نتایج جستجو برای: deviation of program execution

تعداد نتایج: 21207786  

1993
Tarun Arora Raghu Ramakrishnan William G. Roth Praveen Seshadri Divesh Srivastava

Programs in deductive database and programming systems have a natural meaning that is based upon their mathematical reading as logical rules. High-leveìexplanations' of a program evaluation/execution can be constructed to provide added functionality: (1) To debug a program by following a chain of deductions leading to an unexpected (and possibly incorrect) conclusion; (2) To follow the derivati...

2000
Pawel Czarnul Henryk Krawczyk

A new model of process migration is considered. There are three classes of events which could initialize the reassignment procedure: new processes spawnings or terminations, significant increases of nodes’ loads by users and unexpected changes of application and system configurations. Based on these parameters suitable migration rules are defined to achieve good load balancing of a computing pl...

2011
Joxan Jaffar Jorge A. Navas Andrew E. Santosa

Symbolic execution with interpolation is emerging as an alternative to CEGAR for software verification. The performance of both methods relies critically on interpolation in order to obtain the most general abstraction of the current symbolic or abstract state which can be shown to remain error-free. CEGAR naturally handles unbounded loops because it is based on abstract interpretation. In cont...

Journal: :Information 2017
Matús Sulír Jaroslav Porubän

Automated source code documentation approaches often describe methods in abstract terms, using the words contained in the static source code or code excerpts from repositories. In this paper, we describe DynamiDoc: a simple automated documentation generator based on dynamic analysis. Our representation-based approach traces the program being executed and records string representations of concre...

1988
Hiralal Agrawal Richard A. DeMillo Eugene H. Spafford

An execution backtracking facility in interactive source debuggers allows users to mirror their thought processes while debugging — working backwards from the location where an error is manifested and determining the conditions under which the error occurred. Such a facility also allows a user to change program characteristics and reexecute from arbitrary points within the program under examina...

2003
Benjie Chen Robert Tappan Morris

Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and a μ-kernel to protect programs from each other and from hardware attacks. The μ-kernel partitions programs into separate address spaces, and the CPU applies memory protection to ensure that programs can only use their o...

2007
David Lo Siau-Cheng Khoo Chao Liu

Software evolution incurs difficulties in program comprehension and software verification, and hence increases the cost of software maintenance. In this study, we propose a novel technique, to mine from program execution traces a sound and complete set of statistically significant temporal rules of arbitrary lengths. The extracted temporal rules reveal invariants that the program observes, and ...

2012
Gilles Barthe Juan Manuel Crespo Dominique Devriese Frank Piessens Exequiel Rivas

Secure multi-execution (SME) is a dynamic technique to ensure secure information flow. In a nutshell, SME enforces security by running one execution of the program per security level, and by reinterpreting input/output operations w.r.t. their associated security level. SME is sound, in the sense that the execution of a program under SME is non-interfering, and precise, in the sense that for pro...

2014
Gagan Gupta Srinath Sridharan Gurindar S. Sohi

As uniprocessor performance fails to improve at the erstwhile rates, computer architects are turning to multicore architectures to stay on the performance curve. Parallel programming holds the key to unlocking the performance benefits of such architectures. Conventional parallel programming models require programmers to abandon the well established sequential programming paradigm, and write par...

2003
Vladimir Kiriansky Derek Bruening Saman Amarasinghe

Nearly all security attacks have one thing in common: they coerce the target program into performing actions that it was never intended to perform. In short, they violate the program’s execution model. The execution model encompasses the Application Binary Interface (ABI), higher-level specifications from the program’s source programming language, and components specific to the program — for ex...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید