Results 231 to 240 of about 100,126 (270)
From Concrete to Code: A Survey of AI-Driven Transportation Infrastructure, Security, and Human Interaction. [PDF]
Kose NA, Kose K, Liang F.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
An Empirical Assessment of the Use of Execution Traces in Software Maintenance
2011 25th Brazilian Symposium on Software Engineering, 2011One of the most frequent problems faced by software maintainers is to find the location of the code related with specific features. This is a costly task because features tend to be scattered in the code. Considering this problem, several approaches for locating features using dynamic analysis have been developed.
Marcelo A Maia
exaly +2 more sources
Adapting system execution traces to support analysis of software system performance properties
Journal of Systems and Software, 2013UNITE is a method and tool that analyzes software system performance properties, e.g., end-to-end response time, throughput, and service time, via system execution traces. UNITE, however, assumes that a system execution trace contains properties (e.g., identifiable keywords, unique message instances, and enough variation among the same event types) to ...
Manjula Peiris, James H. Hill
exaly +2 more sources
Measuring COSMIC Software Size from Functional Execution Traces of Java Business Applications
2014 Joint Conference of the International Workshop on Software Measurement and the International Conference on Software Process and Product Measurement, 2014Functional Size Measurement (FSM) methods aim to measure the size of software by quantifying its functional user requirements. Although FSM is greatly beneficial in software project management, due to involving judgment on the part of the measurer, differences for the same application may occur.
Ayça Tarhan
exaly +2 more sources
The Denotational Basis for Software Execution Tracing
Modelling, Identification and Control / 801: Advances in Computer Science, 2013Software execution tracing is a popular and effective technique, used to support a range of software engineering activities. Nevertheless execution tracing has rarely been the focus of study in its own right, although many case studies and applications have been described.
Brough, Leighton, Bailes, Paul
openaire +2 more sources
Software Evolution Aided by Execution Trace Alignment
2010 Brazilian Symposium on Software Engineering, 2010Several attempts to facilitate understanding the behavior of software systems have been proposed. Nonetheless, there is no widely accepted approach to facilitate understanding software systems with poor documentation with the goal that new developers could contribute with the evolution of these systems. The effort to understand complex systems may be a
Luciana Lourdes Silva +3 more
openaire +1 more source
Executable assertions and timed traces for on-line software error detection
Proceedings of Annual Symposium on Fault Tolerant Computing, 2002The topic of this paper is the detection of errors due to residual faults in software, particularly those with temporary effects. After positioning our approach amongst existing fault tolerance and detection techniques, we propose detection mechanisms for such errors. These mechanisms are designed to detect both data and control flow errors.
Christophe Rabéjac +2 more
openaire +1 more source
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software
Proceedings of the 51st Annual Design Automation Conference, 2014We propose an efficient and effective method to secure software implementations of cryptographic primitives on low-end embedded systems, against passive side-channel attacks relying on the observation of power consumption or electro-magnetic emissions. The proposed approach exploits a modified llvm compiler toolchain to automatically generate a secure ...
AGOSTA, GIOVANNI +3 more
openaire +1 more source
Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution
2013 International Conference on Availability, Reliability and Security, 2013Software vulnerability has long been considered an important threat to the safety of software systems. When source code is accessible, we can get much help from the information of source code to detect vulnerabilities. Static analysis has been used frequently to scan code for errors that cause security problems when source code is available.
Hongzhe Li +3 more
openaire +1 more source

