会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 81. 发明授权
    • Execution trace truncation
    • 执行跟踪截断
    • US08584110B2
    • 2013-11-12
    • US13249250
    • 2011-09-30
    • Hiroshi InoueHiroshige HayashizakiPeng Wu
    • Hiroshi InoueHiroshige HayashizakiPeng Wu
    • G06F9/44
    • G06F8/443G06F11/3636
    • An execution trace of building blocks of computer code includes a head building block at which the execution trace starts, and a tail building block at which the execution trace ends. The building blocks are executable in a sequence from the head building block to the tail building block. The execution trace is truncated at a particular building block of the execution trace, which becomes the tail building block. The particular building block can correspond to a head building block of an additional execution trace, and/or to a loop header building block of a loop within the execution trace and at which the loop is entered. The execution trace is a compilation unit on which basis a trace-based compiler computer program generates an executable version of the code at least by compiling these units.
    • 计算机代码的构建块的执行跟踪包括执行跟踪开始的头构建块和执行跟踪结束的尾部构建块。 构建块可以从头部构造块到尾部构造块的顺序执行。 执行跟踪在执行跟踪的特定构建块处被截断,这将成为尾部构建块。 特定构建块可以对应于附加执行跟踪的头部构造块,和/或对应于执行跟踪内的循环的循环头部构造块,并且进入循环。 执行跟踪是一个编译单元,在该基础上,基于跟踪的编译器计算机程序至少通过编译这些单元来生成代码的可执行版本。
    • 82. 发明授权
    • Image retrieval
    • 图像检索
    • US08462224B2
    • 2013-06-11
    • US12878782
    • 2010-09-09
    • Tong ZhangPeng Wu
    • Tong ZhangPeng Wu
    • H04N5/228
    • G06K9/00295G06F17/30247G06K9/00369G06K2009/00328H04N5/247
    • A method, comprising receiving query data including an image of a person, and detecting a face of the person in the image to create a detected face, generating face data and clothing data using the detected face including a measure of characteristics of the face and clothing of the person, and retrieving images and video for the person and a related group of people by comparing the face data and clothing data of the person with multiple measures for the characteristics of faces and clothing generated from a set of images and video in which other people appear wherein co-appearances of the person with at least some of the other people are used to retrieve content in which the person and people from the related group appear.
    • 一种方法,包括接收包括人的图像的查询数据,以及检测图像中的人的面部以创建检测到的面部,使用检测到的面部生成面部数据和服装数据,所述面部包括面部和衣服的特征的量度 并且通过将人的面部数据和服装数据与从一组图像和视频产生的面部和衣服的特征的多个度量进行比较来检索人和相关人群的图像和视频,其中其他 人们出现其中与至少一些其他人的人的共同出现被用于检索相关组中的人和人出现的内容。
    • 86. 发明授权
    • Framework for integrated intra- and inter-loop aggregation of contiguous memory accesses for SIMD vectorization
    • 用于SIMD向量化的连续存储器访问的集成的内部和组间集成的框架
    • US08056069B2
    • 2011-11-08
    • US11856284
    • 2007-09-17
    • Alexandre E. EichenbergerKai-Ting Amy WangPeng Wu
    • Alexandre E. EichenbergerKai-Ting Amy WangPeng Wu
    • G06F9/45G06F7/52G06F15/00
    • G06F8/4452G06F8/445
    • A method, computer program product, and information handling system for generating loop code to execute on Single-Instruction Multiple-Datapath (SIMD) architectures, where the loop contains multiple non-stride-one memory accesses that operate over a contiguous stream of memory is disclosed. A preferred embodiment identifies groups of isomorphic statements within a loop body where the isomorphic statements operate over a contiguous stream of memory over the iteration of the loop. Those identified statements are then converted into virtual-length vector operations. Next, the hardware's available vector length is used to determine a number of virtual-length vectors to aggregate into a single vector operation for each iteration of the loop. Finally, the aggregated, vectorized loop code is converted into SIMD operations.
    • 一种用于生成在单指令多数据路径(SIMD)架构上执行的循环码的方法,计算机程序产品和信息处理系统,其中循环包含在连续的存储器流上操作的多个非步进存储器访问 披露 优选实施例识别在循环体内同构语句的组,其中同构语句在循环的迭代上在连续的存储器流上操作。 然后将那些识别的语句转换为虚拟长度向量操作。 接下来,使用硬件的可用向量长度来确定多个虚拟长度向量以聚合到单个向量操作中,用于循环的每次迭代。 最后,聚合的向量化循环码被转换成SIMD操作。
    • 88. 发明申请
    • ADMISSION METHOD, ADMISSION APPARATUS AND COMMUNICATION SYSTEM
    • 入学方法,入学设备和通信系统
    • US20110128845A1
    • 2011-06-02
    • US12954469
    • 2010-11-24
    • Peng Wu
    • Peng Wu
    • H04W8/00
    • H04W72/0486H04L47/70H04L47/80H04W72/08H04W74/00
    • An admission method, an admission apparatus, and a communication system are disclosed. The admission method includes: obtaining timeslot utilization efficiency R1 of a first User Equipment (UE) that needs to access a system and timeslot utilization efficiency R2 of a second UE that has accessed the system; judging whether the difference between R1 and R2 is greater than a first decision threshold; and allowing the first UE to access the system if determining that the difference between R1 and R2 is greater than the first decision threshold. The admission method provided herein is applicable to a communication system, and can improve the timeslot utilization efficiency and the throughput of the system.
    • 公开了准入方法,准入装置和通信系统。 准入方法包括:获取需要访问系统的第一用户设备(UE)的时隙利用率R1和已访问系统的第二UE的时隙利用率R2; 判断R1和R2之间的差是否大于第一判定阈值; 并且如果确定R1和R2之间的差异大于第一判定阈值,则允许第一UE访问系统。 本文提供的准入方法适用于通信系统,并且可以提高系统的时隙利用效率和吞吐量。