Abstract:
A method for managing memory leaks in a memory device includes grouping, by a garbage collection system, a plurality of similar memory allocations of the memory device into one or more Unique Fixed Identifiers (UFIs); identifying, by the garbage collection system, one of the one or more UFIs having a highest accumulated memory size and adding each of the plurality of memory allocations in the identified one of the one or more UFIs into a Potential Leak Candidate List (PLCL); identifying, by the garbage collection system, the memory leaks in the memory device by identifying unreferenced memory addresses associated with the plurality of memory allocations in the PLCL; and releasing, by the garbage collection system, the identified unreferenced memory addresses associated with the plurality of memory allocations corresponding to the memory leaks into the memory device.
Abstract:
Provided is a method of providing mobile communication information. The method includes acquiring, by a master terminal, mobile communication information necessary for using mobile communication services in a predetermined area, wherein the master terminal is connected to at least one slave terminal via a predetermined network and transmitting the mobile communication information to the at least one slave terminal via the predetermined network.
Abstract:
Disclosed herein is a method for providing a fair access to a spinlock to one or more cores in a multicore system. The method includes setting, a spinlock variable by the first core of the one or more cores. The setting of the spinlock variable corresponds to changing a cache state of the spinlock variable in a cache of the first core to MODIFIED. Further, the method includes setting a secondary variable by the second core of the one or more cores. The setting of the secondary variable corresponds to changing a cache state of the secondary variable in a cache of the second core to MODIFIED. Furthermore, the method includes releasing, by the first core, the spinlock after performing one or more operations on the critical section of data. Furthermore, the method includes updating, by the first core, the INVALID secondary variable.