摘要:
Execution traces are collected from multiple execution instances that exhibit performance issues such as slow execution. Call stacks are extracted from the execution traces, and the call stacks are mined to identify frequently occurring function call patterns. The call patterns are then clustered, and used to identify groups of execution instances whose performance issues may be caused by common problematic program execution patterns.
摘要:
Execution traces are collected from multiple execution instances that exhibit performance issues such as slow execution. Call stacks are extracted from the execution traces, and the call stacks are mined to identify frequently occurring function call patterns. The call patterns are then clustered, and used to identify groups of execution instances whose performance issues may be caused by common problematic program execution patterns.
摘要:
A method for enabling access to software security data is provided. The method includes accessing data associated with software vulnerabilities from a plurality of on-line sources. The method further includes aggregating the data from the plurality of on-line sources and identifying attributes associated with the data. The method also includes enabling access to the aggregated data through a graphical user interface that can be used to analyze the data according to the attributes.
摘要:
Global metadata, such as a document identifier, which may be a globally unique identifier, is embedded into an embedded interactive code document by combining a first m-array and a plurality of copies of the first m-array to generate a combined m-array with encoded global metadata such that respective start positions (xd, yd)i of the plurality of copies of the first m-array in the combined m-array are each shifted, by respective amounts that are based on respective portions of the global metadata, relative to a start position of the first m-array in the combined m-array. Global metadata may be decoded from the combined m-array by determining the respective amounts by which the plurality of copies of the first m-array are shifted, relative to the first m-array, in the combined m-array and by combining the respective amounts to produce a decoded value of the global metadata.
摘要:
Techniques for detecting, analyzing, and/or reporting code clone are described herein. In one or more implementations, clone-code detection is performed on one or more source code bases to find true and near clones of a subject code snippet that a user (e.g., a software developer) expressly or implicitly selected. In one or more other implementations, code clone is analyzed to estimate the code-improvement-potential (such as bug-potential and code-refactoring-potential) properties of clones. One or more other implementations present the results of code clone analysis with indications (e.g., rankings) of the estimated properties of the respective the clones.
摘要:
This disclosure describes a user interface and techniques for an interactive graphical representation of large scale data on a display. The disclosure describes how large scale data may be viewed using multiple linked charts. In one implementation, a user interface comprises an overview chart. The user may use chart controller(s) to designate one or more portions of the overview chart viewable in subsequent charts. The user may navigate between the overview chart and the subsequent charts using the chart controller(s).
摘要:
A system and method for encoding a document image and finding a location based on that image are described. A document page is encoded into codes associated with various locations of the document page. The codes are assembled into a code book. Captured images may then be similarly encoded and searched against the codes in the codebook. One or more codes and associated locations may be returned, thereby providing one or more possible locations for the captured images.
摘要:
Described is a technology by which software instrumentation data collected during software program usage sessions is analyzed to identify potential problems with software program usage, such as based on frequency of problem occurrence during the usage sessions. Reliability metrics may be calculated from the information. Failure data additionally collected during the usage sessions may be accessed to derive details that correspond to the potential problems. In one example, the information may be analyzed to determine which alerts and/or asserts occurred most often, and/or to determine a relationship between user interface control operations (e.g., clicks and usage of commands) and alerts or asserts.
摘要:
Systems and methods that determine a path of a pen tip as the pen tip is moved across a document are described. The document is watermarked with a maze pattern from which encoded position information is determined. A sequence of images is captured by a camera that is located in a pen. The path of the pen tip is determined by decoding the associated maze pattern and by matching the captured images with document images. If the position coordinates of any frame that is associated with a stroke cannot be determined from m-array decoding, the frames are transformed and then matched with an area of a document image. Once the position coordinates of at least one frame is determined, the position coordinates of other frames are determined by matching the frames in a neighboring area.
摘要:
In accordance with embodiments of the invention, global metadata, such as a document identifier, which may be a globally unique identifier, is embedded into an embedded interactive code document by combining a first m-array and a plurality of copies of the first m-array to generate a combined m-array with encoded global metadata such that respective start positions (xd,yd)i of the plurality of copies of the first m-array in the combined m-array are each shifted, by respective amounts that are based on respective portions of the global metadata, relative to a start position of the first m-array in the combined m-array. Global metadata may be decoded from the combined m-array by determining the respective amounts by which the plurality of copies of the first m-array are shifted, relative to the first m-array, in the combined m-array and by combining the respective amounts to produce a decoded value of the global metadata.