scispace - formally typeset
Search or ask a question

Showing papers on "State (computer science) published in 2012"


Book
06 Jan 2012
TL;DR: In this article, a comprehensive description of basic lower bound arguments, covering many of the gems of this complexity Waterloo that have been discovered over the past several decades, right up to results from the last year or two, is given.
Abstract: Boolean circuit complexity is the combinatorics of computer science and involves many intriguing problems that are easy to state and explain, even for the layman. This book is a comprehensive description of basic lower bound arguments, covering many of the gems of this complexity Waterloo that have been discovered over the past several decades, right up to results from the last year or two. Many open problems, marked as Research Problems, are mentioned along the way. The problems are mainly of combinatorial flavor but their solutions could have great consequences in circuit complexity and computer science. The book will be of interest to graduate students and researchers in the fields of computer science and discrete mathematics.

335 citations


Patent
01 May 2012
TL;DR: In this article, a first client device or system performs a method that includes retaining in memory registration information for a respective application indicating the respective application is registered for sharing application state with other client devices or systems.
Abstract: A first client device or system performs a method that includes retaining in memory registration information for a respective application indicating the respective application is registered for sharing application state with other client devices or systems. The method further includes storing an application state of a respective application, and detecting a transfer triggering condition. The transfer triggering condition includes presence of a second client device or system within a predefined proximity of the first client device or system, and the predefined proximity is a predefined proximity for near field communication. Furthermore, upon detecting the triggering condition, the first client device or system determines, in accordance with the stored registration information, that the respective application is registered for application state sharing, and transmits the application state of the respective application to the second client device or system.

222 citations


Book
14 Feb 2012
TL;DR: The intuition behind declarative programming of networks is presented, including roots in Datalog, extensions for networked environments, and the semantics of long-running queries over network state.
Abstract: Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. This paper provides an introduction to basic issues in declarative networking, including language design, optimization, and dataflow execution. We present the intuition behind declarative programming of networks, including roots in Datalog, extensions for networked environments, and the semantics of long-running queries over network state. We focus on a sublanguage we call Network Datalog (NDlog), including execution strategies that provide crisp eventual consistency semantics with significant flexibility in execution. We also describe a more general language called Overlog, which makes some compromises between expressive richness and semantic guarantees. We provide an overview of declarative network protocols, with a focus on routing protocols and overlay networks. Finally, we highlight related work in declarative networking, and new declarative approaches to related problems.

209 citations


Proceedings ArticleDOI
16 Oct 2012
TL;DR: The approach combines generic secure two-party computation with oblivious RAM (ORAM) protocols and describes an implementation of the resulting protocol, which outperforms off-the-shelf secure-computation protocols for databases containing more than 218 entries.
Abstract: Traditional approaches to generic secure computation begin by representing the function f being computed as a circuit. If f depends on each of its input bits, this implies a protocol with complexity at least linear in the input size. In fact, linear running time is inherent for non-trivial functions since each party must "touch" every bit of their input lest information about the other party's input be leaked. This seems to rule out many applications of secure computation (e.g., database search) in scenarios where inputs are huge.Adapting and extending an idea of Ostrovsky and Shoup, we present an approach to secure two-party computation that yields protocols running in sublinear time, in an amortized sense, for functions that can be computed in sublinear time on a random-access machine (RAM). Moreover, each party is required to maintain state that is only (essentially) linear in its own input size. Our approach combines generic secure two-party computation with oblivious RAM (ORAM) protocols. We present an optimized version of our approach using Yao's garbled-circuit protocol and a recent ORAM construction of Shi et al.We describe an implementation of our resulting protocol, and evaluate its performance for obliviously searching a database with over 1 million entries. Our implementation outperforms off-the-shelf secure-computation protocols for databases containing more than 218 entries.

198 citations


PatentDOI
TL;DR: It is proved that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation.
Abstract: Quantum computing methods and systems are described. A computing device receives an encrypted state from another device. The encrypted state is stored on a quantum register, and a sequence of operations is applied to the encrypted state in the quantum register. The sequence of operations includes an operation parameterized by a control message from the other device. Applying the sequence of operations manipulates the state of the quantum register and an auxiliary quantum system. The auxiliary quantum system can be, for example, a qubit selected from four specified quantum states. Applying the sequence of operations produces encryption-key-update information. The computing device may send an encrypted output state and the encryption-key-update message to the other device.

157 citations


Patent
24 Aug 2012
TL;DR: In this article, the authors propose a control device consisting of a requirement list storage unit which stores a security requirement for communication data corresponding to an application operating in the control device and a command used by the application; an evaluation result storage unit, which stores the evaluation result associated with execution of a variety of encryption algorithms; and an own device environment information storage unit that stores environment information indicating the state of the control devices; and a cryptography selection unit which selects, from the various encryption algorithms, an encryption algorithm which encrypts the communication data and satisfies the security requirement, evaluation result,
Abstract: PROBLEM TO BE SOLVED: To achieve encryption processing that is high in integrity and secrecy of communication data in the constraint on a processing time.SOLUTION: A control device comprises: a requirement list storage unit which stores a security requirement for communication data corresponding to an application operating in the control device and a command used by the application; an evaluation result storage unit which stores an evaluation result associated with execution of a variety of encryption algorithms; an own device environment information storage unit which stores environment information indicating the state of the control device; and a cryptography selection unit which selects, from the variety of encryption algorithms, an encryption algorithm which encrypts the communication data and satisfies the security requirement, the evaluation result, and first environment information corresponding to an application having generated first communication data and a command used for generation of communication data by the application.

152 citations


Patent
10 Dec 2012
TL;DR: In this paper, a method for protecting a password of a computer having a non-volatile memory is disclosed, in which a password is stored in a NVRAM and the computer is then transitioned to a power saving state.
Abstract: A method for protecting a password of a computer having a non-volatile memory is disclosed. A password is stored in a non-volatile memory of a computer. The computer is then transitioned to a power saving state. In response to a detection of an unauthorized access to the non-volatile memory during the power saving state transition, a password input is requested from a user. The computer returns to a power-on state from the power saving state when there is a success in authentication of the input password.

145 citations


Journal ArticleDOI
06 Jan 2012
TL;DR: A computational framework for automatic synthesis of a feedback control strategy for a discrete-time piecewise affine (PWA) system from a specification given as a linear temporal logic formula over an arbitrary set of linear predicates in the system's state variables is presented.
Abstract: We present a computational framework for automatic synthesis of a feedback control strategy for a discrete-time piecewise affine (PWA) system from a specification given as a linear temporal logic (LTL) formula over an arbitrary set of linear predicates in the system's state variables. Our approach consists of two main steps. First, by defining appropriate partitions for its state and input spaces, we construct a finite abstraction of the PWA system in the form of a control transition system. Second, by leveraging ideas and techniques from LTL model checking and Rabin games, we develop an algorithm to generate a control strategy for the finite abstraction. While provably correct and robust to state measurements and small perturbations in the applied inputs, the overall procedure is conservative and expensive. The proposed algorithms have been implemented as a software package and made available for download. Illustrative examples are included.

122 citations


Patent
10 Sep 2012
TL;DR: In this paper, a copy-on-write (COW) disk file is created pointing to a parent disk file that the VM is using, and the VM's memory is marked COW, the device state of the VM was saved to memory, and it was switched to use the COW disk file, and then the VM began running again for substantially the remainder of the checkpoint generation.
Abstract: To generate a checkpoint for a virtual machine (VM), first, while the VM is still running, a copy-on-write (COW) disk file is created pointing to a parent disk file that the VM is using. Next, the VM is stopped, the VM's memory is marked COW, the device state of the VM is saved to memory, the VM is switched to use the COW disk file, and the VM begins running again for substantially the remainder of the checkpoint generation. Next, the device state that was stored in memory and the unmodified VM memory pages are saved to a checkpoint file. Also, a copy may be made of the parent disk file for retention as part of the checkpoint, or the original parent disk file may be retained as part of the checkpoint. If a copy of the parent disk file was made, then the COW disk file may be committed to the original parent disk file.

100 citations


Journal ArticleDOI
Jun Jin1
TL;DR: Results on some grayscale and color images show that the proposed image encryption method satisfies the properties of confusion and diffusion, execution speed and has perfect information concealing.

100 citations


Journal ArticleDOI
TL;DR: Several new protocols for the controlled remote state preparation (CRSP) by using the Brown state as the quantum channel are proposed, and the CRSP protocol of an arbitrary three qubit state is investigated.
Abstract: In this paper, several new protocols for the controlled remote state preparation (CRSP) by using the Brown state as the quantum channel are proposed. Firstly, we propose a CRSP protocol of an arbitrary two qubit state. Then, the CRSP protocol of an arbitrary three qubit state, which has rarely been considered by the previous papers, is investigated. The coefficients of the prepared states can be not only real, but also complex. To design these protocols, some useful and general measurement bases are constructed, which can greatly reduce the restrictions for the coefficients of the prepared states. The security analysis is provided in detail. Moreover, receiver's all recovery operations are summarized into a concise formula.

Patent
21 Mar 2012
TL;DR: In this article, a system and methods for selectively restricting a mobile device are presented, where a visual capture can be used to identify one or more indicators within the visual capture and an implementation of a restriction at the mobile device can be adjusted.
Abstract: Systems and methods are provided for selectively restricting a mobile device. In one implementation, a visual capture can be to identify one or more indicators within the visual capture. Based on the indicators, an implementation of a restriction at the mobile device can be adjusted. In another implementation inputs can be processed to compute a determination, determination reflecting at least one of the in-vehicle role of the user as a driver and the in-vehicle role of the user as a passenger; and, an operation state of the mobile device can be modified based on such a determination. According to another implementation, one or more outputs can be projected from a mobile device, inputs can be received, and such inputs and outputs can be processed to determine a correlation between them. A restriction can then be modified based on the correlation.

Patent
31 May 2012
TL;DR: In this article, the authors present a system and methods for accessing digital content between multiple devices by providing access to an interaction with a first application on a head mounted display (HMD) to a second device.
Abstract: The present application discloses systems and methods for accessing digital content between multiple devices. The systems and methods may be directed to providing access to an interaction with a first application on a head-mounted display (HMD) to a second device. Contextual information relating information of the HMD and information associated with the interaction to describe an interaction state may be stored. A second device may be selected upon which the interaction state may be accessed and a determination of attributes of the second device may be made. The HMD may transfer to the second device the stored contextual information such that the second device may provide via the second application access to the interaction state. Information associated with a user input to the first application may also be transferred. In one example, the contextual information may describe an identified occurrence of digital content accessed via the first application.

Patent
25 Apr 2012
TL;DR: In this article, the authors identify one or more first storage devices in a first tier of the tiered storage system that may be placed in a minimal power consumption state and identify the data segments stored on the first storage device that are most likely to be accessed during a period of time in which the first device is in the minimal consumption state.
Abstract: Mechanisms identify one or more first storage devices in a first tier of the tiered storage system that may be placed in a minimal power consumption state and identify one or more data segments stored on the one or more first storage devices that are most likely to be accessed during a period of time in which the one or more first storage devices are in the minimal power consumption state. The mechanisms migrate the one or more data segments to one or more second storage devices in one of the first tier or a second tier of the storage system and place the one or more first storage devices in the minimal power consumption state. Access requests to the one or more data segments are serviced by the one or more second storage devices while the one or more first storage devices are in the minimal power consumption state.

Patent
22 Mar 2012
TL;DR: In this paper, a variable resistance nonvolatile memory element writing method was proposed, by applying a voltage pulse to a memory cell including a variable resistor element, reversibly changing the variable resistance element between a first resistance state and a second resistance state according to the applied voltage pulse.
Abstract: A variable resistance nonvolatile memory element writing method of, by applying a voltage pulse to a memory cell including a variable resistance element, reversibly changing the variable resistance element between a first resistance state and a second resistance state according to a polarity of the applied voltage pulse is provided. The variable resistance nonvolatile memory element writing method includes applying a first preliminary voltage pulse and subsequently applying the first voltage pulse to the variable resistance element to change the variable resistance element from the second resistance state to the first resistance state, the first preliminary voltage pulse being smaller in voltage absolute value than the second threshold voltage and different in polarity from the first voltage pulse.

Journal ArticleDOI
01 Apr 2012
TL;DR: This paper reconsider BDDs as state space representation and use it as data structure for bounded synthesis and shows that the new approach leads to a computation time improvement of several orders of magnitude.
Abstract: Synthesizing finite-state systems from full linear-time temporal logic (LTL) is an ambitious way to tackle the challenge of constructing correct-by-construction systems. One particularly promising approach in this context is bounded synthesis, originally proposed by Schewe and Finkbeiner, which in turn builds upon Safraless synthesis, as described by Kupferman and Vardi. Previous implementations of these approaches performed the computation either in an explicit way or used symbolic data structures other than binary decision diagrams (BDDs). In this paper, we reconsider BDDs as state space representation and use it as data structure for bounded synthesis. The key to this construction is the application of two novel optimisation techniques that decrease the number of state bits in such a representation significantly. The first technique uses signalling bits to connect sub-games representing the safety- and non-safety parts of the specification. The second technique is based on a closer analysis of the step of building a safety game from a universal automaton and uses a sufficient condition to remove some so-called counters from the state space of the game. We evaluate our approach on several benchmark suites and show that the new approach leads to a computation time improvement of several orders of magnitude.

Journal ArticleDOI
TL;DR: A method to automatically locate and correct faults in a finite state system, either at the gate level or at the source level, and finds a memoryless strategy that corresponds to a simple, local correction that does not add any state.

Patent
12 Apr 2012
TL;DR: In this paper, an indication that a view of a task is presented by a first device is given to a second device to permit the second device with the same view or a different view than that presented by the first device.
Abstract: Provided herein is a method, which may include an indication that is received that a view of a task is presented by a first device. State information may be provided to a second device to permit the second device to be synchronized with the first device and to present a view of the task, either the same view or a different view than that presented by the first device. Information may also be received relating to a change in state of the task that is provided by one of the devices while a first view of the task is presented thereupon. Further, updated state information may be provided to another one of the devices to cause the other device to remain synchronized and to update a second view of the task that is presented.

Patent
Edouard Bugnion1
22 Oct 2012
TL;DR: In this paper, the authors present a binary translation system for detecting synchronous and asynchronous exceptions, and handling them with precise reentry into the interrupted instruction stream; by "precise" is meant that the atomic execution of the source instructions is guaranteed, and that the application of actions, including those that originate from asynchronous exception, occurs at the latest at the completion of the current source instruction at the time of the request for the action.
Abstract: A source computer system with one instruction set architecture (ISA) is configured to run on a target hardware system that has its own ISA, which may be the same as the source ISA. In cases where the source instructions cannot be executed directly on the target system, the invention provides binary translation system. During execution from binary translation, however, both synchronous and asynchronous exceptions may arise. Synchronous exceptions may be either transparent (requiring processing action wholly within the target computer system) or non-transparent (requiring processing that alters a visible state of the source system). Asynchronous exceptions may also be either transparent or non-transparent, in which case an action that alters a visible state of the computer system needs to be applied. The invention includes subsystems, and related methods of operation, for detecting the occurrence of all of these types of exceptions, to handle them, and to do so with precise reentry into the interrupted instruction stream; by “precise” is meant that the atomic execution of the source instructions is guaranteed, and that the application of actions, including those that originate from asynchronous exceptions, occurs at the latest at the completion of the current source instruction at the time of the request for the action. The binary translation and exception-handling subsystems are preferably included as components of a virtual machine monitor which is installed between the target hardware system and the source system, which is preferably a virtual machine.

Patent
23 May 2012
TL;DR: In this article, the authors presented an air conditioning system that is capable of reducing power consumption in the standby state. But the air conditioning apparatus of the present system is not suitable for use in outdoor machines.
Abstract: The present invention provides an air conditioning apparatus that is capable of reducing power consumption in the standby state The air conditioning apparatus of the present invention comprises a switching means (105) that is controlled by an indoor machine control section (101) to be opened and closed, an outdoor machine standby state cancelling means (206) through which a first current from through the switching means (105) flows when the switching means (105) is closed, the first current flowing through the outdoor machine standby state cancelling means (206) cancelling a standby state of the outdoor machine, a switching power supply circuit (209) for driving an outdoor machine control section (201), and a switching power supply circuit on-off means for switching a alternating-current power from an alternating-current power supply (S1) on to and off from the switching power supply circuit (209) according to whether the first current is flowing through the outdoor machine standby state cancelling means (206)

Journal ArticleDOI
TL;DR: Simulation results show that linear interpolation of the equation-of-state causes numerical fluctuations that impede convergence and reduce accuracy in the low-Mach number, variable-density flow code, highlighting the importance of careful code and solution verification in the simulation of variable- density flows.

Patent
19 Oct 2012
TL;DR: In this paper, the authors present a system and/or method for gracelessly rebooting a storage appliance that includes a storage appliances in association with an event that will result in the loss of a state table from volatile memory that halts changes to at least one state table of the storage appliance.
Abstract: Implementations of the present disclosure involve a system and/or method for gracelessly rebooting a storage appliance. The method and system includes a storage appliance in association with an event that will result in the loss of a state table from volatile memory that halts changes to at least one state table of the storage appliance. The state tables describe a plurality of file system states of one or more clients connected to the first storage appliance. The state information is written to a persistent memory of the storage appliance. The state table may then be repopulated using the state table information stored in persistent memory.

Patent
01 Aug 2012
TL;DR: In this article, a graphical waveform showing values of one or more state variables of a computer program being debugged in two or more points in time is used to indicate a selected point in time in execution from the graphic waveform.
Abstract: A computer-implemented method, apparatus and computer program product for debugging programs, the method comprising: displaying a graphic waveform showing values of one or more state variables of a computer program being debugged in two or more points in time; receiving a user selection from points in time, of an indication to a selected point in time in execution from the graphic waveform; and resuming within a debugger an execution state of the computer program associated with the selected point in time.

01 Jan 2012
TL;DR: This work studies the implications of different CPU caching modes and shows that a particular choice affects both programmability and performance of a program.
Abstract: Byte-addressable non-volatile memory may usher in a new era of computing where in-memory data structures are persistent and can be reused directly across machine restarts. However, sudden failures complicate matters because a program state may partially reside in volatile buffers and caches as opposed to primary non-volatile memory. We study the implications of different CPU caching modes and show that a particular choice affects both programmability and performance of a program.

Journal ArticleDOI
TL;DR: This paper considers the safety control problem for hidden mode hybrid systems (HMHSs), which are a special class of hybrid automata in which the mode is not available for control, and solves the perfect state information control problem by constructing a new hybrid automaton.
Abstract: In this paper, we consider the safety control problem for hidden mode hybrid systems (HMHSs), which are a special class of hybrid automata in which the mode is not available for control. For these systems, safety control is a problem with imperfect state information. We tackle this problem by introducing the notion of nondeterministic discrete information state and by translating the problem to one with perfect state information. The perfect state information control problem is obtained by constructing a new hybrid automaton, whose discrete state is an estimate of the HMHS mode and is, as such, available for control. This problem is solved by computing the capture set and the least restrictive control map for the new hybrid automaton. Sufficient conditions for the termination of the algorithm that computes the capture set are provided. Finally, we show that the solved perfect state information control problem is equivalent to the original problem with imperfect state information under suitable assumptions. We illustrate the application of the proposed technique to a collision avoidance problem between an autonomous vehicle and a human driven vehicle at a traffic intersection.

Patent
14 Nov 2012
TL;DR: In this paper, a power control manager includes a set of control registers storing individual control bits, a power switch for each power domain and a programmable microprocessor, which controls the digital state of individual bits within the control registers thereby controlling the ON and OFF state of the corresponding power domain.
Abstract: An electronic system is disposed on a single integrated circuit including a plurality of power domains and a power control manager. Each power domain may be independently powered. The power control manager includes a set of control registers storing individual control bits, a power switch for each power domain and a programmable microprocessor. The programmable microprocessor controls the digital state of individual bits within the control registers thereby controlling the ON and OFF state of the corresponding power domain.

Patent
24 Feb 2012
TL;DR: In this article, an on-vehicle system for assessing an operator's efficiency of a vehicle, include sensors, an audiovisual display device, a processor and a data storage.
Abstract: An on-vehicle system for assessing an operator's efficiency of a vehicle, include sensors, an audiovisual display device, a processor and a data storage. The sensors measure or detect conditions of components of the vehicle, and convert the detected conditions into analog or digital information. The data storage stores program instructions, the analog or digital information from the sensors, and other data. The program instructions, when executed by the processor, control the on-vehicle system to determine a state of the vehicle within a vehicle's environment based on the analog or digital information from the sensors, determine whether one or more of a predetermined set of behaviors has occurred based on the determined state of a vehicle, assess performance of the determined one or more of the predetermined set of behaviors, and present the operator, via the audiovisual display device, a feedback based on the assessment.

Journal ArticleDOI
TL;DR: The nanomagnet logic devices considered here are variants of proposed components for the edge-driven, quantum-dot cellular automata device architecture, where the position of electrons on quantum dots was suggested as a mechanism for representing binary state.
Abstract: The nanomagnet logic (NML) devices considered here are variants of proposed components for the edge-driven, quantum-dot cellular automata device architecture, where the position of electrons on quantum dots was suggested as a mechanism for representing binary state. To control NML circuit components (e.g., gates and lines), to date, externally generated magnetic fields have served as a clock. The clock is used to make the magnets in a circuit ensemble transition to a metastable state, so fringing fields from individual devices can set the state of a neighboring device in accordance with a new input. However, such a clocking scheme is obviously not extensible to chip-level systems. For NML to be a viable candidate for digital systems, a mechanism for simultaneously modulating the energy barriers of a group of devices must be implemented “on-chip,” and guarantee unidirectional dataflow from circuit input to circuit output. We have experimentally demonstrated a CMOS-compatible clock, and used it to reevaluate all of the NML constructs required for a functionally complete logic set. All possible input combinations to said constructs were successfully considered. Experiments were designed to promote unidirectional dataflow.

Patent
23 Mar 2012
TL;DR: In this paper, a division unit divides audio data including words and sounds depending on characteristics not less than 1 of word and acoustic characteristics, and acquires several divided audio data An analyzer 103 acquires analysis about the word and audio characteristics for each divided audio and an expression detecting unit 105 detects clue expression indicating either indication of a user or state of the user.
Abstract: PROBLEM TO BE SOLVED: To replay sound of re-listen efficientlySOLUTION: In a voice interaction support device 100, a division unit 102 divides audio data including words and sounds depending on characteristics not less than 1 of word and acoustic characteristics, and acquires several divided audio data An analyzer 103 acquires analysis about the word and acoustic characteristics for each divided audio data An expression detecting unit 105 detects clue expression not less than 1 indicating either indication of a user or state of the user for each divided audio data by at least either utterance by the user or action by the user When the clue expression is detected, an estimation unit 108 estimates the divided audio data as replay data not less than 1 from the divided audio data not less than 1 corresponding to the sound uttered before the clue expression is detected based on the analysis An output unit 110 outputs the replay data

Patent
28 Mar 2012
TL;DR: In this article, a vehicle anti-collision early warning system based on a vehicle-mounted sensing network is proposed, which consists of an information acquiring and processing module and a module including the ID (Identity) and size fixed information of the vehicle.
Abstract: The invention relates to a vehicle anti-collision early warning system based on a vehicle-mounted sensing network. The vehicle anti-collision early warning system comprises an subject vehicle (SV) information module, a self-learning functional module, an information memory module, a vehicle collision judging module, an anti-collision early warning device module, a DSRC (Dedicated Short Range Communications) vehicle-vehicle communication module and a neighborhood vehicle (NV) anti-collision early warning system, wherein the SV information module consists of an information acquiring and processing module and a module including the ID (Identity) and the size fixed information of a vehicle; the information acquiring and processing module is used for exchanging data with the anti-collision early warning device module through the self-learning functional module and the vehicle collision judging module; the module including the ID (Identity) and size fixed information of the vehicle is used for exchanging data with the anti-collision early warning device module through the information memory module and the vehicle anti-collision judging module; and the information memory module is in DSRC wireless communication with the NV anti-collision early warning system of a surrounding vehicle through the DSRC vehicle-vehicle communication module. By adopting the vehicle anti-collision early warning system, the vehicle running state can be forecast, and the effectiveness and suitability of the anti-collision early warning system are enhanced.