Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,385,854 papers from all fields of science
Search
Sign In
Create Free Account
Stack trace
Known as:
Stack walking
, Trace
, Stack traces
Expand
In computing, a stack trace (also called stack backtrace or stack traceback) is a report of the active stack frames at a certain point in time during…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Anti-pattern
Assertion (software development)
Breakpoint
C++
Expand
Broader (1)
Debugging
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Static optimization in PHP 7
N. Popov
,
Biagio Cosenza
,
B. Juurlink
,
Dmitry Stogov
International Conference on Compiler Construction
2017
Corpus ID: 2255563
PHP is a dynamically typed programming language commonly used for the server-side implementation of web applications…
Expand
2016
2016
Hierarchical Program Paths
Chunbai Yang
,
Shangru Wu
,
W. Chan
ACM Transactions on Software Engineering and…
2016
Corpus ID: 17676975
Complete dynamic control flow is a fundamental kind of execution profile about program executions with a wide range of…
Expand
2016
2016
Towards Advanced Debugging Support for Actor Languages Studying Concurrency Bugs in Actor-based Programs
Carmen Torres Lopez
,
Stefan Marr
2016
Corpus ID: 52217070
With the ubiquity of multicore hardware, concurrent and parallel programming has become a fundamental part of software…
Expand
2012
2012
Report of experiments and evidence for ASC L2 milestone 4467 : demonstration of a legacy application's path to exascale.
Brian W. Barrett
,
R. Barrett
,
+22 authors
Kyle B. Wheeler
2012
Corpus ID: 60613579
This report documents thirteen of Sandia's contributions to the Computational Systems and Software Environment (CSSE) within the…
Expand
2009
2009
Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid
Serguei A. Mokhov
,
J. Paquet
,
M. Debbabi
Huntsville Simulation Conference
2009
Corpus ID: 6063111
This work-in-progress focuses on the refinement of application of the intensional logic to cyberforensic analysis and its…
Expand
2009
2009
Fortifying Applications Against Xpath Injection Attacks
Dimitris Mitropoulos
,
Vassilios Karakoidas
,
D. Spinellis
Mediterranean Conference on Information Systems
2009
Corpus ID: 11284886
Code injection derives from a software vulnerability that allows a malicious user to inject custom code into the server engine…
Expand
Highly Cited
2006
Highly Cited
2006
Predicting failures of computer systems: a case study for a telecommunication system
Felix Salfner
,
Michael Schieschke
,
M. Malek
Proceedings 20th IEEE International Parallel…
2006
Corpus ID: 2382323
The goal of online failure prediction is to forecast imminent failures while the system is running. This paper compares similar…
Expand
2006
2006
Using Limited Dependence Sequential Expansion for Decompressing Test Vectors
Avijit Dutta
,
N. Touba
IEEE International Test Conference
2006
Corpus ID: 12640891
Existing techniques that incorporate decompressor constraints in the ATPG search/backtrace (e.g., Illinois scan) are based on…
Expand
2005
2005
Non-Backtrace Backward Chaining Dynamic Composition of Web Services Based on Mediator
Jiamao Liu
,
Gu Ning
,
S. Baile
2005
Corpus ID: 62168258
1993
1993
Computation of floating mode delay in combinational circuits: practice and implementation
S. Devadas
,
K. Keutzer
,
S. Malik
,
Albert R. Wang
IEEE Trans. Comput. Aided Des. Integr. Circuits…
1993
Corpus ID: 1001036
Delay computation in combinational logic circuits is complicated by the existence of unsensitizable (false) paths and this…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE