Patent classifications
G06F8/41
Allocation and placement of resources for network computation
Techniques for operating a computing system to perform neural network operations are disclosed. In one example, a method comprises receiving a neural network model, determining a sequence of neural network operations based on data dependency in the neural network model, and determining a set of instructions to map the sequence of neural network operations to the processing resources of the neural network processor. The method further comprises determining, based on a set of memory access operations included in the set of instructions, a first set of memory references associated with a first location of an external memory to store the input data and a second set of memory references associated with a second location of the external memory to store the output data, and generating an instruction file including the set of instructions, the first set of memory references and the second set of memory references.
Gate formation for a quantum processor
In a general aspect, a gate is formed for a quantum processor. In some implementations, an arbitrary program is received. The arbitrary program includes a first sequence of quantum logic gates, which includes a parametric XY gate. A native gate set is identified, which includes a set of quantum logic gates associated with a quantum processing unit. A second sequence of quantum logic gates corresponding to the parametric XY gate is identified, which includes a parametric quantum logic gate. Each of the quantum logic gates in the second sequence is selected from the native gate set. A native program is generated. The native program includes a third sequence of quantum logic gates. The third sequence of quantum logic gates corresponds to the first sequence of quantum logic gates and includes the second sequence of quantum logic gates. The native program is provided for execution by the quantum processing unit.
Information processing method and apparatus, storage medium, and electronic device
An information processing method, comprising: in response to that a third party application receives an information display instruction, generating a download instruction; transmitting the download instruction to a processing platform, for prompting the processing platform to download a configuration file according to the download instruction; controlling the processing platform to parse the configuration file to generate display parameters; obtaining target information by analyzing the display parameters, and displaying the target information in the third party application.
Instrumentation for nested conditional checks
Aspects include executing a first phase that includes injecting instrumentation into program code in response to identifying an inner conditional check in the program code and running the instrumented program with a representative workload. The injecting includes duplicating the inner conditional check and placing a duplicate of the inner conditional check before a respective original nested conditional check in the program code to create an instrumented program. The instrumented program includes a plurality of basic blocks including original basic blocks and a newly added basic block that includes the duplicate of the inner conditional check. The method also includes executing a second phase that includes collecting execution frequency values from counters associated with the basic blocks to form metadata used to make optimization decisions for the program code.
Isolating applications at the edge
Disclosed herein are enhancements for deploying application in an edge system of a communication network. In one implementation, a runtime environment identifies a request from a Hypertext Transfer Protocol (HTTP) accelerator service to be processed by an application. In response to the request, the runtime environment may identify an isolation resource to support the request, initiate execution of code for the application, and pass context to the code. Once initiated, the runtime environment may copy data from the artifact to the isolation resource using the context and return control to the HTTP accelerator service upon executing the code.
Isolating applications at the edge
Disclosed herein are enhancements for deploying application in an edge system of a communication network. In one implementation, a runtime environment identifies a request from a Hypertext Transfer Protocol (HTTP) accelerator service to be processed by an application. In response to the request, the runtime environment may identify an isolation resource to support the request, initiate execution of code for the application, and pass context to the code. Once initiated, the runtime environment may copy data from the artifact to the isolation resource using the context and return control to the HTTP accelerator service upon executing the code.
THREE-DIMENSIONAL DATA ENCODING METHOD, THREE-DIMENSIONAL DATA DECODING METHOD, THREE-DIMENSIONAL DATA ENCODING DEVICE, AND THREE-DIMENSIONAL DATA DECODING DEVICE
A three-dimensional data encoding method includes: generating an N-ary tree structure of three-dimensional points included in three-dimensional data, where N is an integer greater than or equal to 2; generating first encoded data by encoding a first branch using a first encoding process, the first branch having, as a root, a first node included in a first layer that is one of layers included in the N-ary tree structure; generating second encoded data by encoding a second branch using a second encoding process different from the first encoding process, the second branch having, as a root, a second node included in the first layer and different from the first node; and generating a bitstream including the first encoded data and the second encoded data.
Systems, apparatus, and methods of conveyor belt processing
A reconfigurable hardware platform uses, in place of a portion of software, a chain of reconfigurable hardware Operator Blocks to manipulate data as the data moves down the chain. This conveyor belt architecture, or chain of Operator Blocks, moves data from Operator Block to Operator Block. This conveyor belt architecture processor may be combined with a conventional front-end processor to process complex information or critical loops in hardware while processing a rest of a program as software.
Systems, apparatus, and methods of conveyor belt processing
A reconfigurable hardware platform uses, in place of a portion of software, a chain of reconfigurable hardware Operator Blocks to manipulate data as the data moves down the chain. This conveyor belt architecture, or chain of Operator Blocks, moves data from Operator Block to Operator Block. This conveyor belt architecture processor may be combined with a conventional front-end processor to process complex information or critical loops in hardware while processing a rest of a program as software.
Updating An Edge Node of a Process Control System
A method, edge node application investigator, computer program and computer program product for for updating an edge node of a process control system using an information model for the edge node, where the information model representing the edge node as an object to which one or more application objects are linked, which application objects represent applications that are provided for being run by the edge node as well as to a process control system including such an edge node application investigator. The edge node application investigator compares applications of the edge node with the application objects in the information model and changes the applications of the edge node, if there is a deviation between the applications of the edge node and the application objects of the information model, so that the applications of the edge node correspond to the application objects of the information model.