Patent application number | Description | Published |
20130007492 | TIMER INTERRUPT LATENCY - An indication that a subsystem is about to enter an idle state is received, and an original fire time for a next timer interrupt is determined. An idle state for a subsystem is selected based on the original fire time; and a new fire time for the next timer interrupt is determined based on the selected idle state to reduce timer interrupt latency. A current latency in exiting an idle state is measured. The measured latency is added to a running average of latencies for the idle state. A latency value is determined based on the running average and a worst case latency to adjust an original fire time for a next timer interrupt. | 01-03-2013 |
20130111092 | SYSTEM AND METHOD FOR ADJUSTING POWER USAGE TO REDUCE INTERRUPT LATENCY | 05-02-2013 |
20130132699 | METHOD FOR TRACKING MEMORY USAGES OF A DATA PROCESSING SYSTEM - Techniques for tracking memory usages of a data processing system are described herein. According to one embodiment, a memory manager is to perform a first lookup operation in a memory allocation table to identify an allocation entry based on a handle representing a memory address of a memory block allocated to a client and to retrieve a trace entry pointer from the allocation entry. The memory manager is then to perform a second lookup operation in a memory trace table to identify a trace entry based on the trace entry pointer and to increment a memory allocation count of the trace entry. The memory allocation count is utilized to indicate a likelihood of the client causing a memory leak. | 05-23-2013 |
20130325543 | LEDGER-BASED RESOURCE TRACKING - Disclosed are systems, methods, and non-transitory computer-readable storage media for tracking and managing resource usage through a ledger feature that can trigger complex real-time reactions. The resource tracking can be managed through a ledger module and a ledger data structure. The ledger data structure can be updated each time a task requests a resource. Additionally, as part of the update, the ledger module can verify whether a resource has been over consumed. In response to the detection of an over consumption, the ledger module can set a flag. At some later pointer when the thread is in a stable, well-understood point, the ledger module can check if the flag has been set. If the flag has been set, the ledger module can call the appropriate callback function, which can react to the over consumption in a resource specific manner. | 12-05-2013 |
20130332936 | Resource Management with Dynamic Resource Budgeting - A method for resource management of a data processing system is described. According to one embodiment, a request is received via a programming interface from a program to modify a resource budget assigned to the program, where the resource budget specifies an amount of resources of the data processing system the program can utilize during an execution of the program. It is determined whether the program is entitled to modify the resource budget based on entitlement associated with the program. The resource budget for the program is modified if it is determined the program is entitled to modify the resource budget and the modified resource budget is enforced against the program during the execution of the program. | 12-12-2013 |
20130339313 | GUARDED FILE DESCRIPTORS - Guarded file access operations are provided for creating and using guarded file descriptors, which can detect and prevent erroneous file access operations in computer programs. A file descriptor can be associated with a guard identifier to create a guarded file descriptor. The association can be established when the file is opened, and can be maintained independently of the computer program, which ordinarily maintains its own association between files, file descriptors, and guard identifiers. Subsequent file operations using the guarded file descriptor check that the guard identifier previously associated with that file descriptor is presented, and generate errors without performing the requested file operations if the correct guard identifier is not presented. This check serves as a validation of the computer program's use of file descriptors. An error and stack trace can be generated for use in analyzing a cause of the guard violation. | 12-19-2013 |
20140089627 | METHOD FOR TRACKING MEMORY USAGES OF A DATA PROCESSING SYSTEM - Techniques for tracking memory usages of a data processing system are described herein. According to one embodiment, a memory manager is to perform a first lookup operation in a memory allocation table to identify an allocation entry based on a handle representing a memory address of a memory block allocated to a client and to retrieve a trace entry pointer from the allocation entry. The memory manager is then to perform a second lookup operation in a memory trace table to identify a trace entry based on the trace entry pointer and to increment a memory allocation count of the trace entry. The memory allocation count is utilized to indicate a likelihood of the client causing a memory leak. | 03-27-2014 |
20150347204 | Dynamic Adjustment of Mobile Device Based on System Events - In some implementations, a mobile device can be configured to monitor environmental, system and user events associated with the mobile device and/or a peer device. The occurrence of one or more events can trigger adjustments to system settings. The mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or communicating with a peer device, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device and/or a peer device to ensure a high quality user experience. | 12-03-2015 |
20150347205 | Dynamic Adjustment of Mobile Device Based on Adaptive Prediction of System Events - In some implementations, a mobile device can be configured to monitor environmental, system and user events associated with the mobile device and/or a peer device. The occurrence of one or more events can trigger adjustments to system settings. The mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or communicating with a peer device, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device and/or a peer device to ensure a high quality user experience. | 12-03-2015 |
20150350885 | Dynamic Adjustment of Mobile Device Based on Thermal Conditions - In some implementations, a mobile device can be configured to monitor environmental, system and user events associated with the mobile device and/or a peer device. The occurrence of one or more events can trigger adjustments to system settings. The mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or communicating with a peer device, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device and/or a peer device to ensure a high quality user experience. | 12-03-2015 |
20150351033 | Dynamic Adjustment of Mobile Device Based on Voter Feedback - In some implementations, a mobile device can be configured to monitor environmental, system and user events associated with the mobile device and/or a peer device. The occurrence of one or more events can trigger adjustments to system settings. The mobile device can be configured to keep frequently invoked applications up to date based on a forecast of predicted invocations by the user. In some implementations, the mobile device can receive push notifications associated with applications that indicate that new content is available for the applications to download. The mobile device can launch the applications associated with the push notifications in the background and download the new content. In some implementations, before running an application or communicating with a peer device, the mobile device can be configured to check energy and data budgets and environmental conditions of the mobile device and/or a peer device to ensure a high quality user experience. | 12-03-2015 |
20150363233 | LEDGER-BASED RESOURCE TRACKING - Disclosed are systems, methods, and non-transitory computer-readable storage media for tracking and managing resource usage through a ledger feature that can trigger complex real-time reactions. The resource tracking can be managed through a ledger module and a ledger data structure. The ledger data structure can be updated each time a task requests a resource. Additionally, as part of the update, the ledger module can verify whether a resource has been over consumed. In response to the detection of an over consumption, the ledger module can set a flag. At some later pointer when the thread is in a stable, well-understood point, the ledger module can check if the flag has been set. If the flag has been set, the ledger module can call the appropriate callback function, which can react to the over consumption in a resource specific manner. | 12-17-2015 |
Patent application number | Description | Published |
20130332941 | Adaptive Process Importance - A method and apparatus of a device that changes the importance of a daemon process is described. In an exemplary embodiment, the device receives a message from a user process destined for daemon process, wherein the daemon process executes independently of the user process and the first daemon process communicates messages with other executing processes. The device further determines if the first message indicates that the importance of the first daemon process can be changed. If the first message indicates the importance of the first daemon process can be changed, the device changes the importance of the first daemon process. The device additionally forwards the first message to the first daemon process. | 12-12-2013 |
20150347330 | THERMAL MITIGATION USING SELECTIVE I/O THROTTLING - A method and apparatus of a device that manages a thermal profile of a device by selectively throttling input/output operations of the device is described. In an exemplary embodiment, the device monitors the thermal profile of the device, where the device executes a plurality of processes that utilize storage of the device. In addition, the plurality of processes include a high priority process and a low priority process. If the thermal profile of the device exceeds a thermal threshold, the device decreases a first bandwidth range for the low priority process and maintains a second bandwidth range for the high priority process. The device further processes a storage request of the low priority process using the first bandwidth range and processing a storage request of the high priority process using the second bandwidth range. | 12-03-2015 |
20150348226 | SELECTIVE GPU THROTTLING - A method and apparatus of a device that manages a thermal profile of a device by selectively throttling graphics processing unit operations of the device is described. In an exemplary embodiment, the device monitors the thermal profile of the device, where the device executes a plurality of processes that utilizes a graphics processing unit of the device. In addition, the plurality of processes include a high priority process and a low priority process. If the thermal profile of the device exceeds a thermal threshold, the device decreases a first GPU utilization for the low priority process and maintains a second GPU utilization for the high priority process. The device further executes the low priority process using the first GPU utilization with the GPU and executes the high priority process using the second GPU utilization with the GPU. | 12-03-2015 |
Patent application number | Description | Published |
20100161828 | METHODS AND SYSTEMS FOR TRANSFERRING DATA OVER ELECTRONIC NETWORKS - Methods and systems for managing the transfer of large data files across electronic data networks optimally in accordance with the desired results of the users. The present invention takes into consideration the user-defined transfer requirements, the data characteristics, and the characteristics of the entirety of the network, including both the access links and the backbone and processing and storage resources in the backbone. The present invention the enables users to more optimally transfer data within the limitations of the existing network capabilities, negating requirements to update local or remote network facilities. | 06-24-2010 |
20130084069 | DIGITAL LIGHT PATH LABELING SYSTEM WITH DUAL POLARIZATION QUATERNARY PHASE-SHIFT KEYING MODULATION - A method and system for encoding and determining labels in a Dual Polarization (DP) Quaternary Phase Shift Keying (QPSK) signal is provided. A label frame, signature sequence, and data payload are combined using a complementary constant-weight code encoding (CCWC) encoder, the output of which is deinterleaved and differentially precoded to generate a polarized tributary of a DP-QPSK signal. This encoding can be duplicated for a second tributary of the DP-QPSK signal. The label can be determined using one or more polarizers and corresponding low-speed photodetectors, each applied to a copy of the DP-QPSK signal. The strongest output of the photodetectors is then used to determine the label. Alternatively, the DP-QPSK signal can be viewed as having XI, XQ, PH, and PV tributaries. These tributaries can then be translated into XI, XQ, YI, and YQ tributaries are encoded into a standard DP-QPSK signal. | 04-04-2013 |
Patent application number | Description | Published |
20120014695 | Digital Light Path Labeling System with Dual Polarization Quaternary Phase-shift Keying Modulation - A method and system for encoding and determining labels in a Dual Polarization (DP) Quaternary Phase Shift Keying (QPSK) signal is provided. A label frame, signature sequence, and data payload are combined using a complementary constant-weight code encoding (CCWC) encoder, the output of which is deinterleaved and differentially precoded to generate a polarized tributary of a DP-QPSK signal. This encoding can be duplicated for a second tributary of the DP-QPSK signal. The label can be determined using one or more polarizers and corresponding low-speed photodetectors, each applied to a copy of the DP-QPSK signal. The strongest output of the photodetectors is then used to determine the label. Alternatively, the DP-QPSK signal can be viewed as having XI, XQ, PH, and PV tributaries. These tributaries can then be translated into XI, XQ, YI, and YQ tributaries are encoded into a standard DP-QPSK signal. | 01-19-2012 |
20120039525 | APPARATUS AND METHOD FOR PROVIDING THREE DIMENSIONAL MEDIA CONTENT - A system that incorporates teachings of the exemplary embodiments may include, for example, means for generating a disparity map based on a depth map, means for determining accuracy of pixels in the depth map where the determining means identifies the pixels as either accurate or inaccurate based on a confidence map and the disparity map, and means for providing an adjusted depth map where the providing means adjusts inaccurate pixels of the depth map using a cost function associated with the inaccurate pixels. Other embodiments are disclosed. | 02-16-2012 |
20130208094 | APPARATUS AND METHOD FOR PROVIDING THREE DIMENSIONAL MEDIA CONTENT - A system that incorporates teachings of the exemplary embodiments may include, for example, means for generating a disparity map based on a depth map, means for determining accuracy of pixels in the depth map where the determining means identifies the pixels as either accurate or inaccurate based on a confidence map and the disparity map, and means for providing an adjusted depth map where the providing means adjusts inaccurate pixels of the depth map using a cost function associated with the inaccurate pixels. Other embodiments are disclosed. | 08-15-2013 |
20150029906 | SYSTEM AND METHOD FOR REDUCING INTER-CELLSITE INTERFERENCE IN FULL-DUPLEX COMMUNICATIONS - Disclosed herein are systems, methods, and computer-readable storage devices for reducing inter-cellsite interference during full-duplex communication. A system receives a channel amplitude and a phase estimate between a first station and a second station, the first station and the second station creating inter-cellsite interference on a channel during full-duplex communications. The system calculates a level of the inter-cellsite interference between the first station and the second station based on the channel amplitude and the phase estimate and generates a cancellation signal based on the inter-cellsite interference. The system then communicates the cancellation signal to the first station for transmission with additional data during additional full-duplex communications. | 01-29-2015 |
20150138195 | APPARATUS AND METHOD FOR PROVIDING THREE DIMENSIONAL MEDIA CONTENT - A system that incorporates teachings of the exemplary embodiments may include, for example, means for generating a disparity map based on a depth map, means for determining accuracy of pixels in the depth map where the determining means identifies the pixels as either accurate or inaccurate based on a confidence map and the disparity map, and means for providing an adjusted depth map where the providing means adjusts inaccurate pixels of the depth map using a cost function associated with the inaccurate pixels. Other embodiments are disclosed. | 05-21-2015 |
20150181596 | METHOD, COMPUTER-READABLE STORAGE DEVICE, AND APPARATUS FOR ALLOCATING TIMESLOTS ON CHANNELS IN A WIRELESS NETWORK - A method, computer-readable storage device, and apparatus for allocating a plurality of timeslots of each channel of a plurality of channels in a wireless network are disclosed. For example, the method determines a location and a velocity for each user endpoint device of a plurality of user endpoint devices, estimates a future data rate for each user endpoint device at the location, estimates future timeslot allocations of each channel of the plurality of channels in the wireless network in accordance with the future data rate that is predicted for each user endpoint device, and allocates each timeslot of the plurality of timeslots of each channel of the plurality of channels in the wireless network to a user endpoint device of the plurality of user endpoint devices in accordance with the future timeslot allocations that are estimated for each channel. | 06-25-2015 |
20150381966 | APPARATUS AND METHOD FOR PROVIDING THREE DIMENSIONAL MEDIA CONTENT - A system that incorporates teachings of the exemplary embodiments may include, for example, means for generating a disparity map based on a depth map, means for determining accuracy of pixels in the depth map where the determining means identifies the pixels as either accurate or inaccurate based on a confidence map and the disparity map, and means for providing an adjusted depth map where the providing means adjusts inaccurate pixels of the depth map using a cost function associated with the inaccurate pixels. Other embodiments are disclosed. | 12-31-2015 |