Abstract:
A computer system (100) includes a processor (109), a multimedia input device (122) receiving an analog signal representing an image or audio input, and a digitizing unit (126) coupled to the multimedia input device (109). The computer system (100) further includes a memory (104) coupled to the digitizing unit (126) and the processor (109). The memory (104) has stored therein a set of packed data sequences having data elements representing the digital data, and a sequence of instructions for transforming the digital data from a first domain to a second domain. When the instructions are executed by the processor (109), the instructions cause the processor (109) to perform a two-dimensional rotation on the digital data. Specifically, the instructions cause the processor (109) to generate a first set of intermediate results by multiplying data elements of a first packed data sequence with corresponding elements of a third packed data sequence represent either a sine or cosine function. The instructions then cause the processor (109) to generate a second set of intermediate results by multiplying the data elements of a second packed data sequence with corresponding data elements of a fourth packed data sequence representing either a sine or cosine function. A set of first set of final results by performing an arithmetic operation between corresponding data elements of the first and second sets of intermediate results.
Abstract:
A method and apparatus for interfacing a device (8) which is compliant to a first bus protocol to a second bus (11) having a second protocol and for providing virtual functions through an intelligent bridge (9) that is coupled to the second bus (11). An address translator (35), coupled to the second bus (11), for translating addresses in a second bus format into addresses in a first bus format is provided. A device selection detection circuit (37) is provided for detecting that a configuration cycle from the second bus (11) is for that particular device. Once a configuration cycle is detected, interrupt generation circuitry (43) interrupts a local processor (29), coupled to the first local processor bus (13). The device selection detection circuitry (37) also writes to a register (41) disposed in a configuration controller (39). The configuration controller (39) disables the address translator (35) so that any further accesses to the local processor bus (13) are blocked.
Abstract:
A peripheral device (106, 107, 108) for use in interfacing with a system (100). The peripheral device (106, 107, 108) contains driver code stored in memory locations within the peripheral device (106, 107, 108). The driver code is uncompiled, and, when read by a system (100) to which the peripheral device (106, 107, 108) is coupled, enables the system (100) to interface with the peripheral device (106, 107, 108).
Abstract:
A computer-implemented method of managing a computer network including a plurality of devices is provided, wherein a plurality of network management tasks are performable upon the devices. Data is gathered about a present configuration of the network, including the types of devices in the network, the quantity of each type of device present in the network, the relationships between the devices, and the tasks performable upon each of the devices. The data is then stored in a database representing a network map. A display is generated corresponding to the network map using the data in the database (200). The display shows an association of the devices (201) with the tasks performable on the devices (202) using bitmap representations (205, 207) of the devices and tasks. The display may include hierarchical, schematic, or geographical representations of the devices on the network (201). The devices are organized into a plurality of groups. In response to a user input selecting a device or group, the tasks performable by that device or group are identified on the display (209, 211). A user may initiate any one of the displayed tasks by applying a user input selecting that task.
Abstract:
A method and system for dynamically sizing (50, 51, 52, 53, 54, 55, 56) a dedicated memory in a shared memory buffer architecture (4). At initial boot, system BIOS programs control register (22, 23, 24) to allocate a dedicated memory of a desired size. The size of the dedicated memory allocated is dependent on the performance requirements. If after initial boot, the performance requirements change, it may necessitate a change in dedicated memory size. By reprogramming the control registers (22, 23, 24), the dedicated memory size is dynamically changed without any manual manipulation of internal components.
Abstract:
A method for securing confidential circuitry from observation by unauthorized inspection, and a secure circuit immune from unauthorized inspection according to the method. In one embodiment, confidential data or circuitry is placed on a face of separate silicon layers (42, 44), each silicon layer having part of a circuit. Neither silicon layer is intelligible without the other, yet neither can be observed without destroying the other. The two silicon layers are juxtaposed, the face of the first silicon layer (42) flush against and fused to the face of the second silicon layer (44), the confidential circuits on each silicon layer connecting directly with circuits on the other silicon layer without external connectors. Data stored on each face is erased or destroyed when the silicon layers are separated or one of the silicon layers is destroyed. Violence to either silicon layer, or exposure of either silicon layer to light, destroys the data or circuitry on at least one silicon layer of silicon, making the data or circuitry unreadable.
Abstract:
A method for executing different sets of instructions that cause a processor (105) to perform different data type operations in a manner that is invisible to various operating system techniques. According to one embodiment of the invention, a data processing apparatus (105) executes a first set of instructions of a first data type on what at least logically appears to software as a single logical register file (310), which appears to be operated as a flat register file. In addition, the data processing apparatus executes a first instruction of a second data type using the logical register file (300), which appears to be operating as a stack referenced register file (340). Furthermore, the data processing apparatus alters all tags in a set of tags (320, 330) corresponding to the single logical register file (300, 310) to a non-empty state some time between starting the execution of the first set of instructions and completing the execution of the first instruction.
Abstract:
A method and apparatus for executing different sets of instructions that cause a processor (105) to perform different data type operations on different physical register file (615, 650) that logically appear to software as a single aliased register file. According to one aspect of the invention, a processor (105) is provided that includes at least two physical register files (615, 650) -one for executing scalar data type operations (615) and the other for executing packed data type operations (650). In addition, the processor (105) includes a transition unit (600) that is configured to cause two physical register files (615, 650) to logically appear to software executing on the processor (105) as a single register file.
Abstract:
In a memory device including an array of memory cells, each memory cell having more than two possible states, a method for programming a memory cell to a desired state is disclosed. The method comprises a control engine programming a subset (220), wherein the characterization information indicates programming characteristics of a representative memory cell of the array of memory cells (225). The control engine then uses the characterization information to directly program the memory cell to approximately the desired state (230) without performing a program verify operation.
Abstract:
A mechanism to conditionally activate an electronic device implemented within electronic computing equipment such as a computer. Such activation may be based on user authentication and/or confirmation that the electronic device is operating in conjunction with its companion cryptographic device (130).