|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn865512054 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
131217s2013 maua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d COO
|d DEBBG
|d DEBSZ
|d OCLCQ
|d OCLCF
|d OCLCQ
|d CEF
|d OCLCA
|d UKBTH
|d E7B
|d GGVRL
|d YDXCP
|d VT2
|d UHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 859158938
|a 1113565740
|a 1113600941
|a 1129377857
|
020 |
|
|
|a 9780124081093
|
020 |
|
|
|a 0124081096
|
020 |
|
|
|a 0124080898
|
020 |
|
|
|a 9780124080898
|
020 |
|
|
|z 9780124080898
|
029 |
1 |
|
|a AU@
|b 000052404050
|
029 |
1 |
|
|a DEBBG
|b BV041778068
|
029 |
1 |
|
|a DEBSZ
|b 404325475
|
029 |
1 |
|
|a GBVCP
|b 882721984
|
035 |
|
|
|a (OCoLC)865512054
|z (OCoLC)859158938
|z (OCoLC)1113565740
|z (OCoLC)1113600941
|z (OCoLC)1129377857
|
037 |
|
|
|a CL0500000351
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.U83
|b .A383 2013
|
082 |
0 |
4 |
|a 005.12
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Advances in computers.
|n Volume ninety-one c /
|c edited by Atif Memon.
|
246 |
1 |
4 |
|a Advances in computers.
|n Volume 91
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Waltham, Mass. :
|b Acedemic Press,
|c 2013.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
0 |
|
|a Advances in computers,
|x 0065-2458 ;
|v v. 91
|
588 |
0 |
|
|a Print version resource.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Half Title; Title Page; Copyright; Contents; Preface; 1 Reverse-Engineering Software Behavior; 1 Introduction; 2 Background; 2.1 Modeling Software Behavior; 2.1.1 Modeling Data; 2.1.2 Modeling Sequential Behavior; 2.1.2.1 State Machines; 2.1.2.2 Message Sequence Charts and Sequence Diagrams; 2.1.3 Combining Data and Control; 2.1.3.1 EFSMs; 2.1.3.2 Algebraic Models; 2.2 The Reverse-Engineering Process; 2.2.1 Summary; 3 Static Analysis; 3.1 Why do we Need Behavioral Models if we have Source Code?; 3.2 Intermediate Representations-Source Code as a Graph; 3.2.1 The Control Flow Graph
|
505 |
8 |
|
|a 3.2.1.1 Data Flow3.2.1.2 Call Graphs; 3.3 Answering Questions about Behavior with Static Analysis; 3.3.1 Dominance Analysis, Dependence Analysis, and Slicing; 3.3.1.1 Dominance Analysis; 3.3.1.2 Control Dependence Analysis; 3.3.1.3 The Program Dependence Graph and Slicing; 3.4 Building behavioral Models by Static Analysis; 3.4.1 Collecting ``Static Traces''-Identifying Potential Program Executions; 3.4.2 Deriving Models from Static Traces; 3.5 Limitations of Static Analysis; 4 Dynamic Analysis; 4.1 Tracing and the Challenge of Inductive Inference; 4.1.1 Tracing
|
505 |
8 |
|
|a 4.1.2 The Essential Challenge of Dynamic Analysis4.2 Practical Trace Collection Approaches; 4.2.1 Selecting Inputs by the Category Partition Method; 4.2.2 Selecting Inputs by Exercising the Surrounding System; 4.2.3 Random Input Selection; 4.3 Data Function Inference; 4.3.1 Using General-Purpose Data Model Inference Algorithms; 4.3.2 Inferring Pre-Conditions, Post-Conditions, and Invariants; 4.4 State Machine Inference; 4.5 Limitations of Dynamic Analysis; 5 Evaluating Reverse-Engineered Models; 5.1 Evaluating Syntactic Model Accuracy; 5.1.1 Measuring the Difference
|
505 |
8 |
|
|a 5.2 Comparing Model Behavior6 Conclusions and Outstanding Challenges; 6.1 Accommodating Scale; 6.1.1 Static Analysis Technique; 6.1.2 Dynamic Analysis Technique; 6.2 Factoring in Domain Knowledge; 6.3 Concurrency and Time-Sensitivity; References; About the Authors; 2 Understanding Application Contentiousness and Sensitivity on Modern Multicores; 1 Introduction; 2 Contentiousness vs. Sensitivity; 2.1 Definition; 2.2 Contentiousness and Sensitivity; 2.3 Experiment Design, Results, and Insights; 2.3.1 Contentiousness; 2.3.2 Sensitivity; 2.3.3 Contentiousness vs. Sensitivity
|
505 |
8 |
|
|a 3 LLC Misses as an Indicator?4 Predicting Contention Characteristics; 4.1 Modeling Contention Characteristics; 4.2 Approximation Using PMUs; 4.2.1 PMUs for Memory Resource Usage; 4.2.2 Regression to Determine Coefficients; 5 Evaluation; 6 Related Work; 7 Summary; References; About the Authors; 3 An Outlook of High Performance Computing Infrastructures for Scientific Computing; 1 Introduction; 2 Modern Microprocessor Based Computer Systems; 3 Computing Shift: from Serial to Parallel; 4 Implicit Parallelism; 4.1 Instruction Level Parallelism (ILP); 4.1.1 Major Kinds of ILP
|
520 |
|
|
|a Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field. In-depth surveys and tutorials on new computer technologyWell-known authors and researchers in the.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Graphical user interfaces (Computer systems)
|
650 |
|
0 |
|a System analysis.
|
650 |
|
6 |
|a Interfaces graphiques (Informatique)
|
650 |
|
6 |
|a Analyse de systèmes.
|
650 |
|
7 |
|a systems analysis.
|2 aat
|
650 |
|
7 |
|a Graphical user interfaces (Computer systems)
|2 fast
|
650 |
|
7 |
|a System analysis
|2 fast
|
700 |
1 |
|
|a Memon, Atif M.
|
776 |
0 |
8 |
|i Print version:
|t Advances in computers. Volume 91.
|d Amsterdam : Academic Press, 2013
|z 9780124080898
|w (OCoLC)855703089
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780124080898/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10747524
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL8CTQ
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11083789
|
994 |
|
|
|a 92
|b IZTAP
|