Providing hardware resources having different reliabilities for use by an application
    11.
    发明授权
    Providing hardware resources having different reliabilities for use by an application 有权
    提供具有不同可靠性的硬件资源供应用程序使用

    公开(公告)号:US09411674B2

    公开(公告)日:2016-08-09

    申请号:US12727305

    申请日:2010-03-19

    摘要: Power management functionality is described for implementing an application in an energy-efficient manner, without substantially degrading overall performance of the application. The functionality operates by identifying at least first data and second data associated with the application. The first data is considered to have a greater potential impact on performance of the application compared to the second data. The functionality then instructs a first set of hardware-level resources to handle the first data and a second set of hardware-level resources to handle the second data. The first set of hardware-level resources has a higher reliability compared to the second set of hardware-level resources. In one case, the first and second hardware-level resources comprise DRAM memory units. Here, the first set of hardware-level resources achieves greater reliability than the second set of hardware-level resources by being refreshed at a higher rate than the second set of hardware-level resources.

    摘要翻译: 描述了以节能方式实现应用程序的电源管理功能,而不会基本上降低应用程序的整体性能。 该功能通过至少识别与应用相关联的第一数据和第二数据来进行操作。 与第二个数据相比,第一个数据被认为对应用程序的性能有更大的潜在影响。 该功能然后指示第一组硬件级资源来处理第一数据和第二组硬件级资源以处理第二数据。 与第二组硬件级资源相比,第一组硬件级资源具有更高的可靠性。 在一种情况下,第一和第二硬件级资源包括DRAM存储器单元。 这里,通过以比第二组硬件级资源更高的速率刷新,第一组硬件级资源实现比第二组硬件级资源更高的可靠性。

    Extensible software development services
    12.
    发明授权
    Extensible software development services 有权
    可扩展的软件开发服务

    公开(公告)号:US08271964B2

    公开(公告)日:2012-09-18

    申请号:US11131446

    申请日:2005-05-16

    IPC分类号: G06F9/45

    CPC分类号: G06F8/20

    摘要: Described herein are methods and systems for providing software development services in a networked software development environment. For instance, instead of performing compilation on a stand-alone desktop computer, software development activities including, compilation are performed by a service provider in response to a general query from a client requester. Such a network desirably has a global view of the source files being processed by various software development tools associated therewith. This global view enables many interesting approaches including the ability to perform analysis and optimizations to the input files not specified by the client requester. Such anticipatory processing may be based on the history and pattern of previous requests and availability of software development tools that the client requester is not aware of, for instance. The service request is submitted to a software development service provider to get back a specified result and non-specified anticipatory results as one of many “hits” in a ranked order.

    摘要翻译: 这里描述了用于在联网的软件开发环境中提供软件开发服务的方法和系统。 例如,不是在独立的台式计算机上执行编译,而是由服务提供商响应来自客户机请求者的一般查询来执行包括编译的软件开发活动。 理想地,这样的网络具有由与其相关联的各种软件开发工具处理的源文件的全局视图。 这种全局视图可以实现许多有趣的方法,包括对未由客户机请求者指定的输入文件进行分析和优化的能力。 例如,这种预期处理可以基于先前请求的历史和模式以及客户端请求者不知道的软件开发工具的可用性。 将服务请求提交给软件开发服务提供商,以获得指定的结果和非指定的预期结果作为排序顺序的许多“命中”之一。

    Monitoring System for Heap Spraying Attacks
    13.
    发明申请
    Monitoring System for Heap Spraying Attacks 审中-公开
    堆喷射攻击监控系统

    公开(公告)号:US20100205674A1

    公开(公告)日:2010-08-12

    申请号:US12369018

    申请日:2009-02-11

    IPC分类号: G06F21/00

    CPC分类号: G06F21/552 G06F21/556

    摘要: A monitoring system may analyze system memory to determine a vulnerability statistic by identifying potential sleds within the memory, and creating a statistic that is a ratio of the amount of potential sleds per the total memory. In some cases, the statistic may be based on the number of instructions or bytes consumed by the sleds. The potential sleds may be determined by several different mechanisms, including abstract payload execution, polymorphic sled detection, sled surface area calculation, and other mechanisms. The monitoring system may be a multi-threaded operation that continually monitors system memory and analyzes recently changed objects in memory. When the vulnerability statistic rises above a certain level, the system may alert a user or administrator to a high vulnerability condition.

    摘要翻译: 监视系统可以通过识别存储器内的潜在滑轨来分析系统存储器以确定漏洞统计量,并且创建一个统计量,该统计量是每个总存储器的潜在滑雪量的比率。 在某些情况下,统计信息可以基于雪橇所消耗的指令数或字节数。 潜在的雪橇可以通过几种不同的机制来确定,包括抽象有效载荷执行,多态滑轨检测,滑车表面积计算和其他机制。 监视系统可以是连续监视系统存储器并分析最近在存储器中改变的对象的多线程操作。 当漏洞统计信息上升到某一水平以上时,系统可能会向用户或管理员发出警报,以提高漏洞状况。

    CRITICAL MEMORY
    14.
    发明申请
    CRITICAL MEMORY 有权
    关键记忆

    公开(公告)号:US20080140957A1

    公开(公告)日:2008-06-12

    申请号:US11608698

    申请日:2006-12-08

    IPC分类号: G06F12/02 G06F12/16

    CPC分类号: G06F11/141 G06F11/1438

    摘要: Typical computer programs may incur costly memory errors that result in corrupted data. A new memory model is presented wherein it may be determined that certain data is critical and critical data may be stored and protected during computer application execution. Critical Memory allows that data determined to be critical may be stored and retrieved using functions enabled to increase the reliability of the data. Critical Memory presents a memory model where a subset of memory designated as critical memory may be used to store a subset of data deemed critical data. Probabilistic guarantees of data value consistency are provided by the employment of the new memory model. The memory model and functions presented are compatible with existing third-party libraries such that third-party libraries may be compatibly called from processes using critical memory.

    摘要翻译: 典型的计算机程序可能会导致导致数据损坏的昂贵的内存错误。 提出了一种新的存储器模型,其中可以确定某些数据是关键的,并且在计算机应用执行期间可以存储和保护关键数据。 关键内存允许确定为关键的数据可以使用启用的功能来存储和检索,以提高数据的可靠性。 关键存储器提供了一种存储器模型,其中指定为关键存储器的存储器的子集可以用于存储被认为是关键数据的数据子集。 通过使用新的内存模型提供数据价值一致性的概率保证。 所呈现的内存模型和功能与现有的第三方库兼容,使得可以使用关键内存从进程兼容地调用第三方库。

    Expedited techniques for generating string manipulation programs
    15.
    发明授权
    Expedited techniques for generating string manipulation programs 有权
    用于生成字符串操作程序的快速技术

    公开(公告)号:US09552335B2

    公开(公告)日:2017-01-24

    申请号:US13487266

    申请日:2012-06-04

    IPC分类号: G06F9/44 G06F17/22 G06F9/45

    CPC分类号: G06F17/22 G06F8/30 G06F8/427

    摘要: A program creation system is described which generates sets of subprograms for respective input-output examples. The program creation system then groups the sets into partitions by performing an intersection operation. According to one aspect, the program creation system generates subprograms so as to exclude tokens that are not represented by the input strings of the input-output examples. According to another aspect, the program creation system first generates the subprograms without attempting to generate loop-type expressions. If this operation produces unsatisfactory results, the program creation system repeats its processing, this time including loop-type expressions. According to another aspect, the program creation system performs the grouping operation using an expedited graph-intersection operation. According to another aspect, the program creation system ranks programs (which are created based on the results of the grouping operation) based on the presence of preferred features found in the programs.

    摘要翻译: 描述了为相应的输入输出示例生成一组子程序的程序创建系统。 然后,程序创建系统通过执行交叉操作将集合分组成分区。 根据一个方面,程序创建系统生成子程序以排除未由输入 - 输出示例的输入字符串表示的令牌。 根据另一方面,程序创建系统首先生成子程序而不尝试生成循环类型表达式。 如果此操作产生不令人满意的结果,则程序创建系统重复其处理,此时包括循环类型表达式。 根据另一方面,程序创建系统使用加速的图形交叉操作来执行分组操作。 根据另一方面,程序创建系统基于在程序中发现的优选特征的存在来排列基于分组操作的结果创建的程序(其被创建)。

    Tolerating and detecting asymmetric races
    16.
    发明授权
    Tolerating and detecting asymmetric races 有权
    容忍和检测非对称种族

    公开(公告)号:US07971248B2

    公开(公告)日:2011-06-28

    申请号:US11839017

    申请日:2007-08-15

    IPC分类号: G06F11/00

    CPC分类号: G06F9/526

    摘要: Detecting and/or tolerating races. Races occur due to malicious threads not respecting software locks. A method of detecting and/or correcting races includes making local copie(s) and reference copie(s) of shared data. Any read and write operations performed by a safe thread are caused to be performed on the local copie(s) during a critical section. The critical section defines a time frame which a variable lock is placed on shared data. Any read and write operations performed by malicious threads are allowed to be performed on the shared data during the critical section. The shared data, the local copie(s), and the reference copie(s) are compared to determine that a race has been detected. An indication can be output that a race has occurred or the race can be corrected.

    摘要翻译: 检测和/或容忍种族。 由于不遵守软件锁的恶意线程而发生竞赛。 检测和/或校正种族的方法包括制作共享数据的本地复本和参考文件。 在安全线程执行的任何读写操作都会导致在临界区域对本地复合机执行。 关键部分定义了将变量锁定在共享数据上的时间范围。 允许在关键部分对共享数据执行由恶意线程执行的任何读写操作。 比较共享数据,本地复本和参考文件,以确定已经检测到比赛。 可以输出发生比赛的指示或者可以纠正比赛。

    Protection of critical memory using replication
    17.
    发明授权
    Protection of critical memory using replication 有权
    使用复制保护关键内存

    公开(公告)号:US07949841B2

    公开(公告)日:2011-05-24

    申请号:US11608695

    申请日:2006-12-08

    IPC分类号: G06F12/00 G06F13/00 G06F13/28

    CPC分类号: G06F11/167 G06F11/183

    摘要: Typical computer programs may incur costly memory errors that result in corrupted data. A new memory model is presented wherein it may be determined that certain data is critical and critical data may be stored and protected during computer application execution. Critical Memory allows that data determined to be critical may be stored and retrieved using functions enabled to increase the reliability of the data. Functions are presented enabling allocation of redundant computer memory; functions are presented enabling consistently writing critical data to redundant locations; and functions are presented enabling reading critical data while ensuring that the data read is consistent with the most recent write of critical data and enabled to repair inconsistent data. The memory model and functions presented are designed to be compatible with existing third-party libraries.

    摘要翻译: 典型的计算机程序可能会导致导致数据损坏的昂贵的内存错误。 提出了一种新的存储器模型,其中可以确定某些数据是关键的,并且在计算机应用执行期间可以存储和保护关键数据。 关键内存允许确定为关键的数据可以使用启用的功能来存储和检索,以提高数据的可靠性。 提供功能,使冗余计算机存储器的分配; 提供功能,可以将关键数据始终写入冗余位置; 并提供了功能,可以读取关键数据,同时确保数据读取与最新的关键数据写入一致,并能够修复不一致的数据。 所提供的内存模型和功能旨在与现有的第三方库兼容。

    Computer programming language pronouns
    18.
    发明授权
    Computer programming language pronouns 有权
    计算机编程语言代词

    公开(公告)号:US06748585B2

    公开(公告)日:2004-06-08

    申请号:US09725654

    申请日:2000-11-29

    IPC分类号: G06F945

    CPC分类号: G06F8/423

    摘要: Programming language constructs called pronouns and referents, and a method, system, and apparatus for translating computer source code that contains the pronouns and referents. A referent is any semantic or syntactic construct in the source code (e.g., a statement, a portion of a statement, an expression, or a value) to which a pronoun refers. A pronoun is a programming-language defined source-code symbol or a sequence of symbols that refers to the referent. As a result, pronouns eliminate the need to define new names or macros for repeated program segments. When a translator encounters the pronoun in the source code, the translator searches the source code for the referent and substitutes the referent for the pronoun. Thus, by using pronouns and referents, the programmer can write programs faster and easier and eliminate program redundancy without losing readability.

    摘要翻译: 编程语言结构称为代名词和指称,以及用于翻译包含代词和参考文献的计算机源代码的方法,系统和装置。 指称是代词引用的源代码中的任何语义或句法结构(例如,语句,语句的一部分,表达式或值)。 代词是编程语言定义的源代码符号或引用对象的符号序列。 因此,代词消除了为重复的程序段定义新名称或宏的需要。 当翻译者在源代码中遇到代词时,翻译者将搜索源代码作为引用,并用代词代替引用。 因此,通过使用代词和指示,编程人员可以更快更容易地编写程序,消除程序冗余,而不会丢失可读性。