Výsledky vyhledávání - "ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing"
-
1
Autoři: a další
Přispěvatelé: a další
Zdroj: SLE 2021 - 14th International Conference on Software Language Engineering ; https://inria.hal.science/hal-03358061 ; SLE 2021 - 14th International Conference on Software Language Engineering, Oct 2021, Chicago, United States. pp.1-14, ⟨10.1145/3486608.3486906⟩
Témata: executable DSLs, runtime monitoring, logging, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.6: Monitors, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]
Geografické téma: Chicago, United States
-
2
Autoři: a další
Přispěvatelé: a další
Zdroj: Theory and Practice of Logic Programming. 2:611-643
Témata: test coverage, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.2: Language Classifications/D.3.2.2: Constraint and logic languages, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL], ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, General topics in the theory of software, automated debugging, Mercury program, Logic programming, [INFO.INFO-PL] Computer Science [cs]/Programming Languages [cs.PL]
Popis souboru: application/xml
Přístupová URL adresa: https://hal.inria.fr/inria-00072264/file/RR-4323.pdf
https://zbmath.org/2048586
https://doi.org/10.1017/s1471068402001461
https://www.cambridge.org/core/journals/theory-and-practice-of-logic-programming/article/generic-program-monitoring-by-trace-analysis/F639A6554EBA625CC06388EF91374227
https://dblp.uni-trier.de/db/journals/tplp/tplp2.html#JahierD02
https://hal.inria.fr/inria-00072264/document
https://hal.inria.fr/inria-00072264
https://inria.hal.science/hal-00756826v1 -
3
Autoři: a další
Přispěvatelé: a další
Zdroj: The Journal of Logic Programming. 43:157-172
Témata: [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL], Logic, Program instrumentation, 02 engineering and technology, tracing, Prolog debugging, Logic programming, [INFO.INFO-PL] Computer Science [cs]/Programming Languages [cs.PL], ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.2: Language Classifications/D.3.2.2: Constraint and logic languages, Benchmarking, source to source transformation, Prolog, Prolog system, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, 0202 electrical engineering, electronic engineering, information engineering, Debugging, benchmarking
Popis souboru: application/xml
Přístupová URL adresa: https://zbmath.org/1439852
https://doi.org/10.1016/s0743-1066(99)00061-8
https://dblp.uni-trier.de/db/journals/jlp/jlp43.html#DucasseN00
https://hal.inria.fr/hal-00756827
http://www.sciencedirect.com/science/article/pii/S0743106699000618
https://www.sciencedirect.com/science/article/pii/S0743106699000618
https://inria.hal.science/hal-00756827v1 -
4
Autoři: a další
Přispěvatelé: a další
Zdroj: ESORICS - 17th European Symposium on Research in Computer Security - 2012 ; https://inria.hal.science/hal-00762252 ; ESORICS - 17th European Symposium on Research in Computer Security - 2012, Sep 2012, Pisa, Italy. pp.806-823, ⟨10.1007/978-3-642-33167-1⟩
Témata: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, finite state automaton, formal language, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
5
Autoři: a další
Přispěvatelé: a další
Zdroj: 6th workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems 2011 (ICOOOLPS 2011)
https://inria.hal.science/inria-00613720
6th workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems 2011 (ICOOOLPS 2011), Ian Rogers, Jul 2011, Lancaster, United KingdomTémata: Dynamic, Bytecode, Instrumentation, Java, Tracing, Program Analysis, JRE, ACM: D.: Software/D.1: PROGRAMMING TECHNIQUES/D.1.5: Object-oriented Programming, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.2: Design Tools and Techniques/D.2.2.5: Object-oriented design methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.3: Coding Tools and Techniques/D.2.3.0: Object-oriented programming, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]
Geografické téma: Lancaster, United Kingdom
-
6
Autoři: a další
Přispěvatelé: a další
Zdroj: 1st International Conference on Runtime Verification
https://inria.hal.science/inria-00536500
1st International Conference on Runtime Verification, Howard Barringer, Klaus Havelund, Insup Lee, Nov 2010, St. Julians, Malta. pp.168-182, ⟨10.1007/978-3-642-16612-9_14⟩Témata: behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, Malware, behavior abstraction, string rewriting, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Geografické téma: St. Julians, Malta
-
7
Autoři: a další
Přispěvatelé: a další
Zdroj: 5th International Conference on Malicious and Unwanted Software
https://inria.hal.science/inria-00538376
5th International Conference on Malicious and Unwanted Software, Fernando C. Colón Osorio, Oct 2010, Nancy, FranceTémata: malware, packing, self-modifying code, slicing techniques, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
8
Autoři: a další
Přispěvatelé: a další
Zdroj: https://inria.hal.science/hal-00803412 ; [Research Report] 2013.
Témata: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, probability, weight, finite state automaton, formal language, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
9
Autoři: a další
Přispěvatelé: a další
Zdroj: https://inria.hal.science/inria-00594396 ; [Research Report] 2011.
Témata: behavioral analysis, malware detection, behavior abstraction, model checking, temporal logic, term rewriting, static analysis, information leak, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
10
Autoři: a další
Přispěvatelé: a další
Zdroj: https://inria.hal.science/inria-00509486 ; 2010.
Témata: malware, behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
11
Autoři: a další
Přispěvatelé: a další
Zdroj: https://inria.hal.science/inria-00547884 ; [Research Report] 2010.
Témata: malware, behavioral detection, abstraction, trace, term rewriting, finite state automaton, formal language, dynamic binary instrumentation, temporal logic, information leak, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
12
Autoři: a další
Přispěvatelé: a další
Zdroj: https://hal.inria.fr/inria-00443635 ; [Research Report] RR-7165, INRIA. 2009, pp.53.
Témata: Trace, CHR, CHRor, CHROME, CHROME-REF, Tracer, Meta-Theory, Model Driven Engineering, Tracer Driver, Analysis Tool, Program Analysis, Observational Semantics, Software Component, Debugging, Programming Environment, Logic Programming, Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.2: Design Tools and Techniques, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/1001.2188; Report N°: RR-7165; inria-00443635; https://hal.inria.fr/inria-00443635; https://hal.inria.fr/inria-00443635/document; https://hal.inria.fr/inria-00443635/file/report.pdf; ARXIV: 1001.2188
-
13
Autoři: a další
Přispěvatelé: a další
Zdroj: https://inria.hal.science/inria-00151285 ; [Interne] RR-6229, INRIA. 2007, pp.54.
Témata: trace, tracer, tracer driver, analyser, analyser manager, observational semantics, trace adequation, software engineering, debugging, programming environment, Byrd's trace, Prolog, Prolog debugging, box model, trace validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.12: Interoperability/D.2.12.2: Interface definition languages, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.6: Programming Environments/D.2.6.2: Interactive environments, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE], [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/0706.3159; ARXIV: 0706.3159
-
14
Autoři: a další
Přispěvatelé: a další
Zdroj: 25th International Conference on Logic Programming
https://inria.hal.science/hal-00756837
25th International Conference on Logic Programming, 2009, Pasadena, United StatesTémata: ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.1: Debugging aids, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.2: Language Classifications/D.3.2.2: Constraint and logic languages, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE], [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
Geografické téma: United States
Time: Pasadena, United States
Dostupnost: https://inria.hal.science/hal-00756837
-
15
Autoři: a další
Přispěvatelé: a další
Zdroj: International Conference on Automated Software Engineering ; https://inria.hal.science/hal-00756834 ; International Conference on Automated Software Engineering, 2005, Long Beach, United States
Témata: ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.1: Debugging aids, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]
Geografické téma: Long Beach, United States
Dostupnost: https://inria.hal.science/hal-00756834
-
16
Autoři: a další
Přispěvatelé: a další
Zdroj: International Conference on Logic Programming ; https://inria.hal.science/hal-00756836 ; International Conference on Logic Programming, 2003, Mumbay, India
Témata: ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.2: Diagnostics, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.2: Language Classifications/D.3.2.2: Constraint and logic languages, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE], [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
Dostupnost: https://inria.hal.science/hal-00756836
-
17
Autoři: a další
Přispěvatelé: a další
Zdroj: ISSN: 1471-0684.
Témata: ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.3: Language Constructs and Features/D.3.3.3: Constraints, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.1: Debugging aids, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
Dostupnost: https://inria.hal.science/hal-00756824
-
18
Autoři: a další
Přispěvatelé: a další
Zdroj: ISSN: 0743-1066 ; Journal of Logic Programming ; https://inria.hal.science/hal-00756827 ; Journal of Logic Programming, 2000.
Témata: Debugging, tracing, source to source transformation, benchmarking, Prolog, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.2: Language Classifications/D.3.2.2: Constraint and logic languages, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
Dostupnost: https://inria.hal.science/hal-00756827
-
19
Autoři: a další
Přispěvatelé: a další
Zdroj: ISSN: 0743-1066 ; Journal of Logic Programming ; https://inria.hal.science/hal-00756828 ; Journal of Logic Programming, 1999.
Témata: Prolog, Software Engineering, Automated Debugging, Trace Query Language, Program Execution Analysis, Abstract Views of Program Executions, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.1: Debugging aids, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.2: Language Classifications/D.3.2.2: Constraint and logic languages, [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
Dostupnost: https://inria.hal.science/hal-00756828
Nájsť tento článok vo Web of Science
Full Text Finder