Abstract:
A thread dependency scheme may significantly reduce the dependency penalty and improve the parallelism efficiency in some embodiments in video compression techniques with relatively high dependencies, such as VP9. One fundamental feature is to split an individual large kernel into multiple, less dependent, smaller kernels, thereby significantly increasing the number of software threads that can potentially run in parallel. Another feature is to define the larger number of thread dependencies (superset of all the dependency candidates for each thread), with the specific thread's spatial position and associated context, and mask out some of the unnecessary thread dependencies.
Abstract:
By converting a first color space to a second color space, using a two-dimensional lookup table in said second color space, and converting from said second color space to said first color space, it may be possible to use one or more two-dimensional lookup tables (LUTs) to do a task conventionally handled by three-dimensional lookup tables. This may reduce storage requirements and memory bandwidth requirements in some embodiments. In general a color pixel with N color components can be processed with n number of M dimensional LUT where M
Abstract:
A frame of pixel data may be burst at a higher frame rate to create a lower effective refresh rate when the actual image update rate is lower than the frame rate. This results in the ability to power manage the transmit portion of the display engine and the receive portion of the panel electronics, while reducing display initiated repetitive memory traffic to conserve power.
Abstract:
A method of determining vulnerability of a cache memory includes associating a first counter with a cache element and periodically incrementing the first counter. When a read or other access that consumes the data in the cache element occurs, a current value of the first counter is accumulated. When a write or other cache access that modifies data in the cache element occurs, the first counter is reset. At the end of an evaluation period, the value in a total counter approximates the number of clock cycles during which data that was consumed was vulnerable. Dividing this value by the number of clock cycles approximates the vulnerability of this cache element. The vulnerability for a subset of all cache elements may be measured and extrapolated to obtain an estimate for the vulnerability of the cache memory as a whole.
Abstract:
Unlike a static primitive, where the depth function is planar, the depth function for a moving and defocused triangle is a rational function in time and the lens parameters. Compact depth functions can be used to design an efficient depth buffer compressor/decompressor, which significantly lowers total depth buffer bandwidth usage. In addition, this compressor/decompressor is substantially simpler in the number of operations needed to execute, which makes it more amenable for hardware implementation than previous methods.
Abstract:
In accordance with some embodiments, a protocol permits communications between platforms and image devices. This allows, for example, the platform to specify particular types of information that the platform may want, the format of information the platform may prefer, and other information that may reduce the amount of processing in the platform. For example, conventionally, in gesture recognition software, the platform receives an ongoing stream of video to be parsed, searched and processed in order to identify gestures. This may consume communications bandwidth between platforms and imaging devices, particularly in cases where wireless communications or other bandwidth limited communications may be involved.
Abstract:
In order to use video post-processing capabilities available in some graphics and central processing unit hardware available now and in the future, some platforms like the Android platform need to be adapted. A user may select a video post-processing function using a graphical user interface. The selection is communicated to an operating system that does not enable video post-processing, using an inter procedure communication.
Abstract:
CABAC coefficient decoding may be increased to two bins per clock. Since coefficients comprise most of the bitstream, this improvement almost doubles the CABAC decoding for a low quantization parameter bitstream (with lots of coefficients).
Abstract:
In accordance with some embodiments, information may be collected from processor-based devices after the processor-based devices have already been deployed. Moreover, in some cases, the information that is to be collected, the collection sources, and the handling of the data may be specified after the processor-based devices have already been deployed.
Abstract:
An ad hoc network may be established between vehicles using a wireless connection. The wireless network may be used for sending and receiving information about road conditions, such as average speed, a location and configuration of a road obstruction, images of an accident scene, and a traffic flow plan. The wireless network may also be used for communicating with emergency response vehicles in order to enable faster and more effective responses to accidents.