Academic literature on the topic 'Execution trace analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Execution trace analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Execution trace analysis":
LANGEVINE, LUDOVIC, and MIREILLE DUCASSÉ. "Design and implementation of a tracer driver: Easy and efficient dynamic analyses of constraint logic programs." Theory and Practice of Logic Programming 8, no. 5-6 (November 2008): 581–609. http://dx.doi.org/10.1017/s147106840800344x.
JAHIER, ERWAN, and MIREILLE DUCASSÉ. "Generic program monitoring by trace analysis." Theory and Practice of Logic Programming 2, no. 4-5 (July 2002): 611–43. http://dx.doi.org/10.1017/s1471068402001461.
Simmons, Sharon, Dennis Edwards, and Phil Kearns. "Communication Analysis of Distributed Programs." Scientific Programming 14, no. 2 (2006): 151–70. http://dx.doi.org/10.1155/2006/763568.
Côté, Mathieu, and Michel R. Dagenais. "Problem Detection in Real-Time Systems by Trace Analysis." Advances in Computer Engineering 2016 (January 6, 2016): 1–12. http://dx.doi.org/10.1155/2016/9467181.
Al-Rousan, Thamer, and Hasan Abualese. "A new technique for understanding large-scale software systems." Telfor Journal 12, no. 1 (2020): 34–39. http://dx.doi.org/10.5937/telfor2001034a.
Ryan, Gabriel, Burcu Cetin, Yongwhan Lim, and Suman Jana. "Accurate Data Race Prediction in the Linux Kernel through Sparse Fourier Learning." Proceedings of the ACM on Programming Languages 8, OOPSLA1 (April 29, 2024): 810–32. http://dx.doi.org/10.1145/3649840.
Ma, Ming Yang, Yi Qiang Wang, Wei Luo, Er Hu Zhang, Chao Fu, and Li Xue Wang. "Fault Localization of CNC Software Based on Searching in Divided Execution Trace." Applied Mechanics and Materials 101-102 (September 2011): 876–79. http://dx.doi.org/10.4028/www.scientific.net/amm.101-102.876.
Cornelissen, Bas, Andy Zaidman, Danny Holten, Leon Moonen, Arie van Deursen, and Jarke J. van Wijk. "Execution trace analysis through massive sequence and circular bundle views." Journal of Systems and Software 81, no. 12 (December 2008): 2252–68. http://dx.doi.org/10.1016/j.jss.2008.02.068.
Gamino del Río, Iván, Agustín Martínez Hellín, Óscar R. Polo, Miguel Jiménez Arribas, Pablo Parra, Antonio da Silva, Jonatan Sánchez, and Sebastián Sánchez. "A RISC-V Processor Design for Transparent Tracing." Electronics 9, no. 11 (November 7, 2020): 1873. http://dx.doi.org/10.3390/electronics9111873.
Kabamba, Herve M., Matthew Khouzam, and Michel R. Dagenais. "Vnode: Low-Overhead Transparent Tracing of Node.js-Based Microservice Architectures." Future Internet 16, no. 1 (December 29, 2023): 13. http://dx.doi.org/10.3390/fi16010013.
Dissertations / Theses on the topic "Execution trace analysis":
Zhou, Yang. "Execution Trace Visualization for Java Pathfinder using Trace Compass." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-286313.
Multitrådning används ofta i moderna datorprogram, vilket har många fördelar men kan också orsaka samtidighetsproblem. Bland olika felsökningsverktyg kan Java Pathfinder (JPF) upptäcka latenta fel hos multitrådade Javaprogram genom modellkontroll. Spårningsinformationen i form av text har låg läsbarhet, och tidigare försök att visualsera JPF-spår har visat begränsningar. För långsiktig utveckling har populära spårningsanalysplattformar som Trace Compass (TC) utvidgats för att anpassas till JPF-spår. I examensprojektet gör utvecklingen av JPF och TC det möjligt att analysera JPF-spår på TC med ett användargränssnitt baserat på visuella diagram. Utvecklingen löser den konceptuella skillnaden mellan verktygen och visualiserar spårdata på ett framgångsrikt sätt. Implementeringen bidrar med ett generiskt tillvägagångssätt för att analysera JPF spår med hjälp av visualisering.
Reger, Giles Matthew. "Automata based monitoring and mining of execution traces." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/automata-based-monitoring-and-mining-of-execution-traces(08eb0a62-53a3-4171-b4d2-36bfe450b9a7).html.
Zoor, Maysam. "Latency verification in execution traces of HW/SW partitioning model." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT037.
While many research works aim at defining new (formal) verification techniques to check for requirements in a model, understanding the root cause of a requirement violation is still an open issue for complex platforms built around software and hardware components. For instance, is the violation of a latency requirement due to unfavorable real-time scheduling, to contentions on buses, to the characteristics of functional algorithms or hardware components?This thesis introduces a Precise Latency ANalysis approach called PLAN. PLAN takes as input an instance of a HW/SW partitioning model, an execution trace, and a time constraint expressed in the following format: the latency between operator A and operator B should be less than a maximum latency value. First PLAN checks if the latency requirement is satisfied. If not, the main interest of PLAN is to provide the root cause of the non satisfaction by classifying execution transactions according to their impact on latency: obligatory transaction, transaction inducing a contention, transaction having no impact, etc.A first version of PLAN assumes an execution for which there is a unique execution of operator A and a unique execution of operator B. A second version of PLAN can compute, for each executed operator A, the corresponding operator B. For this, our approach relies on tainting techniques.The thesis formalizes the two versions of PLAN and illustrates them with toy examples. Then, we show how PLAN was integrated into a Model-Driven Framework (TTool). The two versions of PLAN are illustrated with two case studies taken from the H2020 AQUAS project. In particular, we show how tainting can efficiently handle the multiple and concurrent occurrences of the same operator
Emteu, Tchagou Serge Vladimir. "Réduction à la volée du volume des traces d'exécution pour l'analyse d'applications multimédia de systèmes embarqués." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM051/document.
The consumer electronics market is dominated by embedded systems due to their ever-increasing processing power and the large number of functionnalities they offer.To provide such features, architectures of embedded systems have increased in complexity: they rely on several heterogeneous processing units, and allow concurrent tasks execution.This complexity degrades the programmability of embedded system architectures and makes application execution difficult to understand on such systems.The most used approach for analyzing application execution on embedded systems consists in capturing execution traces (event sequences, such as system call invocations or context switch, generated during application execution).This approach is used in application testing, debugging or profiling.However in some use cases, execution traces generated can be very large, up to several hundreds of gigabytes.For example endurance tests, which are tests consisting in tracing execution of an application on an embedded system during long periods, from several hours to several days.Current tools and methods for analyzing execution traces are not designed to handle such amounts of data.We propose an approach for monitoring an application execution by analyzing traces on the fly in order to reduce the volume of recorded trace.Our approach is based on features of multimedia applications which contribute the most to the success of popular devices such as set-top boxes or smartphones.This approach consists in identifying automatically the suspicious periods of an application execution in order to record only the parts of traces which correspond to these periods.The proposed approach consists of two steps: a learning step which discovers regular behaviors of an application from its execution trace, and an anomaly detection step which identifies behaviors deviating from the regular ones.The many experiments, performed on synthetic and real-life datasets, show that our approach reduces the trace size by an order of magnitude while maintaining a good performance in detecting suspicious behaviors
Hamou-Lhadj, Abdelwahab. "Techniques to simplify the analysis of execution traces for program comprehension." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/29296.
Rose, Annica Elizabeth. "An Analysis of Investor Trading Behaviour and Its Impact on Trade Execution, Market Quality and Stock Returns." Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/9897.
Vigouroux, Xavier. "Analyse distribuée de traces d'exécution de programmes parallèles." Lyon, École normale supérieure (sciences), 1996. http://www.theses.fr/1996ENSL0016.
Taqi, Alawi. "A qualitative analysis of the current and future leadership development needs of third-line leaders in the oil and gas sector in Kuwait." Thesis, University of Stirling, 2016. http://hdl.handle.net/1893/24788.
Mallangi, Siva Sai Reddy. "Low-Power Policies Based on DVFS for the MUSEIC v2 System-on-Chip." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229443.
Nuförtiden så har multifunktionella bärbara hälsoenheter fått en betydande roll. Dessa enheter drivs vanligtvis av batterier och är därför begränsade av batteritiden (från ett par timmar till ett par veckor beroende på tillämpningen). På senaste tiden har det framkommit att dessa enheter som används vid en fast spänning och frekvens kan användas vid flera spänningar och frekvenser. Genom att byta till lägre spänning och frekvens på grund av effektbehov så kan enheterna få enorma fördelar när det kommer till energibesparing. Dynamisk skalning av spänning och frekvens-tekniker (såkallad Dynamic Voltage and Frequency Scaling, DVFS) har visat sig vara användbara i detta sammanhang för en effektiv avvägning mellan energi och beteende. Hos Imec så använder sig bärbara enheter av den internt utvecklade MUSEIC v2 (Multi Sensor Integrated circuit version 2.0). Systemet är optimerat för effektiv och korrekt insamling, bearbetning och överföring av data från flera (hälso) sensorer. MUSEIC v2 har begränsad möjlighet att styra spänningen och frekvensen dynamiskt. I detta examensarbete undersöker vi hur traditionella DVFS-tekniker kan appliceras på MUSEIC v2. Experiment utfördes för att ta reda på de optimala effektlägena och för att effektivt kunna styra och även skala upp matningsspänningen och frekvensen. Eftersom att ”overhead” skapades vid växling av spänning och frekvens gjordes också en övergångsanalys. Realtidsoch icke-realtidskalkyler genomfördes baserat på dessa tekniker och resultaten sammanställdes och analyserades. I denna process granskades flera toppmoderna schemaläggningsalgoritmer och skalningstekniker för att hitta en lämplig teknik. Genom att använda vår föreslagna skalningsteknikimplementering har vi uppnått 86,95% effektreduktion i jämförelse med det konventionella sättet att MUSEIC v2-chipets processor arbetar med en fast spänning och frekvens. Tekniker som inkluderar lätt sömn och djupt sömnläge studerades och implementerades, vilket testade systemets förmåga att tillgodose DPM-tekniker (Dynamic Power Management) som kan uppnå ännu större fördelar. En ny metod för att genomföra den djupa sömnmekanismen föreslogs också och enligt erhållna resultat så kan den ge upp till 71,54% lägre energiförbrukning jämfört med det traditionella sättet att implementera djupt sömnläge.
"Supporting Source Code Feature Analysis Using Execution Trace Mining." Thesis, 2013. http://hdl.handle.net/10388/ETD-2013-10-1266.
Books on the topic "Execution trace analysis":
Company, John T. Boyd. Executive summary, independent analysis, 21 closure review collieries British Coal Corporation United Kingdom. London: HMSO, 1993.
Aborisade, Femi. Nigeria: Freedom of association and the Trade Unions Act : a critical analysis : includes appraisal of the Executive Bill to Amend Trade Unions Act, 2004. Ibadan: Centre for Labour Studies (CLS), 2004.
Ontario. Dispute settlement mechanisms: An analysis of the dispute settlement provisions of the Canada-U.S. Free Trade Agreement preliminary transcript : executive summary, November 4, 1987. [Toronto, Ont.]: Govt. of Ontario, 1987.
Consultants, Spectrum Strategy, and Great Britain. Department of Trade and Industry., eds. Development of the information society: An international analysis : executive summary : based on a report by Spectrum Strategy Consultants for the Department of Trade and Industry. London: Department of Trade and Industry, 1996.
Goodman, Seymour. Executive briefing: An examination of high-performance computing export control policy in the 1990s. Los Alamitos, Calif: IEEE Computer Society Press, 1996.
United States. General Accounting Office., ed. Financial management: Analysis of DOD's first Biennial Financial Management Improvement Plan : report to Congressional committees. Washington, D.C: The Office, 1999.
Office, General Accounting. Financial management: Analysis of operating cash balance of the Defense Logistics Agency's stock fund : report to the chairman, Subcommittee on Defense, House Committee on Appropriations, House of Representatives. Washington, D.C: The Office, 1990.
Shadlen, Kenneth C. Coalitional Clash, Export Mobilization, and Executive Agency. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199593903.003.0005.
Moseley, Mason W. Uneven Democracy and Contentious Politics. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190694005.003.0007.
Eizenstat, Stuart E., and Marney L. Cheek. Executive Reports: Legal Analysis of the Bipartisan Trade Promotion Authority Act of 2002 - The Over-Arching Issues You Need to Know (Executive Reports). Aspatore Books, 2006.
Book chapters on the topic "Execution trace analysis":
Khoury, Raphaël, Sylvain Hallé, and Omar Waldmann. "Execution Trace Analysis Using LTL-FO $$^+$$." In Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 356–62. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47169-3_26.
Huang, Zunchen, and Chao Wang. "Symbolic Predictive Cache Analysis for Out-of-Order Execution." In Fundamental Approaches to Software Engineering, 163–83. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99429-7_10.
Al Haider, Newres, Benoit Gaudin, and John Murphy. "Execution Trace Exploration and Analysis Using Ontologies." In Runtime Verification, 412–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29860-8_33.
Lima, Leonardo, Andrei Herasimau, Martin Raszyk, Dmitriy Traytel, and Simon Yuan. "Explainable Online Monitoring of Metric Temporal Logic." In Tools and Algorithms for the Construction and Analysis of Systems, 473–91. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30820-8_28.
Beutner, Raven, and Bernd Finkbeiner. "AutoHyper: Explicit-State Model Checking for HyperLTL." In Tools and Algorithms for the Construction and Analysis of Systems, 145–63. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30823-9_8.
Wang, Wubing, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, and Zhiqiang Lin. "Specularizer : Detecting Speculative Execution Attacks via Performance Tracing." In Detection of Intrusions and Malware, and Vulnerability Assessment, 151–72. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80825-9_8.
Beutner, Raven, and Bernd Finkbeiner. "Software Verification of Hyperproperties Beyond k-Safety." In Computer Aided Verification, 341–62. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13185-1_17.
Beutner, Raven. "Automated Software Verification of Hyperliveness." In Tools and Algorithms for the Construction and Analysis of Systems, 196–216. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57249-4_10.
Loose, Nils, Felix Mächtle, Florian Sieck, and Thomas Eisenbarth. "SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution)." In Tools and Algorithms for the Construction and Analysis of Systems, 399–405. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57256-2_28.
Schuster, Daniel, Lukas Schade, Sebastiaan J. van Zelst, and Wil M. P. van der Aalst. "Visualizing Trace Variants from Partially Ordered Event Data." In Lecture Notes in Business Information Processing, 34–46. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98581-3_3.
Conference papers on the topic "Execution trace analysis":
Bohnet, Johannes, Martin Koeleman, and Juergen Doellner. "Visualizing massively pruned execution traces to facilitate trace exploration." In 2009 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT). IEEE, 2009. http://dx.doi.org/10.1109/vissof.2009.5336416.
Pekarek, Daniel, and Hanspeter Mössenböck. "trcview: Interactive Architecture Agnostic Execution Trace Analysis." In MPLR '20: 17th International Conference on Managed Programming Languages and Runtimes. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3426182.3426190.
Alouneh, Sahel, Sa'ed Abed, Bassam Jamil Mohd, and Ahmad Al-Khasawneh. "Relational database approach for execution trace analysis." In 2012 International Conference on Computer, Information and Telecommunication Systems (CITS). IEEE, 2012. http://dx.doi.org/10.1109/cits.2012.6220394.
Abualese, Hasan, Putra Sumari, Thamer Al-Rousan, and Mohammad Rasmi Al-Mousa. "Utility classes detection metrics for execution trace analysis." In 2017 8th International Conference on Information Technology (ICIT). IEEE, 2017. http://dx.doi.org/10.1109/icitech.2017.8080044.
Rezazadeh, Majid, Naser Ezzati-Jivan, Evan Galea, and Michel R. Dagenais. "Multi-Level Execution Trace Based Lock Contention Analysis." In 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2020. http://dx.doi.org/10.1109/issrew51248.2020.00068.
Mendes, Celso L. "Performance Prediction by Trace Transformation." In Simpósio Brasileiro de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 1993. http://dx.doi.org/10.5753/sbac-pad.1993.23023.
Li, Hongzhe, Taebeom Kim, Munkhbayar Bat-Erdene, and Heejo Lee. "Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution." In 2013 Eighth International Conference on Availability, Reliability and Security (ARES). IEEE, 2013. http://dx.doi.org/10.1109/ares.2013.59.
Zoor, Maysam, Ludovic Apvrille, and Renaud Pacalet. "Execution Trace Analysis for a Precise Understanding of Latency Violations." In 2021 ACM/IEEE 24th International Conference on Model Driven Engineering Languages and Systems (MODELS). IEEE, 2021. http://dx.doi.org/10.1109/models50736.2021.00021.
Toda, Tatsuya, Takashi Kobayashi, Noritoshi Atsumi, and Kiyoshi Agusa. "Grouping Objects for Execution Trace Analysis Based on Design Patterns." In 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2013. http://dx.doi.org/10.1109/apsec.2013.107.
Lu, Yue, Thomas Nolte, Iain Bate, and Liliana Cucu-Grosjean. "A trace-based statistical worst-case execution time analysis of component-based real-time embedded systems." In Factory Automation (ETFA 2011). IEEE, 2011. http://dx.doi.org/10.1109/etfa.2011.6059190.
Reports on the topic "Execution trace analysis":
Harkema, Marcel, Dick Quartel, Rob van der Mei, and Bart Gijsen. JPMT: A Java Performance Monitoring Tool. Centre for Telematics and Information Technology (CTIT), 2003. http://dx.doi.org/10.3990/1.5152400.
Amela, R., R. Badia, S. Böhm, R. Tosi, C. Soriano, and R. Rossi. D4.2 Profiling report of the partner’s tools, complete with performance suggestions. Scipedia, 2021. http://dx.doi.org/10.23967/exaqute.2021.2.023.
Álvarez, Carola, Leonardo Corral, José Martínez, and César Montiel. Project Completion Report Analysis: Implications for the Portfolio. Inter-American Development Bank, March 2021. http://dx.doi.org/10.18235/0003145.
WANG, Peng, Zhidong CAI, Qingying ZHAO, Wanting JIANG, Cong LIU, and Xing WANG. A Bayesian Network Meta-analysis of the Effect of Acute Exercise on Executive Function in Middle-aged and Senior People. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, December 2021. http://dx.doi.org/10.37766/inplasy2021.12.0086.
Mueller, Bernardo, Carlos Pereira, Lee J. Alston, and Marcus André Melo. Political Institutions, Policymaking Processes and Policy Outcomes in Brazil. Inter-American Development Bank, March 2006. http://dx.doi.org/10.18235/0011295.
Tarko, Andrew P., Mario A. Romero, Vamsi Krishna Bandaru, and Cristhian Lizarazo. TScan–Stationary LiDAR for Traffic and Safety Applications: Vehicle Interpretation and Tracking. Purdue University, 2022. http://dx.doi.org/10.5703/1288284317402.
Lu, Tianjun, Jian-yu Ke, Azure Fisher, Mahmoud Salari, Patricia Valladolid, and Fynnwin Prager. Should State Land in Southern California Be Allocated to Warehousing Goods or Housing People? Analyzing Transportation, Climate, and Unintended Consequences of Supply Chain Solutions. Mineta Transportation Institute, December 2023. http://dx.doi.org/10.31979/mti.2023.2231.
Dudoit, Alain. The urgency of the first link: Canada’s supply chain at breaking point, a national security issue. CIRANO, July 2023. http://dx.doi.org/10.54932/cxwf7311.
Dudoit, Alain. European common data spaces: a structuring initiative that is both necessary and adaptable to Canada. CIRANO, November 2023. http://dx.doi.org/10.54932/skhp9567.
Financial Stability Report - September 2015. Banco de la República, August 2021. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2015.