System and method for reducing memory leaks in virtual machine programs
    31.
    发明授权
    System and method for reducing memory leaks in virtual machine programs 失效
    减少虚拟机程序中内存泄漏的系统和方法

    公开(公告)号:US07340493B2

    公开(公告)日:2008-03-04

    申请号:US10612802

    申请日:2003-07-02

    Applicant: John M. Lake

    Inventor: John M. Lake

    CPC classification number: G06F12/0269 G06F9/45516 Y10S707/99957

    Abstract: A system and method is provided for reducing memory leaks in virtual machine programs, such as those encountered in programs running in the Java Virtual Machine (JVM) environment. A compiler, such as a Java Just-In-Time (JIT) compiler, is used to identify the last use of an variable and, subsequent to the program statement where the last use occurs, insert a nullification statement. The nullification statement nullifies the variable so that it no longer references an object stored in a garbage collected heap. Variables in a program are identified in the activation records of the program. The nullification statement, when executed, severs the link between the program and the objects stored in the garbage-collected heap so that the program is no longer seen as a “root” for the object, often enabling the garbage collector to reclaim memory occupied by the object sooner.

    Abstract translation: 提供了一种系统和方法,用于减少虚拟机程序中的内存泄漏,例如在Java虚拟机(JVM)环境中运行的程序中遇到的漏洞。 编译器(例如Java Just-In-Time(JIT)编译器)用于识别变量的最后使用,并且在最后一次使用的程序语句之后插入无效语句。 无效语句使变量无效,使其不再引用存储在垃圾回收堆中的对象。 程序中的变量在程序的激活记录中被识别。 无效语句在执行时会切断程序与存储在垃圾收集堆中的对象之间的链接,以使程序不再被视为对象的“根”,通常使垃圾回收器能够回收由 对象更早

    System and method for cache optimized data formatting
    32.
    发明授权
    System and method for cache optimized data formatting 失效
    缓存优化数据格式化的系统和方法

    公开(公告)号:US07298377B2

    公开(公告)日:2007-11-20

    申请号:US10875955

    申请日:2004-06-24

    CPC classification number: G06T17/05 G06T15/005 G06T2210/32

    Abstract: A system and method for cache optimized data formatting is presented. A processor generates images by calculating a plurality of image point values using height data, color data, and normal data. Normal data is computed for a particular image point using pixel data adjacent to the image point. The computed normalized data, along with corresponding height data and color data, are included in a limited space data stream and sent to a processor to generate an image. The normalized data may be computed using adjacent pixel data at any time prior to inserting the normalized data in the limited space data stream.

    Abstract translation: 介绍了缓存优化数据格式化的系统和方法。 处理器通过使用高度数据,颜色数据和正常数据计算多个图像点值来生成图像。 使用与图像点相邻的像素数据,针对特定图像点计算正常数据。 计算的归一化数据以及对应的高度数据和颜色数据被包括在有限的空间数据流中,并被发送到处理器以生成图像。 可以在将有规律化数据插入有限空间数据流之前的任何时间使用相邻像素数据来计算归一化数据。

    System and method for sensing the formation of tin whiskers
    33.
    发明授权
    System and method for sensing the formation of tin whiskers 失效
    用于感测锡晶须形成的系统和方法

    公开(公告)号:US07262603B1

    公开(公告)日:2007-08-28

    申请号:US11427067

    申请日:2006-06-28

    CPC classification number: G01R31/2812

    Abstract: A system and method for sensing the formation of tin whiskers is presented. An assembly substrate includes whisker detectors at various locations for detecting tin whiskers in an X direction, a Y direction, and a Z direction relative to the assembly substrate. Each whisker detector includes sense traces and a trace bridge that produce “planar gaps” and “orthogonal gaps” that are smaller than trace gaps produced by other traces on the assembly substrate. As such, tin whiskers short across the planar gaps and orthogonal gaps before they short across trace gaps. When the assembly substrate is finished with processing steps, a system tester performs a continuity test on the whisker detectors. When the continuity test fails, an operator is notified to check for tin whiskers on the assembly substrate. Once shipped, a processor monitors the whisker detectors for shorts throughout the product's lifecycle.

    Abstract translation: 提出了一种用于感测锡晶须形成的系统和方法。 组装衬底包括用于在X方向,Y方向和Z方向相对于组装衬底检测锡晶须的各个位置处的晶须检测器。 每个晶须检测器包括感测迹线和跟踪桥,其产生小于组装衬底上的其它迹线产生的痕迹间隙的“平面间隙”和“正交间隙”。 因此,锡晶须在平面间隙和正交间隙之间短路,然后短路到迹线间隙。 当组装衬底完成处理步骤时,系统测试仪对晶须探测器进行连续性测试。 当连续性测试失败时,通知操作员检查装配基板上的锡晶须。 一旦发货,处理器会在整个产品的生命周期内监控晶须检测器的短路。

    System and method for processing data through a network firewall
    34.
    发明授权
    System and method for processing data through a network firewall 失效
    通过网络防火墙处理数据的系统和方法

    公开(公告)号:US06981049B2

    公开(公告)日:2005-12-27

    申请号:US09999140

    申请日:2001-11-29

    CPC classification number: H04L63/029 H04L63/0428

    Abstract: A system and method for processing data through a network firewall is presented. A more secure computer system initiates connections to one or more less secure computer systems. The more secure computer system and less secure computer system are separated by a firewall. The more secure computer system queries each less secure computer system periodically to see if there is event data or requests that the more secure computer system should respond to. The less secure computer systems store event data and requests from clients in a storage location until queried by the more secure computer system. When queried, the less secure computer system sends the event data or request information to the more secure computer system through the firewall. The more secure computer system either sends a response to the less secure computer system or sends the event data to an event console for a system administrator to analyze.

    Abstract translation: 介绍了一种通过网络防火墙处理数据的系统和方法。 更安全的计算机系统启动到一个或多个不太安全的计算机系统的连接。 更安全的计算机系统和较不安全的计算机系统由防火墙隔开。 更安全的计算机系统周期性地查询每个较不安全的计算机系统,以查看是否存在事件数据或请求更安全的计算机系统应该响应。 较不安全的计算机系统存储来自存储位置的客户端的事件数据和请求,直到被更安全的计算机系统查询。 当查询时,较不安全的计算机系统通过防火墙将事件数据或请求信息发送到更安全的计算机系统。 更安全的计算机系统将响应发送到较不安全的计算机系统,或将事件数据发送到事件控制台,供系统管理员分析。

    System and method for database integrity via local database lockout
    35.
    发明授权
    System and method for database integrity via local database lockout 失效
    通过本地数据库锁定的数据库完整性的系统和方法

    公开(公告)号:US06901401B2

    公开(公告)日:2005-05-31

    申请号:US10105096

    申请日:2002-03-21

    Abstract: A system and method is provided to perform a routine when the user attempts to access any document in a database. When the user attempts to access any document in the database, a call to a function is performed to determine whether the user is allowed to access a local copy of the database. The function determines whether the database is a local database. If the function determines that the database is running on the user's local machine then the function determines whether the user has permission to access the local copy of the database by searching through individual and group access control files. If the user is authorized, the function allows the user to access the local copy of the database. However, if the user is not authorized, an error message is displayed and the user is denied access to the local database copy.

    Abstract translation: 提供一种系统和方法来在用户尝试访问数据库中的任何文档时执行例程。 当用户尝试访问数据库中的任何文档时,执行对功能的调用,以确定用户是否被允许访问数据库的本地副本。 该函数确定数据库是否是本地数据库。 如果函数确定数据库在用户的本地计算机上运行,​​那么该功能将通过搜索个人和组访问控制文件来确定用户是否具有访问数据库本地副本的权限。 如果用户被授权,则该功能允许用户访问数据库的本地副本。 但是,如果用户未被授权,则会显示错误消息,并拒绝用户访问本地数据库副本。

    Goal seek analysis based on status models

    公开(公告)号:US11971796B2

    公开(公告)日:2024-04-30

    申请号:US17323222

    申请日:2021-05-18

    CPC classification number: G06F11/3055 G06F11/3072 G06N20/00

    Abstract: An approach is provided in which the approach builds a combination model that includes a normal status model and an abnormal status model. The normal status model is built from a set of time-sequenced normal status records and the abnormal status model is built from a set of time-sequenced abnormal status records. The approach computes a set of time-sequenced coefficient combination values of the normal status model and the abnormal status model based on applying a set of fitting coefficient characteristics to the normal status model and the abnormal status model. The approach performs goal seek analysis on a system using the combination model and the set of time-sequenced coefficient combination values.

Patent Agency Ranking