Abstract:
PROBLEM TO BE SOLVED: To obtain the estimation of a step execution time by expressing a behavior at an application level by an event-driven simulation and statistically approximating memory access timings of a smaller granularity.SOLUTION: A memory access detection module 316 in a referenced integrated system 310 detects an access of an application 312 to memory of a platform 314. A measurement module 330 puts data, which is detected by the memory access detection module 316 and whose beginning and end are delimited by a beginning/end-of-step detection module 318, into a form of an execution trace, and transfers it to a modeling/simulation system 320. A calculation module 324 estimates values such as an execution time and memory band usage rate using the data received from the measurement module 330.
Abstract:
PROBLEM TO BE SOLVED: To provide a computer-implemented method, computer program, and apparatus for creating a digital signature for a composite resource document.SOLUTION: A method for creating a digital signature comprises the steps of: receiving a composite resource document containing at least one resource; obtaining an updated manifest resource, which lists all resources in the composite resource document; indicating a set of zero, one, or more resources to be subtracted from the list of resources in the composite resource document to create a generated signature reference list of identified resources to be signed; generating a hash token using the resources identified in the generated signature reference list to form a signature hash token; and encrypting the signature hash token with a secret key.
Abstract:
PROBLEM TO BE SOLVED: To provide technique for efficiently extracting only a meaningful frequent item set.SOLUTION: An analysis system 120 includes: a determination unit 330 which determines a new item set to be examined in the same order with a search of a tree of item sets in the descending order with depth priority; a frequent appearance determination unit 335 which registers the appearance frequency of the new item set in a table on condition that the appearance frequency is equal to or larger than a predetermined threshold; a correlation determination unit 340 which determines whether each of the items in the new item set correlates with a subset of the remaining items, excluding the new item, in the new item set by using values in the table in response to the registration; and a registration unit 345 which registers the new item set in a set of meaning frequent item sets on condition that a result of determination of each of all the items in the new item set is affirmative.
Abstract:
PROBLEM TO BE SOLVED: To provide a response time improvement technique that is applicable even to many pages and a complicated web pace including scripts, functions, images, etc.SOLUTION: Dependence between components of a web page to be improved in response time is extracted, and homogeneous components are connected to each other. The connected components have information on component size updated. Then, a candidate for a file to be searched for is generated, an estimated loading time of the generated file candidate is calculated, and the web page is analyzed to generate dependence and inclusion relation in the form of table 0-1. Further, read-in relation (x) is generated in the form of table 0-1, and an integer programming problem is formulated so as to minimize the sum of downloading times of the page and file, and solved by a solver. A library file is reconstituted and generated from an obtained solution, and links of respective pages to a library file are rewritten into links to the newly generated library file.
Abstract:
PROBLEM TO BE SOLVED: To provide a fully synchronous servo channel for a data tape drive.SOLUTION: A fully synchronous servo channel for a data tape drive is provided by including: initial acquisition of synchronous servo channel parameters; generation of a timing basis for signal interpolation; generation of a tape velocity estimate and a y-position estimate; and an optimum detection of longitudinal position (LPOS) symbols.
Abstract:
PROBLEM TO BE SOLVED: To provide a complementary metal oxide semiconductor integration process that allows a plurality of silicide metal gates to be prepared on a gate dielectric.SOLUTION: There is provided a CMOS silicide metal gate integration method capable of eliminating a demerit of generation of variations in the height of poly Si gate stock which varies a silicide metal gate phase. The integration method minimizes the complexity of the process, thereby restraining the manufacturing cost of a CMOS transistor from increasing.
Abstract:
PROBLEM TO BE SOLVED: To provide a device and method for improving the speed of access to a variable (symbol) which is frequently performed during the execution of a program described in a dynamic language.SOLUTION: This device includes: a range specification part 401 for specifying a range in which access to a symbol in a program can be made common; an instruction generation part 402 for performing access to a symbol table by using a key and generating a plurality of instructions including an instruction to acquire an address of a symbol entry and store the address in an address storage part; an instruction extraction part 403 for extracting the instruction from the specified range; and an instruction determination part 404 for determining whether or not the extracted instruction is an instruction to perform access to the symbol. When the extracted instruction is the instruction to perform access to the symbol, the instruction generation part 402 generates the instruction to perform access to the symbol by using the stored address of the symbol entry, the instruction being generated to enable access to the symbol without confirming the existence of the symbol, or to confirm the existence of the symbol quickly, when the symbol exists.
Abstract:
PROBLEM TO BE SOLVED: To efficiently achieve in-lining for code optimization.SOLUTION: When a method is a supposition multimethod, a distribution of types in execution of a group of actual arguments is inspected by type inference and profiling. If appearance of the group of actual arguments deviates, the method is specialized for the group of types of high frequency, and the method and the group of types are cached as a key. A code at a call source is optimized so as to call the specialized method by performing run-time inspection for several groups of types of high frequency. When the code of the specialized method is small enough, in-lining is achieved.
Abstract:
PROBLEM TO BE SOLVED: To provide a computer-implementing method, a system, and a computer program for processing a data stream.SOLUTION: The present invention provides techniques for selectively removing runtime data from a stream-based application in an aspect that reduces an impact of any delay caused by processing of the runtime data in the stream-based application. In addition to removing the runtime data from a primary processing path of the stream-based application, the runtime data can be processed in an alternate manner, either by using alternate processing resources or by delaying the processing of the runtime data.
Abstract:
PROBLEM TO BE SOLVED: To replace memory accesses with register accesses in order to improve performance in computer resources.SOLUTION: Memory accesses to a stack area saving the values of respective registers are replaced with local variable accesses. On condition that SPs are not escaping, the memory accesses via the SPs which are not escaping are replaced with the local variable accesses. Call numbers are imparted to respective call instructions and in-lined codes in response to the in-lining of the codes to be called by the call instructions included in a binary code. When the SPs are escaping, the memory accesses belonging to the call numbers imparted to the instructions causing escaping and the ancestor call numbers of the call numbers are prohibited to be replaced with the local variable accesses among the memory accesses where the escaping SPs are defined as base addresses. In the meantime, the remaining memory accesses without prohibition are replaced with the local variable accesses.