Auswahl der wissenschaftlichen Literatur zum Thema „Execution trace analysis“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Execution trace analysis" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Execution trace analysis"
LANGEVINE, LUDOVIC, und MIREILLE DUCASSÉ. „Design and implementation of a tracer driver: Easy and efficient dynamic analyses of constraint logic programs“. Theory and Practice of Logic Programming 8, Nr. 5-6 (November 2008): 581–609. http://dx.doi.org/10.1017/s147106840800344x.
Der volle Inhalt der QuelleJAHIER, ERWAN, und MIREILLE DUCASSÉ. „Generic program monitoring by trace analysis“. Theory and Practice of Logic Programming 2, Nr. 4-5 (Juli 2002): 611–43. http://dx.doi.org/10.1017/s1471068402001461.
Der volle Inhalt der QuelleSimmons, Sharon, Dennis Edwards und Phil Kearns. „Communication Analysis of Distributed Programs“. Scientific Programming 14, Nr. 2 (2006): 151–70. http://dx.doi.org/10.1155/2006/763568.
Der volle Inhalt der QuelleCôté, Mathieu, und Michel R. Dagenais. „Problem Detection in Real-Time Systems by Trace Analysis“. Advances in Computer Engineering 2016 (06.01.2016): 1–12. http://dx.doi.org/10.1155/2016/9467181.
Der volle Inhalt der QuelleAl-Rousan, Thamer, und Hasan Abualese. „A new technique for understanding large-scale software systems“. Telfor Journal 12, Nr. 1 (2020): 34–39. http://dx.doi.org/10.5937/telfor2001034a.
Der volle Inhalt der QuelleRyan, Gabriel, Burcu Cetin, Yongwhan Lim und Suman Jana. „Accurate Data Race Prediction in the Linux Kernel through Sparse Fourier Learning“. Proceedings of the ACM on Programming Languages 8, OOPSLA1 (29.04.2024): 810–32. http://dx.doi.org/10.1145/3649840.
Der volle Inhalt der QuelleMa, Ming Yang, Yi Qiang Wang, Wei Luo, Er Hu Zhang, Chao Fu und Li Xue Wang. „Fault Localization of CNC Software Based on Searching in Divided Execution Trace“. Applied Mechanics and Materials 101-102 (September 2011): 876–79. http://dx.doi.org/10.4028/www.scientific.net/amm.101-102.876.
Der volle Inhalt der QuelleCornelissen, Bas, Andy Zaidman, Danny Holten, Leon Moonen, Arie van Deursen und Jarke J. van Wijk. „Execution trace analysis through massive sequence and circular bundle views“. Journal of Systems and Software 81, Nr. 12 (Dezember 2008): 2252–68. http://dx.doi.org/10.1016/j.jss.2008.02.068.
Der volle Inhalt der QuelleGamino del Río, Iván, Agustín Martínez Hellín, Óscar R. Polo, Miguel Jiménez Arribas, Pablo Parra, Antonio da Silva, Jonatan Sánchez und Sebastián Sánchez. „A RISC-V Processor Design for Transparent Tracing“. Electronics 9, Nr. 11 (07.11.2020): 1873. http://dx.doi.org/10.3390/electronics9111873.
Der volle Inhalt der QuelleKabamba, Herve M., Matthew Khouzam und Michel R. Dagenais. „Vnode: Low-Overhead Transparent Tracing of Node.js-Based Microservice Architectures“. Future Internet 16, Nr. 1 (29.12.2023): 13. http://dx.doi.org/10.3390/fi16010013.
Der volle Inhalt der QuelleDissertationen zum Thema "Execution trace analysis"
Zhou, Yang. „Execution Trace Visualization for Java Pathfinder using Trace Compass“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-286313.
Der volle Inhalt der QuelleMultitrådning används ofta i moderna datorprogram, vilket har många fördelar men kan också orsaka samtidighetsproblem. Bland olika felsökningsverktyg kan Java Pathfinder (JPF) upptäcka latenta fel hos multitrådade Javaprogram genom modellkontroll. Spårningsinformationen i form av text har låg läsbarhet, och tidigare försök att visualsera JPF-spår har visat begränsningar. För långsiktig utveckling har populära spårningsanalysplattformar som Trace Compass (TC) utvidgats för att anpassas till JPF-spår. I examensprojektet gör utvecklingen av JPF och TC det möjligt att analysera JPF-spår på TC med ett användargränssnitt baserat på visuella diagram. Utvecklingen löser den konceptuella skillnaden mellan verktygen och visualiserar spårdata på ett framgångsrikt sätt. Implementeringen bidrar med ett generiskt tillvägagångssätt för att analysera JPF spår med hjälp av visualisering.
Reger, Giles Matthew. „Automata based monitoring and mining of execution traces“. Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/automata-based-monitoring-and-mining-of-execution-traces(08eb0a62-53a3-4171-b4d2-36bfe450b9a7).html.
Der volle Inhalt der QuelleZoor, Maysam. „Latency verification in execution traces of HW/SW partitioning model“. Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT037.
Der volle Inhalt der QuelleWhile many research works aim at defining new (formal) verification techniques to check for requirements in a model, understanding the root cause of a requirement violation is still an open issue for complex platforms built around software and hardware components. For instance, is the violation of a latency requirement due to unfavorable real-time scheduling, to contentions on buses, to the characteristics of functional algorithms or hardware components?This thesis introduces a Precise Latency ANalysis approach called PLAN. PLAN takes as input an instance of a HW/SW partitioning model, an execution trace, and a time constraint expressed in the following format: the latency between operator A and operator B should be less than a maximum latency value. First PLAN checks if the latency requirement is satisfied. If not, the main interest of PLAN is to provide the root cause of the non satisfaction by classifying execution transactions according to their impact on latency: obligatory transaction, transaction inducing a contention, transaction having no impact, etc.A first version of PLAN assumes an execution for which there is a unique execution of operator A and a unique execution of operator B. A second version of PLAN can compute, for each executed operator A, the corresponding operator B. For this, our approach relies on tainting techniques.The thesis formalizes the two versions of PLAN and illustrates them with toy examples. Then, we show how PLAN was integrated into a Model-Driven Framework (TTool). The two versions of PLAN are illustrated with two case studies taken from the H2020 AQUAS project. In particular, we show how tainting can efficiently handle the multiple and concurrent occurrences of the same operator
Emteu, Tchagou Serge Vladimir. „Réduction à la volée du volume des traces d'exécution pour l'analyse d'applications multimédia de systèmes embarqués“. Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM051/document.
Der volle Inhalt der QuelleThe consumer electronics market is dominated by embedded systems due to their ever-increasing processing power and the large number of functionnalities they offer.To provide such features, architectures of embedded systems have increased in complexity: they rely on several heterogeneous processing units, and allow concurrent tasks execution.This complexity degrades the programmability of embedded system architectures and makes application execution difficult to understand on such systems.The most used approach for analyzing application execution on embedded systems consists in capturing execution traces (event sequences, such as system call invocations or context switch, generated during application execution).This approach is used in application testing, debugging or profiling.However in some use cases, execution traces generated can be very large, up to several hundreds of gigabytes.For example endurance tests, which are tests consisting in tracing execution of an application on an embedded system during long periods, from several hours to several days.Current tools and methods for analyzing execution traces are not designed to handle such amounts of data.We propose an approach for monitoring an application execution by analyzing traces on the fly in order to reduce the volume of recorded trace.Our approach is based on features of multimedia applications which contribute the most to the success of popular devices such as set-top boxes or smartphones.This approach consists in identifying automatically the suspicious periods of an application execution in order to record only the parts of traces which correspond to these periods.The proposed approach consists of two steps: a learning step which discovers regular behaviors of an application from its execution trace, and an anomaly detection step which identifies behaviors deviating from the regular ones.The many experiments, performed on synthetic and real-life datasets, show that our approach reduces the trace size by an order of magnitude while maintaining a good performance in detecting suspicious behaviors
Hamou-Lhadj, Abdelwahab. „Techniques to simplify the analysis of execution traces for program comprehension“. Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/29296.
Der volle Inhalt der QuelleRose, Annica Elizabeth. „An Analysis of Investor Trading Behaviour and Its Impact on Trade Execution, Market Quality and Stock Returns“. Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/9897.
Der volle Inhalt der QuelleVigouroux, Xavier. „Analyse distribuée de traces d'exécution de programmes parallèles“. Lyon, École normale supérieure (sciences), 1996. http://www.theses.fr/1996ENSL0016.
Der volle Inhalt der QuelleTaqi, Alawi. „A qualitative analysis of the current and future leadership development needs of third-line leaders in the oil and gas sector in Kuwait“. Thesis, University of Stirling, 2016. http://hdl.handle.net/1893/24788.
Der volle Inhalt der QuelleMallangi, Siva Sai Reddy. „Low-Power Policies Based on DVFS for the MUSEIC v2 System-on-Chip“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229443.
Der volle Inhalt der QuelleNuförtiden så har multifunktionella bärbara hälsoenheter fått en betydande roll. Dessa enheter drivs vanligtvis av batterier och är därför begränsade av batteritiden (från ett par timmar till ett par veckor beroende på tillämpningen). På senaste tiden har det framkommit att dessa enheter som används vid en fast spänning och frekvens kan användas vid flera spänningar och frekvenser. Genom att byta till lägre spänning och frekvens på grund av effektbehov så kan enheterna få enorma fördelar när det kommer till energibesparing. Dynamisk skalning av spänning och frekvens-tekniker (såkallad Dynamic Voltage and Frequency Scaling, DVFS) har visat sig vara användbara i detta sammanhang för en effektiv avvägning mellan energi och beteende. Hos Imec så använder sig bärbara enheter av den internt utvecklade MUSEIC v2 (Multi Sensor Integrated circuit version 2.0). Systemet är optimerat för effektiv och korrekt insamling, bearbetning och överföring av data från flera (hälso) sensorer. MUSEIC v2 har begränsad möjlighet att styra spänningen och frekvensen dynamiskt. I detta examensarbete undersöker vi hur traditionella DVFS-tekniker kan appliceras på MUSEIC v2. Experiment utfördes för att ta reda på de optimala effektlägena och för att effektivt kunna styra och även skala upp matningsspänningen och frekvensen. Eftersom att ”overhead” skapades vid växling av spänning och frekvens gjordes också en övergångsanalys. Realtidsoch icke-realtidskalkyler genomfördes baserat på dessa tekniker och resultaten sammanställdes och analyserades. I denna process granskades flera toppmoderna schemaläggningsalgoritmer och skalningstekniker för att hitta en lämplig teknik. Genom att använda vår föreslagna skalningsteknikimplementering har vi uppnått 86,95% effektreduktion i jämförelse med det konventionella sättet att MUSEIC v2-chipets processor arbetar med en fast spänning och frekvens. Tekniker som inkluderar lätt sömn och djupt sömnläge studerades och implementerades, vilket testade systemets förmåga att tillgodose DPM-tekniker (Dynamic Power Management) som kan uppnå ännu större fördelar. En ny metod för att genomföra den djupa sömnmekanismen föreslogs också och enligt erhållna resultat så kan den ge upp till 71,54% lägre energiförbrukning jämfört med det traditionella sättet att implementera djupt sömnläge.
„Supporting Source Code Feature Analysis Using Execution Trace Mining“. Thesis, 2013. http://hdl.handle.net/10388/ETD-2013-10-1266.
Der volle Inhalt der QuelleBücher zum Thema "Execution trace analysis"
Company, John T. Boyd. Executive summary, independent analysis, 21 closure review collieries British Coal Corporation United Kingdom. London: HMSO, 1993.
Den vollen Inhalt der Quelle findenAborisade, Femi. Nigeria: Freedom of association and the Trade Unions Act : a critical analysis : includes appraisal of the Executive Bill to Amend Trade Unions Act, 2004. Ibadan: Centre for Labour Studies (CLS), 2004.
Den vollen Inhalt der Quelle findenPhilip, Slayton, und Quinn John, Hrsg. Dispute settlement mechanisms: An analysis of the dispute settlement provisions of the Canada-U.S. Free Trade Agreement preliminary transcript : executive summary, November 4, 1987. [Toronto, Ont.]: Govt. of Ontario, 1987.
Den vollen Inhalt der Quelle findenConsultants, Spectrum Strategy, und Great Britain. Department of Trade and Industry., Hrsg. Development of the information society: An international analysis : executive summary : based on a report by Spectrum Strategy Consultants for the Department of Trade and Industry. London: Department of Trade and Industry, 1996.
Den vollen Inhalt der Quelle findenGoodman, Seymour. Executive briefing: An examination of high-performance computing export control policy in the 1990s. Los Alamitos, Calif: IEEE Computer Society Press, 1996.
Den vollen Inhalt der Quelle findenUnited States. General Accounting Office., Hrsg. Financial management: Analysis of DOD's first Biennial Financial Management Improvement Plan : report to Congressional committees. Washington, D.C: The Office, 1999.
Den vollen Inhalt der Quelle findenOffice, General Accounting. Financial management: Analysis of operating cash balance of the Defense Logistics Agency's stock fund : report to the chairman, Subcommittee on Defense, House Committee on Appropriations, House of Representatives. Washington, D.C: The Office, 1990.
Den vollen Inhalt der Quelle findenShadlen, Kenneth C. Coalitional Clash, Export Mobilization, and Executive Agency. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199593903.003.0005.
Der volle Inhalt der QuelleMoseley, Mason W. Uneven Democracy and Contentious Politics. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190694005.003.0007.
Der volle Inhalt der QuelleEizenstat, Stuart E., und Marney L. Cheek. Executive Reports: Legal Analysis of the Bipartisan Trade Promotion Authority Act of 2002 - The Over-Arching Issues You Need to Know (Executive Reports). Aspatore Books, 2006.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Execution trace analysis"
Khoury, Raphaël, Sylvain Hallé und Omar Waldmann. „Execution Trace Analysis Using LTL-FO $$^+$$“. In Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 356–62. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47169-3_26.
Der volle Inhalt der QuelleHuang, Zunchen, und Chao Wang. „Symbolic Predictive Cache Analysis for Out-of-Order Execution“. In Fundamental Approaches to Software Engineering, 163–83. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99429-7_10.
Der volle Inhalt der QuelleAl Haider, Newres, Benoit Gaudin und John Murphy. „Execution Trace Exploration and Analysis Using Ontologies“. In Runtime Verification, 412–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29860-8_33.
Der volle Inhalt der QuelleLima, Leonardo, Andrei Herasimau, Martin Raszyk, Dmitriy Traytel und Simon Yuan. „Explainable Online Monitoring of Metric Temporal Logic“. In Tools and Algorithms for the Construction and Analysis of Systems, 473–91. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30820-8_28.
Der volle Inhalt der QuelleBeutner, Raven, und Bernd Finkbeiner. „AutoHyper: Explicit-State Model Checking for HyperLTL“. In Tools and Algorithms for the Construction and Analysis of Systems, 145–63. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30823-9_8.
Der volle Inhalt der QuelleWang, Wubing, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang und Zhiqiang Lin. „Specularizer : Detecting Speculative Execution Attacks via Performance Tracing“. In Detection of Intrusions and Malware, and Vulnerability Assessment, 151–72. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80825-9_8.
Der volle Inhalt der QuelleBeutner, Raven, und Bernd Finkbeiner. „Software Verification of Hyperproperties Beyond k-Safety“. In Computer Aided Verification, 341–62. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13185-1_17.
Der volle Inhalt der QuelleBeutner, Raven. „Automated Software Verification of Hyperliveness“. In Tools and Algorithms for the Construction and Analysis of Systems, 196–216. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57249-4_10.
Der volle Inhalt der QuelleLoose, Nils, Felix Mächtle, Florian Sieck und Thomas Eisenbarth. „SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution)“. In Tools and Algorithms for the Construction and Analysis of Systems, 399–405. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57256-2_28.
Der volle Inhalt der QuelleSchuster, Daniel, Lukas Schade, Sebastiaan J. van Zelst und Wil M. P. van der Aalst. „Visualizing Trace Variants from Partially Ordered Event Data“. In Lecture Notes in Business Information Processing, 34–46. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98581-3_3.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Execution trace analysis"
Bohnet, Johannes, Martin Koeleman und Juergen Doellner. „Visualizing massively pruned execution traces to facilitate trace exploration“. In 2009 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT). IEEE, 2009. http://dx.doi.org/10.1109/vissof.2009.5336416.
Der volle Inhalt der QuellePekarek, Daniel, und Hanspeter Mössenböck. „trcview: Interactive Architecture Agnostic Execution Trace Analysis“. In MPLR '20: 17th International Conference on Managed Programming Languages and Runtimes. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3426182.3426190.
Der volle Inhalt der QuelleAlouneh, Sahel, Sa'ed Abed, Bassam Jamil Mohd und Ahmad Al-Khasawneh. „Relational database approach for execution trace analysis“. In 2012 International Conference on Computer, Information and Telecommunication Systems (CITS). IEEE, 2012. http://dx.doi.org/10.1109/cits.2012.6220394.
Der volle Inhalt der QuelleAbualese, Hasan, Putra Sumari, Thamer Al-Rousan und Mohammad Rasmi Al-Mousa. „Utility classes detection metrics for execution trace analysis“. In 2017 8th International Conference on Information Technology (ICIT). IEEE, 2017. http://dx.doi.org/10.1109/icitech.2017.8080044.
Der volle Inhalt der QuelleRezazadeh, Majid, Naser Ezzati-Jivan, Evan Galea und Michel R. Dagenais. „Multi-Level Execution Trace Based Lock Contention Analysis“. In 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2020. http://dx.doi.org/10.1109/issrew51248.2020.00068.
Der volle Inhalt der QuelleMendes, Celso L. „Performance Prediction by Trace Transformation“. In Simpósio Brasileiro de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 1993. http://dx.doi.org/10.5753/sbac-pad.1993.23023.
Der volle Inhalt der QuelleLi, Hongzhe, Taebeom Kim, Munkhbayar Bat-Erdene und Heejo Lee. „Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution“. In 2013 Eighth International Conference on Availability, Reliability and Security (ARES). IEEE, 2013. http://dx.doi.org/10.1109/ares.2013.59.
Der volle Inhalt der QuelleZoor, Maysam, Ludovic Apvrille und Renaud Pacalet. „Execution Trace Analysis for a Precise Understanding of Latency Violations“. In 2021 ACM/IEEE 24th International Conference on Model Driven Engineering Languages and Systems (MODELS). IEEE, 2021. http://dx.doi.org/10.1109/models50736.2021.00021.
Der volle Inhalt der QuelleToda, Tatsuya, Takashi Kobayashi, Noritoshi Atsumi und Kiyoshi Agusa. „Grouping Objects for Execution Trace Analysis Based on Design Patterns“. In 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2013. http://dx.doi.org/10.1109/apsec.2013.107.
Der volle Inhalt der QuelleLu, Yue, Thomas Nolte, Iain Bate und Liliana Cucu-Grosjean. „A trace-based statistical worst-case execution time analysis of component-based real-time embedded systems“. In Factory Automation (ETFA 2011). IEEE, 2011. http://dx.doi.org/10.1109/etfa.2011.6059190.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Execution trace analysis"
Harkema, Marcel, Dick Quartel, Rob van der Mei und Bart Gijsen. JPMT: A Java Performance Monitoring Tool. Centre for Telematics and Information Technology (CTIT), 2003. http://dx.doi.org/10.3990/1.5152400.
Der volle Inhalt der QuelleAmela, R., R. Badia, S. Böhm, R. Tosi, C. Soriano und R. Rossi. D4.2 Profiling report of the partner’s tools, complete with performance suggestions. Scipedia, 2021. http://dx.doi.org/10.23967/exaqute.2021.2.023.
Der volle Inhalt der QuelleÁlvarez, Carola, Leonardo Corral, José Martínez und César Montiel. Project Completion Report Analysis: Implications for the Portfolio. Inter-American Development Bank, März 2021. http://dx.doi.org/10.18235/0003145.
Der volle Inhalt der QuelleWANG, Peng, Zhidong CAI, Qingying ZHAO, Wanting JIANG, Cong LIU und Xing WANG. A Bayesian Network Meta-analysis of the Effect of Acute Exercise on Executive Function in Middle-aged and Senior People. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, Dezember 2021. http://dx.doi.org/10.37766/inplasy2021.12.0086.
Der volle Inhalt der QuelleMueller, Bernardo, Carlos Pereira, Lee J. Alston und Marcus André Melo. Political Institutions, Policymaking Processes and Policy Outcomes in Brazil. Inter-American Development Bank, März 2006. http://dx.doi.org/10.18235/0011295.
Der volle Inhalt der QuelleTarko, Andrew P., Mario A. Romero, Vamsi Krishna Bandaru und Cristhian Lizarazo. TScan–Stationary LiDAR for Traffic and Safety Applications: Vehicle Interpretation and Tracking. Purdue University, 2022. http://dx.doi.org/10.5703/1288284317402.
Der volle Inhalt der QuelleLu, Tianjun, Jian-yu Ke, Azure Fisher, Mahmoud Salari, Patricia Valladolid und Fynnwin Prager. Should State Land in Southern California Be Allocated to Warehousing Goods or Housing People? Analyzing Transportation, Climate, and Unintended Consequences of Supply Chain Solutions. Mineta Transportation Institute, Dezember 2023. http://dx.doi.org/10.31979/mti.2023.2231.
Der volle Inhalt der QuelleDudoit, Alain. The urgency of the first link: Canada’s supply chain at breaking point, a national security issue. CIRANO, Juli 2023. http://dx.doi.org/10.54932/cxwf7311.
Der volle Inhalt der QuelleDudoit, Alain. European common data spaces: a structuring initiative that is both necessary and adaptable to Canada. CIRANO, November 2023. http://dx.doi.org/10.54932/skhp9567.
Der volle Inhalt der QuelleFinancial Stability Report - September 2015. Banco de la República, August 2021. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2015.
Der volle Inhalt der Quelle