Author of the publication

On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies.

, , , and . CSMR, page 127-136. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Murtaza, Syed Shariyar
add a person with the name Murtaza, Syed Shariyar
 

Other publications of authors with the same name

An empirical study on the use of mutant traces for diagnosis of faults in deployed systems., , , and . Journal of Systems and Software, (2014)Mining trends and patterns of software vulnerabilities., , , and . Journal of Systems and Software, (2016)F007: finding rediscovered faults from the field using function-level failed traces of software in the field., , , and . CASCON, page 57-71. ACM, (2010)Diagnosing new faults using mutants and prior faults., , , and . ICSE, page 960-963. ACM, (2011)Using entropy measures for comparison of software traces., , , and . Inf. Sci., (2012)Discovering the Fault Origin from Field Traces., , and . ISSRE, page 295-296. IEEE Computer Society, (2008)Total ADS: Automated Software Anomaly Detection System., , , and . SCAM, page 83-88. IEEE Computer Society, (2014)Using entropy measures for comparison of software traces, , , and . CoRR, (2010)How to Effectively Train IBM Watson: Classroom Experience., , , and . HICSS, page 1663-1670. IEEE Computer Society, (2016)On the use of hidden Markov model to predict the time to fix bugs., , , and . ICSE, page 700. ACM, (2018)