Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

101 results about "Truth table" patented technology

A truth table is a mathematical table used in logic—specifically in connection with Boolean algebra, boolean functions, and propositional calculus—which sets out the functional values of logical expressions on each of their functional arguments, that is, for each combination of values taken by their logical variables (Enderton, 2001). In particular, truth tables can be used to show whether a propositional expression is true for all legitimate input values, that is, logically valid.

Selectively enabling network packet concatenation based on metrics

A method, system, and apparatus are directed towards selectively concatenating data into a packet to modify a number of packets transmitted over a network based on a combination of network and / or send-queue metrics. In one embodiment, Nagle's algorithm is used for concatenating data into a packet. The concatenation may be selectively enabled based on heuristics applied to the combination of metrics. In one embodiment, the result may indicate that there should be a concatenation, or that data should be sent immediately, or that a current state for whether to concatenate or not should be maintained. The heuristics may include an expert system, decision tree, truth table, function, or the like. The heuristics may be provided by a user, or another computing device. In another embodiment, the concatenation may be enabled based on a conditional probability determined from the combination of metrics.
Owner:F5 NETWORKS INC

Database query optimization apparatus and method

A database query optimizer processes an expression in a database query, and generates therefrom an operand list and a corresponding truth table that may be represented by a list of binary characters, where the operand list and corresponding truth table represent a disjunct normal form for the expression. Each expression is stored once it is processed into its operand list and corresponding list of binary characters. New queries are processed into component expressions, and each expression is checked to see if the expression was previously processed and stored as a processed expression. If so, the operand list and list of binary characters for the previously-stored expression may be used in processing the current expression. If there is no previously-stored expression that corresponds to the current expression, the previously-stored expressions are checked to see if any correspond to a complement of the current expression. If so, a new expression is easily constructed for the current expression by retrieving the list of binary characters that correspond to the complement expression, and inverting the bits in the list of binary characters. If there is no previously-stored expression that corresponds to the current expression or its complement, an operand list and corresponding list of binary characters are generated for the current expression. Logical operations between predicates in a query may be performed by performing mathematical operations on the lists of binary characters corresponding to each predicate expression. The end result is an operand list and corresponding list of binary characters that represents the entire expression in a query.
Owner:INT BUSINESS MASCH CORP

Processor extensions and software verification to support type-safe language environments running with untrusted code

Processor extensions and software verification to support type-safe language environments running with untrusted code. Code and data spaces are partitioned into trusted and untrusted regions. Type-safe code is loaded into the trusted region of the code space, while non-type-safe code is loaded into the untrusted region of the code space. The trusted region of the data space is allocated to the type-safe code. The untrusted region of the data space is allocated to the non-type-safe code. Hardware-based truth tables are employed for defining allowable and disallowable code sequences and memory access operations. For code sequences, allowable operations are based on the location (i.e., region) of a code sequence including a current instruction and a prior instruction. For memory access, the location of the requesting instruction and data requested are considered. Disallowed code sequence or memory access operations cause the processor to generate a safe access protection trap. In response to the safe access protection trap, a software-based dynamic verifier applies a security policy to determine whether to allow the operation to proceed.
Owner:INTEL CORP

Functional verification of integrated circuit designs

A functional verification system suited for verifying the function of cycle based integrated circuits (IC) design. The IC design is divided into a plurality of combinatorial blocks connecting sequential elements. Truth tables corresponding the divided blocks are computed and stored in a memory. The output values of the IC design are determined by evaluating the blocks. The evaluation typically entails one memory access as the truth tables are pre-computed and stored in a memory storage. Accordingly the output values are computed quickly. The storage is implemented using random access memories and a XCON is designed to ensure the dependencies are preserved during the evaluations.
Owner:EVE

Database query optimization apparatus and method

A database query optimizer processes an expression in a database query, and generates therefrom an operand list and a corresponding truth table that may be represented by a list of binary characters, where the operand list and corresponding truth table represent a disjunct normal form for the expression. Each expression is stored once it is processed into its operand list and corresponding list of binary characters. New queries are processed into component expressions, and each expression is checked to see if the expression was previously processed and stored as a processed expression. If so, the operand list and list of binary characters for the previously-stored expression may be used in processing the current expression. If there is no previously-stored expression that corresponds to the current expression, the previously-stored expressions are checked to see if any correspond to a complement of the current expression. If so, a new expression is easily constructed for the current expression by retrieving the list of binary characters that correspond to the complement expression, and inverting the bits in the list of binary characters. If there is no previously-stored expression that corresponds to the current expression or its complement, an operand list and corresponding list of binary characters are generated for the current expression. Logical operations between predicates in a query may be performed by performing mathematical operations on the lists of binary characters corresponding to each predicate expression. The end result is an operand list and corresponding list of binary characters that represents the entire expression in a query.
Owner:IBM CORP

A method and apparatus for software fault location based on program invariants

ActiveCN109144882AImprove accuracyOvercome the problem of missing detection of logical expression defect locationSoftware testing/debuggingTruth valueSoftware fault
The invention discloses a software fault locating method and a device of program invariant. The method comprises the following steps that: the source code of the target software is inserted at the level of sentence, value and logical expression, and the source code after insertion is executed by a preset test case set to obtain the execution information; the source code of the target software is inserted at the level of sentence, value and logical expression; the preset failure test case set is clustered and the successful test case set is selected which is helpful to distinguish the defectivestatements for each clustering; the execution information of the preferred successful test case set is learnt, the program invariant set is obtained, including the set type, truth table type and floating point type range invariant; according to the execution information of the failed test case set and the program invariant set, the invariant violation is detected, and the suspicious statement setis obtained; dependency analysis is used to filter out invariant violation error caused by fault propagation, and invariant violation at each sentence is statistically analyzed to calculate sentencesuspicion. The invention improves the accuracy of software fault location, and overcomes the problem of missing detection of logical expression defect location.
Owner:HARBIN INST OF TECH

Logic test method and device suitable for reactor protection system

The invention relates to a logic test method and device suitable for a reactor protection system. The logic test method comprises a construction step, a call step, an operation step and a judgment step, wherein the construction step is as follows: constructing test programs and a truth table based on a comma separated values (CSV) format, wherein the truth table comprises the logic diagram index information of the reactor protection system, an input variable, an output variable, the voluation information of the input variable, the input variable of the output variable, and an execution time; the call step is as follows: reading the logic diagram index information, calling the test programs corresponding to the logic diagram index information; the operation step is as follows: reading the input variable and carrying out voluation on the input variable in accordance with the voluation information of the input variable, and carrying out logic operation in accordance with the called test program and the execution time so as to obtain the output value of the output variable; and the judgment step is as follows: judging whether the output value of the output variable is consistent with the expected value, if yes, outputting correct result information, and if no, outputting wrong result information. In the logic test method, the test is carried out by constructing the truth table based on the CSV format and the test program, thus being convenient for modification and regulation, and avoiding human errors.
Owner:中广核工程有限公司 +2

Design method for no-carry and non-dislocation n value arithmetic device

The invention relates to non carry borrow n value arithmetic device design method. It uses depreciation design method, divides the n value arithmetic Ph(N) truth table Lk(n) into a set of primitive table BLh(n) superposing type, respectively designs out arithmetic primitive Ah(n), uses superposing type to superpose each arithmetic primitive Ah(n) to form n value arithmetic device Ph(n). The invention has conventionalization and standardization design process, suits for fast or auto design, base device reconstruction and multiplexing. This method can be used in various non carry borrow n value arithmetic devices design.
Owner:SHANGHAI UNIV

Information flow tracking model generation method of a programmable logic device

The invention relates to a high-precision information flow tracking model generation method. The method includes inputting programmable logic device codes; identifying instantiated module names in thecodes; matching the module name with a module name in a netlist library corresponding to the programmable logic device, if the module name is consistent with the module name in a netlist library corresponding to the programmable logic device, determining that the code is a gate level, otherwise, determining that the code is an RTL level, processing display flow in the RTL level, traversing all inputs, calculating assignment statement output, and converting a result into a truth table; inputting an original truth table by using a gate-level information flow theory, and generating a truth tableof full-input / output information flow stain labels; and using the Carnot graph simplified truth table to convert the truth table into information flow tracking logic, and processing implicit flow inthe RTL level, thereby realizing information flow processing of RTL level codes, and processing the gate-level hierarchical information flow. The RTL-level hierarchical codes and the gate-level hierarchical codes in the programmable logic device are classified and subjected to information flow tracking processing respectively, and a programmable logic device information flow tracking model is generated.
Owner:BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products