scispace - formally typeset
Search or ask a question

Showing papers on "State (computer science) published in 2006"


Journal ArticleDOI
TL;DR: By integrating past and new approaches for molecular logic reconfiguration, this paper was able to load advanced arithmetic calculations onto a single molecular species, and for the first time, a full-subtractor is now possible within individual molecules.
Abstract: Over the past decade, there has been remarkable progress in the development of molecular logic and arithmetic systems, which has brought chemists closer to the realization of a molecular scale calculator (a Moleculator). This paper describes a significant step in this direction. By integrating past and new approaches for molecular logic reconfiguration, we were able to load advanced arithmetic calculations onto a single molecular species. Exchanging chemical inputs, monitoring at several wavelengths simultaneously, as well as using negative logic for the transmittance mode significantly increase the input and output information channels of the processing molecule. Changing the initial state of the processor is an additional approach used for altering the logical output of the device. Finally, introducing degeneracy to the chemical inputs or, alternatively, controlling their interactions to form identical chemical states minimizes the complexity of realizing three-bits addition and subtraction at the molec...

272 citations


Patent
31 Jul 2006
TL;DR: In this article, a graphical user interface (GUI) and accompanying functionality for binding Web page definitional elements to a back-end state (e.g., client- or server-side backend state) and custom logic is provided.
Abstract: A graphical user interface (GUI) and accompanying functionality for binding Web page definitional elements to a back-end state (e.g., client- or server-side back-end state) and custom logic is provided. In one embodiment, a template containing definitional elements, custom logic, and bindings are generated that define all or a portion of a Web page based on input received and functionality provided by the invention.

207 citations


Patent
29 Sep 2006
TL;DR: In this article, the authors consider a system and method for provisioning, retirement and configuration of virtual machines, which may include a desired target state of the virtual machines as well as an action to initiate in order to reach the desired state.
Abstract: The embodiments contemplate a system and method for a provisioning, retirement and configuration of virtual machines. A predefined policy may include a desired target state of the virtual machines, as well as an action to initiate in order to reach the desired state. The action may be initiated if the state varies from the desired level by a predetermined amount or percentage over a predetermined period of time. Data from the virtual machines is analyzed to determine if the desired state of the virtual machines is satisfied. The analysis may be continuous or periodic. If it is determined that the desired state is not satisfied, then predefined actions are performed until the desired state is attained. The predefined actions may be the removal or addition of one or more virtual machines or other actions necessary to reach the desired state.

191 citations


Patent
Yoshio Kimura1, Junko Nemoto1, Wilson Chiu1, Andrew Daborn1, Yuan Shao1 
30 Aug 2006
TL;DR: In this article, the operation screen of a mobile device is changed according to the operation status of the mobile device or that of an image forming apparatus in a communicable state when the devices become communicable with each other.
Abstract: This invention further improves the operability of a mobile device by changing the operation screen of the mobile device in accordance with the operation status of the mobile device or that of an image forming apparatus in a communicable state when the mobile device and image forming apparatus become communicable with each other. When it is detected that the mobile device exists within a range of a predetermined short distance, status information is acquired from the mobile device to determine whether a file is selected in the operation screen of the mobile device. Information which designates an operation screen to be displayed on the mobile device is transmitted on the basis of the determination result.

181 citations


Book ChapterDOI
28 May 2006
TL;DR: In this paper, the authors presented the first feasibility results for such private circuits, which can detect any serious tampering and erase all data in the memory even in the presence of an unbounded number of adaptive wire faults.
Abstract: Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct circuits that should protect the secrecy of their internal state against an adversary who may modify the values of an unbounded number of wires, anywhere in the circuit. In contrast, all previous works on protecting cryptographic hardware relied on an assumption that some portion of the circuit must remain completely free from tampering. We obtain the first feasibility results for such private circuits. Our main result is an efficient transformation of a circuit C, realizing an arbitrary (reactive) functionality, into a private circuit C′ realizing the same functionality. The transformed circuit can successfully detect any serious tampering and erase all data in the memory. In terms of the information available to the adversary, even in the presence of an unbounded number of adaptive wire faults, the circuit C′ emulates a black-box access to C.

179 citations


Proceedings ArticleDOI
11 Jan 2006
TL;DR: This paper specifies, via a Hoare-like logic, an interprocedural and flow sensitive (but termination insensitive) information flow analysis for object-oriented programs that employs independence assertions to describe the noninterference property that formalizes confidentiality, and employs region assertions to describes possible aliasing.
Abstract: This paper specifies, via a Hoare-like logic, an interprocedural and flow sensitive (but termination insensitive) information flow analysis for object-oriented programs. Pointer aliasing is ubiquitous in such programs, and can potentially leak confidential information. Thus the logic employs independence assertions to describe the noninterference property that formalizes confidentiality, and employs region assertions to describe possible aliasing. Programmer assertions, in the style of JML, are also allowed, thereby permitting a more fine-grained specification of information flow policy.The logic supports local reasoning about state in the style of separation logic. Small specifications are used; they mention only the variables and addresses relevant to a command. Specifications are combined using a frame rule. An algorithm for the computation of postconditions is described: under certain assumptions, there exists a strongest postcondition which the algorithm computes.

162 citations


Patent
Gerrit Jan Hemink1
31 Mar 2006
TL;DR: In this article, a program voltage signal implemented as a series of increasing program voltage pulses is applied to a set of non-volatile storage elements and different increment values can be used when programming memory cells to different memory states.
Abstract: A program voltage signal implemented as a series of increasing program voltage pulses is applied to a set of non- volatile storage elements. Different increment values can be used when programming memory cells to different memory states. A smaller increment value can be used when programming memory cells to lower threshold voltage memory states and a larger increment value used when programming memory cells to higher threshold voltage memory states such as the highest memory state in an implementation. When non-volatile storage elements of a set are programmed to different memory states under simultaneous application of a single program voltage signal, programming can be monitored to determine when lower state programming is complete. The increment value can then be increased to complete programming to the highest memory state. Coarse/fine programming methodology can be incorporated for the highest memory state when the increment value is increased to maintain the threshold distribution within a reasonable range.

154 citations


Journal Article
TL;DR: The main result is an efficient transformation of a circuit C, realizing an arbitrary (reactive) functionality, into a private circuit C′ realizing the same functionality, which can successfully detect any serious tampering and erase all data in the memory.
Abstract: Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct circuits that should protect the secrecy of their internal state against an adversary who may modify the values of an unbounded number of wires, anywhere in the circuit. In contrast, all previous works on protecting cryptographic hardware relied on an assumption that some portion of the circuit must remain completely free from tampering. We obtain the first feasibility results for such private circuits. Our main result is an efficient transformation of a circuit C, realizing an arbitrary (reactive) functionality, into a private circuit C' realizing the same functionality. The transformed circuit can successfully detect any serious tampering and erase all data in the memory. In terms of the information available to the adversary, even in the presence of an unbounded number of adaptive wire faults, the circuit C' emulates a black-box access to C.

130 citations


Patent
Alan Welsh Sinclair1
27 Jul 2006
TL;DR: In this paper, a file-based protocol for transferring data between a host system and a data storage system is presented, which includes an interface that uses a file based protocol to transfer data between the storage system and the host system.
Abstract: System and method for transferring data between a host system and a data storage system is provided. The system includes an interface that uses a file based protocol to transfer data between the data storage system and the host system, wherein the data storage system includes a first mass storage device and a second mass storage device; wherein the first mass storage device is a solid state non-volatile memory device and the second mass storage device is a non-solid state memory device. The first mass storage device is a flash memory device that operates as a primary storage device that stores data on a file by file basis. The second mass storage device is a magnetic disk drive that operates as secondary storage device and stores data received via a logical interface.

129 citations


Patent
31 Mar 2006
TL;DR: In this article, a system that facilitates device and/or machinery diagnostics, prognostics and control by way of condition sensing, such as sensing the condition of the device and a fluid of a device (e.g., fluid health indicators).
Abstract: A system that facilitates device and/or machinery diagnostics, prognostics and control by way of condition sensing, such as sensing the condition of the device and/or a fluid of the device (e.g., fluid health indicators). The system can employ a plurality of sensors to determine a current state and estimate a future state of the fluid and/or device, as well as providing control of the device, e.g., in order to increase the remaining useful life of the fluid and/or operation of the device. The sensors can communicate wirelessly with each other, with the device, and/or with a central control system that provides, e.g., sensor fusion, prognostics and control integration. In addition, the sensors can be powered locally based upon the physical or chemical properties of the environment.

123 citations


Patent
02 Nov 2006
TL;DR: In this article, lock state messaging between the meta-data volume node and the data volume nodes is used to assign locks and to update local lock caches, which is a comprehensive source for lock state information about data containers in the system.
Abstract: A system and method manages lock state information in a storage system. A meta-data volume node includes a lock state database which is a comprehensive source for lock state information about data containers in the system. A plurality of data volume nodes include local lock caches, which contain information about locks. Lock state messaging between the meta-data volume node and the data volume nodes is used to assign locks and to update local lock caches. The meta-data volume node is configured to determine whether input/output requests should be allowed or denied and to instruct the data volume nodes of this input/output operation result. Lock information is also sent to the data volume nodes for storage in local lock state caches to the extent the data volume nodes have the network capacity locally.

Patent
Joon Maeng1
31 Mar 2006
TL;DR: In this paper, a wireless event status communication system, device and method are disclosed, which includes a wireless informer associated with an environmental element having more than one operating state and operable to determine a current operating state of the environmental element and to communicate the current operating states via a wireless communication module.
Abstract: A wireless event status communication system, device and method are disclosed. In one form, a wireless enabled notification system includes a wireless informer operably associated with an environmental element having more than one operating state and operable to determine a current operating state of the environmental element and to communicate the current operating state via a wireless communication module. The system further includes a remote status notification device operable to receive the communication including the current operating state. The remote status notification device including a processor operable to determine a last current operating state when the remote status notification device is out of range of the wireless informer.

Patent
04 May 2006
TL;DR: In this paper, a controller calculates recommendation values indicating recommended degrees to recommend the use to a user for each of a plurality of applications and for each contents of each of the applications, using the information that the information acquisition section acquired.
Abstract: An information acquisition section acquires application halfway information, user preference, updated date and time, real-timeness, usage frequency, usage history, radio wave state, remaining battery level, billing information or other information. A controller calculates recommendation values indicating recommended degrees to recommend the use to a user for each of a plurality of applications and for each of the contents of each of the applications, using the information that the information acquisition section acquired. Then, for example, when a specific button is pressed, the controller gives priorities to the plurality of applications and contents based on the recommendation values, causing the applications and contents to be displayed on a display of a display section 15 in the order of priority. Thus, of the various applications and contents, it makes it possible to select one that is more matched to the user preference and suitable for the terminal usage pattern.

Patent
29 Sep 2006
TL;DR: In this paper, a method for establishing connectivity for a mobile device including a plurality of communication interfaces is provided, where a power state of the mobile device is monitored and a first one of the communication interfaces selected based on the power state.
Abstract: A method for establishing connectivity for a mobile device including a plurality of communication interfaces is provided. A power state of the mobile device is monitored. A first one of the communication interfaces is selected based on the power state. Connectivity is established to a remote network using the first communication interface.

01 Jan 2006
TL;DR: This work formally defines a digital forensic investigation and categories of analysis techniques based on an extended finite state machine (FSM) model that was designed to include support for removable devices and complex states and events.
Abstract: This work formally defines a digital forensic investigation and categories of analysis techniques. The definitions are based on an extended finite state machine (FSM) model that was designed to include support for removable devices and complex states and events. The model is used to define the concept of a computer's history, which contains the primitive and complex states and events that existed and occurred. The goal of a digital investigation into make valid inferences about a computer's history. Unlike the physical world, where an investigator can directly observe objects, the digital world involves many indirect observations. The investigator cannot directly observe the state of a hard disk sector or bytes in memory. He can only directly observe the state of output devices. Therefore, all statements about digital states and events are hypotheses that must be tested to some degree. Using the dynamic FSM model, seven categories and 31 unique classes of digital investigation analysis techniques are defined. The techniques in each category can be used to test and formulate different types of hypotheses and completeness is shown. The classes are defined based on the model design and current practice. Using the categories of analysis techniques and the history model, the process models that investigators use are formally compared. Until now, it was not clear how the phases in the models were different. The model is also used to identify where assumptions are made during an investigation and to show differences between the concepts of digital forensics and the more traditional forensic disciplines.

Patent
29 Jun 2006
TL;DR: In this paper, a computer implemented method for updating one or a combination of the system software, operating systems, device configuration, application software and firmware of electronic devices via geographically located local communication points likely to be proximate to the electronic device being updated.
Abstract: A computer implemented method for updating one or a combination of the system software, operating systems, device configuration, application software and firmware of electronic devices via geographically located local communication points likely to be proximate to the electronic device being updated. The communication points are connected to local servers which communicate stored update packages to the electronic device which are pre-provided by the device manufacturers, or customize update packages to the device subsequent to a query response as to the state of software, firmware, and configuration of the device to be updated.

Patent
16 Mar 2006
TL;DR: In this article, a digital data receiver capable of smoothly switching broadcast services without giving an unpleasant feeling to a viewer is proposed, which includes a first video data generator (20) for generating first-video data, a second-video-generator (22), and an output control part (24) for outputting the first data, the second video data, or any one of predetermined static images in accordance with the receiving state.
Abstract: PROBLEM TO BE SOLVED: To provide a digital data receiver capable of smoothly switching broadcast services without giving an unpleasant feeling to a viewer SOLUTION: A digital data receiver (10) includes: a first video data generator (20) for generating first video data; a second video data generator (22) for generating second video data; a receiving state detection part (16) for detecting a receiving state of digital broadcast data; and an output control part (24) for outputting the first video data, the second video data or any one of predetermined static images in accordance with the receiving state, wherein when the receiving state of first digital broadcast data is excellent, the first video data are output by the output control part, when the receiving state of the first digital broadcast data is not excellent and the receiving state of second digital broadcast data is excellent, the second video data are output, and when the receiving state of the second digital broadcast data is not excellent, the static image is output COPYRIGHT: (C)2008,JPO&INPIT

01 Aug 2006
TL;DR: This document presents an extension to the Session Initiation Protocol (SIP)-Specific Event Notification mechanism for subscribing to a homogeneous list of resources, where the subscriber can subscribe to an entire list and then receive notifications when the state of any of the resources in the list changes.
Abstract: This document presents an extension to the Session Initiation Protocol (SIP)-Specific Event Notification mechanism for subscribing to a homogenous collection of event packages. Instead of the subscriber sending a SUBSCRIBE for each resource individually, the subscriber can subscribe to an entire collection, and then receive notifications when the state of any of the resources in the collection changes.

Journal ArticleDOI
TL;DR: A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger–Horne–Zeilinger (GHZ) state that two users can exchange their secret messages simultaneously with a set of devices under the control of a third party.
Abstract: A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger–Horne–Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed.

Patent
Paul Castro1, Ravindranath Konuru1, Avraham Leff1, James T. Rayfield1, Danny L. Yeh1 
23 Jan 2006
TL;DR: In this paper, the authors present a system, method and computer program product for synchronizing replicas of shared data structures associated with one or more computer systems, which includes: evaluating a metric for performing a replica synchronization operation on a first computer system according to a first synchronization method; evaluating the metric for implementing replica synchronization on a second computer system using a second synchronization method, and selecting, at synchronization time, whether to use the first or second synchronization methods.
Abstract: A system, method and computer program product for synchronizing replicas of shared data structures associated with one or more computer systems. The method comprises: evaluating a metric for performing a replica synchronization operation on a first computer system according to a first synchronization method; evaluating the metric for performing a replica synchronization operation on the first computer system according to a second synchronization method; and, selecting, at synchronization time, based on the evaluated metric, whether to use the first or second synchronization methods, and communicating a command to a second computer system to replicate a shared data structure based on the selected synchronization method.

Patent
Balasundaram Sai1
08 Jun 2006
TL;DR: In this article, an integrated circuit includes compression logic to compress at least a portion of the data in volatile memory independent of an operating system, and the compression logic may compress the data responsive to an indication to transition to a reduced power state.
Abstract: Embodiments of the invention are generally directed to systems, methods, and apparatuses for increasing the battery life of a mobile computing system through memory compression. In some embodiments, an integrated circuit includes compression logic to compress at least a portion of the data in volatile memory independent of an operating system. The compression logic may compress the data responsive to an indication to transition to a reduced power state.

Patent
06 Jan 2006
TL;DR: In this paper, the authors define one or more hotkeys, and each hotkey may correspond to an input from one of the input components of the electronic device, and enable or disable hotkeys based on the retrieved rule.
Abstract: A computer program product may include instructions that, when executed, cause a processor to perform operations that include monitoring an electronic device to determine whether the electronic device is in a specific state. The electronic device may define one or more hotkeys, and each hotkey may correspond to an input from one or more input components of the electronic device. If the electronic device is in the specific state, a rule associated with the specific state may be retrieved, and one or more hotkeys may be enabled or disabled based on the retrieved rule. In some implementations, enabling or disabling one or more hotkeys includes enabling or disabling one or more operations associated with corresponding one or more hotkeys.

Patent
12 Sep 2006
TL;DR: In this paper, a card shoe handling device includes a cover that is manually movable from a closed position to an opened position and a locking mechanism operable to selectively lock and unlock the cover in the closed position in response to a state of the playing card handling system.
Abstract: A card shoe handling device includes a cover that is manually movable from a closed position to an opened position and a locking mechanism operable to selectively lock and unlock the cover in the closed position in response to a state of the playing card handling system. In the closed position the cover limits access to playing cards carried by the playing card output receiver from an exterior of the playing card handling system and in the opened position the cover does not limit access to playing cards carried by the playing card output receiver from an exterior of the playing card handling system.

Patent
14 Oct 2006
TL;DR: Hybrid peer-to-peer data communication and management is described in this paper, including querying a plurality of elements (302-316, 318, 324-332 and 336-344) in an environment (300) for state data, the state data describes a state of the environment and an activity occurring in the environment.
Abstract: Hybrid peer-to-peer data communication and management is described, including querying a plurality of elements (302-316, 318, 324- 332 and 336-344) in an environment (300) for state data, the state data describes a state of the environment (300) and an activity occurring in the environment (300), receiving the state data from one or more of the plurality of elements (302-316, 318, 324-332 and 336-344) in response to the querying, analyzing the state data to determine an environmental change, the updated state data is generate describing the environmental change, and using the updated state data to modify the environment (300) by dynamically allocating the plurality of elements to process a simulation, the plurality of elements (302-316, 318, 324-332 and 336-344) being dynamically allocated based on available processing capacity provided by the plurality of elements (302-316, 318, 324-332 and 336-344).

Patent
09 Aug 2006
TL;DR: In this article, a trace port is used to check the execution state of a most recently executed instruction in a program, and a software integrity checking (SIC) logic is employed to check integrity of execution states of the executed instructions.
Abstract: A system (100) includes a processor having a trace port, a memory coupled to the processor (104), and a software integrity checking ('SIC') logic coupled to the memory and the trace port. The trace port provides data regarding an execution state of a most recently executed instruction. The SIC logic is operable to check integrity of addresses of instructions in a code sequence stored in the memory and executable on the processor, and to check integrity of execution states of the executed instructions.

Patent
09 Feb 2006
TL;DR: In this paper, small and power-efficient buffer/mini-cache sources and sinks selected DMA accesses directed to a memory space included in a coherency domain of a microprocessor when cached data in the microprocessor is inaccessible due to any or all of the microprocessors being in a low power state not supporting snooping.
Abstract: Small and power-efficient buffer/mini-cache sources and sinks selected DMA accesses directed to a memory space included in a coherency domain of a microprocessor when cached data in the microprocessor is inaccessible due to any or all of the microprocessor being in a low-power state not supporting snooping. Satisfying the selected DMA accesses via the buffer/mini-cache enables reduced power consumption by allowing the microprocessor (or portion thereof) to remain in the low-power state. The buffer/mini-cache may be operated (temporarily) incoherently with respect to the cached data in the microprocessor and flushed before deactivation to synchronize with the cached data when the microprocessor (or portion thereof) transitions to a high-power state that enables snooping. Alternatively the buffer/mini-cache may be operated in a manner (incrementally) coherent with the cached data. The microprocessor implements one or more processors having associated cache systems (such as various arrangements of first-, second-, and higher-level caches).

Patent
Xavier Vera1, Osman Unsal1, Oguz Ergin1, Jaume Abella1, Antonio González1 
28 Feb 2006
TL;DR: In this article, the authors present a method for identifying available cores of a many-core processor, allocating a first subset of the cores to an enabled state and a second subset to a spare state, and storing information regarding the allocation in a storage.
Abstract: In one embodiment, the present invention includes a method for identifying available cores of a many-core processor, allocating a first subset of the cores to an enabled state and a second subset of the cores to a spare state, and storing information regarding the allocation in a storage. The allocation of cores to the enables state may be based on a temperature-aware algorithm, in certain embodiments. Other embodiments are described and claimed.

Book ChapterDOI
30 Mar 2006
TL;DR: This work describes a method for examining whether a symbolic state that arises during symbolic execution is subsumed by another symbolic state, and considers abstraction techniques for computing and storing abstract states during symbolic executions.
Abstract: We address the problem of error detection for programs that take recursive data structures and arrays as input. Previously we proposed a combination of symbolic execution and model checking for the analysis of such programs: we put a bound on the size of the program inputs and/or the search depth of the model checker to limit the search state space. Here we look beyond bounded model checking and consider state matching techniques to limit the state space. We describe a method for examining whether a symbolic state that arises during symbolic execution is subsumed by another symbolic state. Since subsumption is in general not enough to ensure termination, as the number of symbolic states may be infinite, we also consider abstraction techniques for computing and storing abstract states during symbolic execution. Subsumption checking determines whether an abstract state is being revisited, in which case the model checker backtracks – this enables analysis of an under-approximation of the program behaviors. We illustrate the technique with abstractions for lists and arrays. The abstractions encode both the shape of the program heap and the constraints on numeric data. We have implemented the techniques in the Java PathFinder tool and we show their effectiveness on Java programs.

Journal ArticleDOI
TL;DR: A selection of recently developed and/or used techniques for equivalence-checking on infinite-state systems can be found in this article, with an up-to-date overview of existing results.
Abstract: The paper presents a selection of recently developed and/or used techniques for equivalence-checking on infinite-state systems, and an up-to-date overview of existing results (as of September 2004).

Patent
Motoi Takahashi1, Fukuoka Ikuto1
05 Oct 2006
TL;DR: In this paper, the operating specification of an option functional part is switched according to the logic level output from the decision circuit, which is automatically decided according to program state of the programming element before the power-on operation is completed.
Abstract: A function switching part has a pair of programming elements programmed to different logic values. A decision circuit in the function switching part outputs a logic level according to a difference between the currents flowing in the programming elements, while the power supply voltage rises at the power-on. The operating specification of an option functional part is switched according to the logic level output from the decision circuit. That is, the operating specification of the option functional part is automatically decided according to the program state of the programming element before the power-on operation is completed. The read operation for the programming element need not be performed for deciding the operating specification of the option functional part. Since the initial process after the power-on period is simplified, the period from when the power is turned on to when the normal operation begins can be shortened.