Patent application number | Description | Published |
20080244536 | EVALUATING STATIC ANALYSIS RESULTS USING CODE INSTRUMENTATION - A computer-implemented method for evaluating software code includes receiving from a static analysis of the software code a warning indicating a respective location in the software code of a potential bug and a possible execution path leading to the potential bug. Responsively to the warning, instrumentation is added to the code at one or more locations along the execution path. Upon executing the instrumented code, an output is generated, responsively to the instrumentation, indicating that the execution path was traversed while executing the instrumented code. | 10-02-2008 |
20080255813 | Probabilistic regression suites for functional verification - Methods, apparatus and systems are provided that enable the generation of random regression suites for verification of a hardware or software design to be formulated as optimization problems. Solution of the optimization problems using probabilistic methods provides information on which set of test specifications should be used, and how many tests should be generated from each specification. In one mode of operation regression suites are constructed that use the minimal number of tests required to achieve a specific coverage goal. In another mode of operation regression suites are constructed so as to maximize task coverage when a fixed number of tests are run or within a fixed cost. | 10-16-2008 |
20080256393 | DETECTING UNEXPECTED IMPACT OF SOFTWARE CHANGES USING COVERAGE ANALYSIS - A computer-implemented method for evaluating software code includes measuring a first coverage of a test applied to the software code and then making a modification in a first section of the software code. A second coverage of the test applied to the software code is measured after making the modification. A difference is identified between the first coverage and the second coverage in a second section of the software code, which is separate from the first section and was not modified since the first coverage was measured, and an indication of the difference is output. | 10-16-2008 |
20090055813 | Method for Enabling Profile-Based Call Site Tailor-ing Using Profile Gathering of Cloned Functions - Methods and systems for computer program optimization utilize function cloning in program code, such as post-linked code. Each function call is directed to a different cloned version of the called function. Conventional profiling methods such as hardware event sampling, basic block profiling, and edge profiling may then be applied to the modified program code to obtain call path-based, clone-specific profile data. The profile data can be further exploited to optimize the program code. | 02-26-2009 |
20090113399 | Device, System and Method of Debugging Computer Programs - Device, system, and method of debugging computer programs. For example, a method for debugging computer programs includes: locating a bug in a computer program based on a first score corresponding to a first instrumentation location of the computer program and a second score corresponding to a second instrumentation location of the computer program. | 04-30-2009 |
20090113400 | Device, System and method of Profiling Computer Programs - Device, system, and method of profiling computer programs. For example, a method for profiling computer programs includes: profiling a program statement associated with a machine-readable comment indicating an expectation by a programmer of a runtime behavior of the program statement. | 04-30-2009 |
20090319833 | Software Quality Assessment based on Semantic Similarities - A method for software processing includes accepting quality information, which includes names of elements of software code and respective quality indications regarding tested acceptability of the elements. The names are processed to extract a list of substrings that occur in the names. Respective metrics are assigned to the substrings responsively to the quality indications of the elements in whose names the substrings occur. At least some of the substrings are presented to a user in accordance with the assigned metrics. | 12-24-2009 |
20100046375 | Congestion Control Using Application Slowdown - A computer-implemented method is provided, including monitoring one or more parameters of a computer system that executes one or more service requester processes that issue service requests to one or more service provider processes. A congestion in the system is detected by analyzing the parameters. Upon identifying at least one of the service requester processes as contributing to the congestion, execution of the at least one of the service requester processes is slowed. Other embodiments are also described. | 02-25-2010 |
20100050161 | Detecting Locking Discipline Violations on Shared Resources - Detecting locking discipline violations on shared resources. For example, a method of detecting locking discipline violations of shared resources of a computing platform, by a testing process to be executed concurrently with one or more other processes on said computing platform, the testing process comprising: locking a shared resource of said computing platform; reading a value of the shared resource; locally storing the value of the shared resource; rereading the value of the shared resource after a predefined time period; and generating a locking discipline violation report if the value of said shared resource as reread by said rereading is different from the value of said resource as locally stored by said locally storing. | 02-25-2010 |
20100088107 | PROVIDING CUSTOMIZED MEDICAL INFORMATION - Techniques for providing temporally-based information to a medical practitioner are provided. The techniques include obtaining temporally-based information, wherein the information comprises medical information derived from the medical practitioner and one or more other medical practitioners, customizing the information for the medical practitioner, wherein customizing the information comprises using one or more diagnoses from the medical practitioner and one or more diagnoses from the one or more other medical practitioners made during a selected temporal period, and providing the information to the medical practitioner. Techniques are also provided for providing temporally-based medical information to an individual. | 04-08-2010 |
20100262866 | CROSS-CONCERN CODE COVERAGE ASSESSMENT - A method for software processing includes extracting from software code under test respective items of meta-information pertaining to elements of the software code and receiving respective quality data regarding the elements of software code. The quality data and meta-information are processed in a computer so as to assign respective metrics to the items of the meta-information responsively to the quality data regarding the elements of the software code to which the items pertain. At least some of the meta-information is presented to a user in accordance with the assigned metrics. | 10-14-2010 |
20100274520 | CREATION OF TEST PLANS - Test plan to be utilized in a testing phase may be generated based on an initial test plan. A functional coverage model may be derived from the initial test plan. Modifications to the test plan may be automatically determined based on predetermined rules and parameters. Restrictions over possible combinations of values may be determined based on analysis of uncovered test activities in the initial test plan. Restrictions may be determined based on values of test activities in the initial test plan. Restrictions and modifications determined according to the disclosed subject matter may be indicated to a user for confirmation thereof. | 10-28-2010 |
20100275062 | Functional Coverage Using Combinatorial Test Design - A generator generates tests to improve functional coverage. A functional coverage of a first set of tests is examined in respect to a functional coverage model. The functional coverage model is transformed to a combinatorial model. The coverage measurements are used to refine the combinatorial model. The combinatorial model is utilized to generate a second set of tests that have a different functional coverage than the first set of tests. The second set of tests is utilized to examine quality of a tested system. | 10-28-2010 |
20110010272 | Facilitating Simulated Purchases of Items by Virtual Representations of Participants in Computer-Based Simulations - A method for facilitating simulated purchases by virtual representations of participants in computer-based simulations of items outside of the context of computer-based simulations, the method including receiving a simulated payment for an item for purchase, where the simulated payment is associated with a virtual representation of a participant in a computer-based simulation, where the item is available for purchase outside of the context of the simulation, and where the simulated payment is received outside of the context of the simulation, and providing a description of the item to a process of the simulation, where the description is provided subsequent to receiving the simulated payment, where and the description is provided in association with the virtual representation. | 01-13-2011 |
20110271252 | DETERMINING FUNCTIONAL DESIGN/REQUIREMENTS COVERAGE OF A COMPUTER CODE - A method that includes: running a set of functional tests over a computer code; determining, for each code element of the computer code, which functional test covered it, to yield a tests-elements coverage map; associating portions of the computer code with corresponding design portions or requirements derived from a design document or a requirements document respectively, associated with the computer code, to yield a design/requirements-code tracing map; deriving, from the tests-code coverage map and the design/requirements-code tracing map, a design/requirements-tests coverage map, exhibiting coverage of the computer code by the functional tests, in terms of the design or the requirements, wherein at least one of the running, the determining, the associating, and the deriving is executed by at least one processor. | 11-03-2011 |
20110271253 | ENHANCING FUNCTIONAL TESTS COVERAGE USING TRACEABILITY AND STATIC ANALYSIS - A method that may include: building a dependencies graph representing dependencies between code elements of a computer code; associating portions of the computer code with corresponding design specifications or requirements derived from a design specifications document or a requirements document respectively which is associated with the computer code, to yield a design specifications or requirements-code tracing map; and analyzing the design specifications or requirements-code tracing map based on the dependencies graph to yield an ordered list of design specifications or requirements respectively, wherein the order is selected such that functional tests written for the computer code and addressing design specifications or requirements of a higher order, will yield a higher level of functional test coverage of the computer code in terms of design specifications or requirements. | 11-03-2011 |
20110314450 | ANALYZING COMPUTER CODE DEVELOPMENT ACTIONS AND PROCESS - A method that may include: monitoring over time, actions carried out by at least one programmer over a software development environment to yield development patterns; comparing the development patterns to best practice rules to yield a comparison results indicating deviations of the development patterns from the best practice rules; and analyzing the comparison results based at least partially on a likelihood of each action deviated from the respective best practice rule to result in a software bug, to yield an analysis of potential software bug prone code sections, wherein at least one of the monitoring, the comparing, and the analyzing is executed by at least one processor. | 12-22-2011 |
20130060904 | USER-CONTROLLED DOWNLOAD DURATION TIME - A method, apparatus and computer program product useful for communicating media content, over a computerized network, in accordance with download duration time. One exemplary method may comprise obtaining a download duration time from a client with respect to a media content; determining a quality of the media content so as to be provided within the download duration time; and transmitting to the client a version of the media content having the quality. Another exemplary embodiment may be a computer program product for enabling a user of a client to select download duration time, the computer program product comprising: program code stored on a non-transitory computer readable medium; wherein the program code is operative to display a Graphical User Interface (GUI) widget on a display of the client, wherein the GUI widget comprises: a download duration time input component, wherein the GUI widget is operative to provide the download duration time to a content delivery apparatus for providing a media content within the download duration time. | 03-07-2013 |
20130069862 | REMOTE MOVEMENT GUIDANCE - In one example of a user-guidance system, a remote control may be configured to guide a user's physical movements by transmitting movement signals that are to be translated into haptic instructions, and cooperative actuators may be configured to be worn by the user to translate the movement signals received from the remote control into the haptic instructions. The movement signals may be translated into the haptic instructions for physical movements of any limb or extremity of the user in either of a vertical direction or a horizontal direction; after the first movement signal, the movement signals may be transmitted prior to completion of an immediately previous physical movement; and the movement signals may include horizontal and vertical directional signal components that indicate the horizontal and vertical direction for the user's next physical movement. The haptic instructions that are translated from the horizontal and vertical directional signal components may differ in either duration or magnitude. The movement signals may include horizontal directional signal components that indicate the horizontal direction for the user's next physical movement, and the haptic instructions that are translated from the horizontal directional signal components may differ in either duration or magnitude. | 03-21-2013 |
20130171969 | MASKING PHONE NUMBERS - In one example of masking phone numbers, a roster of changeable phone numbers may be assigned to a target phone, a presence of the target phone may be registered to a local cell site, a request for one of the changeable phone numbers that is assigned to the target phone for a current time frame may be received, and a phone call that is intended for the target phone may be facilitated using an assigned one of the changeable phone numbers that is assigned to the target phone for the current time frame. | 07-04-2013 |
20130212223 | DYNAMIC MODIFICATION OF MEDIA STREAMS' QUALITY - A method, apparatus and computer program product useful for communicating media content, over a computerized network, in accordance with download duration time. One exemplary method may comprise receiving, by a client, a first portion of a media content having a first quality. In response to an indication from a user, a change of quality to a second quality is determined. The client receives a second portion of the media content having the second quality. Whereby received media content by the clients comprises portions having different qualities. | 08-15-2013 |
20130239094 | DETECTING LOCKING DISCIPLINE VIOLATIONS ON SHARED RESOURCES - Detecting locking discipline violations on shared resources. For example, a method of detecting locking discipline violations of shared resources of a computing platform, by a testing process to be executed concurrently with one or more other processes on said computing platform, the testing process comprising: locking a shared resource of said computing platform; reading a value of the shared resource; locally storing the value of the shared resource; rereading the value of the shared resource after a predefined time period; and generating a locking discipline violation report if the value of said shared resource as reread by said rereading is different from the value of said resource as locally stored by said locally storing. | 09-12-2013 |
20130268343 | SMART APPLIANCE REGISTRATION - In one example of smart appliance registration, a system comprises an electric device that is configured to transmit a unique identifier upon activation, a smart meter that is configured to receive the unique identifier and to further transmit the unique identifier, and a monitoring entity configured to receive the unique identifier from the smart meter for device-specific profiling. | 10-10-2013 |
20130293344 | SENSOR-BASED MOVEMENT GUIDANCE - Technologies are generally described for methods, instructions, and applications for a user-guidance system. In some examples, the system may include sensors to measure current weight distribution of a user of the user-guidance system and to transmit resulting measured weight distribution data, a guidance apparatus to calculate a subsequent user movement based on at least the measured weight distribution data and to transmit resulting user movement instructions, and an actuator to produce actuating signals, based on at least the user movement instructions, that provide instructions for the subsequent user movement. | 11-07-2013 |
20130301516 | DIGITAL RELAY FOR OUT OF NETWORK DEVICES - In one example of digital relay for out of network devices, a communications device includes a detecting component configured to detect that one or more communication endpoints is within communication range, a message receiving component configured to receive a digital message from a first communication endpoint, and a message relaying component configured to transmit the digital message to the second communication endpoint, wherein the first communication endpoint and the second communication endpoint are not communicatively coupled to each other. | 11-14-2013 |
20140040519 | ACTIVE LOCK INFORMATION MAINTENANCE AND RETRIEVAL - Technologies related to active lock information maintenance and retrieval are generally described. In some examples, a computing device may be configured to maintain active lock information including lock identifiers for active locks, lock access identifiers corresponding to a number of times a lock has been placed and/or released, and/or lock owner identifiers corresponding to threads placing locks. The computing device may provide an active lock information system configured to return active lock information including some or all of the lock identifiers for active locks, lock access identifiers, and/or lock owner identifiers in response to active lock information requests. | 02-06-2014 |
20140082023 | ASSOCIATING AN IDENTITY TO A CREATOR OF A SET OF VISUAL FILES - Technologies and implementations for associating a personal identity of a creator to a set of visual files are generally disclosed. | 03-20-2014 |
20140165197 | MALWARE ATTACK PREVENTION USING BLOCK CODE PERMUTATION - Technologies are generally described for systems and methods configured to produce an executable code. In some examples, a developer may send machine language code to a system manager. The machine language code may include two or more machine language blocks and linking information. The system manager may include a processor configured to permute the machine language blocks to produce permuted machine language code. The processor may modify the linking information based on the permuted machine language code to produce modified linking information. The processor may link the permuted machine language code with use of the modified linking information to produce the executable code. | 06-12-2014 |
20140196152 | DIGITAL MEDIA PRIVACY PROTECTION - In one example of digital media privacy protection, a computer-readable medium stores computer-executable instructions that, when executed, cause one or more processors to execute operations including capturing at least one image file, obfuscating at least all facial images included in the captured image file, comparing all facial images included in the captured image file against a locally stored privacy policy, unobfuscating those of the facial images included in the captured image file for which the comparison against the locally stored privacy policy results in a positive match, and rendering the captured image file. | 07-10-2014 |