نتایج جستجو برای: tracing
تعداد نتایج: 28358 فیلتر نتایج به سال:
Code Cloning Tracing is a new software annotation method that makes it possible to collect traces from time consuming applications. To this end, Code Cloning Tracing provides instrumented programs with two execution modes: a low overhead “no-trace collection” mode which serves to position the application in an interesting state with regard to tracing, and a “trace collection” mode. This paper d...
So, youwant to trace your distributed system? Key design insights from years of practical experience
End-to-end tracing captures the workow of causally-related activity (e.g., work done to process a request) within and among the components of a distributed system. As distributed systems grow in scale and complexity, such tracing is becoming a critical tool for management tasks like diagnosis and resource accounting. Drawing upon our experiences building and using end-to-end tracing infrastruc...
Two common means of controlling infectious diseases are screening and contact tracing. Which should be used, and when? We consider the problem of determining the cheapest mix of screening and contact tracing necessary to achieve a desired endemic prevalence of a disease or to identify a specified number of cases. We perform a partial equilibrium analysis of small-scale interventions, assuming t...
Many children have difficulty producing movements well enough to improve in sensori-motor learning. Previously, we developed a training method that supports active movement generation to allow improvement at a 3D tracing task requiring good compliance control. Here, we tested 7-8 year old children from several 2nd grade classrooms to determine whether 3D tracing performance could be predicted u...
Dynamic traitor tracing schemes are used to trace the source of piracy in broadcast environments such as cable TV. Dynamic schemes divide content into a series of watermarked segments that are then broadcast. The broadcast provider can adapt the watermarks according to the pirate’s response and eventually trace him/her. As dynamic algorithms are deterministic, for a given set of inputs, the tra...
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor tracing scheme based on cover-free families. The new traitor tracing scheme is similar to the Boneh-Franklin scheme except that in the BonehFranklin scheme, decryption keys are derived from Reed-Solomon codes while in o...
Aspect-oriented tracing is one of several practical applications that can be used in analyzing and understanding an existing software system. In fact, some researchers try to adopt AspectJ into dynamic reverse engineering tools due to the powerful tracing capabilities of AspectJ. This research seeks to address the following question: Given a real situation where a software system is modified, w...
The ability of patients with Alzheimer's disease (AD) or global amnesia (AMN) to acquire skill for tracing a pattern seen in mirror-reversed view and to retain that skill over 24-h intervals was examined. Both patient groups had poor recall and recognition of their mirror-tracing experience, but they acquired and retained mirror-tracing skill as well as normal control subjects. One AMN patient ...
Backward polygon beam tracing methods, that is beam tracing from the light source (L), are well suited to gather path coherency from specular (S) scattering surfaces. These methods are useful for modelling and efficiently simulating caustics on diffuse (D) surfaces; an effect due to LS+D transport paths. This paper generalizes backward polygon beam tracing to include a glossy (G) scattering sur...
We present the first traitor tracing scheme with efficient black-box traitor tracing in which the ratio of the ciphertext and plaintext lengths (the transmission rate) is asymptotically 1, which is optimal. Previous constructions in this setting either obtained constant (but not optimal) transmission rate [KY02b], or did not support black-box tracing [CPP05]. Our treatment improves the standard...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید