Code Cloning Tracing: A "Pay per Trace" Approach
نویسندگان
چکیده
Code Cloning Tracing is a new software annotation method that makes it possible to collect traces from time consuming applications. To this end, Code Cloning Tracing provides instrumented programs with two execution modes: a low overhead “no-trace collection” mode which serves to position the application in an interesting state with regard to tracing, and a “trace collection” mode. This paper details the Code Cloning Tracing method and presents calvin, our first implementation. On the SPEC95 suite, calvin exhibits low execution slowdown factors in “no-trace collection” mode varying from 1.02 to 2.09.
منابع مشابه
Code Cloning Tracing: a New Approach to Trace Collection
Trace-driven simulation is a widely used technique to evaluate microprocessor architecture and/or memory hierarchy performance. However, software trace collection induces signiicant execution slowdown. As on-line simulation induces an even more disastrous slowdown, simulating applications incurring trillions of instructions can not be considered without trace sampling. Therefore continuous soft...
متن کاملTracing Prolog Programs by Source Instrumentation is Efficient Enough
Tracing by automatic program source instrumentation has major advantages over compiled code instrumentation: it is more portable, it beneets from many compiler optimizations, it produces traces in terms of the original program, and it can be tailored to speciic debugging needs. The usual argument in favor of compiled code instrumentation is its supposed eeciency. We have compared the performanc...
متن کاملEfficient Traitor Tracing Algorithms Using List Decoding
We apply powerful, recently discovered techniques for the list decoding of error-correcting codes to the problem of efficiently tracing traitors. Much work has focused on methods for constructing such traceability schemes, but the complexity of the traitor tracing algorithms has received little attention. A widely used traitor tracing algorithm, the TA algorithm, has a runtime of O(N) in genera...
متن کاملThreshold Traitor Tracing
This work presents threshold tracing schemes. Tracing schemes trace the source of keys which are used in pirate decoders for sensitive or proprietary data (such as pay-TV programs). Previous tracing schemes were designed to operate against any decoder which decrypts with a nonnegligible success probability. We introduce threshold tracing schemes which are only designed to trace the source of ke...
متن کاملScalable communication event tracing via clustering
Communication traces help developers of high-performance computing (HPC) applications understand and improve their codes. When run on large-scale HPC facilities, the scalability of tracing tools becomes a challenge. To address this problem, traces can be clustered into groups of processes that exhibit similar behavior. Instead of collecting trace information of each individual node, it then suf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999