Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30 results about "Assignment" patented technology

In computer programming, an assignment statement sets and/or re-sets the value stored in the storage location(s) denoted by a variable name; in other words, it copies a value into the variable. In most imperative programming languages, the assignment statement (or expression) is a fundamental construct.

Object-based programming method and object-based programming system in C language programming

Certain currently popular programming languages (such as C++) are highly efficient but can easily bring about memory errors, and certain currently popular programming languages (such as Java) are safe in memories but lower in efficiency. The invention discloses an object-based programming method and an object-based programming system in C language programming, and the system is a convenient, safe and high-efficiency programming framework. The system utilizes the stack technique to efficiently judge the attribute of an 'object' (i.e. a non-generic type variable), also standardizes assignment and other operations on the object, and can release object resources and optimize the efficiency of object usage (or the efficiency of parameter transfer) simultaneously. The system provides defining templates for objects and object-operating functions, so that programmers can conveniently define the objects and the object-operating functions, the objects and functions defined by the defining templates can be conveniently subjected to recursionrecur and can be conveniently nested, invoked and operated in any other complex ways like generic type variables and functions, and the problems of memory safety and efficiency are automatically processed by the templates.
Owner:INST OF FLUID PHYSICS CHINA ACAD OF ENG PHYSICS

Method for realizing definite software operating time in single task operating environment

The invention discloses a method for realizing definite software operating time in a single task operating environment, which is characterized by comprising the following steps of: (1) programming a function meeting requirements by using a conventional programming method; (2) dividing external input, external output and algorithm of the function definitely; (3) establishing a local variable for the external output; (4) finding out all switch statements in the function; (5) establishing local variables for the external output of all the switch statements; (6) cutting the programs of all the switch statements out of the switch statements, and modifying the output of the switch statements into the local variables of the output of the switch statements; (7) in the switch statements, adding the local variables of the output of the switch statements to an assignment statement output by a switch statement operation result and an assignment statement for a global variable; (8) adding the switch statement operation result to follow-up program operation; (9) assigning the local variable of the external output to the external output; and finally (10) modifying functions called in the program. The invention can ensure that the operating time of the same function is definite without change when outputs and routes are different.
Owner:NANJING NRIET IND CORP

Multi-language intelligent contract compiling method based on blockchain

The invention discloses a multi-language intelligent contract compiling method based on blockchain. The method comprises the following steps: compiling an expression and an assignment statement of anintelligent contract; compiling a conditional judgment statement of the smart contract; compiling a loop statement of the intelligent contract; and compiling a function statement of the intelligent contract. During compiling, the method can be compatible with and support intelligent contracts compiled by multiple programming languages, the compiling efficiency is improved, the learning cost of different program languages is reduced, and the running threshold of the intelligent contracts is greatly reduced.
Owner:象链网络科技(上海)有限公司

Method and device for tracking variable objects

The invention discloses a tracking method and device of a variable object. The method comprises the following steps: when carrying out bug search on a control flow diagram based on a detected program, finding out a first manipulation language of the variable object, wherein the first manipulation statement is used for indicating to carry out assignment operation and valuing operation on the variable object; obtaining a statement set of the variable object from a pre-collected variable information set, wherein the statement set comprises a plurality of second manipulation statements, and manipulation which is indicated by the second manipulation statements and is carried out on the variable object is opposite to manipulation which is indicated by the first manipulation statement and is carried out on the variable object; determining a third manipulation statement, having function calling relation with the first manipulation statement, in the plurality of second manipulation statements according to the control flow diagram; by taking a statement position of the determined third manipulation statement as a starting point, tracking the variable object. By adopting the tracking method and device of the variable object, the technical problem that missed reports of bugs are caused by the fact that the variable object cannot be tracked in a bug scanning process is solved.
Owner:ALIBABA GRP HLDG LTD

Method for realizing definite software operating time in single task operating environment

The invention discloses a method for realizing definite software operating time in a single task operating environment, which is characterized by comprising the following steps of: (1) programming a function meeting requirements by using a conventional programming method; (2) dividing external input, external output and algorithm of the function definitely; (3) establishing a local variable for the external output; (4) finding out all switch statements in the function; (5) establishing local variables for the external output of all the switch statements; (6) cutting the programs of all the switch statements out of the switch statements, and modifying the output of the switch statements into the local variables of the output of the switch statements; (7) in the switch statements, adding the local variables of the output of the switch statements to an assignment statement output by a switch statement operation result and an assignment statement for a global variable; (8) adding the switch statement operation result to follow-up program operation; (9) assigning the local variable of the external output to the external output; and finally (10) modifying functions called in the program. The invention can ensure that the operating time of the same function is definite without change when outputs and routes are different.
Owner:NANJING NRIET IND CORP

Method and device for improving bytecode reverse engineering effect of smart contract

ActiveCN113504940ASolve the problem of poor readability of output resultsConducive to public reviewReverse engineeringEnergy efficient computingSoftware engineeringParameter
The invention relates to the technical field of block chain smart contracts, and provides a method and a device for improving a bytecode reverse engineering effect of a smart contract. According to the method, under the condition that a function signature is known, a compiler can be better improved, and the readability of the reverse engineering result of the smart contract is improved. According to a main scheme in the invention, the method comprises the following steps: S1, conducting reverse engineering on a contract bytecode through Erays so as to obtain a reversed code; S2, according to the known function signature in the contract bytecode, adding a function id and a parameter type to each common / external function of the code obtained after reverse engineering, and generating a parameter list; S3, for each function in the contract bytecode in the step S1, replacing a meaningless variable name with a meaningful parameter name; S4, for an assignment statement, if the parameter of the corresponding function is assigned to a variable, adding the type of the corresponding parameter to the variable; and S5, replacing the code, which is generated by the compiler and is used for accessing the parameter, with a simple assignment statement.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

A non-api member recommendation method based on heuristics and neural networks

The invention relates to a non-API object recommendation method based on heuristics and neural networks, and belongs to the technical field of code completion and code recommendation. According to themethod, all members included in a non-API object declaration type are collected according to non-API member accessing sample sample on the right side of an assignment statement in open source software, the members comprise members obtained by inheritance, then inaccessible members are eliminated according to the relationship between the class where the assignment statement is located and the non-API object declaration type, and the remaining accessible members are all taken as candidates and put into an initial candidate list cdtList for the use of subsequent use. Prediction is conducted on the sample in step one based on three kinds of specific heuristic rules. The neural networks are trained by using information to obtain a filter capable of filtering low-reliability prediction results.When a programmer enters '.' in a non-API sample object on the right side of the assignment statement, non-API members which might access are predicted. According to the method, the probability thatthe number of recommended members under the same data set is correct is obviously higher than existing methods and tools.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Project code automatic optimization method and device, equipment and medium

The invention is applied to the field of artificial intelligence, relates to the field of block chains, and discloses a project code automatic optimization method and device, computer equipment and astorage medium. The method comprises the steps of determining a to-be-converted project, wherein a deconstruction assignment conversion tool is installed in the to-be-converted project, and obtaininga configuration file, wherein the configuration file comprises a root directory address of the to-be-converted project, determining whether the to-be-converted project supports a target optimization grammar, if the to-be-converted project supports the target optimization grammar, reading the root directory address in the configuration file through a deconstruction assignment conversion tool, and determining a to-be-deconstructed assignment file according to the root directory address, performing deconstruction assignment conversion on the to-be-deconstructed assignment file through a deconstruction assignment conversion tool so as to optimize the to-be-converted project. According to the method, a user can convert the to-be-deconstructed assignment file through the deconstruction assignment conversion tool without knowing the deconstruction assignment grammar of the ES6, so that automatic optimization of project codes is realized, and the project optimization efficiency is improved.
Owner:PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD

System and Method for Protecting Software from Buffer Overruns

A compiler transforms the source code into object code, but it will postpone the assignment of all of the machine language jumps until installed time. This can be performed by labeling the jumps during compiled time, similarly to how variables are labeled for later indexing by the debugger. At installation time, given a random key, the installer will take the jump labels and assign random ordering of the code and data using the key as a seed. The final effect is that the same source code can potentially generate an infinite number of object codes, with the exact same functionality of execution. The main difference, however, is that as more jump labels are included, less fixed offsets between buffers are available to the black hat.
Owner:ROBOTIC RES OPCO LLC

Method for automatically synthesizing commonly-used cyclic abstracts and generating program specifications

The invention discloses a method for automatically synthesizing commonly-used cyclic abstracts and generating program specifications. The method comprises the steps of 1, generating an abstract syntax tree of a program to be verified; 2, analyzing the abstract syntax tree generated in the step 1 to generate an abstract of program statements; 3, analyzing the abstract generated in the step 2 to generate specifications of the program statements; 4, performing verification on the specifications generated in the step 3, and therefore proving the characters of the program to be verified in an assistant mode. Cyclic statements of the operation commonly-used data structure are converted into a series of abstract assignment statements, the cyclic statements are effectively extracted, and the cyclic statements can be analyzed by means of an assignment language analysis method. The program characters, particularly the relationship between the program states before and after program execution, are effectively described according to the program specifications generated by the statement abstract, the specifications effectively assist the program verification process, the automatic degree and efficiency of program verification are improved, and burdens of verification workers are relieved.
Owner:NANJING UNIV

Incomplete division method and device for maximum cardinal subset of ontology library

The invention provides an incomplete division method and device for a maximum cardinal subset of an ontology library. Comprising the following steps: according to an ontology library containing logic conflicts and a limited coordination cluster number k, obtaining a minimum uncoordinated subset set and a problem formula set, and building a model decision variable set X and model auxiliary decision variable sets Q and Y; constructing a quadratic integer programming constraint C according to k, X, Q, Y and the minimum discordant subset; enabling the sum of X to form a quadratic integer programming objective function Z, solving the minimum value of Z under the condition that C is met, obtaining a variable assignment set, obtaining different clusters through different integer values corresponding to each formula in the problem formula set in the variable assignment set, and dividing the clusters into limited coordination clusters which keep the maximum cardinal subset of the input ontology library; constructing a quadratic integer programming model by using the minimum incongruous subset, and finally solving the model to incompletely divide the ontology library into limited coordination clusters and enable the limited coordination clusters to retain the maximum cardinal subset in the ontology library.
Owner:HUZHOU TEACHERS COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products