Patent classifications
G06F8/425
SOURCE CODE SIMILARITY DETECTION USING DIGITAL FINGERPRINTS
Similarity in source code is identified by searching digital fingerprints representing at least control flow of blocks of programming statements. At least some of the source code is converted into a plurality of respective tokens. Each of the tokens is associated with a plurality of blocks. Tokens are modified by normalizing at least one value in at least one of the blocks and/or by defining at least one abstraction. Thereafter, a representation of control flow is created, and a digital fingerprint representing at control flow of a token is generated. Thereafter, source code within at least one block of a given token is determined and identifiable as being a duplicate of source code stored in a repository by comparing at least one of the generated digital fingerprints and at least one previously generated digital fingerprint.
Parallel program generating method and parallelization compiling apparatus
There is provided a parallel program generating method capable of generating a static scheduling enabled parallel program without undermining the possibility of extracting parallelism. The parallel program generating method executed by the parallelization compiling apparatus 100 includes a fusion step (FIG. 2/STEP026) of fusing, as a new task, a task group including a reference task as a task having a conditional branch, and subsequent tasks as tasks control dependent, extended-control dependent, or indirect control dependent on respective of all branch directions of the conditional branch included in the reference task.
Information processing apparatus, information processing method, and recording medium
An information processing apparatus includes: a processor configured to: conduct lexical analysis on an interpreter-type source code; compress a source code, on which the lexical analysis has been conducted, by using a compression dictionary that associates an internal code and a compression code; when an execution command of an interpreter is received for the source code compressed, convert the source code compressed into an internal code in accordance with the compression dictionary; and sequentially execute processing in accordance with the internal code converted.
SYSTEM AND METHOD FOR TRANSFORMING COLD FUSION TECHNOLOGY ENVIRONMENT TO OPEN SOURCE ENVIRONMENT
A system and a method for transforming a cold fusion technology environment to an open source environment utilizes a comprehensive library that identifies and maps a source code to their corresponding open source equivalent using a collaboration of tokenizers and syntax analyzers. The system and the method significantly reduce overall total cost and time of conversion. The system and the method facilitate intrinsic bug-free code conversion. The system provides solutions that are easily utilized by any application irrespective of domain or industry.
CONFIDENTIAL MACHINE LEARNING WITH PROGRAM COMPARTMENTALIZATION
A method for implementing confidential machine learning with program compartmentalization includes implementing a development stage to design an ML program, including annotating source code of the ML program to generate an ML program annotation, performing program analysis based on the development stage, including compiling the source code of the ML program based on the ML program annotation, inserting binary code based on the program analysis, including inserting run-time code into a confidential part of the ML program and a non-confidential part of the ML program, and generating an ML model by executing the ML program with the inserted binary code to protect the confidentiality of the ML model and the ML program from attack.
Techniques for using controlled natural language to capture design intent for computer-aided design
A computing device for receiving a design problem statement describing a design problem in a controlled natural language (CNL) that defines permitted lexicons and syntax structures. The design problem statement is processed using the CNL lexicons and syntax structures to produce a job description executable by a design application for generating a design solution for the design problem statement. An improved CNL user interface that assists users to produce valid design problem statements that are CNL-compliant. The CNL user interface receives user-selectable terms that are compliant with the CNL lexicons and generates candidate problem statements that are compliant with CNL syntax structures and receives a selection of a candidate problem statement that is added to the design problem statement. A graphical user interface may display a graphical representation of a design problem statement that can be directly modified. A dialogue-based design process to explore possible design intentions and design solutions.
Systems and methods for handling renaming of programming constructs in programming environments
Apparatus and methods are described for adapting a programming environment to handle renamed programming constructs such as classes and packages. Non-canonical identifiers that reference renamed programming constructs can be used in code parts to be executed in the programming environment, and the code parts can execute, without disruption or user intervention, using related canonical identifiers. The solutions described herein provide backward and forward compatibility for code and data affected by renaming of programming constructs.
SYSTEMS AND METHODS FOR CODE ANALYSIS HEAT MAP INTERFACES
The present application is directed towards systems and methods for providing a heat map interface for analyzing and reporting transformation capabilities of a source installation to a target installation of an application. Characteristics of the source installation are displayed in an easy, intuitive interface, providing improved efficiency in analysis and planning. Furthermore, the interface is interactive, allowing an administrator or user to select and apply transformation dispositions to code objects grouped into regions and sub-regions, providing versatility and accuracy of configuration.
DIRECT FUNCTION CALL SUBSTITUTION USING PREPROCESSOR
Systems and methods for generating a macro substitution command to substitute a single function for a given symbolic name are described. An example method may include a processor analyzing a plurality of build configuration files that describe parameters for building a plurality of source code files. The processor determines whether a single function is declared in the plurality of build configuration files for a given symbolic name. The processor, upon determining that a single function is declared, generates a macro substitution command to substitute an identifier of the single function for the given symbolic name.
Cloud assisted behavioral automated testing
A computer readable storage medium, system and method for improving automated testing systems to include a first and second behavioral data. The first behavioral data is collected periodically and the second behavioral data is collected in real time. The receipt of the first behavioral data and a second behavioral data are followed by the receipt of a system configuration template. A test case is updated based on the first and second behavioral data, and an automated test environment is reconfigured based on the first behavioral data, second behavioral data, and the system configuration template. The test executes in the automated test environment producing a test result.