-
公开(公告)号:US12131188B1
公开(公告)日:2024-10-29
申请号:US18192081
申请日:2023-03-29
Applicant: Amazon Technologies, Inc.
Inventor: Robert Geva , Taylor Goodhart , Ron Diamant , Preston Pengra Briggs
CPC classification number: G06F9/4881 , G06F8/43 , G06F8/433 , G06N3/063
Abstract: A technique for scheduling instructions includes obtaining a set of instructions that operate on memory objects, and determining the dependencies of the memory objects. The memory objects are then sorted into a sequence of memory objects based on the dependencies of the memory objects, and the set of instructions are scheduled into a sequence of instructions according to the sequence of memory objects. Sorting memory objects allows instructions that operate on the same memory object to be kept together. This helps minimize spilling conditions because intervening instructions that do not operate on the same memory object can be avoided.
-
公开(公告)号:US12118336B2
公开(公告)日:2024-10-15
申请号:US17852721
申请日:2022-06-29
Inventor: Zhao Wei , Guangtai Liang , Shanbin Cheng , Qianxiang Wang
Abstract: A method for presenting an associated conflict block comprises obtaining a first conflict file comprising a plurality of first code blocks, wherein a second code block of the first code blocks comprises a first code snippet of a current version of the second code block, a second code snippet of a basic version of the second code block, and a third code snippet of a to-be-merged version of the second code block. A first instruction triggered on a user interface for activating a to-be-processed code block is received, wherein a first type of the to-be-processed code block is of an unresolved conflict block or a single-side change block. A fourth code snippet comprised in the to-be-processed code block and indexes of N associated code blocks of the to-be-processed code block is presented on the user interface.
-
公开(公告)号:US20240338188A1
公开(公告)日:2024-10-10
申请号:US18744672
申请日:2024-06-16
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC.
Inventor: MILTIADIS ALLAMANIS , SHENGYU FU , XIAOYU LIU , NEELAKANTAN SUNDARESAN , ALEXEY SVYATKOVSKIY
IPC: G06F8/51 , G06F8/41 , G06F16/901 , G06F40/279 , G06F40/284 , G06F40/30 , G06N3/0455 , G06N3/08 , G06N20/00
CPC classification number: G06F8/51 , G06N3/08 , G06F8/41 , G06F8/433 , G06F16/9027 , G06F40/279 , G06F40/284 , G06F40/30 , G06N3/0455 , G06N20/00
Abstract: A code adaptation mechanism automatically integrates the variable names of a pasted source code snippet into variable names defined in a pre-existing partial source code program. The variable names from the pasted source code snippet are replaced with anonymized values. A deep learning model predicts the most likely variable name from the pre-existing partial source code program to replace each anonymized value. The deep learning model is trained on numerous variable usage patterns from various source code programs to learn to predict the most likely mapping of an undefined variable name from the pasted source code snippet to a variable name in the pre-existing partial source code program thereby generating a syntactically and semantically correct program.
-
公开(公告)号:US20240329953A1
公开(公告)日:2024-10-03
申请号:US18190331
申请日:2023-03-27
Applicant: Oracle International Corporation
Inventor: Owen Christopher Cliffe
IPC: G06F8/41
CPC classification number: G06F8/433
Abstract: A build system is disclosed that identifies the inputs used by a build process for securely building and deploying a piece of software to production. The build system comprises a build container and a build proxy server. The build container receives a set of initial inputs for performing a build and generates a build output (e.g., a target artifact) as a consequence of performing the build. The build proxy server monitors both internal interactions as well as external interactions (e.g., input dependency fetches from external artifact repositories) of the build container within and outside a network boundary defined around the build container. Based on the monitored interactions, the build proxy server identifies all the additional input components and/or input component dependencies used by the build container for successfully performing the build. The build container uses the identified components to perform the build and generate a target artifact.
-
公开(公告)号:US20240329952A1
公开(公告)日:2024-10-03
申请号:US18190278
申请日:2023-03-27
Applicant: Microsoft Technology Licensing, LLC
Inventor: Anitta Maria MILLER , Sangeetha MADDERLA , Cody Ray CRANFILL , Joshua Thomas NIELSEN , Lori Ann MURRAY , Jason Lancaster MOCK , Gueorgui Bonov CHKODROV , Dan Alexandru NICOLESCU , Akrem Juneidi BASHA , William Duncan MACKENZIE
IPC: G06F8/41
CPC classification number: G06F8/433
Abstract: Techniques for generating a workflow diagram automatically from code are described herein. The diagram can be generated in real-time with code changes or as a batch-processing operation to generate drawings as documentation. An extent delineator is identified in the source code. Based on the location of that extent delineator, a determination is made that multiple lines of the source code share a relationship with one another. An extent is formed by grouping those lines together. An AST, which is based on the code, is accessed. Multiple AST nodes are identified. These nodes correspond to the extent. A flowchart is generated based on (i) the AST, (ii) the source code, and (iii) the extent delineator. One of the flowchart nodes commonly represents the multiple AST nodes corresponding to the extent. This flowchart node is annotated with text that generally describes that node's logic.
-
公开(公告)号:US12105807B1
公开(公告)日:2024-10-01
申请号:US17663309
申请日:2022-05-13
Applicant: Wells Fargo Bank, N.A.
Inventor: Susan Evangeline Bagh
CPC classification number: G06F21/577 , G06F8/433 , G06F8/75 , G06F21/52
Abstract: Disclosed in some examples is an enterprise software management system (ESMS) that manages procurement, deployment, security, and maintenance of software in large enterprises. The ESMS may include one or more of a software tracking component, a software component storage component, a licensing repository component, a software vulnerabilities detection component, and a software risk management component. The ESMS governs and manages software applications and components to reduce legal, security, and other risks to the enterprise environment. The ESMS solves the technical problem of tracking and managing software and components using the technical solution of a tracking framework that utilizes interconnected systems that document, track, and ensure compliance with enterprise software goals.
-
公开(公告)号:US12086575B2
公开(公告)日:2024-09-10
申请号:US17479729
申请日:2021-09-20
Applicant: Earthly Technologies Inc.
Inventor: Vlad A. Ionescu , Alexis Couture-Beil , Adam Gordon Bell , Corey Larson
IPC: G06F8/41
CPC classification number: G06F8/433
Abstract: A system and method for a hybrid development platform for project development that integrates local and continuous integration (CI)-based building and testing. The system and method can make use of a build cluster, that executes individual commands within build targets; a build cache that stores partial results of previous executions; an artifact and image storage system, that stores and updates artifacts and container images; and a secrets repository that manages local and global project secrets. The system and method function as an automated build platform that enables an execution environment agnostic build platform for development over local development and extended network computing environments.
-
公开(公告)号:US12079606B2
公开(公告)日:2024-09-03
申请号:US17949919
申请日:2022-09-21
Applicant: Circle Internet Financial, Inc.
Inventor: Marcus Boorstin , Oleg Zenchenko , Sarah Martin
CPC classification number: G06F8/433 , G06F8/60 , G06Q20/389
Abstract: Certain aspects of the present disclosure provide techniques for building libraries for invoking smart contracts on a blockchain. The method generally includes compiling first source code in a first programming language defining a smart contract comprising a set of operations to be executed on a blockchain into bytecode for the smart contract based on one or more of information about a compiler to be used to compile the first source code or dependencies specified in the first source code. The bytecode for the smart contract is wrapped in second source code in a second programming language. The second source code is compiled into a portion of a library package through which the smart contract can be programmatically invoked, wherein the portion of the library package specifies version information associated with the smart contract. The library package is deployed for use with the blockchain.
-
公开(公告)号:US12056507B2
公开(公告)日:2024-08-06
申请号:US17434242
申请日:2020-02-26
Inventor: Dina Irofti , Paul Dubrulle
IPC: G06F9/44 , G06F8/41 , G06F9/448 , G06F9/54 , G06F16/901
CPC classification number: G06F9/4494 , G06F8/433 , G06F9/54 , G06F16/9024
Abstract: The present invention relates to a method and device for validating a data flow system represented by a data flow graph, comprising: —an acquisition module (9) configured to acquire data related to first and second common parts of the data flow graph, and—a supervision module (11) configured to incrementally verify the coherence of the data flow system by verifying the local coherence of a common unidirectional connection connecting the first common part of the data flow graph to the second common part of the data flow graph at each increment.
-
公开(公告)号:US12045611B1
公开(公告)日:2024-07-23
申请号:US18231024
申请日:2023-08-07
Applicant: Amazon Technologies, Inc.
Inventor: Ron Diamant , Hongbin Zheng , Drazen Borkovic , Haichen Li
Abstract: In one example, a method comprises: receiving input codes, wherein the input codes represent a computational dataflow graph; traversing the computational dataflow graph to identify single-entry-single-exit (SESE) subgraphs of the computational dataflow graph, wherein each SESE subgraph has a sequence of nodes comprising a root node and a child node and representing a sequence of element-wise operators, wherein the root node receives a single input tensor, and wherein the child node outputs a single output tensor; determining a merged operator for each SESE subgraph; and generating executable instructions for the computational dataflow graph to be executed by a hardware accelerator having a first execution unit and a second execution unit, wherein the executable instructions comprise first executable instructions for the merged operators targeted at the first execution unit, and second executable instructions for other operators of the computational dataflow graph targeted at the second execution unit.
-
-
-
-
-
-
-
-
-