Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,184,745 papers from all fields of science
Search
Sign In
Create Free Account
strace
Known as:
Strace (Unix)
, Xtrace
strace is a diagnostic, debugging and instructional userspace utility for Linux. It is used to monitor interactions between processes and the Linux…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Comparison of privilege authorization features
DNIX
DTrace
Dd (Unix)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Deep Green: Modelling Time-Series of Software Energy Consumption
Stephen Romansky
,
Neil C. Borle
,
S. Chowdhury
,
Abram Hindle
,
R. Greiner
IEEE International Conference on Software…
2017
Corpus ID: 11315392
Inefficient mobile software kills battery life. Yet, developers lack the tools necessary to detect and solve energy bugs in…
Expand
2017
2017
A DSL Approach to Reconcile Equivalent Divergent Program Executions
Luís Pina
,
Daniel Grumberg
,
A. Andronidis
,
Cristian Cadar
USENIX Annual Technical Conference
2017
Corpus ID: 19992567
Multi-Version Execution (MVE) deploys multiple versions of the same program, typically synchronizing their execution at the level…
Expand
2017
2017
App behavioral analysis using system calls
Prajit Kumar Das
,
A. Joshi
,
Timothy W. Finin
Conference on Computer Communications Workshops
2017
Corpus ID: 9679542
System calls provide an interface to the services made available by an operating system. As a result, any functionality provided…
Expand
2016
2016
Forward model with space-variant of source size for reconstruction on x-ray radiographic image
Jin Liu
,
Jun Liu
,
+4 authors
Xuanlang Zhang
2016
Corpus ID: 119279868
2015
2015
Integrity Verification of Applications on Radium Architecture
Mohan Krishna Tarigopula
2015
Corpus ID: 59037990
Trusted Computing capability has become ubiquitous these days, and it is being widely deployed into consumer devices as well as…
Expand
Highly Cited
2014
Highly Cited
2014
The power of system call traces: predicting the software energy consumption impact of changes
Karan Aggarwal
,
Chenlei Zhang
,
Hazel Victoria Campbell
,
Abram Hindle
,
Eleni Stroulia
Conference of the Centre for Advanced Studies on…
2014
Corpus ID: 41475681
Battery is a critical resource for smartphones. Software developers as the builders and maintainers of applications, are…
Expand
2013
2013
Detection of Android API Call Using Logging Mechanism within Android Framework
Yuuki Nishimoto
,
Naoya Kajiwara
,
Shinichi Matsumoto
,
Y. Hori
,
K. Sakurai
Security and Privacy in Communication Networks
2013
Corpus ID: 10967382
Android based smartphones have become popular. Accordingly, many malwares are developed. The malwares target information leaked…
Expand
2011
2011
Stealth malware analysis from kernel space with Kolumbo
J. Desfossez
,
Justine Dieppedale
,
Gabriel Girard
Journal in Computer Virology
2011
Corpus ID: 1818164
Most of today’s malware are able to detect traditional debuggers and change their behavior whenever somebody tries to analyze…
Expand
Review
2005
Review
2005
Software Performance Analysis
M. Dagenais
,
Karim Yaghmour
,
C. Levert
,
M. Pourzandi
arXiv.org
2005
Corpus ID: 1520841
The key to speeding up applications is often understanding where the elapsed time is spent, and why. This document reviews in…
Expand
2004
2004
Testing Multi Input/Output Transition System with All-Observer
Zhongjie Li
,
Jianping Wu
,
Xia Yin
International Conference on Testing (of Software…
2004
Corpus ID: 16852643
Multi input/output transition system (MIOTS) models the interface distribution of a system by partitioning its inputs and outputs…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE