Abstract:
A ranging device includes an array of photon detection devices adapted to receive an optical signal reflected by an object in an image scene. First and second logic devices are adapted to respectively combine the outputs of first and second pluralities of the photon detection devices. A first range detection circuit is coupled to outputs of the first and second logic devices and a first counter is coupled to the output of the first logic device and adapted to generate a first pixel value by counting events generated by the first plurality of photon detection devices. A second counter is coupled to the output of the second logic device and is adapted to generate a second pixel value by counting events generated by the second plurality of photon detection devices. The first and second pixel values may be used in estimating a range to the object in the image scene.
Abstract:
A ranging device includes an array of photon detection devices that receive an optical signal reflected by an object in an image scene and first and second logic devices to respectively combine the outputs of first and second pluralities of the photon detection devices. First and second counter circuits are respectively coupled an output of the first and second logic devices and generate first and second count values respectively by counting the photon detection events generated by the first and second pluralities of photon detection devices. A range estimation circuit estimates the range of the object by estimating the timing of one or more pulses of said optical signal based on the first and second count values.
Abstract:
An image includes at least first and second digital samples corresponding to first and second different color components. The image is compressed by detecting level changes of a first signal formed of the sequence of the first samples and by detecting level changes of a second signal formed of the sequence of the second samples. A determination is made as to whether the detected changes coincide with each other. The first signal is decimated. The compressed image that is output includes the decimated first signal, the second signal and a further signal indicative of coinciding detected changes.
Abstract:
A method involving: detecting in an image a first type of artifact (A1) to generate a first artifact value (GA1) and a first confidence level (CA1); detecting in the image a second type of artifact (A2) to generate a second artifact value (GA2) and a second confidence level (CA2); and performing correction of the first type of artifact (A1) in the image based on the first and second artifact values (GA1, GA2) and the relative values of the first and second confidence levels (CA1, CA2).
Abstract:
The present disclosure relates to an image sensor including: a plurality of pixels, each including a first photodiode coupled to a first capacitive charge storage node by a first transistor, and a second photodiode coupled to a second capacitive charge storage node by a second transistor; and a control circuit configured so as to, during a phase of acquisition of a value representative of the illumination level of a pixel: acquire a first output value representative of the illumination level received by the first photodiode during a first uninterrupted integration period; and acquire a second output value representative of the illumination level received by the second photodiode during a second integration period divided into a plurality of separate sub-periods.
Abstract:
At least one image of a moving object is acquired using an image acquisition device equipped with an automatic focussing system. A distance between the object and the device when the effective acquisition of the image occurs is estimated based on the estimated speed and on the period of time separating a time of actuation triggering the process for acquiring the at least one image from the time of acquisition of the said effective acquisition, and the taking into account of the said distance by the automatic focussing system.
Abstract:
A processor system is arranged to execute user selected applications. A manager module is configured to detect a user selection of an application and configured to initiate a launch process. A supervisor module is configured to intercept the launch process initiated by the manager module and detect whether the application is a trusted application or an untrusted application. Trusted applications have a privilege to access resources without authorization, and untrusted applications do not have the privilege. The supervisor module has the privilege to access the resources. When the application is untrusted, the application is launched in a container, and at least one of the resources is delivered to the untrusted application in the container.
Abstract:
A method includes preparing a first histogram from the emission of initial optical radiation and including at least one processing iteration performed at a rate of a clock signal having an internal period equal to a sub-multiple of the optical period a sensor signal and a reference signal. Successive iterations of histogram preparation are performed so that in each iteration a time shift of the initial optical radiation is provided by a first fraction of the internal period until at least one portion of the internal period is covered to obtain an additional histogram at the conclusion of each iteration. A numerical combination of the first histogram and additional histograms is performed to obtain a final histogram having a finer time granularity than that of the first histogram.
Abstract:
A method for controlling access of a processor to a resource, wherein the processor has an instruction set including a virtualization extension, may include executing a resource access instruction by the processor using the virtualization extension, whereby the resource access instruction conveys a virtual address (VA) and a virtual machine identifier. The method may also include translating the virtual address to a physical address based on the virtual machine identifier, and looking-up an access control rule table using the physical address as a search key. Each entry of the rule table includes a virtual machine identifier. The method further includes controlling access to the resource based on the output of the rule table and a match between the virtual machine identifier returned by the table and the virtual machine identifier conveyed in the resource access instruction.
Abstract:
An electronic device includes a first and a second integrated-circuit chip that are stacked at a distance from one another, and a plurality of electrical connection pillars and at least one protective barrier interposed between the chips. The protective barrier delimits a free space between mutually opposing local regions of the chips, and an encapsulation block extends around the chip that has the smaller mounting face and over the periphery of the mounting face of the other chip. The electrical connection pillars and the protective barrier are made of at least one identical metallic material with a view to simultaneous fabrication.