References in periodicals archive ?
An intruder log uses a backtrace to identify and list by severity each security breach.
Real X propagation can be debugged using a full sequential backtrace report showing the exact register to register paths from original X source registers or inputs to their destination registers spanning multiple clock cycles.
recorded all the information we needed to backtrace break-in