Excerpt from An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection
Detecting access anomalies by monitoring program execution is proposed in [12. 10, 11, Using this approach, access anomaly are detected much in the same manner that array subscript range checking is per formed. When a variable is accessed during execution, an immediate check is make to see whether the access conflicts with a previous access, in which case the error is reported. This approach may be used in conjunction with static analysis [5, 2] and is much more efficient that trace-based post - mortem methods [1, 3.
About the Publisher
Forgotten Books publishes hundreds of thousands of rare and classic books. Find more at www.forgottenbooks.com
This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally reconstruct the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
EUR 1,93 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: PBShop.store US, Wood Dale, IL, U.S.A.
HRD. Condizione: New. New Book. Shipped from UK. Established seller since 2000. Codice articolo LX-9780656098668
Quantità: 15 disponibili
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
HRD. Condizione: New. New Book. Shipped from UK. Established seller since 2000. Codice articolo LX-9780656098668
Quantità: 15 disponibili