Results 11 to 20 of about 100,126 (270)

Simplifying Contract-Violating Traces [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2012
Contract conformance is hard to determine statically, prior to the deployment of large pieces of software. A scalable alternative is to monitor for contract violations post-deployment: once a violation is detected, the trace characterising the offending ...
Christian Colombo   +2 more
doaj   +4 more sources

Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing [PDF]

open access: yes2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), 2021
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to verify software and device integrity for detecting run-time modifications in nextgeneration systems-of-systems. In this context, remote attestation is a promising defense mechanism that allows a third party, the verifier, to ensure a remote device’s ...
Dimitrios Papamartzivanos   +3 more
openaire   +2 more sources

The PBase Scientific Workflow Provenance Repository

open access: yesInternational Journal of Digital Curation, 2014
Scientific workflows and their supporting systems are becoming increasingly popular for compute-intensive and data-intensive scientific experiments.
Víctor Cuevas-Vicenttín   +7 more
doaj   +11 more sources

Fully automated F-wave corridor extraction and analysis algorithm for F-wave analyses and MUNE studies

open access: yesScientific Reports, 2023
F-waves are used in motor unit number estimation (MUNE) studies, which require rapid dedicated software to perform calculations. The aim of this study is to define a mathematical method for a fully automated F-wave extraction algorithm to perform F-wave ...
N. Tuğrul Artuğ
doaj   +1 more source

Software runtime monitoring with adaptive sampling rate to collect representative samples of execution traces

open access: yesJournal of Systems and Software, 2022
Monitoring software systems at runtime is key for understanding workloads, debugging, and self-adaptation. It typically involves collecting and storing observable software data, which can be analyzed online or offline. Despite the usefulness of collecting system data, it may significantly impact the system execution by delaying response times and ...
Jhonny Mertz, Ingrid Nunes
openaire   +2 more sources

Anomalies Detection in Software by Conceptual Learning From Normal Executions

open access: yesIEEE Access, 2020
Could we detect anomalies during the run-time of a program by learning from the analysis of its previous traces for normally completed executions? In this paper we create a featured data set from program traces at run time, either during its regular life,
Ahmad Qadeib Alban   +3 more
doaj   +1 more source

Topology-Inspired Method Recovers Obfuscated Term Information From Induced Software Call-Stacks

open access: yesFrontiers in Applied Mathematics and Statistics, 2021
Fuzzing is a systematic large-scale search for software vulnerabilities achieved by feeding a sequence of randomly mutated input files to the program of interest with the goal being to induce a crash.
Kelly Maggs, Vanessa Robins
doaj   +1 more source

Using patterns position distribution for software failure detection [PDF]

open access: yes, 2013
Pattern-based software failure detection is an important topic of research in recent years. In this method, a set of patterns from program execution traces are extracted, and represented as features, while their occurrence frequencies are treated as the ...
Agrawal R.   +20 more
core   +3 more sources

A New Technique for Understanding Large-Scale Software Systems

open access: yesTelfor Journal, 2020
Comprehending a huge execution trace is not a straightforward task due to the size of data to be processed. Detecting and removing utilities are useful to facilitate the understanding of software and decrease the complexity and size of the execution ...
T. Al-Rousan, H. Abualese
doaj   +1 more source

Model Checker Execution Reports [PDF]

open access: yes, 2017
Software model checking constitutes an undecidable problem and, as such, even an ideal tool will in some cases fail to give a conclusive answer. In practice, software model checkers fail often and usually do not provide any information on what was ...
Braberman, Victor   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy