System and method for scheduling the execution of model components using model events

    公开(公告)号:US10157246B2

    公开(公告)日:2018-12-18

    申请号:US14866151

    申请日:2015-09-25

    Abstract: A method of specifying and configuring a causal relationship between the dynamics of a graphical model and the execution of components of the model is disclosed. Model component execution is tied to the occurrence of model events. Model events are first defined in the modeling environment. The occurrence of conditions in the model specified in the definition of the event causes the event to be “posted”. Model components that have been associated with the occurrence of the event “receive” the notice of the posting of the event and then execute. Random components within a subsystem may be designated to execute upon the occurrence of an event, as may non-contiguous components within a model. The association between model events and component execution may be specified without drawing graphical indicators connecting components in the view of the model.

    Code continuity preservation during automatic code generation

    公开(公告)号:US09891894B1

    公开(公告)日:2018-02-13

    申请号:US13966979

    申请日:2013-08-14

    CPC classification number: G06F8/35 G06F8/443 G06F8/71

    Abstract: A device may receive a model for code generation. The device may determine to preserve continuity with a first generated code associated with the model. The device may receive, based on determining to preserve continuity, a first generation record associated with the first generated code. The first generation record may include information associated with generation of the first code. The device may generate second code based on the model and the first generation record. The device may create a second generation record based on the second generated code. The second generation record may include information associated with generation of the second code. The device may provide the second generated code.

    SYSTEMS AND METHODS FOR ANALYZING VIOLATIONS OF CODING RULES

    公开(公告)号:US20170315903A1

    公开(公告)日:2017-11-02

    申请号:US15139670

    申请日:2016-04-27

    Abstract: Systems and methods automatically detect violations of coding rules of a coding standard in computer programming code. The systems and methods may mark the locations in the code where the violations are found. The coding rules may be mapped to code verification checks that check for undesired runtime behavior in the code. The systems and methods may identify the code verification check mapped to a given violation detected in the code. The systems and methods may apply that check to the code. If the check proves that the undesired runtime behavior will not occur, the violation may be marked as justified. If the check proves that the undesired runtime behavior will occur, the violation may be marked as not justified.

    Code generation for using an element in a first model to call a portion of a second model
    14.
    发明授权
    Code generation for using an element in a first model to call a portion of a second model 有权
    用于在第一模型中使用元素来调用第二模型的一部分的代码生成

    公开(公告)号:US09536023B2

    公开(公告)日:2017-01-03

    申请号:US14713508

    申请日:2015-05-15

    CPC classification number: G06F17/5009 G06F8/34 G06F8/35 G06F9/541 G06F17/15

    Abstract: A device may generate code for a caller element of a first graphical model and a called element of a second graphical model by generating a first function and a second function. The first function may represent an interface between the caller element and the called element. The first function may include a first input argument corresponding to an input variable and a first output argument corresponding to an output variable. The second function may represent an underlying function of the called element. The underlying function may include the input variable passed from the caller element and the output variable. The underlying function may further include an internal input variable and an internal output variable. The second function may include second input arguments corresponding to the input variable and the internal input variable, and may include second output arguments corresponding to the output variable and the internal output variables.

    Abstract translation: 设备可以通过生成第一功能和第二功能来生成第一图形模型的调用者元素和第二图形模型的被调用元素的代码。 第一个函数可以表示调用者元素和被调用元素之间的接口。 第一功能可以包括对应于输入变量的第一输入参数和对应于输出变量的第一输出参数。 第二个函数可以表示被调用元素的基本函数。 底层函数可能包括从调用者元素传递的输入变量和输出变量。 底层功能还可以包括内部输入变量和内部输出变量。 第二功能可以包括对应于输入变量和内部输入变量的第二输入参数,并且可以包括对应于输出变量和内部输出变量的第二输出参数。

    VERIFICATION OF COMPUTER-EXECUTABLE CODE GENERATED FROM A MODEL
    16.
    发明申请
    VERIFICATION OF COMPUTER-EXECUTABLE CODE GENERATED FROM A MODEL 有权
    从模型生成的计算机可执行代码的验证

    公开(公告)号:US20140380269A1

    公开(公告)日:2014-12-25

    申请号:US14475302

    申请日:2014-09-02

    CPC classification number: G06F8/35 G06F11/3604

    Abstract: In an embodiment, a model is sliced into a plurality of slices. A slice in the plurality of slices is selected. A portion of code, that corresponds to the selected slice, is identified from code generated from the model. The identified code is verified to be equivalent to the selected slice. Equivalence may include equivalent functionality, equivalent data types, equivalent performance, and/or other forms of equivalence between the selected slice and the identified generated code.

    Abstract translation: 在一个实施例中,将模型切成多个切片。 选择多个切片中的切片。 根据从模型生成的代码来识别对应于所选切片的一部分代码。 所识别的代码被验证为等同于所选择的切片。 等效性可以包括等效的功能,等效的数据类型,等效的性能,和/或所选切片和所识别的生成的代码之间的等价的其他形式。

    Systems and methods for aggregating implicit and explicit event code of executable models

    公开(公告)号:US10585648B2

    公开(公告)日:2020-03-10

    申请号:US15392682

    申请日:2016-12-28

    Abstract: Systems and methods may aggregate and organize implicit and explicit initialization, reset, and termination operations defined throughout the hierarchy of an executable. The systems and methods may analyze the model and identify implicit and explicit initialization, reset, and termination operations defined at various hierarchical levels. The systems and methods may aggregate the implicit and explicit initialization, reset, and termination operations into an initialize callable unit, a reset callable unit, and a termination callable unit. The systems and methods may apply optimizations to the callable units, and resolve conflicts. The systems and methods may define a single entry point for each of the initialize, reset, and termination callable units.

    Systems and methods for analyzing violations of coding rules

    公开(公告)号:US10423518B2

    公开(公告)日:2019-09-24

    申请号:US15139670

    申请日:2016-04-27

    Abstract: Systems and methods automatically detect violations of coding rules of a coding standard in computer programming code. The systems and methods may mark the locations in the code where the violations are found. The coding rules may be mapped to code verification checks that check for undesired runtime behavior in the code. The systems and methods may identify the code verification check mapped to a given violation detected in the code. The systems and methods may apply that check to the code. If the check proves that the undesired runtime behavior will not occur, the violation may be marked as justified. If the check proves that the undesired runtime behavior will occur, the violation may be marked as not justified.

    Optimization identification
    20.
    发明授权

    公开(公告)号:US09934004B1

    公开(公告)日:2018-04-03

    申请号:US14230191

    申请日:2014-03-31

    Abstract: A computer readable medium including executable instructions that when executed perform a method for validating an optimization in generated code using an executable constraints document is provided. The medium can include instructions for relating an assumption to the optimization during code generation. The medium can include instructions for generating the executable constraints document during the code generation, the executable constraints document including information about the relating; and the medium can include instructions for executing the constraints document when the validating is performed, the validating including performing an operation based on a validation result produced by the validating, where the operation includes displaying the validation result to a user, storing the validation result, sending the validation result to a destination, or modifying the generated code.

Patent Agency Ranking