CN106991032A - A kind of method of monitoring computer application service condition - Google Patents
A kind of method of monitoring computer application service condition Download PDFInfo
- Publication number
- CN106991032A CN106991032A CN201710212205.XA CN201710212205A CN106991032A CN 106991032 A CN106991032 A CN 106991032A CN 201710212205 A CN201710212205 A CN 201710212205A CN 106991032 A CN106991032 A CN 106991032A
- Authority
- CN
- China
- Prior art keywords
- application
- point
- window
- path
- screen
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/302—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
Abstract
A kind of method of monitoring computer application service condition, comprises the following steps:S1:Prepare application program taxonomy database to exist;S2:Capture the window information that user opens;S3:According to screen screen accounting, window obtains focal status, and application program class of operation calculates target program used in user;S4:Obtain application program use time generation Visual Report Forms.The advantage of the invention is that:Exhaustive classification application database;The window information that accurate crawl user opens;It is accurate to obtain the target program that user uses, can open at the same time multiple windows can not be accurately positioned employee using applying the problem of;Management of the enterprise to employee greatly reduces company manager's management cost during strengthening work.
Description
Technical field
The present invention relates to field of information security technology, more particularly to a kind of method of monitoring computer application service condition.
Background technology
In the information age of high speed development, most of work and study of people all be unable to do without computer.In enterprise working clan,
Due to can all touch computer in work, and the computer of intranet has generally also all accessed internet, this aspect side
Employee work, on the other hand also allow employee easily to carry out net surfing, the progress online row unrelated with work
For, such as online shopping, online see video, speculation in stocks, play game and QQ chats etc., severe jamming intranet is just
Often the normal work of operating and other employees, are that this corporate manager needs to find the long-range computer desktop for checking management employee
Situation.
Also there are many employee's monitoring and control management softwares at present, but enter mostly both for the window of focus acquired in active user
Row monitoring, if user is seeing a film simultaneously, and does not just monitor its unrelated thing that works done in the thing for correlation of working.
The content of the invention
There is provided can effectively solve the problem that the problem of above-mentioned prior art is present to defect of the invention for prior art.
A kind of method of monitoring computer application service condition, comprises the following steps:
S1:Prepare application program taxonomy database to exist;
S2:Capture the window information that user opens;
S3:According to screen screen accounting, window obtains focal status, and application program class of operation is calculated used in user
Target program;
S4:Obtain application program use time generation Visual Report Forms.
Preferably, the S1 is comprised the following steps that:
S11:Find computer software download site;
S12:Network data crawl script is write according to classification demand;
S13:Run Script captures grouped data and imports database;
S14:Collect the application software title installed in each computer;
S15:Search whether there is classification to the software in database, if continuing to search for next application journey in the presence of if
Sequence, enters step 3 if being not present;
S16:Application program storage is subjected to manual sort into non-classified tables of data;
S17:It is each classification setting application program class of operation after classification results come out, one, opening program need not use
Family is operated;2nd, opening program needs user to operate.
Preferably, the S2 is comprised the following steps that:
S21:The handle of user's desktop is obtained according to API;
S22:Obtain all windows that all subwindows under desktop and user open;
S23:The property value of each window is obtained, includes the process id of window, window position;
S24:Window owning application is obtained according to process id, and obtains application path and title, version information.
Preferably, the S3's comprises the following steps that:
S31:All application window lists are obtained using Windows API, are defaulted as down arranging from parent window;
S32:Computer screen acquiring size;
S33:Calculate top-level windows screen accounting;
S34:Calculate next layer of window screen accounting;
S35:Analysis user uses destination application, first determines whether whether the application of all openings includes and does not need user
The application of operation, if judging whether to obtain focus comprising if, obtains the as destination application of focus, otherwise judges such
In window screen occupancy or display rate it is big for destination application;If all to need the application that user operates,
Obtain focus is destination application.
Preferably, the S33's comprises the following steps that:
S331:Judge whether application widget left position is less than 0, the left position of display be set to 0 if less than 0,
Otherwise it is constant;
S332:Judge whether application widget tip position is less than 0, the tip position of display be set to 0 if less than 0,
Otherwise it is constant;
S333:Judge whether application widget location right is more than screen width, if greater than screen width then by display
Location right is set to the width of screen, otherwise constant;
S334:Judge whether application widget bottom position is more than screen height, if greater than screen height then by display
Bottom position is set to the height of screen, otherwise constant;
S335:Screen area size, top-level windows total size and top-level windows are obtained according to area of a polygon calculation formula
Show size;
S336:Shielding accounting calculation formula is:Shield accounting=window and show area/screen area, displaying ratio calculation formula
For:Show that ratio=window shows area/window gross area;
S337:This layer of window is deposited into a cache list list.
Preferably, the S34's comprises the following steps that:
S341:Screen is excluded with outer portion, step S331, S332, S333, S334 are performed successively;
S342:Exclude by its uppermost window shield portions;
S343:The area and all display areas for calculating display are added;
S344:Step S336, S337 are performed untill all window screen accountings have been calculated.
Preferably, shown S342's comprises the following steps that:
S3421:By application screen positional information by being converted to path point data path1 clockwise;
S3422:A window path path2 is taken out from list lists to compare with current window path, is calculated and is worked as
The part that front window is not blocked;
S34221:Since first point of path1, judge whether that path2 is blocked, continue to judge next if be blocked
Point that individual point is not blocked until finding or untill last point, using of this point as the path path for showing area
Initial point, records subscript index of this in path1.If be still blocked to last point, illustrate this layer of window quilt
Block completely, display area is 0;
S34222:Since path last point, judge the point with path1 i-th ndex+1 point constitute
Whether line segment has intersection point with path2, if if having intersection point by intersection point record in path, and record the line segment that intersects with path2
End point subscript index, perform S3443;If without intersection point by path1 i-th ndex+1 point record in path, and
Index plus 1, S34222 is continued executing with:, when run into next point for charging to path it is identical with path first point when, hold
Row step S3423;
S34223:Since path last point, judge the point with path2 i-th ndex-1 point constitute
Whether line segment has intersection point with path1, if if having intersection point by intersection point record in path, and record the line segment that intersects with path1
End point subscript index, perform S34222.If without intersection point by path2 i-th ndex-1 point record in path,
And index is subtracted 1, continue executing with S34223, when run into next point for charging to path it is identical with path first point when, hold
Row step S3423;
S3423:Judge whether to have or not in path1 and blocked but be not present in path by path2, to create again if having
The path n_path of a new display area is built, and the point is charged in n_path, step S34222 is performed;If in the absence of if
Step S3422 is performed, untill being taken in list.
Preferably, the S4 is comprised the following steps that:
S41:All steps of S2, S3 are performed at regular intervals, obtain the destination application that user uses;
S42:Whether the application program and current record application program for comparing last record are same program, if then not
Operate, as not being, between current time is designated as into last application using the end time and at the beginning of specifically application use;
S43:Classified according to database, calculate the total time, ineffective time, effective time of each classification;
S44:The data obtained according to previous step generate analysis chart.
Compared with prior art the advantage of the invention is that:Exhaustive classification application database;What accurate crawl user opened
Window information;Accurate to obtain the target program that user uses, multiple windows can be opened at the same time can not be accurately positioned employee just
The problem of using applying;Management of the enterprise to employee greatly reduces company manager's management cost during strengthening work.
Brief description of the drawings
Fig. 1 is that the employee that the embodiment of the present invention is generated uses procedure analysis chart.
Embodiment
To make the purpose of the present invention:Technical scheme and advantage are more clearly understood, by the following examples, the present invention is done into
One step is described in detail.
A kind of method of monitoring computer application service condition, comprises the following steps:
S1:Prepare application program taxonomy database to exist;
S2:Capture the window information that user opens;
S3:According to screen screen accounting, window obtains focal status, and application program class of operation is calculated used in user
Target program;
S4:Obtain application program use time generation Visual Report Forms.
The S1 is comprised the following steps that:
S11:Computer software download site is found on network;
S12:Network data crawl script is write according to classification demand;
S13:Run Script captures data and imports database;
S14:Collect the application software title installed in each computer;
S15:Search whether there is classification to the software in database, if continuing to search for next application journey in the presence of if
Sequence, enters step 3 if being not present;
S16:Application program storage is subjected to manual sort into non-classified tables of data.
S17:It is each classification setting application program class of operation after classification results come out, one, opening program need not use
Family is operated, such as:Game, video, music, news etc.;2nd, opening program needs user to operate, such as:Exploitation, design, office
Instrument etc..
The S2 is comprised the following steps that:
S21:The handle of user's desktop is obtained according to API;
S22:Obtain all windows that all subwindows under desktop and user open;
S23:The property value of each window is obtained, includes the process id of window, window position;
S24:Window owning application is obtained according to process id, and obtains application path and title, version information.
The S3's comprises the following steps that:
S31:All application window lists are obtained using Windows API, are defaulted as down arranging from parent window;
S32:Computer screen acquiring size;
S33:Calculate top-level windows screen accounting;
Because top-level windows are blocked without other any windows, therefore the part outside screen need to be only removed, key step is such as
Under:
S331:Judge whether application widget left position is less than 0, the left position of display be set to 0 if less than 0,
Otherwise it is constant;
S332:Judge whether application widget tip position is less than 0, the tip position of display be set to 0 if less than 0,
Otherwise it is constant;
S333:Judge whether application widget location right is more than screen width, if greater than screen width then by display
Location right is set to the width of screen, otherwise constant;
S334:Judge whether application widget bottom position is more than screen height, if greater than screen height then by display
Bottom position is set to the height of screen, otherwise constant;
S335:Screen area size, top-level windows total size and top-level windows are obtained according to area of a polygon calculation formula
Show size;
S336:Shielding accounting calculation formula is:Shield accounting=window and show area/screen area, displaying ratio calculation formula
For:Show that ratio=window shows area/window gross area;
S337:This layer of window is deposited into a cache list list.
S34:Calculate next layer of window screen accounting;
Next layer is also possible to be blocked by the window above it outside the part in addition to screen, and its calculation procedure is as follows:
S341:Screen is excluded with outer portion, step S331, S332, S333, S334 are performed successively;
S342:Exclude by its uppermost window shield portions;
S3421:By application screen positional information by being converted to path point data path1 clockwise;
S3422:A window path path2 is taken out from list lists to compare with current window path, is calculated and is worked as
The part that front window is not blocked;
S34221:Since first point of path1, judge whether that path2 is blocked, continue to judge next if be blocked
Point that individual point is not blocked until finding or untill last point, using of this point as the path path for showing area
Initial point, records subscript index of this in path1.If be still blocked to last point, illustrate this layer of window quilt
Block completely, display area is 0;
S34222:Since path last point, the point and (index+1) individual point composition in path1 are judged
Line segment whether have intersection point with path2, if if having intersection point by intersection point record in path, and record the line that intersects with path2
The end point subscript index of section, performs S3443;By (index+1) in path1 individual point record in path if without intersection point
In, and index is added 1, continue executing with S34222:, it is identical with path first point when running into next point for charging to path
When, perform step S3423;
S34223:Since path last point, the point and (index-1) individual point composition in path2 are judged
Line segment whether have intersection point with path1, if if having intersection point by intersection point record in path, and record the line that intersects with path1
The end point subscript index of section, performs S34222.By (index-1) in path2 individual point record in path if without intersection point
In, and index is subtracted 1, and S34223 is continued executing with, it is identical with path first point when running into next point for charging to path
When, perform step S3423;
S3423:Judge whether to have or not in path1 and blocked but be not present in path by path2, to create again if having
The path n_path of a new display area is built, and the point is charged in n_path, step S34222 is performed;If in the absence of if
Perform step S3422:, untill being taken in list.
S343:The area and all display areas for calculating display are added;
S344:Step S336, S337 are performed untill all window screen accountings have been calculated;
S35:Analysis user uses destination application, first determines whether whether the application of all openings includes and does not need user
The application of operation, if judging whether to obtain focus comprising if, obtains the as destination application of focus, otherwise judges such
In window screen occupancy or display rate it is big for destination application;If all to need the application that user operates,
Obtain focus is destination application.
The S4 is comprised the following steps that:
S41:(such as 2 seconds) perform all steps of S2, S3 at regular intervals, obtain the destination application that user uses;
S42:Whether the application program and current record application program for comparing last record are same program, if then not
Operate, as not being, between current time is designated as into last application using the end time and at the beginning of specifically application use;
S43:Classified according to database, calculate and (using game, music, regard the total time of each classification, ineffective time
Frequently, see news, other application and be not used any application time), effective time (using exploitation, set etc. application time)
(note:Effectively, null criterion is by taking programmer as an example);
S44:The data obtained according to previous step generate analysis chart, as shown in Figure 1:The figure be a certain employee be on duty and under
Using the situation of program in class's time, wherein effective time is to use the application time related to work.
One of ordinary skill in the art will be appreciated that embodiment described here is to aid in reader and understands this hair
Bright implementation, it should be understood that protection scope of the present invention is not limited to such especially statement and embodiment.Ability
The those of ordinary skill in domain can be made according to these technical inspirations disclosed by the invention it is various do not depart from essence of the invention its
Its various specific deformations and combination, these deformations and combination are still within the scope of the present invention.
Claims (8)
1. a kind of method of monitoring computer application service condition, it is characterised in that comprise the following steps:
S1:Prepare application program taxonomy database to exist;
S2:Capture the window information that user opens;
S3:According to screen screen accounting, window obtains focal status, and application program class of operation calculates target used in user
Program;
S4:Obtain application program use time generation Visual Report Forms.
2. the method for a kind of monitoring computer application service condition according to claim 1, it is characterised in that the S1 is specific
Step is as follows:
S11:Find computer software download site;
S12:Network data crawl script is write according to classification demand;
S13:Run Script captures grouped data and imports database;
S14:Collect the application software title installed in each computer;
S15:Search whether there is classification to the software in database, if continuing to search for next application program in the presence of if,
Enter step 3 if being not present;
S16:Application program storage is subjected to manual sort into non-classified tables of data;
S17:It is each classification setting application program class of operation after classification results come out, one, open program and do not need user behaviour
Make;2nd, opening program needs user to operate.
3. the method for a kind of monitoring computer application service condition according to claim 2, it is characterised in that the S2 is specific
Step is as follows:
S21:The handle of user's desktop is obtained according to API;
S22:Obtain all windows that all subwindows under desktop and user open;
S23:The property value of each window is obtained, includes the process id of window, window position;
S24:Window owning application is obtained according to process id, and obtains application path and title, version information.
4. a kind of method of monitoring computer application service condition according to claim 3, it is characterised in that the tool of the S3
Body step is as follows:
S31:All application window lists are obtained using Windows API, are defaulted as down arranging from parent window;
S32:Computer screen acquiring size;
S33:Calculate top-level windows screen accounting;
S34:Calculate next layer of window screen accounting;
S35:Analysis user uses destination application, first determines whether whether the application of all openings includes and does not need user's operation
Application, if judging whether to obtain focus comprising if, obtain focus is destination application, otherwise judges that such is applied
Middle window screen occupancy or display rate it is big for destination application;If all obtained to need the application that user operates
Focus is destination application.
5. a kind of method of monitoring computer application service condition according to claim 4, it is characterised in that the tool of the S33
Body step is as follows:
S331:Judge whether application widget left position is less than 0, the left position of display is set to 0 if less than 0, otherwise
It is constant;
S332:Judge whether application widget tip position is less than 0, the tip position of display is set to 0 if less than 0, otherwise
It is constant;
S333:Judge whether application widget location right is more than screen width, if greater than screen width then by the right of display
Position is set to the width of screen, otherwise constant;
S334:Judge whether application widget bottom position is more than screen height, if greater than screen height then by the bottom of display
Position is set to the height of screen, otherwise constant;
S335:Screen area size, top-level windows total size and top-level windows are obtained according to area of a polygon calculation formula to show
Size;
S336:Shielding accounting calculation formula is:Shield accounting=window and show area/screen area, displaying ratio calculation formula is:It is aobvious
Show that ratio=window shows area/window gross area;
S337:This layer of window is deposited into a cache list list.
6. a kind of method of monitoring computer application service condition according to claim 5, it is characterised in that the tool of the S34
Body step is as follows:
S341:Screen is excluded with outer portion, step S331, S332, S333, S334 are performed successively;
S342:Exclude by uppermost window shield portions;
S343:The area and all display areas for calculating display are added;
S344:Step S336, S337 are performed untill all window screen accountings have been calculated.
7. the method for a kind of monitoring computer application service condition according to claim 6, it is characterised in that the S342's
Comprise the following steps that:
S3421:By application screen positional information by being converted to path point data path1 clockwise;
S3422:A window path path2 is taken out from list lists to compare with current window path, calculates current window
The part that mouth is not blocked;
S34221:Since first point of path1, judge whether that path2 is blocked, continue to judge next point if be blocked
The point that is not blocked until finding or untill last point, using starting of this point as the path path for showing area
Point, records subscript index of this in path1.If be still blocked to last point, illustrate that this layer of window is complete
Block entirely, display area is 0;
S34222:Since path last point, the line segment of the point and i-th ndex+1 point composition in path1 is judged
Whether have intersection point with path2, if if having intersection point by intersection point record in path, and record the knot of line segment intersected with path2
Spot subscript index, performs S3443;If without intersection point by path1 i-th ndex+1 point record in path, and will
Index adds 1, continues executing with S34222:, when run into next point for charging to path it is identical with path first point when, perform
Step S3423;
S34223:Since path last point, the line segment of the point and i-th ndex-1 point composition in path2 is judged
Whether have intersection point with path1, if if having intersection point by intersection point record in path, and record the knot of line segment intersected with path1
Spot subscript index, performs S34222.If without intersection point by path2 i-th ndex-1 point record in path, and will
Index subtracts 1, continues executing with S34223, when run into next point for charging to path it is identical with path first point when, perform step
Rapid S3423;
S3423:Judge whether to have or not in path1 and blocked but be not present in path by path2, to re-create one if having
The path n_path of individual new display area, and the point is charged in n_path, perform step S34222;Performed if in the absence of if
Step S3422, untill being taken in list.
8. the method for a kind of monitoring computer application service condition according to claim 7, it is characterised in that the S4 is specific
Step is as follows:
S41:All steps of S2, S3 are performed at regular intervals, obtain the destination application that user uses;
S42:Whether the application program and current record application program for comparing last record are same program, if not doing exercises then
Make, as not being, between current time is designated as into last application using the end time and at the beginning of specifically application use;
S43:Classified according to database, calculate the total time, ineffective time, effective time of each classification;
S44:The data obtained according to previous step generate analysis chart.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710212205.XA CN106991032B (en) | 2017-04-01 | 2017-04-01 | Method for monitoring computer application use condition |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710212205.XA CN106991032B (en) | 2017-04-01 | 2017-04-01 | Method for monitoring computer application use condition |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106991032A true CN106991032A (en) | 2017-07-28 |
CN106991032B CN106991032B (en) | 2020-05-19 |
Family
ID=59416134
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710212205.XA Active CN106991032B (en) | 2017-04-01 | 2017-04-01 | Method for monitoring computer application use condition |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106991032B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109815090A (en) * | 2019-01-22 | 2019-05-28 | 厦门美柚信息科技有限公司 | A kind of calculation method, system, equipment and its storage medium of forms effective area |
CN110909915A (en) * | 2019-10-16 | 2020-03-24 | 厦门美柚股份有限公司 | Method and device for predicting work plan |
CN113592323A (en) * | 2021-08-05 | 2021-11-02 | 任丰宁 | Artificial intelligence enterprise management cost input detail reminding system |
CN116707940A (en) * | 2023-06-26 | 2023-09-05 | 邯郸市乡年网络科技有限公司 | Data security visual analysis method and system based on big data |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101399716A (en) * | 2008-10-28 | 2009-04-01 | 深圳市中科新业信息科技发展有限公司 | Distributed audit system and method for monitoring using state of office computer |
US20150121301A1 (en) * | 2013-10-28 | 2015-04-30 | Lenovo (Beijing) Co., Ltd. | Information processing method and electronic device |
CN105243522A (en) * | 2015-11-24 | 2016-01-13 | 北京华夏威科软件技术有限公司 | Working behavior analysis method and system based on massive user operation behavior data |
CN106164959A (en) * | 2014-02-06 | 2016-11-23 | 威图数据研究公司 | Behavior affair system and correlation technique |
CN106293325A (en) * | 2016-07-26 | 2017-01-04 | 网易(杭州)网络有限公司 | The method and apparatus of automatic seeking window |
-
2017
- 2017-04-01 CN CN201710212205.XA patent/CN106991032B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101399716A (en) * | 2008-10-28 | 2009-04-01 | 深圳市中科新业信息科技发展有限公司 | Distributed audit system and method for monitoring using state of office computer |
US20150121301A1 (en) * | 2013-10-28 | 2015-04-30 | Lenovo (Beijing) Co., Ltd. | Information processing method and electronic device |
CN106164959A (en) * | 2014-02-06 | 2016-11-23 | 威图数据研究公司 | Behavior affair system and correlation technique |
CN105243522A (en) * | 2015-11-24 | 2016-01-13 | 北京华夏威科软件技术有限公司 | Working behavior analysis method and system based on massive user operation behavior data |
CN106293325A (en) * | 2016-07-26 | 2017-01-04 | 网易(杭州)网络有限公司 | The method and apparatus of automatic seeking window |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109815090A (en) * | 2019-01-22 | 2019-05-28 | 厦门美柚信息科技有限公司 | A kind of calculation method, system, equipment and its storage medium of forms effective area |
CN110909915A (en) * | 2019-10-16 | 2020-03-24 | 厦门美柚股份有限公司 | Method and device for predicting work plan |
CN113592323A (en) * | 2021-08-05 | 2021-11-02 | 任丰宁 | Artificial intelligence enterprise management cost input detail reminding system |
CN116707940A (en) * | 2023-06-26 | 2023-09-05 | 邯郸市乡年网络科技有限公司 | Data security visual analysis method and system based on big data |
CN116707940B (en) * | 2023-06-26 | 2024-02-13 | 天翼安全科技有限公司 | Data security visual analysis method and system based on big data |
Also Published As
Publication number | Publication date |
---|---|
CN106991032B (en) | 2020-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106991032A (en) | A kind of method of monitoring computer application service condition | |
Arisholm et al. | A systematic and comprehensive investigation of methods to build and evaluate fault prediction models | |
Singer et al. | Navtracks: Supporting navigation in software maintenance | |
US8423960B2 (en) | Evaluation of software based on review history | |
Rozinat et al. | Conformance testing: Measuring the fit and appropriateness of event logs and process models | |
Antoniol et al. | An automatic approach to identify class evolution discontinuities | |
CN101075917B (en) | Method and apparatus for predicting network attack behaviour | |
Piorkowski et al. | Modeling programmer navigation: A head-to-head empirical evaluation of predictive models | |
WO2006050503A9 (en) | System and method for identifying and approaching browsers most likely to transact business based upon real-time data mining | |
Wang et al. | Automatic unit test generation for machine learning libraries: How far are we? | |
Jiang et al. | Towards a framework for understanding the relationships between classical software engineering and agile methodologies | |
e Silva et al. | Machine learning methods and asymmetric cost function to estimate execution effort of software testing | |
Lin et al. | Test coverage optimization for large code problems | |
Holland et al. | Statically-informed dynamic analysis tools to detect algorithmic complexity vulnerabilities | |
Kalinowski et al. | A computational framework for supporting software inspections | |
Käppel et al. | Evaluating predictive business process monitoring approaches on small event logs | |
Tran et al. | How good are my search strings? Reflections on using an existing review as a quasi-gold standard | |
Sirshar et al. | Comparative Analysis of Software Defect PredictionTechniques | |
MacKay Altman et al. | A longitudinal model for magnetic resonance imaging lesion count data in multiple sclerosis patients | |
Bennis et al. | Calculation of the base inertial parameters of closed-loops robots | |
Chen et al. | Minimizing link generation in constraint checking for context inconsistency detection | |
Martin et al. | A Case Study on Designing Evaluations of ML Explanations with Simulated User Studies | |
Chahal et al. | Open source software evolution: a systematic literature review (Part 1) | |
Yahaya et al. | SCfM_PROD: A software product certification model | |
Litvinchev et al. | An interactive algorithm for portfolio bi-criteria optimization of R&D projects in public organizations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210315 Address after: 641100 No.1 Hanyu Avenue, Shizhong District, Neijiang City, Sichuan Province Patentee after: XLY SALVATIONDATA TECHNOLOGY Inc. Address before: 641000 704, floor 7, unit 1, building 3, No. 1700, North Tianfu Avenue, high tech Zone, Chengdu, Sichuan Patentee before: SICHUAN AITE YINGTAI INTELLIGENT TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right |