|
[1] N. Walkinshaw, R. Taylor, and J. Derrick, “Inferring extended finite state machine models from software executions”, in Reverse Engineering (WCRE), 2013 20th Working Conference on, Oct 2013, pp. 301–310. [2] D. Lorenzoli, L. Mariani, and M. Pezze, “Automatic generation of software behavioral models”, in Software Engineering, 2008. ICSE ’08. ACM/IEEE 30th International Conference on, May 2008, pp. 501–510. [3] J. Antunes, N. Neves, and P. Verissimo, “Reverse engineering of protocols from network traces”, in Reverse Engineering (WCRE), 2011 18th Working Conference on, Oct 2011, pp. 169–178. [4] Yipeng Wang, Zhibin Zhang, Danfeng Daphne Yao, Buyun Qu, and Li Guo, “Inferring protocol state machine from network traces: A probabilistic approach”, in Proceedings of the 9th International Conference on Applied Cryptography and Network Security, Berlin, Heidelberg, 2011, ACNS’11, pp. 1–18, Springer-Verlag. [5] Zhao Zhang, Qiao-Yan Wen, and Wen Tang, “Mining protocol state machines by inter- active grammar inference”, in Digital Manufacturing and Automation (ICDMA), 2012 Third International Conference on, July 2012, pp. 524–527. [6] Kai Koskimies and Erkki M ̈akinen, “Automatic synthesis of state machines from trace diagrams”, Softw. Pract. Exper., vol. 24, no. 7, pp. 643–658, July 1994. [7] Jiaqi Tan, Xinghao Pan, Soila Kavulya, Rajeev Gandhi, and Priya Narasimhan, “Salsa: Analyzing logs as state machines”, in Proceedings of the First USENIX Conference on Analysis of System Logs, Berkeley, CA, USA, 2008, WASL’08, pp. 6–6, USENIX Association. [8] Jonas Tru ̈mper, Johannes Bohnet, and Ju ̈rgen Do ̈llner, “Understanding complex mul- tithreaded software systems by using trace visualization”, in Proceedings of the ACM 2010 Symposium on Software Visualization, Salt Lake City, UT, USA, October 25-26, 2010, 2010, pp. 133–142. [9] Felix Wolf, Felix Freitag, Bernd Mohr, Shirley Moore, and Brian J. N. Wylie, “Large event traces in parallel performance analysis”, in ARCS 2006 - 19th International Conference on Architecture of Computing Systems, Workshops Proceedings, March 16, 2006, Frankfurt am Main, Germany, 2006, pp. 264–273. [10] Katherine E. Isaacs, Peer-Timo Bremer, Ilir Jusufi, Todd Gamblin, Abhinav Bhatele, Martin Schulz, and Bernd Hamann, “Combing the communication hairball: Visualizing parallel execution traces using logical time”, IEEE Trans. Vis. Comput. Graph., vol. 20, no. 12, pp. 2349–2358, 2014. [11] Kevin J. Lang, Barak A. Pearlmutter, and Rodney A. Price, “Results of the abbadingo one dfa learning competition and a new evidence-driven state merging algorithm”, in Proceedings of the 4th International Colloquium on Grammatical Inference, London, UK, UK, 1998, ICGI ’98, pp. 1–12, Springer-Verlag. [12] “Intel mpi benchmark”, http://software.intel.com/en-us/articles/ intel-mpi-benchmarks. [13] “The parsec benchmark”, http://parsec.cs.princeton.edu/. [14] Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood, “Pin: Building customized program analysis tools with dynamic instrumentation”, in Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, New York, NY, USA, 2005, PLDI ’05, pp. 190–200, ACM. [15] “The spec cpu2000 benchmark”, http://www.spec.org/cpu2000/. [16] Moses S. Charikar, “Similarity estimation techniques from rounding algorithms”, in Proceedings of the Thiry-fourth Annual ACM Symposium on Theory of Computing, New York, NY, USA, 2002, STOC ’02, pp. 380–388, ACM. [17] “Gzip - gnu project - free software foundation”, http://www.gnu.org/software/ gzip/. [18] “Bzip2”, http://bzip.org/. [19] Craig G. Nevill-Manning and Ian H. Witten, “Identifying hierarchical structure in sequences: A linear-time algorithm”, CoRR, vol. cs.AI/9709102, 1997. [20] Craig G. Nevill-Manning and Ian H. Witten, “Linear-time, incremental hierarchy infer- ence for compression”, in Proceedings of the 7th Data Compression Conference (DCC ’97), Snowbird, Utah, March 25-27, 1997., 1997, pp. 3–11. [21] “Implementation of sequitur”, http://www.sequitur.info/. |