Patents by Inventor Venu Gopala Krishna Kishore Anumakonda

Venu Gopala Krishna Kishore Anumakonda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9811441
    Abstract: A method and a system have been disclosed for detecting one or more memory leaks in a program. The method includes receiving the program code. After receiving the program, the program is tokenized automatically in a predefined format. The predefined format may correspond to a format which is up-loadable to a database. Thereafter, the tokenized program code is analyzed to determine control flows in the program by using a memory leak pattern. The memory leak pattern is an incorrect control flow between the combination of memory allocation and memory de-allocation functions. After analyzing the tokenized program, the memory leaks are identified based on the determined control flows in the program. The memory leaks are identified during the development phase of the program code. Subsequently, the memory leaks are fixed by a programmer.
    Type: Grant
    Filed: March 23, 2011
    Date of Patent: November 7, 2017
    Assignee: Infosys Limited
    Inventors: Radhika Santhanakrishnan, Venu Gopala Krishna Kishore Anumakonda, Chintan Vinodray Raval, Tejaswitha Nutikattu
  • Publication number: 20140298302
    Abstract: A method and a system have been disclosed for detecting one or more memory leaks in a program. The method includes receiving the program code. After receiving the program, the program is tokenized automatically in a predefined format. The predefined format may correspond to a format which is up-loadable to a database. Thereafter, the tokenized program code is analyzed to determine control flows in the program by using a memory leak pattern. The memory leak pattern is an incorrect control flow between the combination of memory allocation and memory de-allocation functions. After analyzing the tokenized program, the memory leaks are identified based on the determined control flows in the program. The memory leaks are identified during the development phase of the program code. Subsequently, the memory leaks are fixed by a programmer.
    Type: Application
    Filed: March 23, 2011
    Publication date: October 2, 2014
    Inventors: Radhika Santhanakrishnan, Venu Gopala Krishna Kishore Anumakonda, Chintan Vinodray Raval, Tejaswitha Nutikattu
  • Publication number: 20130275585
    Abstract: A method for measuring performance of a networked application is provided. The method enables retrieving performance measurement data from an application database. The data relates to one or more transactions executed via the networked application. The method further enables reconstructing request and response messages using the retrieved data. The messages are reconstructed based on at least one of: web based and socket based calls related to one or more captured transactions. Further, the method enables determining one or more performance measurement metrics based on data obtained by communicating with one or more servers using the reconstructed messages.
    Type: Application
    Filed: October 22, 2010
    Publication date: October 17, 2013
    Applicant: INFOSYS LIMITED
    Inventors: Radhika Santhanakrishnan, Reshma Sastry, Sravanth Kumar Nagunuri, Pradeep Venkataraman, Amit Kumar, Venu Gopala Krishna Kishore Anumakonda, Dakshinamurty Yanamandra