会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • Testing and debugging of dynamic binary translation
    • 动态二进制翻译的测试和调试
    • US08230402B2
    • 2012-07-24
    • US11865024
    • 2007-09-30
    • William Y. ChenJiwei LuGeetha K. Vallabhaneni
    • William Y. ChenJiwei LuGeetha K. Vallabhaneni
    • G06F9/45
    • G06F11/3696G06F9/45504G06F11/3644
    • A method for testing and debugging of dynamic binary translation wherein a dynamic binary translator allows a target binary to be executed transparently on a host machine having a different computer architecture than the target machine involves selecting a minimum set of target machine states for simulation at run-time. A series of target machine instructions from the target binary is translated into a series of host machine instructions. During translation, a plurality of check points are inserted into the series of host machine instructions. During translation, a plurality of verification points are inserted into the series of host machine instructions. The series of host machine instructions, including the check points and verification points, are executed. Execution of a check point determines a simulated target machine state. Execution of a verification point sends information pertaining to simulated target machine states to an external verifier.
    • 一种用于动态二进制转换的测试和调试的方法,其中动态二进制转换器允许在具有与目标机器不同的计算机体系结构的主机上透明地执行目标二进制程序,包括在运行时选择最小的目标机器状态集合用于模拟, 时间。 来自目标二进制文件的一系列目标机器指令被转换成一系列主机指令。 在翻译期间,将多个检查点插入到一系列主机指令中。 在翻译期间,将多个验证点插入到主机指令系列中。 执行一系列主机指令,包括检查点和验证点。 检查点的执行确定模拟的目标机器状态。 验证点的执行将有关模拟目标机器状态的信息发送到外部验证器。
    • 12. 发明申请
    • HANDLING MUTEX LOCKS IN A DYNAMIC BINARY TRANSLATION ACROSS HETEROGENOUS COMPUTER SYSTEMS
    • 通过异构计算机系统处理动态二进制翻译中的静音锁
    • US20100114555A1
    • 2010-05-06
    • US12264944
    • 2008-11-05
    • Abhinav DasJiwei LuWilliam Y. ChenChandramouli Banerjee
    • Abhinav DasJiwei LuWilliam Y. ChenChandramouli Banerjee
    • G06F9/455
    • G06F9/45516G06F9/45504
    • A method for executing non-native binaries on a host computer architecture comprises receiving a guest executable binary encoded on a computer readable medium. The guest executable binary is executable on a first computer architecture. Moreover, the guest executable binary includes a mutex lock encoded instructions for implementing a mutex lock. The guest executable binary is then executed on the host computer architecture by first translating the guest executable binary to a translated executable binary. The encoded instructions for implementing a mutex lock are translated by mapping the mutex lock to an instance of a compound mutex lock data structure. A computer system implementing methods for executing non-native binaries on a host computer architecture is also provided.
    • 用于在主计算机体系结构上执行非本地二进制文件的方法包括:接收在计算机可读介质上编码的访客可执行二进制文件。 访客可执行二进制文件可在第一个计算机体系结构上执行。 此外,访客可执行二进制包括用于实现互斥锁的互斥锁编码指令。 然后通过首先将访客可执行二进制文件翻译成可翻译的可执行二进制文件,在主计算机体系结构上执行访客执行二进制文件。 通过将互斥锁锁定到复合互斥锁数据结构的实例来转换用于实现互斥锁的编码指令。 还提供了一种实现用于在主机结构上执行非本地二进制文件的方法的计算机系统。
    • 15. 发明授权
    • Mechanism for optimizing function execution
    • 优化功能执行的机制
    • US08020155B2
    • 2011-09-13
    • US11605540
    • 2006-11-28
    • Jiwei LuWilliam Yu-Wei Chen
    • Jiwei LuWilliam Yu-Wei Chen
    • G06F9/45
    • G06F9/4484
    • A mechanism is provided for managing the referencing of at least two versions of a function. A first version is a single threaded version that does not ensure multi-thread safety. A second version is a multi threaded version that does ensure multi-thread safety. The mechanism determines whether a set of executable code (e.g. a program) is currently executing in single-threaded mode or multi-threaded mode. If the executable code is executing in single-threaded mode, then the mechanism causes the executable code to reference the first version of the function. If the executable code is executing in multi-threaded mode, then the mechanism causes the executable code to reference the second version of the function. By doing so, the mechanism ensures that the additional overhead of ensuring multi-thread safety is incurred only when it is needed. In this manner, the mechanism makes execution of the function more optimal.
    • 提供了一种用于管理功能的至少两个版本的引用的机制。 第一个版本是单线程版本,不能确保多线程安全。 第二个版本是一个多线程版本,确保多线程安全。 该机制确定一组可执行代码(例如,程序)当前是以单线程模式还是多线程模式执行。 如果可执行代码在单线程模式下执行,则该机制将使可执行代码引用该函数的第一个版本。 如果可执行代码在多线程模式下执行,则该机制使可执行代码引用该函数的第二个版本。 通过这样做,该机制确保仅在需要时才产生确保多线程安全的额外开销。 以这种方式,该机制使得该功能的执行更加优化。
    • 16. 发明申请
    • SUPPORT FOR A NON-NATIVE APPLICATION
    • 支持非本地应用程序
    • US20100274551A1
    • 2010-10-28
    • US12429399
    • 2009-04-24
    • Abhinav DasJiwei LuWilliam Y. ChenChandramouli Banerjee
    • Abhinav DasJiwei LuWilliam Y. ChenChandramouli Banerjee
    • G06F9/455
    • G06F9/45504G06F9/45516G06F11/3612G06F11/3636
    • Aspects of the invention are directed to a systems and methods for operating a non-native binary in dynamic binary translation environment. In accordance with an embodiment, there is provided a computer program product in a computer readable medium. The product includes program code for receiving a non-native binary in a computer readable medium and program code for translating the non-native binary. Additionally, the product includes program code for executing the translated non-native binary, the non-native binary including one or more threads, and program code for pausing execution of the translated non-native binary. The product also includes program code for providing guest instruction boundary information to a monitoring process and program code for analyzing a state of each thread of the translated non-native binary. Moreover, the product includes program code for fast-forwarding at least one thread so that its state is consistent with the guest instruction boundary
    • 本发明的方面涉及用于在动态二进制翻译环境中操作非本地二进制文件的系统和方法。 根据实施例,提供了一种计算机可读介质中的计算机程序产品。 该产品包括用于在计算机可读介质中接收非本地二进制文件的程序代码和用于转换非本地二进制文件的程序代码。 此外,该产品包括用于执行所翻译的非本地二进制文件的程序代码,包括一个或多个线程的非本地二进制文件以及用于暂停执行所翻译的非本地二进制文件的程序代码。 该产品还包括用于向监视过程提供访客指令边界信息的程序代码和用于分析翻译的非本地二进制文件的每个线程的状态的程序代码。 此外,该产品包括用于快速转发至少一个线程的程序代码,使得其状态与访客指令边界一致
    • 17. 发明申请
    • Mechanism for optimizing function execution
    • 优化功能执行的机制
    • US20080127071A1
    • 2008-05-29
    • US11605540
    • 2006-11-28
    • Jiwei LuWilliam Yu-Wei Chen
    • Jiwei LuWilliam Yu-Wei Chen
    • G06F9/44
    • G06F9/4484
    • A mechanism is provided for managing the referencing of at least two versions of a function. A first version is a single threaded version that does not ensure multi-thread safety. A second version is a multi threaded version that does ensure multi-thread safety. The mechanism determines whether a set of executable code (e.g. a program) is currently executing in single-threaded mode or multi-threaded mode. If the executable code is executing in single-threaded mode, then the mechanism causes the executable code to reference the first version of the function. If the executable code is executing in multi-threaded mode, then the mechanism causes the executable code to reference the second version of the function. By doing so, the mechanism ensures that the additional overhead of ensuring multi-thread safety is incurred only when it is needed. In this manner, the mechanism makes execution of the function more optimal.
    • 提供了一种用于管理功能的至少两个版本的引用的机制。 第一个版本是不能确保多线程安全的单线程版本。 第二个版本是一个多线程版本,确保多线程安全。 该机制确定一组可执行代码(例如,程序)当前是以单线程模式还是多线程模式执行。 如果可执行代码在单线程模式下执行,则该机制将使可执行代码引用该函数的第一个版本。 如果可执行代码在多线程模式下执行,则该机制使可执行代码引用该函数的第二个版本。 通过这样做,该机制确保仅在需要时才产生确保多线程安全的额外开销。 以这种方式,该机制使得该功能的执行更加优化。
    • 20. 发明授权
    • Sampling based runtime optimizer for efficient debugging of applications
    • 基于采样的运行时优化器,用于应用程序的高效调试
    • US08627302B2
    • 2014-01-07
    • US11945989
    • 2007-11-27
    • William Y. ChenJiwei Lu
    • William Y. ChenJiwei Lu
    • G06F9/44G06F9/45
    • G06F11/3628G06F11/3461G06F11/3476G06F11/3632G06F11/3664G06F2201/86G06F2201/865
    • A method of reproducing runtime environment for debugging an application includes reading an optimizer file from a non-volatile storage medium. The optimizer file includes a runtime environment, application definition information, and a log. The log includes summaries of events, actions, and a time mark of occurrence for each of the actions. A runtime environment for debugging the application is then defined and the application runtime is set up using the application definition information in the optimizer file. Further, the method includes running the application, attaching an optimizer, and triggering each of the actions to occur at a time mark of occurrence associated with each of the actions. Then, each of the actions and associated events is analyzed by comparing the events produced by running the application with the events in the optimizer file. If a fault is produced by the triggering, a debugger is invoked to analyze the fault.
    • 再现用于调试应用的运行时环境的方法包括从非易失性存储介质读取优化器文件。 优化程序文件包括运行时环境,应用程序定义信息和日志。 日志包括每个操作的事件,操作和发生时间标记的摘要。 然后定义用于调试应用程序的运行时环境,并使用优化程序文件中的应用程序定义信息设置应用程序运行时间。 此外,该方法包括运行应用程序,附加优化器以及触发在与每个动作相关联的发生的时间标记处发生的每个动作。 然后,通过将运行应用程序生成的事件与优化程序文件中的事件进行比较来分析每个操作和关联事件。 如果触发产生故障,则调用调试器来分析故障。