Patent classifications
G06F8/37
Bootstrapping profile-guided compilation and verification
Apparatus and methods related providing application execution information (AEI) are provided. A server can receive a request to provide a software package for a particular software application. The server can determine composite AEI (CAEI) for the particular software application. The CAEI can include a composite list of software with data about software methods of the particular software application executed by a computing device other than the server. The server can extract particular AEI related to the particular software application from the CAEI. The particular AEI can provide compiler hints for compiling at least one software method predicted to be executed by the particular software application. The server can generate the software package, where the software package can include the particular software application and the particular AEI. The server can provide the software package.
Generating closures from abstract representation of source code
A device may receive source code and identify, based on the source code, an abstract syntax tree representing an abstract syntactic structure of the source code. Based on the abstract syntax tree, the device may identify a closure, the closure implementing a function based on at least a portion of the abstract syntax tree. In addition, the device may perform an action based on the closure.
BLACKBOX MATCHING ENGINE
A method and apparatus are disclosed for enhancing operable functionality of input source code files from a software program by identifying a first code snippet and a first library function which generate similar outputs from a shared input by parsing each and every line of code in a candidate code snippet to generate a templatized code snippet data structure for the first code snippet, and then testing the templatized code snippet data structure against extracted library function information to check for similarity of outputs between the first code snippet and the first library function in response to a shared input so that the developer is presented with a library function recommendation which includes the first code snippet, the first library function, and instructions for replacing the first code snippet with the first library function.
Estimation of features corresponding to extracted commands used to divide code of software
A feature estimating device includes a parser identifying means for identifying a parser, the parser being contained in software, for parsing user input and executing a relevant command, a dividing means for extracting commands form a character string in the parser and clustering control flows connecting with the extracted commands as starting points to divide a code of the software for each feature, and a feature estimating means for estimating, based on a characteristic part of each divided code, a feature for each divided code.
ERROR CHECKING OF NOTEBOOK CODE BLOCKS
Proofing computer code in code blocks of an electronic computing interface based on generated dependency information between at least some related code blocks. When executing one or more of the code blocks, the dependency information is generated which tracks one or more of information associated with a user's actions, defined variables, defined functions, called functions, and associated imported data. A notification is displayed in the electronic computing interface to indicate when one or more or inconsistencies exist between related code blocks based on the dependency information.
Rapid onboarding of data from diverse data sources into standardized objects with parser and unit test generation
Exemplary embodiments may provide an automated approach for processing an input data sample to yield a set of object classes, a parser and one or more unit tests for input data that is to be integrated into a data lake. The objects may be readily queried and, in some instances, may be Plain Old Java Objects (POJO's). The exemplary embodiments may process an input data sample to better understand the format of the input data. The input sample may be processed to identify entities, such as records, objects or the like, in the input data sample. The input data sample may be processed on a line by line basis to identify fields in the entities. Once the format of the input data is determined from the input data sample, a parser may be generated to parse the input data.
Recipe-Driven Interpreter for Data Sample Manipulation for DDS Topic Types
A bidirectional conversion method is provided between a memory representation and a network representation of data samples associated with a DDS type in a system using an Object Management Group DDS and a Real-Time Publish Subscribe (RTPS) protocol that is more potent, maintainable, and with a smaller footprint. A first conversion recipe is generated using a type description and a language binding information that transforms any data sample associated with the type description from a first memory representation to a network representation, and this first conversion recipe is generated only once. A second conversion recipe is generated using a type description and language binding information that transforms any data sample associated with the type description from the network representation to a second memory representation, and this second conversion recipe is generated only once. Both generated first and second conversion recipes are then executed on all data samples.
Systems, devices, and methods for source code generation from binary files
Described herein are various computing technologies for various reverse engineering platforms capable of outputting (e.g., creating, generating) a human readable and high level source code (e.g., C formatted text, Fortran formatted text, LISP formatted text, BASIC formatted text) from various binary files (e.g., application binary file, executable binary file, data binary file) in its original language, as developed before compilation. For example, some of such reverse engineering platforms can be programmed to disassemble binary files from different process architectures, identify various code optimizations as compiler introduced, reverse or unwind various compiler optimizations (de-optimize), and generate a human readable and high-level source code from de-optimized data. These techniques can be technically beneficial for design recovery purposes (e.g., security auditing, digital rights management, driver engineering).
Interface Effect Minimization by Software Design
A method is provided for integrating interfaces in software. The method includes incorporating a library to the source file to produce a plurality of adapters and abstractions; compiling the adapters and abstractions into a digital library; transferring the adapters and abstractions into an application source code; linking the application source code with the library to produce a combination file; and compiling the combination file into an executable application file.
Inner and outer code generator for volatile memory
A system includes a volatile memory to store data and a memory controller to manage the data in the volatile memory. The memory controller includes an inner code generator to generate a respective inner correction code for each of a plurality of blocks of the data in the volatile memory. An outer code generator generates an outer correction code based on the plurality of blocks of the data. The memory controller updates the outer correction code as part of a refresh to the plurality of blocks of the data in the volatile memory.