Sciweavers

HICSS
2011
IEEE
196views Biometrics» more  HICSS 2011»
13 years 4 months ago
XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms
We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity ...
Amit Vasudevan, Ning Qu, Adrian Perrig
ENTCS
2006
123views more  ENTCS 2006»
14 years 14 days ago
Steering of Discrete Event Systems: Control Theory Approach
Runtime verification involves monitoring the system at runtime to check for conformance of the execution trace to user defined safety properties. Typically, run-time verifiers do ...
Arvind Easwaran, Sampath Kannan, Oleg Sokolsky
PTS
2003
127views Hardware» more  PTS 2003»
14 years 1 months ago
An Automata-Based Approach to Property Testing in Event Traces
We present a framework for property testing where a partially ordered execution trace of a distributed system is modeled by a collection of communicating automata. We prove that th...
Hesham Hallal, Sergiy Boroday, Andreas Ulrich, Ale...
CSSE
2008
IEEE
14 years 2 months ago
JThreadSpy: A Tool for Improving the Effectiveness of Concurrent System Teaching and Learning
Both teaching and learning multithreaded ing are complex tasks, due to the abstraction of the concepts, the non-determinism of the scheduler, the impossibility of using classical s...
Giovanni Malnati, Caterina Maria Cuva, Claudia Bar...
DAC
2010
ACM
14 years 3 months ago
Scalable specification mining for verification and diagnosis
Effective system verification requires good specifications. The lack of sufficient specifications can lead to misses of critical bugs, design re-spins, and time-to-market slips. I...
Wenchao Li, Alessandro Forin, Sanjit A. Seshia
IWPSE
2005
IEEE
14 years 6 months ago
Extracting Sequence Diagram from Execution Trace of Java Program
A software system is continuously changed so many times. When we try to change a software, we must understand how the software is implemented, especially about the functions to be...
Koji Taniguchi, Takashi Ishio, Toshihiro Kamiya, S...
ECMDAFA
2007
Springer
100views Hardware» more  ECMDAFA 2007»
14 years 6 months ago
Reverse Engineering Models from Traces to Validate Distributed Systems - An Industrial Case Study
The paper targets the applicability of model-driven methodologies to the validation of complex systems and presents a case study of a mobile radio network. Validation relies on the...
Andreas Ulrich, Alexandre Petrenko
FM
2009
Springer
157views Formal Methods» more  FM 2009»
14 years 7 months ago
Symbolic Predictive Analysis for Concurrent Programs
Abstract. Predictive analysis aims at detecting concurrency errors during runtime by monitoring a concrete execution trace of a concurrent program. In recent years, various models ...
Chao Wang, Sudipta Kundu, Malay K. Ganai, Aarti Gu...
TACAS
2010
Springer
221views Algorithms» more  TACAS 2010»
14 years 7 months ago
Trace-Based Symbolic Analysis for Atomicity Violations
Abstract. We propose a symbolic algorithm to accurately predict atomicity violations by analyzing a concrete execution trace of a concurrent program. We use both the execution trac...
Chao Wang, Rhishikesh Limaye, Malay K. Ganai, Aart...
ICSE
2004
IEEE-ACM
15 years 16 days ago
Using Compressed Bytecode Traces for Slicing Java Programs
Dynamic slicing is a well-known program debugging technique. Given a program P and input I, it finds all program statements which directly/indirectly affect the values of some var...
Tao Wang, Abhik Roychoudhury