Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1085 results about "Memory footprint" patented technology

Memory footprint refers to the amount of main memory that a program uses or references while running. The word footprint generally refers to the extent of physical dimensions that an object occupies, giving a sense of its size. In computing, the memory footprint of a software application indicates its runtime memory requirements, while the program executes. This includes all sorts of active memory regions like code segment containing (mostly) program instructions (and occasionally constants), data segment (both initialized and uninitialized), heap memory, call stack, plus memory required to hold any additional data structures, such as symbol tables, debugging data structures, open files, shared libraries mapped to the current process, etc., that the program ever needs while executing and will be loaded at least once during the entire run.

Small memory footprint system and method for separating applications within a single virtual machine

A system and method for isolating the execution of a plurality of applications. The applications may utilize or share one or more "original" classes. Only one copy of each original class is maintained, regardless of how many applications utilize it. Static fields are extracted from the original classes. A separate copy of the static fields is created for each of the utilizing applications. A static field class which includes instance fields corresponding to the static fields may be created, wherein each instance of the static field class corresponds to one of the utilizing applications. Access methods for the one or more static fields may be created, wherein the access methods are operable to access the corresponding separate copy of the static fields based upon the identity of the utilizing application. A single access methods class may be created for each original class, wherein the single access methods class includes the access methods for accessing the extracted fields from the original class. The method and system may be optimized by exempting from extraction static fields that are classified as secure for utilization by the plurality of applications without inter-application interference. The secure set of static fields may include final static fields of primitive types, final static strings, immutable arrays of primitive types, and/or other appropriate fields.
Owner:ORACLE INT CORP

Small memory footprint system and method for separating applications within a single virtual machine

A system and method for isolating the execution of a plurality of applications. The applications may utilize or share one or more “original” classes. Only one copy of each original class is maintained, regardless of how many applications utilize it. Static fields are extracted from the original classes. A separate copy of the static fields is created for each of the utilizing applications. A static field class which includes instance fields corresponding to the static fields may be created, wherein each instance of the static field class corresponds to one of the utilizing applications. Access methods for the one or more static fields may be created, wherein the access methods are operable to access the corresponding separate copy of the static fields based upon the identity of the utilizing application. A single access methods class may be created for each original class, wherein the single access methods class includes the access methods for accessing the extracted fields from the original class. The method and system may be optimized by exempting from extraction static fields that are classified as secure for utilization by the plurality of applications without inter-application interference. The secure set of static fields may include final static fields of primitive types, final static strings, immutable arrays of primitive types, and / or other appropriate fields.
Owner:SUN MICROSYSTEMS INC

Interactive media presentation system for presenting business data over a digital television network

The method includes steps for creating and updating an interactive television application, which includes business data and other interactive and dynamic data which changes frequently over time. The interactive television application and data is transmitted over a television broadcast network, and the method includes steps for presenting the data to the user. Business data is compiled into a binary form, the business data for example comprising descriptions of products. A description of an interactive application is generated using an authoring tool. The authoring tool allows a creative designer to create page layouts and use simple script to specify how to respond to user interactions. The compiled business data and the script are streamed to a receiver for generating video information for a user's television, wherein the receiver uses the script to access the compiled business data and generate a presentation of the data for the user. The receiver can be a set-top box for use with a cable television provider, a terrestrial television provider or a satellite television provider. The business data can be compatible with a version of XML (extensible markup language). The business data can be referenced within script created using an authoring tool without the instances of the business data being present at the time of authoring. The compiling can be configured to improve the access speed of the receiver to the business data and to reduce a memory footprint of the business data on the receiver. The business data can be updated and recompiled without requiring the application to be re-authored manually.
Owner:ORACLE INT CORP

Method and device for detecting safety state of terminal device

ActiveCN103136091AShow completionUnderstand business contentHardware monitoringOperational systemMemory footprint
The invention discloses a method and device for detecting a safety state of a terminal device. The device comprises a configuration module, a monitoring module, a tidying module, a prompting module and a displaying module. The configuration module presets correspondence relation between healthy states and time interval and memory usage rate and weight of healthy states of monitoring programs occupying an operation system. The monitoring module monitors the time interval of the monitoring programs from the last-time execution and obtains the healthy states of the monitoring programs by combining the correspondence relation between the healthy states and the time interval and the memory usage rate. The tidying module performs weighted processing to the healthy states of the monitoring programs to obtain the healthy state of the operation system. The prompting module displays a color and/or an image corresponding to the obtained healthy state of the operation system. The displaying module opens an interface through triggering of a color and/or image quick icon operated by a user and displays the healthy states of the monitoring programs and the operation system. The method and device for detecting the safety state of the terminal device performs device testing, gives healthy state evaluation and finishes and displays the cleaning or optimizing work.
Owner:BEIJING QIHOO TECH CO LTD

Hybrid-domain full wave form inversion method of central processing unit (CPU)/graphics processing unit (GPU) synergetic parallel computing

InactiveCN103135132ASolving Convergence ProblemsAvoid the problem of insufficient storage and occupancySeismic signal processingInternal memoryFull wave
The invention discloses a hybrid-domain full wave form inversion method of central processing unit (CPU)/graphics processing unit (GPU) synergetic parallel computing. Compared with a traditional method, the method can be adopted to conduct the CPU/GPU synergetic parallel computing so as to obviously improve computing efficiency. The method enables a forward part of full wave form inversion to be placed to a time domain, namely forward is conducted in the time domain, the forward is converted to be conducted as the inversion in a frequency domain by the discrete fourier transform (DFT) being utilized, namely the DFT is adopted to pick wave field components corresponding to inversion frequency, and the inversion is conducted in the frequency domain from low frequency to high frequency. The method effectively resolves the problem of astringency of a standard time domain method, and avoids the problem that internal memory of wave form inversion of a standard three-dimensional frequency domain and a Laplace domain cannot be satisfied. The method is few in step, reduces computing expenses, and due to the fact the method can be adopted to conduct the CPU/GPU synergetic parallel computing, largely improves speed-up ratio of the computing method.
Owner:INST OF GEOLOGY & GEOPHYSICS CHINESE ACAD OF SCI

Redundancy removal file system based on limited binary tree bloom filter and construction method of redundancy removal file system

The invention provides a limited binary tree bloom filter, a redundancy removal file system based on the limited binary tree bloom filter, and a construction method of the redundancy removal file system based on the limited binary tree bloom filter. According to the limited binary tree bloom filter, an upper limit is arranged for the number of nodes of each layer, each node is a two-stage bloom filter, and each two-stage bloom filter comprises a standard bloom filter body and a second portion which contains fingerprints and addresses of data blocks in a stored mode. Firstly, a fingerprint of each data block is searched in the standard bloom filter bodies; when the fingerprint of each data block is not found, a node misses, otherwise, search is continuously carried out in the second portions, the node hits the target when a completely matched fingerprint is found in the second portions, and otherwise the node misses. The redundancy removal file system and the construction method of the redundancy removal file system achieve write-in, reading and deletion of files on the basis of the limited binary tree bloom filter. Misjudgment is reduced through a secondary query, and the limited binary tree bloom filter, the redundancy removal file system based on the limited binary tree bloom filter, and the construction method of the redundancy removal file system based on the limited binary tree bloom filter have the advantages of being low in occupation of the memory, low in usage of a CPU, low in occupation of additional space, high in redundancy removal ratio, and excellent in access performance and extensibility.
Owner:BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products