Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

32 results about "Dependence network" patented technology

Cross-project defect influence analysis method based on program dependency relationship and symbolic analysis

The invention provides a cross-project defect influence analysis method based on a program dependency relationship and symbolic analysis. The cross-project defect influence analysis method comprises the following steps: 1) acquiring program source codes of different projects and multiple versions in the same software ecosystem; 2) extracting a calling relationship from a program source code of each project basic version, and constructing an ecosystem basic dependence network; 3) obtaining code changes from program source codes of other versions of each project, and constructing a version-sensitive ecosystem dependent network; 4) for a given cross-project defect, under the condition that an upstream error method of the cross-project defect is known, selecting a candidate downstream module;5) for each candidate downstream module, carrying out code preprocessing; 6) performing symbol coding on each preprocessed candidate downstream module; and 7) carrying out constraint solving on each downstream module after symbol coding, and if a solution exists, prompting a developer that the module is possibly influenced by a given cross-project defect. According to the method, the problems thatat present, cross-project defect influence analysis is lacked, and a downstream project affected module cannot be prompted are solved, so that the design of a cross-project defect repair scheme is guided, the quality of defect repair patches is improved, and healthy development of a software ecosystem can be better controlled and managed.
Owner:NANJING UNIV

Failure prediction method for software development

The invention provides a failure prediction method for software development. The failure prediction method comprises the steps that a source code dependence network and a developer social network are set up, and the dependence relationship between source code files and the communication and cooperation relationship between developers are recorded respectively; the source code dependence network and the developer social network are compared, and the difference between the source code dependence network and the developer social network is used as an indication of lack of communication. By the adoption of the failure prediction method for software development, the number of lacked developer communication links associated with each source code file can be detected and used as the indication of inconsistency of file networks, and the developer communication links lacked by the files can be provided; meanwhile, the reason of each lacked link can also be provided; namely, two corresponding source files depend on each other, however the developers of the two source files do not communicate and cooperate with each other. The developers can organize corresponding communication for making up according to the guide of the method, and failures are found and repaired in a targeted mode.
Owner:江苏苏测检测认证有限公司 +1

Authentication verification method, system and device

The invention discloses an authentication verification method, system and device. The method comprises the following steps: receiving a target request and a first hash value from a data bearing network, and performing hash operation on a first user identifier and a target key to obtain the first hash value; performing hash operation on the first user identifier and the target key to obtain a second hash value; comparing the first hash value with the second hash value, determining the target request as a legal message under the condition that a comparison result indicates that the first hash value is consistent with the second hash value, and generating a response message of the target request; a response message is returned to the terminal, the response message at least carries an authentication file, and the authentication file is used for marking the identity of the terminal so that the rich media communication suite equipment management system can recognize the terminal. According to the method and the device, the technical problems of complex authentication process and low use efficiency caused by the fact that authentication verification needs to be carried out on a user independently by depending on network side equipment in related technologies are solved.
Owner:CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products