CN109460236A - Program version building and inspection method and system - Google Patents
Program version building and inspection method and system Download PDFInfo
- Publication number
- CN109460236A CN109460236A CN201811221216.5A CN201811221216A CN109460236A CN 109460236 A CN109460236 A CN 109460236A CN 201811221216 A CN201811221216 A CN 201811221216A CN 109460236 A CN109460236 A CN 109460236A
- Authority
- CN
- China
- Prior art keywords
- program
- node
- version
- cryptographic hash
- executable code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Stored Programmes (AREA)
Abstract
The invention discloses a kind of buildings of program version and inspection method and system.This method comprises: extracting the source program of program to be processed from version repository according to version sign;Executable code inventory is read in self-configuring file, is analyzed calling dependence of each executable code in executable code inventory in the source program of program to be processed, is formed dependency tiee;Each node in dependency tiee is traversed, the cryptographic Hash of each node is calculated;The source program of program to be processed is compiled into executable code;By the executable code of the cryptographic Hash write-in compiling of dependency tiee top mode;Version building is checked using the cryptographic Hash of dependency tiee top mode.The automatic building and inspection to program version may be implemented in the present invention.
Description
Technical field
The present invention relates to program development techniques field more particularly to a kind of buildings of program version and inspection method and system.
Background technique
In program development process, the building of version is always comparatively laborious, and is easy error.When constructing version,
It needs correctly to construct source program to be built and all source programs being called to, could finally construct correctly
Executable code.Program version building is carried out under the minicomputers environment such as AIX (Advanced Interactive Xecutive)
When, there is presently no the automatic the build tools of available version, and to any given executable code that building is completed, also do not have
Method is inferred to whether it has been built up success, and the prior art is mainly according to the executable code size after building, building time
Etc. information ancillary staff judge that efficiency is relatively low, and reliability is poor.
Therefore it provides a kind of program version building and inspection method and system are very necessary.
Summary of the invention
The embodiment of the present invention provides a kind of building of program version and inspection method, to realize the automatic building of program version
And inspection, this method comprises:
According to version sign, the source program of program to be processed is extracted from version repository;
Executable code inventory is read in self-configuring file, each executable code analyzed in executable code inventory exists
Calling dependence in the source program of program to be processed forms dependency tiee;
Each node in dependency tiee is traversed, the cryptographic Hash of each node is calculated;
The source program of program to be processed is compiled into executable code;
By the executable code of the cryptographic Hash write-in compiling of dependency tiee top mode;
Version building is checked using the cryptographic Hash of dependency tiee top mode.
Optionally, after the source program of program to be processed is compiled into executable code, by compiled executable code
It is stored in version repository;
Version building result is checked, extracts the source program of program to be processed from version repository again, and calculates weight
The cryptographic Hash of the corresponding dependency tiee top mode of the source program newly extracted, if the cryptographic Hash of the dependency tiee top mode
Cryptographic Hash corresponding with given executable code any in version repository is consistent, then the executable code has passed through version building inspection
It looks into.
Optionally, the method also includes:
It is created according to inspection result and checks inventory, show that version constructs inspection result using inspection inventory.
Optionally, each node in dependency tiee is traversed, the cryptographic Hash of each node is calculated, comprising:
Judge whether node to be processed is dependency tiee bottom node;
If bottom node, then Hash operation is carried out using the source program that the node corresponds to program, calculate the bottom
The cryptographic Hash of node;
If the node of the non-bottom, then the node is corresponded to the source program of program and the cryptographic Hash of all nodes of next layer
It is combined, then carries out Hash operation, calculate the cryptographic Hash of the node.
Optionally, the source program of program to be processed is compiled into executable code, comprising:
The coded format of program source program is judged;
If GBK format, then the building file for executing GBK format is constructed;
If UTF-8 format, then the building file for executing UTF-8 format is constructed.
The embodiment of the invention also provides a kind of building of program version and system is checked, to realize the automatic of program version
Building and inspection, the system include:
Extraction module, for extracting the source program of program to be processed from version repository according to version sign;
Analysis module is analyzed every in executable code inventory for reading executable code inventory in self-configuring file
Calling dependence of a executable code in the source program of program to be processed forms dependency tiee;
Node computing module calculates the cryptographic Hash of each node for traversing each node in dependency tiee;
Executable code constructs module, for the source program of program to be processed to be compiled into executable code;
Writing module, the executable code for compiling the cryptographic Hash write-in of dependency tiee top mode;
It checks module, version building is checked for the cryptographic Hash using dependency tiee top mode.
Optionally, the inspection module is further used for:
It will be in compiled executable code deposit version repository;
Again the source program of program to be processed is extracted from version repository, and calculates the corresponding dependence of source program extracted again
The cryptographic Hash of relational tree top mode, if any given in the cryptographic Hash and version repository of the dependency tiee top mode hold
The corresponding cryptographic Hash of line code is consistent, then the executable code has passed through version building and checked.
Optionally, the system further include:
Display module checks inventory for creating according to inspection result, shows that version building checks knot using inspection inventory
Fruit.
Optionally, the node computing module is further used for:
Judge whether node to be processed is dependency tiee bottom node;
If bottom node, then Hash operation is carried out using the source program that the node corresponds to program, calculate the bottom
The cryptographic Hash of node;
If the node of the non-bottom, then the node is corresponded to the source program of program and the cryptographic Hash of all nodes of next layer
It is combined, then carries out Hash operation, calculate the cryptographic Hash of the node.
Optionally, the executable code building module is further used for:
The coded format of program source program is judged;
If GBK format, then the building file for executing GBK format is constructed;
If UTF-8 format, then the building file for executing UTF-8 format is constructed.
The embodiment of the present invention also provides a kind of computer equipment, including memory, processor and storage are on a memory simultaneously
The computer program that can be run on a processor, the processor realize the above method when executing the computer program.
The embodiment of the present invention also provides a kind of computer readable storage medium, and the computer-readable recording medium storage has
Execute the computer program of the above method.
In the embodiment of the present invention, by reading executable code inventory in self-configuring file, executable code inventory is analyzed
In calling dependence of each executable code in the source program of program to be processed, form dependency tiee;Traversal according to
Rely each node on relational tree, calculates the cryptographic Hash of each node;The source program of program to be processed is compiled into executable generation
Code;And the cryptographic Hash of dependency tiee top mode is adhered to the executable code of write-in compiling, while utilizing dependency tiee
The cryptographic Hash of top mode checks version building, realizes the automatic building and inspection to program version.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.In the accompanying drawings:
Fig. 1 is the flow diagram of program version building and inspection method in the embodiment of the present invention;
Fig. 2 is the schematic diagram of program version building and inspection system in the embodiment of the present invention;
Fig. 3 is a specific example figure of program version building and inspection system in the embodiment of the present invention;
Fig. 4 is a specific example figure of program version building and inspection method in the embodiment of the present invention.
Specific embodiment
Understand in order to make the object, technical scheme and advantages of the embodiment of the invention clearer, with reference to the accompanying drawing to this hair
Bright embodiment is described in further details.Here, the illustrative embodiments of the present invention and their descriptions are used to explain the present invention, but simultaneously
It is not as a limitation of the invention.
Below to the present invention relates to noun explain:
" cryptographic Hash ": by Hash operation the data conversion of random length at regular length data.
" Hash operation ": the process of cryptographic Hash is calculated by hash function.
The embodiment of the invention provides a kind of building of program version and inspection methods, as shown in Fig. 1, this method comprises:
Step 101, according to version sign, the source program of program to be processed is extracted from version repository.
Executable code inventory is read in step 102, self-configuring file, each of analysis executable code inventory can be held
Calling dependence of the line code in the source program of program to be processed forms dependency tiee.
Each node in step 103, traversal dependency tiee, calculates the cryptographic Hash of each node.
The source program of program to be processed is compiled into executable code by step 104.
Step 105, the executable code for compiling the cryptographic Hash write-in of dependency tiee top mode.
Step 106 checks version building using the cryptographic Hash of dependency tiee top mode.
The process as shown in attached drawing 1 is it is known that in embodiments of the present invention, can be performed generation by reading in self-configuring file
Code inventory analyzes calling of each executable code in executable code inventory in the source program of program to be processed and relies on pass
System forms dependency tiee;Each node in dependency tiee is traversed, the cryptographic Hash of each node is calculated;By journey to be processed
The source program of sequence is compiled into executable code;And the cryptographic Hash of dependency tiee top mode is adhered into the executable of write-in compiling
Code, while version building is checked using the cryptographic Hash of dependency tiee top mode, it realizes to program version
Automatic building and inspection.
Wherein, each node traversed in dependency tiee refers to accessing each node from bottom to top.
In order to smoothly check its correctness after compiled executable code, the Hash of dependency tiee top mode is utilized
Value checks program version building, comprising:
It will be in compiled executable code deposit version repository;
Again the source program of program to be processed is extracted from version repository, and calculates the corresponding dependence of source program extracted again
The cryptographic Hash of relational tree top mode, if any given in the cryptographic Hash and version repository of the dependency tiee top mode hold
The corresponding cryptographic Hash of line code is consistent, then the executable code has passed through version building and checked.
In order to clearly show that the inspection result of version building, the building of described program version and inspection method are also wrapped to user
It includes:
It is created according to inspection result and checks inventory, show that version constructs inspection result using inspection inventory.
In embodiments of the present invention, each node in dependency tiee is traversed, the cryptographic Hash of each node is calculated, is wrapped
It includes:
Judge whether node to be processed is dependency tiee bottom node;
If bottom node, then Hash operation is carried out using the source program that the node corresponds to program, calculate the bottom
The cryptographic Hash of node;
If the node of the non-bottom, then the node is corresponded to the source program of program and the cryptographic Hash of all nodes of next layer
It is combined, then carries out Hash operation, calculate the cryptographic Hash of the node.
Specifically, the cryptographic Hash for calculating each node in dependency tiee is step by step calculation from bottom to top, when wait count
When the non-bottom node of the node of calculation, then the cryptographic Hash of the source program and all nodes of next layer that are corresponded to program always carries out
Combination, then Hash operation is carried out, the cryptographic Hash of the node is calculated, is so recycled, until calculating dependency tiee top layer section
The cryptographic Hash of point.
In order to be well on building for different formats to program version, the source program of program to be processed is compiled into can
Execute code, comprising:
The coded format of program source program is judged;
If GBK format, then the building file for executing GBK format is constructed;
If UTF-8 format, then the building file for executing UTF-8 format is constructed.
Wherein, (GBK is the first character of " national standard ", " extension " Chinese phonetic alphabet to GBK full name " Chinese Internal Code Specification "
Mother, English name: Chinese Internal Code Specification).UTF-8(Unicode Transformation
It Format) is a kind of variable length character coding for Unicode, also known as Unicode.
In addition, the specific example of the embodiment of the present invention can be found in attached drawing 4.
Based on the same inventive concept, a kind of building of program version is additionally provided in the embodiment of the present invention and checks system, such as
Described in the following examples.Since program version constructs and check the principle that system solves the problems, such as and program version building and checks
Method is similar, and therefore, program version constructs and check that the implementation of system may refer to the reality of program version building and inspection method
It applies, overlaps will not be repeated.Used below, the software of predetermined function may be implemented in term " unit " or " module "
And/or the combination of hardware.Although system described in following embodiment is preferably realized with software, hardware or soft
The realization of the combination of part and hardware is also that may and be contemplated.
The embodiment of the invention provides a kind of building of program version and check system, as shown in Fig. 2, which includes:
Extraction module 201, for extracting the source program of program to be processed from version repository according to version sign;
Analysis module 202 is analyzed in executable code inventory for reading executable code inventory in self-configuring file
Calling dependence of each executable code in the source program of program to be processed forms dependency tiee;
Node computing module 203 calculates the cryptographic Hash of each node for traversing each node in dependency tiee;
Executable code constructs module 204, for the source program of program to be processed to be compiled into executable code;
Writing module 205, the executable code for compiling the cryptographic Hash write-in of dependency tiee top mode.
It checks module 206, version building is checked for the cryptographic Hash using dependency tiee top mode.
In embodiments of the present invention, check that module 206 is further used for:
It will be in compiled executable code deposit version repository;
Again the source program of program to be processed is extracted from version repository, and calculates the corresponding dependence of source program extracted again
The cryptographic Hash of relational tree top mode, if any given in the cryptographic Hash and version repository of the dependency tiee top mode hold
The corresponding cryptographic Hash of line code is consistent, then the executable code has passed through version building and checked.
As shown in Fig. 3, the system further include:
Display module 207 checks inventory for creating according to inspection result, shows that version building checks using inspection inventory
As a result.
In one embodiment, the node computing module 203 is further used for:
Judge whether node to be processed is dependency tiee bottom node;
If bottom node, then Hash operation is carried out using the source program that the node corresponds to program, calculate the bottom
The cryptographic Hash of node;
If the node of the non-bottom, then the node is corresponded to the source program of program and the cryptographic Hash of all nodes of next layer
It is combined, then carries out Hash operation, calculate the cryptographic Hash of the node.
In one embodiment, the executable code building module 204 is further used for:
The coded format of program source program is judged;
If GBK format, then the building file for executing GBK format is constructed;
If UTF-8 format, then the building file for executing UTF-8 format is constructed.
The embodiment of the invention also provides a kind of computer equipments, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, the processor realize the above method when executing the computer program.
The embodiment of the invention also provides a kind of computer readable storage medium, the computer-readable recording medium storage
There is the computer program for executing the above method.
In the embodiment of the present invention, executable code inventory is read in self-configuring file, is analyzed in executable code inventory
Calling dependence of each executable code in the source program of program to be processed forms dependency tiee;Traversal, which relies on, closes
Each node on system tree, calculates the cryptographic Hash of each node;The source program of program to be processed is compiled into executable code;And
By the executable code of the cryptographic Hash attachment write-in compiling of dependency tiee top mode, the automatic structure to program version is realized
It builds.
In embodiment, by checking any given executable code, it is ensured that the correctness of version building,
It improves version building and checks efficiency.Inventory is checked by being formed after checking, inspection result can be checked in order to user.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The system for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of system, the instruction system realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Particular embodiments described above has carried out further in detail the purpose of the present invention, technical scheme and beneficial effects
Describe in detail it is bright, it should be understood that the above is only a specific embodiment of the present invention, the guarantor being not intended to limit the present invention
Range is protected, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should be included in this
Within the protection scope of invention.
Claims (12)
1. a kind of program version building and inspection method characterized by comprising
According to version sign, the source program of program to be processed is extracted from version repository;
Executable code inventory is read in self-configuring file, analyzes each executable code in executable code inventory wait locate
The calling dependence in the source program of program is managed, dependency tiee is formed;
Each node in dependency tiee is traversed, the cryptographic Hash of each node is calculated;
The source program of program to be processed is compiled into executable code;
By the executable code of the cryptographic Hash write-in compiling of dependency tiee top mode;
Version building is checked using the cryptographic Hash of dependency tiee top mode.
2. the method as described in claim 1, which is characterized in that using the cryptographic Hash of dependency tiee top mode to program version
This building is checked, comprising:
It will be in compiled executable code deposit version repository;
Again the source program of program to be processed is extracted from version repository, and calculates the corresponding dependence of source program extracted again
The cryptographic Hash of treetop node layer, if any given executable generation in the cryptographic Hash and version repository of the dependency tiee top mode
The corresponding cryptographic Hash of code is consistent, then the executable code has passed through version building and checked.
3. the method as described in claim 1, which is characterized in that the method also includes:
It is created according to inspection result and checks inventory, show that version constructs inspection result using inspection inventory.
4. the method as described in claim 1, which is characterized in that each node in traversal dependency tiee calculates each section
The cryptographic Hash of point, comprising:
Judge whether node to be processed is dependency tiee bottom node;
If bottom node, then Hash operation is carried out using the source program that the node corresponds to program, calculate bottom node
Cryptographic Hash;
If the node of the non-bottom, then the cryptographic Hash of source program and all nodes of next layer that the node corresponds to program is carried out
Combination, then Hash operation is carried out, calculate the cryptographic Hash of the node.
5. the method as described in claim 1, which is characterized in that the source program of program to be processed is compiled into executable code,
Include:
The coded format of program source program is judged;
If GBK format, then the building file for executing GBK format is constructed;
If UTF-8 format, then the building file for executing UTF-8 format is constructed.
6. a kind of program version building and inspection system characterized by comprising
Extraction module, for extracting the source program of program to be processed from version repository according to version sign;
Analysis module, for reading executable code inventory in self-configuring file, each of analysis executable code inventory can
Calling dependence of the code in the source program of program to be processed is executed, dependency tiee is formed;
Node computing module calculates the cryptographic Hash of each node for traversing each node in dependency tiee;
Executable code constructs module, for the source program of program to be processed to be compiled into executable code;
Writing module, the executable code for compiling the cryptographic Hash write-in of dependency tiee top mode;
It checks module, version building is checked for the cryptographic Hash using dependency tiee top mode.
7. system as claimed in claim 6, which is characterized in that the inspection module is further used for:
It will be in compiled executable code deposit version repository;
Again the source program of program to be processed is extracted from version repository, and calculates the corresponding dependence of source program extracted again
The cryptographic Hash of treetop node layer, if any given executable generation in the cryptographic Hash and version repository of the dependency tiee top mode
The corresponding cryptographic Hash of code is consistent, then the executable code has passed through version building and checked.
8. system as claimed in claim 6, which is characterized in that further include:
Display module checks inventory for creating according to inspection result, shows that version constructs inspection result using inspection inventory.
9. system as claimed in claim 6, which is characterized in that the node computing module is further used for:
Judge whether node to be processed is dependency tiee bottom node;
If bottom node, then Hash operation is carried out using the source program that the node corresponds to program, calculate bottom node
Cryptographic Hash;
If the node of the non-bottom, then the cryptographic Hash of source program and all nodes of next layer that the node corresponds to program is carried out
Combination, then Hash operation is carried out, calculate the cryptographic Hash of the node.
10. system as claimed in claim 6, which is characterized in that the executable code building module is further used for:
The coded format of program source program is judged;
If GBK format, then the building file for executing GBK format is constructed;
If UTF-8 format, then the building file for executing UTF-8 format is constructed.
11. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor realizes any side of claim 1 to 5 when executing the computer program
Method.
12. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has perform claim
It is required that the computer program of 1 to 5 any the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811221216.5A CN109460236B (en) | 2018-10-19 | 2018-10-19 | Program version construction and checking method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811221216.5A CN109460236B (en) | 2018-10-19 | 2018-10-19 | Program version construction and checking method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109460236A true CN109460236A (en) | 2019-03-12 |
CN109460236B CN109460236B (en) | 2021-12-07 |
Family
ID=65607911
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811221216.5A Active CN109460236B (en) | 2018-10-19 | 2018-10-19 | Program version construction and checking method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109460236B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111367563A (en) * | 2020-03-06 | 2020-07-03 | 中国银行股份有限公司 | Host version merging method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170372068A1 (en) * | 2015-02-26 | 2017-12-28 | Alpha Mice Ltd. | Method to identify known compilers functions, libraries and objects inside files and data items containing an executable code |
CN108363580A (en) * | 2018-03-12 | 2018-08-03 | 平安普惠企业管理有限公司 | Application program installation method, device, computer equipment and storage medium |
CN108595186A (en) * | 2018-03-27 | 2018-09-28 | 天津麒麟信息技术有限公司 | Multiversion software management method based on total function on a kind of platform of soaring |
-
2018
- 2018-10-19 CN CN201811221216.5A patent/CN109460236B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170372068A1 (en) * | 2015-02-26 | 2017-12-28 | Alpha Mice Ltd. | Method to identify known compilers functions, libraries and objects inside files and data items containing an executable code |
CN108363580A (en) * | 2018-03-12 | 2018-08-03 | 平安普惠企业管理有限公司 | Application program installation method, device, computer equipment and storage medium |
CN108595186A (en) * | 2018-03-27 | 2018-09-28 | 天津麒麟信息技术有限公司 | Multiversion software management method based on total function on a kind of platform of soaring |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111367563A (en) * | 2020-03-06 | 2020-07-03 | 中国银行股份有限公司 | Host version merging method and device |
CN111367563B (en) * | 2020-03-06 | 2024-02-23 | 中国银行股份有限公司 | Host version merging method and device |
Also Published As
Publication number | Publication date |
---|---|
CN109460236B (en) | 2021-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9146712B2 (en) | Extensible code auto-fix framework based on XML query languages | |
CN105446725B (en) | Method and system for Mode-driven architecture | |
CN105335412A (en) | Method and device for data conversion and data migration | |
US9552348B2 (en) | System and method for operating a computer application with spreadsheet functionality | |
US20210157553A1 (en) | Source code auto-suggestion based on structural and semantic features | |
US20160321218A1 (en) | System and method for transforming image information for a target system interface | |
US20170054790A1 (en) | System and Method for Object Compression and State Synchronization | |
CN110134604A (en) | A kind of unit or interface test method, device and computer equipment without code | |
CN107797805B (en) | Code packaging method and device and computer readable storage medium | |
CN106293687B (en) | A kind of control method and device being packaged process | |
US8516457B2 (en) | Method, system and program storage device that provide for automatic programming language grammar partitioning | |
CN114077430A (en) | Interface generation method and device, electronic equipment and storage medium | |
US10387288B2 (en) | Interactive analysis of a security specification | |
US9576085B2 (en) | Selective importance sampling | |
CN112486490B (en) | Front-end code packaging method and device, electronic equipment and storage medium | |
CN112199261A (en) | Application program performance analysis method and device and electronic equipment | |
CN109460236A (en) | Program version building and inspection method and system | |
CN111124541B (en) | Configuration file generation method, device, equipment and medium | |
US20150088482A1 (en) | Simulated component connector definition and connection process | |
CN109359055A (en) | A kind of method and apparatus of data test | |
CN111539200B (en) | Method, device, medium and electronic equipment for generating rich text | |
CN114398282A (en) | Test script generation method, device, equipment and storage medium | |
CN114791885A (en) | Interface test method, device, equipment and medium | |
EP3834080B1 (en) | Static reconcilliation of application view hierarchies | |
CN112652039A (en) | Animation segmentation data acquisition method, segmentation method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |