scispace - formally typeset
Search or ask a question
Topic

State (computer science)

About: State (computer science) is a research topic. Over the lifetime, 24436 publications have been published within this topic receiving 225733 citations.


Papers
More filters
Patent
23 Sep 2011
TL;DR: In this article, the authors present a method for managing an energy consuming load in a group of energy consuming loads and a method to manage the group of power consuming loads by generating sets of load state data from the loads, making enablement state decisions for one or more loads, and implementing the enablement states decisions.
Abstract: A method for managing an energy consuming load in a group of energy consuming loads and a method for managing the group of energy consuming loads. The method includes generating sets of load state data from the loads, making enablement state decisions for one or more loads using the sets of load state data, and implementing the enablement state decisions. Each of the enablement state decisions reflects an enablement state of a load, wherein the enablement state is either a load enabled state where the load is capable of operating even when the load is not actually operating or a load disabled state where the load is not capable of operating. A computer readable medium may include computer readable instructions for directing a processor to perform the methods and make the enablement state decision. Further, an apparatus comprised of a processor may be programmed to perform the methods.

213 citations

Patent
18 May 2011
TL;DR: In this article, a method for determining if a user's gaze is directed towards a target associated with a computer program is presented. But the method is limited to a single target.
Abstract: Methods, computer programs, and systems for interfacing a user with a computer program, utilizing gaze detection and voice recognition, are provided. One method includes an operation for determining if a gaze of a user is directed towards a target associated with the computer program. The computer program is set to operate in a first state when the gaze is determined to be on the target, and set to operate in a second state when the gaze is determined to be away from the target. When operating in the first state, the computer program processes voice commands from the user, and, when operating in the second state, the computer program omits processing of voice commands.

212 citations

Journal ArticleDOI
TL;DR: In this article, a deterministic secure direct communication protocol using single qubit in mixed state was proposed, the security of this protocol is based on the security proof of BB84 protocol.
Abstract: We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

211 citations

Patent
27 Sep 2004
TL;DR: In this article, the authors present a system and method of tracing the spread of computer malware in a communication network, where suspicious data characteristic of malware is identified in a computing device connected to the communication network.
Abstract: The present invention provides a system and method of tracing the spread of computer malware in a communication network One aspect of the present invention is a method that traces the spread of computer malware in a communication network When suspicious data characteristic of malware is identified in a computing device connected to the communication network, the method causes data that describes the state of the computing device to be stored in a database After a specific attack against the communication network is confirmed, computing devices that are infected with the malware are identified Then, the spread of the malware between computing devices in the communication network is traced back to a source

210 citations

Patent
28 Sep 2001
TL;DR: In this paper, implementation-specific instructions save a processor state in a system memory and attempt to correct the error. Control is then transferred to processor-independent instructions, which then return to an interrupted context of the processor by restoring the processor state.
Abstract: Processor implementation-specific instructions save a processor state in a system memory and attempt to correct the error. Control is then transferred to processor-independent instructions. Control is returned to the processor implementation-specific instructions which then return to an interrupted context of the processor by restoring the processor state.

210 citations


Network Information
Related Topics (5)
Formal specification
18.3K papers, 370.6K citations
76% related
Model checking
16.9K papers, 451.6K citations
74% related
Software development
73.8K papers, 1.4M citations
73% related
Software construction
36.2K papers, 743.8K citations
72% related
Concurrency
13K papers, 347.1K citations
72% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20251
202426
202314,059
202232,515
2021467
2020690