摘要:
A method for extending the exponent range in an IBM System/370-type floating point arithmetic processor. Very large or very small numbers are represented by a pair of words having sign, exponent, and fraction portions thereof. If the signs of the low- and high-order words of a pair are the same, then the number is deemed to be in the ordinary processor operating range. However, if the signs differ, then the number is deemed to be out of range. In this case, a range extension is obtained by using the exponent field of the low-order word which otherwise would be transparent to the floating point processor.
摘要翻译:一种在IBM System / 370型浮点运算处理器中扩展指数范围的方法。 非常大或非常小的数字由具有符号,指数和分数部分的一对词表示。 如果一对的低位和高位词的符号相同,则该数字被认为处于普通的处理器工作范围内。 然而,如果符号不同,则该数字被视为超出范围。 在这种情况下,通过使用否则对浮点处理器是透明的低位字的指数字段来获得范围扩展。
摘要:
Illustrated is a system and method that includes identifying data stored as an entry in a list. The system and method also includes truncating the entry to create a truncated entry. It further includes transforming the truncated entry into a hash, the hash used to set an index position value within a Bloom filter. The system and method also includes an interface module to transmit the Bloom filter.
摘要:
A network service system comprises a service registry adapted to interact with registry clients. The service registry includes a service registry interface operatively coupled to a service data registry and a metadata registry for processing unstructured queries from registry clients.
摘要:
Various approaches are described for auditing integrity of stored data. In one approach, a data set is provided from a client to a storage provider, and the data set is stored at a first storage arrangement by the storage provider. An auditor determines whether the data set stored at the first storage arrangement is corrupt without reliance on any part of the data set and any derivative of any part of the data set stored by the client. While the auditor is determining whether the data set stored at the first storage arrangement is corrupt, the auditor is prevented from being exposed to information specified by the data set. The auditor outputs data indicative of data corruption in response to determining that the data set stored at the first storage arrangement is corrupt.
摘要:
A storage manager provides data privacy, while preserving the benefits provided by existing hash based storage systems. Each file is assigned a unique identifying code. Hashes of the content-derived chunks of the file are calculated based on the content of the chunk and the code identifying the file. When a request to store a chunk of data is received, it is determined whether a chunk associated with the hash has already been stored. Because hashes are based on privacy-preserving codes as well as content, chunks of duplicate copies of a file need not be stored multiple times, and yet privacy is preserved for content at a file level. In other embodiments, hashes indicating whether a given file is public and/or indicating the identity of the requesting user are also sent with storage requests. These additional hashes enable more robust transmission and storage efficiency, while still preserving privacy.
摘要:
A file sharing system includes authorization-based security to control access to shared files; and a synchronizer which uses the authorization-based security to monitor the shared files for changes and propagating the changes according to sharing relationships. A method for file sharing includes using authorization-based security to control access to a shared file; and monitoring the shared file for changes using a synchronizer which incorporates the authorization-based security to access the shared file.
摘要:
A computer-implemented automated decision support system for designing an auction for a given item includes a structure extractor that estimates unknown elements of market structure of the auction based on auction characteristics data extracted from historical auctions for similar items and a bidding model matching the extracted auction characteristics data. The decision support system also includes a bidding behavior predictor that predicts bidding behaviors of bidders in the auction based on the estimated unknown elements of market structure and characteristics of the auction. In addition, the system includes an optimizer that employs an evaluation criterion to generate an evaluation of the auction based on (1) the estimated unknown elements of market structure and (2) the predicted bidding behavior of bidders. A method of providing an automated auction analysis is also described.
摘要:
A playable copy of the digital content object is stored at a first device. A data object associated with the digital content object is sent to a second device. The playable copy of the digital content object is disabled at the first device, such that only an authorized, playable copy of the digital content object is operable to be stored on the first and second device at any given time before, during and after sending the data object.
摘要:
A method and system for cryptographically secure hashed end marker of streaming data. In one embodiment, a method for transmitting streaming data comprises establishing a shared secret between a receiving participant and a sending participant; using the shared secret to initialize a cryptographically secure hashed end of file marker for the streaming data that is updated as the streaming data is transmitted or received; transmitting the streaming data from the sending participant to the receiving participant; and comparing the streaming data with the cryptographically secure hashed end of file marker to determine when an end of the streaming data occurs.
摘要:
A software system with task-specific flexible bindings that enhance the ability to dynamically add and remove resources from availability to tasks and that eliminates the need for coordination of globally unique names. The software system includes a task-specific name space which corresponds to a task executing in the software system. The task-specific name space holds flexible bindings each of which associates a task-specific name used by the task to refer to a desired resource or a set of one or more resources of the computer system and to information that describes the desired resource. The software system includes a resource mediator that obtains a message from the task. The resource mediator keeps information for each resource that identifies a resource handler task for the desired resource by resolving the task-specific name using the flexible binding.