A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
Monitoring software requirements using instrumented code
Proceedings of the 35th Annual Hawaii International Conference on System Sciences
Moreover, derivation of software from requirements is error prone. Finally, the installation and use of compiled software can introduce errors. ...
Each are represented as Java programs which are then instrumented and monitored. tion, I, within the scope of environment E and monitor M, exhibits the required behaviors, R, or a notification N is provided ...
Typically, the source code of software is instrumented. However, it is also possible to instrument compiled code (e.g., [15] ). ...
doi:10.1109/hicss.2002.994468
dblp:conf/hicss/Robinson02
fatcat:3dntmm7m55cnxa6jme23qbc64a
Gamma system
2002
Software engineering notes
The Gamma system facilitates remote monitoring of deployed software using a revolutionary approach that exploits the opportunities presented by a software product being used by many users connected through ...
Gamma splits monitoring tasks across different instances of the software, so that partial information can be collected from different users by means of light-weight instrumentation, and integrated to gather ...
Michal Young provided the tool Gretel, which we used for statement-level conditional instrumentation. Taweesup Apiwattanapong, James F. ...
doi:10.1145/566172.566182
dblp:conf/issta/OrsoLHL02
fatcat:3ap37r6mbnhkhfhgedxtnsdxci
Gamma system
2002
Software engineering notes
The Gamma system facilitates remote monitoring of deployed software using a revolutionary approach that exploits the opportunities presented by a software product being used by many users connected through ...
Gamma splits monitoring tasks across different instances of the software, so that partial information can be collected from different users by means of light-weight instrumentation, and integrated to gather ...
Michal Young provided the tool Gretel, which we used for statement-level conditional instrumentation. Taweesup Apiwattanapong, James F. ...
doi:10.1145/566171.566182
fatcat:m5xw3ndcrbhhna6oxteujkcxeq
Gamma system
2002
Software engineering notes
The Gamma system facilitates remote monitoring of deployed software using a revolutionary approach that exploits the opportunities presented by a software product being used by many users connected through ...
Gamma splits monitoring tasks across different instances of the software, so that partial information can be collected from different users by means of light-weight instrumentation, and integrated to gather ...
Michal Young provided the tool Gretel, which we used for statement-level conditional instrumentation. Taweesup Apiwattanapong, James F. ...
doi:10.1145/566180.566182
fatcat:exsfqpjhenejjfpfi6lbfupk74
Automatic aspectization of systemC
2012
Proceedings of the 2012 workshop on Modularity in Systems Software - MISS '12
The correct behavior of the model can then be specified by forming temporal formulas and clock expressions using these primitives, without requiring manual instrumentation of the user code. ...
We propose a framework for automatically instrumenting user code and exposing its state and syntax via automatically generated Aspect-Oriented Programming code and direct instrumentation. ...
Requiring extensive code instrumentation is also highly problematic from a software-engineering perspective. ...
doi:10.1145/2162024.2162029
fatcat:iyw6crkxsze5rk4snb74ptwyiq
An Online Monitoring Approach for Web Service Requirements
2009
IEEE Transactions on Services Computing
This paper introduces an online monitoring approach for Web service requirements. ...
One of these challenges is to ensure the behavior of Web services consistent with their requirements. Monitoring events that are relevant to Web service requirements is, thus, an important technique. ...
Instrumentation is the most widely used monitoring mechanism. It is also widely used in program testing. In this approach, the monitoring code is embedded inside the target code. ...
doi:10.1109/tsc.2009.22
fatcat:26mjusjb5vhyppdiv4avjjggcq
Exploiting hardware advances for software testing and debugging
2011
Proceeding of the 33rd international conference on Software engineering - ICSE '11
Despite the emerging ubiquity of hardware monitoring mechanisms and prior research work in other fields, the applicability and usefulness of hardware monitoring mechanisms have not been fully scrutinized ...
for software engineering. ...
Fault localization requires the identification of suspicious code that may contain bugs. ...
doi:10.1145/1985793.1985935
dblp:conf/icse/SoffaWM11
fatcat:3r32cbpcszgrppjstf3ynsbape
Concepts from Deadline Non-Intrusive Monitoring
1999
IFAC Proceedings Volumes
The intrusive e ects of software monitoring can be minimized by the use of idle time that can be identi ed by static analysis methods. ...
A real-time system must be monitored in a fashion that does not a ect its deadlines. Current software monitors are intrusive on the observed process. ...
Software engineering methods such as formal veri cation techniques have been used to insure the correctness of real-time code. ...
doi:10.1016/s1474-6670(17)39964-0
fatcat:pl3zlpyaxfdp5l3kwrgfdijkh4
THeME: a system for testing by hardware monitoring events
2012
Proceedings of the 2012 International Symposium on Software Testing and Analysis - ISSTA 2012
The overhead of test coverage analysis is dominated by monitoring the application, which is traditionally performed using instrumentation. ...
The results show that up to 90% of the actual coverage can be determined with less time overhead and negligible code growth compared to instrumentation. ...
In addition, using hardware performance monitors in lieu of instrumentation incurs no code growth and does not require recompilation. ...
doi:10.1145/2338965.2336755
dblp:conf/issta/Walcott-JusticeMS12
fatcat:rjoubgs6vvht7lhrwvc3sfjzfi
An Investigation of the Monitoring Activity in Self Adaptive Systems
2016
International Journal of Software Engineering & Applications
Runtime monitoring is essential for the violation detection during the underlying software system execution. ...
and control and data flow between them; (2) the standard interface of the monitoring component with other MAPE-K components; (3) the adaptive monitoring and its importance to the monitoring overhead issue ...
Byte Code Instrumentation. ...
doi:10.5121/ijsea.2016.7603
fatcat:2gcpjo7zyrcefj52sahvz2xyum
Instrument front-ends at Fermilab during Run II
2011
Journal of Instrumentation
This paper describes the implementation of the two main systems used: National Instruments LabVIEW running on PCs, and WindRiver's VxWorks real-time operating system running in a VME crate processor. ...
The optimization of an accelerator relies on the ability to monitor the behavior of the beam in an intelligent and timely fashion. ...
Acknowledgments We would like to thank all those who have made instrument front-ends in the Run II era. ...
doi:10.1088/1748-0221/6/11/t11004
fatcat:yzfonohv3fh2tbqzwq564o6fxe
Model-Based Performance Instrumentation of Distributed Applications
[chapter]
2008
Lecture Notes in Computer Science
Integrating performance instrumentation capabilities into the Model Driven Software Development (MDSD) process would greatly assist software engineers who do not have detailed knowledge of source code ...
Based on suitable code generation templates, the annotated models are transformed into instrumented source code for different instrumentation APIs. ...
This enables software designers to define performance monitoring capabilities in UML application models during the design phase without detailed knowledge of the instrumentation technologies that are used ...
doi:10.1007/978-3-540-68642-2_17
fatcat:4lbaluiyfjatvkusrsqo4k4jte
A dynamic instrumentation tool for obtaining software logs
2020
Journal of Physics, Conference Series
This tool does not require users to be familiar with the software, and the instrumentation process will not cause an intrusive impact on the source code. ...
Compared with the software analysis based on source code, log based software analysis technology has gradually emerged in recent years, but it is not easy to obtain the log of software. ...
As a result, we need to insert the monitored code for all member methods in the software.
Strategies of instrument monitored code. ...
doi:10.1088/1742-6596/1684/1/012056
fatcat:hhhryqyfpndanfmcfwzgqaq6wm
CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers
[chapter]
2017
Lecture Notes in Computer Science
Its binary instrumentation approach preserves the memory layout of the target MCU software, allowing pre-built bare-metal binary code to be protected by CaRE. ...
CaRE uses a novel way of protecting the CFI metadata by leveraging TrustZone-M security extensions introduced in the ARMv8-M architecture. ...
Thus, the Branch Monitor provides complete mediation of instrumented non-secure state code. ...
doi:10.1007/978-3-319-66332-6_12
fatcat:46pijrpwjbhhzo5vovgzxivd3e
Runtime verification and monitoring of embedded systems
2007
IET Software
Established and emerging approaches for the monitoring of software execution using execution monitors are reviewed, with an emphasis on the approaches that are best suited for use with embedded systems ...
A number of existing runtime verification tools are referenced, highlighting their requirement for monitoring solutions. ...
This is termed instrumentation, and the added code can be regarded as 'software probes'. ...
doi:10.1049/iet-sen:20060076
fatcat:qyrpypp4ubgtdcsfdopnbko3g4
« Previous
Showing results 1 — 15 out of 235,387 results