$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Dynamic classification of sections of software 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-009/44
출원번호 US-0197242 (1998-11-20)
발명자 / 주소
  • Galen C. Hunt
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Klarquist Sparkman, LLP
인용정보 피인용 횟수 : 258  인용 특허 : 10

초록

Dynamic classification of sections of software using a profile-based optimization system optimizes management of the sections of software. Software executes under expected usage conditions. After execution, a set of usage profiles describes the dynamic properties of sections of the software. Each us

대표청구항

1. A method in a computer system for classifying a component of software by matching a usage background of the component to a usage profile, wherein the software comprises plural components, and wherein a dynamic structure tracks the usage of the plural components, the method comprising:executing th

이 특허에 인용된 특허 (10)

  1. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
  2. Clawson James, Distributed computing architecture.
  3. Hastings Reed (La Honda CA), Method and apparatus for modifying relocatable object code files and monitoring programs.
  4. Blake Russ ; Baghai M. Reza ; Smith Lee A., Method and system for determining an optimal placement order for code portions within a module.
  5. Vogel Keith Randel, Method and system for selecting instrumentation points in a computer program.
  6. Bennett John G. (San Mateo CA), System and methods for optimizing compiled code according to code object participation in program activities.
  7. Hastings Reed (La Honda CA), System for modifying relocatable object code files to monitor accesses to dynamically allocated memory.
  8. Lau Christina,CAX, Systems, methods and computer program products for building frameworks in an object oriented environment.
  9. Brumme Christopher ; De Groot Michael ; Lemke Ralph ; Dancs Frank ; Fung Priscilla, Uniform object model having methods and additional features for integrating objects defined by different foreign object type systems into a single type system.
  10. Delucia R. Ralph (Valencia PA) Wolf Daniel J. (Bethel Park PA) Casteel Eric P. (N. Huntingdon PA), Verification of computer software.

이 특허를 인용한 특허 (258)

  1. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  2. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  3. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  4. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  5. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter J., Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  6. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter J., Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  7. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  8. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive integrated circuitry with heterogenous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  9. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive processor for performing an operation with simple and complex units each comprising configurably interconnected heterogeneous elements.
  10. Cho, Kenta; Kase, Naoki, Agent system and method.
  11. Cho,Kenta; Kase,Naoki, Agent system and method.
  12. Master, Paul L.; Uvacek, Bohumir, Apparatus and method for adaptive multimedia reception and transmission in communication environments.
  13. Hussain,Riaz Yousuf; John, Jr.,Chester Charles; Levine,Frank Eliot; Richardson,Christopher Michael, Apparatus and method for cataloging symbolic data for use in performance analysis of computer programs.
  14. Berry, Robert Francis; John, Jr., Chester Charles; Levine, Frank Eliot; Mulvey, Donald Lawrence; Richardson, Christopher Michael; Urguhart, Robert J., Apparatus and method for creating a trace file for a trace of a computer program based on loaded module information.
  15. Berry, Robert Francis; John, Jr., Chester Charles; Levine, Frank Eliot; Richardson, Christopher Michael; Urguhart, Robert J., Apparatus and method for performing symbolic resolution of modules using static representations of a trace.
  16. Yates, Jr., John S.; Storch, Matthew F.; Nijhawan, Sandeep; Jurich, Dale R.; Van Dyke, Korbin S., Apparatus for executing programs for a first computer architechture on a computer of a second architechture.
  17. Yates, Jr., John S.; Storch, Matthew F.; Nijhawan, Sandeep; Jurich, Dale R.; Van Dyke, Korbin S., Apparatus for executing programs for a first computer architecture on a computer of a second architecture.
  18. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
  19. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
  20. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
  21. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, system and method for configuration of adaptive integrated circuitry having fixed, application specific computational elements.
  22. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, system and method for configuration of adaptive integrated circuitry having heterogeneous computational elements.
  23. Aune, Joshua, Apparatus, system, and method for grouping data stored on an array of solid-state storage elements.
  24. Matsui, Yuma, Application management system and method of controlling the same.
  25. Russo, David A.; Frankel, Robert E., Application programming interface with inverted memory protocol for embedded software systems.
  26. Bloesch, Anthony, Asset composition.
  27. Bloesch, Anthony, Asset composition.
  28. Goulden, David L.; Gilbert, Charles; Zeldin, Craig, Attributing and allocating advertising revenue for embedded software.
  29. Kershenbaum,Aaron; Koved,Lawrence; Pistoia,Marco, Automated program resource identification and association.
  30. Wright, Ian Paul, Automatic developer behavior classification.
  31. Barua, Rajeev; Anand, Kapil; Kotha, Aparna; Elwazeer, Khaled, Binary rewriting system.
  32. Garrett, Charles D.; Fraser, Christopher W., Bottleneck detector application programming interface.
  33. Garrett, Charles D.; Fraser, Christopher W., Bottleneck detector for executing applications.
  34. Nikolov,Nikolai G.; Kabadiyski,Mario, Byte code modification for testing, debugging and/or monitoring of virtual machine based software.
  35. Nikolov,Nikolai G., Classfile conversion into an organization of objects, and modification thereof, to effect bytecode modification.
  36. Chan,Hon Keat W., Classifying software and reformulating resources according to classifications.
  37. Millington, Bradley D.; Lin, Andrew Cheng-Min; Kothari, Nikhil, Client-side callbacks to server events.
  38. Dostert, Jan; Kilian, Frank, Common trace files.
  39. Curtis,Pavel; Leung,Yiu Ming, Common, multi-version interface that allows a distributed sybsystem to communicate with multiple versions of the distributed subsystem.
  40. Heidari, Ghobad; Chang, Kuor Hsin; Master, Paul L.; Hogenauer, Eugene B.; Scheuermann, Walter James, Communications module, device, and method for implementing a system acquisition function.
  41. Berent,Anthony Neil; Brawn,Jonathan William; Gotch,Paul Robert, Compilation of application code in a data processing apparatus.
  42. Horvitz, Eric, Computational architecture for managing the transmittal and rendering of information, alerts, and notifications.
  43. Yates, John S., Computer execution by opportunistic adaptation.
  44. Van Dyke,Korbin S.; Campbell,Paul; Van Dyke,Don Alan, Computer for execution of RISC and CISC instruction sets.
  45. Yenne,Britt; Burton,Dave, Computer software run-time analysis systems and methods.
  46. Kimelman, Douglas N.; Rajan, Vadakkedathu T.; Roth, Tova; Sreedhar, Vugranam C.; Wegman, Mark N., Computer system program and method to characterize each of a plurality of objects used at runtime to determine a lowest cost property among a plurality of potential alternative properties for each of said objects minimizing total cost of interaction among components during program execution.
  47. Master, Paul L.; Watson, John, Configurable hardware based digital imaging apparatus.
  48. Gouge,Christopher S.; Masson,James S.; Van Zwol,Theodore C.; Day,Michael James, Configuring software components(merge) with transformation component using configurable and non-configurable data elements.
  49. McKibben, Michael T.; Lamb, Jeffrey R., Context instantiated application protocol.
  50. Scheuermann, W. James; Hogenauer, Eugene B., Control node for multi-core system.
  51. Millington,Brad; Kothari,Nikhil; Lipton,Eilon; Huff,Polita, Data controls architecture.
  52. Cook, Randall; Blaser, Jared, Data layer prioritization in an application layered system.
  53. Katzer, Robin D.; Persson, Carl J., Data store wrapper enhancements.
  54. Krajec, Russell S.; Li, Ying, Deploying trace objectives using cost analyses.
  55. Savchenko, Vladimir; Stoyanova, Dimitrina; Falter, Timm, Deployment of a web service.
  56. Yates, Jr., John S.; Reese, David L.; Hohensee, Paul H.; Purcell, Stephen C.; Van Dyke, Korbin S., Detecting conditions for transfer of execution from one computer instruction stream to another and executing transfer on satisfaction of the conditions.
  57. Yates, Jr.,John S.; Reese,David L.; Van Dyke,Korbin S.; Hohensee,Paul H., Detecting reordered side-effects.
  58. Neuvirth-Telem, Hani; Hilbuch, Amit; Nahum, Shay Baruch; Finkelstein, Yehuda; Alon, Daniel; Yom-Tov, Elad, Detection of abnormal resource usage in a data center.
  59. Darling,Glen; Balint,Matthew; Kakumani,Badari; Devlin,Mala, Development and build environment for packaged software delivery.
  60. Clewis,Fred T.; Sitze,Richard A., Directed non-cyclic graph walking system for data processing and analysis in software application.
  61. Castillo, Claris; Spreitzer, Mike; Steinder, Malgorzata; Tantawi, Asser N.; Whalley, Ian N., Distribution of intermediate data in a multistage computer application.
  62. Hunt, Galen C., Dynamic classification of sections of software.
  63. Lee, Min-Ju; Egger, Bernhard; Lee, Jae-jin; Kim, Young-Lak; Kim, Hong-Gyu; Kim, Hong-June, Dynamic library profiling method and dynamic library profiling system.
  64. Chilimbi, Trishul; Hirzel, Martin, Dynamic prefetching of hot data streams.
  65. Atm,Shafiqul Khalid, Dynamic registry partitioning.
  66. Canfield, James Andrew; Carbone, Kenneth; Colburn, David Fairlie; Myers, Linda Nols; Van Lenten, Thomas E.; Willis, Gregory Alan, E-mail interface having an informational tool tip.
  67. Canfield, James Andrew; Carbone, Kenneth; Colburn, David Fairlie; Myers, Linda Nols; Van Lenten, Thomas E.; Willis, Gregory Alan, E-mail interface having an informational tool tip.
  68. Canfield,James Andrew; Carbone,Kenneth; Colburn,David Fairlie; Myers,Linda Nols; Van Lenten,Thomas E.; Willis,Gregory Alan, E-mail interface having an informational tool tip.
  69. Lopatic, Thomas, Efficient compression of applications.
  70. Satish, Sourabh; Sobel, William E., Enabling efficient use of an endpoint.
  71. Gautallin, Renat; Gounares, Alexander G.; Fraser, Christopher W., Error list and bug report analysis for configuring an application tracer.
  72. Van Dyke, Korbin S.; Campbell, Paul; Thusoo, Shalesh; Ramesh, T. R.; McNaughton, Alan, Exception mechanism for a computer.
  73. McBride, Edmund Joseph, Executable application network impact and load characteristic estimation system.
  74. Yates, Jr.,John S.; Nijhawan,Sandeep; Storch,Matthew F.; Jurich,Dale R., Executing programs for a first computer architecture on a computer of a second architecture.
  75. Nikolov, Nikolai G., Execution of modified byte code for debugging, testing and/or monitoring of object oriented software.
  76. Bloesch, Anthony; Rajagopal, Ramesh, Extensibility application programming interface and framework for meta-model objects.
  77. Bloesch,Anthony; Rajagopal,Ramesh, Extensibility application programming interface and framework for meta-model objects.
  78. Furtek, Frederick Curtis; Master, Paul L., External memory controller.
  79. Furtek, Frederick Curtis; Master, Paul L., External memory controller node.
  80. Furtek, Fredrick Curtis; Master, Paul L., External memory controller node.
  81. Furtek, Fredrick Curtis; Master, Paul L., External memory controller node.
  82. Tibble, Julian; Avgustinov, Pavel; Cawley, Peter, Extracting source code.
  83. Tibble, Julian; Avgustinov, Pavel; Cawley, Peter, Extracting source code.
  84. Tibble, Julian; Avgustinov, Pavel; Cawley, Peter, Extracting source code.
  85. Tibble, Julian; Avgustinov, Pavel; Cawley, Peter, Extracting source code.
  86. Rustad,Joseph, Fast transaction response time prediction across multiple delay sources.
  87. Cook, Randall; Jones, Scott; Hurren, Jeremy, File type associative application layered system.
  88. Cook, Randall R., Finer grained data organization using data sublayers.
  89. Aravamudan, Murali; Iyer, Prakash, Garbage collection method for time-constrained distributed applications.
  90. Scheuermann,Walter James, Hardware implementation of the secure hash standard.
  91. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  92. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  93. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  94. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  95. Hunt,Galen C., Heavyweight and lightweight instrumentation.
  96. Hunt,Galen C., Heavyweight and lightweight instrumentation.
  97. Canfield, James Andrew; Carbone, Kenneth; Colburn, David Fairlie; Myers, Linda Nols; Van Lenten, Thomas E.; Willis, Gregory Alan, IM conversation counter and indicator.
  98. Canfield,James Andrew; Carbone,Kenneth; Colburn,David Fairlie; Myers,Linda Nols; Van Lenten,Thomas E.; Willis,Gregory Alan, IM conversation counter and indicator.
  99. Li, Ying; Gounares, Alexander G.; Garrett, Charles D.; Krajec, Russell S., Increasing performance at runtime from trace data.
  100. Takimoto,Minoru, Information processing system enabling dynamically loading or replacing program component in memory allocated to activated process.
  101. Arnold, Jeremy Alan; Santosuosso, John Matthew, Inheritance breakpoints for use in debugging object-oriented computer programs.
  102. Canfield,James Andrew; Carbone,Kenneth; Colburn,David Fairlie; Myers,Linda Nols; Lenten,Thomas E.; Willis,Gregory Alan, Instant messaging interface having a tear-off element.
  103. Canfield,James Andrew; Carbone,Kenneth; Colburn,David Fairlie; Myers,Linda Nols; Van Lenten,Thomas E.; Willis,Gregory Alan, Instant messaging interface having a tear-off element.
  104. Canfield,James Andrew; Carbone,Kenneth; Colburn,David Fairlie; Myers,Linda Nols; Van Lenten,Thomas E.; Willis,Gregory Alan, Instant messaging interface having an informational tool tip.
  105. Horvitz, Eric J., Integration of a computer-based message priority system with mobile electronic devices.
  106. Canfield, James Andrew; Carbone, Kenneth; Colburn, David Fairlie; Myers, Linda Nols; Van Lenten, Thomas E.; Willis, Gregory Alan, Interface for displaying electronic communications.
  107. Cook,Randall R.; Kinghorn,Dwain A.; Sainsbury,Michael E., Intrustion protection system utilizing layers.
  108. Cook, Randall R.; Kinghorn, Dwain A.; Sainsbury, Michael E., Intrustion protection system utilizing layers and triggers.
  109. Garrett, Charles D.; Fraser, Christopher W., Iterative bottleneck detector for executing applications.
  110. Roth, Steven, Kernel module interface dependencies.
  111. Jones, Scott; Hurren, Jeremy; Blaser, Jared; Cook, Randall, Layer typed prioritizing application layered systems.
  112. Blaser,Jared Ricks; Cook,Randall Richards, Layered computing systems and methods.
  113. Blaser,Jared Ricks; Cook,Randall Richards, Layered computing systems and methods for insecure environments.
  114. Shavit,Nir N.; Heller,Steven K.; Flood,Christine H., Load-balancing queues employing LIFO/FIFO work stealing.
  115. Flood, Christine H.; Detlefs, David L.; Garthwaite, Alexander T., Local allocation buffers for parallel garbage collection.
  116. Sambhwani, Sharad; Heidari, Ghobad, Low I/O bandwidth method and system for implementing detection and identification of scrambling codes.
  117. Sambhwani, Sharad; Heidari, Ghobad, Low I/O bandwidth method and system for implementing detection and identification of scrambling codes.
  118. Sambhwani,Sharad; Heidari,Ghobad, Low I/O bandwidth method and system for implementing detection and identification of scrambling codes.
  119. Patel,Ronak; Van Dyke,Korbin S.; Ramesh,T.R.; Thusoo,Shalesh; Saund,Gurjeet Singh; Mansingh,Sanjay; Campbell,Paul William, Managing instruction side-effects.
  120. Bach, Edward; Oberdorf, Richard; Larson, Brond, Managing lineage information.
  121. Ladd, Patrick; Sarosi, George W., Media extension apparatus and methods for use in an information network.
  122. Russo, David A.; Frankel, Robert E., Memory management in embedded system with design time object instantiation.
  123. Russo, David A.; Frankel, Robert E., Memory management in embedded systems with dynamic object instantiation.
  124. Alpern, Bowen, Method and apparatus for efficient interface method dispatch.
  125. Allison, David S., Method and apparatus for extending a program element in a dynamically typed programming language.
  126. Webb, Brandyn, Method and apparatus for remote communication of data associated with dynamically generated type object at runtime to describe the data type.
  127. Bennett, Dominic; Paczkowski, Remigiusz K., Method and apparatus for responding to request for information-personalization.
  128. Bates,Cary L.; Berestetsky,Vadim, Method and apparatus to create and compare debug scenarios of a computer process.
  129. Martin, Anthony; Goulden, David L.; Bennett, Dominic V.; Petersen, Roger; Paczkowski, Remigiusz K., Method and device for publishing cross-network user behavioral data.
  130. Martin, Anthony; Goulden, David L.; Bennett, Dominic V.; Petersen, Roger; Paczkowski, Remigiusz K., Method and device for publishing cross-network user behavioral data.
  131. Master, Paul L., Method and system for achieving individualized protected space in an operating system.
  132. Boucher, Michael L., Method and system for code optimization.
  133. Master, Paul L., Method and system for creating and programming an adaptive computing engine.
  134. Frey, Gregor K.; Weller, Joerg; Opgenorth, Juergen; Kautzleben, Reinhold; Petrov, Miroslav R., Method and system for employing a hierarchical monitor tree for monitoring system resources in a data processing environment.
  135. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  136. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  137. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  138. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  139. Chipman, Timothy, Method and system for program transformation using flow-sensitive type constraint analysis.
  140. Smith,Michael D.; Bala,Vasanth, Method and system for protecting software applications against static and dynamic software piracy techniques.
  141. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  142. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  143. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  144. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  145. Charnell, William Thomas; Plummer, Wayne; Darnell, Stephen; Dias, Blaise Abel Alec; Guthrie, Philippa Joy; Kramskoy, Jeremy Paul; Sexton, Jeremy James; Wynn, Michael John; Rautenback, Keith; Thomas, , Method and system of memory management using stack walking.
  146. Fahs,Brian; Hundt,Robert; Krishnaswamy,Tara, Method and system to instrument virtual function calls.
  147. Goulden, David L.; Gilbert, Charles; Zeldin, Craig, Method for attributing and allocating revenue related to embedded software.
  148. Horvitz, Eric, Method for automatically assigning priorities to documents and messages.
  149. Arnold, Matthew R.; Fink, Stephen J.; Grove, David P.; Hind, Michael J.; Sweeney, Peter F.; Whaley, John, Method for characterizing program execution by periodic call stack inspection.
  150. Chacko, Joseph K.; Flavell, Stephen; Proctor, Hedley, Method for performing memory leak analysis inside a virtual machine.
  151. Bala,Vasanth; Smith,Michael D., Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent.
  152. Kempter, Bernhard; Mangold, Florian; Pönitsch, Michael, Method for the computer-aided determination of an optimization potential of a soft-ware system.
  153. Hammer, Moritz; Majewski, Kurt; Mangold, Florian; Moll, Christoph; Rölle, Harald; Wasgint, Rainer, Method for the computer-aided determination of the dependencies of a plurality of modules of a technical system, especially of a software system.
  154. Master,Paul L.; Hogenauer,Eugene; Wu,Bicheng William; Chuang,Dan MingLun; Freeman Benson,Bjorn, Method, system and program for developing and scheduling adaptive integrated circuity and corresponding control or configuration information.
  155. Lewallen,Stephen Richard, Method, system, and program for remotely manipulating a user interface over a network.
  156. Osminer, Matt; Gazdzinski, Robert F., Methods and apparatus for analyzing software interface usage.
  157. Osminer, Matt; Gazdzinski, Robert F., Methods and apparatus for analyzing software interface usage.
  158. Ladd, Patrick; Sarosi, George, Methods and apparatus for event logging in an information network.
  159. Ladd, Patrick; Sarosi, George W., Methods and apparatus for hardware registration in a network device.
  160. Roberts,David Gary; Hansell,Jeffrey Stuart; Kumar,Mahesh, Methods and systems for changing a topology of a network.
  161. Voccio, Paul; Dietz, Matthew Charles, Methods and systems of distributed tracing.
  162. Voccio, Paul; Dietz, Matthew Charles, Methods and systems of distributed tracing.
  163. Voccio, Paul; Dietz, Matthew Charles, Methods and systems of function-specific tracing.
  164. Voccio, Paul; Dietz, Matthew Charles, Methods and systems of generating a billing feed of a distributed network.
  165. Walsh, Alexander Leonard; Spraggins, Daniel Joseph, Methods and systems of monitoring failures in a distributed network system.
  166. Walsh, Alexander Leonard, Methods and systems of predictive monitoring of objects in a distributed network system.
  167. Dragon, Monsyne Michael; Walsh, Alexander Leonard; Spraggins, Daniel Joseph, Methods and systems of tracking and verifying records of system change events in a distributed network system.
  168. Dragon, Monsyne Michael; Walsh, Alexander Leonard; Spraggins, Daniel Joseph, Methods and systems of tracking and verifying records of system change events in a distributed network system.
  169. Weber, Lutz; Bohme, Timo, Methods, computer systems, software and storage media for handling many data elements for search and annotation.
  170. Srivastava,Amitabh; Thiagarajan,Jayaraman, Mining dependencies for testing and risk management.
  171. Sanghvi, Ashvinkumar J.; Rizzi, Lorenzo, Model-based event processing.
  172. Nikolov, Nikolai G., Modified classfile registration with a dispatch unit that is responsible for dispatching invocations during runtime execution of modified bytecode.
  173. Seto, Tetsuo; Gounares, Alexander G.; Krajec, Russell S., Module specific tracing in a shared module environment.
  174. Roth,Steven; Chandramouleeswaran,Aswin, Multiple saved kernel configurations.
  175. Wooldridge, James L., NUMA page selection using coloring.
  176. Kautzleben, Reinhold, Notification architecture and method employed within a clustered node configuration.
  177. Blais, Marc Noel; Schmidt, William Jon, Object oriented apparatus and method for allocating objects on an invocation stack.
  178. Andrews, Anthony D.; Thatte, Satish R.; Hill, Richard D.; Norlander, Rebecca A.; Armanasu, Alexander A., Object security boundaries.
  179. Graveline, Marc; Roy, Patrick; Viney, Ulf, Opaque cryptographic web application data protection.
  180. Nishimura, Kazuyuki, Operation input processing apparatus and method.
  181. Krajec, Russell S.; Li, Ying, Optimization analysis using similar frequencies.
  182. Cook, Randall; Blaser, Jared, Path variablizing layered system.
  183. Cook, Randall R.; Hurren, Jeremy K.; Payne, Jared G., Per user and per process layer visibility.
  184. Krajec, Russell S.; Li, Ying, Periodicity optimization in an automated tracing system.
  185. Cook,Randall R.; Blaser,Jared R., Portable memory storage devices containing public context application layers.
  186. Cook, Randall R.; Blaser, Jared R., Portable memory storage devices with application layers.
  187. Burd,Gary S.; Cooper,Kenneth B.; Guthrie,Scott D.; Ebbo,David S.; Anders,Mark T.; Peters,Ted A.; Millet,Stephen J., Postback input handling by server-side control objects.
  188. Blaser, Jared; Cook, Randall, Process tracking application layered system.
  189. Kuch,Gerald Dwayne; Beckman,Brian C.; Zander,Jason L., Profile-driven data layout optimization.
  190. Kuch,Gerald Dwayne; Zander,Jason L.; Beckman,Brian C., Profile-driven data layout optimization.
  191. Adler, Michael C.; Yates, Jr., John S.; Reese, David L.; Hohensee, Paul H.; Purcell, Stephen C., Profiling execution of a sequence of events occuring during a profiled execution interval that matches time-independent selection criteria of events to be profiled.
  192. Van Dyke,Korbin S.; Hohensee,Paul H.; Reese,David L.; Yates, Jr.,John S.; Ramesh,T. R.; Thusoo,Shalesh; Saund,Gurjeet Singh; Purcell,Stephen C.; Patkar,Niteen Aravind, Profiling execution of computer programs.
  193. Reese, David L.; Yates, Jr., John S.; Hohensee, Paul H.; Van Dyke, Korbin S.; Ramesh, T. R.; Thusoo, Shalesh; Saund, Gurjeet Singh; Patkar, Niteen Aravind, Profiling of computer programs executing in virtual memory systems.
  194. Master, Paul L., Profiling of software and circuit designs utilizing data operation analyses.
  195. Hohensee, Paul H.; Reese, David L.; Yates, Jr., John S.; Van Dyke, Korbin S.; Ramesh, T. R.; Thusoo, Shalesh; Saund, Gurjeet Singh; Patkar, Niteen Aravind, Profiling program execution into registers of a computer.
  196. Yates, Jr.,John S.; Reese,David L.; Hohensee,Paul H., Profiling program execution to identify frequently-executed portions and to assist binary translation.
  197. Reese,David L.; Yates, Jr.,John S.; Hohensee,Paul H., Profiling ranges of execution of a computer program.
  198. Reimer, Darrell Christopher; Srinivas, Kavitha, Program analysis tool presenting object containment and temporal flow information.
  199. Chipman, Timothy, Program transformation using flow-sensitive type constraint analysis.
  200. Guthrie, Scott D; Christensen, Erik B; Christensen, Yann E, Providing remote processing services over a distributed communications network.
  201. Guthrie,Scott D.; Christensen,Erik B; Christensen,Yann E., Providing remote processing services over a distributed communications network.
  202. Yates, Jr., John S.; Reese, David L.; Van Dyke, Korbin S., Recording classification of instructions executed by a computer.
  203. Zhang, Hong; Liang, Sheng; Mirani, Rajiv; Chauhan, Abhishek, Reducing stack memory resources in a threaded computer system.
  204. Chan,Hon Keat W., Reformulating resources with nodes reachable from defined entry points.
  205. Nikolov, Nikolai G.; Kabadiyski, Mario, Registration method for supporting bytecode modification.
  206. Li, Ying; Gounares, Alexander G.; Garrett, Charles D.; Krajec, Russell S., Relationships derived from trace data.
  207. Hurren,Jeremy; Blaser,Jared; Cook,Randall, Run-time application installation application layered system.
  208. Yates, John S.; Reese, David L.; Van Dyke, Korbin S.; Hohensee, Paul H., Safety net paradigm for managing two computer execution modes.
  209. Martin, Anthony G., Search engine for a computer network.
  210. Paleja, Ameesh; Gill, Sunbir; Jones, Matthew A.; Rouse, Alexander L.; Okereke, Mekka C.; Peled, Yael, Service for adding functionality to applications.
  211. Yates, Jr.,John S.; Reese,David L.; Hohensee,Paul H.; Van Dyke,Korbin S.; Ramesh,T. R., Side tables annotating an instruction stream.
  212. Kakumani, Badari; Darling, Glen; Balint, Matthew, Software change modeling for network devices.
  213. Kakumani,Badari; Darling,Glen; Balint,Matthew, Software change modeling for network devices.
  214. Hanssen, Ingar, Software code profiling.
  215. Master,Paul L.; Watson,John, Storage and delivery of device features.
  216. Blaser, Jared; Cook, Randall, Sublayered application layered system.
  217. Kabadiyski,Mario; Nikolov,Nikolai G., System and method combining application tracing and distributed statistical records.
  218. Frey, Gregor K.; Nikolov, Nikolai G., System and method employing bytecode modification techniques for tracing services within an application server.
  219. Eden, Guy, System and method for controlling a profile's lifetime in a limited memory store device.
  220. Kaufmann, Tzach; Samia, Alon, System and method for dynamically enforcing security policies on electronic files.
  221. Gouge, Christopher S.; Masson, James S.; VanZwol, Theodore C.; Day, Michael James, System and method for importing a configured data set into a target set.
  222. Frey, Gregor K.; Weller, Joerg; Kautzleben, Reinhold; Petrov, Miroslav R., System and method for monitoring program code.
  223. Master, Paul L.; Watson, John, System for adapting device standards after manufacture.
  224. Master, Paul L.; Watson, John, System for authorizing functionality in adaptable hardware devices.
  225. Yates, Jr.,John S.; Storch,Matthew F.; Nijhawan,Sandeep; Jurich,Dale R.; Van Dyke,Korbin S., System for delivering exception raised in first architecture to operating system coded in second architecture in dual architecture CPU.
  226. Huang, Jiafa; Lin, Jun; Lin, Chin-Yee, System for video development kits with control of executable size.
  227. Burrows, Andrew P.; Bowers, Andrew M., System performance prediction.
  228. Yazir, Ya{hacek over (g)}iz Onat; Halén, Joacim; Abbasi, Zahra, Systems and methods for decentralized service placement in a resource pool.
  229. Yazir, Ya{hacek over (g)}iz Onat; Halén, Joacim; Abbasi, Zahra, Systems and methods for decentralized service placement in a resource pool.
  230. Abbasi, Zahra; Yazir, Ya{hacek over (g)}iz Onat; Halén, Joacim, Systems and methods for distributed network-aware service placement.
  231. Chory, Susan; Ebbo, David S.; Howard, Robert M.; Yang, Ting-Hao, Systems and methods for persisting data between web pages.
  232. Mann, Uri, Systems and methods for preventing heap-spray attacks.
  233. Blaser,Jared Ricks; Cook,Randall Richards, Systems and methods for the creation of software packages using layered systems.
  234. Bringhurst, Cynthia, Systems and methods for virtualizing software associated with external computer hardware devices.
  235. Katragadda, Ramana; Spoltore, Paul; Howard, Ric, Task definition for specifying resource requirements.
  236. Goulden, David L.; Shevach, Matthew A.; Bennett, Dominic, Techniques for displaying impressions in documents delivered over a computer network.
  237. Galipeau, Kenneth J.; Kast, Robert K.; Orgad, Eran, Techniques for recording file operations and consistency points for producing a consistent copy.
  238. Cawley, Peter; Hale, Joshua George; Cartey, Luke James; White, Geoffrey, Template dependency inlining.
  239. Hunt, Galen C., Tools and techniques for instrumenting interfaces of units of a software program.
  240. Hunt,Galen C., Tools and techniques for instrumenting interfaces of units of a software program.
  241. Hunt,Galen C., Tools and techniques for instrumenting interfaces of units of a software program.
  242. Krajec, Russell S., Tracing with a workload distributor.
  243. Krishnaswamy, Raja; Anand, Tarun; Brumme, Christopher W.; Kakivaya, Gopala Krishna R., Transparent and sub-classable proxies.
  244. Bosworth, George H.; Dussud, Patrick H.; Miller, James S.; Olander, Daryl B., Unified data type system and method.
  245. Bosworth, George H.; Dussud, Patrick H.; Miller, James S.; Olander, Daryl B., Unified data type system and method.
  246. Bosworth, George H.; Dussud, Patrick H.; Miller, James S.; Olander, Daryl B., Unified data type system and method.
  247. Frey, Gregor K.; Petro, Miroslav R.; Stein, Martin, Unified logging service with a log viewer.
  248. Frey, Gregor K; Kiessling, Heiko; Petrov, Miroslav R.; Manev, Georgi G.; Marchev, Nikola I, Unified logging service with a logging formatter.
  249. Martin, Anthony G.; Vandevelde, Scott; Goulden, David L., Updating content of presentation vehicle in a computer network.
  250. Cook, Randall R., Use of external information about a file to determine virtualization.
  251. Gounares, Alexander G.; Baril, Bryce B.; Garrett, Charles D., User interface for selecting tracing origins for aggregating classes of trace data.
  252. McCamant, Stephen; Chilimbi, Trishul, Using dynamic analysis to improve model checking.
  253. Gourevitch, Gregory; Luttinen, Todd; Boctor, Victor; De Graaf, Wilbert; Zhao, Lizhuang, Using e-mail message characteristics for prioritization.
  254. Gourevitch, Gregory; Luttinen, Todd; Boctor, Victor; De Graaf, Wilbert; Zhao, Lizhuang, Using e-mail message characteristics for prioritization.
  255. Yates, Jr., John S.; Reese, David L.; Hohensee, Paul H.; Van Dyke, Korbin S.; Thusoo, Shalesh; Ramesh, Tiruvur R., Using on-chip and off-chip look-up tables indexed by instruction address to control instruction execution in a processor.
  256. Moore,Anthony J.; Warren,Susan M.; Guthrie,Scott D.; Isaac,Steven A., Web controls validation.
  257. Hurren,Jeremy; Jones,Scott; Cook,Randall, Weighted prioritizing layered computing system.
  258. Flood, Christine H.; Detlefs, David L.; Shavit, Nir N.; Zhang, Xiaolan; Agesen, Ole, Work stealing queues for parallel garbage collection.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로