Abstract:
System and method for filtering a data packet using a combined filter are disclosed. In one aspect, the method includes receiving a data packet and N filters. The method includes receiving a data packet and N (wherein N is an integer and N>1) filters, each filter comprising a bit mask and corresponding bit values. The method further includes, for each of the N filters, identifying a key element from a portion of the filter corresponding to a combined filter, the key element being a segment of the filter portion having the richest bit pattern. The method further includes generating the combined filter by combining the key element of the N filters. The method further includes filtering the data packet with the combined filter to determine whether there is a match between the data packet and each key element.
Abstract:
System and method for filtering a data packet using a combined filter are disclosed. In one aspect, the method includes receiving a data packet and N filters each comprising a mask and value. The method includes receiving a data packet and N (wherein N is an integer and N>1) filters, each filter comprising a bit mask and corresponding bit values. The method further includes generating a common filter mask and the corresponding bit values by taking the overlapping mask bits among portions of the N filters corresponding to the common filter, the common filter being of a length smaller than each filter. The method further includes applying the common filter mask to the data packet to determine whether there is a match between the filtered data packet and each of the N filters.
Abstract:
Disclosed is a method, system, and program for storing data. A cluster is associated with a plurality of storage groups. A storage group preference order is designated for data sets associated with the cluster. When a request to store a data set for the cluster is received, one of the plurality of storage groups is selected using the storage group preference order.
Abstract:
A method and apparatus for reducing space allocation failures in a computer system that utilizes direct access storage devices to store data. The method comprises the steps of determining if authorization has been given to attempt to allocate an initial space request over more than one volume, and, if so, attempting to allocate space on a plurality of volumes. If the initial space request cannot be allocated on a plurality of volumes, the initial space request is reduced by a preset percentage, the five-extent limit is removed and an attempt is made to allocate the reduced space request on the plurality of volumes with the five extent limit removed. Alternatively, if authorization has not been given to attempt to allocate the initial space request over more than one volume, the initial space request is reduced by a preset percentage, the five-extent limit is removed and an attempt is made to allocate the reduced space request on a single volume.
Abstract:
An isolation structure on an integrated circuit is formed using a shallow trench isolation process. A layer of buffer oxide is formed on a substrate. A layer of nitride is formed on the layer of buffer oxide. The layer of nitride and the layer of buffer oxide are patterned to form a trench area. An oxidation of the substrate is performed to provide for round corners at a perimeter of the trench area. The substrate is then etched to form a trench within the trench area.
Abstract:
A capacitor structure including a plurality of conductive layers, a dielectric layer and a plurality of contacts is disclosed. The conductive layers are stacked, and each conductive layer has a first conductive pattern and a second conductive pattern. The dielectric layer is disposed between the first conductive pattern and the second conductive pattern and between two adjacent conductive layers. The contacts are disposed in the dielectric layer, and electrically connected to the first conductive patterns in two adjacent conductive layers and electrically connected to the second conductive patterns in two adjacent conductive layers. Wherein, the contact electrically connecting to the first conductive patterns in two adjacent conducive layers is a first strip contact, which extends between the first conductive patterns in two adjacent conductive layers, and the boundary of the first strip contact is located within the boundary of the first conductive pattern.
Abstract:
A method is presented in which nitrogen-based gas in incorporated in polysilicon gate re-oxidation to improve hot carrier performance. A gate oxide layer is formed. Gate material is deposited on the gate oxide layer. The gate material is etched to form a gate structure. The gate oxide layer and the gate are re-oxidized. During re-oxidation, nitrogen-based gas is introduced to nitridize re-oxidized portions of the gate oxide layer.
Abstract:
A method and apparatus for reducing space allocation failures in a computer system that utilizes direct access storage devices to store data. The method comprises the steps of determining if authorization has been given to attempt to allocate an initial space request over more than one volume, and, if so, attempting to allocate space on a plurality of volumes. If the initial space request cannot be allocated on a plurality of volumes, the initial space request is reduced by a preset percentage, the five-extent limit is removed and an attempt is made to allocate the reduced space request on the plurality of volumes with the five extent limit removed. Alternatively, if authorization has not been given to attempt to allocate the initial space request over more than one volume, the initial space request is reduced by a preset percentage, the five-extent limit is removed and an attempt is made to allocate the reduced space request on a single volume.
Abstract:
A method of forming CMOS transistors with self-aligned field regions. First and second spaced apart areas are provided on a silicon substrate. A masking member is formed protecting the first of said areas and exposing the second. The exposed area is doped with a p-type material which is driven in to form a p-well. The same region is again doped with additional p-type material after which the CMOS transistors are fabricated.
Abstract:
System and method for filtering a data packet using a combined filter are disclosed. In one aspect, the method includes receiving a data packet and N filters. The method includes receiving a data packet and N (wherein N is an integer and N>1) filters, each filter comprising a bit mask and corresponding bit values. The method further includes, for each of the N filters, identifying a key element from a portion of the filter corresponding to a combined filter, the key element being a segment of the filter portion having the. richest bit pattern. The method further includes generating the combined filter by combining the key element of the N filters. The method further includes filtering the data packet with the combined filter to determine whether there is a match between the data packet and each key element.