RussianPatents.com
|
Delayed application launching. RU patent 2419840. |
|
FIELD: information technology. SUBSTANCE: delay in launching certain applications can enhance overall system performance. Applications which must be delayed may be placed in a container object or packaging to that they can be monitored and so that other applications, which depend on the delayed applications, can be processed appropriately. EFFECT: improve system performance. 20 cl, 3 dwg
|
Software update system and method for portable ota supporting mobile terminal / 2419839 Software update device has a first memory device for storing the control version of the software and at least one update package; a second memory device for loading software update versions; a communication module for enabling the mobile terminal to communicate with an external system; and a control module for controlling the communication module so as to load the package of updates in response to a notification message on updates from the external system, installing the package of updates in the first memory device, creating a software update version by merging the package of updates and the control version in response to the installation instruction and operation of the mobile terminal under control of the updated software version. |
Extensible xml-format and object model for localisation data / 2419838 Computer-readable components comprise data elements defined by a software data schema; a repository data element for storing a plurality of data properties about the data elements; and an owned comment data element comprising information about the localisation of the data included in software programs and an owner with permission to create, access, and manipulate the owned comment data element. |
Work streams aimed at data / 2419837 Method comprises the following steps: receiving from a user a set of predefined action with work stream data for simulating messaging between the executed copy of the work stream and a host application of the work stream, where the said selection does not specify the message protocol; specifying the data source. The chosen action is associated with the specified data source. The action associated with data is referred to as one of several actions in the host application of the work stream in order to implement messaging between the copy of the work stream and the host application of the work stream. The action associated with data does not specify the message protocol. The system implements the said method. A machine-readable data medium contains a program code for executing the said method in a computer system. |
Safe universal software for configuring grouped apparatus / 2415468 Method of configuring plasma treatment grouped apparatus involves generation of a key file, wherein the key file encapsulates restrictions specifically imposed on the plasma treatment grouped apparatus. The method also involves generation of at least one system-wide configuration file and at least one component configuration file using the key file. The method further involves generation of on-line executable objects from the data base of option specification files of at least one system-wide configuration file and at least one component configuration file. Further, the method involves use of on-line executable objects to configure the plasma treatment grouped apparatus. |
Method for automatic paralleling of programs / 2411569 In method for automatic paralleling of cycle areas in algorithmic part of program, previously graph of control flow, dominator trees, cycle trees, graph of data flow are produced; intermediate representations of procedures are substituted into areas of calls; procedure-by-procedure analysis of data flow is carried out; to detect equivalent operations, analysis of data flow is carried out, preferably by method of values numbering. Analysis of cycle variables is carried out for invariance and inductance; analysis of operations of access to massifs is made, indices of access to massifs are built in the form of canonical forms of product sums. Cycles are merged; invariant conditions are taken out; procedure of iteration cycle space bypass is changed; analysis of parallel cycles is carried out. |
Method and system for configuration of user interface / 2408923 Devices and methods of user interfaces transfer into mobile device are proposed for digital system of broadcasting data transfer. User interfaces may be reflected on a tool panel of mobile device and may contain updated information. When information related to content of user interfaces changes, condition of information on user interfaces may change accordingly. Information or interface are configured on the basis of request for user interface, corresponding to the event, besides, user interface contains information associated to this event, and sent to mobile device of user. |
Systems and methods for providing distributed user interfaces for configuring client devices / 2405191 Client device having at least one user configurable setting is detected by a user interface device. The user interface device and the client device, having at least one user configurable setting, are in electronic communication with each other. Setting signals identifying user configurable settings of the client device are received at the user interface device which, based on said signals, forms the user interface. In response to reception of user input, a control signal is transmitted to the client device to alter at least one user configurable setting of the client device. |
Priority binding / 2405190 System comprises a computer which stores multiple binding declarations used to determine content to be displayed in a user interface during execution of user interface software by the computer, a binding mechanism which establishes the priority order in which multiple binding declarations are subject to execution by the computer so as to bind a target with a source, the binding mechanism evaluates multiple binding declarations to determine content to be displayed in the user interface during execution of user interface software by the computer, wherein execution of binding declarations based on the priority order starts up user interface generation. |
Method of booting host device from mmc/sd device, host device bootable from mmc/sd device and mmc/sd device from which host device may be booted / 2402804 One version of the booting a host device from a peripheral device through an MMC/SD interface, with power terminals, a data bus with data bus terminals, a clock line with a clock terminal and a command line with a command terminal involves: transmitting power to the power terminals, and setting to low the command terminal of the said MMC/SD interface during power-up and monitoring the data bus for a start bit of data transmission. |
Upgradable preliminary visualiser of object in browser-shell / 2400801 Browser-shell provides for mechanism of expansion so that detached developers could upgrade functional capabilities of previewing facility specified as default for certain types of files. Graphic user interface includes control facility, which makes it possible for the user to select previewing facility for displayed files from multiple available previewing facilities. Alternatively, browser-shell may automatically select previewing facility from multiple available previewing facility. |
Methods and apparatus for emulating branch prediction behaviour of explicit subroutine call / 2417407 Apparatus has a first input which is configured to receive an instruction address, and a second input which is configured to receive predecoded information which describes the instruction address as being related to an implicit subroutine call in a subroutine. In response to the predecoded information, the apparatus also includes an adder configured to add a constant to the instruction address defining a return address, causing the return address to be stored to an explicit subroutine resource, thus, facilitating subsequent branch prediction of a return call instruction. |
Pre-decoding variable length instructions / 2412464 Method involves the following: identification of a property of a first instruction, where the property differs from other properties encoded in a first set of pre-decoding bits, for which all available encodings are defined or reserved; coding the first instruction in a second format, whose length differs from that of the first format, including part of the first instruction and the first set of pre-decoding bits, where the second format contains part of the second instruction and a second set of pre-decoding bits, encoding the second set of pre-decoding bits using one of the available encodings. |
Expansion of stacked register file using shadow registers / 2405189 Method of managing shadow register file system involves the following steps: allocating one or more multi-port registers from a physical register file to a first procedure, corresponding to part of the logic stack of registers, storing data associated with the first procedure in the allocated multi-port registers; selectively saving data associated with the first procedure from one or more multi-port registers to one or more registers of the first file of shadow registers of the shadow register file system, wherein one or more registers has independent data reading/recording ports, and freeing up corresponding allocated multi-port registers for allocating the second procedure; storing data associated with the first procedure from the first shadow register file to the second shadow register file; storing at least part of data associated with the first procedure from a specific register of the second shadow register file in backing memory, and then extraction of said part of data associated with the first procedure from the backing memory to a specific register of the second shadow register file; extracting data from the second shadow register file into one or more registers of the first shadow register file; and before continuing to execute the first procedure, retrieving data associated with the first procedure from one or more registers into one or more multi-port registers, and reallocating the first procedure one or more multi-port registers. |
Methods and device for ensuring correct pre-decoding / 2405188 Method involves defining a granule which is equal to the smallest length instruction in the instruction set and defining the number of granules making up the longest length instruction in the instruction denoted MAX. The method also involves determining the end of an embedded data segment, when a program is compiled or assembled into the instruction string and inserting a padding of length MAX-1 into the instruction string to the end of the embedded data. Upon pre-decoding of the padded instruction string, a pre-decoder maintains synchronisation with the instructions in the padded instruction string even if embedded data are randomly encoded to resemble an existing instruction in the variable length instruction set. |
Error handling for early decoding through branch correction / 2367004 Invention relates to processors with pipeline architecture. The method of correcting an incorrectly early decoded instruction comprises stages on which: the early decoding error is detected and a procedure is called for correcting branching with a destination address for the incorrectly early decoded instruction in response to detection of the said error. The early decoded instruction is evaluated as an instruction, which corresponds to incorrectly predicted branching. |
Hybrid microprocessor / 2359315 Present invention relates to computer engineering and can be used in signal processing systems. The device contains an instruction buffer, memory control unit, second level cache memory, integral arithmetic-logic unit (ALU), floating point arithmetic unit and a system controller. |
Processing of message digest generation commands / 2344467 Command of message digest generation is selected from memory, in response to selection of message digest generation command from memory on the basis of previously specified code of function, operation of message digest generation, which is subject to execution, is determined, at that previously specified code of function defines operation of message digest calculation or operation of function request, if determined operation of message digest generation subject to execution is operation of message digest calculation, in respect to operand, operation of message digest calculation is executed, which contains algorithm of hash coding, if determined operation of message digest generation subject to execution is operation of function request, bits of condition word are stored in block of parameters that correspond to one or several codes of function installed in processor. |
Digital signal processors with configurable binary multiplier-accumulation unit and binary arithmetic-logical unit / 2342694 Present invention pertains to digital signal processors with configurable multiplier-accumulation units and arithmetic-logical units. The device has a first multiplier-accumulation unit for receiving and multiplying the first and second operands, storage of the obtained result in the first intermediate register, adding it to the third operand, a second multiplier-accumulation unit, for receiving and multiplying the fourth and fifth operands, storage of the obtained result in the second intermediate register, adding the sixth operand or with the stored second intermediate result, or with the sum of the stored first and second intermediate results. Multiplier-accumulation units react on the processor instructions for dynamic reconfiguration between the first configuration, in which the first and second multiplier-accumulation units operate independently, and the second configuration, in which the first and second multiplier-accumulation units are connected and operate together. |
Processing of message authentication control commands providing for data security / 2327204 Invention pertains to the means of providing for computer architecture. Description is given of the method, system and the computer program for computing the data authentication code. The data are stored in the memory of the computing medium. The memory unit required for computing the authentication code is given through commands. During the computing operation the processor defines one of the encoding methods, which is subject to implementation during computation of the authentication code. |
Method and device for shuffling data / 2316808 In accordance to shuffling instruction, first operand is received, which contains a set of L data elements, and second operand, which contains a set of L shuffling masks, where each shuffling mask includes a "reset to zero" field and selection field, for each shuffling mask, if the "reset to zero" field of shuffling mask is not set, then data indicated by shuffling mask selection field are moved, from data element of first operand, into associated data element of result, and if "reset to zero" field of shuffling mask is set, then zero is placed in associated data element of result. |
Execution unit / 2406111 Invention can be used in information processing, control and measurement devices, particularly in devices for receiving unipolar start/stop sequences of pulse combinations for controlling deviation of pulse duration from a given value, controlling position of pulses in a combination and comparing with reference values. The device has an event controller, in initial setting circuit, a quartz crystal oscillator circuit, a serial interface, a receiver matching circuit, a transmitter matching circuit, a mode control circuit, a memory device, a control circuit, a power control circuit and a coincidence circuit. |
© 2013-2014 Russian business network RussianPatents.com - Special Russian commercial information project for world wide. Foreign filing in English. |