At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Efficient user space driver isolation by CPU page table switching
Systems and methods for providing technology that enhances memory protection between different portions of the user space memory of a particular computing...
Systems and methods for implementing coherent memory in a multiprocessor
Data units are stored in private caches in nodes of a multiprocessor system, each node containing at feast one processor (CPU), at least one cache private to...
Adaptive scheduling for task assignment among heterogeneous processor
Generally, this disclosure provides systems, devices, methods and computer readable media for adaptive scheduling of task assignment among heterogeneous...
Application processor performing a dynamic voltage and frequency scaling
operation, computing system including...
A method of operating an application processor including a central processing unit (CPU) with at least one core and a memory interface includes measuring,...
Reconfigurble CPU/GPU interconnect to mitigate power/thermal throttling
A method, a system and a computer program product for reconfiguring hardware network topology including graphics processor units (GPU) and central processing...
Input-output based virtual CPU halt
A hypervisor configures a plurality of halt registers, wherein each halt register of the plurality of halt registers is associated with a corresponding latency...
Information processor, audio device, and program
A desired range of an audio file is repeatedly reproduced without a need to store sound data of a predetermined period in a memory in advance and without...
Data processing unit for stream processing
A new processing architecture is described that utilizes a data processing unit (DPU). Unlike conventional compute models that are centered around a central...
Secure processor for multi-tenant cloud workloads
A CPU package includes an encryption and decryption module disposed in a communication path between an instruction path of a processor core and a data register...
Efficient early ordering mechanism
Data units are stored in private caches in nodes of a multiprocessor system, each node containing at least one processor (CPU), at least one cache private to...
Function callback mechanism between a Central Processing Unit (CPU) and an
Generally, this disclosure provides systems, devices, methods and computer readable media for implementing function callback requests between a first processor...
Data processing apparatus and access control method
According to one embodiment, a data processing apparatus includes an access controller configured to control access by a CPU to a processor. The access...
Automatically optimizing resource usage on a target database management
system to increase workload performance
Loading a set of data into a target database management system (DBMS) from a source DBMS to increase workload performance and decrease resource usage is...
Virtual processor allocation with execution guarantee
The disclosure provides techniques for scheduling a jitterless workload on a virtual machine (VM) executing on a host comprising one or more pCPUs comprising a...
Detected object tracker for a video analytics system
Techniques are disclosed which provide a detected object tracker for a video analytics system. As disclosed, the detected object tracker provides a robust...
Securely supporting a global view of system memory in a multi-processor
Techniques for securely supporting a global view of system memory in a physical/virtual computer system comprising a plurality of physical/virtual CPUs are...
CPU security mechanisms employing thread-specific protection domains
A computer processor includes an instruction processing pipeline that interfaces to a hierarchical memory system employing an address space. The instruction...
Leveraging directed acyclic graph (DAG) information to group tasks for
Embodiments for leveraging directed acyclic graph (DAG) information to group tasks for execution, by at least one processor. An Input/Output (I/O) cost for each...
Cryptographic shader in display hardware
A technique is introduced that can securely displaying decrypted images while preventing these decrypted images against an attempt to capture such. Some aspects...
Resource allocation based on transaction processor classification
A data transaction processing system including multiple transaction processors also includes a resource allocation system that characterizes the transaction...
HyperConverged NVMF storage-NIC card
A storage and communication apparatus for plugging into a server, includes a circuit board, a bus interface, a Medium Access Control (MAC) processor, one or...
Input and output recording device and method, CPU and data read and write
operation method thereof
The disclosure provides an input and output recording device and method, CPU and data read and write operation method thereof. The input and output recording...
Execution of an instruction for performing a configuration virtual
In a logically partitioned host computer system comprising host processors (host CPUs) partitioned into a plurality of guest processors (guest CPUs) of a guest...
Hybrid power management approach
Methods and apparatus to provide a hybrid power management approach are described. Some embodiments redefine the interface to Power Control Unit (PCU) allowing...
Multipoint video conference device and controlling method thereof
According to the present invention, by receiving, by a transceiver, videos from each of a plurality of clients, decoding, by a first processor, the plurality of...
Programmable IMON accuracy in power systems
To compensate for inaccuracies in reported values for current output from a voltage regulator (VR) to a processor, the VR may be tested, and a load line...
CPU obfuscation for cloud applications
A cloud deployment system is used for obfuscating CPU operation codes in a set of machines operating in a distributed computing environment. A reprogrammable...
System-on-chip, mobile terminal, and method for operating the
A system-on-chip (SoC) to perform a deadlock control on a processor of the SoC, the SoC including the processor including a plurality of central processing unit...
Wait optimizer for recording an order of first entry into a wait mode by a
virtual central processing unit
A wait optimizer circuit can be coupled to a processor to monitor an entry of a virtual CPU (vCPU) into a wait mode to acquire a ticket lock. The wait optimizer...
System and method for swarm collaborative intelligence using dynamically
configurable proactive autonomous agents
A parallel processing architecture includes a CPU, a task pool populated by the CPU, and a plurality of autonomous co-processing cells each having an agent...
Safety hypervisor function
The disclosure relates to systems and methods for defining a processor safety privilege level for controlling a distributed memory access protection system....
Systems and methods for providing power-efficient file system operation to
a non-volatile block memory
Systems, methods, and computer programs are disclosed for providing power-efficient file system operation to a non-volatile block memory. An exemplary...
Workload prediction based CPU frequency scaling
A method comprises predicting, based on corresponding historical workload data, a change in virtual network function demand during a future workload period,...
Extract CPU time facility
An efficient facility for determining resource usage, such as a processor time used by tasks. The determination is performed on behalf of user applications that...
Configuring transmission resources during storage area network migration
One or more processors determine a throughput of hardware devices operatively coupled to a target Storage Area Network (SAN) prior to a SAN migration from a...
Maintaining keys for trusted boot code
Methods and apparatus are disclosed for securing executable code for execution with a processor using a trusted platform module (TPM). In one example of the...
Method for controlling power supply in semiconductor device
A method for controlling power supply in a semiconductor device including a CPU and a PLD which can hold data even in an off state is provided. The ...
Cluster graphical processing unit (GPU) resource sharing efficiency by
directed acyclic graph (DAG) generation
Embodiments for graphical processing unit (GPU) resource sharing in a computing cluster, by a processor device. Resource-specific stages are dynamically...
Runtime GPU/CPU selection
A method, computer program product, and system includes a processor(s) obtaining, during runtime, from a compiler, two versions of a data parallel loop for an...
Thread ownership of keys for hardware-accelerated cryptography
An embedded processor with a cryptographic co-processor operating in a multithreading environment, with inter-thread security for cryptography operations. A...
Resource management for services
A service control manager manages one or more services on a computing device, such as creating processes that host the services, stopping the processes that...
Migration of trusted security attributes to a security engine co-processor
A system-on-chip (SoC) includes a host CPU on a CPU fabric, the host CPU including multiple processor cores, each associated with multiple security attributes....
Method and system for a CPU-local storage mechanism
Described herein are systems and methods for implementing a processor-local (e.g., a CPU-local) storage mechanism. An exemplary system includes a plurality of...
Electronic device that uses hardware corresponding to priority level of
An electronic device includes a CPU that executes the process execution program to function as a plurality of process execution units as threads and an...
Dynamic core allocation for consistent performance in a non-preemptive
Methods and systems are presented for allocating resources based on dynamic core allocation in a scheduler hierarchy of a storage system. One method includes...
Systems, methods and apparatuses for secure storage of data using a
A computer processor and a security enhancing chip may be provided. In one aspect, the computer processor may comprise a storage for storing an encryption key,...
System and method for discriminating between origins of vibrations in an
object and determination of contact...
A system and method for accurately detecting contact between two objects in a medium comprises at least one sensor for detecting vibration of a first of the two...
Resource aware video processor
Approaches for dynamically allocating CPU cycle resources to a video encoder. A resource allocator assesses an amount of available CPU cycle resources on the...
Balancing CPU utilization in a massively parallel processing heterogeneous
A system (and associated method) includes a processor which determines a performance metric ratio of a performance metric of a second type of server relative to...
Method for controlling a processor of an electronic enclosure mounted on a
wheel of a motor vehicle
In a method for controlling a processor on a wheel, wheel operation parameters are calculated and transmitted to a CPU. A first default operating mode (standby...