| CPC G06V 40/168 (2022.01) [G06F 8/77 (2013.01); G06V 10/25 (2022.01); G06V 20/46 (2022.01); G06V 20/52 (2022.01); G06N 7/01 (2023.01)] | 16 Claims |

|
1. A computer-implemented method for analyzing a random behavior of a computational architecture, the method comprising acts of:
analyzing source code of the computational architecture to identify at least one callable object that is likely to impact a selected metric of the computational architecture;
analyzing binary code of the computational architecture to determine whether the at least one callable object is reachable during execution of the binary code; and
generating a tracepoint to be inserted into the binary code, wherein the tracepoint, when executed by a processor, causes the processor to collect a selected type of information during execution of the binary code, wherein generating the tracepoint comprises selecting at least one argument from one or more arguments accepted by the at least one callable object, and generating the tracepoint to collect information on the at least one argument, wherein the tracepoint is generated to collect at least one selected characteristic of the at least one argument, and wherein the at least one selected characteristic comprises a characteristic that is likely to impact the selected metric of the computational architecture.
|