Patent application number | Description | Published |
20090328007 | MEMORY LEAK DIAGNOSIS - A method and an apparatus for diagnosing memory leak. The method includes: tracing the allocation of objects; recording allocation paths and allocation time of each object; giving to each object one unique identifier (ID) corresponding to an allocation path; determining the allocation path to which each object belongs; organizing the objects which are allocated but still not collected, and counting the age generations of the objects of the similar type according to the allocation time of each object; ranking the allocation paths according to the age generations of the surviving objects; and analyzing the ranking of the allocation paths, in which the allocation path with higher rank is more probable to introduce memory leaks. Thus, the suspicious allocation path possibly incurring memory leaks is selected and reported to the user for analysis. | 12-31-2009 |
20100186001 | METHOD AND APPARATUS FOR NATIVE METHOD CALLS - A method and apparatus for a native method call. The method comprises: generating, in response to a native method call-associated event, a template copy from a generic template for processing the native method call; filling information required for processing the native method call in corresponding locations in the template copy; and changing a code execution flow to execute the template copy. When a native method is called, the native method is processed by dynamically inserting the template copy in the execution path at the assembly level. | 07-22-2010 |
20100223306 | METHOD AND APPARATUS FOR DISCOVERING APPLICATION CONFIGURATION FILES IN A SYSTEM - A method and apparatus for discovering application configuration files in a system. The method includes the steps of: obtaining a process identifier of an application in concern; comparing the obtained process identifier with a process identifier of a process for operating configuration files in the system; and determining configuration files to be the configuration files of the application in concern if the obtained process identifier is identical to the process identifier of a process for operating the configuration files in the system. Application configuration files can be automatically discovered and thereby monitored, such that the change of the application configuration files can be effectively and accurately detected, so as to facilitate a user to perform various subsequent operations. | 09-02-2010 |
20110071793 | METHOD TO COMPUTE WAIT TIME - A requesting critical wait time of a given resource may be determined The requesting critical wait time is the time spent by the one or more resources waiting for the given resource, wherein at least one of the resources waiting for the given resource can proceed if access to the given resource is granted. A requested by critical wait time for a resource is determined, the requested by critical wait time being time spent by the resource for waiting solely for the given resource, wherein if the resource were granted access to the given resource, the resource can proceed without further waiting. | 03-24-2011 |
20110258608 | METHOD AND APPARATUS TO LOCATE BOTTLENECK OF JAVA PROGRAM - A method and an apparatus to locate a bottleneck of a Java program. The method to locate a bottleneck of a Java program includes the steps of: creating a helper thread in a Java process corresponding to the Java program, and attaching the helper thread to a Java virtual machine (JVM) created in the Java process; inserting a prober into an operating system kernel; monitoring states in the operating system kernel of Java threads in the Java process and sending a signal to the helper thread in response to detect that a Java thread is blocked; and retrieving call stack information from the JVM in response to receive the signal from the operating system kernel and locating the position in source code of the Java program that causes the block using the retrieved call stack information. | 10-20-2011 |
20120221671 | Controlling Shared Memory - In view of the characteristics of distributed applications, the present invention proposes a technical solution for applying a shared memory on an NIC comprising: a shared memory configured to provide shared storage space for a task of a distributed application, and a microcontroller. Furthermore, the present invention provides a computer device that includes the above-mentioned NIC, a method for controlling a read/write operation on a shared memory of a NIC, and a method for invoking the NIC. The use of the technical solution provided in the present invention bypasses the processing of network protocol stack, avoids the time delay introduced by the network protocol stack. The present invention does not need to perform TCP/IP encapsulation on the data packet, thus greatly saving additional packet header and packet tail overheads generated from the TCP/IP layer data encapsulation. | 08-30-2012 |
20120324038 | Controlling Shared Memory - In view of the characteristics of distributed applications, the present invention proposes a technical solution for applying a shared memory on an NIC comprising: a shared memory configured to provide shared storage space for a task of a distributed application, and a microcontroller. Furthermore, the present invention provides a computer device that includes the above-mentioned NIC, a method for controlling a read/write operation on a shared memory of a NIC, and a method for invoking the NIC. The use of the technical solution provided in the present invention bypasses the processing of network protocol stack, avoids the time delay introduced by the network protocol stack. The present invention does not need to perform TCP/IP encapsulation on the data packet, thus greatly saving additional packet header and packet tail overheads generated from the TCP/IP layer data encapsulation. | 12-20-2012 |
20130145374 | SYNCHRONIZING JAVA RESOURCE ACCESS - A method and an apparatus for synchronizing Java resource access. The method includes configuring for a first access interface of a resource set, a first monitor, and configuring, for a second access interface of the resource set, a second monitor, configuring, for the first monitor, a first waiting queue, and the second monitor, a second waiting queue, in response to the first access interface receiving an access request for a resource from a thread, the first monitor querying whether the resource set has a resource satisfying the access request, in response to a positive querying result, the thread obtains the resource and notifies the second monitor to awake a thread in the second waiting queue, in response to a negative querying result, the first monitor puts the thread in the first waiting queue to queue up. | 06-06-2013 |
20140067842 | INFORMATION PROCESSING METHOD AND APPARATUS - The invention belongs to the field of text information processing, and discloses an information processing method including: acquiring a first text-based chat record; extracting at least two of topics contained in the first chat record; acquiring a second text-based chat record, the second chat record being associated with at least one of the extracted topics; displaying that the first chat record and the second chat record are in an association relationship. The invention also discloses an information processing apparatus. With the information processing method and apparatus disclosed by the invention, text exchange organized by topics can be realized, and efficiency of text-based communication can be improved. | 03-06-2014 |
20140122429 | DATA PROCESSING METHOD AND APPARATUS FOR DISTRIBUTED SYSTEMS - A data processing method for a distributed system, the distributed system comprising a master storage node and multiple slave storage nodes, includes: storing, responsive to a request for writing a data file, multiple replications of the data file on the multiple slave storage nodes, each of the replications being segmented into data blocks of a same size, wherein the sizes of the segmented data blocks of at least two replications are different; and storing distribution information of the multiple replications. | 05-01-2014 |