-
公开(公告)号:CA2687672A1
公开(公告)日:2011-06-07
申请号:CA2687672
申请日:2009-12-07
Applicant: IBM CANADA
Inventor: MOSTAFA MOHAMMED , TESSIER JOSHUA PETER , HILLIS LINDA
Abstract: An illustrative embodiment of a computer-implemented process for intelligent call graph generation receives a request to build a call graph to form a received request, receives a source code associated with the received request, receives configuration options, and determines whether an entry point for the call graph is identified in the source code. Responsive to a determination that the entry point for the call graph is identified, analyzes dependencies in the source code, and identifies exclusions in the source code using the analyzed dependencies to form identified exclusions. The computer-implemented process determines whether analysis required to build a compact call graph is complete and responsive to a determination that analysis required to build a compact call graph is complete, generates the compact call graph without the identified exclusions.
-
公开(公告)号:CA2684348A1
公开(公告)日:2011-05-04
申请号:CA2684348
申请日:2009-11-04
Applicant: IBM CANADA
Inventor: TESSIER JOSHUA PETER , MOSTAFA MOHAMMED , GUTZ STEVEN JOHN EARL
IPC: G06F9/45
Abstract: An illustrative embodiment provides a computer-implemented process for algorithm complexity identification through inter-procedural data flow analysis receives a call graph to form a set of received nodes in a static analysis framework, identifies a parent node in the set of received nodes to form an identified parent, traverses the call graph from the identified parent node to a node to identify a function within the node to form an identified function. Each identified function is analyzed to form a complexity value in a set of complexity values. Responsive to a determination that node analysis is complete, and responsive to a determination that path analysis is complete, determines whether path analysis for the identified parent is complete. Responsive to a determination that path analysis for the identified parent is complete, sum the complexity values in the set of complexity values for the identified parent and return the complexity value for the identified parent to a requester.
-
公开(公告)号:DE112018005424T5
公开(公告)日:2020-07-30
申请号:DE112018005424
申请日:2018-11-08
Applicant: IBM
Inventor: LUO LIN , SUN CHANGYING , MOSTAFA MOHAMMED , WILLS GRAHAM
IPC: G06F16/9535 , G06F16/248
Abstract: Ein Big-Data-Analysesystem enthält eine Ereignisüberwachungs-Steuereinheit, die aus einem Datenfluss einer anfänglichen digitalen Abfrage ein auf einen Benutzer ausgerichtetes Ereignis erkennt. Eine Ereignisumwandlungs-Steuereinheit ermittelt mindestens ein kontextuelles Element, das dem mindestens einen auf einen Benutzer ausgerichteten Ereignis zugehörig ist, und wandelt das mindestens eine kontextuelle Element automatisch in ein Suchkriterium um. Eine Steuereinheit für ein Erstellungsprogramm für externe Datenabfragen führt automatisch eine externe Suchabfrage auf der Grundlage der Suchkriterien aus. Eine Datenverschmelzungs-Steuereinheit verschmilzt automatisch das mindestens eine kontextuelle Element, das aus dem mindestens einen auf einen Benutzer ausgerichteten Ereignis erzeugt wird, mit externen Suchergebnissen, die aus der externen Suchabfrage und dem Datenfluss einer anfänglichen Abfrage erzeugt werden, um eine Datei mit verschmolzenen Daten zu erzeugen.
-
公开(公告)号:CA2719782A1
公开(公告)日:2011-01-19
申请号:CA2719782
申请日:2010-10-29
Applicant: IBM CANADA
Inventor: GUTZ STEVEN J E , MACDOUGALL THOMAS A , MOSTAFA MOHAMMED
Abstract: An illustrative embodiment of a computer-implemented process for detecting code breakage using source code change history receives a point in time within an identified range of time to form a selected time, receives a set of source files associated with the a selected time, receives a set of history files associated with the received set of source files and initializes a workspace in a sandbox using the set of source files and the set of history files. The computer--implemented process incrementally executes the received set of source files from the selected time forward, determines whether a code break occurs and responsive to a determination that the code break occurs, presents a list of files. The computer-implemented process receives an identified file from the list of files to form a suspect file, opens a file compare tool for the suspect file and receives a correction for the suspect file.
-
-
-