摘要:
A method and a system for constructing a control flow graph (CFG, 106) from an executable computer program (104). The solution detects data intermixed with instructions and instruction set changes. The method includes the steps of defining block leader types specifying basic block boundaries in the program (104), building a CFG structure (106) according to the basic blocks found in the program, and adding control flow and addressing information to the CFG (106) by propagating through the basic blocks and internals thereof. The CFG (106) may be then optimised (108) and a compacted executable (112) created as a result.
摘要:
A method and a device for abstracting instruction sequences in a computer program. First, a control flow graph of the program is generated and analysed in order to detect multiple occurrences of a same instruction sequence (504, 506). Then, a function including the longest sequence common to at least two instruction sequences from a plurality of sequences having a common instruction sequence of equal or shorter length compared to the longest sequence is created (512). Finally, the original occurrences of the instruction sequences in the plurality of sequences with a reference to a proper position in the newly created function are deleted and a reference to a proper position in the created function inserted instead (514).
摘要:
The subject matter of the invention is a communication method comprising the establishment of a communication route to a target partner not reachable by direct addressing by by-passing a node blocking the direct connection, further comprising the steps of setting up a TURN server at one or more users of the communication network in response to a definite and pre-granted request or in advance, and implementing the communication route to be established via at least one mentioned TURN server, with the effective mutual authorization management of the users involved in the communication session.
摘要:
A method for tracking the movement and trajectory of objects associated with wireless devices, located in a predefined area, wherein transceiver nodes communicating with the monitored wireless communication devices are formed, the objects associated with wireless communication device entering or located in the range of the transceiver nodes are detected by said transceiver nodes and relevant collected data are processed by measuring the strength of the signal emitted by the object during communication by at least two access points, converting the measured signal strength data into a vector set, selecting and filtering out the objects that are communicating but make no movement by evaluating the vector set, and analyzing the movement of the communicating objects changing their place by applying a pre-defined mathematical model. Access points operating according to a small-range “peer-to-peer” (P2P) type wireless communication standard are used as transceiver nodes.