会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 71. 发明申请
    • Mining for performance data for systems with dynamic compilers
    • 挖掘具有动态编译器的系统的性能数据
    • US20090178032A1
    • 2009-07-09
    • US10585292
    • 2005-03-03
    • Rongzhen YangFeng Chen
    • Rongzhen YangFeng Chen
    • G06F9/45
    • G06F11/3612G06F9/45516
    • In an example data mining process, performance data for instructions that execute in a data processing system is obtained. The performance data may comprise instruction addresses and corresponding performance information. A dump that comprises the instructions and corresponding instruction addresses may also be obtained. Common code segments in the dump may be automatically identified. A common code segment may comprise an ordered set of multiple instructions that appears multiple times in the dump. Aggregate performance data for the common code segments may be generated, based at least in part on (a) the instruction addresses associated with the common code segments in the dump, and (b) the instruction addresses and the corresponding performance information from the performance data. Other embodiments are described and claimed.
    • 在示例数据挖掘过程中,获得在数据处理系统中执行的指令的性能数据。 性能数据可以包括指令地址和对应的性能信息。 还可以获得包括指令和对应指令地址的转储。 可以自动识别转储中的公共代码段。 公共代码段可以包括在转储中出现多次的多个指令的有序集合。 可以至少部分地基于(a)与转储中的公共代码段相关联的指令地址,以及(b)来自执行数据的指令地址和相应的性能信息来生成用于公共代码段的总体性能数据 。 描述和要求保护其他实施例。
    • 72. 发明申请
    • Three stage hybrid stack model
    • 三级混合堆栈模型
    • US20060095675A1
    • 2006-05-04
    • US10925188
    • 2004-08-23
    • Rongzhen YangFeng Chen
    • Rongzhen YangFeng Chen
    • G06F12/00
    • G06F9/30134G06F12/0875
    • A three-stage hybrid stack model includes two separate stages of registers, or in other words, two register stacks. Below the two register stages is a memory stage, or memory stack. As operands are pushed onto the top register stack, operands residing in registers are moved down to accommodate the new operands. A second register stack, or transfer register stack receives overflow from the top register stack and supplies operands to the top register stack when the top register stack is underflowed. A third stage made up of memory locations is used to store overflow from the transfer register stack. The memory stack also supplies operands to the transfer register stack as needed.
    • 三级混合堆栈模型包括两个独立的寄存器阶段,也就是两个寄存器堆栈。 两个寄存器阶段之下是一个存储器级或存储器堆栈。 由于操作数被压入顶部寄存器堆栈,驻留在寄存器中的操作数向下移动以适应新的操作数。 第二个寄存器堆栈或传输寄存器堆栈从顶部寄存器堆栈接收溢出,并在顶部寄存器堆栈下溢时将操作数提供给顶部寄存器堆栈。 由存储器位置构成的第三级用于存储来自传输寄存器堆栈的溢出。 存储器堆栈还根据需要向传输寄存器堆栈提供操作数。
    • 78. 发明授权
    • Methods and apparatus for encrypting a binary string
    • 用于加密二进制串的方法和装置
    • US07190788B2
    • 2007-03-13
    • US10243275
    • 2002-09-13
    • Rongzhen YangZheng-Hua ZhouMichael Zhang
    • Rongzhen YangZheng-Hua ZhouMichael Zhang
    • H04L9/00H04K1/06H04K1/00
    • H04L9/065H04L2209/12H04L2209/26H04L2209/34
    • The methods and apparatus described herein encrypt an unencrypted binary string using an encryption key and a varying-radix conversion method. The encryption key is used to parse the unencrypted binary string into unencrypted sub-strings. The varying-radix conversion method is used to transform the unencrypted sub-strings into encrypted sub-strings. The encrypted sub-strings may then be concatenated together to produce an encrypted binary string. In addition, the reverse process is employed to recover the unencrypted binary string from the encrypted binary string. For example, the decryption process may occur after the encrypted binary string is transmitted over a network communications system.
    • 本文描述的方法和装置使用加密密钥和变化基数转换方法来加密未加密的二进制串。 加密密钥用于将未加密的二进制字符串解析为未加密的子字符串。 变化基数转换方法用于将未加密的子字符串转换为加密子字符串。 然后,加密的子串可以被级联在一起以产生加密的二进制串。 此外,采用相反的过程从加密的二进制字符串中恢复未加密的二进制字符串。 例如,解密过程可以在通过网络通信系统发送加密的二进制串之后发生。