Abstract:
A method and system is used to determine the correct rounding of a floating point function. The method involves performing the floating point function to a higher precision than required and examining the portion of extra precision in the result known as the discriminant. If a critical pattern is found in the discriminant, this indicates that standard rounding may give an incorrect result and further calculation is needed. The method can work for various rounding modes and types of floating point representations. The method can be implemented in a system as part of a processor instruction set or any combination of hardware, microcode, and software.
Abstract:
A system and method for redeeming a coupon. The method includes determining that a coupon is valid, determining that the valid coupon is still available for use, and determining that the available valid coupon is tied to a user. The method additionally comprises determining that an ID for the user matches an ID for the user stored for the available valid coupon, and adding the available valid coupon to an order by the user to redeem the coupon.
Abstract:
Method and apparatus for reducing a number of storage elements in a synthesized synchronous circuit. In one embodiment, the circuit is represented as a directed, partitioned graph. The graph is divided into a plurality of time-ordered timeslots that are bounded by storage elements. The strongly-connected components (SCCs) in the graph are first identified. For each middle SCC where there is slack between the middle SCC and a first SCC and slack between the middle SCC and a second SCC, a time-slot-relative direction is selected for moving the middle SCC. The direction is selected as a function of a number of storage elements required for moving the middle SCC toward the first SCC versus moving the middle SCC toward the second SCC. The middle SCC is then moved in the selected time-slot-relative direction.
Abstract:
A method is provided of setting the voice personality of a voice service site. A user browsing a voice web visits a voice site where the voice output of the site is presented using a set of voice personality characterisers with which the user is particularly comfortable. The user, in subsequently transferring to another voice service site, opts to have the voice personality that was embodied in the set of voice personality characterisers used by the site being left, transfer with the user to the new site. This transfer will typically be subject to permissions set by both the site being left and the site about to be visited.
Abstract:
A process for executing a downloadable service with specific access rights to at least one profile file in a user's computer. The web browser is used for accessing a web server through a first set of communication port and socket. Therefore is arranged a confined runtime environment such as for example an extended sandbox (11) and used in Java programming which Is assigned a second communication port and s ockets and which is used for executing downloadable service with restricted access on at least one profile file. The process can be used for executing services under the form of a signed archive file which signature is used for both validating the archive file and for selecting one particular secure class loader prior to the generation of the compiled code of the service.
Abstract:
The present invention provides a pedestal docking station including an upwardly extending pedestal having an upper end, a base section, and a center of mass; an upper mounting member coupled to the upper end of the upwardly extending pedestal to receive the notebook computer in an elevated, supporting relationship at least four inches above a work surface with a center of mass of the notebook computer in substantial vertical alignment with the center of mass of the upwardly extending pedestal; and port replicator components coupled to the upper mounting member, the port replicator components corresponding to input/output ports of the notebook computer and including connections for attachment to supporting peripheral components.
Abstract:
A method for producing a DIMM having a reduced memory capacity. The method includes determining an amount by which a memory capacity of a DIMM can be reduced, and reducing the memory capacity of the DIMM in accordance with the determined amount to produce a DIMM having a reduced memory capacity which is available for use and a dormant memory capacity which is not available for use. A DIMM produced in accordance with the method. A computer assembly having a computer, and a DIMM disposed in the computer and having reduced memory capacity
Abstract:
A method for selecting a basic block in a computer program comprising providing a computer program including an entry basic block and a plurality of basic blocks forming control flow paths, determining that immediate subsets of the control flow paths commencing with the entry basic block are essentially unbiased subsets, determining that the basic blocks in the immediate subsets of the flow control paths have essentially the same height, and selecting any one of the basic blocks in the immediate subsets of the flow control flow paths. The height may be a height selected from the group of heights consisting of resource height and dependence height. An article of manufacture including a computer-readable medium having instructions for selecting a basic block or for forming a new computer control flow path. A computer system comprising a computer program having instructions for selecting a basic block or for forming a new computer control flow path.
Abstract:
Method and apparatus for inserting prefetch instructions in an executable computer program. Profile data are generated for executed load instructions and store instructions. The profile data include instruction addresses, target addresses, data loaded and stored, and execution counts. From the profile data, recurring patterns of instructions resulting in cache-miss conditions are identified. Prefetch instructions are inserted prior to the instructions that result in cache-miss conditions for patterns of instructions recurring more than a selected frequency.
Abstract:
A seedable pseudo-random number generator. A linear feedback shift register (LFSR) arrangement is used to generate a first pseudo-random number, and a cellular automata is used to generate a second pseudo-random number. The bits of the LFSR arrangement are XORed with bits of the cellular automata to generate the output pseudo-random number.