摘要:
To perform a sort of N records, a two-dimensional tree structure is formed with a tree of subtrees, where each subtree is formed by a plurality of nodes organized in a binary tree. For each leaf node in the tree, there is an ancestor chain of nodes (from child to parent, from parent to grand-parent, from grand-parent to great-grand-parent, ... and so on) that connects each leaf node to the root node. To perform the sort, the processing unit stores codes representing keys into nodes in the two-dimensional tree and performs a tree sort of the keys using the codes. The codes are accessed in the subtrees and processed to determine the sort order of the keys and therefore the sort order of the corresponding records. The size of the subtrees is adapted to the size of the cache.
摘要:
A computer which executes rules which are defined according to a language having a valid grammar. The computer comprises input means for receiving and temporarily storing a first source code representation of a rule; object code translation means for translating the first source code representation into a first object code representation executable by the computer; storage means for storing the object code representations of rules; discard means for automatically discarding from the input means the first source code representation upon the storing of the first object code representation in the storage means; source code translation means for translating the first object code representation into a second source code representation where the second source code representation has lines of text; edit means for editing the second source code representation by deleting, adding, or changing one or more of the lines of text of the second source code representation; second object code translation means for translating the second source code representation, as edited, into a new object code representation of the edited rule for storage in the storage means; and the discard means discarding the first object code and second source code representations automatically upon the storing of the new object code representation of the edited rule in the storage means. The computer thereby minimizes the storage required in the storage means for storing rules and maintains version control over the object code representations of rules stored in the storage means. A method for manipulating a database of data and rules stored in a computer system where the computer operates in accordance with object-coded rules defined by a specified object code grammar. The computer including storage means for storing data and object-coded rules in tables in conformance with a storage architecture, control means for storing, retrieving and deleting data and object- coded rules from the tables, translator means for translating source-coded rules into object-coded rules, detranslator means for translating object-coded rules into source-coded rules and scanner means for determining lexical validity of an object-coded rule according to the grammar. The method first comprising the ordered steps of entering into the computer a first source-coded rule; storing the first source-coded rule into tables in the storage means; translating the first source-coded rule into a first object-coded rule; storing the first object-coded rule into the tables in the storage means; and discarding the first source-coded rule from the tables in the storage means. Secondly, the method comprises the steps of retrieving an object-coded rule from the tables in the storage means; translating the object-coded rule into a second source-coded rule; editing the second source- coded rule; storing the second source-coded rule, as edited, into the tables in the storage means; translating the second source-coded rule into a second object-coded rule; storing the second object-coded rule into the tables in the storage means and discarding the original object-coded rule and the second source-coded rule from the tables in the storage means. The method further requires that each translating step determines lexical validity or invalidity of the object-coded rule translated from the source-coded rule; that each storing step conditions the storage of an object-coded rule in the tables in the storage means upon the determination of validity of the object-coded rule to be stored and each discarding step conditions the discarding of the first source-coded rule upon the storing of said first object-coded rule into the tables in the storage means and of the original object-coded rule and the second source-coded rule upon the storing of the second object-coded rule in the tables in the storage means.
摘要:
A computer system which completes the Set PSW Key from Address (SPKA) instruction in two I-Unit pipeline flows in those cases where the new key value should not cause a protection exception to be generated by the instruction stream. In those cases where SPKA should cause such an exception, the appropriate action is taken to obtain the correct results. After a SPKA instruction, subsequent instructions are processed even though they are required to access the new key value, PSW KEY N , provided by the SPKA instruction. For operand accesses before that new key value is accepted as the architecturally defined key, PSW KEY A , a working copy of the SPKA new key value, PSW KEY N , is used for operand accesses until the architectural defined PSW key, PSW KEY A , is updated.
摘要:
A data processing system having a hierarchy of computers including a first computer, a second computer, and a third computer. Each of the first and second computers executes an independent instruction stream. The first computer includes first circuit locations having redundant connections independently accessible by the second computer under control of the second instruction stream and independent of the first instruction stream. A third computer is provided for executing a third instruction stream. The third instruction stream and the third computer perform support functions which assist and control the operation of the second computer. The second computer includes second circuits having redundant connections independently accessible by the third computer under control of the third instruction stream.
摘要:
Disclosed is a scan apparatus (4) which provides an interface and control signals between a secondary computer (1) and data locations in a host computer (2). The scan apparatus (4) functions independently of the normal operation of the host computer (2). Scan-out is performed transparently to the operation of the host computer (2). The host computer (2) is constructed using circuits on semiconductor chips (7-1, 7-Y). The semiconductor chips (7-1, 7-Y) are organized in blocks (3-1). Chips within each block (3-1) include scan apparatus (4) which controls the scan operations in connection with that chip. The scan apparatus in each chip is connected through two I/O pins to a clock lines and to a bidirectional scan data line. The scan apparatus on each chip includes a multimode sequencer so that each chip in each block can be independently performing scan sequences. The block scan apparatus and the secondary computer perform the functions of requesting a scan sequence for transmitting the scan data.
摘要:
Disclosed is a signed multiplier for use in a data processing system that handles 2's complement operands. The signed multiplier operates to form a preliminary product independently of the signs of the multiplier and multiplicand. While the multiplication is in progress, the signs of the multiplier and multiplicand are checked. For multiplications where either one of the operands (multiplier or multiplicand) is negative, the preliminary product is modified by one or two correction factors. The correction factors are multiples of the 2's complements of the operands. The correction factor or factors are added to the preliminary product to form the final product.
摘要:
A host computer which functions as one or more variant systems. The host computer stores one or more system control programs, SCP's, where each SCP is provided for production operation of the host computer. The host computer includes common control means for all of the SCP's for controlling the host computer. The host computer also includes extended control means responsive to the one or more SCP's to make the host computer appear as one or more variant systems. The extended control means in the host computer ensures efficient operation of the host computer during production runs of each one or more of the SCP's.