会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Automatically resource leak diagnosis and detecting process within the operating system
    • 自动资源泄漏诊断和检测过程在操作系统内
    • US07774741B2
    • 2010-08-10
    • US11438791
    • 2006-05-22
    • Baskar SridharanJason Stewart WohlgemuthAbdelsalam A. HeddayaElsie Nallipogu
    • Baskar SridharanJason Stewart WohlgemuthAbdelsalam A. HeddayaElsie Nallipogu
    • G06F9/44G06F9/445
    • G06F11/0751G06F11/0748G06F11/0775G06F12/023
    • The resource leak detector attempts to identify the causes of resource leaks and fix the causes if possible. At a minimum, the located resource leaks are reported to an operating system manufacture for additional study and possible correction, either by the operating system manufacturer or the application manufacturer that is causing the resource leak. In an embodiment, in operation, a leak trigger for starting leak detection is started. If the leak trigger is activated, leak detection is started when an application begins. Resource allocations are tracked for the leaked resource and each leaked resource is matched to a corresponding allocation call stack. A type of the leaked resource may be identified. The leak detection and the leak trigger may be controlled according to at least one of a local policy and a global policy. The local and the global policy may be updated dynamically such as by using aggregated occurrences of applications that met the local policy or by matching a plurality of distinct types of leaked resources to the same call stack. A leak report may be generated of resource leak data where the leak report is stored locally or communicated to a local aggregation database or remote aggregation database. The leak report may include total leaked allocations, total size of leaked allocations, total outstanding allocations, total size of outstanding allocations and matched allocation call stacks. The leaked resource may be automatically reclaimed and a fix to the leaked resource may be created and applied automatically.
    • 资源泄漏检测器尝试识别资源泄漏的原因,并尽可能地修复原因。 至少,定位的资源泄漏报告给操作系统制造商,以进行额外的研究和可能的纠正,由操作系统制造商或引起资源泄漏的应用程序制造商。 在一个实施例中,在操作中,开始用于启动泄漏检测的泄漏触发。 如果泄漏触发器被激活,则在应用程序开始时开始泄漏检测。 为泄漏的资源跟踪资源分配,并且每个泄露的资源与相应的分配调用堆栈匹配。 可以识别泄漏的资源的类型。 可以根据本地策略和全局策略中的至少一个来控​​制泄漏检测和泄漏触发。 可以动态地更新本地和全局策略,例如通过使用满足本地策略的聚合发生的应用,或者通过将多个不同类型的泄露资源匹配到相同的调用堆栈来进行。 泄漏报告可能会生成泄漏报告,泄漏报告在本地存储或传送到本地聚合数据库或远程聚合数据库。 泄漏报告可能包括总泄漏分配,泄漏分配的总大小,未完成分配的总数,未完成分配的总大小以及匹配的分配调用堆栈。 泄漏的资源可以自动回收,并且可以自动创建并应用对泄漏的资源的修复。
    • 7. 发明授权
    • Method and system for distributed caching, prefetching and replication
    • 分布式缓存,预取和复制的方法和系统
    • US6167438A
    • 2000-12-26
    • US861934
    • 1997-05-22
    • David J. YatesAbdelsalam A. HeddayaSulaiman A. Mirdad
    • David J. YatesAbdelsalam A. HeddayaSulaiman A. Mirdad
    • G06F12/00G06F13/00G06F17/30H04L29/06H04L29/08
    • G06F17/30902H04L29/06H04L67/1002H04L67/1008H04L67/101H04L67/1014H04L67/1095H04L67/2814H04L67/2842H04L67/2852H04L67/288H04L69/329
    • A technique for automatic, transparent, distributed, scalable and robust caching, prefetching, and replication in a computer network that request messages for a particular document follow paths from the clients to a home server that form a routing graph. Client request messages are routed up the graph towards the home server as would normally occur in the absence of caching. However, cache servers are located along the route, and may intercept requests if they can be serviced. In order to be able to service requests in this manner without departing from standard network protocols, the cache server needs to be able to insert a packet filter into the router associated with it, and needs also to proxy for the home server from the perspective of the client. Cache servers may cooperate to service client requests by caching and discarding documents based on its local load, the load on its neighboring caches, attached communication path load, and on document popularity. The cache servers can also implement security schemes and other document transformation features.
    • 用于在请求特定文档的消息的计算机网络中进行自动,透明,分布式,可扩展和强大的缓存,预取和复制的技术遵循从客户端到形成路由图的家庭服务器的路径。 客户端请求消息沿着图表路由到家庭服务器,如通常在没有缓存的情况下发生的。 但是,缓存服务器位于路由中,如果可以对其进行维护,可能会拦截请求。 为了能够在不脱离标准网络协议的情况下以这种方式服务请求,缓存服务器需要能够将包过滤器插入到与其相关联的路由器中,并且还需要从家庭服务器的代理 客户端。 缓存服务器可以通过基于其本地负载,其相邻缓存上的负载,附加的通信路径负载以及文档流行度来缓存和丢弃文档来协作来服务客户端请求。 缓存服务器还可以实现安全方案和其他文档转换功能。
    • 8. 发明授权
    • Protocol for distributing fresh content among networked cache servers
    • 在网络缓存服务器之间分发新内容的协议
    • US06205481B1
    • 2001-03-20
    • US09040520
    • 1998-03-17
    • Abdelsalam A. HeddayaSulaiman A. MirdadDavid J. YatesIan C. Yates
    • Abdelsalam A. HeddayaSulaiman A. MirdadDavid J. YatesIan C. Yates
    • G06F15173
    • H04L67/1095G06F12/0813G06F17/30902H04L67/2842H04L69/329
    • A technique for automatic, transparent, distributed, scalable and robust replication of document copies in a computer network wherein request messages for a particular document follow paths from the clients to a home server that form a routing graph. Client request messages are routed up the graph towards the home server as would normally occur in the absence of caching. However, cache servers are located along the route, and may intercept requests if they can be serviced. In order to be able to service requests in this manner without departing from standard network protocols, the cache server needs to be able to insert a packet filter into the router associated with it, and needs also to proxy for the home server from the perspective of the client. Cache servers cooperate to update cache content by communicating with neighboring caches whenever information is received about invalid cache copies.
    • 用于在计算机网络中自动,透明,分布式,可扩展和可靠地复制文档副本的技术,其中用于特定文档的请求消息遵循从客户端到形成路由图的家庭服务器的路径。 客户端请求消息沿着图表路由到家庭服务器,如通常在没有缓存的情况下发生的。 但是,缓存服务器位于路由中,如果可以对其进行维护,可能会拦截请求。 为了能够在不脱离标准网络协议的情况下以这种方式服务请求,缓存服务器需要能够将包过滤器插入到与其相关联的路由器中,并且还需要从家庭服务器的代理 客户端。 当接收到关于无效缓存副本的信息时,缓存服务器通过与相邻缓存进行通信来协作来更新缓存内容。