Patent classifications
G06F9/44557
Software-directed value profiling with hardware-based guarded storage facility
A value profiling method, system and computer program product that leverages a guarded storage facility. During code execution, a first instruction is loaded. The first instruction has a first value designating a first region of memory and the first instruction is related to a first section of the code. A determination is made as to whether a guarded mode is enabled at the first region. Responsive to an enabled guarded mode at the first region, a secondary operation is triggered. The secondary operation is in addition to a primary operation of the first instruction. The primary operation is relative to the first region of the memory. The secondary operation causes a profiling of the first section of the code.
DECREASING APPARENT LOAD TIME FOR A FRONTEND APPLICATION WHEN REQUESTING A PAGE FROM A BACKEND APPLICATION OF A MULTIUSER COLLABORATION TOOL
Systems and methods for servicing page requests from a cloud-based software service. In particular, page tree elements defining a page requested from a backend of a cloud-based software service can be can be transmitted to a client device that originated the page request and loaded, client-side, in an order that prioritizes, in one example, features and functionality used most frequently by a particular user of the cloud-based software service.
Container management system with a remote sharing manager
Methods, systems, and computer storage media for providing a set of common flat files in a composite image that can be mounted as a container (i.e. composite container) to support isolation and interoperation of computing resources. Container management is provided for a container management system based on a composite image file system engine that executes composite operations. In particular, a remote sharing manager operates with a composite engine interface to support generating composite images configured for split layer memory sharing, split layer direct access memory sharing, and dynamic base images. In operation, a plurality of files and a selection of a remote sharing configuration for generating a composite image are accessed. The composite image for the plurality of files and the remoting sharing configuration is generated. The composite image is communicated to cause sharing of the composite image, sharing of the composite image is based on the remote sharing configuration.
PROGRAM STARTUP METHOD, ELECTRONIC SYSTEM, AND NON-TRANSITORY STORAGE MEDIUM
A program startup method, an electronic system, and a non-transitory storage medium are disclosed in the embodiments of the present disclosure. The method includes detecting a startup requirement for a program, startup codes of the program being at least partially stored in an external memory, and a part of the startup codes stored in the external memory comprising a plurality of code segments; and performing an operation of loading one of the code segments of the external memory to a RAM and running the one of the code segments multiple times. The one of the code segments loaded each time is different with each other. A size of each code segment is less than or equal to a size of an area of the RAM capable of executing each code segment.
Flat representation of machine learning model
The example embodiments are directed to a system and method for deploying a machine learning model using a parse-free memory allocation. In one example, the method may include one or more of receiving a request to deploy a machine learning model, in response to receiving the request, creating a memory map comprising a mapping of a data structure for storing an unpacked flat representation of the machine learning model, allocating a contiguous block of memory of the data structure that is mapped by the memory map, loading data blocks of the unpacked flat representation of the machine learning model into the allocated contiguous blocks of memory of the data structure, and storing an offset associated with the contiguous block of memory in storage.
Modeling foreign functions using executable references
Techniques for representing a native function using an executable reference are disclosed. The system receives an instruction to create an executable reference for a native function, including a method type comprising a method signature corresponding to the executable reference, and a function description including (a) a memory layout corresponding to data returned by the function and (b) memory layouts corresponding to parameters required by the function. The system selects an application binary interface (ABI). The system generates code that, for each parameter, of the one or more parameters required by the function, converts the parameter from a value formatted for use by a Java Virtual machine to a value formatted for use in the native function, based on the selected ABI. Responsive to invocation of the executable reference, the generated code and the native function may be executed.
MODELING FOREIGN FUNCTIONS USING EXECUTABLE REFERENCES
Techniques for representing a native function using an executable reference are disclosed. The system receives an instruction to create an executable reference for a native function, including a method type comprising a method signature corresponding to the executable reference, and a function description including (a) a memory layout corresponding to data returned by the function and (b) memory layouts corresponding to parameters required by the function. The system selects an application binary interface (ABI). The system generates code that, for each parameter, of the one or more parameters required by the function, converts the parameter from a value formatted for use by a Java Virtual machine to a value formatted for use in the native function, based on the selected ABI. Responsive to invocation of the executable reference, the generated code and the native function may be executed.
INITIAL DATA DISTRIBUTION FOR DIFFERENT APPLICATION PROCESSES
In a mobile device, processes of an application can be monitored and scored for initial data distribution. Specifically, a method can include monitoring processes of an application, and scoring objects or components used by the processes to determine placement of the objects or components in memory during initiation of the application. The method can also include, during initiation of the application, loading, into a first portion of the memory, at least partially, the objects or components scored at a first level. The method can also include, during initiation of the application, loading, into a second portion of the memory, at least partially, the objects or components scored at a second level. The objects or components scored at the second level can be less critical to the application than the objects or components scored at the first level.
MICROCONTROLLER, COMPUTER PROGRAM PRODUCT, AND METHOD FOR ADDING AN ADDITIONAL FUNCTION TO A COMPUTER PROGRAM
According to one aspect, a method adds an additional function to a computer program installed on a microcontroller, the computer program using a table configured to associate an identifier of the additional function with a pointer to a memory address. The method includes the microcontroller obtaining a compiled code of the additional function and an identifier of this additional function, the microcontroller recording the compiled code of the additional function in a section of a memory, and recording in memory a pointer in the table, the pointer being aimed at the address of the memory section in which the compiled code of the additional function is recorded, the pointer being associated in the table with the identifier of the additional function.
Initial data distribution for different application processes
In a mobile device, processes of an application can be monitored and scored for initial data distribution. Specifically, a method can include monitoring processes of an application, and scoring objects or components used by the processes to determine placement of the objects or components in memory during initiation of the application. The method can also include, during initiation of the application, loading, into a first portion of the memory, at least partially, the objects or components scored at a first level. The method can also include, during initiation of the application, loading, into a second portion of the memory, at least partially, the objects or components scored at a second level. The objects or components scored at the second level can be less critical to the application than the objects or components scored at the first level.