摘要:
A method of executing a sequence of multiple dependent operations, each operation including a memory read and a memory write involves overlapping memory accesses of the operations by grouping together memory reads and memory writes of multiple operations and preserving a desired sequence of the operations using a circuit external to a memory through which the memory accesses are performed. The operations may be updates to one or more linked lists. In one embodiment, the step of overlapping memory accesses may be performed by grouping together memory accesses according to ATM cell arrivals or departures. In this embodiment, the operations are associated with ATM cell arrivals or departures and may be gets or puts. Each get and put operation may be characterized by a number of atomic memory operations to update one or more linked lists. To perform the operations a circuit a having an address processor, a data processor coupled to the address processor and to the external memory, and a prefetch buffer coupled to the external memory, the address processor and to the data processor is provided. The address processor generates memory addresses for the operations according to the step of overlapping memory accesses. The atomic memory operations are grouped so that all of the memory read operations associated with the dependent operations are performed before all of the memory write operations associated with the dependent operations are performed.
摘要:
A lighted mask for underwater divers utilizing a monochromatic blue-green LED light source secured to the mask directing light to the front of the face plate of the mask and having a push button control mounted on the mask for actuating the light source.
摘要:
Embodiments of the present invention are directed to methods and systems for utilizing the history of previous authentications and authorizations related to third party computers, as factors in determining whether a current request for accessing a resource should be authorized. A processor server computer, in determining whether to authorize access to the resource, may generate and send a query message to one or more of the third party computers to obtain authorization activity that the third party computers may have regarding a user and/or a device associated with the request. The processor server computer may use the authorization activity from the third party computers in determining whether the request is an authentic request and that the request should be authorized.
摘要:
The present invention relates to novel systems and methods for manufacturing estimation, production assembly and inventory management. In an embodiment, a system is provided to create and respond to RFPs, perform capacity planning for an eventual production line, efficiently implement the production line in software, and track detailed warehouse data, including transaction data. Such tracking may allow process improvement, report generation, and market research analysis. In an embodiment, one or more systems may be used to implement one or more aspects of the present invention.
摘要:
The present invention relates to novel systems and methods for manufacturing estimation, production assembly and inventory management. In an embodiment, a system is provided to create and respond to RFPs, perform capacity planning for an eventual production line, efficiently implement the production line in software, and track detailed warehouse data, including transaction data. Such tracking may allow process improvement, report generation, and market research analysis. In an embodiment, one or more systems may be used to implement one or more aspects of the present invention.
摘要:
Methods and apparatus for topology discovery of a network having heterogeneous network devices are disclosed. A network appliance communicates with the network devices to acquire device descriptors and characterize the network devices accordingly. Topology discovery is based on device characteristics, media-access data, and encoded connectivity patterns, where each connectivity pattern is defined by devices of specific device types and respective media-access data. A topology deduction module of the network appliance synthesizes a network image starting with unconnected devices and progressively incorporating detected connectivity patterns.