Publisher's Synopsis
Excerpt from An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection
Detecting access anomalies by monitoring program execution is proposed in [12. 10, 11, Using this approach, access anomaly are detected much in the same manner that array subscript range checking is per formed. When a variable is accessed during execution, an immediate check is make to see whether the access conflicts with a previous access, in which case the error is reported. This approach may be used in conjunction with static analysis [5, 2] and is much more efficient that trace-based post - mortem methods [1, 3.
About the Publisher
Forgotten Books publishes hundreds of thousands of rare and classic books. Find more at www.forgottenbooks.com
This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally reconstruct the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works.