Abstract:
Methods, computer program products, and/or systems are provided that can perform the following operations: receiving a connection request from a first user device; creating an authentication container for the first user device; authenticating the first user device using the authentication container; in response to authentication for the first user device being successful, creating a first user request processing container for the first user device; and processing user requests received from the first user device using the first user request processing container.
Abstract:
A method for detecting deviations between an event log and a process model includes converting the process model into a probability process model, the probability process model comprising multiple nodes in multiple hierarchies and probability distribution associated with the multiple nodes, a leaf node among the multiple nodes corresponding to an activity in the process model; detecting differences between at least one event sequence contained in the event log and the probability process model according to a correspondence relationship; and identifying the differences as the deviations in response to the differences exceeding a predefined threshold; wherein the correspondence relationship describes a correspondence relationship between an event in one event sequence of the at least one event sequence and a leaf node in the probability process model.
Abstract:
This disclosure provides a computer-implemented method for code suggestion. The method comprises collecting a set of runtime context features of a program that is being edited. The method further comprises comparing the set of runtime context features with at least one set of stored context features to find at least one matching set of stored context features. Each of the at least one set of stored context features is extracted from a corresponding code segment. The method further comprises presenting at least one code segment with its set of stored context features matching the set of runtime context features, for the user to choose to add into the program.
Abstract:
Embodiments of the present disclosure relate to a new approach for sensor-based authentication to enhance mobile security. In the computer-implemented method, motion related sensor data is obtained. A label of a behavior is determined wherein the behavior has a time information of the behavior. The label is associated with at least part of the motion related sensor data based on the time information of the behavior and the time information of the motion. At least one comparable motion is determined from the associated part of motion related sensor data. At least one motion passcode based on the determined comparable motion is identified.
Abstract:
Patient treatment may be optimized using Recurrent Neural Network (RNN) based state simulation and Reinforcement learning (RL) techniques to simulate future states and actions. A RNN state simulator and a RL action generator may be trained using patient data such as historical states and actions. The RL action generator may be optimized by applying the RNN state simulator to simulating future states and applying the RL action generator to generate recommended actions based on the simulated future states. This process may be iteratively performed until a computational convergence is reached by the RL action generator which may indicate that the RL action generator has been optimized. A patient state may be fed into the optimized RL action generator to generate an optimal recommended treatment action.
Abstract:
Patient treatment may be optimized using Recurrent Neural Network (RNN) based state simulation and Reinforcement learning (RL) techniques to simulate future states and actions. A RNN state simulator and a RL action generator may be trained using patient data such as historical states and actions. The RL action generator may be optimized by applying the RNN state simulator to simulating future states and applying the RL action generator to generate recommended actions based on the simulated future states. This process may be iteratively performed until a computational convergence is reached by the RL action generator which may indicate that the RL action generator has been optimized. A patient state may be fed into the optimized RL action generator to generate an optimal recommended treatment action.
Abstract:
A memory system, system including the memory system and method of reducing memory system power consumption. The memory system includes multiple memory units allocable to one of a number of processor units, e.g., processors or processor cores. A memory controller receives requests for memory from the processor units and allocates sufficient space from the memory to each requesting processor unit. Allocated memory can include some Single Level per Cell (SLC) memory units storing a single bit per cell and other memory units storing more than one bit per cell. Thus, two processor units may be assigned identical memory space, while half, or fewer, than the number of cells of one are assigned to the other.
Abstract:
A method for fabricating a semiconductor device utilizing a plurality of masks and spacers. The method includes forming parallel first trenches in a substrate using a first lithographic process. The substrate includes sidewalls adjacent to the parallel first trenches. Forming first spacers adjacent to the sidewalls. Removing the sidewalls, which in part includes using a second lithographic process. Forming second spacers adjacent to the first spacers, resulting in spacer ridges. Etching portions of the substrate between the spacer ridges resulting in second trenches.
Abstract:
A method for fabricating a semiconductor device utilizing a plurality of masks and spacers. The method includes forming parallel first trenches in a substrate using a first lithographic process. The substrate includes sidewalls adjacent to the parallel first trenches. Forming first spacers adjacent to the sidewalls. Removing the sidewalls, which in part includes using a second lithographic process. Forming second spacers adjacent to the first spacers, resulting in spacer ridges. Etching portions of the substrate between the spacer ridges resulting in second trenches.
Abstract:
A wear leveling technique is employed in a memory device so that the cycling history of a memory block is represented by the cycling history of a representative memory cell or a small number of representative memory cells. A control logic block tracks the cycling history of the one or more representative memory cells. A table tabulating the predicted shift in an optimal value for a reference variable for a sensing circuit as a function of cycling history is provided within the memory device. Prior to sensing a memory cell, the control logic block checks the total number of cycling in the one or more representative memory cells and adjusts the value for the reference variable in the sensing circuit, thereby providing an optimal value for the reference variable in the sensing circuit for each sensing cycle of the memory device.