Sciweavers

981 search results - page 39 / 197
» Semantics-aware trace analysis
Sort
View
IWPC
2000
IEEE
15 years 6 months ago
Tracing Object-Oriented Code into Functional Requirements
Software system documentation is almost always expressed informally, in natural language and free text. Examples include requirement specifications, design documents, manual page...
Giuliano Antoniol, Gerardo Canfora, Andrea De Luci...
MA
2011
Springer
241views Communications» more  MA 2011»
14 years 8 months ago
On the distribution of the ratio of the largest eigenvalue to the trace of a Wishart matrix
The ratio of the largest eigenvalue divided by the trace of a p×p random Wishart matrix with n degrees of freedom and identity covariance matrix plays an important role in variou...
Boaz Nadler
ACSAC
2004
IEEE
15 years 5 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
DSD
2010
IEEE
161views Hardware» more  DSD 2010»
15 years 2 months ago
Design of Trace-Based Split Array Caches for Embedded Applications
—Since many embedded systems execute a predefined set of programs, tuning system components to application programs and data is the approach chosen by many design techniques to o...
Alice M. Tokarnia, Marina Tachibana
CSMR
2004
IEEE
15 years 5 months ago
High-Level Polymetric Views of Condensed Run-time Information
Understanding the run-time behavior of object-oriented legacy systems is a complex task due to factors such as late binding and polymorphism. Current approaches extract and use in...
Stéphane Ducasse, Michele Lanza, Roland Ber...