CLASS INITIALIZATION METHOD SEMANTICS
    2.
    发明申请
    CLASS INITIALIZATION METHOD SEMANTICS 失效
    类初始化方法语义

    公开(公告)号:US20070006198A1

    公开(公告)日:2007-01-04

    申请号:US11465091

    申请日:2006-08-16

    IPC分类号: G06F9/45 G06F9/44

    CPC分类号: G06F9/524

    摘要: A system and method for mitigating problems associated with automatic execution of initialization code is provided. The system includes an initialization method activator that can call a class initialization method at a pre-determined execution point. The system also includes a deadlock analyzer that can determine whether calling the initialization method will create a deadlock, and, if a deadlock is detected that can resolve such a deadlock. The system also includes a semantic analyzing component that can analyze a semantic type associated with the initialization method and a domain uniqueness analyzer that can analyze the uniqueness of the domain with which the class will interact, to facilitate determining where to place code that will check whether a class is initialized, and if the class is not initialized that will invoke the class initializing method.

    摘要翻译: 提供了一种减轻与自动执行初始化代码相关的问题的系统和方法。 该系统包括可以在预定执行点调用类初始化方法的初始化方法激活器。 该系统还包括一个死锁分析器,可以确定调用初始化方法是否会产生死锁,并且如果检测到可以解决这种死锁的死锁。 该系统还包括可以分析与初始化方法相关联的语义类型的语义分析组件和可以分析类将与之交互的域的唯一性的域唯一性分析器,以便于确定在哪里放置将检查是否 一个类被初始化,如果类没有被初始化,这将调用类初始化方法。

    Cross assembly call interception
    3.
    发明申请
    Cross assembly call interception 有权
    交叉汇编呼叫截取

    公开(公告)号:US20050172133A1

    公开(公告)日:2005-08-04

    申请号:US10771653

    申请日:2004-02-03

    摘要: A host intercepts calls between two executables and determines whether the calls are permissible according to the host's security model which can be identify based, such as user identity based—for instance, mapping access rights within a specific data base user context to database object access. Such an identity security model differs from a common language runtime security model where managed code uses Code Access Security to prevent managed assemblies from performing certain operations. Managed assemblies registered with the host are host objects from the host's perspective for which access rights can be defined via security rules, such as are defined for individual user identities. A host can decide access between managed executables based on the host's identity based access rules by trapping any cross assembly calls and deciding whether such calls should proceed or be blocked from taking place based on the corresponding identity security settings.

    摘要翻译: 主机拦截两个可执行文件之间的调用,并根据主机的可以识别的安全模型(例如基于用户身份的特定数据库用户上下文中将访问权限映射到数据库对象访问)来确定是否允许呼叫。 这种身份安全模型与公共语言运行时安全模型不同,托管代码使用代码访问安全性来防止托管程序集执行某些操作。 与主机注册的托管程序集是主机视角的主机对象,可以通过安全规则定义访问权限,例如为各个用户身份定义的对象。 主机可以基于主机的基于身份的访问规则来决定托管的可执行文件之间的访问,通过捕获任何交叉程序集调用,并根据相应的身份安全设置来确定这些呼叫是应该继续还是被阻止发生。

    Cross assembly call interception
    5.
    发明授权
    Cross assembly call interception 有权
    交叉汇编呼叫截取

    公开(公告)号:US07770202B2

    公开(公告)日:2010-08-03

    申请号:US10771653

    申请日:2004-02-03

    IPC分类号: G06F17/00 H04L29/06

    摘要: A host intercepts calls between two executables and determines whether the calls are permissible according to the host's security model which can be identify based, such as user identity based—for instance, mapping access rights within a specific data base user context to database object access. Such an identity security model differs from a common language runtime security model where managed code uses Code Access Security to prevent managed assemblies from performing certain operations. Managed assemblies registered with the host are host objects from the host's perspective for which access rights can be defined via security rules, such as are defined for individual user identities. A host can decide access between managed executables based on the host's identity based access rules by trapping any cross assembly calls and deciding whether such calls should proceed or be blocked from taking place based on the corresponding identity security settings.

    摘要翻译: 主机拦截两个可执行文件之间的调用,并根据主机的可以识别的安全模型(例如基于用户身份的特定数据库用户上下文中将访问权限映射到数据库对象访问)来确定是否允许呼叫。 这种身份安全模型与公共语言运行时安全模型不同,托管代码使用代码访问安全性来防止托管程序集执行某些操作。 与主机注册的托管程序集是主机视角的主机对象,可以通过安全规则定义访问权限,例如为各个用户身份定义的对象。 主机可以基于主机的基于身份的访问规则来决定托管的可执行文件之间的访问,通过捕获任何交叉程序集调用,并根据相应的身份安全设置来确定这些呼叫是应该继续还是被阻止发生。

    Profiler Management
    6.
    发明申请
    Profiler Management 有权
    剖面管理

    公开(公告)号:US20080307396A1

    公开(公告)日:2008-12-11

    申请号:US11760901

    申请日:2007-06-11

    IPC分类号: G06F9/44

    摘要: A profiler manager may attach and detach profilers from a running application. A profiler may be detached through a two step process where the profiler is sealed from communicating with the running application, then an evacuation step where the application is able to complete any responses that are pending. While the profiler is in the evacuation phase, another profiler may be attached to the application. Messages to the evacuating profiler may be captured and directed to the proper profiler.

    摘要翻译: 分析器管理器可以从运行的应用程序附加和分离剖析器。 分析器可以通过两步骤过程分离,其中分析器被密封以与正在运行的应用程序通信,然后是撤离步骤,其中应用程序能够完成任何正在等待的响应。 在分析器处于撤离阶段时,另一个分析器可以附着到应用程序。 到抽真空轮廓仪的信息可以被捕获并被引导到适当的分析器。

    MANAGING POOLS OF DYNAMIC RESOURCES
    8.
    发明申请
    MANAGING POOLS OF DYNAMIC RESOURCES 有权
    管理动态资源池

    公开(公告)号:US20100083272A1

    公开(公告)日:2010-04-01

    申请号:US12243859

    申请日:2008-10-01

    IPC分类号: G06F9/50

    摘要: Computer systems attempt to manage resource pools of a dynamic number of similar resources and work tasks in order to optimize system performance. Work requests are received into the resource pool having a dynamic number of resources instances. An instance-throughput curve is determined that relates a number of resource instances in the resource pool to throughput of the work requests. A slope of a point on the instance-throughput curve is estimated with stochastic gradient approximation. The number of resource instances for the resource pool is selected when the estimated slope of the instance-throughput curve is zero.

    摘要翻译: 计算机系统尝试管理动态数量相似的资源和工作任务的资源池,以优化系统性能。 工作请求被接收到具有动态数量的资源实例的资源池中。 确定将资源池中的多个资源实例与工作请求的吞吐量相关联的实例吞吐量曲线。 用随机梯度近似估计实例吞吐量曲线上的点的斜率。 当实例吞吐量曲线的估计斜率为零时,选择资源池的资源实例数。

    CONTROLLING PARALLELIZATION OF RECURSION USING PLUGGABLE POLICIES
    9.
    发明申请
    CONTROLLING PARALLELIZATION OF RECURSION USING PLUGGABLE POLICIES 有权
    使用可扩展政策控制并行化恢复

    公开(公告)号:US20090320005A1

    公开(公告)日:2009-12-24

    申请号:US12132614

    申请日:2008-06-04

    IPC分类号: G06F9/45 G06F15/76

    CPC分类号: G06F8/45

    摘要: A parallelism policy object provides a control parallelism interface whose implementation evaluates parallelism conditions that are left unspecified in the interface. User-defined and other parallelism policy procedures can make recommendations to a worker program for transitioning between sequential program execution and parallel execution. Parallelizing assistance values obtained at runtime can be used in the parallelism conditions on which the recommendations are based. A consistent parallelization policy can be employed across a range of parallel constructs, and inside recursive procedures.

    摘要翻译: 并行策略对象提供了一个控制并行接口,其实现评估了界面中未指定的并行条件。 用户定义和其他并行性策略程序可以向工作程序提出在顺序程序执行和并行执行之间转换的建议。 在运行时获得的并行化辅助值可以在建议所基于的并行条件中使用。 在一系列并行构造和内部递归过程中可以采用一致的并行化策略。