摘要:
Software fault isolation methods using byte-granularity memory protection are described. In an embodiment, untrusted drivers or other extensions to a software system are run in a separate domain from the host portion of the software system, but share the same address space as the host portion. Calls between domains are mediated using an interposition library and access control data is maintained for substantially each byte of relevant virtual address space. Instrumentation added to the untrusted extension at compile-time, before load-time, or at runtime and added by the interposition library enforces the isolation between domains, for example by adding access right checks before any writes or indirect calls and by redirecting function calls to call wrappers in the interposition library. The instrumentation also updates the access control data to grant and revoke access rights on a fine granularity according to the semantics of the operation being invoked.
摘要:
Methods and apparatus for generating error reports with enhanced privacy are described. In an embodiment the error is triggered by an input to a software program. An error report is generated by identifying conditions on an input to the program which ensure that, for any input which satisfies the conditions, the software program will follow the same execution path such that the error can be reproduced. The error report may include these conditions or may include a new input generated using the conditions.
摘要:
Software fault isolation methods using byte-granularity memory protection are described. In an embodiment, untrusted drivers or other extensions to a software system are run in a separate domain from the host portion of the software system, but share the same address space as the host portion. Calls between domains are mediated using an interposition library and access control data is maintained for substantially each byte of relevant virtual address space. Instrumentation added to the untrusted extension at compile-time, before load-time, or at runtime and added by the interposition library enforces the isolation between domains, for example by adding access right checks before any writes or indirect calls and by redirecting function calls to call wrappers in the interposition library. The instrumentation also updates the access control data to grant and revoke access rights on a fine granularity according to the semantics of the operation being invoked.
摘要:
Methods and apparatus for generating error reports with enhanced privacy are described. In an embodiment the error is triggered by an input to a software program. An error report is generated by identifying conditions on an input to the program which ensure that, for any input which satisfies the conditions, the software program will follow the same execution path such that the error can be reproduced. The error report may include these conditions or may include a new input generated using the conditions.
摘要:
Computations are performed on shared datasets in a distributed computing cluster using aggressive speculation and a distributed runtime that executes code transactionally. Speculative transactions are conducted with currently available data on the assumption that no dependencies exist that will render the input data invalid. For those specific instances where this assumption is found to be incorrect—that the input data did indeed have a dependency (thereby impacting the correctness of the speculated transaction)—the speculated transaction is aborted and its results (and all transactions that relied on its results) are rolled-back accordingly for re-computation using updated input data. In operation, shared state data is read and written using only the system's data access API which ensures that computations can be rolled-back when conflicts stemming from later-determined dependencies are detected.
摘要:
The invention relates to an active filter device for a power supply comprising a source having a source of current iS and a voltage VE, a power converter presenting an input inductor L, a power switch T controlled by a chopper signal and delivering an output voltage VS, and a load, the device being characterized in that it includes an active filter converter (10) for generating at its output a compensation current minus harmonics of the source current due to the chopping, in response to an input signal representative of the chopping of the power converter.
摘要:
The invention relates to an active filter device for a power supply comprising a source having a source of current iS and a voltage VE, a power converter presenting an input inductor L, a power switch T controlled by a chopper signal and delivering an output voltage VS, and a load, the device being characterized in that it includes an active filter converter (10) for generating at its output a compensation current minus harmonics of the source current due to the chopping, in response to an input signal representative of the chopping of the power converter.
摘要:
A pseudo holographic visual effect is produced by acquiring at least two actual images of a subject wherein each image represents a different viewing angle of the single subject. Intermediary images corresponding to other viewing angles of the subject may be extrapolated from the two actual images or two adjacent images if a sufficient number of actual images are not available to create the desired level of resolution. To create the effect, an initial start image is displayed. Computer based sensors or camera images from a camera are then used to determine any movement of the device or user from the initial position at which the initial image was displayed. Once movement is detected or once the position of the viewer is determined, the initial image is replaced with an image that corresponds to the change in the detected viewing angle or with an image that corresponds to the viewing angle of the viewer. This creates a pseudo holographic effect whereby the orientation of subject of the image appears to remain fixed despite the display or the viewer being moved. Additional layers for the image can be created by acquiring images of a background separately, creating a set of images that correspond to different viewing angles of the background and overlaying the background images with subject images during display.
摘要:
Computations are performed on shared datasets in a distributed computing cluster using aggressive speculation and a distributed runtime that executes code transactionally. Speculative transactions are conducted with currently available data on the assumption that no dependencies exist that will render the input data invalid. For those specific instances where this assumption is found to be incorrect—that the input data did indeed have a dependency (thereby impacting the correctness of the speculated transaction)—the speculated transaction is aborted and its results (and all transactions that relied on its results) are rolled-back accordingly for re-computation using updated input data. In operation, shared state data is read and written using only the system's data access API which ensures that computations can be rolled-back when conflicts stemming from later-determined dependencies are detected.