摘要:
An anonymous communication module that provides full conversational anonymous messaging and voice/video communication between two or more parties interacting over a wireless/landline network. An anonymous messaging module accepts an anonymous initiation message to a public address to trigger the start of an anonymous voice/video conversation between a message originator and a message recipient. An anonymous communication module performs intercept and address substitution on a message and/or voice/video call transmitted between two or more parties via an anonymous communication service. The anonymous communication module substitutes a real address in the source field of an intercepted message and/or voice/video call, with an anonymous address mapped to that real address, and substitutes an anonymous address in the destination field of an intercepted message and/or voice/video call with a real address mapped to that anonymous address. The anonymous communication module then forwards the newly formatted message and/or voice/video call to an intended message/call destination.
摘要:
An anonymous communication module that provides full conversational anonymous messaging and voice/video communication between two or more parties interacting over a wireless/landline network. An anonymous messaging module accepts an anonymous initiation message to a public address to trigger the start of an anonymous voice/video conversation between a message originator and a message recipient. An anonymous communication module performs intercept and address substitution on a message and/or voice/video call transmitted between two or more parties via an anonymous communication service. The anonymous communication module substitutes a real address in the source field of an intercepted message and/or voice/video call, with an anonymous address mapped to that real address, and substitutes an anonymous address in the destination field of an intercepted message and/or voice/video call with a real address mapped to that anonymous address. The anonymous communication module then forwards the newly formatted message and/or voice/video call to an intended message/call destination.
摘要:
Methods and apparatus for generating a report from hierarchically formatted data are disclosed. First, a data source including one or more files having a hierarchical file format is identified, where each of the files includes one or more data elements. A relational database model is obtained, where the relational database model includes one or more virtual tables, each of the virtual tables including one or more virtual columns. The relational database model is then mapped to the hierarchical file format. A query may be obtained using the virtual relational database. Data is then obtained from the virtual relational database corresponding to the query, thereby enabling a report including the data to be generated.
摘要:
The present disclosure discloses a digital communication between the between embedded cable modem (eCM) and embedded set-top box (eSTB) via a shared memory. The communication is carried out by packet transfer mechanism as per the protocol without adding any extra header overhead. The communication link is established between the eSTB and eCM mainly in layer 2 and partly in layer 1 according to an implementation of the OSI model. Further, eSTB is used as an eSAFE device coupled to eCM where the eCM and eSTB are considered to be placed on two SoCs with a separate CPU to each SoC (System-On-Chip) with a shared memory (via high speed data bus protocol). DMA (Direct Memory Access) engines are used to accelerate data transfer and to reduce load. DMA of only eCM, SoC is used to minimize hardware resources.
摘要:
Methods and apparatus for generating a report from hierarchically formatted data are disclosed. First, a data source including one or more files having a hierarchical file format is identified, where each of the files includes one or more data elements. A relational database model is obtained, where the relational database model includes one or more virtual tables, each of the virtual tables including one or more virtual columns. The relational database model is then mapped to the hierarchical file format. A query may be obtained using the virtual relational database. Data is then obtained from the virtual relational database corresponding to the query, thereby enabling a report including the data to be generated.
摘要:
An anonymous communication module that provides full conversational anonymous messaging and voice/video communication between two or more parties interacting over a wireless/landline network. An anonymous messaging module accepts an anonymous initiation message to a public address to trigger the start of an anonymous voice/video conversation between a message originator and a message recipient. An anonymous communication module performs intercept and address substitution on a message and/or voice/video call transmitted between two or more parties via an anonymous communication service. The anonymous communication module substitutes a real address in the source field of an intercepted message and/or voice/video call, with an anonymous address mapped to that real address, and substitutes an anonymous address in the destination field of an intercepted message and/or voice/video call with a real address mapped to that anonymous address. The anonymous communication module then forwards the newly formatted message and/or voice/video call to an intended message/call destination.
摘要:
In a method for increasing coverage convergence during verification of a design for an IC, symbolic elements can be generated for the variables and the variable expressions in the hardware code of the design and a test bench. Simulation semantics can be modified and local multi-path analysis can be provided to expand symbolic property collection and symbolic element propagation. Modifying simulation semantics can include transformation of conditional statements, flattening of conditions, avoidance of short circuiting logic, and/or symbolic triggering of events. Symbolic elements are propagated through the design and the test bench during multiple simulation runs to collect symbolic properties. Coverage information from the multiple simulation runs is analyzed to identify coverage points to be targeted. For each identified coverage point, the constraints resulting from the collected symbolic properties are solved to generate directed stimuli for the design. These directed stimuli increase the coverage convergence.
摘要:
The present disclosure discloses a digital communication between the embedded cable modem (eCM) and embedded set-top box (eSTB) via a shared memory. The communication is carried out by packet transfer mechanism as per the protocol without adding any extra header overhead. The communication link is established between the eSTB and eCM mainly in layer 2 and partly in layer 1 according to an implementation of the OSI model. Further, eSTB is used as an eSAFE device coupled to eCM where the eCM and eSTB are considered to be placed on two SoCs with a separate CPU to each SoC (System-On-Chip) with a shared memory (via high speed data bus protocol). DMA (Direct Memory Access) engines are used to accelerate data transfer and to reduce load. DMA of only eCM, SoC is used to minimize hardware resources.
摘要:
In a method for increasing coverage convergence during verification of a design for an IC, symbolic elements can be generated for the variables and the variable expressions in the hardware code of the design and a test bench. Simulation semantics can be modified and local multi-path analysis can be provided to expand symbolic property collection and symbolic element propagation. Modifying simulation semantics can include transformation of conditional statements, flattening of conditions, avoidance of short circuiting logic, and/or symbolic triggering of events. Symbolic elements are propagated through the design and the test bench during multiple simulation runs to collect symbolic properties. Coverage information from the multiple simulation runs is analyzed to identify coverage points to be targeted. For each identified coverage point, the constraints resulting from the collected symbolic properties are solved to generate directed stimuli for the design. These directed stimuli increase the coverage convergence.
摘要:
An anonymous communication module that provides full conversational anonymous messaging and voice/video communication between two or more parties interacting over a wireless/landline network. An anonymous messaging module accepts an anonymous initiation message to a public address to trigger the start of an anonymous voice/video conversation between a message originator and a message recipient. An anonymous communication module performs intercept and address substitution on a message and/or voice/video call transmitted between two or more parties via an anonymous communication service. The anonymous communication module substitutes a real address in the source field of an intercepted message and/or voice/video call, with an anonymous address mapped to that real address, and substitutes an anonymous address in the destination field of an intercepted message and/or voice/video call with a real address mapped to that anonymous address. The anonymous communication module then forwards the newly formatted message and/or voice/video call to an intended message/call destination.