Patents by Inventor Asaf Dafner
Asaf Dafner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11513794Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.Type: GrantFiled: December 8, 2014Date of Patent: November 29, 2022Assignee: BMC Software Israel LtdInventors: Shiri Semo Judelman, Asaf Dafner, Eyal Koren
-
Patent number: 11048616Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.Type: GrantFiled: March 6, 2015Date of Patent: June 29, 2021Assignee: BMC Software, Inc.Inventors: Gilad Arbel Komissar, Eyal Koren, Asaf Dafner
-
Patent number: 10339031Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: GrantFiled: September 11, 2017Date of Patent: July 2, 2019Assignee: BMC Software Israel Ltd.Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Publication number: 20180024910Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: ApplicationFiled: September 11, 2017Publication date: January 25, 2018Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Patent number: 9767007Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: GrantFiled: October 20, 2016Date of Patent: September 19, 2017Assignee: Identify Software Ltd. (IL)Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Publication number: 20170039127Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: ApplicationFiled: October 20, 2016Publication date: February 9, 2017Inventors: Eyal KOREN, Asaf DAFNER, Shiri Semo JUDELMAN
-
Patent number: 9483391Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: GrantFiled: January 21, 2016Date of Patent: November 1, 2016Assignee: Identify Software Ltd.Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Patent number: 9436588Abstract: According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: GrantFiled: September 28, 2012Date of Patent: September 6, 2016Assignee: Identify Software Ltd. (IL)Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Publication number: 20160140029Abstract: According to one general aspect, a method may include monitoring the execution of at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: ApplicationFiled: January 21, 2016Publication date: May 19, 2016Inventors: Eyal KOREN, Asaf DAFNER, Shiri Semo JUDELMAN
-
Patent number: 9250924Abstract: According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: GrantFiled: September 28, 2012Date of Patent: February 2, 2016Assignee: IDENTIFY SOFTWARE LTD.Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Publication number: 20150186644Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.Type: ApplicationFiled: March 6, 2015Publication date: July 2, 2015Inventors: Gilad Arbel KOMISSAR, Eyal KOREN, Asaf DAFNER
-
Publication number: 20150160947Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.Type: ApplicationFiled: December 8, 2014Publication date: June 11, 2015Inventors: Shiri Semo JUDELMAN, Asaf DAFNER, Eyal KOREN
-
Patent number: 9003233Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.Type: GrantFiled: December 31, 2012Date of Patent: April 7, 2015Assignee: BMC Software, Inc.Inventors: Gilad Arbel Komissar, Eyal Koren, Asaf Dafner
-
Patent number: 8910127Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.Type: GrantFiled: September 20, 2012Date of Patent: December 9, 2014Assignee: Identify Software Ltd. (IL)Inventors: Shiri Semo Judelman, Asaf Dafner, Eyal Koren
-
Publication number: 20140189438Abstract: In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval.Type: ApplicationFiled: December 31, 2012Publication date: July 3, 2014Applicant: BMC SOFTWARE, INC.Inventors: Gilad Arbel, Eyal Koren, Asaf Dafner
-
Patent number: 8762952Abstract: A technique assists in resolving problems by aiding in the determination of the root cause of the problem. The technique allows recording of information about methods of executing applications that encounter problems, even if the method was not previously marked for recording. Upon detection of a problem, the method and all other methods on the current execution stack may be marked for retrospective recording. When each method exits, information about entry conditions and exit conditions of each method may be recorded for presentation to a user of the application for problem resolution.Type: GrantFiled: December 14, 2010Date of Patent: June 24, 2014Assignee: BMC Software, Inc.Inventors: Asaf Dafner, Sigal Korczyn, Yelena Langleyben, Shiri Semo Judelman
-
Patent number: 8745598Abstract: A technique provides a hook that executes prior to a software application that is invisible to the software application. In an object-oriented execution environment, an imposter main class is loaded instead of the application main class. The imposter main class then manipulates the object-oriented execution environment to load the application main class without requiring knowledge of the application main class other than its name, and without requiring a change to the command line for the application.Type: GrantFiled: December 14, 2010Date of Patent: June 3, 2014Assignee: BMC Software, Inc.Inventors: Eyal Koren, Golan Hallel, Asaf Dafner
-
Publication number: 20140096114Abstract: According to one general aspect, a method may include monitoring the execution or at least a portion of a software application. The method may also include collecting subroutine call information regarding a plurality of subroutine calls included by the portion of the software application, wherein one or more of the subroutine calls is selected for detailed data recording. The method may further include pruning, as the software application is being executed, a subroutine call tree to include only the subroutine calls selected for detailed data recording and one or more parent subroutine calls of each subroutine calls selected for detailed data recording.Type: ApplicationFiled: September 28, 2012Publication date: April 3, 2014Applicant: IDENTIFY SOFTWARE LTD. (IL)Inventors: Eyal Koren, Asaf Dafner, Shiri Semo Judelman
-
Publication number: 20140082596Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.Type: ApplicationFiled: September 20, 2012Publication date: March 20, 2014Applicant: IDENTIFY SOFTWARE LTD. (IL)Inventors: Shiri Semo Judelman, Asaf Dafner, Eyal Koren
-
Publication number: 20120151284Abstract: A technique assists in resolving problems by aiding in the determination of the root cause of the problem. The technique allows recording of information about methods of executing applications that encounter problems, even if the method was not previously marked for recording. Upon detection of a problem, the method and all other methods on the current execution stack may be marked for retrospective recording. When each method exits, information about entry conditions and exit conditions of each method may be recorded for presentation to a user of the application for problem resolution.Type: ApplicationFiled: December 14, 2010Publication date: June 14, 2012Applicant: BMC SOFTWARE, INC.Inventors: Asaf Dafner, Sigal Korczyn, Yelena Langleyben, Shiri Semo Judelman