Abstract:
A method for region guided and change tolerant fast shortest path determination and graph preprocessing for network management and control. In an embodiment, a method includes partitioning, by a network component, a plurality of network nodes into a plurality of regions, each network node belonging to one of the regions; identifying, by the network component, border nodes for each region, each border node in a region connecting to at least one border node in a connecting region; determining, by the network component, intervals between regions according to the border nodes, each interval comprising a minimum distance and a maximum distance between two regions; determining, by the network component, a path from a source node to a target node according to the intervals.
Abstract:
A system for providing bound checking to insure memory accessed, including indirect object access through pointers, is within a range of defined object bounds is disclosed herein. Embodiments of the present disclosure provide hardware and software methodology for bound checking, where bound checking is performed in hardware and in parallel with the execution of the memory accesses using dedicated hardware. There is reduced overhead associated with the enforcement of bound checking, and hardware is modified to include new registers and/or instructions for bound checking support. An exception is raised when an out of bound violation is detected. According to some embodiments, a compiler extracts bound information from the respective programming language (e.g. C/C++, Java) and generates tables with special APIs known to the hardware that enables both execution of the program and bound checking to be performed simultaneously.
Abstract translation:本文公开了一种用于提供绑定检查以确保所访问的存储器(包括通过指针的间接对象访问)的系统在限定的对象边界的范围内。 本公开的实施例提供用于绑定检查的硬件和软件方法,其中绑定检查在硬件中执行并且与使用专用硬件的存储器访问的执行并行。 与执行绑定检查相关联的开销减少,并且修改硬件以包括用于绑定检查支持的新的寄存器和/或指令。 当检测到超出限制的违规时会引发异常。 根据一些实施例,编译器从相应的编程语言(例如C / C ++,Java)中提取绑定信息,并生成具有硬件已知的特殊API的表,其使得能够同时执行程序的执行和绑定检查。
Abstract:
A method implemented in a data processing system comprising receiving an input/output (IO) write request from a processing thread to transfer data from a memory of the data processing system to an IO device, setting the memory as read-only memory to protect the data from overwrite before the data is transferred to the IO device, and sending, in response to the IO write request, a speculative IO write completion response to the processing thread to enable the processing thread to continue execution without waiting for the data to be transferred to the IO device.
Abstract:
Embodiments are provided for isolating Input/Output (I/O) execution by combining compiler and Operating System (OS) techniques. The embodiments include dedicating selected cores, in multicore or many-core processors, as I/O execution cores, and applying compiler-based analysis to classify I/O regions of program source codes so that the OS can schedule such regions onto the designated I/O cores. During the compilation of a program source code, each I/O operation region of the program source code is identified. During the execution of the compiled program source code, each I/O operation region is scheduled for execution on a preselected I/O core. The other regions of the compiled program source code are scheduled for execution on other cores.
Abstract:
A method implemented by a network element (NE) in a distributed system, the method comprising tracing an execution of a program in the distributed system to produce a record of the execution of the program, wherein the record indicates states of shared resources at various times during the execution of the program, identifying a vulnerable operation that occurred during the program execution based on the record, wherein the record indicates that a first shared resource of the shared resources is in a flawed state after a node that caused the first shared resource to be in the flawed state crashed, and determining that the vulnerable operation results in a time of fault (TOF) bug based on performing a fault-tolerance mechanism.
Abstract:
Described herein are systems and methods for distributed concurrency (DC) bug detection. The method includes identifying a plurality of nodes in a distributed computing cluster; identifying a plurality of messages to be transmitted during execution of an application by the distributed computing cluster; determining a set of orderings of the plurality of messages for DC bug detection, the set of orderings determined based upon the plurality of nodes and the plurality of messages; removing a subset of the orderings from the set of orderings based upon one or more of a state symmetry algorithm, a disjoint-update independence algorithm, or a zero-crash-impact reordering algorithm; and performing DC bug detection testing using the set of orderings after the subset of the orderings is removed from the set of orderings.
Abstract:
A method for detecting distributed concurrency errors in a distributed cloud computing system includes tracing operations that access objects in functions involving inter-process messaging, applying a set of happens-before rules to the traced operations. Analyzing the traced operations to identify concurrent operations that access a common object to generate a list of potential distributed concurrency errors (DCbugs). Pruning the list of DCbugs to remove DCbugs having only local effect and that do not generate run-time errors.
Abstract:
A method of controlling an electronic device is provided, comprising receiving a selection contact within a first icon region of a first icon displayed on a pressure-sensing display screen of the electronic device, displaying on the pressure-sensing display screen a second set of icons related to the first icon, detecting that the selection contact uninterruptedly moves to a second icon of the second set of icons and selects the second icon, displaying on the pressure-sensing display screen a third set of icons related to the second icon, detecting that the selection contact uninterruptedly moves to a third icon of the third set of icons and selects the third icon, and initiating an application or function associated with the third icon.
Abstract:
A proxy processing device and associated method are provided to receive control signals from a manager that are based on user input received by the manager. Further, the control signals are sent to an agent for controlling one or more aspects of a collection of data from at least one node and a communication of the data to a destination via at least one channel. The collection of the data and the communication of the data is performed by the agent utilizing a plurality of software components that each customizes the one or more aspects of the collection of the data and the communication of the data.
Abstract:
The disclosure relates to technology for establishing communication between a remote device and a virtual machine on a computing node of the cloud-based services via the distributed network. The cloud-based services include multiple operating systems and one or more applications. In response to receiving an instruction from the remote device the virtual machine is accessed, where the virtual machine is associated with at least one of a user of the remote device and the remote device. When directed by an instruction from the remote device, the virtual machine identifies one of the operating systems in which to execute the one or more applications and transmits results, based on execution of the one or more applications by the virtual machine, to the remote device via the distributed network.