摘要:
An alpha particle detector capable of detecting alpha radiation from distant sources. In one embodiment, a high voltage is generated in a first electrically conductive mesh while a fan draws air containing air molecules ionized by alpha particles through an air passage and across a second electrically conductive mesh. The current in the second electrically conductive mesh can be detected and used for measurement or alarm. The detector can be used for area, personnel and equipment monitoring.
摘要:
Instruction execution includes fetching an instruction that comprises a first set of one or more bits identifying the instruction, and a second set of one or more bits associated with a first address value. It further includes executing the instruction to determine whether to perform a trap, wherein executing the instruction includes selecting from a plurality of tests at least one test for determining whether to perform a trap and carrying out the at least one test. The second set of one or more bits is used in the determination of whether to perform the trap; and the plurality of tests includes a matrix test that determines whether a data value being stored as pointed to by the first address value is escaping from one of a plurality of managed memory types to another one of the plurality of managed memory types and generates a trap in the event that the data value is determined to be escaping from one of the plurality of managed memory types to another one of the plurality of managed memory types, wherein the matrix test is based on a matrix associated with garbage collection and a matrix entry located using at least some of the first set of one or more bits and at least some of the second set of one or more bits.
摘要:
Handling a virtual method call includes extracting, from a pointer to an object, an identifier associated with the class of the object, the pointer to the object being associated with the virtual method call, and the identifier being embedded within the pointer; using the identifier to obtain a virtual method table, including locating a first entry in a class identifier table mapping a plurality of class identifiers to a corresponding plurality of class data, the first entry being associated with the identifier and comprising the virtual method table or a pointer used to obtain the virtual method table; locating a second entry in the virtual method table, the second entry being associated with the virtual method call; and jumping to an address associated with the second entry to execute code at the address.
摘要:
Determining a class of an object is disclosed. A pointer of the object is obtained. One or more bits that are not implemented as address bits are extracted from the pointer. The one or more bits are interpreted as an identifier of the class of the object. The class of the object is determined to correspond to the identifier.
摘要:
Instruction execution includes fetching an instruction that comprises a first set of one or more bits identifying the instruction, and a second set of one or more bits associated with a first address value. It further includes executing the instruction to determine whether to perform a trap, wherein executing the instruction includes selecting from a plurality of tests at least one test for determining whether to perform a trap and carrying out the at least one test. The second set of one or more bits is used in the determination of whether to perform the trap; and the plurality of tests includes a matrix test that determines whether a data value being stored as pointed to by the first address value is escaping from one of a plurality of managed memory types to another one of the plurality of managed memory types and generates a trap in the event that the data value is determined to be escaping from one of the plurality of managed memory types to another one of the plurality of managed memory types, wherein the matrix test is based on a matrix associated with garbage collection and a matrix entry located using at least some of the first set of one or more bits and at least some of the second set of one or more bits.
摘要:
Providing data to an application running on a segmented virtual machine (VM) is disclosed. Providing data includes opening an interface between the segmented VM and an external data source, transferring data from the external data source to an interface buffer, transferring a first selected amount of data from the interface buffer to a shell VM buffer, transferring a second selected amount of data from the shell VM buffer to a core VM buffer, and providing portions of the data from the core VM buffer to the application in response to read requests from the application.
摘要:
Providing data to an application running on a segmented virtual machine (VM) is disclosed. Providing data includes opening an interface between the segmented VM and an external data source, transferring data from the external data source to an interface buffer, transferring a first selected amount of data from the interface buffer to a shell VM buffer, transferring a second selected amount of data from the shell VM buffer to a core VM buffer, and providing portions of the data from the core VM buffer to the application in response to read requests from the application.
摘要:
Improving performance of a computer program is disclosed. A first set of escape data is gathered. A first compiled program is provided using the first set of escape data. A second set of escape data is gathered based on the first compiled program. A second compiled program is provided using the second set of escape data. The second compiled program is more optimized than the first compiled program.
摘要:
A wideband band bus in a base station of a wireless communication system includes consecutively interconnected slots and may be automatically configured into one or more sections that perform application specific cell processing operations, without requiring hardware or software changes to the base station. A section of the wideband bus includes a group of the consecutively connected slots containing digital signal processing modules which implement a cell processing application. The modules included in the slots of a section and the interconnections among the slots provide for diversity reception, expandable cell capacity and cell operations in accordance with wireless communication protocol standards.
摘要:
A system for reading from and for writing data into electronic tags which may be associated with objects which are moving with respect to an interrogator, or may be located in fixed positions in the path of a moving interrogator. The interrogator, which is stationary if the tag is moving, sends a continuous RF signal to the remote tag. The tag backscatter-modulates the received RF signal with data temporarily or permanently stored in the tag, including, for example, data associated with the object to which the tag is attached, for example, its identity or contents. The system of this invention uses a very efficient encoding technique for the data which is backscatter-modulated by the tag and received by the interrogator. The backscatter-modulated signals are made up of signals of first and second frequencies f.sub.1 and 2f.sub.1, respectively, where the second frequency 2f.sub.1 is twice the first frequency f.sub.1, and where one of the two binary bits ONE and ZERO is represented by one-half period of a signal of the first frequency followed by one period of the second frequency, and the other of the two binary bits is represented by one period of a signal of the second frequency followed by one-half period of a signal of the first frequency. The signals also contain FRAME MARKERS made up of five periods of frequency 2f.sub.1 followed by one-half period of frequency f.sub.1.