Brain Child Learning Center
Manager
University of Washington Department of Recreational Sports Aug 2006 - Sep 2007
Customer Service Representative
Brain Child Learning Center Aug 2006 - Sep 2007
Manager and Teacher
The Seattle Times Jun 2002 - Jun 2004
Sales Representative
Education:
University of Washington 2003 - 2007
Bachelors, Bachelor of Arts, Economics
Skills:
Customer Service Microsoft Office Microsoft Excel Project Management Leadership Teaching Powerpoint
Benjamin W. Bradley - Seattle WA, US Calvin Hsia - Redmond WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 12/02
US Classification:
711170, 711E12006
Abstract:
Memory leak detection can be automated by assigning and recording an increasing sequence number to each memory allocation requested by an action. Call stacks associated with the action are also recorded. Several repetitions of the action can be executed. Allocations that occur in each action and that have similar or matching callstacks are defined as leaks. Allocations that do not have matches can be ignored.
The subject disclosure relates to tracking and/or auditing memory allocations for one or more computer-implemented processes. In particular, memory allocation commands as well as memory free commands, both native and managed, can be intercepted. As such, a tag can be created that can be associated with a particular memory allocation. This tag can include various information that can more robustly describe the current state of system memory. Moreover, the tag can be deleted as an associated memory free command is received. Thus, as memory is freed and therefore no longer relevant to the current state of system memory, such does not clutter present examination.
The subject disclosure relates to analyzing memory allocations for one or more computer-implemented processes. In particular, in conjunction with employing tags for tracking memory allocation commands, currently allocated memory can be examined for various characteristics of inefficient memory use. For example, as memory is initially allocated, a predetermined bit pattern can be written to the newly allocated memory. Thus, detection of the predetermined bit pattern can be indicative of wasted memory use. Moreover, additional features can be provided to both analyze data and present views associated with that analysis relating to identification of memory fragmentation, over-allocation, sparse memory use, duplication of allocations, multiple module loads, and so forth.
Lisa Feigenbaum - Bellevue WA, US Ernest Tong - Redmond WA, US Calvin Hsia - Redmond WA, US Jay Schmelzer - Seattle WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 3/048
US Classification:
715780
Abstract:
In a data entry environment constrained by a symbolic grammar, a data entry position in the data set may be amenable to the insertion of a subset of symbols in compliance with the grammar. Also, the grammar may or may not permit the insertion of a value of one or more types at the data entry position of the data set. In order to facilitate grammatically correct data entry, a symbol list may be presented that indicates the grammatically valid symbols for the symbolic context of the data entry position, as well as the validity of the insertion of a value at the data entry position. The symbol list may also permit the selection of a symbol list option, and may insert the selected symbol or value at the data entry position. Various symbol list option selection inputs may be associated with the symbol list options to facilitate and economize data entry, and the association may be adapted based on whether or not a value is permitted at the data entry position. Several variations of these techniques are discussed relating to the use of symbol lists in various data entry and grammar scenarios, the presentation of the symbol lists, and the user interaction with the symbol lists.
The subject disclosure relates to analyzing memory allocations for one or more computer-implemented processes. In particular, in conjunction with employing tags for tracking memory allocation commands, currently allocated memory can be examined for various characteristics of inefficient memory use. For example, as memory is initially allocated, a predetermined bit pattern can be written to the newly allocated memory. Thus, detection of the predetermined bit pattern can be indicative of wasted memory use. Moreover, additional features can be provided to both analyze data and present views associated with that analysis relating to identification of memory fragmentation, over-allocation, sparse memory use, duplication of allocations, multiple module loads, and so forth.
Googleplus
Calvin Hsia
Calvin Hsia
Youtube
Seattle University Cyberhawks hosts Calvin Hs...
Seattle University Cyberhawks hosts Calvin Hsia Senior Microsoft Devel...
Duration:
1h 21m 8s
always on my mind
I published a song on StarMaker, check out my singing now! #StarMaker ...
Duration:
3m 36s
My first video
Testing vivavideo.
Duration:
4s
calvin hsia
I published a song on StarMaker, check out my singing now! #StarMaker ...
Duration:
3m 57s
X-ray Mike Streams Every NES game in Alphabet...
Greetings. I hope you enjoy the stream. Come back everyday for future ...