Results 11 to 20 of about 100,126 (270)
Simplifying Contract-Violating Traces [PDF]
Contract conformance is hard to determine statically, prior to the deployment of large pieces of software. A scalable alternative is to monitor for contract violations post-deployment: once a violation is detected, the trace characterising the offending ...
Christian Colombo +2 more
doaj +4 more sources
Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing [PDF]
In the face of an increasing attack landscape, it is necessary to cater for efficient mechanisms to verify software and device integrity for detecting run-time modifications in nextgeneration systems-of-systems. In this context, remote attestation is a promising defense mechanism that allows a third party, the verifier, to ensure a remote device’s ...
Dimitrios Papamartzivanos +3 more
openaire +2 more sources
The PBase Scientific Workflow Provenance Repository
Scientific workflows and their supporting systems are becoming increasingly popular for compute-intensive and data-intensive scientific experiments.
VÃctor Cuevas-VicenttÃn +7 more
doaj +11 more sources
F-waves are used in motor unit number estimation (MUNE) studies, which require rapid dedicated software to perform calculations. The aim of this study is to define a mathematical method for a fully automated F-wave extraction algorithm to perform F-wave ...
N. Tuğrul Artuğ
doaj +1 more source
Monitoring software systems at runtime is key for understanding workloads, debugging, and self-adaptation. It typically involves collecting and storing observable software data, which can be analyzed online or offline. Despite the usefulness of collecting system data, it may significantly impact the system execution by delaying response times and ...
Jhonny Mertz, Ingrid Nunes
openaire +2 more sources
Anomalies Detection in Software by Conceptual Learning From Normal Executions
Could we detect anomalies during the run-time of a program by learning from the analysis of its previous traces for normally completed executions? In this paper we create a featured data set from program traces at run time, either during its regular life,
Ahmad Qadeib Alban +3 more
doaj +1 more source
Topology-Inspired Method Recovers Obfuscated Term Information From Induced Software Call-Stacks
Fuzzing is a systematic large-scale search for software vulnerabilities achieved by feeding a sequence of randomly mutated input files to the program of interest with the goal being to induce a crash.
Kelly Maggs, Vanessa Robins
doaj +1 more source
Using patterns position distribution for software failure detection [PDF]
Pattern-based software failure detection is an important topic of research in recent years. In this method, a set of patterns from program execution traces are extracted, and represented as features, while their occurrence frequencies are treated as the ...
Agrawal R. +20 more
core +3 more sources
A New Technique for Understanding Large-Scale Software Systems
Comprehending a huge execution trace is not a straightforward task due to the size of data to be processed. Detecting and removing utilities are useful to facilitate the understanding of software and decrease the complexity and size of the execution ...
T. Al-Rousan, H. Abualese
doaj +1 more source
Model Checker Execution Reports [PDF]
Software model checking constitutes an undecidable problem and, as such, even an ideal tool will in some cases fail to give a conclusive answer. In practice, software model checkers fail often and usually do not provide any information on what was ...
Braberman, Victor +3 more
core +2 more sources

