摘要:
In one example, a computing device generates a new password for accessing a user account and/or computing system and inspires a change of an existing password for the user account and/or computing system to the new password. Thereafter, the computing device detects occurrence of a condition to trigger another change of the password for the user account and/or computing system and, responsively, inspires another change of the password for the user account and/or computing system.
摘要:
A method of scheduling optional instructions in a compiler targets a processor. The scheduling includes indicating a limit on the additional processor computations that are available for executing an optional code, generating one or more required instructions corresponding to a source code and one or more optional instructions corresponding to the optional code used with the source code and scheduling all of the one or more required instructions with as many of the one or more optional instructions as possible without exceeding the indicated limit on the additional processor computations for executing the optional code.
摘要:
A method for controlling transfer of data is provided. The method includes accessing data at a first device and accessing a time attribute associated with the data at the first device. The method further includes comparing the time attribute to a data transfer time threshold and in response to the time attribute associated with the data at the first device is less than the data transfer time threshold, the method further includes restricting access of the data at a second device.
摘要:
A computer system with mechanisms for providing hint instructions to a processor without altering object code instruction sequences. A computer system according to the present teachings includes elements for generating a hint instruction in response to a set of object code to be executed by the processor and for inserting a break instruction into the object code such that the break instruction causes the processor to obtain and execute the hint instruction. The present techniques for providing hint instructions to a processor may be used to adapt object code to a micro-architecture of the processor.
摘要:
A reusable security tag is provided which is reversibly operable in a first magnetic condition to trigger a detector when the tag is within communication range of the detector, and a second magnetic condition in which the detector is not triggered when the tag is within communication range of the detector. The tag includes an optical indicator which has a first optical characteristic when the tag is in the first magnetic condition, and a second optical characteristic when the tag is in the second magnetic condition.
摘要:
A verifiable random number generator includes mechanisms for monitoring its chaotic behavior. A random number generator according to the present teachings includes a chaos circuit that generates a number according to a chaos function. The random number generator further includes a check circuit that simulates the chaos function and that determines whether the number is a valid random number by monitoring the chaotic behavior of the chaos function.
摘要:
A computer system includes physical registers holding data for compiled programs and a portion of the physical registers form a register stack which wraps around when full. An N-bit current wraparound count state tracks physical register remapping events which cause the register stack to wraparound or unwrap. An advanced load address table (ALAT) has entries corresponding to load instructions, each entry has at least one memory range field defining a range of memory locations accessed by a corresponding load instruction, a physical register number field corresponding to a physical register accessed in the corresponding load instruction, and an N-bit register wraparound field which corresponds to the N-bit current wraparound count state for the corresponding load instruction. A check instruction accesses the ALAT to determine whether a store instruction and an advanced load instruction, which is scheduled before the store instruction, potentially accessed a common memory location. After the execution of the store instruction, an absence of an entry corresponding to the load instruction in the ALAT indicates that a common memory location may have been accessed by the store and load instructions.
摘要:
A software system with self-describing attribute vocabularies that enhance the capability of service providers to advertise their resources and that facilitate the addition of new types of attributes and resources to the system. Each self-describing attribute vocabulary is characterized by a corresponding set of attribute properties and a corresponding set of:matching rules that are adapted to the corresponding attribute properties. The software system includes a matching engine that enables a service provider of a resource to describe the resource to the software system in terms of any one or more of the self-describing attribute vocabularies.
摘要:
A new application sharing technology that enables sharing of many single-user non-modified applications between two or more workstations. It provides concurrent sharing of existing multiple applications with no change in a distributed environment. It permits real-time sharing of distributed applications based on a fundamental window hierarchical mapping and user interactions. Control is centralized but the data and program are replicated. It is event driven with agent assistance. The new event capturing capability is automatically triggered by user interactions on entering/leaving the shared window. The event capturing capability starts when the user moves the pointer into the shared windows. The event capturing ends when the user moves the pointer out of the shared windows. The new multicasting scope is defined in a shared window hierarchy data array. This global data array is dynamically created at run time on an as-needed basis. Because this mechanism only processes user input events such as mouse, keyboard or cursor movement (commands), no output graphic data transmission across the network is required. Therefore, this approach is extremely light-weight and provides secure transmission without requiring intensive encryption. Because it is not using pseudo server interception, this approach can support DHA 3-D rendering. Also, the agent can dynamically mediate resources and normalize environment differences. This permits real-time sharing of 3-D, graphic and DHA (direct hardware access) applications. DHA permits the application to bypass the windowing server to render graphics on display. Moreover, because it is extremely light-weight, high network bandwidth is not required.
摘要:
A circuit and method for clipping input integers to a specified range comprising the steps of providing a mask wherein a bit is set for each out-of-range bit and not set for in-range bits and applying the mask to input integers so that any integers outside of the range is clipped to the quantity in the range closest to the integer, thereby producing output integers within a range specified by the mask. Other systems and methods are disclosed.