摘要:
Apparatus for connecting at least one recovery station to preselected ones of plural recorders in an information processing system to recover information jobs from those recorders. Indications of those preselected recorders to which the recovery station is to be connected are stored. Depending upon the criteria on which the recovery station is to be connected to the recorders (e.g. backlog of information jobs awaiting recovery or predetermined sequence), the appropriate one of the recorders is selected and connected to the recovery station. Upon completing the recovery of information jobs from the connected recorder, the next of the preselected recorders is selected in accordance with the aforementioned criteria.Although the recovery station may be connected to recover all of the information jobs in a recorder, apparatus for monitoring and storing data related to those information jobs, including the status thereof, indicates that only the information job which is in the process of recovery is "assigned" to that recovery station, while the remaining jobs which await recovery merely are "ready" to be assigned.
摘要:
Apparatus for monitoring and displaying the activity of an information processing system, such as a central dictation system, having plural recorders, plural originating stations for supplying information jobs to be recorded on the recorders, and recovery stations for recovering information jobs from those recorders. The activity which is monitored and displayed includes the availability of respective recorders to receive information from originating stations, the lengths of information jobs which have been recorded and now await recovery, the expected recovery delay in recovering a new information job to be recorded on a recorder, and the number of information jobs in each recorder that are awaiting recovery. The apparatus includes a processor which senses the aforementioned activity and controls a video display for displaying same.
摘要:
A method for identifying a set of objects in a target application program includes: receiving a plurality of samples of one or more object reference graphs, wherein each object reference graph includes live objects and their references; deriving a set of candidate data structures from the samples; collecting a plurality of properties of each of the live objects in relation to data structures over time; and using a mixture model, combining the plurality of the properties of each live object in a non-linear manner for ranking leak root candidates within each set of candidate data structures The method also includes the identification of an initial set of highly-ranked candidate objects that are possible causes of at least one object leak, wherein the higher the ranking the smaller the identified set.
摘要:
A method and system for analyzing dynamic behavior of a computer program using user-defined classifications of an execution trace. The method comprises the step of forming a database describing the executions of the program. The database includes static information obtained from the program source, and dynamic information describing particular executions of the program. The database is structured into entities, and each of the entities is comprised of a single type of information about the program execution. Each entity is comprised of elements representing individual program elements of said single type, and each element has attributes with values describing the element. The database is augmented by classifying every element of the database as a member of zero or more user defined execution slices; and dynamic behavior of the program is analyzed using the execution slices.
摘要:
A method (and system) of modeling runtime behavior for a software application includes limiting a portion of a run to be analyzed using criteria that define an analysis scenario, structuring events of the analysis scenario as a flow of logical content through a plurality of transformations, applying labels to elements of the flow, and generating a behavior signature for the analysis scenario based on the labels.
摘要:
Methods are provided for extracting reference patterns in JAVA and depicting the same. The extracted and depicted reference patterns may be used to interactively and selectively explore data structures, and to identify and solve memory leaks. A method for extracting reference relationships among objects corresponding to a running program includes the step of designating a starting set of objects. The starting set of objects is partitioned into subsets of objects grouped by class. A recursive operation is applied to each of the starting subsets. The recursive operation includes the step of, given a subset of objects, identifying a second set of objects. The second set includes all objects that refer to at least one object in the subset when a direction of reference terminates at the starting set. Alternatively, the second set includes all objects that are referred to by at least one object in the subset when the direction of reference originates from the starting set. The recursive operation also includes the step of partitioning the second set into new subsets of objects grouped by class. The recursive operation is applied to each of the new subsets until a predefined depth is reached.
摘要:
A method, information processing system, and computer readable medium for annotating graphs to allow for subsequent quick loading and analysis of very large graphs is described. The present invention encompasses a way to order and annotate nodes of a graph into a data stream that allows for optimization of subsequent processing of nodes in later analysis. For example, a very large reference graph representing heap snapshots may be annotated to facilitate post-processing and visualization of the heap for memory leak analysis. In such an example, the present invention reduces the number of objects and references to be modeled in memory, while still capturing the essence of the non-modeled portions. In this example, the present invention may process reference graphs on the scale of one hundred million live objects per snapshot using a computer with one gigabyte of memory.
摘要:
A method (and system) of modeling runtime behavior for a software application includes limiting a portion of a run to be analyzed using criteria that define an analysis scenario, structuring events of the analysis scenario as a flow of logical content through a plurality of transformations, applying labels to elements of the flow, and generating a behavior signature for the analysis scenario based on the labels.