Patents by Inventor Michelle A. Schlicht
Michelle A. Schlicht has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160179479Abstract: The present disclosure relates to maintaining assertions in an integrated development environment (IDE) tool. According to one embodiment, the IDE receives a request to add an assertion at a specified location within source code of an application from a user interacting with an integrated development environment (IDE) tool. The source code is stored in a first file associated with a development project. The IDE tool receives a definition for the assertion and stores the definition for the assertion in a second file associated with the development project. The IDE tool creates an association in the development project between the source code of the application and the assertion.Type: ApplicationFiled: December 19, 2014Publication date: June 23, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Cary L. BATES, Lee HELGESON, Justin K. KING, Michelle A. SCHLICHT
-
Publication number: 20160179507Abstract: The present disclosure relates to managing assertions in program source code in an integrated development environment (IDE) tool. According to one embodiment, the IDE tool receives a request to execute an application built from source code of a development project from a user interacting with an integrated development environment (IDE) tool. The IDE tool identifies changes to one or more of the source code of the development project from a previous version of the one or more source code. Based on the changes to the source code, the IDE tool selectively identifies one or more assertions to insert in the source code based on the identified changes.Type: ApplicationFiled: December 18, 2014Publication date: June 23, 2016Inventors: Cary L. BATES, Lee HELGESON, Justin K. KING, Michelle A. SCHLICHT
-
Publication number: 20160179503Abstract: The present disclosure relates to maintaining assertions in source code components of a development project by an integrated development environment (IDE) tool. According to one embodiment, a request is received to build a software application generated from the development project. Based on prior executions of the software application, resource requirements for each of one or more assertions included in the prior executions of the software application are identified. One or more of the assertions based on the identified resource requirements are selectively inserted in the source code components. The source code components of the development project are compiled to build the software application.Type: ApplicationFiled: December 18, 2014Publication date: June 23, 2016Inventors: Cary L. BATES, Lee HELGESON, Justin K. KING, Michelle A. SCHLICHT
-
Publication number: 20160179478Abstract: The present disclosure relates to maintaining assertions in source code components of a development project by an integrated development environment (IDE) tool. According to one embodiment, a request is received to build a software application generated from the development project. Based on prior executions of the software application, resource requirements for each of one or more assertions included in the prior executions of the software application are identified. One or more of the assertions based on the identified resource requirements are selectively inserted in the source code components. The source code components of the development project are compiled to build the software application.Type: ApplicationFiled: December 19, 2014Publication date: June 23, 2016Inventors: Cary L. BATES, Lee HELGESON, Justin K. KING, Michelle A. SCHLICHT
-
Publication number: 20160179477Abstract: The present disclosure relates to maintaining assertions in an integrated development environment (IDE) tool. According to one embodiment, the IDE receives a request to add an assertion at a specified location within source code of an application from a user interacting with an integrated development environment (IDE) tool. The source code is stored in a first file associated with a development project. The IDE tool receives a definition for the assertion and stores the definition for the assertion in a second file associated with the development project. The IDE tool creates an association in the development project between the source code of the application and the assertion.Type: ApplicationFiled: December 18, 2014Publication date: June 23, 2016Inventors: Cary L. BATES, Lee HELGESON, Justin K. KING, Michelle A. SCHLICHT
-
Publication number: 20160170420Abstract: In an embodiment, a current internal corrosion level at a current time is read from an internal corrosion sensor that is internal to a computer. An internal corrosion difference is calculated between the current internal corrosion level and a previous internal corrosion level. Upon determining that the internal corrosion difference is more than a first threshold amount, a first action is performed that decreases an internal temperature of the computer. In a further embodiment, upon determining that the internal corrosion difference is less than a second threshold amount, a second action is performed that allows the internal temperature of the computer to increase.Type: ApplicationFiled: February 11, 2016Publication date: June 16, 2016Inventors: Cary L. Bates, Justin K. King, Lee Nee Helgeson, Michelle A. Schlicht
-
Patent number: 9367478Abstract: A method for controlling access to a memory of a computer system configured with at least one logical partition may include receiving a first request to map a first page of the memory, the request identifying a first requester. A first logical partition associated with the first page may be determined. It may be determined that an attribute of the first logical partition limits access to individual pages of the first logical partition to a single requester, and that the first page is available to be mapped to a requester. The first page may be mapped to the first requester and a flag indicating that the first page is unavailable for an additional mapping may be set. The first request may be from a device driver on behalf of an input/output adapter, as the first requester, to use the first page in a direct memory access transfer.Type: GrantFiled: May 20, 2014Date of Patent: June 14, 2016Assignee: International Business Machines CorporationInventors: Cary L. Bates, Lee N. Helgeson, Justin K. King, Michelle A. Schlicht
-
Patent number: 9361176Abstract: An apparatus and method detect the use of stale data values due to weak consistency between parallel threads on a computer system. A consistency error detection mechanism uses object code injection to build a consistency error detection table during the operation of an application. When the application is paused, the consistency error detection mechanism uses the consistency error detection table to detect consistency errors where stale data is used by the application. The consistency error detection mechanism alerts the user/programmer to the consistency errors in the application program.Type: GrantFiled: June 25, 2014Date of Patent: June 7, 2016Assignee: International Business Machines CorporationInventors: Cary L. Bates, Lee Helgeson, Justin K. King, Michelle A. Schlicht
-
Publication number: 20160124840Abstract: A method for identifying code segments and associated software developers in a software development environment is disclosed. A software development tool detects a memory error in a first code segment. The software development tool associates the memory error with a first software developer that is associated with the first code segment. The software development tool identifies a second code segment related to the first code segment. The software development tool associates the memory error with a second software developer that is associated with the second code segment.Type: ApplicationFiled: November 5, 2014Publication date: May 5, 2016Inventors: Cary L. Bates, Lee N. Helgeson, Justin K. King, Michelle A. Schlicht
-
Publication number: 20160124837Abstract: A method for identifying code segments and associated software developers in a software development environment is disclosed. A software development tool detects a memory error in a first code segment. The software development tool associates the memory error with a first software developer that is associated with the first code segment. The software development tool identifies a second code segment related to the first code segment. The software development tool associates the memory error with a second software developer that is associated with the second code segment.Type: ApplicationFiled: November 24, 2014Publication date: May 5, 2016Inventors: Cary L. Bates, Lee N. Helgeson, Justin K. King, Michelle A. Schlicht
-
Publication number: 20160103752Abstract: Methods to discover weak consistency errors in an application, by executing, by a debugger, a first thread of the application, by, determining that a first instruction in the first thread specifies to store a first value at a first memory address, setting a current value stored in the first memory address as an old value for the first memory address in a container for the first thread, executing the first instruction to store the first value at the first memory address, and setting the first value as a new value for the first memory address in the container for the first thread. The debugger then executes a second thread of the application, by restoring old values in the containers for all other threads and restoring a new value for each memory address specified in a container for the second thread to its respective memory address.Type: ApplicationFiled: December 11, 2014Publication date: April 14, 2016Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Cary L. BATES, Lee HELGESON, Justin K. KING, Michelle A. SCHLICHT
-
Publication number: 20160103751Abstract: Systems, methods, and computer program products to discover weak consistency errors in an application, by executing, by a debugger, a first thread of the application, by, determining that a first instruction in the first thread specifies to store a first value at a first memory address, setting a current value stored in the first memory address as an old value for the first memory address in a container for the first thread, executing the first instruction to store the first value at the first memory address, and setting the first value as a new value for the first memory address in the container for the first thread. The debugger then executes a second thread of the application, by restoring old values in the containers for all other threads and restoring a new value for each memory address specified in a container for the second thread to its respective memory address.Type: ApplicationFiled: October 9, 2014Publication date: April 14, 2016Inventors: Cary L. BATES, Lee HELGESON, Justin K. KING, Michelle A. SCHLICHT
-
Patent number: 9292023Abstract: In an embodiment, a current internal corrosion level at a current time is read from an internal corrosion sensor that is internal to a computer. An internal corrosion difference is calculated between the current internal corrosion level and a previous internal corrosion level. If the internal corrosion difference is more than a first threshold amount, a first action is performed that decreases an internal temperature of the computer.Type: GrantFiled: September 12, 2012Date of Patent: March 22, 2016Assignee: International Business Machines CorporationInventors: Cary L. Bates, Justin K. King, Lee Nee, Michelle A. Schlicht
-
Publication number: 20150378811Abstract: An apparatus and method detect the use of stale data values due to weak consistency between parallel threads on a computer system. A consistency error detection mechanism uses object code injection to build a consistency error detection table during the operation of an application. When the application is paused, the consistency error detection mechanism uses the consistency error detection table to detect consistency errors where stale data is used by the application. The consistency error detection mechanism alerts the user/programmer to the consistency errors in the application program.Type: ApplicationFiled: June 25, 2014Publication date: December 31, 2015Inventors: Cary L. Bates, Lee Helgeson, Justin K. King, Michelle A. Schlicht
-
Publication number: 20150378867Abstract: An apparatus and method detect the use of stale data values due to weak consistency between parallel threads on a computer system. A consistency error detection mechanism uses object code injection to build a consistency error detection table during the operation of an application. When the application is paused, the consistency error detection mechanism uses the consistency error detection table to detect consistency errors where stale data is used by the application. The consistency error detection mechanism alerts the user/programmer to the consistency errors in the application program.Type: ApplicationFiled: September 16, 2014Publication date: December 31, 2015Inventors: Cary L. Bates, Lee N. Helgeson, Justin K. King, Michelle A. Schlicht
-
Publication number: 20150339470Abstract: A system and computer implemented method for determining compromised passwords is disclosed. The method may include displaying, in a first set of positions, a set of entry keys of a device. The method may include collecting a first set of tracking data including the first set of positions for entry of a first password. The method may also include displaying the set of entry keys of the device in a second set of positions. The method may also include determining a second password based on the second set of positions and entry of the first password. The method may also include determining whether the second password was entered into the device.Type: ApplicationFiled: May 23, 2014Publication date: November 26, 2015Applicant: International Business Machines CorporationInventors: Cary L. Bates, Lee N. Helgeson, Justin K. King, Michelle A. Schlicht
-
Publication number: 20150309776Abstract: Computer program source code is represented by nodes in a control flow graph. A set of target nodes is identified, where each node in the set of target nodes includes at least one line of source code that defines a modification to a particular variable used in the computer program. A usage score relating to the variable is calculated for each target node. Each usage score is then recalculated based on the earlier scores and also based on the modifications to the variable that are defined by the lines of source code. Each recalculated score is compared to its corresponding earlier score, and if any score has changed, then the process repeats. Scores are recalculated based on the most recently calculated scores until the scores stop changing. The final scores may then be displayed.Type: ApplicationFiled: August 15, 2014Publication date: October 29, 2015Inventors: Cary L. Bates, Lee N. Helgeson, Justin K. King, Michelle A. Schlicht
-
Publication number: 20150309913Abstract: Computer program source code is represented by nodes in a control flow graph. A set of target nodes is identified, where each node in the set of target nodes includes at least one line of source code that defines a modification to a particular variable used in the computer program. A usage score relating to the variable is calculated for each target node. Each usage score is then recalculated based on the earlier scores and also based on the modifications to the variable that are defined by the lines of source code. Each recalculated score is compared to its corresponding earlier score, and if any score has changed, then the process repeats. Scores are recalculated based on the most recently calculated scores until the scores stop changing. The final scores may then be displayed.Type: ApplicationFiled: April 24, 2014Publication date: October 29, 2015Applicant: International Business Machines CorporationInventors: Cary L. Bates, Lee N. Helgeson, Justin K. King, Michelle A. Schlicht
-
Patent number: 9122796Abstract: A method for debugging a program having a plurality of threads includes identifying, for each thread, a target point at which the program terminated and a staging point previously executed in the thread. The method further includes executing each thread from the staging point to the target point and determining, for each thread, a staging time based upon the executing of each thread from the staging point to the target point. The method further includes executing each thread from its staging point based on the staging time of the thread so that the plurality of threads will reach the crash location at approximately the same time such that the program threads execute in a similar pattern to the execution that caused the crash.Type: GrantFiled: September 27, 2013Date of Patent: September 1, 2015Assignee: International Business Machines CorporationInventors: Cary L. Bates, Lee N. Helgeson, Justin K. King, Michelle A. Schlicht
-
Patent number: 9117017Abstract: According to embodiments of the invention, methods, computer readable storage medium, and a computer system for providing multiple versions of elements of a program in a single compile are disclosed. The method may include receiving a request to compile a current version of a program for debug. The method may also include identifying, by an integrated development environment, a previous version of an element of the program, wherein the previous version of the element is identified by comparing the current version of the program to a previous version of the program. The method may also include inserting the previous version of the element into the current version of the program. The method may also include creating a compiler directive identifying the previous version of the element. The method may also include compiling the current version of the program for debug.Type: GrantFiled: March 13, 2013Date of Patent: August 25, 2015Assignee: International Business Machines CorporationInventors: Cary L. Bates, Lee N. Helgeson, Justin K. King, Michelle A. Schlicht