摘要:
A method for extending the exponent range in an IBM System/370-type floating point arithmetic processor. Very large or very small numbers are represented by a pair of words having sign, exponent, and fraction portions thereof. If the signs of the low- and high-order words of a pair are the same, then the number is deemed to be in the ordinary processor operating range. However, if the signs differ, then the number is deemed to be out of range. In this case, a range extension is obtained by using the exponent field of the low-order word which otherwise would be transparent to the floating point processor.
摘要翻译:一种在IBM System / 370型浮点运算处理器中扩展指数范围的方法。 非常大或非常小的数字由具有符号,指数和分数部分的一对词表示。 如果一对的低位和高位词的符号相同,则该数字被认为处于普通的处理器工作范围内。 然而,如果符号不同,则该数字被视为超出范围。 在这种情况下,通过使用否则对浮点处理器是透明的低位字的指数字段来获得范围扩展。
摘要:
A method performed within a multi-processing, multi-programming computer environment for reducing conflict among tasks concurrently accessing COMMON BLOCKs in code sequences compiled within said environment from a FORTRAN like language system, and for reducing the memory used in the storing of private copies of said COMMON BLOCKs. The method involves inserting constructs at compile time into the compiled code which enable the COMMON BLOCKs to be dynamically bound at runtime to two or more referencing tasks. Then, at execution time responsive to the constructs, the blocks are bound to the tasks dynamically and scoped so that they lie within the dynamic nesting of the tasks.
摘要:
In one example, a computing device generates a new password for accessing a user account and/or computing system and inspires a change of an existing password for the user account and/or computing system to the new password. Thereafter, the computing device detects occurrence of a condition to trigger another change of the password for the user account and/or computing system and, responsively, inspires another change of the password for the user account and/or computing system.
摘要:
A method of scheduling optional instructions in a compiler targets a processor. The scheduling includes indicating a limit on the additional processor computations that are available for executing an optional code, generating one or more required instructions corresponding to a source code and one or more optional instructions corresponding to the optional code used with the source code and scheduling all of the one or more required instructions with as many of the one or more optional instructions as possible without exceeding the indicated limit on the additional processor computations for executing the optional code.
摘要:
A method for controlling transfer of data is provided. The method includes accessing data at a first device and accessing a time attribute associated with the data at the first device. The method further includes comparing the time attribute to a data transfer time threshold and in response to the time attribute associated with the data at the first device is less than the data transfer time threshold, the method further includes restricting access of the data at a second device.
摘要:
A computer system with mechanisms for providing hint instructions to a processor without altering object code instruction sequences. A computer system according to the present teachings includes elements for generating a hint instruction in response to a set of object code to be executed by the processor and for inserting a break instruction into the object code such that the break instruction causes the processor to obtain and execute the hint instruction. The present techniques for providing hint instructions to a processor may be used to adapt object code to a micro-architecture of the processor.
摘要:
A reusable security tag is provided which is reversibly operable in a first magnetic condition to trigger a detector when the tag is within communication range of the detector, and a second magnetic condition in which the detector is not triggered when the tag is within communication range of the detector. The tag includes an optical indicator which has a first optical characteristic when the tag is in the first magnetic condition, and a second optical characteristic when the tag is in the second magnetic condition.
摘要:
A verifiable random number generator includes mechanisms for monitoring its chaotic behavior. A random number generator according to the present teachings includes a chaos circuit that generates a number according to a chaos function. The random number generator further includes a check circuit that simulates the chaos function and that determines whether the number is a valid random number by monitoring the chaotic behavior of the chaos function.
摘要:
A computer system includes physical registers holding data for compiled programs and a portion of the physical registers form a register stack which wraps around when full. An N-bit current wraparound count state tracks physical register remapping events which cause the register stack to wraparound or unwrap. An advanced load address table (ALAT) has entries corresponding to load instructions, each entry has at least one memory range field defining a range of memory locations accessed by a corresponding load instruction, a physical register number field corresponding to a physical register accessed in the corresponding load instruction, and an N-bit register wraparound field which corresponds to the N-bit current wraparound count state for the corresponding load instruction. A check instruction accesses the ALAT to determine whether a store instruction and an advanced load instruction, which is scheduled before the store instruction, potentially accessed a common memory location. After the execution of the store instruction, an absence of an entry corresponding to the load instruction in the ALAT indicates that a common memory location may have been accessed by the store and load instructions.
摘要:
A software system with self-describing attribute vocabularies that enhance the capability of service providers to advertise their resources and that facilitate the addition of new types of attributes and resources to the system. Each self-describing attribute vocabulary is characterized by a corresponding set of attribute properties and a corresponding set of:matching rules that are adapted to the corresponding attribute properties. The software system includes a matching engine that enables a service provider of a resource to describe the resource to the software system in terms of any one or more of the self-describing attribute vocabularies.