摘要:
A method and system are disclosed which allow software to communicate with a computer at run-time. The communication provided enables the software to execute at optimal speed on different computers. More particularly, software queries a computer at run-time to determine its hardware resources. Once the software knows the hardware resources available, the software optimizes its code performance in accordance therewith. Alternatively, the invention enables the software to specify the hardware resources to be used by the computer. This allows software developers to configure a computer to act as if it actually had the resources specified by the software.
摘要:
To support speculative execution in a processor, a speculative look aside table stores information about deferred exceptions. Labels attached to predicates in the predicate register file of the processor serve as indices to a speculative look aside table. When an exception is generated for a speculative operation, the speculative look aside table is updated. Deferred exceptions are detected and handled when the processor reads the corresponding entry in the speculative look aside table during an explicit or implicit check operation.
摘要:
In one example, a computing device generates a new password for accessing a user account and/or computing system and inspires a change of an existing password for the user account and/or computing system to the new password. Thereafter, the computing device detects occurrence of a condition to trigger another change of the password for the user account and/or computing system and, responsively, inspires another change of the password for the user account and/or computing system.
摘要:
A method of scheduling optional instructions in a compiler targets a processor. The scheduling includes indicating a limit on the additional processor computations that are available for executing an optional code, generating one or more required instructions corresponding to a source code and one or more optional instructions corresponding to the optional code used with the source code and scheduling all of the one or more required instructions with as many of the one or more optional instructions as possible without exceeding the indicated limit on the additional processor computations for executing the optional code.
摘要:
A method for controlling transfer of data is provided. The method includes accessing data at a first device and accessing a time attribute associated with the data at the first device. The method further includes comparing the time attribute to a data transfer time threshold and in response to the time attribute associated with the data at the first device is less than the data transfer time threshold, the method further includes restricting access of the data at a second device.
摘要:
A computer system with mechanisms for providing hint instructions to a processor without altering object code instruction sequences. A computer system according to the present teachings includes elements for generating a hint instruction in response to a set of object code to be executed by the processor and for inserting a break instruction into the object code such that the break instruction causes the processor to obtain and execute the hint instruction. The present techniques for providing hint instructions to a processor may be used to adapt object code to a micro-architecture of the processor.
摘要:
A reusable security tag is provided which is reversibly operable in a first magnetic condition to trigger a detector when the tag is within communication range of the detector, and a second magnetic condition in which the detector is not triggered when the tag is within communication range of the detector. The tag includes an optical indicator which has a first optical characteristic when the tag is in the first magnetic condition, and a second optical characteristic when the tag is in the second magnetic condition.
摘要:
A verifiable random number generator includes mechanisms for monitoring its chaotic behavior. A random number generator according to the present teachings includes a chaos circuit that generates a number according to a chaos function. The random number generator further includes a check circuit that simulates the chaos function and that determines whether the number is a valid random number by monitoring the chaotic behavior of the chaos function.
摘要:
A computer system includes physical registers holding data for compiled programs and a portion of the physical registers form a register stack which wraps around when full. An N-bit current wraparound count state tracks physical register remapping events which cause the register stack to wraparound or unwrap. An advanced load address table (ALAT) has entries corresponding to load instructions, each entry has at least one memory range field defining a range of memory locations accessed by a corresponding load instruction, a physical register number field corresponding to a physical register accessed in the corresponding load instruction, and an N-bit register wraparound field which corresponds to the N-bit current wraparound count state for the corresponding load instruction. A check instruction accesses the ALAT to determine whether a store instruction and an advanced load instruction, which is scheduled before the store instruction, potentially accessed a common memory location. After the execution of the store instruction, an absence of an entry corresponding to the load instruction in the ALAT indicates that a common memory location may have been accessed by the store and load instructions.
摘要:
A software system with self-describing attribute vocabularies that enhance the capability of service providers to advertise their resources and that facilitate the addition of new types of attributes and resources to the system. Each self-describing attribute vocabulary is characterized by a corresponding set of attribute properties and a corresponding set of:matching rules that are adapted to the corresponding attribute properties. The software system includes a matching engine that enables a service provider of a resource to describe the resource to the software system in terms of any one or more of the self-describing attribute vocabularies.