|
![]() |
|||
|
||||
OverviewExcerpt from On-the-Fly Detection of Access Anomalies A variety of approaches have been explored for detecting access anomalies. One approach is-static analysis [app, Car, Tay], the goal of which is to detect all potential access anomalies prior to execution. In [app] and [tay], sections of code which are potentially con current are identified; shared variables read and written in these sections are potential anomalies. To reduce the set of potential anomalies found, further static analysis is' required, such as subscript range and alias analysis, as well as data dependence analysis [bur, Car]. At best, static analysis can only indicate a conservative superset of potential anomalies. Faced with too many false reports, it is easy for a programmer to disregard the advice of an overly conservative static tool. Dynamic access anomaly detection, on the other hand, is a complementary approach that can guarantee that there are no anomalies in any particular execution instance of a program. Dynamic detection tests whether a potential anomaly revealed by static methods is a real ano maly, while static analysis is useful to reduce the number of variables that have to be moni tored at run-time. In [mil], the dynamic access anomaly detection problem is defined for a variety of parallel programming constructs, but no efficient algorithm is presented. The approach of [all] combines static analysis with dynamic detection. A history trace is generated during program execution, and the trace is analysed in a port-mortem phase to detect anomalies. Static analysis is used to reduce the number of variables that have to be checked at run-time, in order to compress the dynamic trace, and to locate potential access anomalies that may be hidden by earlier access anomalies. The drawback of methods based on history traces and post-mortem analysis is that traces readily grew too large, even when compression techniques are used. In [all], a record must be stored for each basic block exe outed and additionally for each array operation. About the Publisher Forgotten Books publishes hundreds of thousands of rare and classic books. Find more at www.forgottenbooks.com This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally reconstruct the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works. Full Product DetailsAuthor: Edith SchonbergPublisher: Forgotten Books Imprint: Forgotten Books Dimensions: Width: 15.20cm , Height: 0.20cm , Length: 22.90cm Weight: 0.054kg ISBN: 9781333597719ISBN 10: 1333597711 Pages: 30 Publication Date: 14 January 2019 Audience: General/trade , General Format: Paperback Publisher's Status: Unknown Availability: Available To Order ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |