Abstract:
An all-digital phase locked loop (ADPLL) includes a digital controlled oscillator (DCO) to generate an output signal of the ADPLL and a time-to-digital converter (TDC) to detect a fractional phase of the DCO. A sampling circuit samples a fractional portion of a locking phase of the ADPLL, wherein the locking phase is a phase offset between an output signal of the ADPLL and an input signal of the ADPLL when the ADPLL enters a phase-locked loop. The fractional portion of the locking phase is replaced with a desired fractional phase, wherein the desired fractional phase is one of one or more fractional phases of the input signal, wherein a phase of the TDC is biased to the desired fractional phase to minimize the phase noise of the ADPLL.
Abstract:
Systems and methods for selective refresh of a cache, such as a last-level cache implemented as an embedded DRAM (eDRAM). A refresh bit and a reuse bit are associated with each way of at least one set of the cache. A least recently used (LRU) stack tracks positions of the ways, with positions towards a most recently used position of a threshold comprising more recently used positions and positions towards a least recently used position of the threshold comprise less recently used positions. A line in a way is selectively refreshed if the position of the way is one of the more recently used positions and if the refresh bit associated with the way is set, or the position of the way is one of the less recently used positions and if the refresh bit and the reuse bit associated with the way are both set.
Abstract:
Systems and methods for protecting privacy and security of information transmitted from a Secure Element, such as UICC/eUICC embedded in a processing system, include privacy management units for determining if information transmitted from the Security Element to an external entity comprises data to be masked. If the information comprises data to be masked, gates at endpoints of interfaces between the Secure Element and the external entity are configured with one or more masking rules. The privacy management units may apply the one or more masking rules to selectively mask or omit data before the information is transmitted to the external entity for logging.
Abstract:
Systems and methods for operating a bus interface unit include queues for receiving and storing one or more words from one or more agents for transmission on to a data bus. From at least a subset of the one or more words, a next word which will cause the least switching power among the subset of the one or more words when transmitted on to the data bus is determined and the next word is selected for transmission on to the data bus, to reduce dynamic power consumption of the data bus. The next word may be selected as a word among the subset of the one or more words with a least Hamming distance from a current word scheduled for transmission on to the data bus.
Abstract:
Techniques are disclosed for improving performance of a touchscreen device. In an aspect, the touchscreen device receives a selection of an application or function based on a user touching a portion of a touchscreen display of the touchscreen device that includes an icon representing the application or function, collects biometric data of the user based on the user touching the portion of the touchscreen display, and determines whether the user is authorized to access the application or function based on the biometric data. In an aspect, the touchscreen device detects that a portion of the touchscreen display is unresponsive to user touch input, and in response to the detection, moves at least one icon displayed on the unresponsive portion of the touchscreen display to a portion of the touchscreen display that is responsive to user touch input.
Abstract:
Some aspects of the disclosure relate to a pre-fetch mechanism for a cache line compression system that increases RAM capacity and optimizes overflow area reads. For example, a pre-fetch mechanism may allow the memory controller to pipeline the reads from an area with fixed size slots (main compressed area) and the reads from an overflow area. The overflow area is arranged so that a cache line most likely containing the overflow data for a particular line may be calculated by a decompression engine. In this manner, the cache line decompression engine may fetch, in advance, the overflow area before finding the actual location of the overflow data.
Abstract:
Disclosed are methods and systems for alerting a user to a change in an audio stream. In an aspect, a user device of the user receives the audio stream, detects a change in an audio pattern occurring in the audio stream according to user configurable rules, wherein the detection of the change in the audio pattern occurs when the audio stream is muted, and in response to the detection of the change in the audio pattern, provides an alert to the user that indicates the change in the audio pattern has occurred.
Abstract:
In one aspect, a method includes performing, by a wireless station, a fine timing measurement (FTM) procedure with each of one or more FTM-enabled access points (APs) to obtain a respective one or more FTM-based round-trip time (RTT) measurement between the wireless station and each of the one or more FTM-enabled APs. The method also includes performing a non-FTM procedure with each of one or more non-FTM-enabled APs to obtain a respective one or more non-FTM-based RTT measurement. The wireless station then calculates a position of the wireless device based on both the one or more FTM-based RTT measurements and the one or more non-FTM-based RTT measurements.
Abstract:
Systems and methods are directed to hypervector-based branch prediction. For a branch instruction whose direction is to be predicted, a taken distance between a current hypervector and a taken hypervector and a not-taken distance between the current hypervector and a not-taken hypervector is determined, wherein the current hypervector comprises an encoding of context of the branch instruction, the taken hypervector comprises an encoding of context of taken branch instructions and the not-taken hypervector comprises an encoding of context of not-taken branch instructions. If the taken distance is less than the not-taken distance, the branch instruction is predicted to be taken, or on the other hand, if the not-taken distance is less than the taken distance, the branch instruction is predicted to be not-taken.
Abstract:
In one aspect, a method of wireless communication by a first wireless device includes detecting a near field communication (NFC) read of the first wireless device. The NFC read may be a read initiated by a second wireless device via an NFC interaction between the first wireless device and the second wireless device. The method also includes adjusting at least one Bluetooth paging scan parameter of the first wireless device in response to detecting the NFC read.