Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

48 results about "Execution tree" patented technology

Database kernel query optimization method based on equivalence class

The invention belongs to the field of software, and provides a database kernel query optimization method based on an equivalence class. The method comprises the steps of using a function for processing description after the keyword 'from' and before the keyword 'where' in sql sentences after inquire statements enter a sub query optimizer, processing a nest tree structure with explicit connection or a linked list with no connection mode assigned, extracting list information, obtaining list objects, initializing the Col and Eclass bit variables contained by the list objects, and filling a linked list RELS; processing the restricted condition linked list 'quals' after the 'on' and after the 'where' in the sql sentences, and carrying out transmission on the restricted conditions according to the Eclass bit variables; entering an enumerator, enlarging planed searching space according to the Eclass bit variables, enumerating more equivalence plans, and entering a cost calculator to count cost; obtaining the plan with the minimum cost as a final execution plan, wherein the execution plan is compiled into an execution tree, and the execution plan is sent to an actuator to be executed. The database kernel query optimization method based on the equivalence class has the advantages of being high in performance.
Owner:YONYOU NETWORK TECH

Dynamic symbol execution visualization method for vulnerability mining

The invention discloses a dynamic symbol execution visualization method for vulnerability mining, and relates to the technical field of symbol execution visualization. The technical problems that in the prior art, symbol execution cannot be dynamically presented in the vulnerability mining process, and the low traversal efficiency caused by a code coverage bottleneck is difficult to overcome are solved. The method mainly comprises the steps that a vulnerability mining tool and a symbol execution visualization tool are started; the symbol execution visualization tool is set in the state of waiting to be called, and the vulnerability mining tool is executed to branch points; the vulnerability mining tool calls a symbol execution tree drawing module of the symbol execution visualization tool to construct branch nodes and then sends branch information to the branch nodes; overall statistic data of all the current branch nodes is updated through a data statistics module of the symbol execution visualization tool; in the overall statistic data, the symbol execution tree drawing module creates next branch nodes and sets the positions of the branch nodes according to calling data and branch information. The method is used for symbol execution visualization.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Binary system translation method and device based on execution tree depth

The invention discloses a binary system translation method and device based on the execution tree depth. The method comprises the steps that when a super block begins to be constructed, the execution tree depth is initialized to be zero, a preset execution tree depth threshold value is obtained, translation is started from a basic block where a preset initial address is located, and in the translating process, if a current instruction of the translated basic block is a direct skip instruction, a basic block which the direct skip instruction enters is translated; if the current instruction of the translated basic block is a condition skip instruction, a basic block after the condition skip instruction skips and the next basic block of the condition skip instruction are translated, and one is added into the execution tree depth; if the current instruction of the translated basic block is a function call instruction, functions corresponding to the function call instruction are translated, one is added into the execution tree depth, when the execution tree depth reaches the execution tree depth threshold value, translation is finished, and all the translated basic blocks form the super block. The method and the device can promote the performance of an execution translation program.
Owner:浙江迪捷软件科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products