Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

68 results about "Rename" patented technology

In computing, rename refers to the altering of a name of a file. This can be done manually by using a shell command such as ren or mv, or by using batch renaming software that can automate the renaming process.

System, method and apparatus for developing software

The present invention provides a system, method and apparatus for developing software that includes a set of standardized code segments, an interface for defining a structure of a project and a code generator communicably coupled to the set of standardized code segments and the interface that can create a computer program from the project. The present invention also generates a new computer program by (a) creating and renaming a root part for a project having a structure, (b) adding and renaming one or more holders to the renamed root part, (c) adding and renaming a part to one or more of the renamed holders, (d) adding and renaming one or more holders to the renamed parts, (e) creating one or more elements for each renamed part, (f) repeating steps (c), (d) and (e) as needed to complete the structure, and (g) generating the new computer program from the project.
Owner:KING ANTHONY GRAHAM +2

Method, system, program, and data structure for implementing a locking mechanism for a shared resource

Provided are a method, system, program, and data structure for implementing a locking mechanism to control access to a shared resource. A request is received to access the shared resource. A determination is made of whether a first file has a first name. The first file is renamed to a second name if the first file has the first name. A second file is updated to indicate the received request in a queue of requests to the shared resource if the first file is renamed to the second name. An ordering of the requests in the queue is used to determine whether access to the shared resource is granted to the request. The first file is renamed to the first name after the second file is updated.
Owner:ORACLE INT CORP

Method for identifying partial redundancies in a new processor architecture

The invention, in one embodiment, is a method for compiling at least a portion of a computer program. The method includes (a) inserting a phi-function for a global variable reaching a join point in the intermediate language representation subsequent to the join point without regard to the presence of ambiguity; (b) renaming a definition and any subsequent use of the definition in the intermediate language representation; and (c) identifying a partially redundant load by determining whether any of the operands of the inserted phi-function have not been renamed.
Owner:INTEL CORP

Methods for renaming stack references to processor registers

According to one aspect of the invention, there is provided a method for renaming memory references to stack locations in a computer processing system. The method includes the steps of detecting stack references that use architecturally defined stack access methods, and replacing the stack references with references to processor-internal registers. The architecturally defined stack access methods include memory accesses that use one of a stack pointer, a frame pointer, and an argument pointer. Moreover, the architecturally defined stack access methods include push, pop, and other stack manipulation operations.
Owner:LINKEDIN

Logical map table for detecting dependency conditions

Techniques and structures are described which allow the detection of certain dependency conditions, including evil twin conditions, during the execution of computer instructions. Information used to detect dependencies may be stored in a logical map table, which may include a content-addressable memory. The logical map table may maintain a logical register to physical register mapping, including entries dedicated to physical registers available as rename registers. In one embodiment, each entry in the logical map table includes a first value usable to indicate whether only a portion of the physical register is valid and whether the physical register includes the most recent update to the logical register being renamed. Use of this first value may allow precise detection of dependency conditions, including evil twin conditions, upon an instruction reading from at least two portions of a logical register having an entry in the logical map table whose first value is set.
Owner:ORACLE INT CORP

Electronics assembly engineering system employing naming and manipulation functions for user defined data structures in a data system using transaction service

The present invention provides novel naming and manipulation functions for user defined data structures in a data system using transaction service. In particular, in an electronics assembly engineering system having a computer subsystem in which user-defined data structures accessible to editor software have referential integrity and in which user modifications to the data structures during editing are made directly to the data structures rather than indirectly by way of a temporary file, the invention provides a method for permitting naming and manipulation of the data structures. The method includes the steps of (i) providing close, discard and rename functions for the data structures in the case where a newly-created data structure is being edited; (ii) providing close and copy functions for the data structures if an existing data structure is being edited; and (iii) excluding a save-as function for the data structures.
Owner:SIEMENS ELECTRONICS ASSEMBLY SYST LLC +1

Dependent object processing for triggers

Methods, systems and articles of manufacture are provided for setting a state of triggers between operative and inoperative. In an operative state the trigger may be called during triggering I / O operations such as Insert, Update and Delete. The inoperative state indicates that the system has detected a condition requiring user intervention. In a particular embodiment, a database management system (DBMS) will analyze the function being performed on a table (such as a rename of the table) and with dependent object data, the DBMS will determine if the trigger is self-referencing. If so, the trigger made inoperative. Making the trigger inoperative and requiring user intervention prevents the system from potentially producing undesired results. In another embodiment, a determination of dependency is made upon receiving a database command to affect an object. According to the type of command, the object and its dependents are either affected or unaffected.
Owner:IBM CORP

Method of automatically correcting broken links to files stored on a computer

A method of correcting broken software links includes providing a computer data storage having target files and master files. Each master file includes a pointer to a storage location where at least one target file called by the master file resides. A link-id is determined for each target file and is stored in each master file configured to call the target file. The target file is then either renamed or moved so that each master file configured to call the target file cannot locate it from the pointer data. The target file is then located on the computer data storage based on a match between the link-id for the target file and the link-id stored in the calling master file. The data comprising the pointer of the master file is then updated whereupon it can locate the target file on the computer data storage.
Owner:AXIOM SERVICES

Simultaneous finish of stores and dependent loads

A method for reducing a pipeline stall in a multi-pipelined processor includes finding a store instruction having a same target address as a load instruction and having a store value of the store instruction not yet written according to the store instruction, when the store instruction is being concurrently processed in a different pipeline than the load instruction and the store instruction occurs before the load instruction in a program order. The method also includes associating a target rename register of the load instruction as well as the load instruction with the store instruction, responsive to the finding step. The method further includes writing the store value of the store instruction to the target rename register of the load instruction and finishing the load instruction without reissuing the load instruction, responsive to writing the store value of the store instruction according to the store instruction to finish the store instruction.
Owner:GLOBALFOUNDRIES US INC

Processor efficiency by combining working and architectural register files

A processor includes an execution pipeline configured to execute instructions for threads, wherein the architectural state of a thread includes a set of register windows for the thread. The processor also includes a physical register file (PRF) containing both speculative and architectural versions of registers for each thread. When an instruction that writes to a destination register enters a rename stage, the rename stage allocates an entry for the destination register in the PRF. When an instruction that has written to a speculative version of a destination register enters a commit stage, the commit stage converts the speculative version into an architectural version. It also deallocates an entry for a previous version of the destination register from the PRF. When a register-window-restore instruction that deallocates a register window enters the commit stage, the commit stage deallocates local and output registers for the deallocated register window from the PRF.
Owner:ORACLE INT CORP

Vulnerability code clone detection method based on context semantics and patch verification

The invention discloses a vulnerability code clone detection method based on context semantics and patch verification, and solves the problem that an existing vulnerability code clone detection method cannot obtain vulnerability context and patch repair. The method comprises the steps of obtaining vulnerability data; marking vulnerability code control statements; performing abstract normalization preprocessing on vulnerability source codes and patches; constructing a vulnerability function and a vulnerability vulnerability code fingerprint library; cloning and detecting a to-be-detected code; and judging a detection result and outputting the detection result to finish vulnerability clone detection of the software. Based on the code fingerprint, the problem of low accuracy of a high-level abstract technology is avoided; according to the method, the influence of renaming on the detection accuracy is eliminated for the code abstract preprocessing operation; the context relationship and the patch are verified, so that the false alarm rate is reduced; besides, fragile code, control statement and patch detection is carried out on the to-be-detected code, so that the application scene is expanded and the missing report rate is reduced. The method is used for detecting bugs caused by code cloning in software.
Owner:陕西阡陌通达科技有限公司

OLAP pre-computation engine optimization method based on object storage and application

The invention provides an OLAP pre-computation engine optimization method based on object storage and application. Three optimization directions are provided, namely, the logic paths of renaming object operation reduction, data consistency check and inverted index file inversion are provided. Through a file mapping table added to the metadata layer, a mapping relationship between files before andafter renaming is matched, and renaming operation on the bottom layer of the file system is reduced; and a logic path of a partition directory hierarchical structure of the file is inverted to correspond to a prefix of the file in the object storage, thereby realizing quick query and reading of the object storage, adding logic verification to reading operation, deleting operation and writing operation, and checking data consistency. According to the method, the read-write mode of the OLAP engine in the object storage using process is optimized, the execution efficiency of the engine is improved, response to the analysis requirement of an upper-layer report system is accelerated, and based on the method, an efficient OLAP calculation query execution engine can be constructed, the construction efficiency is improved, and query is accelerated.
Owner:KUYUN SHANGHAI INFORMATION TECH CO LTD

Assembly program control flow path detection method and device

The invention belongs to the technical field of computer program analysis and software testing and discloses an assembly program control flow path detection method. The method comprises the followingsteps of detecting and deleting annotations of code segments in an assembly program, and renaming an integer register; obtaining a control flow graph CFG of the assembly program through the auxiliarytable AT and the control flow original data CRD; inserting a path label into the head of the instruction sequence of the basic block BBN to generate new control flow original data CRD; recombining thenew control flow original data CRD to obtain a new assembly program with a path label; compiling the new assembly program with the path label and the probe program into an executable file, and generating a result file; and reading the generated result file, and performing statistics according to paths to obtain passing rates of different paths. According to the detection method, the control flowinformation of the assembly program can be rapidly and accurately obtained, then the dynamic information such as path coverage testing is obtained, and the detection method has advantages of being light in weight, high in pertinence, easy to modify and maintain and the like.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Method and system for renaming resource files of Android engineering project in batches,equipment and medium

The invention discloses a method and system for renaming resource files of an Android engineering project in batches, equipment and a medium, and the method comprises the following steps: setting a renaming rule which comprises file prefixes and / or file suffixes needing to be added in batches; obtaining a matching rule of each file type according to the engineering characteristics; selecting a target project folder, and sequentially obtaining original file names of resource files in the target project folder to form a renaming list; on the basis of a matching rule, performing file type distinguishing on the original file names in the renaming list in sequence; according to a renaming rule and a matching rule, sequentially adding corresponding file prefix names and / or file suffix names into the original file names to obtain corresponding new file names; and respectively updating the new file names to the corresponding resource files to realize renaming, and sequentially compiling and verifying the renamed resource files. According to the method, batch renaming of the resource files in the development process of the Android system can be achieved.
Owner:广州宸祺出行科技有限公司

File encryption method combined with access deflection

InactiveCN101763474ASolve the problem of complex policy configurationNo risk of disclosureDigital data protectionComputer hardwareRename
The invention discloses a file encryption method combined with access deflection, which is applied in information safety field. The method uses an access deflection module converts file rename into a combination of duplication and deletion operation, and deflects operations like simultaneous open and establishment. The problem of complex strategy allocation caused by rename can be solved when the access deflection module is coordinately used with a transparent encryption module; and when a user performs the operation of Save Copy As which is possible to result in divulging secrets, the invention can automatically deflect and encrypt, thus avoiding the possibility of divulging secretes. The invention has the advantages of simple strategy, wide application range and the like.
Owner:深圳市虹安信息技术有限公司

File batch renaming method, electronic equipment and computer readable storage medium

The invention discloses a file batch renaming method. The method comprises the following steps: (1) obtaining a file batch renaming request; (2) displaying a renaming rule setting window; (3) adding file information selected in the file batch renaming request to a first array and adding a renaming rule set by a user to a second array; (4) traversing the second array, and modifying the file name ofeach file in the first array by adopting a renaming rule of the current node of the second array until the second array is traversed; (5) converting the first array into a JSON format and displayingthe first array, and displaying a file name modification confirmation window at the same time; and (6) after modification confirmation information is obtained, reversely converting the JSON format into an array, and storing the modified file name of each file. According to the method and the device, batch renaming of the files is realized by adopting multiple renaming rules, and the user operationis simple. In addition, the invention further discloses electronic equipment and a computer readable storage medium.
Owner:GUANGDONG 115 TECH

Renaming a directory that resides on a layered volume

A directory that resides on a layered volume can be renamed A hooking module can be employed to intercept rename requests. The hooking module can query a layering file system filter driver to determine the volume of the source and target of the rename request. If the source and target are on different volumes, thereby indicating that the source is a directory of a layered volume, the hooking module can append a signature to the target which identifies the actual volume of the source. The modified rename request can then be passed to the operating system which will perform its normal operations including verifying that the source and target are on the same volume. During this verification, the layering file system filter driver can detect the appended signature in the target and can inform the operating system that the target is on the volume identified in the signature.
Owner:DELL MARKETING CORP

Instruction processing method and device

The invention provides an instruction processing method and device. The instruction processing method comprises the following steps: renaming a branch instruction needing to be lifted in a first program and a write variable in a dependent instruction of the branch instruction, so that the write variable has a globally unique variable name; and obtaining a first instruction sequence according to the branch instruction and the dependency instruction after the write variable is renamed. According to the technical scheme provided by the invention, the read-write problem caused by write variables with the same name in a branch conversion technology can be solved.
Owner:HUAWEI TECH CO LTD

Multi-layer merge in a storage virtualization system

The state of a file may be a combination of local state, typically small (e.g., a placeholder file), and some external source state such as that maintained in a read-only namespace managed by a cloudprovider or by another local file system, typically large. A file system component responsible for overlaying (i.e., merging) the partial local state and the external source state into a single file system view that can be used by an application of a container as if the full state exists locally. Overlays that comprise the file system state may be referred to as 'layers'. A tombstone mechanism maybe provided to record delete or rename modifications in the top layer.
Owner:MICROSOFT TECH LICENSING LLC

Security reinforcement method and device based on programming language library

The invention discloses a security reinforcement method and device based on a programming language library, and aims to solve the technical problem that a site administrator usually adopts a manual mode to perform security reinforcement on a site at present, and the situation of missing replacement and change is easy to occur. The method comprises the following steps: according to a preset regular expression, obtaining a programming language script matched with the regular expression from a target folder in which a script file is stored; according to a preset script dictionary, renaming a script name corresponding to the programming language script to obtain a renamed specified script name; and determining a hypertext markup language document referencing the programming language script, and modifying the name of the programming language script referenced in the hypertext markup language document according to the specified script name.
Owner:SHANDONG INSPUR GENESOFT INFORMATION TECH CO LTD

Prototype, instance and folder renaming method and storage medium

The invention discloses a prototype, instance and folder renaming method and system and a storage medium. The method comprises the steps of acquiring resource library prototype nodes and modificationcommands; obtaining folders associated with the prototype nodes of the resource library and a new and old resource comparison table through an interface; acquiring all resource prototypes under a resource library prototype node, storing the resource prototypes into a set, traversing the set to acquire names of the resource prototypes, instances associated with the resource prototypes and paths offolders, and storing the names, the instances and the paths into the set; and checking occupation conditions of all resource prototypes, occupation conditions of instances, path conditions of foldersand name conflict conditions of folders, and modifying folder names, prototype names and instance names. The resource prototypes in the Process Design resource library and the resource instances and folders associated with the resource prototypes can be quickly renamed in batches, and the accuracy is high. The invention can be widely applied to the field of computer simulation.
Owner:GUANGZHOU MINO AUTOMOTIVE EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products