On-The-Fly Detection of Access Anomalies (Classic Reprint)

Author:   Edith Schonberg
Publisher:   Forgotten Books
ISBN:  

9781333597719


Pages:   30
Publication Date:   14 January 2019
Format:   Paperback
Availability:   Available To Order   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $24.81 Quantity:  
Add to Cart

Share |

On-The-Fly Detection of Access Anomalies (Classic Reprint)


Add your own review!

Overview

Excerpt from On-the-Fly Detection of Access Anomalies A variety of approaches have been explored for detecting access anomalies. One approach is-static analysis [app, Car, Tay], the goal of which is to detect all potential access anomalies prior to execution. In [app] and [tay], sections of code which are potentially con current are identified; shared variables read and written in these sections are potential anomalies. To reduce the set of potential anomalies found, further static analysis is' required, such as subscript range and alias analysis, as well as data dependence analysis [bur, Car]. At best, static analysis can only indicate a conservative superset of potential anomalies. Faced with too many false reports, it is easy for a programmer to disregard the advice of an overly conservative static tool. Dynamic access anomaly detection, on the other hand, is a complementary approach that can guarantee that there are no anomalies in any particular execution instance of a program. Dynamic detection tests whether a potential anomaly revealed by static methods is a real ano maly, while static analysis is useful to reduce the number of variables that have to be moni tored at run-time. In [mil], the dynamic access anomaly detection problem is defined for a variety of parallel programming constructs, but no efficient algorithm is presented. The approach of [all] combines static analysis with dynamic detection. A history trace is generated during program execution, and the trace is analysed in a port-mortem phase to detect anomalies. Static analysis is used to reduce the number of variables that have to be checked at run-time, in order to compress the dynamic trace, and to locate potential access anomalies that may be hidden by earlier access anomalies. The drawback of methods based on history traces and post-mortem analysis is that traces readily grew too large, even when compression techniques are used. In [all], a record must be stored for each basic block exe outed and additionally for each array operation. About the Publisher Forgotten Books publishes hundreds of thousands of rare and classic books. Find more at www.forgottenbooks.com This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally reconstruct the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works.

Full Product Details

Author:   Edith Schonberg
Publisher:   Forgotten Books
Imprint:   Forgotten Books
Dimensions:   Width: 15.20cm , Height: 0.20cm , Length: 22.90cm
Weight:   0.054kg
ISBN:  

9781333597719


ISBN 10:   1333597711
Pages:   30
Publication Date:   14 January 2019
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Unknown
Availability:   Available To Order   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List