摘要:
Method and apparatus for storing and executing an instruction to load two independent registers with two values is disclosed. In one embodiment, a computer-readable medium is encoded with an instruction including an opcode field specifying that the instruction is an instruction to load two independent registers with a first value and a second value, a source field specifying the first value and the second value, a first target register field specifying a first target register to load with the first value; a second target register field specifying a second target register to load with the second value. A system to execute the instruction is also disclosed.
摘要:
A method performed within a multi-processing, multi-programming computer environment for reducing conflict among tasks concurrently accessing COMMON BLOCKs in code sequences compiled within said environment from a FORTRAN like language system, and for reducing the memory used in the storing of private copies of said COMMON BLOCKs. The method involves inserting constructs at compile time into the compiled code which enable the COMMON BLOCKs to be dynamically bound at runtime to two or more referencing tasks. Then, at execution time responsive to the constructs, the blocks are bound to the tasks dynamically and scoped so that they lie within the dynamic nesting of the tasks.
摘要:
A method for extending the exponent range in an IBM System/370-type floating point arithmetic processor. Very large or very small numbers are represented by a pair of words having sign, exponent, and fraction portions thereof. If the signs of the low- and high-order words of a pair are the same, then the number is deemed to be in the ordinary processor operating range. However, if the signs differ, then the number is deemed to be out of range. In this case, a range extension is obtained by using the exponent field of the low-order word which otherwise would be transparent to the floating point processor.
摘要翻译:一种在IBM System / 370型浮点运算处理器中扩展指数范围的方法。 非常大或非常小的数字由具有符号,指数和分数部分的一对词表示。 如果一对的低位和高位词的符号相同,则该数字被认为处于普通的处理器工作范围内。 然而,如果符号不同,则该数字被视为超出范围。 在这种情况下,通过使用否则对浮点处理器是透明的低位字的指数字段来获得范围扩展。
摘要:
Illustrated is a system and method that includes identifying data stored as an entry in a list. The system and method also includes truncating the entry to create a truncated entry. It further includes transforming the truncated entry into a hash, the hash used to set an index position value within a Bloom filter. The system and method also includes an interface module to transmit the Bloom filter.
摘要:
A network service system comprises a service registry adapted to interact with registry clients. The service registry includes a service registry interface operatively coupled to a service data registry and a metadata registry for processing unstructured queries from registry clients.
摘要:
Various approaches are described for auditing integrity of stored data. In one approach, a data set is provided from a client to a storage provider, and the data set is stored at a first storage arrangement by the storage provider. An auditor determines whether the data set stored at the first storage arrangement is corrupt without reliance on any part of the data set and any derivative of any part of the data set stored by the client. While the auditor is determining whether the data set stored at the first storage arrangement is corrupt, the auditor is prevented from being exposed to information specified by the data set. The auditor outputs data indicative of data corruption in response to determining that the data set stored at the first storage arrangement is corrupt.
摘要:
A storage manager provides data privacy, while preserving the benefits provided by existing hash based storage systems. Each file is assigned a unique identifying code. Hashes of the content-derived chunks of the file are calculated based on the content of the chunk and the code identifying the file. When a request to store a chunk of data is received, it is determined whether a chunk associated with the hash has already been stored. Because hashes are based on privacy-preserving codes as well as content, chunks of duplicate copies of a file need not be stored multiple times, and yet privacy is preserved for content at a file level. In other embodiments, hashes indicating whether a given file is public and/or indicating the identity of the requesting user are also sent with storage requests. These additional hashes enable more robust transmission and storage efficiency, while still preserving privacy.
摘要:
A file sharing system includes authorization-based security to control access to shared files; and a synchronizer which uses the authorization-based security to monitor the shared files for changes and propagating the changes according to sharing relationships. A method for file sharing includes using authorization-based security to control access to a shared file; and monitoring the shared file for changes using a synchronizer which incorporates the authorization-based security to access the shared file.
摘要:
A computer-implemented automated decision support system for designing an auction for a given item includes a structure extractor that estimates unknown elements of market structure of the auction based on auction characteristics data extracted from historical auctions for similar items and a bidding model matching the extracted auction characteristics data. The decision support system also includes a bidding behavior predictor that predicts bidding behaviors of bidders in the auction based on the estimated unknown elements of market structure and characteristics of the auction. In addition, the system includes an optimizer that employs an evaluation criterion to generate an evaluation of the auction based on (1) the estimated unknown elements of market structure and (2) the predicted bidding behavior of bidders. A method of providing an automated auction analysis is also described.
摘要:
A playable copy of the digital content object is stored at a first device. A data object associated with the digital content object is sent to a second device. The playable copy of the digital content object is disabled at the first device, such that only an authorized, playable copy of the digital content object is operable to be stored on the first and second device at any given time before, during and after sending the data object.