Topic
State (computer science)
About: State (computer science) is a research topic. Over the lifetime, 24436 publications have been published within this topic receiving 225733 citations.
Papers published on a yearly basis
Papers
More filters
•
23 Sep 2011
TL;DR: In this article, the authors present a method for managing an energy consuming load in a group of energy consuming loads and a method to manage the group of power consuming loads by generating sets of load state data from the loads, making enablement state decisions for one or more loads, and implementing the enablement states decisions.
Abstract: A method for managing an energy consuming load in a group of energy consuming loads and a method for managing the group of energy consuming loads. The method includes generating sets of load state data from the loads, making enablement state decisions for one or more loads using the sets of load state data, and implementing the enablement state decisions. Each of the enablement state decisions reflects an enablement state of a load, wherein the enablement state is either a load enabled state where the load is capable of operating even when the load is not actually operating or a load disabled state where the load is not capable of operating. A computer readable medium may include computer readable instructions for directing a processor to perform the methods and make the enablement state decision. Further, an apparatus comprised of a processor may be programmed to perform the methods.
213 citations
•
18 May 2011TL;DR: In this article, a method for determining if a user's gaze is directed towards a target associated with a computer program is presented. But the method is limited to a single target.
Abstract: Methods, computer programs, and systems for interfacing a user with a computer program, utilizing gaze detection and voice recognition, are provided. One method includes an operation for determining if a gaze of a user is directed towards a target associated with the computer program. The computer program is set to operate in a first state when the gaze is determined to be on the target, and set to operate in a second state when the gaze is determined to be away from the target. When operating in the first state, the computer program processes voice commands from the user, and, when operating in the second state, the computer program omits processing of voice commands.
212 citations
••
TL;DR: In this article, a deterministic secure direct communication protocol using single qubit in mixed state was proposed, the security of this protocol is based on the security proof of BB84 protocol.
Abstract: We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.
211 citations
•
27 Sep 2004TL;DR: In this article, the authors present a system and method of tracing the spread of computer malware in a communication network, where suspicious data characteristic of malware is identified in a computing device connected to the communication network.
Abstract: The present invention provides a system and method of tracing the spread of computer malware in a communication network One aspect of the present invention is a method that traces the spread of computer malware in a communication network When suspicious data characteristic of malware is identified in a computing device connected to the communication network, the method causes data that describes the state of the computing device to be stored in a database After a specific attack against the communication network is confirmed, computing devices that are infected with the malware are identified Then, the spread of the malware between computing devices in the communication network is traced back to a source
210 citations
•
28 Sep 2001
TL;DR: In this paper, implementation-specific instructions save a processor state in a system memory and attempt to correct the error. Control is then transferred to processor-independent instructions, which then return to an interrupted context of the processor by restoring the processor state.
Abstract: Processor implementation-specific instructions save a processor state in a system memory and attempt to correct the error. Control is then transferred to processor-independent instructions. Control is returned to the processor implementation-specific instructions which then return to an interrupted context of the processor by restoring the processor state.
210 citations