Abstract:
A system, method, and computer readable storage medium configured for delivering services from a server to ensure multimedia content control by content providers (i.e. reduce piracy) and to ensure privacy by content users is described. The method begins with executing at least a portion of a content media player application to the device using a zero-knowledge protocol to ensure privacy of the user. Examples of zero-knowledge verifiable computing are succinct computational integrity and privacy (SCIP) protocol, zero-knowledge succinct non-interactive argument of knowledge (zk-snark) protocol, and probabilistically checkable proof (PCP) protocol. The content media player application includes digital right management technology using zero-knowledge verifiable computing to enforce usage conditions on the multimedia content. A response is received from the user device that the content media player application has executed on the user device. Based upon the response indicating a successful execution, accessing the multimedia content by the content media player application.
Abstract:
A method for fabricating a vertical FET structure includes prior to depositing a gate on a first vertical FET on a semiconductor substrate, depositing a first layer on the first vertical FET on the semiconductor substrate. The method further includes prior to depositing a gate on a second vertical FET on the semiconductor substrate, depositing a second layer on the second vertical FET on the semiconductor substrate. The method further includes etching the first layer on the first vertical FET to a lower heightthan the second layer on the second vertical FET. The method further includes depositing a gate material on both the first vertical FET and the second vertical FET. The method further includes etching the gate material on both the first vertical FET andthe second vertical FET to a co-planar height.
Abstract:
A system includes a controller and logic integrated with and/or executable by the controller. The logic is configured to perform iterative decoding on encoded data to obtain decoded data. At least three decoding operations are performed in the iterative decoding, with the decoding operations being selected from a group comprising:C1 decoding and C2 decoding. The logic is also configured to perform post-decoding error diagnostics on a first portion of the decoded data in response to not obtaining a valid product codeword in the first portion after the iterative decoding of the encoded data. Other systems, methods, and computer program products for producing post-decoding error signatures are also presented.
Abstract:
According to this disclosure, a method, apparatus and computer program product for managing a plurality of VPN tunnels between a first cloud and a second cloud in a hybrid cloud environment is described. The VPN Manager receives a request from a first cloud application resident in the first cloud. The request including a first set of requirements for a first VPN tunnel in the plurality of VPN tunnels. The request is sent to a system in a first cloud, wherein the first system creates the first VPN tunnel according to the first set of requirements. The VPN Manager receives an event pertaining to the first VPN tunnel. In response to the event, the VPN Manager sends a modification request to the first system containing a second set of requirements. The first system tunes the first VPN tunnel according to a second set of requirements. The tuning of the first VPN tunnel can include merging the first VPN tunnel with a second VPN tunnel, or splitting the first VPN tunnel into a first and second VPN tunnels.
Abstract:
A technique relates to frequency conversion. A mechanical resonator (104) is configured to oscillate at a mechanical resonance frequency with a displacement in an axis. An optical resonator (108) includes a first mirror (202A) opposite a second mirror (202B) in which an optical cavity is formed between. The first mirror (202A) is fixed to the mechanical resonator (104) such that the first mirror(202A) is moved to change an optical length of the optical cavity according to the displacement of the mechanical resonator (104). Changing the optical length changes an optical resonance frequency of the optical resonator (108). A microwave resonator (120) is positioned to move according to the displacement of the mechanical resonator (104) such that moving the mechanical resonator (104) changes a Josephson inductance of the microwave resonator (120), thereby changing a microwave resonance frequency of the microwave resonator (120).
Abstract:
Techniques for power sharing in DC networks using virtual impedance frequency droop control are provided. In one aspect, a method for power sharing in a DC network having multiple electrical energy generation sources connected to at least one load includes the steps of,at each of the electrical energy generation sources: generating a controllable DC voltage; superimposing a controllable AC signal on top of the DC voltage; regulating the AC signal using virtual impedance frequency droop control; and determining a desired DC voltage output using the regulated AC signal. The DC voltage can then be regulated to match the desired DC voltage output. A system for power sharing in a DC network is also provided.
Abstract:
Methods and systems are provided for secure deployment of an application across deployment locations. Aspects include providing an application for analysis wherein the application is capable of being divided into processing nodes which can be deployed in different locations. The application processes messages based on message models having annotations defining constraints on the deployment of data in given data aspects. The data aspects include the entire message or data fields, data elements or data structures of the message. Aspects also includes analyzing the application to identify processing nodes that reference the given data aspects having deployment constraints and determining a restriction for a processing node based on the deployment constraints of the referenced data aspects. Aspects further include deploying each processing node of the application according to the determined restriction.
Abstract:
A computer-implemented method for parallelizing matrix factorization across hardware accelerators includes receiving a rating matrix R. A matrix X is calculated in a matrix factorization of R, where R≈X·Θ T . Calculating X includes selecting a first value for variable p and a second value for variable q; partitioning Θ T by columns into p partitions of Θ T ; partitioning X by rows into q partitions of X; and partitioning R by rows and columns into p*q partitions of R. Calculating X further includes copying to each accelerator, of a plurality of accelerators, a corresponding partition of Θ T , as well as a partition of R corresponding to the accelerator and to a current partition of X. Calculating X further includes calculating, by the plurality of accelerators a plurality of partial solutions for the current partition of X, and aggregating the plurality of partial solutions into a solution for the current partition of X.
Abstract:
A method of detecting a particle comprises magnetizing a particle using an AC magnetic field; generating an AC voltage in a sensing device having a conductive substantially 2-dimensional lattice structure from the magnetized particle; superimposing a DC magnetic field on the generated AC voltage in the sensing device; and measuring an AC Hall voltage at the sensing device.
Abstract:
A method of detecting a particle comprises magnetizing a particle using an AC magnetic field; generating an AC voltage in a sensing device having a conductive substantially 2-dimensional lattice structure from the magnetized particle; superimposing a DC magnetic field on the generated AC voltage in the sensing device; and measuring an AC Hall voltage at the sensing device.