摘要:
A shiftable memory supporting atomic operation employs built-in shifting capability to shift a contiguous subset of data from a first location to a second location within memory during an atomic operation. The shiftable memory includes the memory to store data. The memory has the built-in shifting capability. The shiftable memory further includes an atomic primitive defined on the memory to operate on the contiguous subset.
摘要:
In one example, a method for implementing recovery segments includes sending an application message from a parent process executed by a first computing device to a child process executed by a second computing device and identifying a dependency created by the application message. This identified dependency is included in a dependence set of the child process and saved. A checkpoint is generated by the parent process and a checkpoint message that includes dependency information is sent from the parent process to the child process. The child process modifies the dependence set according to the dependency information and generates a second checkpoint that is saved in nonvolatile memory of the second computing device. Upon occurrence of a failure of the parent process, the child process reverts to a most recent checkpoint generated by the child process that does not include the effects of processing an orphan message.
摘要:
A shiftable memory supporting atomic operation employs built-in shifting capability to shift a contiguous subset of data from a first location to a second location within memory during an atomic operation. The shiftable memory includes the memory to store data. The memory has the built-in shifting capability. The shiftable memory further includes an atomic primitive defined on the memory to operate on the contiguous subset.
摘要:
A system includes an initiator and processing nodes. The initiator distributes portions of a transaction among the processing nodes. Each processing node has at least one downstream neighbor to which the processing node sends commit messages. The commit messages include a commit status of the processing node. The downstream neighbor is also a processing node.
摘要:
In one example, a computing device generates a new password for accessing a user account and/or computing system and inspires a change of an existing password for the user account and/or computing system to the new password. Thereafter, the computing device detects occurrence of a condition to trigger another change of the password for the user account and/or computing system and, responsively, inspires another change of the password for the user account and/or computing system.
摘要:
A method of scheduling optional instructions in a compiler targets a processor. The scheduling includes indicating a limit on the additional processor computations that are available for executing an optional code, generating one or more required instructions corresponding to a source code and one or more optional instructions corresponding to the optional code used with the source code and scheduling all of the one or more required instructions with as many of the one or more optional instructions as possible without exceeding the indicated limit on the additional processor computations for executing the optional code.
摘要:
A method for controlling transfer of data is provided. The method includes accessing data at a first device and accessing a time attribute associated with the data at the first device. The method further includes comparing the time attribute to a data transfer time threshold and in response to the time attribute associated with the data at the first device is less than the data transfer time threshold, the method further includes restricting access of the data at a second device.
摘要:
A computer system with mechanisms for providing hint instructions to a processor without altering object code instruction sequences. A computer system according to the present teachings includes elements for generating a hint instruction in response to a set of object code to be executed by the processor and for inserting a break instruction into the object code such that the break instruction causes the processor to obtain and execute the hint instruction. The present techniques for providing hint instructions to a processor may be used to adapt object code to a micro-architecture of the processor.
摘要:
A reusable security tag is provided which is reversibly operable in a first magnetic condition to trigger a detector when the tag is within communication range of the detector, and a second magnetic condition in which the detector is not triggered when the tag is within communication range of the detector. The tag includes an optical indicator which has a first optical characteristic when the tag is in the first magnetic condition, and a second optical characteristic when the tag is in the second magnetic condition.
摘要:
A verifiable random number generator includes mechanisms for monitoring its chaotic behavior. A random number generator according to the present teachings includes a chaos circuit that generates a number according to a chaos function. The random number generator further includes a check circuit that simulates the chaos function and that determines whether the number is a valid random number by monitoring the chaotic behavior of the chaos function.