![]() Systems and methods for enhancing performance of software applications
专利摘要:
A system for enhancing performance of a software application obtains a list of files to be processed by the software application, and sorts that list in the order of the physical position of files in the list on a hard drive. The files are loaded in the sorted order which can decrease or minimize the total file seeking time, thereby increasing the speed of execution of the software. 公开号:AU2013227350A1 申请号:U2013227350 申请日:2013-02-28 公开日:2014-10-16 发明作者:Yuval Ben-Itzhak;Tomas Benna;Jiri Bracek;Ing. Zdenek Breitenbacher;Marian Jurik;Jaroslav Nix;Vaclav Pich;Martin Vejnar 申请人:AVG Netherlands BV; IPC主号:G06F3-06
专利说明:
WO 2013/128282 PCT/IB2013/000696 Systems and Methods for Enhancing Performance of Software Applications Cross Reference to Related Applications [00011 This application claims priority to U.S. Serial Application No. 13/407,412 filed February 28, 2012, hereby incorporated by reference in its entirety. Field of the Invention [00021 The invention relates generally to the field of improving performance of software products, and, more specifically, to systems and methods for efficiently loading files required S by a software product. Background [00031 Some software products such as anti-virus scanners, picture/video viewers, etc., process a large number of files. For example, a typical anti-virus scanner may scan all files in one or more selected folders on a hard drive of a computer or even all of the files on the hard drive. These hundreds or even thousands of files are usually loaded in the computer memory (e.g., i RAM) prior to being processed. 100041 In a typical scenario, a module of the software product requests the operating system of the computer to provide a list of files to be loaded and processed that are within a specified scope (e.g., a folder, a list of folders, a disk, etc.). The operating system returns a list of file identifiers based on the order the files are listed in a file-system database maintained by the 5 operating system. Then, the software module, with assistance from the operating system, loads the files associated with the file identifiers in the list from permanent storage (e.g., a hard drive). The software processes a file as it is loaded, or may processes a set of files after the files in the set are loaded. 100051 The overall performance of the software product generally depends not only on the 20 speed of processing the loaded files, but also on the speed of loading the files. In particular, when a large number of files are to be loaded, such as by an anti-virus software, slowly loading several files can significantly affect the overall software performance. Various known techniques, however, only improve the speed of processing of the files - not the speed with which they are loaded prior to processing. According to one method, the loading and 23 processing of files are interleaved such that the processor may analyze a previously loaded file WO 2013/128282 PCT/IB2013/000696 2 while waiting for one or nore other files to be loaded. This can increase the processor utilization, improving the overall performance of the software. These systems, however, do not improve the speed of loading of the several files, which, as described above, also adversely affects software performance. Therefore, there is a need for methods and systems for 5 addressing file loading times, thus improving the overall performance of software products requiring processing of a large number of files. Summary of the Invention [00061 In various embodiments of the present invention, the overall performance of a software product is improved by improving the speed of loading several files to be processed. This is achieved, in part, by obtaining additional information about the files from a list of file 10 identifiers provided by the operating system. The additional information may include a file size, the physical position of the file on the disk, etc. Instead of accessing and loading the files in the order listed by the operating system, the files are loaded in an order based on the additional information, such as their physical position on the disk. Doing so generally causes the disk head to move in only one direction during file access. Moreover, successive is movements of the disk head while accessing successive files may be shortened. This can significantly decrease the time taken to move the disk head to access each file, thereby significantly improving the speed of loading several files. This, in turn, can improve the overall software performance. [00071 Accordingly, in one aspect, various embodiments feature a computer-implemented 20 method for loading the files required by a software program in computer memory. The method includes obtaining a first list of file identifiers, each being associated with a respective file, and sorting the first list based on a first attribute of each of the associated files. The method also includes selecting, in sorted order, a file identifier in the soiled first list and loading the file associated with the selected file identifier. The selecting and loading steps are repeated until 25 each file identifier in the sorted first list is selected, and the associated file is loaded. [00081 The application program may include one or more of a virus scanner, a spyware scanner, an ad-ware scanner, a malware scanner, a backup program, a multicopy program, a compiler, and a data-mining program. In some embodiments, the file identifier includes a file entry in a directory record, and the first attribute may include location of files associated with 30 the file identifiers. The location may be a cluster location. WO 2013/128282 PCT/IB2013/000696 3 [00091 In sore embodiments, obtaining the first list of file identifiers includes receiving a second list of the file identifies. For each file identifier in the second list (i) a second attribute of a file associated with the file identifier is compared with a pre-determined threshold, and (ii) based on the comparison, the file identifier is selectively added to the first list. The second 5 attribute nay include file size and the threshold may be, for example, one Kbyte. [00101 In some embodiments, the loaded files are analyzed and the analyzing step may include scanning the loaded file for at least one of virus, spyware, adware, and malware. The analyzing step may also include copying the file to another memory location, through a network or directly, compiling the file, and/or extracting information from the file. 10 [00111 In some embodiments, the software program is a boot program, and obtaining the first list of file identifies includes recording, during a prior execution of the boot program, each file loaded in the computer memory. Obtaining the first list further includes storing a file identifier corresponding to the loaded file in the first list of file identifiers, storing the first list on a non volatile memory (e.g., a hard disk, flash memory, etc.), and accessing the stored first list during a subsequent execution of the boot program. The loading step may include storing the files in a cache memory, and the method may further include accessing the files from the cache memory, and analyzing the accessed files. 100121 In another aspect, various embodiments feature another computer-implemented method for loading, in computer memory, files required by a software program. The method includes 20 receiving a first list of file identifies, each being associated with a respective file. For each file identifier in the first list (i) a first attribute of the associated file is compared with a pre determined threshold, and (ii) based on the comparison, that file identifier is selectively added to a second list. The method also includes sorting the second list based on a second attribute of the files associated with the file identifiers in the second list, selecting, in sorted order, a file 25 identifier in the sorted second list, and loading the file associated with the selected file identifier. The selecting and loading steps are repeated until each file identifier in the sorted second list is selected. [00131 In another aspect, various embodiments feature a system for enhancing performance of a software program. The system includes a sorter module for (i) obtaining a first list of file 30 identifiers, each being associated with a respective file, and (ii) sorting the first list based on a first attribute of each of the associated files. The system also includes a loader module for selecting, in sorted order, each file identifier in the sorted first list, and loading the file WO 2013/128282 PCT/IB2013/000696 4 associated with the selected file identifier. The application program may include one or more of a virus scanner, a spyware scanner, an ad-ware scanner, a malware scanner, a backup program, a multicopy program, a compiler, and a data--mining program. 100141 In some embodiments, the file identifier includes a file entry in a directory record, and 5 the first attribute may include location of files associated with the file identifiers. The location may include a cluster location. The sorter module may be configured to receive a second list of the file identifies, and for each file identifier in the second list (i) to compare a second attribute of a file associated with the file identifier with a pre-determined threshold, and (ii) based on the comparison, to add selectively the file identifier to the first list. The second attribute may 10 include file size and the threshold may be, e.g., one Kbyte. 100151 In some embodiments, the system further comprises an analyzer for analyzing the loaded file. The analyzer may be configured to scan the loaded file for at least one of virus, spyware, adware, and malware. The analyzer may also be configured to copy the file to another memory location, through a network or directly, compile the file, and/or to extract information from the file. 10016] In some embodiments, the software program is a boot program, and the sorter module is configured to record, during a prior execution of the boot program, each file loaded in the computer memory. The sorter module is also configured to store a file identifier corresponding to the loaded file in the first list of file identifiers, to store the first list on a non-volatile 20 memory (e.g., hard-disk, flash memory, etc.), and to access the stored first list during a subsequent boot operation. In some embodiments, the system comprises an analyzer module, and the loader module is configured to store the files in a cache memory. The analyzer module is configured to access the files from the each,e memory, and to analyze the accessed files. 100171 In another aspect, various embodiments feature another system for enhancing 25 performance of a software program. The system includes a sorter module to receive a first list of file identifies, each being associated with a respective file. For each file identifier in the first list, the sorter module: (a) compares a first attribute of the associated file with a pre-determined threshold, and (b) based on the comparison, selectively adds that file identifier to a second list. Moreover, the sorter module sorts the second list based on a second attribute of the files 30 associated with the file identifiers in the second list. The system includes a loader module for selecting, in sorted order, each file identifier in the sorted second list, and for loading the file associated with the selected file identifier. WO 2013/128282 PCT/IB2013/000696 5 [00181 Other aspects and advantages of the invention will become apparent from the following drawings, detailed description, and claims, all of which illustrate the principles of the invention, by way of example only. Brief Description Of the Drawings [00191 In the drawings, like reference characters generally refer to the same parts throughout 5 the different views. Also, the drawings are not necessarily to scale, emphasis instead generally being placed upon illustrating the principles of the invention. [00201 FIG. 1 schematically illustrates a conventional systern for loading several files; 100211 FIG 2 schematically illustrates a system for efficiently loading several files according to one embodiment; 10 [00221 FIG. 3 illustrates a process for loading several files according to one embodiment; [00231 FIG. 4 illustrates another process for loading several files according to another embodiment; and [00241 FIG. 5 schematically depicts a system for efficiently loading files according to one embodiment. Detailed Description is 100251 A computer hard drive typically includes mechanical parts such as several rotating magnetic disks and one or more read/write heads that access the disks. Data representing the various files used by the computer are stored in cylindrical tracks on one of the magnetic disks. Before the file data can be accessed, i.e., read and/or written, the disk head is moved to a location over the track where that file (or portion of the file) is located. The disk-head 20 movement takes some time, typically on the order of 3 - 12 ms on an average per file access, depending on the size and quality of the disk drive. In fact, the seek tinte, i.e., the time required to position the disk head at a required location, is often a significant bottleneck of accessing and loading files. 100261 In general, there is no correlation between the physical position of a file on the hard 25 disk and the position of its record (i.c., the entry of the file identifier) in the file system database. As a result, in a conventional system in which numerous files are accessed in the order of their record in the file-system database, the disk head typically moves back and forth in a far from optional manner. For example, FIG. I depicts a list 102 of file identifiers associated with the files to be accessed. In order to access file , the disk head 104 is moved 30 forward from its current location on track 112 to track 114. Then, to access file 2, the disk head WO 2013/128282 PCT/IB2013/000696 6 104 is moved backward to track 116. Finally, the disk head is moved to track 118, to access file 3. While accessing a large number of files, such back and forth movements can add a significant delay to the file loading process. 100271 With reference to FIG. 2, in an exemplary system 200 according to one embodiment, 5 the file identifiers in the list 102 are sorted according to the physical positions of the associated files on the disk, resulting in a sorted list 206. The information about the physical positions of the files is typically provided by the operating system from a file-system database. From the sorted list 206, file 2 is accessed first, so that the disk head 104 moves front its current location on track 112 to track 116. Subsequently, to access file 3, the disk head 104 is moved to track 10 118, and then to track 114, to access file 1. Thus, the disk head 104 is moved only in the forward direction. Moreover, during a series of consecutive file accesses, the total distance by which the disk head 104 is rnoved is minimized because the files are accessed in the order of their physical position. Therefore, the system 200 minimizes the total seek time, which can minimize the time required to load several files to be processed. 15 [00281 With reference to FIG. 3, in step 302 the file-system database entries of one or more specified folders are browsed using "FindFirstFile"/"FindNextFile" functions commonly provided by the operating system. These functions enable iterating over the files located in permanent storage, by providing a list of file identifiers that are also stored in the file-system database. One file is associated with each file identifier, and as such, this first list includes the 20 file identifiers associated with all of the files to be processed by the software. [00291 For each file identifier in the list, in step 304 the size of the associated file is compared with a certain threshold (e~g., 1 Kbyte). A file smaller in size than the threshold may not be stored on the hard drive, and instead, may be stored in the directory record (e.g. a Master File Table (MFT) record) in the file-system database maintained by the operating system. 25 Therefore, such a file is processed immediately in step 306, because the time to seek that file is not related to disk-head movement. In other alternative implementations, the files that are below this size threshold may be retrieved subsequent to retrieving the larger files from the disk. [00301 Any file that is larger than the threshold is stored somewhere on the hard drive. In step 30 308, the file identifier associated such a file is stored in a second list. Various other file parameters, such as the volume handle, the unique file id, and the file start position (cluster) are WO 2013/128282 PCT/IB2013/000696 7 also stored and associated with the file identifier in the second list. The steps 302, 304, and the step 306 or 308 are repeated until all of the file identifiers in the first list have been analyzed. 100311 In step 310, the second list of file identifiers is soiled based on the starting cluster of the associated files. The starting cluster represents the physical position of a file on the hard drive. 5 In step 312, a file identifier is selected from the sorted second list in order, i.e., in the order of the physical position of the associated file, and is loaded in computer memory using standard functions provided by the operating system. The full path of the file to determine its location may be obtained using information stored in the second list. 100321 The loaded file is analyzed in step 314. The specific analysis performed depends on the 0 overall functionality of the software product. For example, a virus/malware scanner may scan the loaded file for virus, adware, malware, spyware etc. Similarly, a photo-viewer may display an image in the file in a photo album. A file transfer, backup, and/or multicopy program may copy the file to a new location on the disk drive or to another computer over a network. Compilers and data-mining software products may also access a large number of files. The 5 steps 312, 314 are repeated for all of the file identifiers in the sorted second list. In some embodiments, all or a subset of files are loaded in the memory and then the loaded files are analyzed. As described above with reference to FIG. 2, because the files are loaded in the order of their physical position on the hard drive according to process 300, unnecessary disk-head movements are avoided or mitigated, which can substantially decrease the time required to load 20 several files to be processed by the software product. [00331 In an exemplary process 400 described with reference to FIG. 4, the files to be processed by the software are not specified in terms of one or more folders or a disk. As the software begins to execute, in step 402, a check is performed to determine if a list of files required by the software exists, and if the list is up to date. If the list does not exist or is not up 25 to date, each file loaded during the initialization and/or execution of the software is recorded in step 404. The list is stored for subsequent use before the software application terminates, [00341 During a subsequent execution of the software, the list of required files may be found in step 402. In step 406, that list is sorted in the order of the physical positions of the files. The information about the physical position of a file may be obtained from the operating system 30 using a unique file identifier associated with the file. Then in step 408, the files in the sorted list are loaded in order and may be stored in cache memory. The execution of the software (e.g., the boot component of the operating system) is suspended during the steps 406 and 408 WO 2013/128282 PCT/IB2013/000696 8 while the required files are loaded. When execution of the software continues, the required files are accessed from the cache memory. Once again, the process 400 enhances software performance by decreasing or minimizing the total time required to load all of the files needed by the software, because the files are loaded in the order of their physical position on the hard 5 drive, thereby avoiding unnecessary disk-head movements. [00351 Referring to FIG. 5. a hardware/software system 500 includes a computer 502 having a processor 504, a hard drive 506, main rnemory 508, and cache memory 510. The computer 502 also includes an operating system (OS) 512 that includes a file-system database 514 and an os file-loader 516 to access files from the hard drive 506. Moreover, the system 500 includes a 10 software application 520 vhich includes a sorter module 522. a loader module 524, and a file analyzer 526. [00361 The sorter module 522 receives a list of file identifiers associated with the files to be processes by the application 520 from the file-system database 514. Alternatively, the sorter module 522 can record the files processed by the software 520 and store a list of those files. 15 Generally, the files are located on the hard drive 506, but some small files rnay be located in a table maintained by the file-systen database 514. 100371 The sorter module 522 optionally stores and sorts a list of file identifiers selected from the first list received or generated by the sorter module 522. Then, using the os-file-loader 516 the loader module 524 loads the files in the sorted order, as described with reference to FIGS. 3 20 and 4. These files are accessed from the hard drive 506 and may be stored in the main memory 508 or the cache memory 510. The file analyzer module 526 processes the files in the cache and/or main memories using the processes or 504. 100381 Each functional component described above (e.g., the sorter ntodule, the loader module, and the file-analyzer module) may be implemented as stand-alone software components or as a 25 single functional module. In some embodiments the components may set aside portions of a computer's random access memory to provide control logic that affects the interception, scanning and presentation steps described above. In such an embodiment, the program or programs may be written in any one of a number of high-level languages, such as FORTRAN, PASCAL, C, C-+, C#, Java, Tel, PERL, or BASIC. Further, the program can be written in a 30 script, macro, or functionality embedded it commercially available software, such as EXCEL or VISUAL BASIC. WO 2013/128282 PCT/IB2013/000696 9 [00391 Additionally, the software may be implemented in an assembly language directed to a microprocessor resident on a computer. For example, the software can be implemented in Intel 80x86 assembly language if it is configured to run on an IBM PC or PC clone. The software may be embedded on an article of manufacture including, but not limited to, computer-readable 5 program means such as a floppy disk, a hard disk, an optical disk, a magnetic tape, a PROM, an EPROM, or CD-ROM. [00401 The invention can be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The foregoing embodiments are therefore to be considered in all respects illustrative rather than limiting on the invention described herein. 1 [00411 What is claimed is:
权利要求:
Claims (1) [1] 16. The system of claim 13, wherein the first attribute comprises location of files associated 2 with the file identifiers. 1. The system of claim 4, wherein the location comprises a cluster location. 18, The method of claim 13, wherein the sorter module is configured to: 2 receive a second list of the file identifies; and 3 for each file identifier in the second list (i) to compare a second attribute of a file 4 associated with the file identifier with a pre-determnined threshold, and (ii) based on the S comparison, to add selectively the file identifier to the first list. 1 19. The system of claim 18, wherein the second attribute comprises file size and the 2 threshold is one Kbyte. 1 20. The system of claim 13, further comprising an analyzer for analyzing the loaded file. 1 21. The system of claim 20, wherein the analyzer is configured to scan the loaded file for at 2 least one of virus, spyware, adware, and malware. 1 22. The system of claim 13, wherein the software program is a boot program, and the sorter 2 module is configured to: 3 record, during a prior execution of the boot program, each file loaded in the computer 4 memory; 5 store a file identifier corresponding to the loaded file in the first list of file identifiers; 6 store the first list on a non-volatile memory and 7 access the stored first list. 1 23. The system of claim 13, further comprising an analyzer module wherein: WO 2013/128282 PCT/IB2013/000696 13 2 the loader module is configured to store the files in a cache memory: and the analyzer module is configured to access the files from the cache memory, and to 4 analyze the accessed files. 1 24. A system for enhancing performance of a software program, the system comprising: 2 a sorter module to: 3 (i) receive a first list of file identifies, each being associated with a respective 4 file: (i) for each file identifier in the first list (a) compare a first attribute of the 6 associated file with a pre-determined threshold, and (b) based on the comparison, selectively 7 add that file identifier to a second list; 8 sort the second list based on a second attribute of the files associated with the 9 file identifiers in the second list; and 0 a loader module for selecting, in soiled order, each file identifier in the sorted second list, 11 and loading the file associated with the selected file identifier.
类似技术:
公开号 | 公开日 | 专利标题 JP6221086B2|2017-11-01|System operating system boot, prefetch controller, storage device, method, program, and computer-readable recording medium performed using prefetch technology US20060037079A1|2006-02-16|System, method and program for scanning for viruses EP1654646B1|2007-02-28|A method, apparatus and computer program for processing a queue of messages US20090132621A1|2009-05-21|Selecting storage location for file storage based on storage longevity and speed CN103620550A|2014-03-05|Virtual machine image analysis US7793266B2|2010-09-07|Method, apparatus and computer program product for optimizing access to the content of a virtual application container on a fixed, read-only medium US20120102276A1|2012-04-26|Storing Corresponding Data Units in a Common Storage Unit US9110595B2|2015-08-18|Systems and methods for enhancing performance of software applications US10353636B2|2019-07-16|Write filter with dynamically expandable overlay US7668875B2|2010-02-23|Data storage device, method of rearranging data and recording medium therefor US7143399B2|2006-11-28|Method and apparatus for prefetching memory pages during execution of a computer program US20130276117A1|2013-10-17|Method and apparatus for detecting a malware in files CN103810009A|2014-05-21|Method and device for accelerating starting of computer operating system JPH05241931A|1993-09-21|Method and device for managing access to computer system and US9031909B2|2015-05-12|Provisioning and/or synchronizing using common metadata US7793265B2|2010-09-07|Method, apparatus and computer program product for optimizing file accesses for an application executing in a virtual container US8464237B1|2013-06-11|Method and apparatus for optimizing compilation of a computer program CN110515958A|2019-11-29|Data consistency method, apparatus, equipment and storage medium based on big data KR102119832B1|2020-06-16|Methods and devices for accelerated execution of applications US20070203877A1|2007-08-30|Intermediate cache utility for file system access JP5613252B2|2014-10-22|Apparatus and method for efficiently restoring data from sequential access backup archive US20210034580A1|2021-02-04|Method, apparatus and computer program product for maintaining metadata JP4223228B2|2009-02-12|Database search apparatus and search method Liu et al.2016|Hitchhike: An i/o scheduler enabling writeback for small synchronous writes CN114063922A|2022-02-18|Method, device, equipment and medium for accelerating replication of master and slave library streams
同族专利:
公开号 | 公开日 EP2817707A1|2014-12-31| WO2013128282A1|2013-09-06| IL234302A|2018-01-31| US9110595B2|2015-08-18| HK1205309A1|2015-12-11| US20130227544A1|2013-08-29|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US1021920A|1908-10-08|1912-04-02|Dean Electric Co|Telephone-receiver.| US1020922A|1908-10-28|1912-03-19|American Rotary Valve Company|Valve.| US1022512A|1911-01-19|1912-04-09|Grant Sipp|Tension device.| AU5634086A|1985-05-06|1986-11-13|Wang Laboratories, Inc.|Information processing system with enhanced instruction execution and support control| US5124538B1|1988-08-26|1995-01-31|Accu Sort Systems Inc|Scanner| US5345575A|1991-09-26|1994-09-06|Hewlett-Packard Company|Write optimized disk storage device| US6073232A|1997-02-25|2000-06-06|International Business Machines Corporation|Method for minimizing a computer's initial program load time after a system reset or a power-on using non-volatile storage| WO1999015953A1|1997-09-24|1999-04-01|Sony Pictures Entertainment, Inc.|Optimizing scheduler for read/write operations in a disk file system| US6256728B1|1997-11-17|2001-07-03|Advanced Micro Devices, Inc.|Processor configured to selectively cancel instructions from its pipeline responsive to a predicted-taken short forward branch instruction| US6226422B1|1998-02-19|2001-05-01|Hewlett-Packard Company|Voice annotation of scanned images for portable scanning applications| US6606617B1|1998-09-24|2003-08-12|International Business Machines Corporation|Optimized technique for prefetching LOB table space pages| US6751780B1|1998-10-01|2004-06-15|Hewlett-Packard Development Company, L.P.|User interface for initiating the export of an optimized scanned document using drag and drop| US6442682B1|1999-02-18|2002-08-27|Auspex Systems, Inc.|Characterization of data access using file system| US6633968B2|1999-03-30|2003-10-14|Microsoft Corporation|Pre-fetching of pages prior to a hard page fault sequence| US6081799A|1999-05-05|2000-06-27|International Business Machines Corporation|Executing complex SQL queries using index screening for conjunct or disjunct index operations| US7181438B1|1999-07-21|2007-02-20|Alberti Anemometer, Llc|Database access system| US6601167B1|2000-01-14|2003-07-29|Advanced Micro Devices, Inc.|Computer system initialization with boot program stored in sequential access memory, controlled by a boot loader to control and execute the boot program| US6748534B1|2000-03-31|2004-06-08|Networks Associates, Inc.|System and method for partitioned distributed scanning of a large dataset for viruses and other malware| US6850653B2|2000-08-08|2005-02-01|Canon Kabushiki Kaisha|Image reading system, image reading setting determination apparatus, reading setting determination method, recording medium, and program| US7116439B2|2000-08-31|2006-10-03|Kyocera Mita Corporation|Scanner system and scanner driver| US6574713B1|2000-10-10|2003-06-03|Sun Microsystems, Inc.|Heuristic for identifying loads guaranteed to hit in processor cache| US6671774B1|2000-11-10|2003-12-30|Emc Corporation|Method and apparatus for performing swap analysis| EP1229433A1|2001-01-31|2002-08-07|Hewlett-Packard Company|File sort for backup| US7506374B2|2001-10-31|2009-03-17|Computer Associates Think, Inc.|Memory scanning system and method| US6675280B2|2001-11-30|2004-01-06|Intel Corporation|Method and apparatus for identifying candidate virtual addresses in a content-aware prefetcher| US20030115479A1|2001-12-14|2003-06-19|Jonathan Edwards|Method and system for detecting computer malwares by scan of process memory after process initialization| US7065790B1|2001-12-21|2006-06-20|Mcafee, Inc.|Method and system for providing computer malware names from multiple anti-virus scanners| US7266843B2|2001-12-26|2007-09-04|Mcafee, Inc.|Malware scanning to create clean storage locations| US7000077B2|2002-03-14|2006-02-14|Intel Corporation|Device/host coordinated prefetching storage system| US7359890B1|2002-05-08|2008-04-15|Oracle International Corporation|System load based adaptive prefetch| US7054888B2|2002-10-16|2006-05-30|Microsoft Corporation|Optimizing media player memory during rendering| US6981099B2|2002-12-16|2005-12-27|Sun Microsystems, Inc.|Smart-prefetch| US20040158730A1|2003-02-11|2004-08-12|International Business Machines Corporation|Running anti-virus software on a network attached storage device| US7607000B1|2003-05-13|2009-10-20|Apple Inc.|Method for booting an operating system| JP3973597B2|2003-05-14|2007-09-12|株式会社ソニー・コンピュータエンタテインメント|Prefetch instruction control method, prefetch instruction control device, cache memory control device, object code generation method and device| US7549055B2|2003-05-19|2009-06-16|Intel Corporation|Pre-boot firmware based virus scanner| US7495793B2|2003-10-01|2009-02-24|Seiko Epson Corporation|Image processing method, image processing apparatus, and print apparatus that uses image data recorded on an image record medium| US7139909B2|2003-10-16|2006-11-21|International Business Machines Corporation|Technique for system initial program load or boot-up of electronic devices and systems| US7424467B2|2004-01-26|2008-09-09|International Business Machines Corporation|Architecture for an indexer with fixed width sort and variable width sort| US20050216759A1|2004-03-29|2005-09-29|Rothman Michael A|Virus scanning of input/output traffic of a computer system| US7380725B2|2004-06-26|2008-06-03|Mcgill Randy|Enterprise-wide networked system and method for managing and displaying price and product information| US7581253B2|2004-07-20|2009-08-25|Lenovo Pte. Ltd.|Secure storage tracking for anti-virus speed-up| US7437504B2|2004-07-23|2008-10-14|International Business Machines Corporation|Reading a storage medium| US7672003B2|2004-09-01|2010-03-02|Eric Morgan Dowling|Network scanner for global document creation, transmission and management| US7760654B2|2004-09-24|2010-07-20|Microsoft Corporation|Using a connected wireless computer as a conduit for a disconnected wireless computer| US7441273B2|2004-09-27|2008-10-21|Mcafee, Inc.|Virus scanner system and method with integrated spyware detection capabilities| US7434261B2|2004-09-27|2008-10-07|Microsoft Corporation|System and method of identifying the source of an attack on a computer network| US7765400B2|2004-11-08|2010-07-27|Microsoft Corporation|Aggregation of the knowledge base of antivirus software| US7949665B1|2004-11-19|2011-05-24|Symantec Corporation|Rapidly traversing disc volumes during file content examination| US7937263B2|2004-12-01|2011-05-03|Dictaphone Corporation|System and method for tokenization of text using classifier models| US7680791B2|2005-01-18|2010-03-16|Oracle International Corporation|Method for sorting data using common prefix bytes| US7836504B2|2005-03-01|2010-11-16|Microsoft Corporation|On-access scan of memory for malware| JP4151977B2|2005-03-16|2008-09-17|インターナショナル・ビジネス・マシーンズ・コーポレーション|Prefetching device, prefetching method, and prefetching program| US7568233B1|2005-04-01|2009-07-28|Symantec Corporation|Detecting malicious software through process dump scanning| US7788650B2|2005-05-10|2010-08-31|Intel Corporation|Compiler-based critical section amendment for a multiprocessor environment| US7861296B2|2005-06-16|2010-12-28|Microsoft Corporation|System and method for efficiently scanning a file for malware| US20060294356A1|2005-06-27|2006-12-28|Xipkey, Inc.|Apparatus and method of an executable-in-place flash device| US7647636B2|2005-08-24|2010-01-12|Microsoft Corporation|Generic RootKit detector| US8572371B2|2005-10-05|2013-10-29|Ca, Inc.|Discovery of kernel rootkits with memory scan| US7845008B2|2005-12-07|2010-11-30|Lenovo Pte. Ltd.|Virus scanner for journaling file system| GB0525871D0|2005-12-20|2006-02-01|Symbian Software Ltd|Malicious software detecting in a computing device| US7609564B2|2005-12-31|2009-10-27|Intel Corporation|Systems and techniques for non-volatile memory buffering| JP4915774B2|2006-03-15|2012-04-11|株式会社日立製作所|Storage system and storage system control method| TWI313558B|2006-05-22|2009-08-11|Peng Chien Chian|| US20070294767A1|2006-06-20|2007-12-20|Paul Piccard|Method and system for accurate detection and removal of pestware| US8087084B1|2006-06-28|2011-12-27|Emc Corporation|Security for scanning objects| US20080005797A1|2006-06-30|2008-01-03|Microsoft Corporation|Identifying malware in a boot environment| US7669044B2|2006-09-29|2010-02-23|Microsoft Corporation|Accelerated system boot| US20080086290A1|2006-10-04|2008-04-10|Wilson Ian A|Method for modeling task and workload| US20080155339A1|2006-10-25|2008-06-26|Gary S Lowe|Automated tracing| US8091134B2|2006-11-29|2012-01-03|Lenovo Pte. Ltd.|System and method for autonomic peer-to-peer virus inoculation| JP5068552B2|2007-02-02|2012-11-07|ルネサスエレクトロニクス株式会社|Prefetch method and cache mechanism unit| US20080195676A1|2007-02-14|2008-08-14|Microsoft Corporation|Scanning of backup data for malicious software| US20080209198A1|2007-02-26|2008-08-28|Majni Timothy W|Boot Acceleration For Computer Systems| US8316265B2|2007-03-04|2012-11-20|Mentor Graphics Corporation|Test pattern generation for diagnosing scan chain failures| US7778983B2|2007-03-06|2010-08-17|Microsoft Corporation|Application migration file scanning and conversion| CN101682621B|2007-03-12|2014-07-09|思杰系统有限公司|Systems and methods for cache operations| US7584294B2|2007-03-12|2009-09-01|Citrix Systems, Inc.|Systems and methods for prefetching objects for caching using QOS| EP2137624A4|2007-03-16|2012-10-31|Bby Solutions Inc|Improved boot in a media player with external memory| JP5032210B2|2007-06-08|2012-09-26|株式会社日立製作所|Control computer, computer system, and access control method| US8959639B2|2007-06-18|2015-02-17|Symantec Corporation|Method of detecting and blocking malicious activity| JP2009020765A|2007-07-12|2009-01-29|Hitachi Computer Peripherals Co Ltd|Read/write method and computer system using the read/write method| US20090089396A1|2007-09-27|2009-04-02|Yuxi Sun|Integrated Method of Enabling a Script-Embedded Web Browser to Interact with Drive-Based Contents| US8255631B2|2008-02-01|2012-08-28|International Business Machines Corporation|Priority-based prefetch requests scheduling and throttling| US8185701B2|2008-02-05|2012-05-22|International Business Machines Corporation|System and method for an adaptive list prefetch| JP4795378B2|2008-04-01|2011-10-19|レノボ・シンガポール・プライベート・リミテッド|Computer and boot method| US7975025B1|2008-07-08|2011-07-05|F5 Networks, Inc.|Smart prefetching of data over a network| GB2461870B|2008-07-14|2012-02-29|F Secure Oyj|Malware detection| US8935789B2|2008-07-21|2015-01-13|Jayant Shukla|Fixing computer files infected by virus and other malware| JP2010074604A|2008-09-19|2010-04-02|Nec Corp|Data access system, data access method and data access program| US20100083381A1|2008-09-30|2010-04-01|Khosravi Hormuzd M|Hardware-based anti-virus scan service| US8087081B1|2008-11-05|2011-12-27|Trend Micro Incorporated|Selection of remotely located servers for computer security operations| TR200809433A2|2008-12-05|2010-06-21|Vestel Elektroni̇k Sanayi̇ Ve Ti̇caret A.Ş.|Dynamic caching method and system for metadata| GB0822619D0|2008-12-11|2009-01-21|Scansafe Ltd|Malware detection| US20100169972A1|2008-12-31|2010-07-01|Microsoft Corporation|Shared repository of malware data| US9348842B2|2009-03-23|2016-05-24|Riverbed Technology, Inc.|Virtualized data storage system optimizations| JP2010237837A|2009-03-30|2010-10-21|Nec Corp|File system, and data rearrangement method and program therefor| US20100269032A1|2009-04-15|2010-10-21|Microsoft Corporation|Advanced text completion, such as for markup languages| US8230208B2|2009-04-20|2012-07-24|Intel Corporation|Booting an operating system of a system using a read ahead technique| US8745743B2|2009-06-09|2014-06-03|F-Secure Oyj|Anti-virus trusted files database| CA2680601C|2009-10-16|2010-11-02|Ibm Canada Limited - Ibm Canada Limitee|Managing multiple speculative assist threads at differing cache levels| US8918874B2|2010-05-25|2014-12-23|F-Secure Corporation|Malware scanning| US9336263B2|2010-06-04|2016-05-10|Yale University|Data loading systems and methods| US20120159066A1|2010-12-17|2012-06-21|Sorana Rabinovici|System and method for performing contiguous disk read on pseudo-contiguous data blocks within a database management system|GB2504122A|2012-07-19|2014-01-22|Ibm|Locating software units of a software module to facilitate software refactoring| CN104021160B|2014-05-26|2018-06-01|北京金山安全软件有限公司|A kind of client data method for cleaning and device| CN104021159B|2014-05-26|2017-07-28|北京金山安全软件有限公司|A kind of client file method for cleaning and device| CN105988799B|2015-02-12|2020-07-17|Oppo广东移动通信有限公司|Method and server for managing software store pages|
法律状态:
2017-01-19| MK1| Application lapsed section 142(2)(a) - no request for examination in relevant period|
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US13/407,412|US9110595B2|2012-02-28|2012-02-28|Systems and methods for enhancing performance of software applications| US13/407,412||2012-02-28|| PCT/IB2013/000696|WO2013128282A1|2012-02-28|2013-02-28|Systems and methods for enhancing performance of software applications| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|