摘要:
A system that facilitates high-sensitivity detection of anomalous signals in systems with low-resolution sensors. During system operation, a low-resolution sensor monitors a signal within the system. The system periodically polls the low-resolution sensor in a burst mode to obtain a plurality of measurements of the signal within a specified short time interval, wherein the measurements are spread across multiple quantizing bins. The system then determines a mean value for the plurality of measurements. The system repeats the steps of polling the low-resolution sensor and determining the mean value to create a time-series of mean values. This time-series of mean values is subsequently analyzed to determine whether the signal is anomalous.
摘要:
A method for identifying missing components of a computer system may include receiving telemetry signals characterizing a current configuration of the computer system and determining a cross power spectral density signature of at least some of the telemetry signals. The method may further include comparing information about the determined cross power spectral density signature with information about a predetermined cross power spectral density signature to determine whether a component is missing within the computer system.
摘要:
A method for inferring an altitude of a computing device, involving monitoring variable data associated with a plurality of variables measured within the computing device, inferring the altitude of the computing device using the measured plurality of variables in a multivariate correlation function, and controlling operation of the computing device based on the inferred altitude.
摘要:
A system that reduces execution time of a parallel SVM application. During operation, the system partitions an input data set into chunks of data. Next, the system distributes the partitioned chunks of data across a plurality of available computing nodes and executes the parallel SVM application on the chunks of data in parallel across the plurality of available computing nodes. The system then determines if a first timeout period has been exceeded before all of the plurality of available computing nodes have finished processing their respective chunks of data. If so, the system (1) repartitions the input data set into different chunks of data; (2) redistributes the repartitioned chunks of data across some or all of the plurality of available computing nodes; and (3) executes the parallel SVM application on the repartitioned chunks of data in parallel across some or all of the available computing nodes.
摘要:
A method for identifying missing components of a computer system may include receiving telemetry signals characterizing a current configuration of the computer system and determining a cross power spectral density signature of at least some of the telemetry signals. The method may further include comparing information about the determined cross power spectral density signature with information about a predetermined cross power spectral density signature to determine whether a component is missing within the computer system.
摘要:
An intrusion tolerant communication network and related methods is provided that places emphasis on continuity of operation and provides for an attack-survivable communication network whose network devices collectively accomplish the specified networking intent even under attack and despite active intrusions. The present invention defines methods for network intrusion tolerance in terms of the various state transitions that maximize the overall effectiveness of an intrusion tolerant communication network.
摘要:
A method for inferring an altitude of a computing device, involving monitoring variable data associated with a plurality of variables measured within the computing device, inferring the altitude of the computing device using the measured plurality of variables in a multivariate correlation function, and controlling operation of the computing device based on the inferred altitude.
摘要:
A system (100) for campaign planning includes a memory (106) operable to store at least two slab values (132) for each of a plurality of slabs (108). The slab values (132) for a slab are associated with at least two properties of the slab (108). The memory (106) is also operable to store at least one preference value (142) identifying a relative importance between the properties of the slabs (108). The system (100) also includes one or more processors (128) collectively operable to generate a sort value (400) for each of the slabs (108). The sort value (400) depends at least partially on the slab value (132) associated with the slab (108) and the preference value (142). The processor (128) is also operable to allocate the slabs (108) to a plurality of rounds (200) in a campaign (250). The slabs (108) are allocated in an order depending at least partially on the sort values (400) associated with the slabs (108).
摘要:
A system for controlling energy usage in a server having a processor, where the system includes a memory for storing energy cost information, and a controller for determining a transaction rate for the processor. The controller is also for determining a cumulative of energy expended by the server based on the determined transaction rate for each of a number of available power level states (P-states) for operation of the processor, and for selecting one of the available P-states for operation of the processor based on the determined cumulative energy expended and the stored energy cost information.
摘要:
Leaked memory in a computer system is detected and recovered by first detecting memory leakage within the computer system based on nonlinear and non-parametric time-series regression analysis of software telemetry data generated by one or more software process running on the computer system. If existence of memory leakage is detected, then memory that has leaked is specifically identified and recovered. This is done by halting one or more of the software processes, generating a core image file or files of the halted software process(es), and re-starting the halted process or processes without waiting for analysis of the core image file(s). Then, the core image file is evaluated to specifically identify leaked memory in the computer system based on the core image file. Finally, the identified leaked memory is recovered.