摘要:
A method of mitigating quantum readout errors by stochastic matrix inversion includes performing a plurality of quantum measurements on a plurality of qubits having predetermined plurality of states to obtain a plurality of measurement outputs; selecting a model for a matrix linking the predetermined plurality of states to the plurality of measurement outputs, the model having a plurality of model parameters, wherein a number of the plurality of model parameters grows less than exponentially with a number of the plurality of qubits; training the model parameters to minimize a loss function that compares predictions of the model with the matrix; computing an inverse of the model based on the trained model parameters; and providing the computed inverse of the model to a noise prone quantum readout of the plurality of qubits to obtain a substantially noise free quantum readout.
摘要:
An emergency method, system, and non-transitory computer readable medium include a detection device configured to detect an emergency situation and switch a first device to emergency mode, an emergency mode device configured to gather information regarding the emergency situation while the first device is in emergency mode, and an actuation and discovery device configured to discover a second device in a vicinity of the first device and actuate the second device to perform an action based on the emergency situation detected by the detection device.
摘要:
One or more processors acquire dependency metadata, where the dependency metadata is used for representing dependency on data among at least two components of an application. The processor(s) acquire error information and data output, where the error information is used for describing errors that occur while running the application, and where the data output includes data output by the at least two components while running the application. The processor(s) analyze, based on the error information, dependency metadata and data output relevant to the error information, where the analyzing includes determining, based on a null pointer exception in the error information and data output of a component corresponding to the null pointer exception, that there is an error in dependency metadata corresponding to the null pointer exception. The processor(s) then provide an analysis result to improve the operation of a computer that is running the application.
摘要:
According to exemplary embodiments, a computer program product for testing virtual systems includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method comprises randomly selecting commands from a pool of commands, generating by a computer a test sequence from the randomly selected commands and simulating performance of the test sequence for a simulated virtual system that is a model of a virtual system. The method also includes recording simulated results of the simulated performance, performing the test sequence on the virtual system, recording actual results of the test sequence being performed on the virtual system, and determining by a computer if the virtual system is operating properly based on a comparison of the simulated results to the actual results.
摘要:
A method for providing a real time view of heterogeneous enterprise data of operational systems includes capturing streams of operational events in real time, combining the events with contextual data, and materializing a resulting view. The resulting view includes a dynamically defined view of the stream of events and provides visibility into a current state of the operational system. A view snapshot is continuously incrementally updated by a view maintenance engine as a stream of rows. The views are used to evaluate a business rule. An alert is fired when a business rule holds true. To enable the view in a view engine, a SQL string characterizing the view is parsed into a parse tree, which is normalized to form a query graph. The query graph is then optimized to obtain a query plan, which is compiled into an operator graph. Queries are executed based upon the operator graph.
摘要:
A computer-implemented method, system, and article of manufacture for generating hash codes to identify objects. The method increases variation in object hash codes to reduce conflict between object hash codes and enables them to be added to pinned objects. The method includes: generating a seed value for each heap area and generating the hash code on the basis of address of the object and seed value of the heap area to which the object is allocated. The article of manufacture includes computer readable instructions which, when implemented, cause a computer to perform the steps of the above method. The computer-implemented system includes a processor; and a memory which includes a hash code, an object, a seed value, and a heap area, wherein the processor is configured to perform the steps of the above method.
摘要:
An embedded system post-linker optimization automation method can include connecting to a network file system, coordinating a first handshaking procedure to initiate an embedded application from the network file system, coordinating a second handshaking procedure to initiate a training phase of the embedded application and coordinating a third handshaking procedure to initiate generation of an optimized embedded application from the embedded application during an optimization phase.
摘要:
A mechanism is provided for automatically handling server authentication. Responsive to receiving a response to a synthetic transaction from a server, a determination is made as to whether the response contains an authentication challenge. If the response contains the authentication challenge, the response is parsed to identify one or more attributes associated with the authentication challenge. A determination is made as to whether one or more attributes associated with each realm in a set of realms stored in a realm list matches the one or more attributes associated with the authentication challenge. If there is a match, an authentication response to the authentication challenge is generated for the matched realm. The authentication response is then sent automatically to the server in order to authenticate the synthetic transaction.
摘要:
Disclosed herein is a data center having a plurality of liquid cooled computer systems. The computer systems each include a processor coupled with a cold plate that allows direct liquid cooling of the processor. The cold plate is further arranged to provide adapted flow of coolant to different portions of the processor whereby higher temperature regions receive a larger flow rate of coolant. The flow is variably adjusted to reflect different levels of activity. By maximizing the coolant temperature exiting the computer systems, the system may utilize the free cooling temperature of the ambient air and eliminate the need for a chiller. A data center is further provided that is coupled with a district heating system and heat is extracted from the computer systems is used to offset carbon emissions and reduce the total cost of ownership of the data center.
摘要:
An improved method and system for manipulation a plurality of graphical pointers utilizing a single graphical pointing device are disclosed. A plurality of graphical pointers are displayed within a display device. A user may then temporarily select one graphical pointer among the plurality of graphical pointers. During the selection, the selected graphical pointer is manipulated in response to operation of a single graphical pointing device. A point within the display device specified by the position of the selected graphical pointer is selected in response to closure of a switch associated with the selected graphical pointer.