Resource usage conflict identifier
First Claim
Patent Images
1. A process, comprising:
- receiving an identity of methods that expose a resource outside of a given isolation boundary;
evaluating a scope of resource consumption and exposure by the identified methods in the isolation boundary;
applying a contract to the identified methods for annotating; and
submitting the contracted methods for annotating based on the evaluated scope of resource method.
2 Assignments
0 Petitions
Accused Products
Abstract
The exposure and usage of one or more particular physical and logical resources by methods within an isolation boundary may be annotated so as to preempt resource usage conflicts.
-
Citations
20 Claims
-
1. A process, comprising:
-
receiving an identity of methods that expose a resource outside of a given isolation boundary;
evaluating a scope of resource consumption and exposure by the identified methods in the isolation boundary;
applying a contract to the identified methods for annotating; and
submitting the contracted methods for annotating based on the evaluated scope of resource method. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. At least one computer-readable medium having executable instructions that, when read, cause one or more processors to:
-
identify a first call site to expose a resource that is outside an isolation boundary;
identify at least two methods that call a method that exposes a resource;
apply a contract to the at least two methods with a corresponding scope of consumption and scope of exposure; and
annotate changes of a scope of consumption and exposure for the resource relative to the isolation boundary. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system, comprising:
-
an identifier to identify at least one method to expose a resource;
a comparator to compare the identified methods that may attempt to use the resource with regard to consumption of the resource;
a contractor to apply a contract to those of the compared methods that may conflict when attempting to use the resource; and
a manager to gauge whether the contracted methods are to be re-submitted to the system. - View Dependent Claims (18, 19, 20)
-
Specification