摘要:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for analyzing source code and identifying potential defects. The methods employ both static analysis and dynamic testing to detect program defects early in the development stage for better quality with less cost. The analysis also ranks identified potential defects and reports only the most likely defects to a human developer. Once defects are detected, they can be removed right away and similar defects can be prevented automatically.
摘要:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for analyzing source code and identifying potential defects. The methods employ both static analysis and dynamic testing to detect program defects early in the development stage for better quality with less cost. The analysis also ranks identified potential defects and reports only the most likely defects to a human developer. Once defects are detected, they can be removed right away and similar defects can be prevented automatically.
摘要:
Embodiments disclosed herein provide systems and methods for evaluating performance stress in a multi-modal network notification service. In a particular embodiment, a method provides generating a covering array of test factors corresponding to a plurality of modes and a plurality of test level values for each mode and determining an escalation hierarchy of the covering array comprising a plurality of nodes, wherein each node corresponds to a set of test factors in the covering array. The method further provides performing a notification test run of the set of test factors for each node in the escalation hierarchy to determine performance stress for each set of test factors. The method further provides generating a first factor-level-run table with the notification test runs corresponding to each of n-wise test factors and possible test level values and indicating which of the notification test runs in the factor-level-run table resulted in performance stress.
摘要:
A method for the establishing of connections between software users based on a pattern of use and/or a characteristic of content related to the users and the software. The interaction of a software user with the software is monitored and a characteristic of content related to the user and the software is determined. When the user needs customer support, he or she is routed to a fellow user of the same software who is capable of providing help. The helping user is selected based on the way in which the first user interacts with the software and/or the characteristic of content related to the first user and the software.
摘要:
A technique is disclosed for determining off-line the number and location of instrumentation probes to be inserted into a program under testing, and subsequently instrumenting the program at run-time based on the off-line analysis. In accordance with the illustrative embodiment, an off-line analyzer first determines instrumentation locations for a program under test in accordance with a method called the Super Nested Block Method. After the instrumentation locations have been determined, a testing/monitoring tool executes the program and a run-time instrumenter in parallel. The run-time instrumenter accordingly inserts probes into the program, removes probes after they have been executed once, and generates and reports information about code coverage based on the probes.
摘要:
A method and apparatus are provided for the secure delivery of converged services to users of wireless devices in a wireless environment. An application layer broker is position between the user devices and the application server to provide an indirect coupling between the enterprise application server and the wireless user devices. The application layer broker links the wireless environment to the enterprise application server through an event triggered content delivery mechanism without providing a direct link between the wireless user device and the enterprise application server. Delivered content can only be accessed by the intended user and the authorized device. The application layer broker provides adaptation to various user devices and the various capabilities associated with each user device. Wireless devices can be upgraded independently from upgrades to the application server. The decoupling performed by the application layer broker separates the service control, such as user registration from the service delivery.
摘要:
A method for determining the number and location of instrumentation probes to be inserted into a program is disclosed. The method advantageously inserts the minimum number of probes that are required to obtain execution coverage for every node in the program's control-flow graph. In addition, the method requires only one bit to store each probe and does not require the assignment of weights to arcs or nodes of the control-flow graph. In the illustrative embodiment, the nodes of a control-flow graph are partitioned into non-empty sets, where each non-empty set corresponds to a super nested block of the program.
摘要:
A mechanism for encoding and reporting instrumented data is disclosed that requires less storage space and incurs less processor overhead than other methods of the prior art. In accordance with the illustrative embodiment, a bit vector in shared memory corresponds to nodes of a program's control-flow graph that have been instrumented, and the contents of the vector indicate which of these nodes have executed; in addition, character strings in shared memory indicate what file, class, and method each node belongs to. A process that executes concurrently with those of the program under test transmits instrumented data from the shared memory to a database. The illustrative embodiment enables efficient, rapid reporting and storage of instrumented data, and is therefore especially well-suited for run-time analysis of real-time concurrent systems.
摘要:
Techniques are disclosed for controlling interaction between an enterprise application and a mobile client device in a communication system. Push content is generated in a wireless secure server or other type of server, responsive to information received in the wireless secure server from the enterprise application. The push content is deliverable from the wireless secure server to the mobile client device over a wireless network. The wireless secure server receives from the mobile client device, responsive to the push content, a request for additional information identifiable at least in part by the push content. The additional information is deliverable from the server to the mobile client device over the wireless network.
摘要:
The present invention is a system and method to improve the reliability and performance of existing enterprise IP networks which have dual-homed (or multi-homed) network architectures. In one aspect of the invention packets related to a selected category of transmission (e.g., VoIP) are duplicated at an edge router and sent over both (multiple) service providers. After traversing the service provider networks, only the first-to-arrive packets are kept and the later-arriving copies are discarded. In so doing, the result is better protection against node failures, link failures, and packet errors, and also better QoS performance under normal (fault-free) operation.