会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • TECHNOLOGIES FOR PERSISTENT MEMORY PROGRAMMING
    • 不间断内存编程技术
    • US20150169226A1
    • 2015-06-18
    • US14496621
    • 2014-09-25
    • Xipeng ShenYoufeng WuCheng WangHyunchul ParkHongbo Rong
    • Xipeng ShenYoufeng WuCheng WangHyunchul ParkHongbo Rong
    • G06F3/06
    • G06F12/0238G06F2212/7201G06F2212/7202G06F2212/7207
    • Technologies for persistent memory programming include a computing device having a persistent memory including one or more nonvolatile regions. The computing device may assign a virtual memory address of a target location in persistent memory to a persistent memory pointer using persistent pointer strategy, and may dereference the pointer using the same strategy. Persistent pointer strategies include off-holder, ID-in-value, optimistic rectification, and pessimistic rectification. The computing device may log changes to persistent memory during the execution of a data consistency section, and commit changes to the persistent memory when the last data consistency section ends. Data consistency sections may be grouped by log group identifier. Using type metadata stored in the nonvolatile region, the computing device may identify the type of a root object within the nonvolatile region and then recursively identify the type of all objects referenced by the root object. Other embodiments are described and claimed.
    • 用于持久存储器编程的技术包括具有包括一个或多个非易失性区域的持久存储器的计算设备。 计算设备可以使用持久指针策略将永久存储器中的目标位置的虚拟存储器地址分配给持久存储器指针,并且可以使用相同的策略来解除引用。 持续指标策略包括持有人,价值观,乐观整改和悲观整改。 在执行数据一致性部分期间,计算设备可以将改变记录到持久存储器,并且当最后数据一致性部分结束时,向永久存储器提交更改。 数据一致性部分可以按日志组标识符分组。 使用存储在非易失性区域中的类型元数据,计算设备可以识别非易失性区域内的根对象的类型,然后递归地标识由根对象引用的所有对象的类型。 描述和要求保护其他实施例。
    • 10. 发明授权
    • Context-sensitive slicing for dynamically parallelizing binary programs
    • 用于动态并行化二进制程序的上下文相关切片
    • US08443343B2
    • 2013-05-14
    • US12607589
    • 2009-10-28
    • Joseph BlomstedtCheng WangYoufeng Wu
    • Joseph BlomstedtCheng WangYoufeng Wu
    • G06F9/45
    • G06F11/3604G06F8/433G06F8/456
    • In one embodiment of the invention a method comprising (1) receiving an unstructured binary code region that is single-threaded; (2) determining a slice criterion for the region; (3) determining a call edge, a return edge, and a fallthrough pseudo-edge for the region based on analysis of the region at a binary level; and (4) determining a context-sensitive slice based on the call edge, the return edge, the fallthrough pseudo-edge, and the slice criterion. Embodiments of the invention may include a program analysis technique that can be used to provide context-sensitive slicing of binary programs for slicing hot regions identified at runtime, with few underlying assumptions about the program from which the binary is derived. Also, in an embodiment a slicing method may include determining a context-insensitive slice, when a time limit is met, by determining the context-insensitive slice while treating call edges as a normal control flow edges.
    • 在本发明的一个实施例中,一种方法包括(1)接收单线程的非结构化二进制码区域; (2)确定该区域的切片标准; (3)基于二进制级别的区域的分析确定该区域的通话边缘,返回边缘和下降伪边缘; 和(4)基于呼叫边缘,返回边缘,下降伪边缘和切片标准来确定上下文敏感切片。 本发明的实施例可以包括程序分析技术,其可以用于提供二进制程序的上下文敏感切片,用于对在运行时识别的热区域进行切片,而关于从其导出二进制的程序的几个基本假设。 此外,在一个实施例中,切片方法可以包括当满足时间限制时,通过在将呼叫边缘视为正常控制流边缘的同时确定上下文不敏感切片来确定上下文不敏感切片。