摘要:
A device for controlling a throttle cross-section of at least one control orifice in a bypass line extending around a throttle valve of an air intake pipe of an internal combustion engine, for regulating an idle speed of the internal combustion engine, and comprising a throttle member, a spring element for biasing the throttle member to an initial position thereof, and a positioning motor for moving the throttle member from its initial position against a bias force of the spring element, upon failure of the spring element and when the positioning motor is actuated, to establish a safety cross-section in the bypass line, a quantity of operating medium flowing through the safety cross-section being less than a quantity of operating medium flowing through a complete cross-section of the control orifice whereby idle operation of the internal combustion engine is insured.
摘要:
A method is introduced of checking the drivability of a tank-venting valve (TEV) and of an idle actuator.After actuating the TEV, an additional air/fuel mixture is supplied to the intake region of an internal combustion engine having an air/fuel ratio which can be equal to that at which the engine usually operates (.lambda..sub.0) or greater or less than .lambda..sub.0. Reactions of a .lambda.-control and/or of an idle control can be evaluated in dependence thereon. It is advantageous that a check is made independently of how intense the additional air/fuel mixture is enriched with fuel.
摘要:
Embodiments relate to a semi-exclusive second-level branch target buffer. An aspect includes a system for a semi-exclusive second-level branch target buffer. The system includes a first-level branch target buffer (BTB1), a branch target buffer preload table (BTBP), and a second-level branch target buffer (BTB2) coupled to a processing circuit. The processing circuit is configured to perform a method. The method includes performing a search to locate entries in the BTB2 having a memory region corresponding to a search request. Based on locating entries in the BTB2, a bulk transfer of located entries is performed from the BTB2 to the BTBP. A state associated with the located entries is updated to encourage exclusivity between the BTB1 and the BTB2. Based on transferring a BTBP entry from the BTBP to the BTB1, a BTB1 entry is evicted from the BTB1. The evicted BTB1 entry is transferred from the BTB1 to the BTB2.
摘要:
Embodiments relate to instruction filtering. An aspect includes a system for instruction filtering. The system includes memory configured to store instructions accessible by a processor, and the processor includes a tracking array and a tracked instruction logic block. The processor is configured to perform a method including detecting a tracked instruction in an instruction stream, and storing an instruction address of the tracked instruction in the tracking array based on detecting and executing the tracked instruction. The method also includes accessing the tracking array based on an address of instruction data of a subsequently fetched instruction to locate the instruction address of the tracked instruction in the tracking array as an indication of the tracked instruction. Instruction text of the subsequently fetched instruction is marked to indicate previous execution based on the tracking array. An action of the tracked instruction logic block is prevented based on the marked instruction text.
摘要:
Embodiments relate to using a branch target buffer preload table. An aspect includes receiving a search request to locate branch prediction information associated with a branch instruction. Searching is performed for an entry corresponding to the search request in a branch target buffer and a branch target buffer preload table in parallel. Based on locating a matching entry in the branch target buffer preload table corresponding to the search request and failing to locate the matching entry in the branch target buffer, a victim entry is selected to overwrite in the branch target buffer. Branch prediction information of the matching entry is received from the branch target buffer preload table at the branch target buffer. The victim entry in the branch target buffer is overwritten with the branch prediction information of the matching entry.
摘要:
An apparatus is disclosed for operating a symmetric cipher engine (SCE) in cipher-block chaining (CBC) mode. The apparatus includes a crypto operation hardware including the SCE and an XOR stage, an apparatus for storing a chaining value including a state register of the SCE, an input latch supplying the crypto operation hardware with data, and an output latch. The data may be reordered for decipher operation. Furthermore, a method is disclosed for operating a SCE in CBC mode, wherein the method involves a crypto operation hardware that includes the SCE and an XOR stage supplied with data. The method also may include using a state register of the SCE to apply a chaining value. The method further may comprise reordering data supplied to the crypto operation hardware for decipher operation.
摘要:
A method and apparatus for processing data by a pipeline of a virtual multiple instance extended finite state machine (VMI EFSM). An input token is selected to enter the pipeline. The input token includes a reference to an EFSM instance, an extended command, and an operation code. The EFSM instance requires the resource to be available to generate an output token from the input token. In response to receiving an indication that the resource is unavailable, the input token is sent to a wait room or an initiative token containing the reference and the operation code is sent to a wait queue, and the output token is not generated. Without stalling and restarting the pipeline, another input token is processed in the pipeline while the resource is unavailable and while the input token is in the wait room or the initiative token is in the wait queue.
摘要:
A new method and apparatus have been taught for storing error information used for debugging as generated by the initial and subsequent error occurrences. In this invention, a register with several bit ranges is used to store error information. The first bit-range is allocated to the initial error information. If the total number of the errors exceeds the capacity of the register, the last error is kept in a last bit-range. This way, precious initial error information (as well as the last error information) will be available for debugging.
摘要:
When forming dielectric materials of reduced dielectric constant in sophisticated metallization systems, the creation of defect particles on the dielectric material may be reduced during a plasma enhanced deposition process by inserting an inert plasma step after the actual deposition step.
摘要:
The invention relates to a fuel container of plastics material with functional components arranged inside the container which are fastened to the container wall and at least some of which are connected to electric or hydraulic lines and/or are interconnected via such lines. The invention further relates to a method for maintenance of such a fuel container. The functional components are provided with fastening means for receiving a functionally identical functional component. In the event of maintenance, the fuel container is opened. An exchange component is fastened to the functional component to be serviced, the functional component to be serviced serving as a mounting for the exchange component. The lines connected to the functional component are plugged into the other functional component and the container is closed again while the component to be serviced remains in the fuel container.