Abstract:
A CNN based-signal processing includes receiving of an encrypted output from a first layer of a multi-layer CNN data. The received encrypted output is subsequently decrypted to form a decrypted input to a second layer of the multi-layer CNN data. A convolution of the decrypted input with a corresponding decrypted weight may generate a second layer output, which may be encrypted and used as an encrypted input to a third layer of the multi-layer CNN data.
Abstract:
Disclosed embodiments relate to storing and accessing files. In an embodiment, a method includes writing a file to a writing a file to a storage device having a file system having a file allocation table (FAT). Writing the file includes allocating a plurality of clusters of the file system to the file, wherein at least a portion of the allocated clusters is contiguous. The FAT includes a plurality of cluster addresses corresponding to the allocated clusters. A signature value is stored in a cluster address corresponding to a first cluster of the contiguous clusters to indicate the presence of the contiguous clusters. In each of a set of consecutive cluster addresses succeeding the cluster address corresponding to the first cluster, a value that partially represents the number of the contiguous clusters is stored. The number of contiguous clusters is determinable by combining the values stored in the consecutive cluster addresses.
Abstract:
The present invention is drawn to a device for use with first stereoscopic data, second stereoscopic data and a display device. The device includes an input portion, a convergence data detecting portion, a convergence plane portion, a comparing portion and a modification portion. The input portion can receive the first stereoscopic data and the second stereoscopic data. The convergence data detecting portion can detect first convergence data within the first stereoscopic data and can detect second convergence data within the second stereoscopic data. The convergence plane portion can determine a first convergence plane based on the first convergence data and can determine a second convergence plane based on the second convergence data. The comparing portion can compare the first convergence plane and the second convergence plane and can generate a convergence plane comparison. The modification portion can modify the first convergence data based on the convergence plane comparison.
Abstract:
Several systems and methods for accessing files stored in a storage device are disclosed. In an embodiment, the method includes accessing a file allocation table (FAT) in a computer file system associated with the storage device. The FAT includes a plurality of cluster addresses corresponding to a plurality of clusters allocated to a file stored in the storage device. A cluster address is read to identify a location of a next cluster. One or more bits in the cluster address are read to determine a presence of a signature value indicating allocation of a set of contiguous clusters from among the plurality of clusters. A number of contiguous clusters is computed based on a pre-determined number of consecutive cluster addresses succeeding the cluster address if the signature value is present. The set of contiguous clusters are read from the storage device based on the computed number of contiguous clusters.
Abstract:
A computer device (2010) with a file system having clusters and meta data. The computer device (2010) includes a processor (1030) and a storage (1025) coupled to the processor and having physical representations of instructions so that the processor is operable to reserve (230) at least one of the clusters and to create a log record when meta data for the file system is to be updated by a write (240) of such meta data beforehand to such a reserved cluster, and then set (250) at least one state entry to substantially represent readiness to write the meta data to the file system.
Abstract:
An example apparatus includes: interface circuitry; and programmable circuitry configured to: obtain a set of processor instructions; select a first subset of processor instructions from the set; encrypt the first subset of processor instructions; select a second subset of processor instructions from the set; compute a plurality of message authentication codes (MACs) corresponding to the second subset of processor instructions; cause the interface circuitry to write the set of processor instructions to an external memory; and cause the interface circuitry to write a description of the first subset of processor instructions, a description of the second subset of processor instructions, and the plurality of MACs to the external memory.
Abstract:
A network-communicating device with a signal input adapted to receive a sensor-derived signal; an analog-to-digital converter (ADC) having an input coupled to the signal input and an output; a data scrambling circuit having an input coupled to the output of the ADC and an output; a watermark insertion circuit having an input coupled to the output of the data scrambling circuit and an output; and a signal output coupled to the output of the watermark insertion circuit.
Abstract:
This disclosure relates to an electronic device. The electronic device includes a non-transitory storage device, one or more peripherals, wherein the one or more peripherals are disabled, a processor configured to transmit a request to enable a peripheral of the one or more peripherals, and a power reset manager module. The power reset manager module is configured to receive the request to enable the peripheral. The power reset manager module includes a first memory configured to store, in response to the received request, an indication that peripheral was enabled. The processor is further configured to copy contents of the first memory to the non-transitory storage device and output the indication that the peripheral was enabled as a part of an update procedure.
Abstract:
An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.
Abstract:
A communications circuit with an input port, a switching circuit coupled to the input port, and a first and second memory coupled to the switching circuit. The communications circuit also includes controlling circuitry adapted to operate the switching circuit to couple data received at the input port to the first memory while the second memory is disabled from power and to couple data received at the input port to the second memory once the first memory is filled with valid data.