摘要:
A multiple processor system composed of a plurality of instruction processors allows a plurality of its subsystems for performing data processing in each unit to be operable simultaneously with and parallel to each other in each of the instruction processors. The multiple processor system has a processor designation table and a control processing subsystem. As the processor designation table specifies correspondence relation between a subsystem accessing to each input-output resource and the instruction processor executing the subsystem, the processing control subsystem transfers control of the processing to the instruction processor to be designated by the processor designation table in accordance with the subsystem to be used with reference to the processor designation table during execution of the data processing.
摘要:
Task execution control for a multiprocessor wherein at a time point when a post issue task ends the use of a shared resource, the shared resource is released, another task which is running on another processor is allowed to lock the shared resource, and thereafter the task is made ready. After that, the post procedure is initiated, and thereafter through the high-speed dispatch procedure, the processor is granted first to a task which has failed to lock the shared resource, and the task is prompted to retry to lock the shared resource.
摘要:
In a composite system in which a plurality of data base systems and data communication are treated as respective subsystems. At the occurrence of a fault in one subsystem, other subsystems are allowed to operate continuously, thereby facilitating recovery after a faulty subsystem has started up. A controller performs as to which data base system a transaction in execution has accessed so that the range of failure is confined, thereby facilitating the fault recovery. The check points of two processings including updating of information in the memory and accumulation of the updated information in the journal are detected so that the need of journals for information occurring earlier than the check point is eliminated, and a check point dump is acquired without waiting for the end of a transaction which has been active at the check point.
摘要:
A computer system including a plurality of shared resources to be used exclusively by a plurality of tasks. Upon occurrence of an interrupt, execution of the task running at that time is suspended to allow the interrupt task to be executed. After execution of the interrupt task, one of the tasks remaining in the execution waiting state is selected for execution. A method of scheduling tasks with priority to the task locking a shared resource includes the steps of registering a task identifier of a task being executed upon locking of the task to a resource, invalidating the registered identifier of the task when that task releases the shared resource from the locked state, deciding whether or not a valid task identifier representing the task which was running by locking the shared resource is registered when a task to be executed next is to be selected after execution of the interrupt task, and selecting the task designated by the task identifier, if registered, to thereby select the task as the one to be executed with priority.
摘要:
A database system includes a database unit for storing a database, a managing processor and a processor. The managing processor manages the database unit and accesses the database unit in response to an inputted particular request. The processor internally generates a request in accordance with a user program, directly accesses the database unit in accordance with the generated request when the generated request is one of first predetermined requests, and outputs the generated request to the managing processor as a particular request when the generated request is one of second predetermined requests. Each of the second predetermined requests incurs a change in contents of the database, and the managing processor updates a log stored in a log unit in accordance with processing for the particular request.
摘要:
In a composite subsystem having a plurality of data base systems and data communication on a plurality of processors, a composite subsystem controller unifies other data base systems of the composite subsystem and distributed data base systems, and, at the occurrence of a fault in some subsystem, allows other subsystems to operate continuously, thereby facilitating the recovery after the faulty subsystem has started up, and makes management as to which data base system a transaction in execution has accessed so that the range of failure is confined, thereby facilitating the fault recovery. The check points of two processings including updating of information in the memory and accumulation of the updated information in the journal are detected so that the need of journals earlier than the check point is eliminated, and a check point dump is acquired without waiting for the end of transaction which has been active at the check point.
摘要:
Conventional independent component analysis has had a problem that performance deteriorates when the number of sound sources exceeds the number of microphones. Conventional l1 norm minimization method assumes that noises other than sound sources do not exist, and is problematic in that performance deteriorates in environments in which noises other than voices such as echoes and reverberations exist. The present invention considers the power of a noise component as a cost function in addition to an l1 norm used as a cost function when the l1 norm minimization method separates sounds. In the l1 norm minimization method, a cost function is defined on the assumption that voice has no relation to a time direction. However, in the present invention, a cost function is defined on the assumption that voice has a relation to a time direction, and because of its construction, a solution having a relation to a time direction is easily selected.
摘要:
Provided is a computer system capable of cutting the cost of running and managing a company network and improving the security of the network by reducing wrong settings and skipped settings due to human factor. The computer system has switches which constitute a network, a management computer which is connected to the network and manages the network, and clients which are connected to the switches. The management computer sets each switch such that client authentication is executed at port provided in the switch that can be connected to the client. The client authentication is processing of verifying whether the client has the right to connect to the network.
摘要:
A routing/switching processing unit rewrites the inbound multicast address or the source address and the destination multicast address of the inbound flow identifier of a received packet and forwards the received packet to only output ports corresponding to a resulting outbound multicast address or flow identifier. A conversion table stores first multicast addresses or flow identifiers designated by transmission sources, second multicast addresses or flow identifiers to be used for forwarding to users data transmitted from the transmission sources, and signal port IDs of signal ports to which the users are connected. A multicast packet processing unit converts the first multicast address or flow identifier of a received multicast packet to a second multicast packet or flow identifier by referring to the conversion table, and forwards the address-converted packet to network interfaces having signal ports corresponding to the second multicast packet or flow identifier.
摘要:
The invention reduces the initial setting cost, the management cost, and reconfiguration cost of QoS guarantee for network devices. A management device has a control unit and the storage unit. The control unit obtains the number of terminals contained in the network system and connection relations of the network system at the time of initial setting for QoS guarantee. A control unit stores an operation policy which an administrator inputs. The control unit creates QoS control configuration for each connection path between adjacent two network devices using the number of terminals in the network system, the connection relations, and the operation policy. And QoS control configuration is the information for controlling the QoS guarantee of network devices. And the control unit sets the QoS control configuration in the network devices.