G06F11/302

APPLICATION UPDATES
20180011771 · 2018-01-11 ·

Described herein are example systems and computer-implemented methods for monitoring changes to an application. For example, information regarding a change made to an aspect of an application may be received by a processor. It, may be determined if a similarity of the change to a cluster of changes related to the aspect is within a change threshold. Further, the change may be associated with the cluster of changes when the similarity of the change is within the change threshold. It may be further determined if a metric based on a number of changes associated with the cluster of changes is within a cluster range. When the metric within the cluster range, a prototype change may be extracted from the cluster of changes. The application may be updated based on the prototype change when the metric is within the cluster range.

Generation, administration and analysis of user experience testing

Systems and methods for generating, administering and analyzing a user experience study are provided. In particular, intents can be generated from a user experience study by applying one or more screener questions to participants and subjecting the screened participants to one or more tasks. Corresponding clickstreams and success data for each participant engaging in the tasks can be recorded. The success and clickstream data can also be aggregated for all the screened participants as aggregated results. Video data including audio for each of the screened participants can also be recorded.

Anomaly detection in real-time multi-threaded processes on embedded systems and devices using hardware performance counters and/or stack traces

An aspect of behavior of an embedded system may be determined by (a) determining a baseline behavior of the embedded system from a sequence of patterns in real-time digital measurements extracted from the embedded system; (b) extracting, while the embedded system is operating, real-time digital measurements from the embedded system; (c) extracting features from the real-time digital measurements extracted from the embedded system while the embedded system was operating; and (d) determining the aspect of the behavior of the embedded system by analyzing the extracted features with respect to features of the baseline behavior determined.

Dynamic distributed tracing instrumentation in a microservice architecture
11709756 · 2023-07-25 · ·

A tracing operation is initiated on a service, wherein the service comprises a plurality of method calls. A span is generated comprising timing information associated with the service, wherein the span comprises a plurality of nested spans associated with the plurality of method calls. A determination is made as to whether one or more method calls of the plurality of method calls are causing the service to underperform in view of the plurality of nested spans. In response to determining that the one or more method calls of the plurality of method calls are causing the service to underperform, a remedial action associated with the one or more method calls is performed.

AUTOMATIC TUNING OF A HETEROGENEOUS COMPUTING SYSTEM
20230236947 · 2023-07-27 ·

The present invention provides a method of configuring program parameters during run-time of a computing program for computation in a heterogeneous computing system. A compile program is processed in an autotuning system to optimize the parameters of an application for processing in a heterogeneous system comprising, for example CPU and GPU cores.

CLIENT SIDE BROWSER-BASED CACHING FOR MONITORED RESOURCES

Methods and systems are provided for a browser in a client device that receives a user interface script-code snippet from a web page. A chain logic engine determines whether an in-memory map indicates an output value of prior execution of the UI script-code snippet. If the in-memory map does indicate the output value, it is returned from the in-memory map to generate the user interface. If not, the engine determines whether an in-local storage map indicates the prior executed snippet output. If the in-local storage map indicates the prior executed snippet output, it is returned from the in-local storage map to generate the user interface, and it is stored in the in-memory map. If not, the UI script-code snippet is executed to generate the output value, which is used to generate the user interface, and is stored in the in-memory map and in the in-local storage map.

SYSTEMS AND METHODS FOR ANALYZING COMPUTER INPUT TO PROVIDE NEXT ACTION
20230004586 · 2023-01-05 · ·

A system and method may analyze computer actions on a computer desktop system. Using a data gathering process, a low-level user action information item, describing input by a user (e.g. to the computer desktop system), may be received or gathered. The low-level user action information item may include an input type description and screen window information. Based on a series of low-level user action information items, a process a computer is engaging in with the user may be estimated or determined. The best or most appropriate next low-level user action may be displayed or suggested to the user, e.g. on a computer desktop system to a user.

METHOD FOR GENERATING TOPOLOGY DIAGRAM, ANOMALY DETECTION METHOD, DEVICE, APPARATUS, AND STORAGE MEDIUM
20230004451 · 2023-01-05 ·

Provided are a method and apparatus for generating a topological graph, an anomaly detection method and apparatus, a device and a storage medium. The method for generating a topological graph includes acquiring a preset event stream, where the preset event stream corresponds to a normal log execution path; determining a dependent event pair in the preset event stream; determining a range of a transfer interval corresponding to the dependent event pair, where a transfer interval represents the time difference between adjacent occurrences of two events in the dependent event pair; and generating an event topological graph according to the range of the transfer interval and the transfer probability corresponding to the dependent event pair, where the transfer probability represents the conditional probability between the two events in the dependent event pair.

IDENTIFIERS OF CRASH EVENT WORK ITEMS
20230004458 · 2023-01-05 ·

In some examples, a system comprises a network interface; a storage device comprising machine-readable instructions; and a processor coupled to the network interface, the processor to access the storage device, wherein execution of the machine-readable instructions causes the processor to: collect crash event data; categorize the crash event data by an application executing when the crash event occurred; identify a crash event corresponding to the crash event data; create an identifier for the crash event; compare the identifier of the crash event to a list of work items, wherein each work item has an identifier; and update the list of work items based on the comparison.

SYSTEMS AND METHODS FOR SELECTIVE PATH SENSITIVE INTERVAL ANALYSIS

Abstract interpretation based static analysis tools use relational/non-relational abstract domains to verify program properties. Precision and scalability of analysis vary basis usage of abstract domains. K-limited path-sensitive interval domain is an abstract domain that was conventionally proposed for analysis on industry strength programs. The domain maintains variables' intervals along a configurable K subsets of paths at each program point, which implicitly provides co-relation among variables. When the number of paths at the join point exceeds K, set of paths are partitioned into K subsets, arbitrarily, which results in loss of precision required to verify program properties. To address the above problem, embodiments of the present disclosure provide selective merging of paths in such a way that the intervals computed help verifying more properties. The selective path-sensitive method of the present disclosure is based on the knowledge of variables whose values influence the verification outcome of program properties.