摘要:
A method for creating a reference in a scoped memory system, the scoped memory system including a scope graph of scoped memory areas, wherein each scoped memory area is suitable for the allocation of objects therein for access by software threads and has associated a thread count for indicating that the scoped memory area is discardable, the method comprising the steps of: allocating a target object in a target scoped memory area; storing an index associated with the target object of a depth of the target scoped memory area in the scope graph; allocating a source object in a source scoped memory area; storing an index associated with the source object of a depth of the source scoped memory area in the scope graph; in response to a determination that the source scoped memory area is at the same depth as or deeper than the target scoped memory area by comparing the index associated with the source object and the index associated with the target object, creating a reference from the target object to the source object.
摘要:
A method of monitoring network traffic flows of network traffic elements between locations in a data communications network is disclosed. The method comprises the step of classifying, as a first flow, traffic elements from a first to a second network location sharing a flow characteristic. The method further comprises the steps of classifying, as a second flow, traffic elements from said second to said first network location sharing said flow characteristic correlating said first and second flows.
摘要:
Mechanisms for memory management in a scoped memory system are provided. The scoped memory system includes a scoped memory area for the allocation of objects therein for access by one or more software threads in execution. The scoped memory area has an associated thread count for indicating that the scoped memory area is discardable. The mechanisms identify a set of root references for objects allocated in the scoped memory area and recursively traverses and marks objects that are referenced from the set of root references and that are allocated in the scoped memory area. The mechanisms further identify objects in the scoped memory area that are not so marked and discards the identified objects.
摘要:
A face detection and recognition system having several arrays imaging a scene at different bands of the infrared spectrum. The system may use weighted subtracting and thresholding to distinguish human skin in a sensed image. A feature selector may locate a face in the image. The face may be framed or the image cropped with a frame or border to incorporate essentially only the face. The border may be superimposed on an image direct from an imaging array. A sub-image containing the face may be extracted from within the border and compared with a database of face information to attain recognition of the face. A level of recognition of the face may be established. Infrared lighting may be used as needed to illuminate the scene.
摘要:
In one embodiment, a method includes determining a first template defining a data format for one or more first data records and a second template defining a data format for one or more second data records. The template may be needed to decode the information included in an associated data record. The first template is sent on a first stream of a multi-stream protocol in an ordered fashion, such as SCTP. The one or more first data records are also sent on the first stream in an ordered fashion and include first flow information for data sent through a network device. A second template is sent on a second stream using the multi-stream protocol in an ordered fashion. One or more second data records are sent on the second stream including second flow information for data sent through the network device.
摘要:
Emulation of source machine instructions is provided in which target machine CPU condition codes are employed to produce emulated condition code settings without the use, encoding or generation of branching instructions.
摘要:
A casing for a downlight having a tubular body from which the light of a lamp when installed in the body is emitted from the front of the body and having a rear end wall closing the body from the rear, wherein intumescent material is placed within the tubular body lining the tubular wall of the tubular body.
摘要:
A generator having a plastic frame. The frame includes plastic panels surrounding the engine and alternator assembly for the generator, providing an enclosure for the engine and alternator assembly and permitting additional features to added to the frame without adding additional pieces. A retractable cord wrap folds into and out of recesses in one or more panels of the generator. An oil drain chute is provided in one portion of the frame. A retractable handle is extendable from a first recessed position in which the handle is substantially contained within the frame for the generator to an extended position in which the handle extends outward from the frame. A fuel gauge extends along the outer portion of a fuel tank and is formed from a translucent tube.
摘要:
A traffic detection and signal system for pathways within an industrial work environment and method therefor includes at least one sensor positioned to detect objects approaching a pathway intersection and at least one visual indicator electronically linked to the at least one sensor to visually indicate that an object is approaching. The system further includes a controller electronically coupled to the at least one sensor and visual indicator to receive a signal that an object is approaching a pathway intersection and transmit a signal to energize the at least one visual indicator.
摘要:
A system, method and apparatus is provided that splits a microprocessor load instruction into two (2) parts, a speculative load instruction and a check speculative load instruction. The speculative load instruction can be moved ahead in the instruction stream by the compiler as soon as the address and result registers are available. This is true even when the data to be loaded is not actually required. This speculative load instruction will not cause a fault in the memory if the access is invalid, i.e. the load misses and a token bit is set. The check speculative load instruction will cause the speculative load instruction to be retried in the event the token bit was set equal to one. In this manner, the latency associated with branching to an interrupt routine will be eliminated a significant amount of the time. It is very possible that the reasons for invalidating the speculative load operation are no longer present (e.g. page in memory is not present) and the load will be allowed to complete. Therefore, substantial gains in efficiency and resource utilization can be achieved by deferring the branch to recovery routines until after the speculative load is retried.