Abstract: Systems and methods of testing integrated circuits are disclosed. The systems include a test module configured to operate between automated testing equipment and an integrated circuit to be tested. The testing interface is configured to test the integrated circuit at a higher slew rate than the slew rate at which signals are received from the automated testing equipment. In order to do so, the testing interface includes components configured for generating addresses, commands, and test data to be conveyed to the integrated circuit. A variety of test data patterns can be produced and the test data can be address dependent. The systems are optionally configured to include a test plan memory component configured to store one or more test plans. A test plan may include a sequence of test patterns and/or conditional branches whereby the tests to be performed next are dependent on the results of the preceding tests. The test plan memory is, optionally, be detachable from the test module.
Abstract: A system for handling performance counters and events includes an operating system that receives a request of a first application for performance data associated with a type of event to be performed by a second application, causes a hardware counter pertaining to the event type to be activated, and provides a file descriptor corresponding to the hardware counter to the first application. The operating system then receives a second request of the first application for a value of the hardware counter, where the second request includes the file descriptor, and provides the value of the hardware counter to the first application.
Abstract: A set of 2D reconstructed images is generated from a pretreatment 3D scan showing an initial position of a target, wherein the set of 2D reconstructed images corresponds to perturbations from said initial position along fewer than six degrees of freedom. Said set of 2D reconstructed images are registered with one or more 2D x-ray images of said target showing a current position of the target, wherein the registering includes computing a set of 3D transformation parameters that represent a change in position of said target between said initial position of said pretreatment 3D scan and said current position of said 2D x-ray images along six degrees of freedom. A positioning system is instructed to adjust a relative position of a radiosurgical beam generator to said target by an amount prescribed by said 3D transformation parameters, wherein said target is allowed six degrees of freedom of position.
Abstract: A method for the separation of particles of different densities using a step-wise gradient density extraction method as described herein where a sample is suspended in a liquid volume of an extracting medium of specific density and the particles that have a density less than or equal to that of the extracting medium of specific density can be recovered from a horizonatally rotatable hollow disk or a removable receptacle within a horizontally rotatable hollow disk designed for such purposes while the particles that have a density greater than the extracting medium of specific density form a deposit which can be cycled through the extraction process in an iterative fashion by varying the density of the extracting medium allowing the recovery of discrete particles of differing densities from a test sample.
Abstract: Dictionary-based sequential compression is performed in parallel on input data using multiple cores of a computer system. The compression can be performed by first determining a dictionary size for data compression, followed by determining a block size for partitioning the input data. The block size is greater than the dictionary size. The multiple cores of the computer system then execute multiple threads in parallel, with each thread compressing one block of the input data according to a dictionary-based sequential compression scheme.
Abstract: Techniques for automatically providing a client with access to a virtual machine associated with the client are described herein. According to one embodiment, a message is received by a controller from a client over a network indicating that the client is starting up. In response, the controller causes a connection to be automatically established between the client and a virtual machine (VM) associated with the client once the client has started up. The associated VM may be one of a predetermined VM, a member of a group of VMs that are associated with the client, and a VM selected from a pool of VMs. As a result, a user of the client can instantly access contents provided by the associated VM without having to manually log onto a Web portal in order to select the associated VM to be launched. Other methods and apparatuses are also described.
Abstract: A method and apparatus for updating bookmarks is described. In one embodiment, a server has a bookmark database and a bookmark synchronizer. The bookmark synchronizer is configured to manage a remote bookmark list including sublists each associated with a corresponding one of multiple browsers. The bookmark synchronizer receives a client request, from one of the browsers, to synchronize a local bookmark list with the remote bookmark list, and collects the local bookmark list from the one web browser. The bookmark synchronizer compares the local bookmark list with the remote bookmark list, the bookmark synchronizer adds or deletes bookmarks from the local bookmark list or the associated sublist.
Abstract: A method and apparatus for configuring a remotely available service. In one embodiment, the method includes downloading configuration data for the remotely available service while running a current instance of the service, and invoking a new instance of the service without causing a current instance of the service to terminate. The method may further include causing the current instance of the service to continue performing designated operations until the new instance completes initialization using the configuration data and is able to perform the designated operations.
Abstract: Embodiments pertain generally to a method of providing a remote monitoring subscription service. The method includes receiving client activity data from at least one of a client virtual machine and a physical machine supporting the client virtual machine at a site of a customer and comparing the client activity data against a set of performance guidelines. The method also includes determining a recommended action in response to the client activity data not falling within the set of performance guidelines and forwarding the recommended action to the customer.
Abstract: A computing device executing a file system maintains a search tree that includes extents for managing first regions of unallocated storage space and bitmaps for managing second regions of unallocated storage space. For each region of unallocated storage space, the file system determines whether to manage that region using an extent or a bitmap based on one or more space management criteria.
Abstract: A method and system for using Unix commands with web services are described. The method includes reading at least one delimiter-separated string on a standard input, and preparing a request to a web service from the at least one delimiter-separated string, where the web service is specified by a command-line argument. The method further includes transmitting the request to the web service, and providing, to a standard output, a response of the web service to the request.
Abstract: The present invention provides a unified provisioning environment, which comprehensively manages the tasks related to software provisioning. In particular, the present invention manages software provisioning using a hierarchy of commands. The lowest level in the hierarchy comprises distribution commands, which primarily handle base operating system specific tasks of provisioning. The second level comprises profile commands, which associate a configuration file, such as a Linux kickstart file, with a distribution and optionally allow for customization. The third level comprises system commands, which associate remote systems that are involved with the provisioning of the software. The fourth level comprises repository commands, which address configurations and tasks related to updating the software, remote installation procedures, and optionally customizing the software.
Abstract: To manage and communicate with virtual machines in an external cloud regardless of the cloud management scheme of clouds, the cloud management system can utilize an abstraction library. The abstraction library can be configured to abstract out the differences between different cloud management schemes utilized by the cloud management systems and an independent cloud management system of the external cloud.
Abstract: Some embodiments of efficient binary protocol marshalling for rule engine sessions have been presented. In one embodiment, a set of marshalling plug-ins is provided to a rule engine. Each of the set of marshalling plug-ins is customized for a type of user objects. In response to encountering a user object, the rule engine selects a marshalling plug-in out of the set of marshalling plug-ins based on a type of the user object to marshall in or to marshall out the user object.
Abstract: An apparatus and a method operating on data at a server node of a data grid system with distributed cache is described. A coordinator receives a request to change a topology of a cache cluster from a first group of cache nodes to a second group of cache nodes. The request includes a cache node joining or leaving the first group. A key for the second group is rehashed without blocking access to the first group while rehashing.
Abstract: An upgrade controller that compares the contents of a reference database with an upgraded database is described. In one embodiment, the upgrade controller connects to the reference and upgraded database and retrieves the list of tables. For each of the tables, the upgrade controller compares the content of the reference and the upgraded table. The upgrade controller compares the table contents by comparing the contents on a record-by-record basis. In addition, the upgrade controller can use a whitelist of tables and columns to reduce the number of false positive(s) that could be generated during the comparison.
Abstract: A security initialization system receives a first initialization request from a first requester to access a first database storing security data and stores context data for the first initialization request that identifies an initialization operation associated with the first database. The security initialization system receives a second initialization request from a second requester to access a second database storing security data and updates the context data to identify an initialization operation associated with the second database. The security initialization system receives a shut down request from one of the requesters, where the shut down request includes data for identifying a corresponding initialization operation in the context data. The security initialization system updates the context data to show that the corresponding initialization operation has a shut down request and determines whether a security module is to be shut down using the context data.
Abstract: Computer resource management techniques involving receiving notification of an available resource, generating a set of tasks that could be performed by the resource, and dispatching one of the tasks on the resource. Related systems and software are also discussed. Some techniques can be used for automatic software building and testing.
Abstract: An apparatus and method for determining optimized path traversal in a radiation delivery system is described. In one embodiment, determining an optimized path traversal in a radiation delivery system involves providing a plurality of spatial nodes used in a treatment plan, where each of the plurality of spatial nodes represents a position of a radiation source made available to the treatment plan for delivering radiation to a target, identifying a number of unused spatial nodes, from among the plurality of spatial nodes, at which radiation is not delivered according to the treatment plan, and skipping travel to one or more of the unused nodes by the radiation source when administering the treatment plan. Other embodiments are also described.
Type:
Grant
Filed:
March 30, 2007
Date of Patent:
September 11, 2012
Assignee:
Accuray Incorporated
Inventors:
Sohail Sayeh, Gopinath Kuduvalli, Daniel Brown
Abstract: Techniques for improving cache accesses in an object-relational mapping space are described herein. In one embodiment, in response to a first cache request received at a first cache API associated with a transaction for updating a data entry of the relational database, the updated data of the data entry is stored in a local cache, where the local cache is one of members of a cache cluster, and an invalidation message is sent to remaining members of the cache cluster to invalidate corresponding cache entries of the remaining members. In response to a second cache request received at a second cache API associated with a transaction for loading data from a data entry of the relational database, the loaded data is stored in the local cache without sending an invalidation message to the remaining members of the cache cluster. Other methods and apparatuses are also described.