Sciweavers

981 search results - page 11 / 197
» Semantics-aware trace analysis
Sort
View
ICALP
2001
Springer
15 years 4 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
72
Voted
ICCD
2002
IEEE
79views Hardware» more  ICCD 2002»
15 years 8 months ago
TAXI: Trace Analysis for X86 Interpretation
Although x86 processors have been around for a long time and are the most ubiquitous processors in the world, the amount of academic research regarding details of their performanc...
Stevan A. Vlaovic, Edward S. Davidson
ICALT
2006
IEEE
15 years 5 months ago
Trace Analysis in Instrumented Collaborative Learning Environments
Observation activity, on instrumented collective learning situations, enables participants to appropriate themselves corresponding systems in their own practice. In this paper, we...
Christophe Courtin, Stephane Talbot
89
Voted
PEWASUN
2008
ACM
15 years 1 months ago
Modular network trace analysis
In this paper we present EDAT, a tool designed for the analysis of trace files from network simulations and experiments. The EDAT framework encapsulates analysis steps in extensib...
Wolfgang Kieß, Nadine Chmill, Ulrich Wittels...
73
Voted
DAC
2003
ACM
16 years 19 days ago
Automatic trace analysis for logic of constraints
Verification of system designs continues to be a major challenge today. Simulation remains the primary tool for making sure that implementations perform as they should. We present...
Xi Chen, Harry Hsieh, Felice Balarin, Yosinori Wat...