Gotowa bibliografia na temat „Execution trace analysis”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Execution trace analysis”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Execution trace analysis"
LANGEVINE, LUDOVIC, i MIREILLE DUCASSÉ. "Design and implementation of a tracer driver: Easy and efficient dynamic analyses of constraint logic programs". Theory and Practice of Logic Programming 8, nr 5-6 (listopad 2008): 581–609. http://dx.doi.org/10.1017/s147106840800344x.
Pełny tekst źródłaJAHIER, ERWAN, i MIREILLE DUCASSÉ. "Generic program monitoring by trace analysis". Theory and Practice of Logic Programming 2, nr 4-5 (lipiec 2002): 611–43. http://dx.doi.org/10.1017/s1471068402001461.
Pełny tekst źródłaSimmons, Sharon, Dennis Edwards i Phil Kearns. "Communication Analysis of Distributed Programs". Scientific Programming 14, nr 2 (2006): 151–70. http://dx.doi.org/10.1155/2006/763568.
Pełny tekst źródłaCôté, Mathieu, i Michel R. Dagenais. "Problem Detection in Real-Time Systems by Trace Analysis". Advances in Computer Engineering 2016 (6.01.2016): 1–12. http://dx.doi.org/10.1155/2016/9467181.
Pełny tekst źródłaAl-Rousan, Thamer, i Hasan Abualese. "A new technique for understanding large-scale software systems". Telfor Journal 12, nr 1 (2020): 34–39. http://dx.doi.org/10.5937/telfor2001034a.
Pełny tekst źródłaRyan, Gabriel, Burcu Cetin, Yongwhan Lim i Suman Jana. "Accurate Data Race Prediction in the Linux Kernel through Sparse Fourier Learning". Proceedings of the ACM on Programming Languages 8, OOPSLA1 (29.04.2024): 810–32. http://dx.doi.org/10.1145/3649840.
Pełny tekst źródłaMa, Ming Yang, Yi Qiang Wang, Wei Luo, Er Hu Zhang, Chao Fu i Li Xue Wang. "Fault Localization of CNC Software Based on Searching in Divided Execution Trace". Applied Mechanics and Materials 101-102 (wrzesień 2011): 876–79. http://dx.doi.org/10.4028/www.scientific.net/amm.101-102.876.
Pełny tekst źródłaCornelissen, Bas, Andy Zaidman, Danny Holten, Leon Moonen, Arie van Deursen i Jarke J. van Wijk. "Execution trace analysis through massive sequence and circular bundle views". Journal of Systems and Software 81, nr 12 (grudzień 2008): 2252–68. http://dx.doi.org/10.1016/j.jss.2008.02.068.
Pełny tekst źródłaGamino del Río, Iván, Agustín Martínez Hellín, Óscar R. Polo, Miguel Jiménez Arribas, Pablo Parra, Antonio da Silva, Jonatan Sánchez i Sebastián Sánchez. "A RISC-V Processor Design for Transparent Tracing". Electronics 9, nr 11 (7.11.2020): 1873. http://dx.doi.org/10.3390/electronics9111873.
Pełny tekst źródłaKabamba, Herve M., Matthew Khouzam i Michel R. Dagenais. "Vnode: Low-Overhead Transparent Tracing of Node.js-Based Microservice Architectures". Future Internet 16, nr 1 (29.12.2023): 13. http://dx.doi.org/10.3390/fi16010013.
Pełny tekst źródłaRozprawy doktorskie na temat "Execution trace analysis"
Zhou, Yang. "Execution Trace Visualization for Java Pathfinder using Trace Compass". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-286313.
Pełny tekst źródłaMultitrådning används ofta i moderna datorprogram, vilket har många fördelar men kan också orsaka samtidighetsproblem. Bland olika felsökningsverktyg kan Java Pathfinder (JPF) upptäcka latenta fel hos multitrådade Javaprogram genom modellkontroll. Spårningsinformationen i form av text har låg läsbarhet, och tidigare försök att visualsera JPF-spår har visat begränsningar. För långsiktig utveckling har populära spårningsanalysplattformar som Trace Compass (TC) utvidgats för att anpassas till JPF-spår. I examensprojektet gör utvecklingen av JPF och TC det möjligt att analysera JPF-spår på TC med ett användargränssnitt baserat på visuella diagram. Utvecklingen löser den konceptuella skillnaden mellan verktygen och visualiserar spårdata på ett framgångsrikt sätt. Implementeringen bidrar med ett generiskt tillvägagångssätt för att analysera JPF spår med hjälp av visualisering.
Reger, Giles Matthew. "Automata based monitoring and mining of execution traces". Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/automata-based-monitoring-and-mining-of-execution-traces(08eb0a62-53a3-4171-b4d2-36bfe450b9a7).html.
Pełny tekst źródłaZoor, Maysam. "Latency verification in execution traces of HW/SW partitioning model". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT037.
Pełny tekst źródłaWhile many research works aim at defining new (formal) verification techniques to check for requirements in a model, understanding the root cause of a requirement violation is still an open issue for complex platforms built around software and hardware components. For instance, is the violation of a latency requirement due to unfavorable real-time scheduling, to contentions on buses, to the characteristics of functional algorithms or hardware components?This thesis introduces a Precise Latency ANalysis approach called PLAN. PLAN takes as input an instance of a HW/SW partitioning model, an execution trace, and a time constraint expressed in the following format: the latency between operator A and operator B should be less than a maximum latency value. First PLAN checks if the latency requirement is satisfied. If not, the main interest of PLAN is to provide the root cause of the non satisfaction by classifying execution transactions according to their impact on latency: obligatory transaction, transaction inducing a contention, transaction having no impact, etc.A first version of PLAN assumes an execution for which there is a unique execution of operator A and a unique execution of operator B. A second version of PLAN can compute, for each executed operator A, the corresponding operator B. For this, our approach relies on tainting techniques.The thesis formalizes the two versions of PLAN and illustrates them with toy examples. Then, we show how PLAN was integrated into a Model-Driven Framework (TTool). The two versions of PLAN are illustrated with two case studies taken from the H2020 AQUAS project. In particular, we show how tainting can efficiently handle the multiple and concurrent occurrences of the same operator
Emteu, Tchagou Serge Vladimir. "Réduction à la volée du volume des traces d'exécution pour l'analyse d'applications multimédia de systèmes embarqués". Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM051/document.
Pełny tekst źródłaThe consumer electronics market is dominated by embedded systems due to their ever-increasing processing power and the large number of functionnalities they offer.To provide such features, architectures of embedded systems have increased in complexity: they rely on several heterogeneous processing units, and allow concurrent tasks execution.This complexity degrades the programmability of embedded system architectures and makes application execution difficult to understand on such systems.The most used approach for analyzing application execution on embedded systems consists in capturing execution traces (event sequences, such as system call invocations or context switch, generated during application execution).This approach is used in application testing, debugging or profiling.However in some use cases, execution traces generated can be very large, up to several hundreds of gigabytes.For example endurance tests, which are tests consisting in tracing execution of an application on an embedded system during long periods, from several hours to several days.Current tools and methods for analyzing execution traces are not designed to handle such amounts of data.We propose an approach for monitoring an application execution by analyzing traces on the fly in order to reduce the volume of recorded trace.Our approach is based on features of multimedia applications which contribute the most to the success of popular devices such as set-top boxes or smartphones.This approach consists in identifying automatically the suspicious periods of an application execution in order to record only the parts of traces which correspond to these periods.The proposed approach consists of two steps: a learning step which discovers regular behaviors of an application from its execution trace, and an anomaly detection step which identifies behaviors deviating from the regular ones.The many experiments, performed on synthetic and real-life datasets, show that our approach reduces the trace size by an order of magnitude while maintaining a good performance in detecting suspicious behaviors
Hamou-Lhadj, Abdelwahab. "Techniques to simplify the analysis of execution traces for program comprehension". Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/29296.
Pełny tekst źródłaRose, Annica Elizabeth. "An Analysis of Investor Trading Behaviour and Its Impact on Trade Execution, Market Quality and Stock Returns". Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/9897.
Pełny tekst źródłaVigouroux, Xavier. "Analyse distribuée de traces d'exécution de programmes parallèles". Lyon, École normale supérieure (sciences), 1996. http://www.theses.fr/1996ENSL0016.
Pełny tekst źródłaTaqi, Alawi. "A qualitative analysis of the current and future leadership development needs of third-line leaders in the oil and gas sector in Kuwait". Thesis, University of Stirling, 2016. http://hdl.handle.net/1893/24788.
Pełny tekst źródłaMallangi, Siva Sai Reddy. "Low-Power Policies Based on DVFS for the MUSEIC v2 System-on-Chip". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229443.
Pełny tekst źródłaNuförtiden så har multifunktionella bärbara hälsoenheter fått en betydande roll. Dessa enheter drivs vanligtvis av batterier och är därför begränsade av batteritiden (från ett par timmar till ett par veckor beroende på tillämpningen). På senaste tiden har det framkommit att dessa enheter som används vid en fast spänning och frekvens kan användas vid flera spänningar och frekvenser. Genom att byta till lägre spänning och frekvens på grund av effektbehov så kan enheterna få enorma fördelar när det kommer till energibesparing. Dynamisk skalning av spänning och frekvens-tekniker (såkallad Dynamic Voltage and Frequency Scaling, DVFS) har visat sig vara användbara i detta sammanhang för en effektiv avvägning mellan energi och beteende. Hos Imec så använder sig bärbara enheter av den internt utvecklade MUSEIC v2 (Multi Sensor Integrated circuit version 2.0). Systemet är optimerat för effektiv och korrekt insamling, bearbetning och överföring av data från flera (hälso) sensorer. MUSEIC v2 har begränsad möjlighet att styra spänningen och frekvensen dynamiskt. I detta examensarbete undersöker vi hur traditionella DVFS-tekniker kan appliceras på MUSEIC v2. Experiment utfördes för att ta reda på de optimala effektlägena och för att effektivt kunna styra och även skala upp matningsspänningen och frekvensen. Eftersom att ”overhead” skapades vid växling av spänning och frekvens gjordes också en övergångsanalys. Realtidsoch icke-realtidskalkyler genomfördes baserat på dessa tekniker och resultaten sammanställdes och analyserades. I denna process granskades flera toppmoderna schemaläggningsalgoritmer och skalningstekniker för att hitta en lämplig teknik. Genom att använda vår föreslagna skalningsteknikimplementering har vi uppnått 86,95% effektreduktion i jämförelse med det konventionella sättet att MUSEIC v2-chipets processor arbetar med en fast spänning och frekvens. Tekniker som inkluderar lätt sömn och djupt sömnläge studerades och implementerades, vilket testade systemets förmåga att tillgodose DPM-tekniker (Dynamic Power Management) som kan uppnå ännu större fördelar. En ny metod för att genomföra den djupa sömnmekanismen föreslogs också och enligt erhållna resultat så kan den ge upp till 71,54% lägre energiförbrukning jämfört med det traditionella sättet att implementera djupt sömnläge.
"Supporting Source Code Feature Analysis Using Execution Trace Mining". Thesis, 2013. http://hdl.handle.net/10388/ETD-2013-10-1266.
Pełny tekst źródłaKsiążki na temat "Execution trace analysis"
Company, John T. Boyd. Executive summary, independent analysis, 21 closure review collieries British Coal Corporation United Kingdom. London: HMSO, 1993.
Znajdź pełny tekst źródłaAborisade, Femi. Nigeria: Freedom of association and the Trade Unions Act : a critical analysis : includes appraisal of the Executive Bill to Amend Trade Unions Act, 2004. Ibadan: Centre for Labour Studies (CLS), 2004.
Znajdź pełny tekst źródłaPhilip, Slayton, i Quinn John, red. Dispute settlement mechanisms: An analysis of the dispute settlement provisions of the Canada-U.S. Free Trade Agreement preliminary transcript : executive summary, November 4, 1987. [Toronto, Ont.]: Govt. of Ontario, 1987.
Znajdź pełny tekst źródłaConsultants, Spectrum Strategy, i Great Britain. Department of Trade and Industry., red. Development of the information society: An international analysis : executive summary : based on a report by Spectrum Strategy Consultants for the Department of Trade and Industry. London: Department of Trade and Industry, 1996.
Znajdź pełny tekst źródłaGoodman, Seymour. Executive briefing: An examination of high-performance computing export control policy in the 1990s. Los Alamitos, Calif: IEEE Computer Society Press, 1996.
Znajdź pełny tekst źródłaUnited States. General Accounting Office., red. Financial management: Analysis of DOD's first Biennial Financial Management Improvement Plan : report to Congressional committees. Washington, D.C: The Office, 1999.
Znajdź pełny tekst źródłaOffice, General Accounting. Financial management: Analysis of operating cash balance of the Defense Logistics Agency's stock fund : report to the chairman, Subcommittee on Defense, House Committee on Appropriations, House of Representatives. Washington, D.C: The Office, 1990.
Znajdź pełny tekst źródłaShadlen, Kenneth C. Coalitional Clash, Export Mobilization, and Executive Agency. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199593903.003.0005.
Pełny tekst źródłaMoseley, Mason W. Uneven Democracy and Contentious Politics. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190694005.003.0007.
Pełny tekst źródłaEizenstat, Stuart E., i Marney L. Cheek. Executive Reports: Legal Analysis of the Bipartisan Trade Promotion Authority Act of 2002 - The Over-Arching Issues You Need to Know (Executive Reports). Aspatore Books, 2006.
Znajdź pełny tekst źródłaCzęści książek na temat "Execution trace analysis"
Khoury, Raphaël, Sylvain Hallé i Omar Waldmann. "Execution Trace Analysis Using LTL-FO $$^+$$". W Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 356–62. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47169-3_26.
Pełny tekst źródłaHuang, Zunchen, i Chao Wang. "Symbolic Predictive Cache Analysis for Out-of-Order Execution". W Fundamental Approaches to Software Engineering, 163–83. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99429-7_10.
Pełny tekst źródłaAl Haider, Newres, Benoit Gaudin i John Murphy. "Execution Trace Exploration and Analysis Using Ontologies". W Runtime Verification, 412–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29860-8_33.
Pełny tekst źródłaLima, Leonardo, Andrei Herasimau, Martin Raszyk, Dmitriy Traytel i Simon Yuan. "Explainable Online Monitoring of Metric Temporal Logic". W Tools and Algorithms for the Construction and Analysis of Systems, 473–91. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30820-8_28.
Pełny tekst źródłaBeutner, Raven, i Bernd Finkbeiner. "AutoHyper: Explicit-State Model Checking for HyperLTL". W Tools and Algorithms for the Construction and Analysis of Systems, 145–63. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30823-9_8.
Pełny tekst źródłaWang, Wubing, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang i Zhiqiang Lin. "Specularizer : Detecting Speculative Execution Attacks via Performance Tracing". W Detection of Intrusions and Malware, and Vulnerability Assessment, 151–72. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80825-9_8.
Pełny tekst źródłaBeutner, Raven, i Bernd Finkbeiner. "Software Verification of Hyperproperties Beyond k-Safety". W Computer Aided Verification, 341–62. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13185-1_17.
Pełny tekst źródłaBeutner, Raven. "Automated Software Verification of Hyperliveness". W Tools and Algorithms for the Construction and Analysis of Systems, 196–216. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57249-4_10.
Pełny tekst źródłaLoose, Nils, Felix Mächtle, Florian Sieck i Thomas Eisenbarth. "SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution)". W Tools and Algorithms for the Construction and Analysis of Systems, 399–405. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57256-2_28.
Pełny tekst źródłaSchuster, Daniel, Lukas Schade, Sebastiaan J. van Zelst i Wil M. P. van der Aalst. "Visualizing Trace Variants from Partially Ordered Event Data". W Lecture Notes in Business Information Processing, 34–46. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98581-3_3.
Pełny tekst źródłaStreszczenia konferencji na temat "Execution trace analysis"
Bohnet, Johannes, Martin Koeleman i Juergen Doellner. "Visualizing massively pruned execution traces to facilitate trace exploration". W 2009 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT). IEEE, 2009. http://dx.doi.org/10.1109/vissof.2009.5336416.
Pełny tekst źródłaPekarek, Daniel, i Hanspeter Mössenböck. "trcview: Interactive Architecture Agnostic Execution Trace Analysis". W MPLR '20: 17th International Conference on Managed Programming Languages and Runtimes. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3426182.3426190.
Pełny tekst źródłaAlouneh, Sahel, Sa'ed Abed, Bassam Jamil Mohd i Ahmad Al-Khasawneh. "Relational database approach for execution trace analysis". W 2012 International Conference on Computer, Information and Telecommunication Systems (CITS). IEEE, 2012. http://dx.doi.org/10.1109/cits.2012.6220394.
Pełny tekst źródłaAbualese, Hasan, Putra Sumari, Thamer Al-Rousan i Mohammad Rasmi Al-Mousa. "Utility classes detection metrics for execution trace analysis". W 2017 8th International Conference on Information Technology (ICIT). IEEE, 2017. http://dx.doi.org/10.1109/icitech.2017.8080044.
Pełny tekst źródłaRezazadeh, Majid, Naser Ezzati-Jivan, Evan Galea i Michel R. Dagenais. "Multi-Level Execution Trace Based Lock Contention Analysis". W 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2020. http://dx.doi.org/10.1109/issrew51248.2020.00068.
Pełny tekst źródłaMendes, Celso L. "Performance Prediction by Trace Transformation". W Simpósio Brasileiro de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 1993. http://dx.doi.org/10.5753/sbac-pad.1993.23023.
Pełny tekst źródłaLi, Hongzhe, Taebeom Kim, Munkhbayar Bat-Erdene i Heejo Lee. "Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution". W 2013 Eighth International Conference on Availability, Reliability and Security (ARES). IEEE, 2013. http://dx.doi.org/10.1109/ares.2013.59.
Pełny tekst źródłaZoor, Maysam, Ludovic Apvrille i Renaud Pacalet. "Execution Trace Analysis for a Precise Understanding of Latency Violations". W 2021 ACM/IEEE 24th International Conference on Model Driven Engineering Languages and Systems (MODELS). IEEE, 2021. http://dx.doi.org/10.1109/models50736.2021.00021.
Pełny tekst źródłaToda, Tatsuya, Takashi Kobayashi, Noritoshi Atsumi i Kiyoshi Agusa. "Grouping Objects for Execution Trace Analysis Based on Design Patterns". W 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2013. http://dx.doi.org/10.1109/apsec.2013.107.
Pełny tekst źródłaLu, Yue, Thomas Nolte, Iain Bate i Liliana Cucu-Grosjean. "A trace-based statistical worst-case execution time analysis of component-based real-time embedded systems". W Factory Automation (ETFA 2011). IEEE, 2011. http://dx.doi.org/10.1109/etfa.2011.6059190.
Pełny tekst źródłaRaporty organizacyjne na temat "Execution trace analysis"
Harkema, Marcel, Dick Quartel, Rob van der Mei i Bart Gijsen. JPMT: A Java Performance Monitoring Tool. Centre for Telematics and Information Technology (CTIT), 2003. http://dx.doi.org/10.3990/1.5152400.
Pełny tekst źródłaAmela, R., R. Badia, S. Böhm, R. Tosi, C. Soriano i R. Rossi. D4.2 Profiling report of the partner’s tools, complete with performance suggestions. Scipedia, 2021. http://dx.doi.org/10.23967/exaqute.2021.2.023.
Pełny tekst źródłaÁlvarez, Carola, Leonardo Corral, José Martínez i César Montiel. Project Completion Report Analysis: Implications for the Portfolio. Inter-American Development Bank, marzec 2021. http://dx.doi.org/10.18235/0003145.
Pełny tekst źródłaWANG, Peng, Zhidong CAI, Qingying ZHAO, Wanting JIANG, Cong LIU i Xing WANG. A Bayesian Network Meta-analysis of the Effect of Acute Exercise on Executive Function in Middle-aged and Senior People. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, grudzień 2021. http://dx.doi.org/10.37766/inplasy2021.12.0086.
Pełny tekst źródłaMueller, Bernardo, Carlos Pereira, Lee J. Alston i Marcus André Melo. Political Institutions, Policymaking Processes and Policy Outcomes in Brazil. Inter-American Development Bank, marzec 2006. http://dx.doi.org/10.18235/0011295.
Pełny tekst źródłaTarko, Andrew P., Mario A. Romero, Vamsi Krishna Bandaru i Cristhian Lizarazo. TScan–Stationary LiDAR for Traffic and Safety Applications: Vehicle Interpretation and Tracking. Purdue University, 2022. http://dx.doi.org/10.5703/1288284317402.
Pełny tekst źródłaLu, Tianjun, Jian-yu Ke, Azure Fisher, Mahmoud Salari, Patricia Valladolid i Fynnwin Prager. Should State Land in Southern California Be Allocated to Warehousing Goods or Housing People? Analyzing Transportation, Climate, and Unintended Consequences of Supply Chain Solutions. Mineta Transportation Institute, grudzień 2023. http://dx.doi.org/10.31979/mti.2023.2231.
Pełny tekst źródłaDudoit, Alain. The urgency of the first link: Canada’s supply chain at breaking point, a national security issue. CIRANO, lipiec 2023. http://dx.doi.org/10.54932/cxwf7311.
Pełny tekst źródłaDudoit, Alain. European common data spaces: a structuring initiative that is both necessary and adaptable to Canada. CIRANO, listopad 2023. http://dx.doi.org/10.54932/skhp9567.
Pełny tekst źródłaFinancial Stability Report - September 2015. Banco de la República, sierpień 2021. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2015.
Pełny tekst źródła