Resource usage conflict identifier
First Claim
Patent Images
1. A process, comprising:
- receiving an identity of methods that expose a resource outside of a given isolation boundary that is an application domain within a managed execution environment;
evaluating a scope of resource consumption and exposure by the identified methods in the isolation boundary;
applying a contract to the identified methods for annotating; and
submitting the contracted methods for annotating based on the evaluated scope of resource method, the process being performed by a computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
The exposure and usage of one or more particular physical and logical resources by methods within an isolation boundary may be annotated so as to preempt resource usage conflicts. Further described are tools, contracts, and collaborative processes for at least identifying potential resource usage conflicts. More particularly, the example tools, contracts, and collaborative processes may be used to annotate at least one of exposure and consumption of one or more particular physical and logical resources by methods within an isolation boundary.
12 Citations
18 Claims
-
1. A process, comprising:
-
receiving an identity of methods that expose a resource outside of a given isolation boundary that is an application domain within a managed execution environment; evaluating a scope of resource consumption and exposure by the identified methods in the isolation boundary; applying a contract to the identified methods for annotating; and submitting the contracted methods for annotating based on the evaluated scope of resource method, the process being performed by a computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. At least one computer-readable medium having executable instructions that, when read, cause one or more processors to:
-
identify a first call site to expose a resource that is outside an isolation boundary that is an application domain within a managed execution environment; identify at least two methods that call a method that exposes a resource; apply a contract to the at least two methods with a corresponding scope of consumption and scope of exposure; and annotate changes of a scope of consumption and exposure for the resource relative to the isolation boundary. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
a processor; an identifier operable to identify at least one method to expose a resource related to a given isolation boundary that is an application domain within a managed execution environment; a comparator operable to compare the identified methods operable to use the resource with regard to consumption of the resource; a contractor operable to apply a contract to those of the compared methods that may conflict when attempting to use the resource; and a manager operable to gauge whether the contracted methods are to be re-submitted to the system wherein operations of the identifier, the comparator, the contractor, and the manager are performed by the processor. - View Dependent Claims (16, 17, 18)
-
Specification