Process, system, and computer program for determining whether method of computer program is validator
    1.
    发明专利
    Process, system, and computer program for determining whether method of computer program is validator 有权
    用于确定计算机程序的方法是否有效的过程,系统和计算机程序

    公开(公告)号:JP2012113693A

    公开(公告)日:2012-06-14

    申请号:JP2011199060

    申请日:2011-09-13

    CPC classification number: G06F21/50 G06F21/563

    Abstract: PROBLEM TO BE SOLVED: To provide a process, a system, and a computer program for determining whether a method of a computer program is a validator.SOLUTION: The computer program which has an illegal pattern and the method is received (102). The target method is normalized so that respective return statements related to the illegal pattern return a constant Boolean value (104). A first path condition and a second path condition for one or a plurality of corresponding paths are determined so that one or a plurality of corresponding basic blocks return a constant true Boolean value for the first path condition and a constant false Boolean value for the second path condition (106, 114). When unsatisfiability of both the path conditions is false, it is reported that the method is not a validator (110, 118). When the unsatisfiability of both the path conditions is true, it is reported that the method is a validator (112, 120).

    Abstract translation: 要解决的问题:提供一种用于确定计算机程序的方法是否是验证器的过程,系统和计算机程序。

    解决方案:接收到具有非法模式的计算机程序和方法(102)。 目标方法被归一化,使得与非法模式相关的各个返回语句返回一个常量布尔值(104)。 确定一个或多个对应路径的第一路径条件和第二路径条件,使得一个或多个对应的基本块返回用于第一路径条件的恒定真布尔值和用于第二路径的恒定假布尔值 条件(106,114)。 当路径条件不满足时,报告该方法不是验证器(110,118)。 当两个路径条件的不满足性都为真时,报告该方法是验证器(112,120)。 版权所有(C)2012,JPO&INPIT

    System, method and apparatus for simultaneous definition and enforcement of access-control and integrity policies

    公开(公告)号:GB2487862B

    公开(公告)日:2016-09-21

    申请号:GB201206958

    申请日:2010-09-14

    Applicant: IBM

    Abstract: Access-control and information-flow integrity policies are enforced in a computing system by detecting security-sensitive sinks in software code for an application running on the computing system and retrieving an access-control policy from a database accessible to the computing system. The access-control policy maps a set of access permissions within the computing system to each one of a plurality of principals. For each detected security-sensitive sink, all principals that influence that security-sensitive sink are detected and an overall access permission is assigned to each security-sensitive sink by taking the intersection of the access permission sets for all influencing principals of that security-sensitive sink. If this permission set is inadequate, an integrity violation is reported. In addition, permission labels are assigned to each value of variables used in the security-sensitive sinks. Each permission label is a set of permissions.

    Fusing sparse kernels to approximate a full kernel of a convolutional neural network

    公开(公告)号:GB2583623A

    公开(公告)日:2020-11-04

    申请号:GB202010475

    申请日:2018-12-13

    Applicant: IBM

    Abstract: Techniques facilitating generation of a fused kernel that can approximate a full kernel of a convolutional neural network are provided. In one example, a computer-implemented method comprises determining a first pattern of samples of a first sample matrix and a second pattern of samples of a second sample matrix. The first sample matrix can be representative of a sparse kernel, and the second sample matrix can be representative of a complementary kernel. The first pattern and second pattern can be complementary to one another. The computer- implemented method also comprises generating a fused kernel based on a combination of features of the sparse kernel and features of the complementary kernel that are combined according to a fusing approach and training the fused kernel.

    Method, apparatus and computer program product providing performance and energy optimization for mobile computing

    公开(公告)号:GB2529363B

    公开(公告)日:2016-06-01

    申请号:GB201521768

    申请日:2014-05-22

    Applicant: IBM

    Abstract: A mobile device includes a computer-readable medium storing computer program instructions, a data processor to execute the instructions, and communication circuitry configured for local area wireless connectivity with neighboring mobile devices and for wireless connectivity to a remote server from which at least a portion of a data set is downloaded. Execution of the computer program instructions results in estimating a cost to perform a computation task on the data set. If the estimated cost is greater than a threshold cost, an ad-hoc wireless network is formed with at least one other mobile device and the mobile device downloads a portion of the data set assigned to the mobile device. The mobile device then performs a computation task on the downloaded portion of the data set and wirelessly transfers a result of the computation task to the at least one other mobile device of the ad-hoc wireless network.

Patent Agency Ranking