摘要:
A negotiation protocol that allows for multi-attribute in a negotiation that is guaranteed to terminate. The negotiation protocol comprises a plurality of rounds including an advertisement, look-up, offer, counter, agreement, and failure. A negotiation conducted according to the negotiating protocol follows these rounds. These rounds have rules by negotiating parties. These rules are directed towards allowing compromise and leading the negotiation towards agreement or failure. If the rules are obeyed, then every negotiation will end in either the agreement or failure round.
摘要:
A method for flexible allocation of a resource in which a soft limit and a hard limit are assigned to each of a set of potential users of the resource. The soft limits are selected to guarantee access to the resource by all of the potential users. The hard limits are selected to enable each potential user to exceed the corresponding soft limit on a first-come-first-served basis. A request from a user for allocation of a portion of the resource is handled by granting the request if the request if allowed would not exceed soft limit assigned to the user. The request is denied if the request if allowed would exceed the hard limit assigned to the user. To avoid overtaxing the capacity of the resource, the request is denied even when the hard limit of the user is not exceeded if the request if allowed would cause a total allocation of the resource to exceed a high watermark assigned to the resource.
摘要:
A method for enhancing a sporting event by localized display of information is disclosed. Information is collected and correlated with an associated spatial location. A portion of that information is selected based on its relevance. The portion of information selected is displayed at that spatial location.
摘要:
A floating-point unit of a computer includes a floating-point computation unit, floating-point registers and a floating-point status register. The floating-point status register may include a main status field and one or more alternate status fields. Each of the status fields contains flag and control information. Different floating-point operations may be associated with different status fields. Subfields of the floating-point status register may be updated dynamically during operation. The control bits of the alternate status fields may include a trap disable bit for deferring interruptions during speculative execution. A widest range exponent control bit in the status fields may be used to prevent interruptions when the exponent of an intermediate result is within the range of the register format but exceeds the range of the memory format. The floating-point data may be stored in big endian or little endian format.
摘要:
A method and system are disclosed which allow software to communicate with a computer at run-time. The communication provided enables the software to execute at optimal speed on different computers. More particularly, software queries a computer at run-time to determine its hardware resources. Once the software knows the hardware resources available, the software optimizes its code performance in accordance therewith. Alternatively, the invention enables the software to specify the hardware resources to be used by the computer. This allows software developers to configure a computer to act as if it actually had the resources specified by the software.
摘要:
The copy protection of personal computer (PC) software distributed on diskettes is assisted by providing a unique identification (ID) stored in read only memory (ROM) of a personal computer in which software on a diskette is to be used. This ID is accessible to the user of the computer. A vendor who wishes to protect his diskette-distributed software from illegal copying or use provides a source ID on the diskette. The personal computer ID is used with the source ID on the distributed diskette to produce an encoded check word, using any available encryption modality. The check word is generated and written onto the distributed diskette during installation and copied onto all backup versions made by the user's personal computer. Prior to each use of the program, the software on the diskette uses the personal computer and the source IDs and check word to verify that the software is being used on the same personal computer on which it was installed.
摘要:
Illustrated is a system and method that includes identifying data stored as an entry in a list. The system and method also includes truncating the entry to create a truncated entry. It further includes transforming the truncated entry into a hash, the hash used to set an index position value within a Bloom filter. The system and method also includes an interface module to transmit the Bloom filter.
摘要:
A method for look-ahead load pre-fetching that reduces the effects of instruction stalls caused by high latency instructions. Look-ahead load pre-fetching is accomplished by searching an instruction stream for load memory instructions while the instruction stream is stalled waiting for completion of a previous instruction in the instruction stream. A pre-fetch operation is issued for each load memory instruction found. The pre-fetch operations cause data for the corresponding load memory instructions to be copied to a cache, thereby avoiding long latencies in the subsequent execution of the load memory instructions.
摘要:
A playable copy of the digital content object is stored at a first device. A data object associated with the digital content object is sent to a second device. The playable copy of the digital content object is disabled at the first device, such that only an authorized, playable copy of the digital content object is operable to be stored on the first and second device at any given time before, during and after sending the data object.
摘要:
A method for authentication in a client computer and a remote computer is disclosed. A client base value is obtained, selected by a user of the client computer for at least a first usage purpose. A client integer is obtained, selected by the user for at least a second usage purpose. The client base value is combined with the client integer to obtain a client combination. The client combination is hashed to obtain a client password.