Sciweavers

HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
13 years 6 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig
ENTCS
2006
123views more  ENTCS 2006»
14 years 2 months ago
Steering of Discrete Event Systems: Control Theory Approach
Runtime verification involves monitoring the system at runtime to check for conformance of the execution trace to user defined safety properties. Typically, run-time verifiers do ...
Arvind Easwaran, Sampath Kannan, Oleg Sokolsky
PTS
2003
127views Hardware» more  PTS 2003»
14 years 3 months ago
An Automata-Based Approach to Property Testing in Event Traces
We present a framework for property testing where a partially ordered execution trace of a distributed system is modeled by a collection of communicating automata. We prove that th...
Hesham Hallal, Sergiy Boroday, Andreas Ulrich, Ale...
CSSE
2008
IEEE
14 years 4 months ago
JThreadSpy: A Tool for Improving the Effectiveness of Concurrent System Teaching and Learning
Both teaching and learning multithreaded ing are complex tasks, due to the abstraction of the concepts, the non-determinism of the scheduler, the impossibility of using classical s...
Giovanni Malnati, Caterina Maria Cuva, Claudia Bar...
DAC
2010
ACM
14 years 5 months ago
Scalable specification mining for verification and diagnosis
Effective system verification requires good specifications. The lack of sufficient specifications can lead to misses of critical bugs, design re-spins, and time-to-market slips. I...
Wenchao Li, Alessandro Forin, Sanjit A. Seshia
IWPSE
2005
IEEE
14 years 8 months ago
Extracting Sequence Diagram from Execution Trace of Java Program
A software system is continuously changed so many times. When we try to change a software, we must understand how the software is implemented, especially about the functions to be...
Koji Taniguchi, Takashi Ishio, Toshihiro Kamiya, S...
ECMDAFA
2007
Springer
100views Hardware» more  ECMDAFA 2007»
14 years 8 months ago
Reverse Engineering Models from Traces to Validate Distributed Systems - An Industrial Case Study
The paper targets the applicability of model-driven methodologies to the validation of complex systems and presents a case study of a mobile radio network. Validation relies on the...
Andreas Ulrich, Alexandre Petrenko
FM
2009
Springer
157views Formal Methods» more  FM 2009»
14 years 9 months ago
Symbolic Predictive Analysis for Concurrent Programs
Abstract. Predictive analysis aims at detecting concurrency errors during runtime by monitoring a concrete execution trace of a concurrent program. In recent years, various models ...
Chao Wang, Sudipta Kundu, Malay K. Ganai, Aarti Gu...
TACAS
2010
Springer
221views Algorithms» more  TACAS 2010»
14 years 9 months ago
Trace-Based Symbolic Analysis for Atomicity Violations
Abstract. We propose a symbolic algorithm to accurately predict atomicity violations by analyzing a concrete execution trace of a concurrent program. We use both the execution trac...
Chao Wang, Rhishikesh Limaye, Malay K. Ganai, Aart...
ICSE
2004
IEEE-ACM
15 years 2 months ago
Using Compressed Bytecode Traces for Slicing Java Programs
Dynamic slicing is a well-known program debugging technique. Given a program P and input I, it finds all program statements which directly/indirectly affect the values of some var...
Tao Wang, Abhik Roychoudhury