Abstract—Memory trace analysis is an important technology for architecture research, system software (i.e., OS, compiler) optimization, and application performance improvements. Hardware-snooping is an effective and efficient approach to monitor and collect memory traces. Compared with software-based approaches, memory traces collected by hardware-based approaches are usually lack of semantic information, such as process/function/loop identifiers, virtual address and I/O access. In this paper we propose a hybrid hardware/software mechanism which is able to collect memory reference trace as well as semantic information. Based on this mechanism, we designed and implemented a prototype system called HMTT (Hybrid Memory Trace Tool) which adopts...
Usage of the execution stack at run-time captures the dynamic state of programs and can be used to d...
This thesis presents a novel approach to operation-centric tracing for hardware debug with a retrosp...
This research focused on the Computer Forensic with the aim to capture as much as possible the obje...
Abstract—Memory profiling is the process of collecting memory address traces during the execution of...
International audienceThe FPGA world recently experienced significant changes with the introduction ...
Event tracing of applications under dynamic execution is crucial for performance modeling, optimizat...
Trace driven simulation is an important tool for computer systems performance analysis and predictio...
ABSTRACT: Debugging and profiling tools can alter the execution flow or timing, can induce heisenbug...
Memory tracing (executing additional code for every memory access of a program) is a powerful techni...
Memory access tracing is a program analysis technique with many different applications, ranging from...
This paper introduces the new Linux Trace Toolkit Next Generation (LTTng) kernel tracer and its anal...
Fay is a flexible platform for the efficient collection, processing, and analysis of software execut...
This thesis contributes to the field of performance analysis in High Performance Computing with new ...
This paper extends results concerning the recovery of accurate parallel program traces from corrupte...
Tools for memory access detection are widely used, playing an important role especially in real-time...
Usage of the execution stack at run-time captures the dynamic state of programs and can be used to d...
This thesis presents a novel approach to operation-centric tracing for hardware debug with a retrosp...
This research focused on the Computer Forensic with the aim to capture as much as possible the obje...
Abstract—Memory profiling is the process of collecting memory address traces during the execution of...
International audienceThe FPGA world recently experienced significant changes with the introduction ...
Event tracing of applications under dynamic execution is crucial for performance modeling, optimizat...
Trace driven simulation is an important tool for computer systems performance analysis and predictio...
ABSTRACT: Debugging and profiling tools can alter the execution flow or timing, can induce heisenbug...
Memory tracing (executing additional code for every memory access of a program) is a powerful techni...
Memory access tracing is a program analysis technique with many different applications, ranging from...
This paper introduces the new Linux Trace Toolkit Next Generation (LTTng) kernel tracer and its anal...
Fay is a flexible platform for the efficient collection, processing, and analysis of software execut...
This thesis contributes to the field of performance analysis in High Performance Computing with new ...
This paper extends results concerning the recovery of accurate parallel program traces from corrupte...
Tools for memory access detection are widely used, playing an important role especially in real-time...
Usage of the execution stack at run-time captures the dynamic state of programs and can be used to d...
This thesis presents a novel approach to operation-centric tracing for hardware debug with a retrosp...
This research focused on the Computer Forensic with the aim to capture as much as possible the obje...