摘要:
Dynamically replicated memory is usable to allocate new memory space from failed memory pages by pairing compatible failed memory pages to reuse otherwise unusable failed memory pages. Dynamically replicating memory involves detecting and recording memory faults, reclaiming failed memory pages for later use, recovering from detected memory faults, and scheduling access to replicated memory pages.
摘要:
Dynamically replicated memory is usable to allocate new memory space from failed memory pages by pairing compatible failed memory pages to reuse otherwise unusable failed memory pages. Dynamically replicating memory involves detecting and recording memory faults, reclaiming failed memory pages for later use, recovering from detected memory faults, and scheduling access to replicated memory pages.
摘要:
Dynamically replicated memory is usable to allocate new memory space from failed memory pages by pairing compatible failed memory pages to reuse otherwise unusable failed memory pages. Dynamically replicating memory involves detecting and recording memory faults, reclaiming failed memory pages for later use, recovering from detected memory faults, and scheduling access to replicated memory pages.
摘要:
Dynamically replicated memory is usable to allocate new memory space from failed memory pages by pairing compatible failed memory pages to reuse otherwise unusable failed memory pages. Dynamically replicating memory involves detecting and recording memory faults, reclaiming failed memory pages for later use, recovering from detected memory faults, and scheduling access to replicated memory pages.
摘要:
Techniques for implementing mutual-exclusion algorithms that are also fault-resistant are described herein. For instance, this document describes systems that implement fault-resistant, mutual-exclusion algorithms that at least prevent simultaneous access of a shared resource by multiple threads when (i) one of the multiple threads is in its critical section, and (ii) the other thread(s) are waiting in a loop to enter their respective critical sections. In some instances, these algorithms are fault-tolerant to prevent simultaneous access of the shared resource regardless of a state of the multiple threads executing on the system. In some instances, these algorithms may resist (e.g., tolerate entirely) transient memory faults (or “soft errors”).
摘要:
The coexistence of a plurality of different wireless networks that concurrently operate in a common geographic region is optimized. A query is received from a wireless node requesting advice on specific portions of a radio frequency spectrum to use. A spectrum recommendation procedure is then run to generate advice on recommended portions of the radio frequency spectrum for the wireless node to use in order to minimize one or more of interference in the spectrum, or noise in the spectrum, or contention in the spectrum. A recommendation reply is then sent to the wireless node which includes information specifying the recommended portions of the radio frequency spectrum for the wireless node to use in order to minimize one or more of interference in the spectrum, or noise in the spectrum, or contention in the spectrum.
摘要:
Architecture that enables wireless narrowband devices (e.g., wireless microphones) and white space devices to efficiently coexist on the same telecommunications channels, while not interfering with the usability of the wireless narrowband device. The architecture provides interference detection, strobe generation and detection and, power ramping and suppression (interference-free coexistence with spectrum efficiency). The architecture provides the ability of the white space device to learn about the presence of the microphone. This can be accomplished i using a geolocation database, reactively via a strober device, and/or proactively via the strober device. The strober device can be positioned close to the microphone receiver and signals the presence of a microphone to white space devices on demand. The strober device takes into consideration the microphone's characteristics as well as the relative signal strength from the microphone transmitter versus the white space device, in order to enable maximum use of the available white space spectrum.
摘要:
Described is incorporating white space networking components into a network stack. A user mode spectrum access control component determines which white space channels are currently allowed for use based upon policy, current operating status and availability information obtained from one or more sources. A white space service (e.g., in the WLAN service) receives the availability information. The white space service includes a discovery module that discovers other nodes, and a channel migration module that changes from the current channel to another channel if the current channel is no longer allowed for use. A kernel mode (NDIS layer) white space driver through a miniport driver controls the channel in use as the current channel. An automatic configuration module is provided that switches to Wi-Fi network communication when a Wi-Fi network is present, and switches back when a Wi-Fi network is not present.
摘要:
Techniques are described to mitigate ad stalking and other user concerns resulting from user-targeted advertising. A user may be informed of advertising information by a process in which an advertising server receives a request for an ad. The request may have been generated in response to a user request for a landing web page. An ad may be selected based on user information available to the advertising server, where the user information is associated with the user and describes behavior and/or attributes and/or preferences associated with the user. Text about how the ad was selected may be incorporated into the ad. Such text may describe the user information used to select the ad. The selection-disclosing text may be incorporated in the ad in a form that is displayable to the user by a browser. The ad may then be transmitted for display in the landing web page.
摘要:
Techniques for utilizing trusted hardware components for mitigating the effects of equivocation amongst participant computing devices of a distributed system are described herein. For instance, a distributed system employing a byzantine-fault-resilient protocol—that is, a protocol intended to mitigate (e.g., tolerate, detect, isolate, etc.) the effects of byzantine faults—may employ the techniques. To do so, the techniques may utilize a trusted hardware component comprising a non-decreasing counter and a key. This hardware component may be “trusted” in that the respective participant computing device cannot modify or observe the contents of the component in any manner other than according to the prescribed procedures, as described herein. Furthermore, the trusted hardware component may couple to the participant computing device in any suitable manner, such as via a universal serial bus (USB) connection or the like.