Results 21 to 30 of about 100,126 (270)
Simplifying the Structural Complexity of Software Systems
Simplification of execution traces is peculiarly important in the case of software comprehension. The objective is to make execution traces in ways that are more tractable and less difficult.
Al-Rousan Thamer, Abualese Hasan
doaj +1 more source
Analysis of Software Countermeasures for Whitebox Encryption
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the whitebox model where the adversary has full access to the execution environment.
Subhadeep Banik +3 more
doaj +1 more source
Trace checking of Metric Temporal Logic with Aggregating Modalities using MapReduce [PDF]
Modern complex software systems produce a large amount of execution data, often stored in logs. These logs can be analyzed using trace checking techniques to check whether the system complies with its requirements specifications.
A. Mrad +8 more
core +3 more sources
SELF-ADAPTIVE SOFTWARE DESIGN BASED ON THE COMPUTING PROCESS’S TRACE TECHNOLOGY
Background. The problem of creating a universal technology for the development of self-adaptive software (SW) has become more and more urgent in recent years, due to the breadth of application of complex software systems and high requirements for ...
A. S. Bozhday +2 more
doaj +1 more source
Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes
Analysis on the modularity of software network plays a critical role in the detection of software vulnerabilities and in the improvement of software stability, reliability, and robustness.
Bing Zhang +4 more
doaj +1 more source
Learning Concise Models from Long Execution Traces
models of system-level behaviour have applications in design exploration, analysis, testing and verification. We describe a new algorithm for automatically extracting useful models, as automata, from execution traces of a HW/SW system driven by software ...
Jeppu, Natasha Yogananda +3 more
core +1 more source
Statistical Reliability Estimation of Microprocessor-Based Systems [PDF]
What is the probability that the execution state of a given microprocessor running a given application is correct, in a certain working environment with a given soft-error rate?
Benso, Alfredo +5 more
core +2 more sources
CacheZoom: How SGX Amplifies The Power of Cache Attacks [PDF]
In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced.
D Brumley +16 more
core +2 more sources
Anytime system level verification via parallel random exhaustive hardware in the loop simulation [PDF]
System level verification of cyber-physical systems has the goal of verifying that the whole (i.e., software + hardware) system meets the given specifications.
MANCINI, Toni +4 more
core +1 more source
ATOS: Adaptive Program Tracing With Online Control Flow Graph Support
Program tracing solutions (i.e., tracers) can faithfully record runtime information about a program's execution and enable flexible and powerful offline analysis.
He Sun +5 more
doaj +1 more source

