DESTROYING AN OBJECT BASED ON THE SEQUENCE OF ACTIONS PERFORMED Russian patent published in 2021 - IPC G06F9/50 G06F12/02 

Abstract RU 2746155 C2

FIELD: information technology.

SUBSTANCE: invention relates to the field of information technology. A device that destroys objects in a reference-counted environment of a given device contains a processor and memory storing: a list of object destroying from object references to be destroyed; and a sequence of actions for destroying an object, performed by the processor on behalf of the first thread, which, in response to the release of the last reference to the object accessed by the first thread, attempts to destroy the object, and in response to failure to destroy the object, adds a new object reference to object destruction list as the last object reference; and in response to identifying for the object the last object reference added to the object destruction list by the second thread, releases the last object reference.

EFFECT: increased efficiency of destruction of an object by threads in order to return the computational resources used by the object, based on a sequence of actions that allows threads to coordinate and interact to perform complete destruction of the object.

20 cl, 12 dwg

Similar patents RU2746155C2

Title Year Author Number
METHOD AND A SERVER FOR TRANSMITTING A PERSONALIZED MESSAGE TO A USER ELECTRONIC DEVICE 2017
  • Dyachenko Yurij Igorevich
  • Kuzmin Mikhail Nikolaevich
  • Chernilevskij Denis Aleksandrovich
  • Shablinskij Evgenij Aleksandrovich
RU2739720C2
REPRESENTING COMPUTING ENVIRONMENT ON MULTIPLE DEVICES 2015
  • Threlkeld, Elizabeth Fay
  • Stauber, William Scott
  • Mikkola, Petteri
  • Moran, Keri Kruse
  • Khoury, Issa Y.
  • Davis, Darren Ray
  • Sega, Giorgio Francesco
  • Shipley, Kenton Allen
  • Balasubramanian, Ramrajprabu
  • Derks, Patrick
  • Rahman, Mohammed Kaleemur
  • Pendlay, Ryan Chandler
RU2700188C2
EVENT SERVICE FOR LOCAL CLIENT APPLICATIONS THROUGH LOCAL SERVER 2012
  • Bar-Zeev Avi
  • Kimchi Gur
  • Bekman Brajan K.
  • Ajzaks Skott
  • Ben-Itaj Mejr
  • Yariv Eran
  • I Arkas Blejz Aguera
RU2616162C2
MODIFIED MEMORY COMPRESSION 2015
  • Bek Evgenij M.
  • Ijigun Mekhmet
  • Van Lendi
  • Kishan Arun U.
RU2673694C2
PROVIDING TARGET DEVICE RESOURCE FOR RENT TO A COMPUTER ENVIRONMENT HOST DEVICE 2015
  • Khoury, Issa Y.
  • Davis, Darren Ray
  • Mikkola, Petteri
  • Threlkeld, Elizabeth Fay
  • Shipley, Kenton Allen
  • Moran, Keri Kruse
  • Balasubramanian, Ramrajprabu
  • Derks, Patrick
RU2688246C2
DELAYED SEARCH MECHANISM 2005
  • Sechrest Stjuart
  • Samsonov Evgenij A.
RU2412477C2
APPLICATION PRESENTATION HISTORY COMPONENTS SPECIFIC 2015
  • Threlkeld, Elizabeth Fay
  • Stauber, William Scott
  • Mikkola, Petteri
  • Moran, Keri Kruse
  • Khoury, Issa Y.
  • Davis, Darren Ray
  • Shipley, Kenton Allen
  • Balasubramanian, Ramrajprabu
  • Derks, Patrick
  • Pendlay, Ryan Chandler
  • Woods, David John
RU2693186C2
CONFIGURATION OF FIREWALL WITH CLIENT PARTICIPATION 2005
  • Paddon Majkl
  • Khoks Filip Majkl
  • Rouz Gregori Gordon
RU2370903C2
INDIRECT ACCESS TO DATA ELEMENTS FOR ISOLATED APPLICATIONS 2011
  • Bim Tajler K.
  • Radkhakrishnan Kavitkha
  • Karas Bendzhamin Dzh.
  • Blanch Katrina M.
  • Vong Lion
  • Kim Allen T.
  • Bol Stiven Dzh.
  • Lorajsella Dzh. Trejsi
  • Grekhem Skott B.
  • Mishra Manav
RU2602987C2
PRIORITY ACCESS TO PRIORITY ACCESS CHANNEL 2015
  • Khassan Amer A.
  • Mitchell Pol Uillyam Aleksandr
  • Khogen Todd
  • Garnett Pol V.
RU2688244C2

RU 2 746 155 C2

Authors

Stall, Jeffrey Evan

Dates

2021-04-08Published

2017-07-03Filed