摘要:
The aspects disclosed herein are directed to systems, methods, implementations, and devices for evaluating the efficacy of optical fire placement(s) with a plume-based model. Employing the aspects disclosed herein, an implementer may review a real-world implementation and determine if said real-world implementation is covered adequately by a proposed optical fire placement strategy.
摘要:
One embodiment of the present disclosure sets forth an effective way to maintain fairness and order in the scheduling of common resource access requests related to replay operations. Specifically, a streaming multiprocessor (SM) includes a total order queue (TOQ) configured to schedule the access requests over one or more execution cycles. Access requests are allowed to make forward progress when needed common resources have been allocated to the request. Where multiple access requests require the same common resource, priority is given to the older access request. Access requests may be placed in a sleep state pending availability of certain common resources. Deadlock may be avoided by allowing an older access request to steal resources from a younger resource request. One advantage of the disclosed technique is that older common resource access requests are not repeatedly blocked from making forward progress by newer access requests.
摘要:
An apparatus and method for managing historical data includes receiving a compiled application program and a declarative specification. An enhancer generates one or more representations of at least one data class defined in the application program based on at least one historical metatag and historical metadata associated therewith from the declarative specification. The enhancer also generates configuring instructions for configuring a database in accordance with the storage representation(s), an enhanced compiled application program including instructions for accessing data in the configured database, and a historical updater program for updating the data in the database based on the historical metadata. Once the database is configured in accordance with the configuring instructions and data is stored in accordance with the storage representation(s), the enhanced compiled application program is executed to access the database so as to retrieve historical data therefrom and the historical updater program is executed to update the data in the database based on the historical metadata.
摘要:
A floor surface treatment apparatus having a wheeled vehicle including a support for a floor surface treatment unit, the support being moveable relative to the vehicle. A floor surface treatment unit is pivotally carried by the support for swinging movement relative thereto. The support is configured to raise and lower the unit relative to the floor surface, upon movement of the support relative to the vehicle, through a range of working positions in which the unit maintains a generally vertical orientation relative to the floor surface and is generally in contact therewith and a servicing position in which the unit is swung up relative to the vehicle above the floor surface to a position in which the unit is generally angled relative to the floor surface.
摘要:
A probe for a communications network is arranged to implement an aggregate test constituted from a plurality of individual tests, and to optimise modifications to the aggregate test with respect to an optimisation goal.
摘要:
A method of generating a monitoring datagram for a predetermined network includes generating an initial datagram and encapsulating the initial datagram with a shim header, where the shim header has a first shim entry and a second shim entry, the first and second shim entries are associated with the predetermined network, the first shim entry is next to and follows the second shim entry, and where the first shim entry identifies the initial datagram as having a monitoring status.
摘要:
A system for controlling selection of filters for protecting against vulnerabilities of a computer network includes a vulnerability management system analyzes the computer network and determines network vulnerabilities for the computer network. The vulnerability management system is configured to receive real-time data on a status of filters protecting against vulnerabilities of the computer network. A database contains a pre-generated mapping of network vulnerabilities to filters for protecting against the network vulnerabilities. The vulnerability management system enables user control of filters for protecting against vulnerabilities of the computer network based upon the determined network vulnerabilities of the computer network, the pre-generated mapping of network vulnerabilities to the filters for protecting against the network vulnerabilities and the real-time data on the status of the filters.
摘要:
A laptop computer carrying case transforms into a desktop for use of a laptop or similar electronic device having a keyboard and a hingeably openable display. The laptop key board is held by bands in the lower portion of the case and the display is held in the top section of the case. Hinge structures are provided on the left and right sidewalls of the bottom section of the case. When the hinge structures are pivotally angularly separated, the bottom section containing the keyboard will be substantially horizontal enabling use of the laptop in a standing or mobile position. When the laptop is not being used, the case may be closed and the hinge structures closed with the laptop being carried by the strap over the shoulder. The hinge structure is provided with structure for limiting the amount by which the arms of the hinge may be pivotally angularly separated thereby providing stability to the laptop case in the desk top position. Detent means is provided to hold the arms of the hinge structure in aligned position when the case is being used to carry the laptop.
摘要:
The present invention relates to a method for optimization of demands in a packet switched communication network, especially, though not exclusively, for the optimization of demands in a Multi Protocol Label Switching (MPLS) packet switched communication network. The present invention provides a method to enable network nodes, such as routers to be clustered into components, with the components organised in a hierarchical fashion, and with the network “core” at the root of this hierarchy. Demands that originate or terminate at components outside the core, but that traverse the core, are temporarily replaced by demands that originate and terminate within the core component. Having optimized the resulting set of demands it is then shown how to use the solution to satisfy the original demands. Multi-access networks cause some complications, and these are taken into account. Also, further demand replacement methods have been developed that take into account complex access situations, In particular, as mentioned, the case has been considered, where there is an existing partitioning of the routers, e.g. into core and access routers, which needs to be respected.