Patent classifications
G06F9/45
FINGERPRINTING OF REDUNDANT THREADS USING COMPILER-INSERTED TRANSFORMATION CODE
A first processing element is configured to execute a first thread and one or more second processing elements are configured to execute one or more second threads that are redundant to the first thread. The first thread and the one or more second threads are to selectively bypass one or more comparisons of results of operations performed by the first thread and the one or more second threads depending on whether an event trigger for the comparison has occurred a configurable number of times since a previous comparison of previously encoded values of the results. In some cases the comparison can be performed based on hashed (or encoded) values of the results of a current operation and one or more previous operations.
COMMITTED PROGRAM-CODE MANAGEMENT
An association between two or more segments of committed program code can be determined so that the segments of committed program code can be used together for building a software project. For example, one or more communications can be received and indicate that two or more segments of program code are to be committed to one or more repositories associated with a software project. Thereafter, the segments of program code, a database, or other information can be analyzed to determine an association between the two or more segments of program code. Based on the association between the two or more segments of program code, the two or more segments of program code can be integrated together into combined program code. A build tool can then build the software project using the combined program code.
Systems and Methods for Using Error Correction and Pipelining Techniques for an Access Triggered Computer Architecture
A method for improving performance of an access triggered architecture for a computer implemented application is provided. The method first executes typical operations of the access triggered architecture according to an execution time, wherein the typical operations comprise: obtaining a dataset and an instruction set; and using the instruction set to transmit the dataset to a functional block associated with an operation, wherein the functional block performs the operation using the dataset to generate a revised dataset. The method further creates a pipeline of the typical operations to reduce the execution time of the typical operations, to create a reduced execution time; and executes the typical operations according to the reduced execution time, using the pipeline.
Generating a logical representation from a physical flow
Described herein are techniques for processing analytic flows. A physical flow can be parsed into multiple elements. A logical representation can be generated based on the physical flow using a dictionary. An engine-specific logical representation or second physical flow can then be generated based on the logical representation using the dictionary.
Assembly manager
An assembly management system allows a software service provider (SSP) to compile and upload client-specific client application code into a repository. The SSP deploys a client application comprising non-client-specific code to various clients. When a user logs in, a call is made to a web service, which queries the repository for code specific to the requesting client. If available, the web service sends a response with the name and version of the assembly to which the client is subscribed. If the locally-saved version does not match the version of the assembly in the repository, and if the SSP has permission to write to the client's disk, the web service retrieves the assembly and commits it to the disk. If the SSP does not have permission, the assembly is streamed to the client device and retained and executed in memory for the duration of the login.
Methods for facilitating references in a chat context and devices thereof
A method, non-transitory computer readable medium, and chat management server apparatus that receives a search request via a search panel provided in response to a user interaction with a chat panel. A token including a special character is generated based on search text in the search request or a unique identifier for one of a plurality of items identified based on a search performed using the search text. The token is provided to a source of the search request for inclusion in the chat panel as a hyperlink. A preview panel request including the token is received in response to a user interaction with the hyperlink. Content for the items or for the one item is retrieved based on the special character included in the token. The content is provided to a source of the preview panel request.
Application Code Hiding Apparatus Using Dummy Code And Method Of Hiding Application Code Using The Same
An application code hiding apparatus includes a secret code dividing part, a secret code caller generating part, a code analyzing part, a dummy code generating part, a code encrypting part, a code disposing part, a code decryptor generating part, a loader generating part, a decrypted code caller generating part and an unloader generating part. The secret code dividing part divides an application code into a secret code and a normal code. The secret code caller generating part generates a secret code caller. The dummy code generating part generates a dummy code corresponding to the secret code. The code disposing part disposes the dummy code and the encrypted secret code and generates position information thereof. The code decryptor generating part generates a code decryptor. The loader generating part generates a loader. The decrypted code caller generating part generates a decrypted code caller. The unloader generating part generates an unloader.
PARALLELIZATION METHOD, PARALLELIZATION TOOL, AND IN-VEHICLE DEVICE
A computer is configured to generate a parallel program for a multi-core microcomputer from a single program for a single-core microcomputer, based on a dependency analysis of a bundle of unit processes in the single program. The computer obtains dependency information that enables dependency determination of dependency un-analyzable unit processes. Further, the computer performs a dependency analysis of dependency analyzable unit processes. Then, the computer assigns the dependency un-analyzable unit processes and the dependency analyzable unit processes respectively to multiple cores of the multi-core microcomputer, while fulfilling dependency among those processes, based on the obtained dependency information of the dependency un-analyzable unit processes and an analysis result of the dependency analyzable unit processes.
SYSTEM AND METHOD FOR LEGACY LEVEL 1 CONTROLLER VIRTUALIZATION
A method includes translating at least one application source code file associated with a legacy controller in a distributed control system to instructions executable by a controller simulation computing device, wherein the legacy controller is associated with a legacy operating system and the controller simulation computing device is associated with a second operating system different from the legacy operating system. The method also includes simulating operation of the legacy controller using the instructions and an emulation of the legacy operating system in the controller simulation computing device. The method further includes determining configuration data for the legacy controller during the simulated operation of the legacy controller. In addition, the method includes saving the configuration data to a configuration data file.
SYSTEM AND METHOD FOR DEVELOPING APPLICATIONS
A system and method for developing an application. The system comprises a user interface, an object module for creating an object comprising an attribute and a function returning a value for the attribute, an activity module for defining an object's behavior, a simulation module comprising a rule governing the object's environment, and a build module, for compiling the application. The method comprises the steps of defining a plurality of objects and a relationship between the objects, extrapolating a logical clause based on the relationship, and building an application consistent with the logical clause.