Gotowa bibliografia na temat „Analyse de la trace d'exécution”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Analyse de la trace d'exécution”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Analyse de la trace d'exécution"
Moisan, Pierre. "Technique contractuelle et gestion des risques dans les contrats internationaux : les cas de force majeure et d'imprévision". Les Cahiers de droit 35, nr 2 (12.04.2005): 281–334. http://dx.doi.org/10.7202/043281ar.
Pełny tekst źródłaNélisse, Claude, i Isabelle Uribé. "Analyse des évaluations médicales et psychosociales requises par la nouvelle Loi sur le Curateur public". Santé mentale au Québec 17, nr 2 (17.06.2008): 265–83. http://dx.doi.org/10.7202/502081ar.
Pełny tekst źródłaUmamahewari, E., Krishnaveni S i Xiao-Zhi Gao. "Trace Crawler". International Journal of Engineering & Technology 7, nr 4.10 (2.10.2018): 371. http://dx.doi.org/10.14419/ijet.v7i4.10.20939.
Pełny tekst źródłaCourts, Cornelius. "Forensische RNA-Analyse–Möglichkeiten und Perspektiven". BIOspektrum 30, nr 3 (maj 2024): 277–81. http://dx.doi.org/10.1007/s12268-024-2178-x.
Pełny tekst źródłaAumeistere, Līva, Alīna Beluško i Inga Ciproviča. "Assessment of Heavy Metals and Trace Elements in the Human Milk of Women Living in Latvia and an Evaluation of Influencing Factors". Nutrients 16, nr 11 (22.05.2024): 1568. http://dx.doi.org/10.3390/nu16111568.
Pełny tekst źródłaBen Amor, Leïla. "Télévision et intégration. Remarques préliminaires sur le rôle joué par la télévision dans les processus d'intégration nationale au Mexique". Revista Trace, nr 40 (5.09.2018): 26. http://dx.doi.org/10.22134/trace.40.2001.543.
Pełny tekst źródłaPappalardo, Gelsomina. "ACTRIS Aerosol, Clouds and Trace Gases Research Infrastructure". EPJ Web of Conferences 176 (2018): 09004. http://dx.doi.org/10.1051/epjconf/201817609004.
Pełny tekst źródłaFoulard, Camille. "Sur les traces d’un mexicaniste français, constitution et analyse du fonds François Chevalier". Revista Trace, nr 49 (23.07.2018): 80. http://dx.doi.org/10.22134/trace.49.2006.472.
Pełny tekst źródłaGürünlüoğlu, Hatice, i Gamze Erdoğdu. "Voltammetric Detection of Trace Elements in Various Biological Matrices". Sensor Letters 18, nr 10 (1.10.2020): 750–54. http://dx.doi.org/10.1166/sl.2020.4273.
Pełny tekst źródłaIbrahim, Idris Skloul, Peter J. B. King i Hans-Wolfgang Loidl. "NsGTFA: A GUI Tool to Easily Measure Network Performance through the Ns2 Trace File". Journal of Intelligent Systems 24, nr 4 (1.12.2015): 467–77. http://dx.doi.org/10.1515/jisys-2014-0153.
Pełny tekst źródłaRozprawy doktorskie na temat "Analyse de la trace d'exécution"
Vigouroux, Xavier. "Analyse distribuée de traces d'exécution de programmes parallèles". Lyon, École normale supérieure (sciences), 1996. http://www.theses.fr/1996ENSL0016.
Pełny tekst źródłaAmiar, Azzeddine. "Aide à l'Analyse de Traces d'Exécution dans le Contexte des Microcontrôleurs". Phd thesis, Université de Grenoble, 2013. http://tel.archives-ouvertes.fr/tel-00978227.
Pełny tekst źródłaDosimont, Damien. "Agrégation spatiotemporelle pour la visualisation de traces d'exécution". Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM075/document.
Pełny tekst źródłaTrace visualization techniques are commonly used by developers to understand, debug, and optimize their applications.Most of the analysis tools contain spatiotemporal representations, which is composed of a time line and the resources involved in the application execution. These techniques enable to link the dynamic of the application to its structure or its topology.However, they suffer from scalability issues and are incapable of providing overviews for the analysis of huge traces that have at least several Gigabytes and contain over a million of events. This is caused by screen size constraints, performance that is required for a efficient interaction, and analyst perceptive and cognitive limitations. Indeed, overviews are necessary to provide an entry point to the analysis, as recommended by Shneiderman's emph{mantra} - Overview first, zoom and filter, then details-on-demand -, a guideline that helps to design a visual analysis method.To face this situation, we elaborate in this thesis several scalable analysis methods based on visualization. They represent the application behavior both over the temporal and spatiotemporal dimensions, and integrate all the steps of Shneiderman's mantra, in particular by providing the analyst with a synthetic view of the trace.These methods are based on an aggregation method that reduces the representation complexity while keeping the maximum amount of information. Both measures are expressed using information theory measures. We determine which parts of the system to aggregate by satisfying a trade-off between these measures; their respective weights are adjusted by the user in order to choose a level of details. Solving this trade off enables to show the behavioral heterogeneity of the entities that compose the analyzed system. This helps to find anomalies in embedded multimedia applications and in parallel applications running on a computing grid.We have implemented these techniques into Ocelotl, an analysis tool developed during this thesis. We designed it to be capable to analyze traces containing up to several billions of events. Ocelotl also proposes effective interactions to fit with a top-down analysis strategy, like synchronizing our aggregated view with more detailed representations, in order to find the sources of the anomalies
Emteu, Tchagou Serge Vladimir. "Réduction à la volée du volume des traces d'exécution pour l'analyse d'applications multimédia de systèmes embarqués". Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM051/document.
Pełny tekst źródłaThe consumer electronics market is dominated by embedded systems due to their ever-increasing processing power and the large number of functionnalities they offer.To provide such features, architectures of embedded systems have increased in complexity: they rely on several heterogeneous processing units, and allow concurrent tasks execution.This complexity degrades the programmability of embedded system architectures and makes application execution difficult to understand on such systems.The most used approach for analyzing application execution on embedded systems consists in capturing execution traces (event sequences, such as system call invocations or context switch, generated during application execution).This approach is used in application testing, debugging or profiling.However in some use cases, execution traces generated can be very large, up to several hundreds of gigabytes.For example endurance tests, which are tests consisting in tracing execution of an application on an embedded system during long periods, from several hours to several days.Current tools and methods for analyzing execution traces are not designed to handle such amounts of data.We propose an approach for monitoring an application execution by analyzing traces on the fly in order to reduce the volume of recorded trace.Our approach is based on features of multimedia applications which contribute the most to the success of popular devices such as set-top boxes or smartphones.This approach consists in identifying automatically the suspicious periods of an application execution in order to record only the parts of traces which correspond to these periods.The proposed approach consists of two steps: a learning step which discovers regular behaviors of an application from its execution trace, and an anomaly detection step which identifies behaviors deviating from the regular ones.The many experiments, performed on synthetic and real-life datasets, show that our approach reduces the trace size by an order of magnitude while maintaining a good performance in detecting suspicious behaviors
Zoor, Maysam. "Latency verification in execution traces of HW/SW partitioning model". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT037.
Pełny tekst źródłaWhile many research works aim at defining new (formal) verification techniques to check for requirements in a model, understanding the root cause of a requirement violation is still an open issue for complex platforms built around software and hardware components. For instance, is the violation of a latency requirement due to unfavorable real-time scheduling, to contentions on buses, to the characteristics of functional algorithms or hardware components?This thesis introduces a Precise Latency ANalysis approach called PLAN. PLAN takes as input an instance of a HW/SW partitioning model, an execution trace, and a time constraint expressed in the following format: the latency between operator A and operator B should be less than a maximum latency value. First PLAN checks if the latency requirement is satisfied. If not, the main interest of PLAN is to provide the root cause of the non satisfaction by classifying execution transactions according to their impact on latency: obligatory transaction, transaction inducing a contention, transaction having no impact, etc.A first version of PLAN assumes an execution for which there is a unique execution of operator A and a unique execution of operator B. A second version of PLAN can compute, for each executed operator A, the corresponding operator B. For this, our approach relies on tainting techniques.The thesis formalizes the two versions of PLAN and illustrates them with toy examples. Then, we show how PLAN was integrated into a Model-Driven Framework (TTool). The two versions of PLAN are illustrated with two case studies taken from the H2020 AQUAS project. In particular, we show how tainting can efficiently handle the multiple and concurrent occurrences of the same operator
Lesage, Benjamin. "Architecture multi-coeurs et temps d'exécution au pire cas". Phd thesis, Université Rennes 1, 2013. http://tel.archives-ouvertes.fr/tel-00870971.
Pełny tekst źródłaLopez, Cueva Patricia. "Debugging Embedded Multimedia Application Execution Traces through Periodic Pattern Mining". Phd thesis, Université de Grenoble, 2013. http://tel.archives-ouvertes.fr/tel-01006213.
Pełny tekst źródłaTouzeau, Valentin. "Analyse statique de caches LRU : complexité, analyse optimale, et applications au calcul de pire temps d'exécution et à la sécurité". Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM041.
Pełny tekst źródłaThe certification of real-time safety critical programs requires bounding their execution time.Due to the high impact of cache memories on memory access latency, modern Worst-Case Execution Time estimation tools include a cache analysis.The aim of this analysis is to statically predict if memory accesses result in a cache hit or a cache miss.This problem is undecidable in general, thus usual cache analyses perform some abstractions that lead to precision loss.One common assumption made to remove the source of undecidability is that all execution paths in the program are feasible.Making this hypothesis is reasonable because the safety of the analysis is preserved when adding spurious paths to the program model.However, classifying memory accesses as cache hits or misses is still hard in practice under this assumption, and efficient cache analysis usually involve additional approximations, again leading to precision loss.This thesis investigates the possibility of performing an optimally precise cache analysis under the common assumption that all execution paths in the program are feasible.We formally define the problems of classifying accesses as hits and misses, and prove that they are NP-hard or PSPACE-hard for common replacement policies (LRU, FIFO, NRU and PLRU).However, if these theoretical complexity results legitimate the use of additional abstraction, they do not preclude the existence of algorithms efficient in practice on industrial workloads.Because of the abstractions performed for efficiency reasons, cache analyses can usually classify accesses as Unknown in addition to Always-Hit (Must analysis) or Always-Miss (May analysis).Accesses classified as Unknown can lead to both a hit or a miss, depending on the program execution path followed.However, it can also be that they belong to one of the Always-Hit or Always-Miss category and that the cache analysis failed to classify them correctly because of a coarse approximation.We thus designed a new analysis for LRU instruction that is able to soundly classify some accesses into a new category, called Definitely Unknown, that represents accesses that can lead to both a hit or a miss.For those accesses, one knows for sure that their classification does not result from a coarse approximation but is a consequence of the program structure and cache configuration.By doing so, we also reduce the set of accesses that are candidate for a refined classification using more powerful and more costly analyses.Our main contribution is an analysis that can perform an optimally precise analysis of LRU instruction caches.We use a method called block focusing that allows an analysis to scale by only analyzing one cache block at a time.We thus take advantage of the low number of candidates for refinement left by our Definitely Unknown analysis.This analysis produces an optimal classification of memory accesses at a reasonable cost (a few times the cost of the usual May and Must analyses).We evaluate the impact of our precise cache analysis on the pipeline analysis.Indeed, when the cache analysis is not able to classify an access as Always-Hit or Always-Miss, the pipeline analysis must consider both cases.By providing a more precise memory access classification, we thus reduce the state space explored by the pipeline analysis and hence the WCET analysis time.Aside from this application of precise cache analysis to WCET estimation, we investigate the possibility of using the Definitely Unknown analysis in the domain of security.Indeed, caches can be used as side-channel to extract some sensitive data from a program execution, and we propose a variation of our Definitely Unknown analysis to help a developer finding the source of some information leakage
Jahier, Erwan. "Analyse dynamique de programme : Mise en oeuvre automatisée d'analyseurs performants et spécifications de modèles d'exécution". Rennes, INSA, 2000. http://www.theses.fr/2000ISAR0009.
Pełny tekst źródłaSeveral studies show that most of the software production cost is spent during the maintenance phase. During that phase, to locate bugs, to optimize programs, or to add new functionalities, it is essential to understand programs, and in particular to understand their runtime behavior. Dynamic analysis tools such as debuggers, profilers, or monitors, are very useful in that respect. However, such tools are expensive to implement because: (1) it generally requires to modify the compiling system, which is tedious and not always possible; (2) the needs in dynamic analysis tools vary from one user to another, depending on its competence, on its experience of the programming system, and on its knowledge of the code to maintain; (3) such tools are generally difficult to reuse. It is therefore desirable that each user is able to specify easily the dynamic analyses he needs. Hence, we propose an architecture that eases dynamic analysis tools implementation. This architecture is based on: (1) a systematic instrumentation of the program which gives a detailed image of the execution, the trace; (2) a set of trace processing primitives that lets one analyse the trace efficiently. The resulting analysers have performance of the same order of magnitude that their equivalent implemented ``by hand'' by modifying the compiling system. They can be implemented by programmers without any knowledge of the compiling system. This architecture let them implement the tools they need, adapted to their level of comprehension of the code they are in charge to maintain. Furthermore, the modular structure of the proposed architecture should ease the analysers reuse. This work has been held within the context of the logical and functional programming language Mercury. However, the concepts we used do not depend on the programming paradigm. The trace on which we base the implementation of our dynamic analysis tools should reflect as much as possible the runtime behavior of programs. Therefore, we also propose a framework to specify execution traces. This framework is based on an operational semantics of the language to analyse. Such formal specifications of the trace let us experimentally validate tracers, and prove their correctness. This work have been held within the context of the logical programming language Prolog
Bourgade, Roman. "Analyse du temps d'exécution pire-cas de tâches temps-réel exécutées sur une architecture multi-cœurs". Phd thesis, Université Paul Sabatier - Toulouse III, 2012. http://tel.archives-ouvertes.fr/tel-00746073.
Pełny tekst źródłaKsiążki na temat "Analyse de la trace d'exécution"
Analyse de l'état d'exécution du budget général de l'État, exercice 2011 au 30 juin 2011. Bujumbura: Observatoire de l'action gouvernementale, 2011.
Znajdź pełny tekst źródłaKuttler, Wilhelm. Raum-zeitliche Analyse atmosphärischer Spurenstoffeinträge in Mitteleuropa. Paderborn: F. Schöningh, 1986.
Znajdź pełny tekst źródła1940-, Krull Ira S., i Eastern Analytical Symposium (1987 : New York, N.Y.), red. Trace metal analysis and speciation. Amsterdam: Elsevier, 1991.
Znajdź pełny tekst źródłaE, Prichard, MacKay G. M i Points J, red. Trace analysis: A structured approach to obtaining reliable results. Cambridge: published for the Laboratory of the Government Chemist by the Royal Society of Chemistry, 1996.
Znajdź pełny tekst źródłaF, Keefer Robert, i Sajwan Kenneth S, red. Trace elements in coal and coal combustion residues. Boca Raton: Lewis Publishers, 1993.
Znajdź pełny tekst źródłaJ, Statham P., red. Inorganic trace analysis: Philosophy and practice. Chichester: Wiley, 1993.
Znajdź pełny tekst źródłaLoconto, Paul R. Trace environmental quantitative analysis: Principles, techniques, and applications. Wyd. 2. Boca Raton, FL: Taylor & Francis/CRC Press, 2005.
Znajdź pełny tekst źródłagouvernementale, Observatoire de l'action. Analyse de l'état d'exécution du budget général de l'État, exercice 2012 au 30 juin 2012: Améliorer les dépenses de croissance et de lutte contre la pauvreté. Bujumbura: Observatoire de l'action gouvernementale (O.A.G.) asbl, 2012.
Znajdź pełny tekst źródłaMah, Ebenezer Paul. Aperçu sur la pratique des voies d'exécution au Cameroun: Les procédures et exploits élaborés au cours de l'exécution forcée des titres exécutoires analyse, commentaires et application. Yaoundé: Mah E.P., 2006.
Znajdź pełny tekst źródłaAnalyse de l'état d'exécution du budget général de l'État, exercice 2013 au 30 juin 2013: Des prévisions économiques et budgétaires impossibles à réaliser avant la fin de l'année 2013. Bujumbura: Observatoire de l'action gouvernementale, 2013.
Znajdź pełny tekst źródłaCzęści książek na temat "Analyse de la trace d'exécution"
Neele, Thomas, Antti Valmari i Tim A. C. Willemse. "The Inconsistent Labelling Problem of Stutter-Preserving Partial-Order Reduction". W Lecture Notes in Computer Science, 482–501. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45231-5_25.
Pełny tekst źródłaWubs-Mrozewicz, Justyna. "Maritime Networks and Premodern Conflict Management on Multiple Levels. The Example of Danzig and the Giese Family". W Atti delle «Settimane di Studi» e altri Convegni, 385–405. Florence: Firenze University Press, 2019. http://dx.doi.org/10.36253/978-88-6453-857-0.20.
Pełny tekst źródłaNiemann, Dennis, David Krogmann i Kerstin Martens. "Between Economics and Education: How International Organisations Changed the View on Education". W International Impacts on Social Policy, 189–200. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-86645-7_15.
Pełny tekst źródłaChaker, Sarah, i Axel Petri-Preis. "Musikvermittlung and Its Innovative Potential". W Forum Musikvermittlung - Perspektiven aus Forschung und Praxis, 11–38. Bielefeld, Germany: transcript Verlag, 2022. http://dx.doi.org/10.14361/9783839456811-003.
Pełny tekst źródłaArosio, Laura. "What People Leave Behind Online: Digital Traces and Web-Mediated Documents for Social Research". W Frontiers in Sociology and Social Research, 311–23. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11756-5_20.
Pełny tekst źródłaErdal, Marta Bivand, Lubomiła Korzeniewska i Davide Bertelli. "Becoming Destination(s)? Complex Migration Trajectories, Transnational Lifeworlds and Migration Decisions". W IMISCOE Research Series, 23–43. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12503-4_2.
Pełny tekst źródłaLarsen, Henrik Gutzon, i Carl Marklund. "Sublimated Expansionism? Living Space Ideas in Nordic Small-State Geopolitics". W Socio-Spatial Theory in Nordic Geography, 15–30. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04234-8_2.
Pełny tekst źródłaHackney, Jeffrey. "More than a trace of the old philosophy". W The Classification of Obligations, 123–56. Oxford University PressOxford, 1997. http://dx.doi.org/10.1093/oso/9780198265986.003.0006.
Pełny tekst źródłaRocha, Carolina. "Don Segundo Sombra". W Argentine Cinema and National Identity (1966-1976). Liverpool University Press, 2018. http://dx.doi.org/10.5949/liverpool/9781786940544.003.0007.
Pełny tekst źródłaWeiss, Tobias. "The Campaign for Nuclear Power in Japan before and after 2011". W Civil Society and the State in Democratic East Asia. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2020. http://dx.doi.org/10.5117/9789463723930_ch04.
Pełny tekst źródłaStreszczenia konferencji na temat "Analyse de la trace d'exécution"
Hedde, Damien, i Frederic Petrot. "A non intrusive simulation-based trace system to analyse Multiprocessor Systems-on-Chip software". W 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). IEEE, 2011. http://dx.doi.org/10.1109/rsp.2011.5929983.
Pełny tekst źródłaIsnard, H., J. Moureau, S. Quidelleur, F. Guegen, M. Granet, G. Favre, A. Nonell i F. Chartier. "Attractive approach to analyse trace and ultra-trace elements on transmutation targets by direct separation of isobaric interferences using collision reaction cell implanted on MC-ICPMS". W 2009 1st International Conference on Advancements in Nuclear Instrumentation, Measurement Methods and their Applications (ANIMMA). IEEE, 2009. http://dx.doi.org/10.1109/animma.2009.5503707.
Pełny tekst źródłaMoeckli, M., i M. W. Sigrist. "Trace-Gas Monitoring with a Mobile CO2-Laser Photoacoustic System". W The European Conference on Lasers and Electro-Optics. Washington, D.C.: Optica Publishing Group, 1996. http://dx.doi.org/10.1364/cleo_europe.1996.cwd3.
Pełny tekst źródłaGrossmann, K. U., i D. Offermann. "CRyogenic Infrared Spectrometers and Telescopes for the Atmosphere - CRISTA". W Optical Remote Sensing of the Atmosphere. Washington, D.C.: Optica Publishing Group, 1991. http://dx.doi.org/10.1364/orsa.1991.oma4.
Pełny tekst źródłaLi, Haoxiang, Bin Du, Wei Zheng, Qiuhao Wang, Huaqiang Yin, Xuedong He, Hua Fan i Tao Ma. "Corrosion Behavior of Superalloys in High Temperature Gas Cooled Reactor in Impure Helium With Corrosion Time". W 2021 28th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/icone28-64351.
Pełny tekst źródłaVasanthakumar, Parthasarathy. "Computation of Aerodynamic Damping for Flutter Analysis of a Transonic Fan". W ASME 2011 Turbo Expo: Turbine Technical Conference and Exposition. ASMEDC, 2011. http://dx.doi.org/10.1115/gt2011-46597.
Pełny tekst źródłaVasanthakumar, Parthasarathy, i Paul-Benjamin Ebel. "Forced Response Analysis of a Transonic Fan". W ASME Turbo Expo 2012: Turbine Technical Conference and Exposition. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/gt2012-69867.
Pełny tekst źródłaManuel Figueiredo, Carlos, Ana Rafaela Diogo i Joana André Leite. "Adapting Jane Austen to the screen: fashion and costume in Autumn de Wilde’s movie "Emma"". W 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001538.
Pełny tekst źródłaRaporty organizacyjne na temat "Analyse de la trace d'exécution"
Anderson, Sharron, Antony Lloyd, Malcom Baxter, Michael Walls i Victoria Bailey-Horne. Turmeric survey – Final report. Food Standards Agency, lipiec 2022. http://dx.doi.org/10.46756/sci.fsa.ojv940.
Pełny tekst źródłaRogers, Amanda. Creative Expression and Contemporary Arts Making Among Young Cambodians. Swansea University, maj 2021. http://dx.doi.org/10.23889/sureport.56822.
Pełny tekst źródła