Capturing program and data traces during program execution unobtrusively in real-time is crucial in debugging and testing of cyber-physical systems. However, tracing a complete program unobtrusively is often cost-proh...
详细信息
ISBN:
(纸本)9781605589039
Capturing program and data traces during program execution unobtrusively in real-time is crucial in debugging and testing of cyber-physical systems. However, tracing a complete program unobtrusively is often cost-prohibitive, requiring large on-chip trace buffers and wide trace ports. Whereas program execution traces can be efficiently compressed in hardware, compression of data address and data value traces is much more challenging due to limited redundancy. In this paper we describe two hardware-based filtering techniques for data traces: cache first-access tracking for load data values and data address filtering using partial register-file replay. the results of our experimental analysis indicate that the proposed filtering techniques can significantly reduce the size of the data traces (similar to 5-20 times for the load data value trace, depending on the data cache size;and similar to 5 times for the data address trace) at the cost of rather small hardware structures in the trace module.
An earthquake hit the Abruzzo region in Italy on April 6th 2009 at 3:32am local time. the earthquake had a moment magnitude of 6.2MW and a shallow focal depth of about 8–9 km. the epicentre was located 10 kmWest of t...
详细信息
As software services become the dominant platform for enterprise computing and B2B/B2C applications, testing their correctness and dependability assumes ever more importance. However, unlike the languages used to defi...
详细信息
In our earlier work, we have investigated the feasibility of utilization of recursive partitioning in basic (BLAS oriented) sparse matrix computations, on multi-core cache-based computers. Following encouraging experi...
详细信息
In a Exploratory Learning Environment users acquire knowledge while freely experiencing the environment. In this setting, it is often hard to identify actions or behaviors as correct or faulty, making it hard to provi...
详细信息
ISBN:
(数字)9783642133886
ISBN:
(纸本)9783642133879
In a Exploratory Learning Environment users acquire knowledge while freely experiencing the environment. In this setting, it is often hard to identify actions or behaviors as correct or faulty, making it hard to provide adaptive support to students who do not learn well withthese environments. In this paper we discuss an approach that uses Class Association Rule mining and a Class Association Rule Classifier to identify relevant interaction patterns and build student models for online classification. We apply the approach to generate a student model for an ELE for AI algorithms and present preliminary results on its effectiveness.
Component Based Software development is used for making the software applications quickly and rapidly. In Component Based Development, the software product is build by gathering different components of existing softwa...
详细信息
Scripting languages such as Python, Perl, Ruby and PHP are increasingly important in new software systems as web technology becomes a dominant force. these languages are often spoken of as having different properties,...
详细信息
Natural language is prevalent in requirements documents. However, ambiguity is an intrinsic phenomenon of natural language, and is therefore present in all such documents. Ambiguity occurs when a sentence can be inter...
详细信息
Gradually, Voice over Internet Protocol (VoIP) has been dominating the telecommunications world. Unfortunately, its applications are injecting a huge number of small packets in the network, which produces high overhea...
详细信息
暂无评论