INTELLIGENT CALL GRAPH GENERATION

    公开(公告)号:CA2687672A1

    公开(公告)日:2011-06-07

    申请号:CA2687672

    申请日:2009-12-07

    Applicant: IBM CANADA

    Abstract: An illustrative embodiment of a computer-implemented process for intelligent call graph generation receives a request to build a call graph to form a received request, receives a source code associated with the received request, receives configuration options, and determines whether an entry point for the call graph is identified in the source code. Responsive to a determination that the entry point for the call graph is identified, analyzes dependencies in the source code, and identifies exclusions in the source code using the analyzed dependencies to form identified exclusions. The computer-implemented process determines whether analysis required to build a compact call graph is complete and responsive to a determination that analysis required to build a compact call graph is complete, generates the compact call graph without the identified exclusions.

    ALGORITHM COMPLEXITY IDENTIFICATION

    公开(公告)号:CA2684348A1

    公开(公告)日:2011-05-04

    申请号:CA2684348

    申请日:2009-11-04

    Applicant: IBM CANADA

    Abstract: An illustrative embodiment provides a computer-implemented process for algorithm complexity identification through inter-procedural data flow analysis receives a call graph to form a set of received nodes in a static analysis framework, identifies a parent node in the set of received nodes to form an identified parent, traverses the call graph from the identified parent node to a node to identify a function within the node to form an identified function. Each identified function is analyzed to form a complexity value in a set of complexity values. Responsive to a determination that node analysis is complete, and responsive to a determination that path analysis is complete, determines whether path analysis for the identified parent is complete. Responsive to a determination that path analysis for the identified parent is complete, sum the complexity values in the set of complexity values for the identified parent and return the complexity value for the identified parent to a requester.

    Automatisches Verbinden von externen Daten mit einem Geschäftsanalyseprozess

    公开(公告)号:DE112018005424T5

    公开(公告)日:2020-07-30

    申请号:DE112018005424

    申请日:2018-11-08

    Applicant: IBM

    Abstract: Ein Big-Data-Analysesystem enthält eine Ereignisüberwachungs-Steuereinheit, die aus einem Datenfluss einer anfänglichen digitalen Abfrage ein auf einen Benutzer ausgerichtetes Ereignis erkennt. Eine Ereignisumwandlungs-Steuereinheit ermittelt mindestens ein kontextuelles Element, das dem mindestens einen auf einen Benutzer ausgerichteten Ereignis zugehörig ist, und wandelt das mindestens eine kontextuelle Element automatisch in ein Suchkriterium um. Eine Steuereinheit für ein Erstellungsprogramm für externe Datenabfragen führt automatisch eine externe Suchabfrage auf der Grundlage der Suchkriterien aus. Eine Datenverschmelzungs-Steuereinheit verschmilzt automatisch das mindestens eine kontextuelle Element, das aus dem mindestens einen auf einen Benutzer ausgerichteten Ereignis erzeugt wird, mit externen Suchergebnissen, die aus der externen Suchabfrage und dem Datenfluss einer anfänglichen Abfrage erzeugt werden, um eine Datei mit verschmolzenen Daten zu erzeugen.

    IMPROVING CODE BREAKAGE DETECTION USING SOURCE CODE HISTORY BACKGROUND

    公开(公告)号:CA2719782A1

    公开(公告)日:2011-01-19

    申请号:CA2719782

    申请日:2010-10-29

    Applicant: IBM CANADA

    Abstract: An illustrative embodiment of a computer-implemented process for detecting code breakage using source code change history receives a point in time within an identified range of time to form a selected time, receives a set of source files associated with the a selected time, receives a set of history files associated with the received set of source files and initializes a workspace in a sandbox using the set of source files and the set of history files. The computer--implemented process incrementally executes the received set of source files from the selected time forward, determines whether a code break occurs and responsive to a determination that the code break occurs, presents a list of files. The computer-implemented process receives an identified file from the list of files to form a suspect file, opens a file compare tool for the suspect file and receives a correction for the suspect file.

Patent Agency Ranking