摘要:
A synchronization state for a local clock generating circuit of a first of a number of components of a distributed system is maintained according to a number of local clock cycles recorded between successive occurrences of a global synchronization signal provided to the components within the distributed system. The local clock generating circuit may enters the synchronization state only after observing a predetermined number of occurrences of successive local clock cycles between instances of the global synchronization signal. The local clock generating circuit continues to provide local control signals for the first of the components at time instants corresponding to the number of local clock cycles even after an instance of the global synchronization signal is observed at a time instant corresponding to one local clock cycle more or less than the number of local clock cycles. However, the local clock generating circuit enters an alarm state when the global synchronization signal is observed at time instants corresponding to more than one local clock cycle more or less than the number of local clock cycles.
摘要:
A communication interface is described to align at a destination data transmitted through different channels before that data is read out. The communication interface includes a receiver circuit that has a plurality of buffers. Each buffer is coupled to a corresponding channel to receive data therethrough. The communication interface also includes a control circuit, coupled to the plurality of buffers, to enable reading of data from the plurality of buffers when each of the plurality of buffers has received at least one unit of data.
摘要:
A method of providing health care by establishing a predetermined patient population grouped by geographic regions where the patient population has access to a traveling healthcare professional that may travel to the patient's location. The healthcare professional evaluates and examines the patient using a plurality of technologies including a microprocessor and memory storage that is coupled to, or interfaced with, audio/video/data transfer and communications systems, medical devices, and other vital measurement devices that the physician located at the physicians' center uses to assess and consult the healthcare professional who is onsite with the remote patient. During the exam the healthcare professional uses audio/video/data communications for interconnecting the healthcare professional with a physician at the physicians' center. The physician at the physicians' center conducts a virtual house call to help maintain the physician-patient relationship, evaluate the collected information, and instruct the healthcare professional during the physician's examination and evaluation. The physician having access to the patient's health records, family medical history, present medications, prior allergic reactions and any adverse drug interactions or contraindications, assesses, and renders a diagnoses and treatment plan back to the healthcare professional. The healthcare professional under the delegation of the physician treats the patient under the physician's instructions. The physician may prescribe medication and transmit the prescription to a pharmacy. The physician updates the patient's health record with the collected information, diagnosis, physician orders, treatment plan, patient input information, and clinical notes. The method also provides for a patient to obtain medical information without the need for a healthcare professional's visit. The method also provides many illustrations that allow for the assessment, treatment, diagnosis, and sharing of medical information and care to be provided to the patient at the patient's location, and to authorized healthcare professionals.
摘要:
A method and apparatus for corrupting a swarm download in a file sharing network provides corrupt data in response to a request for a portion of a file so that when portions received from various sources are assembled, the assembled product cannot be verified and the process must be repeated. To defeat the method, bad sources are identified and disconnected or otherwise ignored, or good sources are identified and given higher priorities. In another method for deterring unauthorized copying of a protected file in a P2P network, a P2P client offering the protected file is choked with agents connecting to it so that its upload capacity is diluted. In another method, false sources for a protected file are injected into a file sharing network so as to dilute the legitimate sources, making them more difficult to find.
摘要:
An interdiction system includes software agents masquerading as nodes in a decentralized network, a query matcher that receives search results captured by the software agents and reports matches with protected files back to the software agents, and a central coordinating authority that coordinates activities of the software agents by sending instructions to the software agents specifying actions to be taken. Possible activities and related interdicting methods include manipulating search results before forwarding them on in the network, quarantining selected nodes in the network, performing file impersonations such as transferring synthesized decoys, performing file transfer attenuation, and hash spoofing.