Tracing (software)

Known as: Event logging, Tracing 
In software engineering, tracing involves a specialized use of logging to record information about a program's execution. This information is… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Social data in digital form, which includes user-generated content, expressed or implicit relationships between people, and… (More)
  • table I
Is this relevant?
Review
2016
Review
2016
Rapid advance of location acquisition technologies boosts the generation of trajectory data, which track the traces of moving… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Review
2016
Review
2016
Video tampering is a process of malicious alteration of video content, so as to conceal an object, an event or change the meaning… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The Proposition Bank project takes a practical approach to semantic representation, adding a layer of predicate-argument… (More)
  • figure 1
  • table 3
  • table 4
  • table 6
  • table 7
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These… (More)
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We examine a rendering system that interactively ray traces n image on a conventional multiprocessor. The implementation i s… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
A set of simple new procedures has been developed to enable the real-time manipulation of speech parameters. The proposed method… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1994
Highly Cited
1994
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
Highly Cited
1994
Highly Cited
1994
This paper describes algorithms for inserting monitoring code to profile and trace programs. These algorithms greatly reduce the… (More)
  • figure 2
  • figure 4
  • figure 5
  • figure 7
  • figure 8
Is this relevant?
Highly Cited
1978
Highly Cited
1978
A theory of memory retrieval is developed and is shown to apply over a range of experimental paradigms. Access to memory traces… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?