheadWork with the container image cache to speed up the container's boot timeWho this book is forThis book is targeted towards DevOps engineer, SREs, solution architects, or a Windows sysadmin who wants to learn more about running Windows containers on AWS. In order to learn from this book, you should have a basic understanding of containers, Docker, and Kubernetes. The book is also beneficial for Windows application developers who want to explore how to achieve better application scalability using containers as a compute layer.

Running with Robots: The American High School's Third Century

by Greg Toppo Jim Tracy

How the technological changes that are reshaping the future of work will transform the American high school as well.What will high school education look like in twenty years? High school students are educated today to take their places in a knowledge economy. But the knowledge economy, based on the assumption that information is a scarce and precious commodity, is giving way to an economy in which information is ubiquitous, digital, and machine-generated. In Running with Robots, Greg Toppo and Jim Tracy show how the technological advances that are already changing the world of work will transform the American high school as well.Toppo and Tracy--a journalist and an education leader, respectively--look at developments in artificial intelligence and other fields that promise to bring us not only driverless cars but doctorless patients, lawyerless clients, and possibly even teacherless students. They visit schools from New York City to Iowa that have begun preparing for this new world. Toppo and Tracy intersperse these reports from the present with bulletins from the future, telling the story of a high school principal who, Rip Van Winkle-style, sleeps for twenty years and, upon awakening in 2040, can hardly believe his eyes: the principal's amazingly efficient assistant is a robot, calculation is outsourced to computers, and students, grouped by competence and not grade level, focus on the conceptual. The lesson to be learned from both the present and the book's thought-experiment future: human and robotic skillsets are complementary, not in competition. We can run with robots, not against them.

Runtime Reconfiguration in Networked Embedded Systems

by Zoltan Papp George Exarchakos

Thisbook focuses on the design and testing of large-scale, distributed signalprocessing systems, with a special emphasis on systems architecture, toolingand best practices. Architecture modeling, model checking, model-basedevaluation and model-based design optimization occupy central roles. Targetsystems with resource constraints on processing, communication or energy supplyrequire non-trivial methodologies to model their non-functional requirements,such as timeliness, robustness, lifetime and "evolution" capacity. Besides thetheoretical foundations of the methodology, an engineering process andtoolchain are described. Real-world cases illustrate the theory and practicetested by the authors in the course of the Europeanproject ARTEMIS DEMANES. The book can be used as a "cookbook" for designers andpractitioners working with complex embedded systems like sensor networks for thestructural integrity monitoring of steel bridges, and distributed micro-climatecontrol systems for greenhouses and smart homes.

Runtime Verification: 18th International Conference, RV 2018, Limassol, Cyprus, November 10–13, 2018, Proceedings (Lecture Notes in Computer Science #11237)

by Christian Colombo Martin Leucker

This book constitutes the refereed proceedings of the 18th International Conference on Runtime Verification, RV 2018, held in Limassol, Cyprus, in November 2018. The 21 full papers presented together with 3 short papers and 3 tool papers were carefully reviewed and selected from 49 submissions. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. Runtime verification techniques are lightweight techniques to assess correctness, reliability, and robustness; these techniques are significantly more powerful and versatile than conventional testing, and more practical than exhaustive formal verification.Chapter “Hardware-based Runtime Verification with Embedded Tracing Units and Stream Processing” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Runtime Verification: 22nd International Conference, RV 2022, Tbilisi, Georgia, September 28–30, 2022, Proceedings (Lecture Notes in Computer Science #13498)

by Thao Dang Volker Stolz

This book constitutes the refereed proceedings of the 22nd International Conference on Runtime Verification, RV 2022, held in Tbilisi, Georgia, during September 28-30, 2022. The 12 regular papers and 10 short papers presented in this book were carefully reviewed and selected from 40 submissions. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. Runtime verification techniques are crucial for system correctness, reliability, and robustness; they provide an additional level of rigor and effectiveness compared to conventional testing, and are generally more practical than exhaustive formal verification.

Runtime Verification: 20th International Conference, RV 2020, Los Angeles, CA, USA, October 6–9, 2020, Proceedings (Lecture Notes in Computer Science #12399)

by Jyotirmoy Deshmukh Dejan Ničković

This book constitutes the refereed proceedings of the 20th International Conference on Runtime Verification, RV 2020, held in Los Angeles, CA, USA, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 14 regular papers and 2 short papers presented in this book were carefully reviewed and selected from 43 submissions. Also included are an invited paper, 5 tutorial papers, 6 tool papers, and a benchmark paper. The RV conference is concerned with all aspects of monitoring and analysis of hardware, software and more general system executions. The papers are organized in the following topical sections: runtime verification for autonomy; runtime verification for software; runtime verification with temporal logic specifications; stream-based monitoring; and runtime verification for cyber-physical systems.

Refine Search

Showing 45,201 through 45,225 of 54,430 results