نتایج جستجو برای: tracing

تعداد نتایج: 28358  

1999
Thierry Lafage André Seznec Erven Rohou François Bodin

Code Cloning Tracing is a new software annotation method that makes it possible to collect traces from time consuming applications. To this end, Code Cloning Tracing provides instrumented programs with two execution modes: a low overhead “no-trace collection” mode which serves to position the application in an interesting state with regard to tracing, and a “trace collection” mode. This paper d...

2014
Raja R. Sambasivan Rodrigo Fonseca Ilari Shafer Gregory R. Ganger

End-to-end tracing captures the workžow of causally-related activity (e.g., work done to process a request) within and among the components of a distributed system. As distributed systems grow in scale and complexity, such tracing is becoming a critical tool for management tasks like diagnosis and resource accounting. Drawing upon our experiences building and using end-to-end tracing infrastruc...

Journal: :Mathematical biosciences 2007
Benjamin Armbruster Margaret L Brandeau

Two common means of controlling infectious diseases are screening and contact tracing. Which should be used, and when? We consider the problem of determining the cheapest mix of screening and contact tracing necessary to achieve a desired endemic prevalence of a disease or to identify a specified number of cases. We perform a partial equilibrium analysis of small-scale interventions, assuming t...

2014
Winona Snapp-Childs Ian Flatters Aaron Fath Mark Mon-Williams Geoffrey P. Bingham

Many children have difficulty producing movements well enough to improve in sensori-motor learning. Previously, we developed a training method that supports active movement generation to allow improvement at a 3D tracing task requiring good compliance control. Here, we tested 7-8 year old children from several 2nd grade classrooms to determine whether 3D tracing performance could be predicted u...

2006
Jarrod Trevathan Wayne Read

Dynamic traitor tracing schemes are used to trace the source of piracy in broadcast environments such as cable TV. Dynamic schemes divide content into a series of watermarked segments that are then broadcast. The broadcast provider can adapt the watermarks according to the pirate’s response and eventually trace him/her. As dynamic algorithms are deterministic, for a given set of inputs, the tra...

Journal: :IACR Cryptology ePrint Archive 2006
Dongvu Tonien Reihaneh Safavi-Naini

A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor tracing scheme based on cover-free families. The new traitor tracing scheme is similar to the Boneh-Franklin scheme except that in the BonehFranklin scheme, decryption keys are derived from Reed-Solomon codes while in o...

2006
Seonah Lee

Aspect-oriented tracing is one of several practical applications that can be used in analyzing and understanding an existing software system. In fact, some researchers try to adopt AspectJ into dynamic reverse engineering tools due to the powerful tracing capabilities of AspectJ. This research seeks to address the following question: Given a real situation where a software system is modified, w...

Journal: :Behavioral neuroscience 1993
J D Gabrieli S Corkin S F Mickel J H Growdon

The ability of patients with Alzheimer's disease (AD) or global amnesia (AMN) to acquire skill for tracing a pattern seen in mirror-reversed view and to retain that skill over 24-h intervals was examined. Both patient groups had poor recall and recognition of their mirror-tracing experience, but they acquired and retained mirror-tracing skill as well as normal control subjects. One AMN patient ...

Journal: :Comput. Graph. Forum 2011
Bernardt Duvenhage Kadi Bouatouch Derrick G. Kourie

Backward polygon beam tracing methods, that is beam tracing from the light source (L), are well suited to gather path coherency from specular (S) scattering surfaces. These methods are useful for modelling and efficiently simulating caustics on diffuse (D) surfaces; an effect due to LS+D transport paths. This paper generalizes backward polygon beam tracing to include a glossy (G) scattering sur...

2007
Nelly Fazio Antonio Nicolosi Duong Hieu Phan

We present the first traitor tracing scheme with efficient black-box traitor tracing in which the ratio of the ciphertext and plaintext lengths (the transmission rate) is asymptotically 1, which is optimal. Previous constructions in this setting either obtained constant (but not optimal) transmission rate [KY02b], or did not support black-box tracing [CPP05]. Our treatment improves the standard...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید