FIELD: methods for linking (assembling) software.
SUBSTANCE: software module creates in random-access memory a binary matrix of pointers at module functions, which are assembled in form of individual files, with their following loading into the program being executed. On call of function from module N, where K - number of function in the module, control is transferred to function positioned at address in the matrix in N row, K column, while the module, containing an error, is reloaded after introduction of necessary changes to source code of algorithm, with following compilation and reloading of newer version of the module over the previous one. Functions of new module are set in such a way, that with their usage a decision is taken whether the function of newer or older module should be executed, or decision stating which script-file, executing corresponding function, should be executed by corresponding script-machine.
EFFECT: economy of developer time, possible introduction of changes to an already started system without restart.
12 dwg
Title | Year | Author | Number |
---|---|---|---|
DYNAMIC INSTRUMENTATION TECHNIQUE | 2008 |
|
RU2390821C1 |
SYSTEM AND METHOD OF DISTRIBUTED COMPUTATIONS | 2010 |
|
RU2554509C2 |
TRAFFIC CLASSIFICATION SYSTEM | 2018 |
|
RU2697648C2 |
CACHING RUNTIME GENERATED CODE | 2009 |
|
RU2520344C2 |
SYSTEMS AND METHODS FOR CONTROLLING DRIVERS IN A COMPUTER SYSTEM | 2002 |
|
RU2304305C2 |
PROJECTION OF OWN APPLICATION PROGRAMMING INTERFACES OF OPERATING SYSTEM INTO OTHER LANGUAGES | 2011 |
|
RU2598600C2 |
RUNTIME SYSTEM | 2011 |
|
RU2601198C2 |
CONTROL SYSTEM FOR QUANTUM COMPUTING DEVICES | 2023 |
|
RU2814936C1 |
PROGRAM CONSTRUCTION METHOD | 2008 |
|
RU2406112C2 |
METHOD AND SYSTEM FOR SECURITY POLICY EMBODIMENT USING VIRTUAL SECURITY MACHINE | 2005 |
|
RU2390837C2 |
Authors
Dates
2007-09-20—Published
2005-10-04—Filed