Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Tracing (software)

Known as: Event logging, Tracing 
In software engineering, tracing involves a specialized use of logging to record information about a program's execution. This information is… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Abstract Labeled data sets are necessary to train and evaluate anomaly-based network intrusion detection systems. This work… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Is this relevant?
Review
2018
Review
2018
Oceanic anoxia—including euxinic settings defined by the presence of water column hydrogen sulfide (H2S)—is minor in the ocean… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
Review
2018
Review
2018
In a contemporary data center, Linux applications often generate a large quantity of real-time system call traces, which are not… Expand
  • figure 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Review
2018
Review
2018
Malicious domains are one of the major resources required for adversaries to run attacks over the Internet. Due to the important… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Reinforcement learning, one of the most active research areas in artificial intelligence, is a computational approach to learning… Expand
  • figure 1.1
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
Is this relevant?
Highly Cited
2004
Highly Cited
2004
This paper describes the parser, especially its mapping rule interpreter, used in KBMT-89. The interpreter is characterized by… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper addresses two unresolved issues about Web caching. The first issue is whether Web requests from a fixed user community… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
1998
Highly Cited
1998
We present a full-sky 100 μm map that is a reprocessed composite of the COBE/DIRBE and IRAS/ISSA maps, with the zodiacal… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • figure 2
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Network arrivals are often modeled as Poisson processes for analytic simplicity, even though a number of traffic studies have… Expand
Is this relevant?
Highly Cited
1978
Highly Cited
1978
A theory of memory retrieval is developed and is shown to apply over a range of experimental paradigms. Access to memory traces… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?