2015
DOI: 10.1016/j.jsc.2014.09.028
|View full text |Cite
|
Sign up to set email alerts
|

Exploring conditional rewriting logic computations

Abstract: Trace exploration is concerned with techniques that allow computation traces to be dynamically searched for specific contents. Depending on whether the exploration is carried backward or forward, trace exploration techniques allow provenance tracking or impact tracking to be done. The aim of provenance tracking is to show how (parts of) a program output depends on (parts of) its input and to help estimate which input data need to be modified to accomplish a change in the outcome. The aim of impact tracking is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(24 citation statements)
references
References 36 publications
0
23
0
Order By: Relevance
“…user-provided slicing criteria refinements (Alpuente et al 2015); (ii) a program slicing feature for delivering program fragments that include all and only the rules/equations responsible for the detected error.…”
Section: × Query Informationmentioning
confidence: 99%
“…user-provided slicing criteria refinements (Alpuente et al 2015); (ii) a program slicing feature for delivering program fragments that include all and only the rules/equations responsible for the detected error.…”
Section: × Query Informationmentioning
confidence: 99%
“…This function relies on an instrumentation technique for Maude steps that allows the relevant information of the step, such as the selected redex and the contractum produced by the step, to be traced explicitly despite the fact that terms are rewritten modulo a set B of equational axioms that may cause their components to be implicitly reordered in the original trace. Also, the dynamic dependencies exposed by backward trace slicing are exploited in [8] to provide a (preliminary) program slicing capability that can identify those parts of a Maude theory that can (potentially) affect the values computed at some point of interest.…”
Section: Enhancing Trace Slicingmentioning
confidence: 99%
“…The implementation comprises: (i) a frontend consisting of a RESTful Web service written in Java, with an intuitive user interface based on AJAX technology written in HTML5, Canvas, and Javascript; and (ii) a back-end that implements the proposed trace analysis methodology in Maude. The implementation of the backend consists of about 350 Maude function definitions (approximately 2700 lines of source code) that partially reuse the slicing and exploration machinery developed in previous work [4,5,8], extending it with the constraint-checking capabilities described in this paper.…”
Section: 3mentioning
confidence: 99%
See 2 more Smart Citations