摘要:
According to various embodiments of the present invention, a method for operating an electronic device may include checking context information for controlling a display divided into a first display and a second display, and controlling at least one of the first display and the second display based on the context information. According to various example embodiments, the electronic device can implement a method for controlling a display.
摘要:
According to various embodiments of the present invention, a method for operating an electronic device may include checking context information for controlling a display divided into a first display and a second display, and controlling at least one of the first display and the second display based on the context information. According to various example embodiments, the electronic device can implement a method for controlling a display.
摘要:
Methods, apparatus, systems and articles of manufacture are disclosed to validate translated guest code in a dynamic binary translator. An example apparatus disclosed herein includes a translator to generate a first translation of code to execute on a host machine, the first translation of the guest code to facilitate creating a first translated guest code, and the translator to generate a second translation of the translated guest code to execute on the host machine. The example apparatus also includes a translation versions manager to identify a first host machine state based on executing a portion of the first translation, and the translation versions manager to identify a second host machine state based on executing a portion of the second translation. The example system also includes a validator to determine a state divergence status of the second translation based on a comparison between the first host machine state and the second host machine state.
摘要:
A method for securing a first program with a second program, a third program and a fourth program, each program comprising constitutive elements having a finite number of program points and evolution rules associated with the program points and defining the passage from one program point to another program point, and each program comprising a definition of a set of properties each property being associated with one or more of the constitutive elements of the program. The fourth program constructed by defining at least one relation between at least one constitutive element of the second program and at least one constitutive element of the third program, said relation being named a correspondence relation, and at least one property of the third program being proven, propagate the proof of said property to at least one property of the first program by exploitation of the correspondence relation.
摘要:
- Procédé et système d'aide à la vérification et à la validation d'une chaîne d'algorithmes. - Le système (1) comporte un module (2) d'instrumentation de la chaîne d'algorithmes, réalisant une capture automatique de données comprenant au moins certaines des données suivantes : des données d'interface et des données internes d'algorithmes de la chaîne d'algorithmes, un module (3) de vérification automatique de règles fonctionnelles, un module (5) d'apprentissage pour modéliser par apprentissage des contraintes et des critères d'algorithmes de la chaîne d'algorithmes, en prenant en compte des validations réalisées par un opérateur humain, et un module (7) de détection automatique de bogues ou de problèmes fonctionnels de la chaîne d'algorithmes à l'aide de moyens d'apprentissage statistique.
摘要:
The invention is a method of communicating between a server and a distant secure element through a point-to-point link. The server is provided with a set comprising a plurality of data and a plurality of identifiers, each of the data is associated with one of the identifiers. The plurality of data comprises a first data compatible with the distant secure element and a second data incompatible with the distant secure element. The whole set is sent from the server to the distant secure element through the point-to-point link. A control operation is run with respect to a reference value stored in the distant secure element for each identifier. The data associated with the identifiers for which the control operation failed is discarded.
摘要:
This invention relates to a method, an apparatus and a computer program product for determining whether a set of specifications related to a software component can be satisfied by a system, wherein said set of specifications comprises at least one specification, and wherein at least one specification of said at least one specification is one out of a resource requirement and a performance specification; and for initiating a function provided by the system if said set of specifications can be satisfied, wherein said function is related to said software component.
摘要:
An array boundary checking method is disclosed for providing hardware based array boundary checking in a Java environment. During the first machine cycle of a current array access command, an array reference value is loaded into a system-data address controller and an array boundary checker. Next, during the second machine cycle of the current array access command, an array index value is written to the system-data address controller and the array boundary checker. Also during the second machine cycle of the current array access command, a maximum array index value is read from the Java array and written to the array boundary checker. The array boundary checker utilizes these values to determine the validity of the current array access command. Finally, during the third machine cycle an array value is accessed in memory. In the present invention the array value is only accessed when the current array access command is valid.
摘要:
A method, comprising: receiving from a source computer (104, 204) a program (221, 340) formed of low-level program code; verifying prior to execution that when an instruction of the program (221, 340) is executed that can be executed along more than one execution path, a data type requirement of that instruction is satisfied and a number of operands on a stack is identical, regardless of the execution path taken to arrive at the instruction; and executing the verified program (221, 340).