APPLICATION-CENTRIC ANALYSIS OF LEAK SUSPECT OPERATIONS
    3.
    发明申请
    APPLICATION-CENTRIC ANALYSIS OF LEAK SUSPECT OPERATIONS 有权
    泄漏作业的应用中心分析

    公开(公告)号:US20160335169A1

    公开(公告)日:2016-11-17

    申请号:US14713083

    申请日:2015-05-15

    IPC分类号: G06F11/36

    摘要: To identify a source of a memory leak in an application, a pattern of objects is identified in an object hierarchy of a heap dump, the pattern including an indication of the memory leak. The pattern is matched with a metadata of the application. A static entry in the metadata describes a relationship between a component of the application and an object of a class used in the component. A flow entry in the metadata describes a relationship between a pattern of instantiation of a set of objects corresponding to a set of classes and an operation performed using the application. When the pattern matches the flow entry in the flow section of the metadata, a conclusion is drawn that the memory leak is caused in the operation identified in the flow entry. A portion of a code that participates in the operation is selected for modification.

    摘要翻译: 为了识别应用程序中的内存泄漏源,在堆转储的对象层次结构中标识对象模式,该模式包括内存泄漏的指示。 该模式与应用程序的元数据相匹配。 元数据中的静态条目描述了应用程序的组件与组件中使用的类的对象之间的关系。 元数据中的流条目描述了与一组类相对应的一组对象的实例化模式与使用该应用执行的操作之间的关系。 当模式与元数据的流程部分中的流条目匹配时,得出结论是在流入口中识别的操作中引起内存泄漏。 选择参与操作的代码的一部分进行修改。

    COST SENSITIVE BROWSER CACHE CLEANUP
    4.
    发明申请
    COST SENSITIVE BROWSER CACHE CLEANUP 有权
    成本敏感浏览器缓存

    公开(公告)号:US20170046265A1

    公开(公告)日:2017-02-16

    申请号:US14823827

    申请日:2015-08-11

    IPC分类号: G06F12/08 G06F12/12

    摘要: For browser cache cleanup, to consider for eviction a data item stored in a cache of a browser application in a device, a probability that the data item will be needed again during a period after the eviction is computed. A type is determined of a network that will be available at the device during the period. A cost is computed of obtaining the data item over a network of the type, from a location of the device during the period. Using the probability and the cost, a weight of the data item is computed. The weight is associated with the data item as a part of associating a set of weights with a set of data items in the cache. The data item is selected for eviction from the cache because the weight is a lowest weight in the set of weights.

    摘要翻译: 对于浏览器缓存清理,要考虑驱逐存储在设备中的浏览器应用程序的缓存中的数据项,在计算驱逐之后的时间段期间再次需要数据项的可能性。 确定在该期间将在设备上可用的网络的类型。 计算在该期间从设备的位置获得该类型的网络上的数据项的成本。 使用概率和成本,计算数据项的权重。 权重与数据项相关联,作为将一组权重与高速缓存中的一组数据项相关联的一部分。 选择数据项从高速缓存中进行驱逐,因为权重是权重集中的最低权重。

    Application-centric analysis of leak suspect operations

    公开(公告)号:US09678854B2

    公开(公告)日:2017-06-13

    申请号:US14713083

    申请日:2015-05-15

    IPC分类号: G06F11/00 G06F11/36

    摘要: To identify a source of a memory leak in an application, a pattern of objects is identified in an object hierarchy of a heap dump, the pattern including an indication of the memory leak. The pattern is matched with a metadata of the application. A static entry in the metadata describes a relationship between a component of the application and an object of a class used in the component. A flow entry in the metadata describes a relationship between a pattern of instantiation of a set of objects corresponding to a set of classes and an operation performed using the application. When the pattern matches the flow entry in the flow section of the metadata, a conclusion is drawn that the memory leak is caused in the operation identified in the flow entry. A portion of a code that participates in the operation is selected for modification.

    Cost optimized email attachment download in a mobile device
    7.
    发明授权
    Cost optimized email attachment download in a mobile device 有权
    成本优化的电子邮件附件下载在移动设备

    公开(公告)号:US09386092B1

    公开(公告)日:2016-07-05

    申请号:US14993688

    申请日:2016-01-12

    IPC分类号: G06F15/16 H04L29/08 H04W12/06

    摘要: A method for reducing data usage for wireless subscription plans. An email and an attachment are downloaded to a first device of a first recipient. An attachment is identified on the email by an attachment processing service that ensures that sharing from the first device is based on a credit policy. That there is more than one recipient for the email and attachment is determined. That a second device of a second recipient is in the vicinity of the first device is determined. Verification of the second device is established with an email fingerprint exchange handshake based on a fingerprint of the email for the second recipient that is computed from a hash of content of the email, an identifier of the attachment, and an email id of the second recipient. A second network is utilized to copy the attachment from the first device to the second device.

    摘要翻译: 一种减少无线订阅计划数据使用的方法。 将电子邮件和附件下载到第一收件人的第一设备。 附件由附件处理服务在电子邮件中标识,确保从第一设备的共享基于信用策略。 确定电子邮件和附件有多个收件人。 确定第二接收者的第二设备在第一设备附近。 基于从电子邮件的内容的哈希,附件的标识符和第二接收者的电子邮件ID计算的第二接收者的电子邮件的指纹,使用电子邮件指纹交换握手建立第二设备的验证 。 利用第二网络将附件从第一设备复制到第二设备。

    Cost optimized email attachment download in a mobile device
    9.
    发明授权
    Cost optimized email attachment download in a mobile device 有权
    成本优化的电子邮件附件下载在移动设备

    公开(公告)号:US09577971B1

    公开(公告)日:2017-02-21

    申请号:US15180237

    申请日:2016-06-13

    IPC分类号: G06F15/16 H04L12/58 H04L29/08

    摘要: A system and method for reducing data usage for wireless subscription plans. An email and an attachment are downloaded to a first device of a first recipient. An attachment is identified on the email by an attachment processing service that ensures that sharing from the first device is based on a credit policy. That there is more than one recipient for the email and attachment is determined. That a second device of a second recipient is in the vicinity of the first device is determined. Verification of the second device is established with an email fingerprint exchange handshake based on a fingerprint of the email for the second recipient that is computed from a hash of content of the email, an identifier of the attachment, and an email id of the second recipient. A second network is utilized to copy the attachment from the first device to the second device.

    摘要翻译: 一种用于减少无线订阅计划的数据使用的系统和方法。 将电子邮件和附件下载到第一收件人的第一设备。 附件由附件处理服务在电子邮件中标识,确保从第一设备的共享基于信用策略。 确定电子邮件和附件有多个收件人。 确定第二接收者的第二设备在第一设备附近。 基于从电子邮件的内容的哈希,附件的标识符和第二接收者的电子邮件ID计算的第二接收者的电子邮件的指纹,使用电子邮件指纹交换握手建立第二设备的验证 。 利用第二网络将附件从第一设备复制到第二设备。