Abstract:
A system is shown wherein, provided with an appropriate file organization, a data file can be read from a disk master file, given the file name, by performing one seek and one read operation. The system employs hash coding to compress a data file name to a disk file address. The disk file is positioned into fixed length blocks where each hashed file address points to a block, the block being as large as one cylinder or as small as one sector. Each block is organized such that it includes a directory for the files contained in the block and also contains the data files. Each entry in the directory contains the data file name and the address of that data file in the block. The process of locating and reading a data file entails the hash coding of a file name to yield a block address, the moving of the read head to the disk area having the block address and the reading of the directory and the remainder of the block to read out the data file. In the directory reading, the data file names are compared in real time, as they are read from the disk, with the name of the desired data file. When a name match occurs, the address of the data file in the block and the address of the next file address are read and stored. As the disk rotates, the desired data file address just read is constantly compared with the active disk address. When a match occurs, the file has been located and is read out. The reading is terminated at the address of the beginning of the next file. If the file name is not found in the directory of the block indicated by the hash coding of the file''s name, then the file is not present therein.
Abstract:
A light pen arrangement is described wherein the light pen has three degrees of freedom, viz. two-dimensional translation in the (X,Y) plane of a cathode ray tube screen and rotation about the projection of its own longitudinal axis to the normal of the screen. To sense the angular position of the light pen, at least two independent light sensitive elements, i.e., fiber optic bundles are required, the latter being suitably provided by dividing the bundle of fiber optics emerging from a single light pen into at least two separate groups and having photosensitive transducer respectively associated with each of the separate groups. When the light pen is placed on the screen and its presence there is sensed, an (X,Y) value pair is stored for the location of each light sensitive area of the light pen, i.e., each of the aforementioned separate fiber optic groups. The storing is accomplished by having an electron beam draw lines or points in each light sensitive area and, receiving in response thereto, interrupts for points or lines in the field of view of each fiber optic group, the (X,Y) coordinate of each point or line causing an interrupt and the fiber optic group that picked up the interrupt is now known to the computer or other control arrangement controlling the cathode ray tube. The computer or control arrangement can then compute the (X,Y) location of the light pen as the centroid of the individual areas and the angular position of the pen.
Abstract:
A data security system employing an automatic time-stamping mechanism for stamping a time accrued in a data storage area or register associated with each envelope or block of a memory or for each data channel of an auxiliary storage device, such that each access or data updates the appropriate time stamp in the memory of storage device. A first instruction provides the fetch of the time stamp with regard to the main memory, and a second instruction provides the fetch with regard to information contained in the data channel corresponding to the auxiliary storage device. For every envelope of a memory, there is a time stamp tag register associated with it. Similarly, there is a time stamp register associated with every data channel. Whenever an envelope of memory is accessed, the time stamp in the form of a unique binary number from a clock, indicating the time of day, is inserted into the tag register associated with that envelope. Examination of the contents of each tag register enables determination of whether there has been access to an envelope up to the present time. A full memory address register is used to access data in the memory while only special high order bits of the memory address register are used to access the time stamp associated with the envelope. The system provides a mechanism which automatically marks blocks of data as they are accessed and cannot be bypassed by altering the program.
Abstract:
YO984-058 COLOR GRAPHIC PROCESSOR FOR PERFORMING LOGICAL OPERATIONS A color graphic processor includes one or more processing elements responsive to pixel data provided by a frame buffer. The processing element stores pixels from the frame buffer in source and distinction registers. The ALU portion of the procesing element includes a RAM addressed by the registers to produce a result pixel value which can be written back to the frame buffer. The RAM can implement a wide variety of pixel operations by loading the RAM with operation specific data.
Abstract:
A DIAGNOSTIC/DEBUG MACHINE ARCHITECTURE A system is described for enabling the connection of a diagnostic/debugging processor to another host processor for the purpose of troubleshooting that processor's hardware and software. The system is composed of an interface between the diagnostic/ debugging processor per se and the host processor to be diagnosed, and of software resident in the diagnostic processor to perform functions required by the user of the system. The system is specifically designed for use with a host processor utilizing LSSD design rules. YO978-048
Abstract:
1534189 Monitoring storage accesses INTERNATIONAL BUSINESS MACHINES CORP 16 Nov 1976 [4 Dec 1975] 47656/76 Heading G4A A memory 12 or 32 is divided into envelopes 12a-12f or 34 each of which has an associated storage element 18 or 30 in which a time stamp from a clock 20 is recorded each time that envelope is accessed. Time stamp recording is automatic so that by reading the time stamps for particular memory elements a user can determine if any unauthorized access has been made since the last authorized access. Memory 12 may be a random access memory of which time stamp registers 18 form a part. Memory 32 may be a magnetic disc unit having two envelopes 34 and associated time stamp words 30 per track. The arrangement is described in detail in the context of a virtual memory system in which the time stamp registers 18 form an associative memory which is searched by block registers and stores time stamps together with indications as to whether the relevant accesses were for read or write. Any time stamp register 18 can be read by a special instruction FSM which loads the contents of the required register 18 into a specified register in the CPU 10. Each data channel 38 has a corresponding time stamp register 36 which is loaded with a time stamp word 30 whenever a disc envelope is moved via the channel to a memory 12 envelope (the appropriate register 18 and word 30 also time stamped from clock 20). The register 36 contents can be loaded into a specified CPU register by a special instruction FSC. Data envelope transfer between disc 32 and memory 12 takes place serially by word via a shift register buffer.
Abstract:
YO986-065 PARALLEL RENDERING OF SMOOTHLY SHADED COLOR TRIANGLES WITH ANTI-ALIASED EDGES FOR A THREE DIMENSIONAL COLOR DISPLAY The present invention comprises a method for utilizing an SIMD computer architecture in conjunction with a host processor and coordinate processor to render quality, three-dimensional, anti-aliased shaded color images into the frame buffer of a video display system. The method includes a parallel algorithm for rendering an important graphic primitive for accomplishing the production of a smoothly shaded color three-dimensional triangle with anti-aliased edges. By taking advantage of the SIMD architecture and said parallel algorithm, the very time consuming pixel by pixel computations are broken down for parallel execution. A single coordinate processor computes and transmits an overall triangle record which is essentially the same for all blocks of pixels within a given bounding box which box in turn surrounds each triangle. The individual pixel data is produced by a group of M x N pixel processors and stored in the frame buffer in a series of repetitive steps wherein each step corresponds to the processing of an M x N block of pixels within the bounding box of the triangle. Thus, each pixel processor performs the same operation, modifying its computations in accordance with triangle data received from the coordinate processor and positional data unique to its own sequential connectivity to the frame buffer, thus allowing parallel access to the frame buffer.
Abstract:
A system is shown wherein, provided with an appropriate file organization, a data file can be read from a disk master file, given the file name, by performing one seek and one read operation. The system employs hash coding to compress a data file name to a disk file address. The disk file is positioned into fixed length blocks where each hashed file address points to a block, the block being as large as one cylinder or as small as one sector. Each block is organized such that it includes a directory for the files contained in the block and also contains the data files. Each entry in the directory contains the data file name and the address of that data file in the block. The process of locating and reading a data file entails the hash coding of a file name to yield a block address, the moving of the read head to the disk area having the block address and the reading of the directory and the remainder of the block to read out the data file. In the directory reading, the data file names are compared in real time, as they are read from the disk, with the name of the desired data file. When a name match occurs, the address of the data file in the block and the address of the next file address are read and stored. As the disk rotates, the desired data file address just read is constantly compared with the active disk address. When a match occurs, the file has been located and is read out. The reading is terminated at the address of the beginning of the next file. If the file name is not found in the directory of the block indicated by the hash coding of the file's name, then the file is not present therein.