Priority-based cache-line fitting in compressed memory systems of processor-based systems

    公开(公告)号:US11829292B1

    公开(公告)日:2023-11-28

    申请号:US17572472

    申请日:2022-01-10

    Abstract: A compressed memory system includes a memory region that includes cache lines having priority levels. The compressed memory system also includes a compressed memory region that includes compressed cache lines. Each compressed cache line includes a first set of data bits configured to hold, in a first direction, either a portion of a first cache line or a portion of the first cache line after compression, the first cache line having a first priority level. Each compressed cache line also includes a second set of data bits configured to hold, in a second direction opposite to the first direction, either a portion of a second cache line or a portion of the second cache line after compression, the second cache line having a priority level lower than the first priority level. The first set of data bits includes a greater number of bits than the second set of data bits.

    Priority-based cache-line fitting in compressed memory systems of processor-based systems

    公开(公告)号:US11687461B1

    公开(公告)日:2023-06-27

    申请号:US17572472

    申请日:2022-01-10

    Abstract: A compressed memory system includes a memory region that includes cache lines having priority levels. The compressed memory system also includes a compressed memory region that includes compressed cache lines. Each compressed cache line includes a first set of data bits configured to hold, in a first direction, either a portion of a first cache line or a portion of the first cache line after compression, the first cache line having a first priority level. Each compressed cache line also includes a second set of data bits configured to hold, in a second direction opposite to the first direction, either a portion of a second cache line or a portion of the second cache line after compression, the second cache line having a priority level lower than the first priority level. The first set of data bits includes a greater number of bits than the second set of data bits.

    External Paging And Swapping For Dynamic Modules

    公开(公告)号:US20200089616A1

    公开(公告)日:2020-03-19

    申请号:US16130069

    申请日:2018-09-13

    Abstract: Various embodiments include methods and devices for implementing external paging and swapping for dynamic modules on a computing device. Embodiments may include assigning static virtual addresses to a base image and dynamic modules of a static image of firmware of the computing device from a virtual address space for the static image, decompose static image into the base image and the dynamic modules, load the base image to an execution memory during a boot time from first partition of a storage memory, reserve a swap pool in the execution memory during the boot time, and load a dynamic module of the dynamic modules to the swap pool from a second partition of storage memory during a run time.

    Training and utilization of neural branch predictor

    公开(公告)号:US10372459B2

    公开(公告)日:2019-08-06

    申请号:US15712112

    申请日:2017-09-21

    Abstract: Systems and methods for branch prediction include identifying a subset of branch instructions from an execution trace of instructions executed by a processor. The identified subset of branch instructions have greater benefit from branch predictions made by a neural branch predictor than branch predictions made by a non-neural branch predictor. During runtime, the neural branch predictor is selectively used for obtaining branch predictions of the identified subset of branch instructions. For remaining branch instructions outside the identified subset of branch instructions, branch predictions are obtained from a non-neural branch predictor. Further, a weight vector matrix comprising weight vectors for the identified subset of branch instructions of the neural branch predictor is pre-trained based on the execution trace.

    Efficient cryptographic key stream generation using optimized S-box configurations
    20.
    发明授权
    Efficient cryptographic key stream generation using optimized S-box configurations 有权
    使用优化的S-box配置实现高效的加密密钥流生成

    公开(公告)号:US09379887B2

    公开(公告)日:2016-06-28

    申请号:US14024424

    申请日:2013-09-11

    Abstract: Application of a ZUC cryptographic functions in wireless communication includes receiving a data stream at the wireless communication apparatus and applying the ZUC cryptographic function to the data stream. The ZUC cryptographic function includes generating at least one multi-byte pseudo-random number that provides an index to one of a plurality of substitution boxes. Each of the substitution boxes is further based on one or more normative substitution boxes. The ZUC cryptographic function further includes retrieving a value from each of the substitution boxes using each byte of the multi-byte pseudo-random number, assembling the retrieved values into at least one substituted values, and generating at least one key value based on the substituted values, wherein the key value is used in applying the ZUC cryptographic function to the data stream. The method also includes processing the data stream after application of the ZUC cryptographic function.

    Abstract translation: ZUC加密功能在无线通信中的应用包括在无线通信装置处接收数据流并将ZUC加密功能应用于数据流。 ZUC加密功能包括生成至少一个多字节伪随机数,其向多个取代框之一提供索引。 每个替代框进一步基于一个或多个规范性替代框。 ZUC加密功能还包括使用多字节伪随机数的每个字节从每个替换盒中检索一个值,将检索到的值组装成至少一个替换值,并且基于取代的值生成至少一个密钥值 值,其中所述键值用于将ZUC加密功能应用于所述数据流。 该方法还包括在应用ZUC加密功能之后处理数据流。

Patent Agency Ranking