CN104182235B - Software architecture system and design method used for solving sneak path of software - Google Patents
Software architecture system and design method used for solving sneak path of software Download PDFInfo
- Publication number
- CN104182235B CN104182235B CN201410424481.9A CN201410424481A CN104182235B CN 104182235 B CN104182235 B CN 104182235B CN 201410424481 A CN201410424481 A CN 201410424481A CN 104182235 B CN104182235 B CN 104182235B
- Authority
- CN
- China
- Prior art keywords
- function
- component
- data
- software
- called
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention provides a software architecture system and design method used for solving sneak path of software. The design mode of the architecture system is to divide a software system into an advocate tone function component module, a called function component module, a controller component module, an event component module and a data component module; the controller component module is added among all data interaction of a program, so that overall management of data between an event and the modules can be realized; the interior of the controller component module comprises a timer component, a function processing component and a function registering component, and the controller component module is used for controlling time for data interaction among the modules; if the data do not return within the required time, one fault datum is forced to return through the function processing component, and the calling process of the fault function is completed. The software architecture system and design method has the advantages that the components can be reused, prototype design is performed step by step, the components can be parallelly developed without mutual influence, most importantly, the problem about the sneak path is solved, and stability and robustness of the software are improved.
Description
Technical field
The present invention relates to a kind of DEPC (data Data, event Event, processing Process, controller Controller tetra-
The abbreviation of individual English word) architecture management system and implementation method are specifically between a kind of each module to program
Data interaction carries out the software architecture system and method for designing of global administration, and the software architecture is independently of hardware cell
The actual realization of function is controlled;Belong to field of computer technology.
Background technology
Originally, people are in the selection for focusing on Data Structure and Algorithm of software design, with software system scale
It is increasing, become increasingly complex, the structure and specification of whole system seem more and more important.It is soft for large-scale complexity
For part system, overall system structure design and specification is bright compared with the selection of the algorithm to calculating and data structure
It is aobvious to become much more significant.Since software system is divided into first number of modules, interact again between module, combining, there have to be whole
The attribute of body, is just provided with architecture.
Before 20 century 70s, software development is based on assembly program design.Due to system scale at that time it is less, institute
There is no the concept of software system structure.The eighties in 20th century, OO development approach was opened to the mid-90
Begin to flourish and progressively ripe.After the nineties in 20th century, then the component-based software development stage is entered into, the stage is with process
Centered on, emphasize software development using Component Technology and architecture technique, it is desirable to the software developed possess it is very strong from
Adaptability, interoperability, expansibility and reusability.The appearance of software architecture so that the software division of labor at all levels is bright
Really, it is non-interference.The demand of certain level there occurs change, just only need to the code changed in equivalent layer, not interfere with it
Code in its layer.
But the conventional architecture mode of real-time software mainly has traditional poll architecture, function queue system knot
Structure, AM/BAM (interruption) architecture and the layered architecture based on operating system.At present in personal computer and service
The architectures such as MVC, SOA that the application software run on device is adopted are not suitable for real-time software.Most of real-time softwares only have
Less man-machine interaction, even without man-machine interaction, can regard man-machine interaction as event.There is substantial amounts of thing in real-time software
Part, these events are not necessarily the event of man-machine interaction generation, and the circulation of all these events meeting control programs is such as interrupted,
And what many events often occurred at random, this event easily causes program sneak path.
Early in the eighties in 20th century, people have begun to set about the analysis and research to software sneak path.Sneak path is referred to
Some potential paths in software system, they belong to not in calculated path, are that people are undesirable.Sneak path
It is constantly present, because subsystem designer lacks the behavior of the overall point of view of total system or some carelessness, has
Logical problem when being then software design, also some data interactions are difficult by look-ahead, or even also some sneak paths are
Caused due to electromagnetic interference or other factorses.
Causing the factor of software sneak path has a lot, here can be for an example that may produce software sneak path.
At present in real-time software design, to the process interrupted usually in accordance with its priority, the high interruption of priority can seize and be
System resource, this is that the state of processing procedure that should be to being preempted is preserved, and continues to complete after the completion of interrupt processing and is hung
The processing procedure for rising.But, these are required for developer to go to process one by one, are many times likely to occur not preserving and are preempted
The state of processing procedure is preserved imperfect.It is as shown in Figure 1 a sneak path due to interrupting generation, if do not examined during design
Consider such case, it is likely that routine call is not returned.The appearance of sneak path problem can to program performing bring it is many can not
Prediction and uncontrollable factor.If necessary process is not done to sneak path in program operation, it will to overall software item
Mesh engineering brings huge risk.
If being possible to produce add one layer of control member layer between the component of data interaction, global supervision is carried out,
Above-mentioned for avoiding the occurrence of, then sneak path problem that can be effectively to occurring in program performing is processed, while
Add timer function in controller component, then program performing can be avoided unlimited situation about waiting occur, also can be real-time
The time that constraint interpolation is performed in software.
The pertinent literature report of the sneak path problem occurred in settlement procedure running is at home and abroad there is no at present.
The content of the invention
The technology of the present invention solution:Overcome the deficiencies in the prior art, there is provided a kind of DEPC architecture managements system and
Implementation method, the sneak path problem occurred in settlement procedure running;Can apply in real-time software and non-real time software;
It is not only restricted to the programming language used during exploitation program;Public high-level abstract of system can be represented;Contribute in proper order
Progressive prototype;Support member concurrent development, and be independent of each other.
The technology of the present invention solution:1st, a kind of software architecture system for solving software sneak path, its feature
It is, in software development, software to be divided into into homophony function component, called function component, event component, data members and control
The part of device component five;Wherein:
User-defined power function is called in homophony function component, realization, it would be desirable to which the function information called gives control
Device component is processed;
Called function component, realizes processing the specific data mart modeling of correspondence system and process, is called by controller component,
Then controller component is returned result to;
Event component, realizes processing all events being likely to occur in correspondence system, such as interrupts or connect network, controlled
Device component processed is called, and then returns result to controller component;
Controller component, realizes that the data interaction to being likely to occur in program is managed and controls, and homophony function will
The module information called gives controller component, controller component when specific called function is called, using timer to quilt
The implementation procedure of letter of transfer number carries out timing, if program within the expected time without normal return, force disconnect perform into
Journey, returns an abnormal data;Another function of controller component is the function registration that controller will be needed to be controlled
Enter function information list;
Data members, there is provided access the component of data structure, file, data base's definition and data storage interface.
One software system is divided into into data (Data), event (Event), processing (Process), controller
(Controller) four parts, wherein processing is divided into homophony processing and is adjusted two kinds of situations of processing.
Sneak path refers to some potential paths in software system, and they belong to not in calculated path, are not
Wish what is occurred.The appearance of sneak path problem can bring many unpredictable and uncontrollable factor to program performing.If
Necessary process is not done to sneak path in program operation, it will bring huge risk to overall software project engineering.
Due to many reasons, sneak path is always existed in software system data interaction.One layer of controller structure of addition
Part layer, carries out global supervision, above-mentioned for avoiding the occurrence of, then can effectively to the sneak path of appearance in program performing
Problem is processed, while adding timer function in controller component, then can be prevented effectively from program performing and nothing is occurred
Limit wait situation, also can in real-time software constraint interpolation perform time.
Controller component is the core component in DEPC architecture modes, and it is supervised to current event, state, data
Listen, there is provided corresponding mechanism coordination event is corresponding, state is hung up, data are preserved, and preserves correct path and performs, and blocks sneak path
Perform.
Described homophony function component is needed comprising program principal function, that is, the entrance function of program, and other use
The power function of family oneself definition.
Described controller component is needed comprising function process assembly, timer component and component registration.Wherein registration group
Part is used for storage needs the function information that function process assembly is processed (to return including function name, function parameter list, function
Return type);Timer component carries out timing according to the clock of program institute application system platform to the time of certain thread operation;
Function process assembly finds called function information, Ran Houjian by according to the incoming function information of homophony function from function list
Two threads are found, a thread is used to perform called function, and another thread is used for the called function run time to performing and enters
Row timing.
A kind of Software Architecture Design Method for solving software sneak path, realizes that step is as follows:
(1) application developer sets up controller (Controller), data when projects are set up under project directory
Process (DataProcessing), event handling (DataProcessing), four files of power function (Functions) or
Bag;
(2) principal function and other main called functions are write in power function bag;
(3) correlation function for accessing data base, operated to database data is write in data processing bag;
(4) may in writing in event handling bag for realizing all programs such as interrupt operation, network data communication operation
The event functions of appearance;
(5) in controller bag, need to write timer function, function process function and function registration function, write meter
When device function when need write according to the clock module of institute's application system, read system first when timer is started working
Current time, program does not stop to obtain newest system time when running, and has been subtracted each other with the time started and be obtained program
The time of Jing operations, if will force to terminate called function process beyond the scheduled time, and return erroneous values;Function registration function
Needing to construct one is used to deposit the memory space of function information, can be a file, a data structure or table etc.,
The function information of storage includes function name, function return value, function parameter list;Function processes function to be needed to realize from function row
The function of called function is searched in table, after finding function information, two processes can be set up, a process is used to perform by letter of transfer
Number a, process carries out timing for performing timer to the time that called function runs;
(6) resource and head text can be set up in the case where controller, event handling, data processing, power function are with first class catalogue
Part catalogue, for depositing the header file information of picture, audio and video resources and function.
Present invention advantage compared with prior art is:
(1) present invention provides a kind of most basic DEPC architecture frames, and it is preferably managed for programmer
Solution and application, it is often more important that programmer can use the global design thought of DEPC architectures when software is developed.For
Different application scenarios, DEPC architectures can carry out appropriate expansion and adjustment.
(2) range of application of the invention is wider, is not only restricted to the programming language used during exploitation program, and can apply
In real-time software and non-real time software.Controller component mainly has two effects, and one is that the data between component are carried out entirely
Office's management, two is that the run time to program control effectively.The present invention also provides a kind of basic controller component and realizes
Mode.Because in different application scenarios, specific requirement of the software to controller is also not quite similar.Such as different software works
Journey is different to its tolerable run time of each task process and service requirement;It is not each in non-real time software
Task is required for being processed by controller component, as long as registration needs mission function of control etc..So, control
Device component is also to need to carry out relative modification according to different situations and adjust.
(3) present invention can effectively solve the problems, such as the sneak path occurred in software running process.Open in current software
In sending out, also without a kind of effective solution for software sneak path, the design of DEPC can be described as compensate for this blank.
Carrying out design software with DEPC software architectures effectively can be processed the sneak path of appearance in software running process, this
Sample can greatly improve the overall safety and reliability of software.
(4) present invention provides a kind of software architecture for contributing to incremental prototype.In software development, point
Layer design can be analyzed to project, and project is constructed into prototype by eXecute UML.Contribute to exploitation in terms of two
Movable is smoothed out, and one can be the clearly potential system performance problems of early stage in software life-cycle;Two be
The early stage of software life-cycle can just obtain an executable system.The two aspects will all reduce the latent of project development
In risk.
(5) present invention can represent public high-level abstract of system.Most of related personnel of system can be it
As a basis for understanding mutually is set up, unified understanding, mutually exchange are formed.DEPC software architectures specify that to system
The constraints of realization, is divided into the component of regulation, by regulation side by the structural design decision met described by architecture
Formula is interacted.So the designer of DEPC software configurations needs not be algorithm designer or is proficient in programming language, it is only necessary to
Emphasis considers the overall trade-off problem of system;And the developer of component develops under the constraint that architecture gives.This
The design of sample so that homophony component, logically keep relatively only by tune component, control member, event component and data members
Vertical property, so that the logical structure of whole system is relatively sharp, it is possible to increase the maintainable and expansibility of system and software.
Description of the drawings
Fig. 1 is to interrupt the situation for producing sneak path;
Fig. 2 is the DEPC architecture management system construction drawings of the present invention, reflects and carry out between each component data friendship
Mutual mode;
Fig. 3 is timer component in the present invention in controller component, processes function component, registration function component and homophony
Relation between function component and called function component.The direction of arrow expresses possibility the data interaction direction of presence, function note
Volume list then represents the file or data structure of storage function information;
Fig. 4 is the component registration workflow in the present invention in controller component, after a function is realized, if desired
The control of the overall situation is carried out to it, then needs to register it using registration function, then registration function believes the function registered
During breath (function name, function parameter, function return value) is stored in function list;
Fig. 5 is the process assembly workflow in the present invention in controller component, when the called function of homophony function call
When, process assembly can search function from registration function list, then create two processes, and one is used to perform called function,
And another is for when calling timer, whether the execution of the called function of judgement to surpass the expectation the time, most at last result is returned
Return;
Fig. 6 shows the timer component workflow in controller component.Timing bench receives function process assembly meter
When order after start timing, while whether determining program run time beyond the prespecified time, if exceeding the time, will
It is forced back to a wrong data;
Fig. 7 shows the workflow diagram of the image acquisition subsystem in the face identification system based on 3G network;
Fig. 8 shows the workflow diagram of the recognition subsystem in the face identification system based on 3G network.
Specific embodiment
The simple words of term included below, initial and abbreviation, it will help understand the following examples
Describe in detail, but these details are not meant to limit the present invention.Those skilled in the art obviously can deviate these
The present invention is put into practice in other embodiments of detail.For example, despite with the reality based on the face identification system of 3G network
Apply scheme to describe the present invention, but the present invention can also be applied in real-time software and non-real time software is arbitrarily included.
Term "comprising" and " including " and its derivative represent it is non-limiting including;Term "or" is inclusive, meaning
And/or;Phrase " with ... be associated " and " being further associated " and its derivative can represent including, be included, therewith interconnection,
Comprising, included, be attached thereto, it is coupled thereto, communicate, cooperate, interweaving, side by side, be close to, be limited to, with, tool
There is its property etc.;" component " is the reusable software module of software-oriented architectural framework.Component (component) is reusable
Software composition, can be used to construct other software, and in the present invention component is commonly referred to as packed object class, class tree
With some functional modules;" component " refers to the simplified package to data and method;" DEPC " refers to data (Data), event
(Event), (Process), the abbreviation of controller (Controller) four English words are processed." 3G network " is referred to use and propped up
Hold the G mobile communication of the cellular mobile telecommunications technology of high speed data transfer the laying of circuit and equipment it is logical
Communication network.
In order to verify the effectiveness of DEPC architecture Design patterns, we are employed with the present invention and without the present invention
Two ways is realizing a face identification system based on 3G network.As shown in Figure 7 and Figure 8, reflect from top to bottom and be based on
The main flow of the face identification system of 3G network, the system is made up of image capturing system and identifying system two subsystems.
Image capturing system is only responsible for collection human face data, then the human face data for collecting is transferred to into identification system by 3G network
System.Identifying system is received after original image information, and process is analyzed to image information, extracts face, eyes, the nose of people
After the features such as son, mouth, eyebrow, compare with the image in data base, judge whether corresponding face information, finally will
Object information sends back image acquisition end again by 3G network.Image acquisition termination is received will by display screen after return information
As a result show.
In this system, one four key nodes are had.It is respectively that judging whether in image capturing system starts figure
As collection and feedback information to be received is waited, view data that the wait in face identification system is collected and from human face data
Face characteristic data are matched in storehouse.
When user proceeds by image acquisition, need triggering manually to interrupt (such as touching the button), tell image capturing system
Start to gather view data.After data acquisition is finished, face identification system is passed information to by mobile Internet.Face is known
Other system needs the view data to be received such as ceaselessly.It is also to pass through when there is new view data to need identifying system to receive
The mode that triggering is interrupted, tells that identifying system starts receiving data.It will be seen that existing in this system a lot
Unstable factor.Realized after this system with common non-DEPC software architectures, when the quick continuous triggering collection of user
When image interrupts, program is it sometimes appear that situation about crashing, shows that program enters sneak path.When the timing of 3G swingings of signal,
The problem that system latency time can be caused long.
When this system is designed using DEPC architectures, we user are triggered the event interrupted and are divided into event structure
Part, the face database that will be accessed is divided into data members, and other function calls are followed successively by homophony component and by tune component, most
Also add control member between the elements afterwards and control for global.So, user triggers every time interruption, all can be by controlling
Component is such to design the generation that effectively prevent sneak path being processed.When accessing face database, need to call data
Component, it is to avoid other users directly conduct interviews to data base, safety has very high lifting.As image capturing system and people
When face identifying system is communicated by 3G network, control member can carry out timer supervision, if network communication is beyond regulation
Time requirement, control member can be forced back to information alert data is activation time-out or data is activation failure.
Fig. 7 show the flow chart of video acquisition subsystem.When acquisition subsystem is realized, overall code is distributed in
In controller, power function, three bags of event.Storage in controller bag has process function, timer function, registration function and letter
Number information table;Storage in power function bag has principal function, image acquisition function;Storage in event package has button interrupt to process letter
Number, network service function.
Need to process function to image acquisition function, button interrupt before system operation and network service function registered,
As shown in figure 4, realizing that image acquisition function, button interrupt are processed after function and network service function, need their function
Title, parameter list and return value type information are stored in function information table.When user wants to gather image, by pressing thing
Reason button triggering interrupt processing function, interrupt processing function notification controller as shown in Figure 3 needs to call image acquisition function, controls
Device processed finds called function information from function information list, and then the function in controller as shown in Figure 5 processes function and adjusts
Image acquisition function is used, while start timer carries out timing to the run time of called function.After being collected image, pass through
Network service function sends the image information for getting to recognition of face subsystem.It is required for passing through during function call
Process function in controller component is processed, and processing function can call timer function to count the execution time of function
Calculate and control, will be forced back to wrong data if the time as shown in Figure 6.
Fig. 8 show the flow chart of recognition of face subsystem.When recognition of face subsystem is realized, by overall code point
Cloth is in controller, power function, four bags of event and data.Storage in controller bag has process function, timer function, note
Volume function;Storage in power function bag has principal function, feature extraction function, aspect ratio to function, result feedback function;Event package
Middle storage has network service function;Storage in packet has access database functions.
Need before system operation to feature extraction function, aspect ratio to function, result feedback function, network service function,
Access database functions registered, as shown in figure 4, realize feature extraction function, aspect ratio to function, result feedback function,
After network service function, access database functions, need to deposit their function name, parameter list and return value type information
In being placed on function information table.After recognition of face subsystem receives new gathered data, notification controller as shown in Figure 3 needs
Call feature extraction function, controller that called function information is found from function information list, then controller as shown in Figure 5
In function process function call feature extraction function will carry out face characteristic extraction and calculating to the data for collecting, while opening
Dynamic timer carries out timing to the run time of called function.Then call aspect ratio to function, access all in data base
Human face data, determines whether matched data, then the data after comparison is returned to into acquisition subsystem.The process of function call
In be required for being processed by the process function in controller component, process function can as shown in Figure 6 call timer function
The execution time of function is calculated and controlled, such as the time of access data base execution and network service duration are such as
Fruit to surpass the expectation and will be forced back to wrong data if the time, without departing from expeced time, will return correct data.
By the checking of actual items, when finding using DEPC software architecture codings, the speed of service of program
Can somewhat decline, but the overall stability of system and reliability but have huge lifting.
Claims (3)
1. a kind of software architecture system for solving software sneak path, it is characterised in that:In software development, by software
It is divided into homophony function component, called function component, event component, data members and the part of controller component five;Wherein:
User-defined power function is called in homophony function component, realization, it would be desirable to which the function information called gives controller structure
Part is processed;
Called function component, realizes processing the specific data mart modeling of correspondence system and process, is called by controller component, then
Return result to controller component;
Event component, realizes processing all events being likely to occur in correspondence system, including interrupts or connect network, by controller
Component is called, and then returns result to controller component;
Controller component, realizes that the data interaction to being likely to occur in program is managed and controls, and homophony function will be called
Module information give controller component, controller component when specific called function is called, using timer to by letter of transfer
Several implementation procedures carries out timing, if program is returned within the expected time without normal, force disconnect executive process is returned
Return an abnormal data;Another function of controller component is that the function registration that controller will be needed to be controlled enters function
Information list;
Data members, there is provided access the component of data structure, file, data base's definition and data storage interface;
Described controller component includes function process assembly, timer component and component registration, and wherein component registration is used to deposit
The function information for needing function process assembly to be processed is put, the function information includes function name, function parameter list, letter
Number return type;Timer component is counted according to the clock of program institute application system platform to the time of certain thread operation
When;Function process assembly finds called function information, then by according to the incoming function information of homophony function from function list
Two threads are set up, a thread is used to perform called function, and another thread is used for the called function run time to performing
Carry out timing.
2. the software architecture system for solving software sneak path according to claim 1, it is characterised in that:It is described
Homophony function component need comprising program principal function, that is, the entrance function of program, and other users oneself definition
Power function.
3. a kind of Software Architecture Design Method for solving software sneak path, it is characterised in that:Realize that step is as follows:
(1) application developer sets up controller (Controller), data processing when projects are set up under project directory
(DataProcessing), event handling (Event Processing), four files of power function (Functions) or
Bag;
(2) principal function and other main called functions are write in power function bag;
(3) correlation function for accessing data base, operated to database data is write in data processing bag;
(4) it is likely to occur in writing in event handling bag for realizing all programs such as interrupt operation, network data communication operation
Event functions;
(5) in controller bag, need to write timer function, function process function and function registration function, write timer
Need to be write according to the clock module of institute's application system during function, read system first when timer is started working current
Time, program do not stop to obtain newest system time when running, and is subtracted each other with the time started and obtain program and run
Time, if will force to terminate called function process beyond the scheduled time, and return erroneous values;Function registration function needs structure
One is made for depositing the memory space of function information, can be a file, a data structure or a table, the letter of storage
Number information includes function name, function return value, function parameter list;Function processes function to be needed to realize being searched from function list
The function of called function, after finding function information, can set up two processes, and process is used to performing called function, one
Process carries out timing for performing timer to the time that called function runs;
(6) resource and header file mesh can be set up in the case where controller, event handling, data processing, power function are with first class catalogue
Record, for depositing the header file information of picture, audio and video resources and function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410424481.9A CN104182235B (en) | 2014-08-26 | 2014-08-26 | Software architecture system and design method used for solving sneak path of software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410424481.9A CN104182235B (en) | 2014-08-26 | 2014-08-26 | Software architecture system and design method used for solving sneak path of software |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104182235A CN104182235A (en) | 2014-12-03 |
CN104182235B true CN104182235B (en) | 2017-04-12 |
Family
ID=51963314
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410424481.9A Active CN104182235B (en) | 2014-08-26 | 2014-08-26 | Software architecture system and design method used for solving sneak path of software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104182235B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101833455A (en) * | 2010-05-13 | 2010-09-15 | 北京大学 | Code splitting method for converting traditional software into rich client software |
CN102331733A (en) * | 2010-07-14 | 2012-01-25 | 中国科学院沈阳计算技术研究所有限公司 | Numerical control system logic controller on basis of system on programmable chip and implementing method thereof |
-
2014
- 2014-08-26 CN CN201410424481.9A patent/CN104182235B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101833455A (en) * | 2010-05-13 | 2010-09-15 | 北京大学 | Code splitting method for converting traditional software into rich client software |
CN102331733A (en) * | 2010-07-14 | 2012-01-25 | 中国科学院沈阳计算技术研究所有限公司 | Numerical control system logic controller on basis of system on programmable chip and implementing method thereof |
Non-Patent Citations (1)
Title |
---|
基于Hibernate和Struts的J2EE应用开发研究;肖杰浩;《开发与应用》;20070531(第5期);第19-20页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104182235A (en) | 2014-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10534773B2 (en) | Intelligent query parameterization of database workloads | |
CN105556482B (en) | Monitor mobile application performance | |
US10545856B2 (en) | Test case generation system | |
US9367601B2 (en) | Cost-based optimization of configuration parameters and cluster sizing for hadoop | |
CN103064690B (en) | A kind of Development Framework based on Android operation system and the method for execution thereof | |
WO2018126964A1 (en) | Task execution method and apparatus and server | |
CN109033109B (en) | Data processing method and system | |
US7640538B2 (en) | Virtual threads in business process programs | |
CN102542007A (en) | Method and system for synchronization of relational databases | |
US20140172401A1 (en) | Method of simulating discrete event | |
CN105095329B (en) | A kind of demographic data check method | |
CN110555074B (en) | Method, terminal and computer readable storage medium for timing data extraction and processing | |
CN103049264A (en) | Method for controlling business system by dynamic modeling of state machine | |
CN104166701B (en) | machine learning method and system | |
CN104731606B (en) | The system and method for Enterprise information integration management is realized based on identification crawl technology | |
US8839208B2 (en) | Rating interestingness of profiling data subsets | |
Debreceni et al. | Property-based locking in collaborative modeling | |
CN113918637A (en) | BPMN2.0 specification-based process engine platform creation method and system | |
CN107368498A (en) | The lock for optimizing MySQL Pessimistic Lockings waits the method and device of time-out time | |
CN104182235B (en) | Software architecture system and design method used for solving sneak path of software | |
CN112241373A (en) | Automatic test method, test device, processor and test system | |
Johnsen et al. | A formal model of object mobility in resource-restricted deployment scenarios | |
WO2021036987A1 (en) | Method and device for achieving operation and maintenance monitoring | |
JP2011513842A5 (en) | ||
US20180067837A1 (en) | Framework for detecting source code anomalies |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |