Artykuły w czasopismach na temat „Execution trace analysis”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Execution trace analysis”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
LANGEVINE, LUDOVIC, i MIREILLE DUCASSÉ. "Design and implementation of a tracer driver: Easy and efficient dynamic analyses of constraint logic programs". Theory and Practice of Logic Programming 8, nr 5-6 (listopad 2008): 581–609. http://dx.doi.org/10.1017/s147106840800344x.
Pełny tekst źródłaJAHIER, ERWAN, i MIREILLE DUCASSÉ. "Generic program monitoring by trace analysis". Theory and Practice of Logic Programming 2, nr 4-5 (lipiec 2002): 611–43. http://dx.doi.org/10.1017/s1471068402001461.
Pełny tekst źródłaSimmons, Sharon, Dennis Edwards i Phil Kearns. "Communication Analysis of Distributed Programs". Scientific Programming 14, nr 2 (2006): 151–70. http://dx.doi.org/10.1155/2006/763568.
Pełny tekst źródłaCôté, Mathieu, i Michel R. Dagenais. "Problem Detection in Real-Time Systems by Trace Analysis". Advances in Computer Engineering 2016 (6.01.2016): 1–12. http://dx.doi.org/10.1155/2016/9467181.
Pełny tekst źródłaAl-Rousan, Thamer, i Hasan Abualese. "A new technique for understanding large-scale software systems". Telfor Journal 12, nr 1 (2020): 34–39. http://dx.doi.org/10.5937/telfor2001034a.
Pełny tekst źródłaRyan, Gabriel, Burcu Cetin, Yongwhan Lim i Suman Jana. "Accurate Data Race Prediction in the Linux Kernel through Sparse Fourier Learning". Proceedings of the ACM on Programming Languages 8, OOPSLA1 (29.04.2024): 810–32. http://dx.doi.org/10.1145/3649840.
Pełny tekst źródłaMa, Ming Yang, Yi Qiang Wang, Wei Luo, Er Hu Zhang, Chao Fu i Li Xue Wang. "Fault Localization of CNC Software Based on Searching in Divided Execution Trace". Applied Mechanics and Materials 101-102 (wrzesień 2011): 876–79. http://dx.doi.org/10.4028/www.scientific.net/amm.101-102.876.
Pełny tekst źródłaCornelissen, Bas, Andy Zaidman, Danny Holten, Leon Moonen, Arie van Deursen i Jarke J. van Wijk. "Execution trace analysis through massive sequence and circular bundle views". Journal of Systems and Software 81, nr 12 (grudzień 2008): 2252–68. http://dx.doi.org/10.1016/j.jss.2008.02.068.
Pełny tekst źródłaGamino del Río, Iván, Agustín Martínez Hellín, Óscar R. Polo, Miguel Jiménez Arribas, Pablo Parra, Antonio da Silva, Jonatan Sánchez i Sebastián Sánchez. "A RISC-V Processor Design for Transparent Tracing". Electronics 9, nr 11 (7.11.2020): 1873. http://dx.doi.org/10.3390/electronics9111873.
Pełny tekst źródłaKabamba, Herve M., Matthew Khouzam i Michel R. Dagenais. "Vnode: Low-Overhead Transparent Tracing of Node.js-Based Microservice Architectures". Future Internet 16, nr 1 (29.12.2023): 13. http://dx.doi.org/10.3390/fi16010013.
Pełny tekst źródłaAbbasi, Hossein, Naser Ezzati-Jivan, Martine Bellaiche, Chamseddine Talhi i Michel R. Dagenais. "Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis". Journal of Hardware and Systems Security 3, nr 2 (26.01.2019): 164–76. http://dx.doi.org/10.1007/s41635-018-0061-2.
Pełny tekst źródłaKohyarnejadfard, Iman, Daniel Aloise, Michel R. Dagenais i Mahsa Shakeri. "A Framework for Detecting System Performance Anomalies Using Tracing Data Analysis". Entropy 23, nr 8 (3.08.2021): 1011. http://dx.doi.org/10.3390/e23081011.
Pełny tekst źródłaBai, Jin Rong, Guo Zhong Zou i Shi Guang Mu. "Malware Analysis Platform Based on Secondary Development of Xen". Applied Mechanics and Materials 530-531 (luty 2014): 865–68. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.865.
Pełny tekst źródłaEzzati-Jivan, Naser, Houssem Daoud i Michel R. Dagenais. "Debugging of Performance Degradation in Distributed Requests Handling Using Multilevel Trace Analysis". Wireless Communications and Mobile Computing 2021 (16.11.2021): 1–17. http://dx.doi.org/10.1155/2021/8478076.
Pełny tekst źródłaTariq, Zeeshan, Darryl Charles, Sally McClean, Ian McChesney i Paul Taylor. "Anomaly Detection for Service-Oriented Business Processes Using Conformance Analysis". Algorithms 15, nr 8 (25.07.2022): 257. http://dx.doi.org/10.3390/a15080257.
Pełny tekst źródłaFinkbeiner, Bernd, Christopher Hahn, Marvin Stenger i Leander Tentrup. "Efficient monitoring of hyperproperties using prefix trees". International Journal on Software Tools for Technology Transfer 22, nr 6 (20.02.2020): 729–40. http://dx.doi.org/10.1007/s10009-020-00552-5.
Pełny tekst źródłaManap, Norpadzlihatun, Kavitha Sandirasegaran, Noor Shahifah Syahrom i Amnorzahira Amir. "Analysis of Trace Metal Contamination in Pahang River and Kelantan River, Malaysia". MATEC Web of Conferences 266 (2019): 04003. http://dx.doi.org/10.1051/matecconf/201926604003.
Pełny tekst źródłaPrylli, L., i B. Tourancheau. "Execution-Driven Simulation of Parallel Applications". Parallel Processing Letters 08, nr 01 (marzec 1998): 95–109. http://dx.doi.org/10.1142/s0129626498000122.
Pełny tekst źródłaSingh, Amit Kumar, Muhammad Shafique, Akash Kumar i Jorg Henkel. "Resource and Throughput Aware Execution Trace Analysis for Efficient Run-Time Mapping on MPSoCs". IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 35, nr 1 (styczeń 2016): 72–85. http://dx.doi.org/10.1109/tcad.2015.2446938.
Pełny tekst źródłaWYLIE, BRIAN J. N., MARKUS GEIMER, BERND MOHR, DAVID BÖHME, ZOLTÁN SZEBENYI i FELIX WOLF. "LARGE-SCALE PERFORMANCE ANALYSIS OF SWEEP3D WITH THE SCALASCA TOOLSET". Parallel Processing Letters 20, nr 04 (grudzień 2010): 397–414. http://dx.doi.org/10.1142/s0129626410000314.
Pełny tekst źródłade la Fuente, Rene, Ricardo Fuentes, Jorge Munoz-Gama, Arnoldo Riquelme, Fernando R. Altermatt, Juan Pedemonte, Marcia Corvetto i Marcos Sepúlveda. "Control-flow analysis of procedural skills competencies in medical training through process mining". Postgraduate Medical Journal 96, nr 1135 (27.11.2019): 250–56. http://dx.doi.org/10.1136/postgradmedj-2019-136802.
Pełny tekst źródłaIqbal, Muhammad Munwar, Muhammad Ali, Mai Alfawair, Ahsan Lateef, Abid Ali Minhas, Abdulaziz Al Mazyad i Kashif Naseer. "Augmenting High-Performance Mobile Cloud Computations for Big Data in AMBER". Wireless Communications and Mobile Computing 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/4796535.
Pełny tekst źródłaCuzzocrea, Alfredo, Francesco Folino, Massimo Guarascio i Luigi Pontieri. "Deviance-Aware Discovery of High-Quality Process Models". International Journal on Artificial Intelligence Tools 27, nr 07 (listopad 2018): 1860009. http://dx.doi.org/10.1142/s0218213018600096.
Pełny tekst źródłaSánchez, César, Gerardo Schneider, Wolfgang Ahrendt, Ezio Bartocci, Domenico Bianculli, Christian Colombo, Yliès Falcone i in. "A survey of challenges for runtime verification from advanced application domains (beyond software)". Formal Methods in System Design 54, nr 3 (listopad 2019): 279–335. http://dx.doi.org/10.1007/s10703-019-00337-w.
Pełny tekst źródłaChen Kuang Piao, Yonni, Naser Ezzati-jivan i Michel R. Dagenais. "Distributed Architecture for an Integrated Development Environment, Large Trace Analysis, and Visualization". Sensors 21, nr 16 (18.08.2021): 5560. http://dx.doi.org/10.3390/s21165560.
Pełny tekst źródłaALPUENTE, M., F. FRECHINA, J. SAPIÑA i D. BALLIS. "Assertion-based analysis via slicing withABETS(system description)". Theory and Practice of Logic Programming 16, nr 5-6 (wrzesień 2016): 515–32. http://dx.doi.org/10.1017/s1471068416000375.
Pełny tekst źródłaSchmitt, Felix, Robert Dietrich i Guido Juckeland. "Scalable critical-path analysis and optimization guidance for hybrid MPI-CUDA applications". International Journal of High Performance Computing Applications 31, nr 6 (1.08.2016): 485–98. http://dx.doi.org/10.1177/1094342016661865.
Pełny tekst źródłaMujumdar, Purva, i J. Uma Maheswari. "Alternate beeline diagramming method network analysis for interdependent design entities". Engineering, Construction and Architectural Management 26, nr 1 (18.02.2019): 66–84. http://dx.doi.org/10.1108/ecam-07-2017-0112.
Pełny tekst źródłaLapkina, Anna Vadimovna, i Andrew Alexandrovitch Petukhov. "HTTP-Request Classification in Automatic Web Application Crawling". Proceedings of the Institute for System Programming of the RAS 33, nr 3 (2021): 77–86. http://dx.doi.org/10.15514/ispras-2021-33(3)-6.
Pełny tekst źródłaRadenković, Uroš, Marko Mićović i Zaharije Radivojević. "Evaluation and Benefit of Imprecise Value Prediction for Certain Types of Instructions". Electronics 12, nr 17 (24.08.2023): 3568. http://dx.doi.org/10.3390/electronics12173568.
Pełny tekst źródłaCosimi, Francesco, Antonio Arena, Paolo Gai i Sergio Saponara. "From SW Timing Analysis and Safety Logging to HW Implementation: A Possible Solution with an Integrated and Low-Power Logger Approach". Journal of Low Power Electronics and Applications 13, nr 4 (2.11.2023): 59. http://dx.doi.org/10.3390/jlpea13040059.
Pełny tekst źródłaSouprayen, Balamurugan, Ayyasamy Ayyanar i Suresh Joseph K. "Optimization of C5.0 Classifier With Bayesian Theory for Food Traceability Management Using Internet of Things". International Journal of Smart Sensor Technologies and Applications 1, nr 1 (styczeń 2020): 1–21. http://dx.doi.org/10.4018/ijssta.2020010101.
Pełny tekst źródłaSun, Tao, i Xinming Ye. "A Model Reduction Method for Parallel Software Testing". Journal of Applied Mathematics 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/595897.
Pełny tekst źródłaRashidi, Amirreza, Jolanta Tamošaitienė, Mehdi Ravanshadnia i Hadi Sarvari. "A Scientometric Analysis of Construction Bidding Research Activities". Buildings 13, nr 1 (12.01.2023): 220. http://dx.doi.org/10.3390/buildings13010220.
Pełny tekst źródłaChung, Jinsuk, Ikhwan Lee, Michael Sullivan, Jee Ho Ryoo, Dong Wan Kim, Doe Hyun Yoon, Larry Kaplan i Mattan Erez. "Containment Domains: A Scalable, Efficient and Flexible Resilience Scheme for Exascale Systems". Scientific Programming 21, nr 3-4 (2013): 197–212. http://dx.doi.org/10.1155/2013/473915.
Pełny tekst źródłaYounan, Simon, i David R. Novog. "Development and Testing of TRACE/PARCS ECI Capability for Modelling CANDU Reactors with Reactor Regulating System Response". Science and Technology of Nuclear Installations 2022 (27.03.2022): 1–31. http://dx.doi.org/10.1155/2022/7500629.
Pełny tekst źródłaGrossmann, Georg, Shamila Mafazi, Wolfgang Mayer, Michael Schrefl i Markus Stumptner. "Change Propagation and Conflict Resolution for the Co-Evolution of Business Processes". International Journal of Cooperative Information Systems 24, nr 01 (marzec 2015): 1540002. http://dx.doi.org/10.1142/s021884301540002x.
Pełny tekst źródłaPegoraro, Marco, Merih Seran Uysal i Wil M. P. van der Aalst. "Efficient Time and Space Representation of Uncertain Event Data". Algorithms 13, nr 11 (9.11.2020): 285. http://dx.doi.org/10.3390/a13110285.
Pełny tekst źródłaHeimann, Peter, Carl-Arndt Krapp, Bernhard Westfechtel i Gregor Joeris. "Graph-Based Software Process Management". International Journal of Software Engineering and Knowledge Engineering 07, nr 04 (grudzień 1997): 431–55. http://dx.doi.org/10.1142/s0218194097000254.
Pełny tekst źródłaAskanius, Tina. "On Frogs, Monkeys, and Execution Memes: Exploring the Humor-Hate Nexus at the Intersection of Neo-Nazi and Alt-Right Movements in Sweden". Television & New Media 22, nr 2 (22.01.2021): 147–65. http://dx.doi.org/10.1177/1527476420982234.
Pełny tekst źródłaSolovev, Mikhail Aleksandrovich, Maksim Gennadevich Bakulin, Sergei Sergeevich Makarov, Dmitrii Valerevich Manushin i Vartan Andronikovich Padaryan. "Practical Abstract Interpretation of Binary Code". Proceedings of the Institute for System Programming of the RAS 32, nr 6 (2020): 101–10. http://dx.doi.org/10.15514/ispras-2020-32(6)-8.
Pełny tekst źródłaYang, Xiaodong, Omar Ali Beg, Matthew Kenigsberg i Taylor T. Johnson. "A Framework for Identification and Validation of Affine Hybrid Automata from Input-Output Traces". ACM Transactions on Cyber-Physical Systems 6, nr 2 (30.04.2022): 1–24. http://dx.doi.org/10.1145/3470455.
Pełny tekst źródłaNebesnaya, A. "IMPROVING THE DEVELOPMENT OF TOURISM INFRASTRUCTURE IN THE REGION". Actual directions of scientific researches of the XXI century: theory and practice 11, nr 4 (29.12.2023): 128–41. http://dx.doi.org/10.34220/2308-8877-2023-11-4-128-141.
Pełny tekst źródłaSayadi, Hossein, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin, Paulo Cesar Costa, Setareh Rafatirad i Houman Homayoun. "Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach". Cryptography 5, nr 4 (17.10.2021): 28. http://dx.doi.org/10.3390/cryptography5040028.
Pełny tekst źródłaPani, Santosh Kumar, i G. B. Mund. "Property Based Dynamic Slicing of Object Oriented Programs". International Journal of Software Engineering and Technologies (IJSET) 1, nr 2 (1.08.2016): 69. http://dx.doi.org/10.11591/ijset.v1i2.4570.
Pełny tekst źródłaYang, Zhixin, Wei Xu, Pak-Kin Wong i Xianbo Wang. "Modeling of RFID-Enabled Real-Time Manufacturing Execution System in Mixed-Model Assembly Lines". Mathematical Problems in Engineering 2015 (2015): 1–15. http://dx.doi.org/10.1155/2015/575402.
Pełny tekst źródłaВера Александровна, Щетнева,. "POLITICAL, LEGAL AND ORGANIZATIONAL TENDENSIES IN THE EXECUTION OF PUNISHMENT IN THE FORM OF IMPRISONMENT IN RELATION TO CONVICTED WOMEN IN POST-SOVIET CORRECTIONAL COLONIES PERIOD". Vestnik Samarskogo iuridicheskogo instituta, nr 5(51) (20.12.2022): 71–78. http://dx.doi.org/10.37523/sui.2022.51.5.012.
Pełny tekst źródłaDushku, Edlira, Jeppe Hagelskjær Østergaard i Nicola Dragoni. "Memory Offloading for Remote Attestation of Multi-Service IoT Devices". Sensors 22, nr 12 (8.06.2022): 4340. http://dx.doi.org/10.3390/s22124340.
Pełny tekst źródłaShaduntc, Elena. "The Middle Ages in the Landscape of the Present-Day Pereslavl-Zalessky". ISTORIYA 12, nr 9 (107) (2021): 0. http://dx.doi.org/10.18254/s207987840017120-1.
Pełny tekst źródłaAng, Zhendong, i Umang Mathur. "Predictive Monitoring against Pattern Regular Languages". Proceedings of the ACM on Programming Languages 8, POPL (5.01.2024): 2191–225. http://dx.doi.org/10.1145/3632915.
Pełny tekst źródła