Literatura científica selecionada sobre o tema "Execution trace analysis"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Execution trace analysis".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Execution trace analysis"
LANGEVINE, LUDOVIC, e MIREILLE DUCASSÉ. "Design and implementation of a tracer driver: Easy and efficient dynamic analyses of constraint logic programs". Theory and Practice of Logic Programming 8, n.º 5-6 (novembro de 2008): 581–609. http://dx.doi.org/10.1017/s147106840800344x.
Texto completo da fonteJAHIER, ERWAN, e MIREILLE DUCASSÉ. "Generic program monitoring by trace analysis". Theory and Practice of Logic Programming 2, n.º 4-5 (julho de 2002): 611–43. http://dx.doi.org/10.1017/s1471068402001461.
Texto completo da fonteSimmons, Sharon, Dennis Edwards e Phil Kearns. "Communication Analysis of Distributed Programs". Scientific Programming 14, n.º 2 (2006): 151–70. http://dx.doi.org/10.1155/2006/763568.
Texto completo da fonteCôté, Mathieu, e Michel R. Dagenais. "Problem Detection in Real-Time Systems by Trace Analysis". Advances in Computer Engineering 2016 (6 de janeiro de 2016): 1–12. http://dx.doi.org/10.1155/2016/9467181.
Texto completo da fonteAl-Rousan, Thamer, e Hasan Abualese. "A new technique for understanding large-scale software systems". Telfor Journal 12, n.º 1 (2020): 34–39. http://dx.doi.org/10.5937/telfor2001034a.
Texto completo da fonteRyan, Gabriel, Burcu Cetin, Yongwhan Lim e Suman Jana. "Accurate Data Race Prediction in the Linux Kernel through Sparse Fourier Learning". Proceedings of the ACM on Programming Languages 8, OOPSLA1 (29 de abril de 2024): 810–32. http://dx.doi.org/10.1145/3649840.
Texto completo da fonteMa, Ming Yang, Yi Qiang Wang, Wei Luo, Er Hu Zhang, Chao Fu e Li Xue Wang. "Fault Localization of CNC Software Based on Searching in Divided Execution Trace". Applied Mechanics and Materials 101-102 (setembro de 2011): 876–79. http://dx.doi.org/10.4028/www.scientific.net/amm.101-102.876.
Texto completo da fonteCornelissen, Bas, Andy Zaidman, Danny Holten, Leon Moonen, Arie van Deursen e Jarke J. van Wijk. "Execution trace analysis through massive sequence and circular bundle views". Journal of Systems and Software 81, n.º 12 (dezembro de 2008): 2252–68. http://dx.doi.org/10.1016/j.jss.2008.02.068.
Texto completo da fonteGamino del Río, Iván, Agustín Martínez Hellín, Óscar R. Polo, Miguel Jiménez Arribas, Pablo Parra, Antonio da Silva, Jonatan Sánchez e Sebastián Sánchez. "A RISC-V Processor Design for Transparent Tracing". Electronics 9, n.º 11 (7 de novembro de 2020): 1873. http://dx.doi.org/10.3390/electronics9111873.
Texto completo da fonteKabamba, Herve M., Matthew Khouzam e Michel R. Dagenais. "Vnode: Low-Overhead Transparent Tracing of Node.js-Based Microservice Architectures". Future Internet 16, n.º 1 (29 de dezembro de 2023): 13. http://dx.doi.org/10.3390/fi16010013.
Texto completo da fonteTeses / dissertações sobre o assunto "Execution trace analysis"
Zhou, Yang. "Execution Trace Visualization for Java Pathfinder using Trace Compass". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-286313.
Texto completo da fonteMultitrådning används ofta i moderna datorprogram, vilket har många fördelar men kan också orsaka samtidighetsproblem. Bland olika felsökningsverktyg kan Java Pathfinder (JPF) upptäcka latenta fel hos multitrådade Javaprogram genom modellkontroll. Spårningsinformationen i form av text har låg läsbarhet, och tidigare försök att visualsera JPF-spår har visat begränsningar. För långsiktig utveckling har populära spårningsanalysplattformar som Trace Compass (TC) utvidgats för att anpassas till JPF-spår. I examensprojektet gör utvecklingen av JPF och TC det möjligt att analysera JPF-spår på TC med ett användargränssnitt baserat på visuella diagram. Utvecklingen löser den konceptuella skillnaden mellan verktygen och visualiserar spårdata på ett framgångsrikt sätt. Implementeringen bidrar med ett generiskt tillvägagångssätt för att analysera JPF spår med hjälp av visualisering.
Reger, Giles Matthew. "Automata based monitoring and mining of execution traces". Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/automata-based-monitoring-and-mining-of-execution-traces(08eb0a62-53a3-4171-b4d2-36bfe450b9a7).html.
Texto completo da fonteZoor, Maysam. "Latency verification in execution traces of HW/SW partitioning model". Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAT037.
Texto completo da fonteWhile many research works aim at defining new (formal) verification techniques to check for requirements in a model, understanding the root cause of a requirement violation is still an open issue for complex platforms built around software and hardware components. For instance, is the violation of a latency requirement due to unfavorable real-time scheduling, to contentions on buses, to the characteristics of functional algorithms or hardware components?This thesis introduces a Precise Latency ANalysis approach called PLAN. PLAN takes as input an instance of a HW/SW partitioning model, an execution trace, and a time constraint expressed in the following format: the latency between operator A and operator B should be less than a maximum latency value. First PLAN checks if the latency requirement is satisfied. If not, the main interest of PLAN is to provide the root cause of the non satisfaction by classifying execution transactions according to their impact on latency: obligatory transaction, transaction inducing a contention, transaction having no impact, etc.A first version of PLAN assumes an execution for which there is a unique execution of operator A and a unique execution of operator B. A second version of PLAN can compute, for each executed operator A, the corresponding operator B. For this, our approach relies on tainting techniques.The thesis formalizes the two versions of PLAN and illustrates them with toy examples. Then, we show how PLAN was integrated into a Model-Driven Framework (TTool). The two versions of PLAN are illustrated with two case studies taken from the H2020 AQUAS project. In particular, we show how tainting can efficiently handle the multiple and concurrent occurrences of the same operator
Emteu, Tchagou Serge Vladimir. "Réduction à la volée du volume des traces d'exécution pour l'analyse d'applications multimédia de systèmes embarqués". Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM051/document.
Texto completo da fonteThe consumer electronics market is dominated by embedded systems due to their ever-increasing processing power and the large number of functionnalities they offer.To provide such features, architectures of embedded systems have increased in complexity: they rely on several heterogeneous processing units, and allow concurrent tasks execution.This complexity degrades the programmability of embedded system architectures and makes application execution difficult to understand on such systems.The most used approach for analyzing application execution on embedded systems consists in capturing execution traces (event sequences, such as system call invocations or context switch, generated during application execution).This approach is used in application testing, debugging or profiling.However in some use cases, execution traces generated can be very large, up to several hundreds of gigabytes.For example endurance tests, which are tests consisting in tracing execution of an application on an embedded system during long periods, from several hours to several days.Current tools and methods for analyzing execution traces are not designed to handle such amounts of data.We propose an approach for monitoring an application execution by analyzing traces on the fly in order to reduce the volume of recorded trace.Our approach is based on features of multimedia applications which contribute the most to the success of popular devices such as set-top boxes or smartphones.This approach consists in identifying automatically the suspicious periods of an application execution in order to record only the parts of traces which correspond to these periods.The proposed approach consists of two steps: a learning step which discovers regular behaviors of an application from its execution trace, and an anomaly detection step which identifies behaviors deviating from the regular ones.The many experiments, performed on synthetic and real-life datasets, show that our approach reduces the trace size by an order of magnitude while maintaining a good performance in detecting suspicious behaviors
Hamou-Lhadj, Abdelwahab. "Techniques to simplify the analysis of execution traces for program comprehension". Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/29296.
Texto completo da fonteRose, Annica Elizabeth. "An Analysis of Investor Trading Behaviour and Its Impact on Trade Execution, Market Quality and Stock Returns". Thesis, The University of Sydney, 2013. http://hdl.handle.net/2123/9897.
Texto completo da fonteVigouroux, Xavier. "Analyse distribuée de traces d'exécution de programmes parallèles". Lyon, École normale supérieure (sciences), 1996. http://www.theses.fr/1996ENSL0016.
Texto completo da fonteTaqi, Alawi. "A qualitative analysis of the current and future leadership development needs of third-line leaders in the oil and gas sector in Kuwait". Thesis, University of Stirling, 2016. http://hdl.handle.net/1893/24788.
Texto completo da fonteMallangi, Siva Sai Reddy. "Low-Power Policies Based on DVFS for the MUSEIC v2 System-on-Chip". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229443.
Texto completo da fonteNuförtiden så har multifunktionella bärbara hälsoenheter fått en betydande roll. Dessa enheter drivs vanligtvis av batterier och är därför begränsade av batteritiden (från ett par timmar till ett par veckor beroende på tillämpningen). På senaste tiden har det framkommit att dessa enheter som används vid en fast spänning och frekvens kan användas vid flera spänningar och frekvenser. Genom att byta till lägre spänning och frekvens på grund av effektbehov så kan enheterna få enorma fördelar när det kommer till energibesparing. Dynamisk skalning av spänning och frekvens-tekniker (såkallad Dynamic Voltage and Frequency Scaling, DVFS) har visat sig vara användbara i detta sammanhang för en effektiv avvägning mellan energi och beteende. Hos Imec så använder sig bärbara enheter av den internt utvecklade MUSEIC v2 (Multi Sensor Integrated circuit version 2.0). Systemet är optimerat för effektiv och korrekt insamling, bearbetning och överföring av data från flera (hälso) sensorer. MUSEIC v2 har begränsad möjlighet att styra spänningen och frekvensen dynamiskt. I detta examensarbete undersöker vi hur traditionella DVFS-tekniker kan appliceras på MUSEIC v2. Experiment utfördes för att ta reda på de optimala effektlägena och för att effektivt kunna styra och även skala upp matningsspänningen och frekvensen. Eftersom att ”overhead” skapades vid växling av spänning och frekvens gjordes också en övergångsanalys. Realtidsoch icke-realtidskalkyler genomfördes baserat på dessa tekniker och resultaten sammanställdes och analyserades. I denna process granskades flera toppmoderna schemaläggningsalgoritmer och skalningstekniker för att hitta en lämplig teknik. Genom att använda vår föreslagna skalningsteknikimplementering har vi uppnått 86,95% effektreduktion i jämförelse med det konventionella sättet att MUSEIC v2-chipets processor arbetar med en fast spänning och frekvens. Tekniker som inkluderar lätt sömn och djupt sömnläge studerades och implementerades, vilket testade systemets förmåga att tillgodose DPM-tekniker (Dynamic Power Management) som kan uppnå ännu större fördelar. En ny metod för att genomföra den djupa sömnmekanismen föreslogs också och enligt erhållna resultat så kan den ge upp till 71,54% lägre energiförbrukning jämfört med det traditionella sättet att implementera djupt sömnläge.
"Supporting Source Code Feature Analysis Using Execution Trace Mining". Thesis, 2013. http://hdl.handle.net/10388/ETD-2013-10-1266.
Texto completo da fonteLivros sobre o assunto "Execution trace analysis"
Company, John T. Boyd. Executive summary, independent analysis, 21 closure review collieries British Coal Corporation United Kingdom. London: HMSO, 1993.
Encontre o texto completo da fonteAborisade, Femi. Nigeria: Freedom of association and the Trade Unions Act : a critical analysis : includes appraisal of the Executive Bill to Amend Trade Unions Act, 2004. Ibadan: Centre for Labour Studies (CLS), 2004.
Encontre o texto completo da fontePhilip, Slayton, e Quinn John, eds. Dispute settlement mechanisms: An analysis of the dispute settlement provisions of the Canada-U.S. Free Trade Agreement preliminary transcript : executive summary, November 4, 1987. [Toronto, Ont.]: Govt. of Ontario, 1987.
Encontre o texto completo da fonteConsultants, Spectrum Strategy, e Great Britain. Department of Trade and Industry., eds. Development of the information society: An international analysis : executive summary : based on a report by Spectrum Strategy Consultants for the Department of Trade and Industry. London: Department of Trade and Industry, 1996.
Encontre o texto completo da fonteGoodman, Seymour. Executive briefing: An examination of high-performance computing export control policy in the 1990s. Los Alamitos, Calif: IEEE Computer Society Press, 1996.
Encontre o texto completo da fonteUnited States. General Accounting Office., ed. Financial management: Analysis of DOD's first Biennial Financial Management Improvement Plan : report to Congressional committees. Washington, D.C: The Office, 1999.
Encontre o texto completo da fonteOffice, General Accounting. Financial management: Analysis of operating cash balance of the Defense Logistics Agency's stock fund : report to the chairman, Subcommittee on Defense, House Committee on Appropriations, House of Representatives. Washington, D.C: The Office, 1990.
Encontre o texto completo da fonteShadlen, Kenneth C. Coalitional Clash, Export Mobilization, and Executive Agency. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199593903.003.0005.
Texto completo da fonteMoseley, Mason W. Uneven Democracy and Contentious Politics. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190694005.003.0007.
Texto completo da fonteEizenstat, Stuart E., e Marney L. Cheek. Executive Reports: Legal Analysis of the Bipartisan Trade Promotion Authority Act of 2002 - The Over-Arching Issues You Need to Know (Executive Reports). Aspatore Books, 2006.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Execution trace analysis"
Khoury, Raphaël, Sylvain Hallé e Omar Waldmann. "Execution Trace Analysis Using LTL-FO $$^+$$". In Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 356–62. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47169-3_26.
Texto completo da fonteHuang, Zunchen, e Chao Wang. "Symbolic Predictive Cache Analysis for Out-of-Order Execution". In Fundamental Approaches to Software Engineering, 163–83. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99429-7_10.
Texto completo da fonteAl Haider, Newres, Benoit Gaudin e John Murphy. "Execution Trace Exploration and Analysis Using Ontologies". In Runtime Verification, 412–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29860-8_33.
Texto completo da fonteLima, Leonardo, Andrei Herasimau, Martin Raszyk, Dmitriy Traytel e Simon Yuan. "Explainable Online Monitoring of Metric Temporal Logic". In Tools and Algorithms for the Construction and Analysis of Systems, 473–91. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30820-8_28.
Texto completo da fonteBeutner, Raven, e Bernd Finkbeiner. "AutoHyper: Explicit-State Model Checking for HyperLTL". In Tools and Algorithms for the Construction and Analysis of Systems, 145–63. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30823-9_8.
Texto completo da fonteWang, Wubing, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang e Zhiqiang Lin. "Specularizer : Detecting Speculative Execution Attacks via Performance Tracing". In Detection of Intrusions and Malware, and Vulnerability Assessment, 151–72. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80825-9_8.
Texto completo da fonteBeutner, Raven, e Bernd Finkbeiner. "Software Verification of Hyperproperties Beyond k-Safety". In Computer Aided Verification, 341–62. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13185-1_17.
Texto completo da fonteBeutner, Raven. "Automated Software Verification of Hyperliveness". In Tools and Algorithms for the Construction and Analysis of Systems, 196–216. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57249-4_10.
Texto completo da fonteLoose, Nils, Felix Mächtle, Florian Sieck e Thomas Eisenbarth. "SWAT: Modular Dynamic Symbolic Execution for Java Applications using Dynamic Instrumentation (Competition Contribution)". In Tools and Algorithms for the Construction and Analysis of Systems, 399–405. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57256-2_28.
Texto completo da fonteSchuster, Daniel, Lukas Schade, Sebastiaan J. van Zelst e Wil M. P. van der Aalst. "Visualizing Trace Variants from Partially Ordered Event Data". In Lecture Notes in Business Information Processing, 34–46. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98581-3_3.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Execution trace analysis"
Bohnet, Johannes, Martin Koeleman e Juergen Doellner. "Visualizing massively pruned execution traces to facilitate trace exploration". In 2009 5th IEEE International Workshop on Visualizing Software for Understanding and Analysis (VISSOFT). IEEE, 2009. http://dx.doi.org/10.1109/vissof.2009.5336416.
Texto completo da fontePekarek, Daniel, e Hanspeter Mössenböck. "trcview: Interactive Architecture Agnostic Execution Trace Analysis". In MPLR '20: 17th International Conference on Managed Programming Languages and Runtimes. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3426182.3426190.
Texto completo da fonteAlouneh, Sahel, Sa'ed Abed, Bassam Jamil Mohd e Ahmad Al-Khasawneh. "Relational database approach for execution trace analysis". In 2012 International Conference on Computer, Information and Telecommunication Systems (CITS). IEEE, 2012. http://dx.doi.org/10.1109/cits.2012.6220394.
Texto completo da fonteAbualese, Hasan, Putra Sumari, Thamer Al-Rousan e Mohammad Rasmi Al-Mousa. "Utility classes detection metrics for execution trace analysis". In 2017 8th International Conference on Information Technology (ICIT). IEEE, 2017. http://dx.doi.org/10.1109/icitech.2017.8080044.
Texto completo da fonteRezazadeh, Majid, Naser Ezzati-Jivan, Evan Galea e Michel R. Dagenais. "Multi-Level Execution Trace Based Lock Contention Analysis". In 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2020. http://dx.doi.org/10.1109/issrew51248.2020.00068.
Texto completo da fonteMendes, Celso L. "Performance Prediction by Trace Transformation". In Simpósio Brasileiro de Arquitetura de Computadores e Processamento de Alto Desempenho. Sociedade Brasileira de Computação, 1993. http://dx.doi.org/10.5753/sbac-pad.1993.23023.
Texto completo da fonteLi, Hongzhe, Taebeom Kim, Munkhbayar Bat-Erdene e Heejo Lee. "Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution". In 2013 Eighth International Conference on Availability, Reliability and Security (ARES). IEEE, 2013. http://dx.doi.org/10.1109/ares.2013.59.
Texto completo da fonteZoor, Maysam, Ludovic Apvrille e Renaud Pacalet. "Execution Trace Analysis for a Precise Understanding of Latency Violations". In 2021 ACM/IEEE 24th International Conference on Model Driven Engineering Languages and Systems (MODELS). IEEE, 2021. http://dx.doi.org/10.1109/models50736.2021.00021.
Texto completo da fonteToda, Tatsuya, Takashi Kobayashi, Noritoshi Atsumi e Kiyoshi Agusa. "Grouping Objects for Execution Trace Analysis Based on Design Patterns". In 2013 20th Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2013. http://dx.doi.org/10.1109/apsec.2013.107.
Texto completo da fonteLu, Yue, Thomas Nolte, Iain Bate e Liliana Cucu-Grosjean. "A trace-based statistical worst-case execution time analysis of component-based real-time embedded systems". In Factory Automation (ETFA 2011). IEEE, 2011. http://dx.doi.org/10.1109/etfa.2011.6059190.
Texto completo da fonteRelatórios de organizações sobre o assunto "Execution trace analysis"
Harkema, Marcel, Dick Quartel, Rob van der Mei e Bart Gijsen. JPMT: A Java Performance Monitoring Tool. Centre for Telematics and Information Technology (CTIT), 2003. http://dx.doi.org/10.3990/1.5152400.
Texto completo da fonteAmela, R., R. Badia, S. Böhm, R. Tosi, C. Soriano e R. Rossi. D4.2 Profiling report of the partner’s tools, complete with performance suggestions. Scipedia, 2021. http://dx.doi.org/10.23967/exaqute.2021.2.023.
Texto completo da fonteÁlvarez, Carola, Leonardo Corral, José Martínez e César Montiel. Project Completion Report Analysis: Implications for the Portfolio. Inter-American Development Bank, março de 2021. http://dx.doi.org/10.18235/0003145.
Texto completo da fonteWANG, Peng, Zhidong CAI, Qingying ZHAO, Wanting JIANG, Cong LIU e Xing WANG. A Bayesian Network Meta-analysis of the Effect of Acute Exercise on Executive Function in Middle-aged and Senior People. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, dezembro de 2021. http://dx.doi.org/10.37766/inplasy2021.12.0086.
Texto completo da fonteMueller, Bernardo, Carlos Pereira, Lee J. Alston e Marcus André Melo. Political Institutions, Policymaking Processes and Policy Outcomes in Brazil. Inter-American Development Bank, março de 2006. http://dx.doi.org/10.18235/0011295.
Texto completo da fonteTarko, Andrew P., Mario A. Romero, Vamsi Krishna Bandaru e Cristhian Lizarazo. TScan–Stationary LiDAR for Traffic and Safety Applications: Vehicle Interpretation and Tracking. Purdue University, 2022. http://dx.doi.org/10.5703/1288284317402.
Texto completo da fonteLu, Tianjun, Jian-yu Ke, Azure Fisher, Mahmoud Salari, Patricia Valladolid e Fynnwin Prager. Should State Land in Southern California Be Allocated to Warehousing Goods or Housing People? Analyzing Transportation, Climate, and Unintended Consequences of Supply Chain Solutions. Mineta Transportation Institute, dezembro de 2023. http://dx.doi.org/10.31979/mti.2023.2231.
Texto completo da fonteDudoit, Alain. The urgency of the first link: Canada’s supply chain at breaking point, a national security issue. CIRANO, julho de 2023. http://dx.doi.org/10.54932/cxwf7311.
Texto completo da fonteDudoit, Alain. European common data spaces: a structuring initiative that is both necessary and adaptable to Canada. CIRANO, novembro de 2023. http://dx.doi.org/10.54932/skhp9567.
Texto completo da fonteFinancial Stability Report - September 2015. Banco de la República, agosto de 2021. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2015.
Texto completo da fonte