咨询与建议

限定检索结果

文献类型

  • 4 篇 会议

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 电子科学与技术(可...

主题

  • 4 篇 program dynamic ...
  • 1 篇 profiling
  • 1 篇 deterministic re...
  • 1 篇 program visualis...
  • 1 篇 heuristical clus...
  • 1 篇 program diagnost...
  • 1 篇 reverse engineer...
  • 1 篇 probe effect
  • 1 篇 trace data volum...
  • 1 篇 embedded softwar...
  • 1 篇 pattern clusteri...
  • 1 篇 program specific...
  • 1 篇 euclidian distan...
  • 1 篇 program instrume...
  • 1 篇 event execution ...

机构

  • 2 篇 electric power d...
  • 1 篇 univ antwerp dep...
  • 1 篇 arizona state un...
  • 1 篇 production techn...

作者

  • 2 篇 yang shi
  • 2 篇 huijia ye
  • 2 篇 juwei rao
  • 2 篇 zhihua li
  • 1 篇 zaidman a
  • 1 篇 demeyer s
  • 1 篇 song young wn
  • 1 篇 lee yann-hang

语言

  • 4 篇 英文
检索条件"主题词=program dynamic analysis"
4 条 记 录,以下是1-10 订阅
排序:
dynamic analysis of Embedded Software using Execution Replay  17
Dynamic Analysis of Embedded Software using Execution Replay
收藏 引用
17th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC)
作者: Song, Young Wn Lee, Yann-Hang Arizona State Univ Comp Sci & Engn Tempe AZ 85281 USA
For program optimization and debugging, dynamic analysis tools, e.g., profiler, data race detector, are widely used. To gather execution information, software instrumentation is often employed for its portability and ... 详细信息
来源: 评论
Managing trace data volume through a heuristical clustering process based on event execution frequency
Managing trace data volume through a heuristical clustering ...
收藏 引用
8th European Conference on Software Maintenance and Reengineering (CSMR 2004)
作者: Zaidman, A Demeyer, S Univ Antwerp Dept Math & Comp Sci Lab On Reengn B-2020 Antwerp Belgium
To regain architectural insight into a program using dynamic analysis, one of the major stumbling blocks remains the large amount of trace data collected. Therefore, this paper Proposes a heuristic which divides the t... 详细信息
来源: 评论
ProExtor: Mining API Protocols for program Vulnerability Detection
ProExtor: Mining API Protocols for Program Vulnerability Det...
收藏 引用
作者: Huijia Ye Juwei Rao Yang Shi Zhihua Li Electric Power Dispatching Control Center Meizhou Power Supply Bureau Production Technology Department Meizhou Power Supply Bureau
API protocols play an important role in program verification, testing, evolution and other phases of the software development process. Many approaches have been proposed to mine API protocols automatically from progra... 详细信息
来源: 评论
ProExtor: Mining API Protocols for program Vulnerability Detection  21
ProExtor: Mining API Protocols for Program Vulnerability Det...
收藏 引用
Proceedings of the 3rd International Conference on Advanced Information Science and System
作者: Huijia Ye Juwei Rao Yang Shi Zhihua Li Electric Power Dispatching Control Center Meizhou Power Supply Bureau China
API protocols play an important role in program verification, testing, evolution and other phases of the software development process. Many approaches have been proposed to mine API protocols automatically from progra... 详细信息
来源: 评论