Results 21 to 30 of about 100,126 (270)

Simplifying the Structural Complexity of Software Systems

open access: yesCybernetics and Information Technologies, 2019
Simplification of execution traces is peculiarly important in the case of software comprehension. The objective is to make execution traces in ways that are more tractable and less difficult.
Al-Rousan Thamer, Abualese Hasan
doaj   +1 more source

Analysis of Software Countermeasures for Whitebox Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the whitebox model where the adversary has full access to the execution environment.
Subhadeep Banik   +3 more
doaj   +1 more source

Trace checking of Metric Temporal Logic with Aggregating Modalities using MapReduce [PDF]

open access: yes, 2014
Modern complex software systems produce a large amount of execution data, often stored in logs. These logs can be analyzed using trace checking techniques to check whether the system complies with its requirements specifications.
A. Mrad   +8 more
core   +3 more sources

SELF-ADAPTIVE SOFTWARE DESIGN BASED ON THE COMPUTING PROCESS’S TRACE TECHNOLOGY

open access: yesИзвестия высших учебных заведений. Поволжский регион:Технические науки, 2020
Background. The problem of creating a universal technology for the development of self-adaptive software (SW) has become more and more urgent in recent years, due to the breadth of application of complex software systems and high requirements for ...
A. S. Bozhday   +2 more
doaj   +1 more source

Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes

open access: yesIEEE Access, 2018
Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness.
Bing Zhang   +4 more
doaj   +1 more source

Learning Concise Models from Long Execution Traces

open access: yes, 2020
models of system-level behaviour have applications in design exploration, analysis, testing and verification. We describe a new algorithm for automatically extracting useful models, as automata, from execution traces of a HW/SW system driven by software ...
Jeppu, Natasha Yogananda   +3 more
core   +1 more source

Statistical Reliability Estimation of Microprocessor-Based Systems [PDF]

open access: yes, 2012
What is the probability that the execution state of a given microprocessor running a given application is correct, in a certain working environment with a given soft-error rate?
Benso, Alfredo   +5 more
core   +2 more sources

CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]

open access: yes, 2017
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley   +16 more
core   +2 more sources

Anytime system level verification via parallel random exhaustive hardware in the loop simulation [PDF]

open access: yes, 2016
System level verification of cyber-physical systems has the goal of verifying that the whole (i.e., software + hardware) system meets the given specifications.
MANCINI, Toni   +4 more
core   +1 more source

ATOS: Adaptive Program Tracing With Online Control Flow Graph Support

open access: yesIEEE Access, 2019
Program tracing solutions (i.e., tracers) can faithfully record runtime information about a program's execution and enable flexible and powerful offline analysis.
He Sun   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy