摘要:
A method of scheduling optional instructions in a compiler targets a processor. The scheduling includes indicating a limit on the additional processor computations that are available for executing an optional code, generating one or more required instructions corresponding to a source code and one or more optional instructions corresponding to the optional code used with the source code and scheduling all of the one or more required instructions with as many of the one or more optional instructions as possible without exceeding the indicated limit on the additional processor computations for executing the optional code.
摘要:
In one example, a computing device generates a new password for accessing a user account and/or computing system and inspires a change of an existing password for the user account and/or computing system to the new password. Thereafter, the computing device detects occurrence of a condition to trigger another change of the password for the user account and/or computing system and, responsively, inspires another change of the password for the user account and/or computing system.
摘要:
A method for controlling transfer of data is provided. The method includes accessing data at a first device and accessing a time attribute associated with the data at the first device. The method further includes comparing the time attribute to a data transfer time threshold and in response to the time attribute associated with the data at the first device is less than the data transfer time threshold, the method further includes restricting access of the data at a second device.
摘要:
A computer system with mechanisms for providing hint instructions to a processor without altering object code instruction sequences. A computer system according to the present teachings includes elements for generating a hint instruction in response to a set of object code to be executed by the processor and for inserting a break instruction into the object code such that the break instruction causes the processor to obtain and execute the hint instruction. The present techniques for providing hint instructions to a processor may be used to adapt object code to a micro-architecture of the processor.
摘要:
A reusable security tag is provided which is reversibly operable in a first magnetic condition to trigger a detector when the tag is within communication range of the detector, and a second magnetic condition in which the detector is not triggered when the tag is within communication range of the detector. The tag includes an optical indicator which has a first optical characteristic when the tag is in the first magnetic condition, and a second optical characteristic when the tag is in the second magnetic condition.
摘要:
A verifiable random number generator includes mechanisms for monitoring its chaotic behavior. A random number generator according to the present teachings includes a chaos circuit that generates a number according to a chaos function. The random number generator further includes a check circuit that simulates the chaos function and that determines whether the number is a valid random number by monitoring the chaotic behavior of the chaos function.
摘要:
A computer system includes physical registers holding data for compiled programs and a portion of the physical registers form a register stack which wraps around when full. An N-bit current wraparound count state tracks physical register remapping events which cause the register stack to wraparound or unwrap. An advanced load address table (ALAT) has entries corresponding to load instructions, each entry has at least one memory range field defining a range of memory locations accessed by a corresponding load instruction, a physical register number field corresponding to a physical register accessed in the corresponding load instruction, and an N-bit register wraparound field which corresponds to the N-bit current wraparound count state for the corresponding load instruction. A check instruction accesses the ALAT to determine whether a store instruction and an advanced load instruction, which is scheduled before the store instruction, potentially accessed a common memory location. After the execution of the store instruction, an absence of an entry corresponding to the load instruction in the ALAT indicates that a common memory location may have been accessed by the store and load instructions.
摘要:
A software system with self-describing attribute vocabularies that enhance the capability of service providers to advertise their resources and that facilitate the addition of new types of attributes and resources to the system. Each self-describing attribute vocabulary is characterized by a corresponding set of attribute properties and a corresponding set of:matching rules that are adapted to the corresponding attribute properties. The software system includes a matching engine that enables a service provider of a resource to describe the resource to the software system in terms of any one or more of the self-describing attribute vocabularies.
摘要:
A circuit and method for clipping input integers to a specified range comprising the steps of providing a mask wherein a bit is set for each out-of-range bit and not set for in-range bits and applying the mask to input integers so that any integers outside of the range is clipped to the quantity in the range closest to the integer, thereby producing output integers within a range specified by the mask. Other systems and methods are disclosed.
摘要:
A multicasting system for multicasting window events to various application programs running on a computer system, each such program having an application window. A global control program runs on the computer system and has a global control window. Through the global control program, a user selects one or more of the application programs to receive incoming window events. Later, when the global control window is active, any incoming window event is received in that window. The global control program automatically multicasts each such event to every application program that the user has selected to receive incoming window events. Events may be multicast directly to child windows of the various application windows. The global control window may have a global child window that receives incoming window events; such events are multicast directly to selected child windows of the application programs. The application programs may be resident locally or on a remote computer system. If window events are received out of sequence, the global control program may either ignore them or resequence them for proper operation.