Abstract:
Problem To cause a system to operate efficiently regardless of the time of day. Solving Means There is provided a system including multiple application servers for accessing shared data and a centralized control unit for centrally controlling a lock applied to the shared data by each of the application servers. Each of the application servers includes a distributed control unit for controlling a lock applied to the shared data by the application server and a selection unit for selecting any one of distributed mode in which a lock is acquired from the distributed control unit and centralized mode in which a lock is acquired from the centralized control unit.
Abstract:
PROBLEM TO BE SOLVED: To provide a new composite locking method not to lower the processing speed of a high frequency path. SOLUTION: When no thread to lock an object exists 1, zero is stored in both of a field for lock and a competitive bit. After that, the object is locked (light weight lock) by a certain thread, an identifier of the thread is stored in the field for lock 2. If no lock is attempted by other threads before the lock is released by the thread with the thread identifier, SPECIAL is stored in the field for lock 5 and the processing is returned to 1. When the lock is attempted by other threads before the lock is released, competition in the light weight lock is generated, therefore, the competitive bit is established to record the competition 3. After that, the competitive bit is cleared when the lock is transferred to heavy weight lock 4 and the processing of 4 is transferred to 1, if possible.
Abstract:
PROBLEM TO BE SOLVED: To execute the start of a program at high speed by loading an object from the route object of plural objects into a main memory and removing the specified object from a load object. SOLUTION: When loading an object orientated program into the main memory, a CPU 1 generates a main memory managing list by loading the route object from an HDD 5 to a main memory 3. By referring to this list, it is discriminated whether the object to be loaded is an object to be accessed from only one other object or not. In this case, when the object is discriminated as the object to be accessed only from one other object, the object to be accessed from only one other object and the object to be accessed from the object to be accessed only from one other object are removed from the load object and the main memory managing list is updated.
Abstract:
PROBLEM TO BE SOLVED: To provide a technique for acquiring information on call context comprehensively at a low cost.SOLUTION: Suitably, an 8-bit ID is allocated to each call site, and call site IDs which are most recent and in four stages as preferable number are held as a call history of 32-bit data for each thread and are used as context information. For calling a method, a call history in a current frame is shifted by 8 bits to the left, and the call site ID of the call side is put in the low-order 8 bits and is stacked in a new frame. For returning from the method, the frame is put back to obtain the value of the original call history. For virtual calling, information of the call history is recorded in a profile table at a calling point in addition to determined jump destination information and the number of times of calling. This profile table is used in JIT compilation to specify a method to be inlined.
Abstract:
PROBLEM TO BE SOLVED: To provide a character string operation method for reducing the storage capacity of a storage part, a program, and an information processor. SOLUTION: The information processor 1 for operating character strings is provided with: a storage part 30 for storing a character string group including a plurality of character strings each of which is constituted of a plurality of character data; a reference part 41 for referring to a specific character string from the character string group; a character data detection part 422 for detecting character data which are not referred to as the specific character string from the character string group; and a character data deletion part 423 for deleting the character data detected from the character string group. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To optimize a program for handling character strings. SOLUTION: This compiler device for optimizing the program for handling character strings comprises an addition instruction detection part for detecting an addition instruction for adding a character string to a character string variable storing a character string in the program; a storage code generation part for generating, in stead of each of a plurality of addition instructions for adding a character string to the same character string variable, which is detected by the addition instruction detection part, a storage code for storing data of an additional character string to be added according to the addition instruction concerned; and an addition code generation part for generating, in a position to be executed prior to an instruction referring to the character string variable in the program, an additional code for adding each of a plurality of additional character strings to the character string variable. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To speed up acquisition of competitive resources while securing the exclusivity of the acquisition of the competitive resources when only a specific information processing part frequently acquires and releases the competitive resources. SOLUTION: The exclusive control unit 10 for allowing an information processing part to acquire the competitive resources exclusively of other information processing parts is equipped with a plurality of non-priority information processing parts 160 for acquiring exclusively one another non-priority exclusive rights which indicate a candidate of acquiring the competitive resources 50 by first processing and a priority information processing part 150 for acquiring the competitive resources 50 exclusively between itself and the non-priority information processing part 160 acquiring the non-priority exclusivity by second processing shorter in processing time than the first processing. COPYRIGHT: (C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide an object state representing method which is fast and whose influence to the performance efficiency of a processing system is very small. SOLUTION: This computer system on which an object oriented programming language is mounted is provided with an object 10, a model information block 20 and a class structure 30 as object run-time representation in the mounted programming language, the object 10 is provided with a header 11 including a pointer to the block 20, the block 20 is provided with a class pointer indicating the structure 30, a plurality of class pointers of the block 20 are provided in accordance with the number of states of the object, an individual class pointer is made to correspond to the individual state of the object 10, and the pointer included in the header 11 of the object 10 represents the state of the object by individually indicating the plurality of class pointers by using several low- order bits.
Abstract:
PROBLEM TO BE SOLVED: To improve memory efficiency and to transmit a message at a high speed. SOLUTION: By a specified receiver object, the class object C is obtained 110. An instance variable for indicating the dispatch chart of the class is provided in the class object C and the dispatch chart D is obtained 120. From a code which is the argument of a vmicall instruction, the method M of an address stored in the order of the code of the dispatch chart is taken out 130. A card which is the other argument of the vmicall instruction and a tag number stored in the method M taken out in a step 130 are compared 140. When the card and the tag number do not match, a selector non-matching handier is called and a correct method to be called is searched 150. Then, the method M is activated 160.
Abstract:
PROBLEM TO BE SOLVED: To increase variation in object hash codes in order to reduce conflicts between object hash codes, and enable object hash codes to be added to pinned objects.SOLUTION: A per-heap seed is provided in each heap area in which an object is placed in order to generate an object hash code, and at least an object address and the per-heap seed are combined to generate the object hash code. Further, it is determined whether an object hash code can be added to an object in a "01" state during GC. If it can be added, the object hash code is calculated and added to the object, and the state is changed to "10". If it cannot be added, the object hash code is calculated, placed outside the heap, and associated with the object, and the state is changed to "11", which represents a pinned object.