Abstract:
APIs to test a device are described. In one or more implementations, a device includes a housing, one or more sensors supported by the housing, and one or more modules disposed within the housing that are implemented at least partially in hardware. The one or more modules are configured to process inputs detected using the one or more sensors and expose one or more application programming interfaces to a robot to cause the robot to perform one or more operations that are detectable by the one or more sensors, the one or more operations usable to test detection performed by the one or more sensors and the processing of the inputs performed by the one or more modules.
Abstract:
Customizing a test instrument. A plurality of pairs of code modules may be provided. Each pair of code modules may include a first code module having program instructions for execution by a processor of the test instrument and a second code module for implementation on a programmable hardware element of the test instrument. For each pair of code modules, the first code module and the second code module may collectively implement a function in the test instrument. User input may be received specifying modification of a second code module of at least one of the plurality of pairs of code modules. Accordingly, a hardware description may be generated for the programmable hardware element of the test instrument based on the modified second code module.
Abstract:
In an exemplary embodiment, a system includes a memory and a processor communicatively coupled to the memory. The processor is operable to receive a first indication that a first action keyword is selected from a plurality of action keywords and determine whether a first object requirement is associated with the first action keyword. The processor is further operable to retrieve a plurality of action objects and receive a second indication that a first action object is selected. The processor is also operable to receive a third indication that a second action keyword is selected and determine whether a first input parameter is associated with the second action keyword. The processor may also be operable to request a first user input, receive the first user input, generate a test case file comprising the first action keyword and the second action keyword, and associate the test case file with an application.
Abstract:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting obfuscated malware. In one aspect, a method includes identifying call instructions in a binary executable; executing the call instruction; executing instructions subsequent to a target of the call instruction; determining that an address identified by a stack pointer is different from the return address; in response to the determination that the address is different, determining if there is a non-obfuscation signal; if there is a non-obfuscation signal, identifying the call instruction as a non-obfuscated call instruction; if there is not a non-obfuscation signal, identifying the call instruction as a possibly obfuscated call instruction; determining whether the call instructions identified as possibly obfuscated call instructions exceeds a threshold; in response to the determination that the call instructions identified as possibly obfuscated call instructions exceeds the threshold, identifying the executable as an obfuscated executable.
Abstract:
For automatic problem diagnosis, a data collector module collects log data comprising code sets from a plurality of components in a data processing system. An analysis module translates the log data into at least one predefined symptom. Each symptom is associated with at least one code set of the log data. The analysis module selects from a knowledge base at least one problem that includes each symptom. The analysis module further calculates an influence factor for each problem, and ranks each problem from most likely to least likely based on the influence factor of the problem.
Abstract:
A memory-leak source in a data structure can be identified by counting insertions into the data structure and deletions from the data structure for locations in the execution path of a computer program. These insertion and deletion values can be used to identify at least one location as a memory-leak source that corresponds to an imbalance between insertions and deletions during the execution of the computer program.
Abstract:
A keyboard automatic test method is provided. A keyboard test unit first outputs a key test command to a keyboard controller. The key test command represents a trigger element of a keyboard is triggered. The keyboard controller generates a corresponding code corresponding to the trigger element. The keyboard test unit then determines whether a relationship between the corresponding code and the trigger element is correct.
Abstract:
An Accelerated Processing Unit (APU) comprising a central processing unit (CPU) core portion and a graphics processing unit (GPU) core portion coupled to the CPU core portion. The GPU core portion includes a GPU core and a dedicated GPU debugging core, the dedicated GPU debugging core enabling performance of GPU centric debug functions.
Abstract:
A debug system includes a debug device and a computer. The debug device includes an SPI reading and writing module, a first control module, a detecting module, and a signal receiving and transmitting module. The computer includes a second control module and a display module. The SPI reading and writing module is connected to an SPI device. The second control module sends an inputted write command to the first control module. The first control module writes data to the SPI device according to the inputted write command. The detecting module sends a fail signal to the first control module after detecting that the data is not written to the SPI device and a written times of the data is greater than a predetermined times. The first control module sends the fail signal to the second control module. The second control module displays the fail signal on the display module.
Abstract:
In one embodiment, the invention comprises partial fault tolerant stream processing applications. One embodiment of a method for implementing partial fault tolerance in a stream processing application comprising a plurality of stream operators includes: defining a quality score function that expresses how well the application is performing quantitatively, injecting a fault into at least one of the plurality of operators, assessing an impact of the fault on the quality score function, and selecting at least one partial fault-tolerant technique for implementation in the application based on the quantitative metric-driven assessment.