摘要:
A data structure that includes pointers to vertex attributes and primitive descriptions is generated and then processed within a general processing cluster. The general processing cluster includes a vertex attribute fetch unit that fetches from memory vertex attributes corresponding to the vertices defined by the primitive descriptions.
摘要:
A technique for performing stream output operations in a parallel processing system is disclosed. A stream synchronization unit is provided that enables the parallel processing unit to track batches of vertices being processed in a graphics processing pipeline. A plurality of stream output units is also provided, where each stream output unit writes vertex attribute data to one or more stream output buffers for a portion of the batches of vertices. A messaging protocol is implemented between the stream synchronization unit and the plurality of stream output units that ensures that each of the stream output units writes vertex attribute data for the particular batch of vertices distributed to that particular stream output unit in the same order in the stream output buffers as the order in which the batch of vertices was received from a device driver by the parallel processing unit.
摘要:
A technique for performing stream output operations in a parallel processing system is disclosed. A stream synchronization unit is provided that enables the parallel processing unit to track batches of vertices being processed in a graphics processing pipeline. A plurality of stream output units is also provided, where each stream output unit writes vertex attribute data to one or more stream output buffers for a portion of the batches of vertices. A messaging protocol is implemented between the stream synchronization unit and the plurality of stream output units that ensures that each of the stream output units writes vertex attribute data for the particular batch of vertices distributed to that particular stream output unit in the same order in the stream output buffers as the order in which the batch of vertices was received from a device driver by the parallel processing unit.
摘要:
An integrated circuit (IC) includes a first I/O cell, a logic cell, a trigger signal generation circuit, and a second I/O cell having a voltage selection pin. I/O interfaces of the first I/O cell receive first and second supply voltages, respectively, and I/O interfaces of the second I/O cell receive third and fourth supply voltages, respectively. The first I/O cell generates a first trigger signal when the first supply voltage reaches a first predetermined voltage. The logic cell receives the first trigger signal and generates a safe-state signal. The trigger signal generation circuit generates a second trigger signal when the third supply voltage reaches a second predetermined voltage. The voltage selection pin receives the safe-state signal and the second trigger signal and sets the second I/O cell in a safe-state mode, which protects the second I/O cell from over voltage damage.
摘要:
A system for adaptive learning based human detection for channel input of captured human image signals, the system comprising: a sensor for tracking real-time images of an environment of interest; a feature extraction and classifiers generation processor for extracting a plurality of features and classifying the features associated with time-space descriptors of image comprising background modeling, Histogram of Oriented Gradients (HOG) and Haar like wavelet; a processor configured to process extracted feature classifiers associated with plurality of real-time images; combine the plurality of feature classifiers of time-space descriptors; evaluate a linear probability of human detection based on a predetermined threshold value of the feature classifiers in a time window having at least one image frame; a counter for counting the number of humans in the real-time images; and a transmission device configured to send the final human detection decision and number thereof to a storage device.
摘要:
The invention relates to a data packet transmission process in a communication system comprising at least one terminal (UE) communicating with a base station (BS), the process comprising at least one transmission (S4) of the data packet with a given power, from the terminal to the base station based on a HARQ scheme to obtain a residual packet error rate PERres after a number of transmissions Trn, the process being characterized in that it comprises a step (S) for the joint selection of the following parameters: the number of transmissions Trn; the target packet error rate PERtg(i) of each transmission i, where i=1, . . . , Trn, to arrive at the residual packet error rate PERres; and the modulation and coding scheme m corresponding to each target packet error rate PERtg(i) so as to minimize the data packet transmission power.
摘要:
The invention concerns a method for managing a network of a plurality of small cell base stations arranged in a macro-cell and linked to a base station of the macro-cell, each small cell base station being adapted to cover a small cell of the macro-cell and to be linked via radio to at least one mobile terminal present in the small cell.
摘要:
Examples of achieving quality of service in a wireless local area network via meeting communication channel performance criteria to include a minimum signal-to-noise plus interference ratio and a proportional fairness limit are disclosed.
摘要:
A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.
摘要:
Technologies are described herein for relevance-based expiration of data. An initial expiration time for the data is computed based upon an expiration duration associated with the data. The expiration time for the data is periodically re-computed in order to extend the expiration time. A relevance value for the meeting data is computed and the expiration time is set as a function of the computed relevance value. The relevance value may be computed as a product of a user-settable relevance value for the meeting data and a dynamic relevance point for the meeting data. When the computed expiration time for meeting data has been reached, the meeting data is expired, such as through the deletion of the meeting data.