Patents by Inventor Tejaswitha Nutikattu

Tejaswitha Nutikattu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9811441
    Abstract: A method and a system have been disclosed for detecting one or more memory leaks in a program. The method includes receiving the program code. After receiving the program, the program is tokenized automatically in a predefined format. The predefined format may correspond to a format which is up-loadable to a database. Thereafter, the tokenized program code is analyzed to determine control flows in the program by using a memory leak pattern. The memory leak pattern is an incorrect control flow between the combination of memory allocation and memory de-allocation functions. After analyzing the tokenized program, the memory leaks are identified based on the determined control flows in the program. The memory leaks are identified during the development phase of the program code. Subsequently, the memory leaks are fixed by a programmer.
    Type: Grant
    Filed: March 23, 2011
    Date of Patent: November 7, 2017
    Assignee: Infosys Limited
    Inventors: Radhika Santhanakrishnan, Venu Gopala Krishna Kishore Anumakonda, Chintan Vinodray Raval, Tejaswitha Nutikattu
  • Publication number: 20140298302
    Abstract: A method and a system have been disclosed for detecting one or more memory leaks in a program. The method includes receiving the program code. After receiving the program, the program is tokenized automatically in a predefined format. The predefined format may correspond to a format which is up-loadable to a database. Thereafter, the tokenized program code is analyzed to determine control flows in the program by using a memory leak pattern. The memory leak pattern is an incorrect control flow between the combination of memory allocation and memory de-allocation functions. After analyzing the tokenized program, the memory leaks are identified based on the determined control flows in the program. The memory leaks are identified during the development phase of the program code. Subsequently, the memory leaks are fixed by a programmer.
    Type: Application
    Filed: March 23, 2011
    Publication date: October 2, 2014
    Inventors: Radhika Santhanakrishnan, Venu Gopala Krishna Kishore Anumakonda, Chintan Vinodray Raval, Tejaswitha Nutikattu