Abstract:
A lock manager running on a machine may write a first entry for a first process to a queue associated with a resource. If the first entry is not at a front of the queue, the lock manager identifies a second entry that is at the front of the queue, and determines whether a second process associated with the second entry is operational. If the second process is not operational, the lock manager removes the second entry from the queue. Additionally, if the queue becomes unavailable, the lock manager may initiate failover to a backup copy of the queue.
Abstract:
A method and a system for characterizing an integrated circuit (IC) design are disclosed. The method includes receiving a description of leaf cells used in the IC design. The IC design is described in a high-level language by using the description of the leaf cells. The description of the IC design includes specifying placement of the leaf cells and specifying connectivity between them. Further, the method includes extracting a circuit netlist file based on the physical layout of the IC design. The instructions are defined in the high-level language to perform simulations on the extracted circuit netlist file. These simulations are performed on the circuit netlist file to determine the values of the design parameters. Furthermore, the method includes providing the values of the design parameters of the IC design in a pre-defined output format based on the simulations.
Abstract:
A computing device detects an event generated by a first component that publishes a connection endpoint, the event indicating that the connection endpoint of the first component has been modified. The computing device determines a second component that subscribes to the connection endpoint. The computing device updates a location of the connection endpoint in a data structure associated with the second component to maintain a connection between the first component and the second component.
Abstract:
A lock manager running on a machine may write a first entry for a first process to a queue associated with a resource. If the first entry is not at a front of the queue, the lock manager identifies a second entry that is at the front of the queue, and determines whether a second process associated with the second entry is operational. If the second process is not operational, the lock manager removes the second entry from the queue. Additionally, if the queue becomes unavailable, the lock manager may initiate failover to a backup copy of the queue.
Abstract:
A method and a system for characterizing an integrated circuit (IC) design are disclosed. The method includes receiving a description of leaf cells used in the IC design. The IC design is described in a high-level language by using the description of the leaf cells. The description of the IC design includes specifying placement of the leaf cells and specifying connectivity between them. Further, the method includes extracting a circuit netlist file based on the physical layout of the IC design. The instructions are defined in the high-level language to perform simulations on the extracted circuit netlist file. These simulations are performed on the circuit netlist file to determine the values of the design parameters. Furthermore, the method includes providing the values of the design parameters of the IC design in a pre-defined output format based on the simulations.
Abstract:
Upon receiving application code and an application descriptor of an application, a platform executing on a computer system identifies a capability to be used by the application based on the application descriptor. The platform determines a component that provides the capability based on a component descriptor of the component. The platform then configures the application and the component for execution on the platform.
Abstract:
A computing device detects an event generated by a first component that publishes a connection endpoint, the event indicating that the connection endpoint of the first component has been modified. The computing device determines a second component that subscribes to the connection endpoint. The computing device updates a location of the connection endpoint in a data structure associated with the second component to maintain a connection between the first component and the second component.
Abstract:
Upon receiving application code and an application descriptor of an application, a platform executing on a computer system identifies a capability to be used by the application based on the application descriptor. The platform determines a component that provides the capability based on a component descriptor of the component. The platform then configures the application and the component for execution on the platform.