Object Oriented Dynamic Linking, Late Binding Patents (Class 719/332)
  • Publication number: 20040133898
    Abstract: Methods, systems and computer program products implementing techniques for using interrelated data at run time. The techniques include establishing a model, the model implementing application logic of an application; establishing at least one view for presenting the model; establishing at least one controller for manipulating the model; and establishing at least one storage area, the storage area relating to the controller and storing an instance of a first data structure, the instance of the first data structure comprising application data having been stored in the storage area by an access method, the first data structure having been declared prior to execution of the application.
    Type: Application
    Filed: September 30, 2003
    Publication date: July 8, 2004
    Inventors: Markus Cherdron, Uwe Reeder, Stephan Ritter, Frank Weigel
  • Patent number: 6757891
    Abstract: A computer-implemented method for reducing a computing overhead associated with objects that are local to a particular thread and can be accessed solely by that thread. Dynamically during run-time, an object is determined to be local to a particular thread and can be accessed solely by that thread, whereby a computing overhead associated with that object may be reduced. Likewise, cache locality may be optimized in respect of objects that are determined to be global so as to avoid putting them in the same cache line, whilst thread-local objects are preferably stored in a cache line associated with that thread.
    Type: Grant
    Filed: July 12, 2000
    Date of Patent: June 29, 2004
    Assignee: International Business Machines Corporation
    Inventors: Alain Azagury, Elliott Karl Kolodner, Michael Factor, Avi Teperman, Martin John Trotter
  • Patent number: 6751793
    Abstract: In accordance with the method of invention, a class hierarchy is derived which maintains release-to-release binary compatibility. Leftmost classes of the class hierarchy are ordered in top down order with a most derived class at the bottom. Direct virtual classes are ordered from left to right with the leftmost class in declaration order at the top. Leftmost classes are independently grown downward and direct virtual classes are independently grown upward.
    Type: Grant
    Filed: April 28, 2000
    Date of Patent: June 15, 2004
    Assignee: International Business Machines Corporation
    Inventors: Catherine Y. Lung, Brian W. Thomson
  • Patent number: 6751651
    Abstract: A method of Web-site host consistency administration provides for consistent presentation of data despite presentation on client machines with inconsistent software-object libraries. The host sends screen images which contact the client's onboard DLLs as little as possible. That way, inconsistency problems called binary incompatibilities are avoided. The client is excused from most of the processing load. The client's role is practically limited to displaying the received screens and sending out keystrokes and cursor-moving device inputs. The light role given the client correspondingly shifts more of a load on server-side processing and data storage. Nevertheless, the method provides high assurance the any client sees substantially the same result for the same request despite differences or inconsistencies in software-object libraries onboard the client's machine.
    Type: Grant
    Filed: January 16, 2001
    Date of Patent: June 15, 2004
    Inventor: David A. Crockett
  • Patent number: 6745389
    Abstract: The present invention provides a system of objects and program components wherein an object accesses different associated program components for different implementations of a corresponding function of the object. The system comprises: a first object having one or more functions; a first program component having one or more functions, the first program component being dynamically linked to the first object at a run-time of the first object; and wherein the first object access the first program component using a function call which may result in the access to a second program component having one or more functions.
    Type: Grant
    Filed: March 30, 2000
    Date of Patent: June 1, 2004
    Assignee: Sony Service Center (Europe) N.V.
    Inventors: Tom Frans Maurits Hostyn, Michel Feret, Magdalena Anna Wasowska
  • Patent number: 6742176
    Abstract: A secure flexible plugin architecture allows plugins to dynamically interconnect in highly flexible arrangements to permit the handling of many kinds of file formats. Interconnection is self-administered through a supervised volunteer system. In a media player example, the system is capable of handling files with multiple layers of formatting such as encryption, compression, etc. The resource selection is completely transparent and a user need not be concerned about the packaging of resource files. A security mechanism that is enforced at the level of the plugins is also provided. Plugins can opt in or out depending on the other components in the dynamically generated chain of plugins used to filter or convert a file.
    Type: Grant
    Filed: June 14, 2000
    Date of Patent: May 25, 2004
    Assignee: Lycos, Inc.
    Inventors: Tony Million, Al-Riaz Adatia, Andrew McCann, Nicholas Vinen
  • Patent number: 6738977
    Abstract: A system includes first and second virtual machines (VM) representing a master and a client respectively. A class file is loading by the first virtual machine into shared memory. The class file includes sharable and non-sharable data, and also references sharable and non-sharable data (including code). When it is desired to load the same class into the second virtual machine, the class is first located within said shared memory. A mirror copy of the class is then formed within private memory in the second virtual machine. Finally the non-sharable data of the class is completed in the private memory. Thereafter, an application in the second virtual machine can utilise the class on the basis of the sharable data in the shared memory of the first virtual machine, and the non-sharable data from the private memory of the second virtual machine.
    Type: Grant
    Filed: May 31, 2000
    Date of Patent: May 18, 2004
    Assignee: International Business Machines Corporation
    Inventors: Robert F. Berry, Donna N. Dillenberger, Elizabeth A. Hutchison, Susan P. Paice, Donald W. Schmidt, Alan M. Webb
  • Patent number: 6738965
    Abstract: A virtual machine in an object-oriented system includes an interpreter. In order to provide trace information from a program about specific method calls, a user defines a selection of methods to be traced. As the program runs on the interpreter, it is determined, whether or not the method is included within the selection to be traced. For those methods included within the selection, trace information about the method call is outputted. A method block is associated with each method and is used by the interpreter to invoke the method. For each method within the user-defined selection, a flag is set within the method block associated with the method. The status of this flag is checked when the interpreter invokes a method, in order to determine whether or not the method is included within the selection.
    Type: Grant
    Filed: November 21, 2000
    Date of Patent: May 18, 2004
    Assignee: International Business Machines Corporation
    Inventor: Matthew Alexander Webster
  • Publication number: 20040088720
    Abstract: An object oriented mechanism and method provide exact information about the current invocation stack even when methods are inlined. A virtual stack frame mechanism determines whether a called method has been inlined, and counts both virtual frames and real frames when determining information corresponding to a called method. The virtual stack frame mechanism is preferably implemented in an object oriented class that provides methods for determining information corresponding to a called method.
    Type: Application
    Filed: October 31, 2002
    Publication date: May 6, 2004
    Applicant: International Business Machines Corporation
    Inventors: John Gerard Nistler, Mark Douglas Schroeder, Robert Carl Seemann
  • Publication number: 20040088684
    Abstract: Intercepting function calls. In one embodiment of the application, an import address table for an application is accessed and an address, in the import address table, associated with a function to which calls from the application are to be intercepted is replaced with an address to be used to access a proxy function. In another embodiment, the application is loaded in debugging mode. Once the import address table for the application has been populated with addresses for functions called by the application, the execution of the application is paused. An address, in the import address table, associated with a function to which calls from the application are to be intercepted is replaced with an address to be used to access a proxy function. Execution of the application is then resumed.
    Type: Application
    Filed: October 30, 2002
    Publication date: May 6, 2004
    Inventors: Charles J. Gazdik, Shell Sterling Simpson
  • Publication number: 20040088683
    Abstract: Accordingly, embodiments of the present invention operate to intercept a call directed to a common dialog function and to redirect that call to another more desirable proxy function. An action module providing an internal function that makes a call to the external function is loaded into memory. The action module's import address table is accessed. The external function is identified within the import address table, and an address associated with the external function is replaced with an address to be used to access the proxy function. In one embodiment, the proxy function is designed to utilize settings acquired programmatically and is able to replace a common dialog function, thus, eliminating the need for user interaction to perform a particular task.
    Type: Application
    Filed: October 30, 2002
    Publication date: May 6, 2004
    Inventors: Charles J. Gazdik, Shell Sterling Simpson
  • Publication number: 20040045013
    Abstract: A technique is presented for integrating software components. The technique includes providing an application integration model capable of adapting to different environments by dynamically using different software components at application runtime. The software components are categorized into different stages, with the stages being indicative of when the software components are to be loaded and executed within an application by the application integration model. The technique further includes employing the application integration model to assemble software components into the application within a runtime environment. The application integration model includes an application runtime driver (ARD), which drives work flows of the application integration model through multiple predefined application stages, and a component runtime integration box (CRIB), which includes multiple common data structures employed by the software components during integration into the application.
    Type: Application
    Filed: August 29, 2002
    Publication date: March 4, 2004
    Applicant: International Business Machines Corporation
    Inventor: Thanh V. Lam
  • Publication number: 20040045019
    Abstract: A method, computer program, signal transmission and apparatus pre-verify instructions in a module of a computer program one module-at-a-time. First it is determined whether checking an instruction in a first module which is loaded requires information in a referenced module different than the first module. If the information is required, a constraint for the referenced module is written without loading or otherwise accessing the referenced module. During linking it is determined whether a first module which is loaded has passed pre-verification one-module-at-a-time before linking. A pre-verification constraint on a constrained module is read, if any, if the first module has passed such verification. If any pre-verification constraint is read, the pre-verification constraint is enforced if the constrained module is already loaded.
    Type: Application
    Filed: August 29, 2003
    Publication date: March 4, 2004
    Applicant: Sun Microsystems, Inc.
    Inventors: Gilad Bracha, Sheng Liang, Timothy G. Lindholm