Gerardo Schneider

ORCID: 0000-0003-0629-6853
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Formal Methods in Verification
  • Logic, programming, and type systems
  • Software Testing and Debugging Techniques
  • Security and Verification in Computing
  • Logic, Reasoning, and Knowledge
  • Multi-Agent Systems and Negotiation
  • Access Control and Trust
  • Model-Driven Software Engineering Techniques
  • Advanced Software Engineering Methodologies
  • Privacy, Security, and Data Protection
  • Privacy-Preserving Technologies in Data
  • Diverse Scientific and Economic Studies
  • Distributed systems and fault tolerance
  • Advanced Malware Detection Techniques
  • Real-Time Systems Scheduling
  • Business Process Modeling and Analysis
  • Blockchain Technology Applications and Security
  • Software Reliability and Analysis Research
  • Semantic Web and Ontologies
  • Cloud Data Security Solutions
  • Cryptography and Data Security
  • Software Engineering Research
  • Advanced Control Systems Optimization
  • Software Engineering Techniques and Practices
  • Service-Oriented Architecture and Web Services

Chalmers University of Technology
2014-2024

University of Gothenburg
2015-2024

Norwegian University of Science and Technology
2022

Karlstad University
2022

Göteborgs Stads
2016

University of Oslo
2005-2013

Universidad Nacional de Entre Ríos
2013

Infor (Norway)
2007

Institut de Recherche en Informatique et Systèmes Aléatoires
2005

Centre National de la Recherche Scientifique
2004-2005

The use of runtime verification, as a lightweight approach to guarantee properties systems, has been increasingly employed on real-life software. In this paper, we present the tool LARVA, for verification Java programs, including real-time properties. Properties can be expressed in number notations, timed-automata enriched with stopwatches, Lustre, and subset duration calculus. successfully used case-studies, an industrial system handling financial transactions. LARVA also performs analysis...

10.1109/sefm.2009.13 article EN 2009-01-01

Abstract Runtime verification is an area of formal methods that studies the dynamic analysis execution traces against specifications. Typically, two main activities in runtime efforts are process creating monitors from specifications, and algorithms for evaluation generated monitors. Other involve instrumentation system to generate trace communication between under monitor. Most applications have been focused on software, even though there many more potential other computational devices...

10.1007/s10703-019-00337-w article EN cc-by Formal Methods in System Design 2019-08-09

Differential privacy provides a way to get useful information about sensitive data without revealing much any one individual. It enjoys many nice compositionality properties not shared by other approaches privacy, including, in particular, robustness against side-knowledge.

10.1145/2676726.2677005 article EN 2014-12-19

10.1016/j.jlap.2012.03.003 article EN publisher-specific-oa The Journal of Logic and Algebraic Programming 2012-03-18

Static verification techniques are used to analyse and prove properties about programs before they executed. Many of these work directly on the source code verify data-oriented over all possible executions. The analysis is necessarily an over-approximation as real executions program not available at time. In contrast, runtime have been extensively for control-oriented properties, analysing current execution path in a fully automatic manner. this article, we present novel approach which may...

10.1007/s10703-017-0274-y article EN cc-by Formal Methods in System Design 2017-04-04

10.1016/j.tcs.2007.03.055 article EN publisher-specific-oa Theoretical Computer Science 2007-04-07

Differential privacy provides a way to get useful information about sensitive data without revealing much any one individual. It enjoys many nice compositionality properties not shared by other approaches privacy, including, in particular, robustness against side-knowledge. Designing differentially private mechanisms from scratch can be challenging task. One make it easier construct new differential is design system which allows more complex (programs) built building blocks principled way,...

10.1145/2775051.2677005 article EN ACM SIGPLAN Notices 2015-01-14

Due to the upcoming, more restrictive regulations (like European GDPR), designing privacy preserving architectures for information systems is becoming a pressing concern practitioners. In particular, verifying that design compliant with might be challenging task engineers. This work presents an approach based on model transformations, which guarantee architectural encompasses regulation-oriented principles such as purpose limitation, or accountability of data controller. Our improves state...

10.1109/eurospw.2018.00024 article EN 2018-04-01

In a web service composition, an electronic contract (e-contract) regulates how the services participating in composition should behave, including restrictions that these must fulfill, such as real-time constraints. this work we present visual model allows us to specify e-contracts user friendly way, conditional behavior and realtime A case study is presented illustrate defines preliminary evaluation of also done.

10.1109/scc.2010.32 article EN IEEE International Conference on Services Computing 2010-07-01
Coming Soon ...