G06F7/20

COMPUTING-IN-MEMORY CIRCUIT
20220416801 · 2022-12-29 ·

A computing-in-memory circuit comprises a computing element array and an analog-to-digital conversion circuit. The computing element array is utilized for analog computation operations. The computing element array includes memory cells, a first group of computing elements, and a second group of computing elements. The first group of computing elements provides capacitance for analog computation in response to an input vector and receives data from the plurality of memory cells and the input vector. The second group of computing elements provides capacitance for quantization. Each computing element of the computing element array is based on a switched-capacitors circuit. The analog-to-digital conversion circuit includes a comparator and a conversion control unit. The comparator has a signal terminal, a reference terminal, and a comparison output terminal, wherein the first and second groups of computing elements are selectively coupled to the signal terminal and the reference terminal.

Fuzzy string alignment
11615243 · 2023-03-28 · ·

A method includes computing multiple term distances between pairs of multiple first string terms in a first string and multiple second string terms in a second string, generating a cost matrix based on the term distances, and selecting a set of candidate alignments based on the cost matrix. The method further includes generating multiple alignment scores for the set of candidate alignments, and selecting, from the set of candidate alignments, an alignment between the first string and the second string based on the alignment scores. The method further includes outputting a match identifier based on the alignment.

Fuzzy string alignment
11615243 · 2023-03-28 · ·

A method includes computing multiple term distances between pairs of multiple first string terms in a first string and multiple second string terms in a second string, generating a cost matrix based on the term distances, and selecting a set of candidate alignments based on the cost matrix. The method further includes generating multiple alignment scores for the set of candidate alignments, and selecting, from the set of candidate alignments, an alignment between the first string and the second string based on the alignment scores. The method further includes outputting a match identifier based on the alignment.

Sorting networks using unary processing

Various implementations of sorting networks are described that utilize time-encoded data signals having encoded values. In some examples, an electrical circuit device includes a sorting network configured to receive a plurality of time-encoded signals. Each time-encoded signal of the plurality of time-encoded signals encodes a data value based on a duty cycle of the respective time-encoded signal or based on a proportion of data bits in the respective time-encoded signal that are high relative to the total data bits in the respective time-encoded signal. The sorting network is also configured to sort the plurality of time-encoded signals based on the encoded data values of the plurality of time-encoded signals.

Sorting networks using unary processing

Various implementations of sorting networks are described that utilize time-encoded data signals having encoded values. In some examples, an electrical circuit device includes a sorting network configured to receive a plurality of time-encoded signals. Each time-encoded signal of the plurality of time-encoded signals encodes a data value based on a duty cycle of the respective time-encoded signal or based on a proportion of data bits in the respective time-encoded signal that are high relative to the total data bits in the respective time-encoded signal. The sorting network is also configured to sort the plurality of time-encoded signals based on the encoded data values of the plurality of time-encoded signals.

AUTO TUNING DATA ANOMALY DETECTION
20170371932 · 2017-12-28 ·

Automatic tuning anomaly detection is described. The context metric keys are established during a training phase based on the surrounding context of data received from devices over time. Anomaly and tuning windows are also established for metric ranges of the context metric keys. After the training phase, incoming data is correlated against the keys to identify sets of the data associated with certain context metric keys. For any given context metric key, metric data values in the associated set of data fall either within or outside the metric range of the context metric key. If they fall outside the range for longer than the anomaly window, an alarm is raised. If they fall outside the range for longer than the tuning window, boundaries for the metric range are updated. Additionally, the contextual parameters of the context metric keys are also updated over time, as new data contexts appear.

AUTO TUNING DATA ANOMALY DETECTION
20170371932 · 2017-12-28 ·

Automatic tuning anomaly detection is described. The context metric keys are established during a training phase based on the surrounding context of data received from devices over time. Anomaly and tuning windows are also established for metric ranges of the context metric keys. After the training phase, incoming data is correlated against the keys to identify sets of the data associated with certain context metric keys. For any given context metric key, metric data values in the associated set of data fall either within or outside the metric range of the context metric key. If they fall outside the range for longer than the anomaly window, an alarm is raised. If they fall outside the range for longer than the tuning window, boundaries for the metric range are updated. Additionally, the contextual parameters of the context metric keys are also updated over time, as new data contexts appear.

Collision detection using state management of configuration items

Implementations of a system, method and apparatus described herein receive, for a configuration item in a configuration management database, status indicating an operational state and an automation state associated with the configuration item, and determine whether a conflict will occur with at least one of the operational state or the automation state of the configuration item as a result of a process affecting the configuration item. When the conflict will not occur, a change is made to at least one of the operational state or the automation state of the configuration item in accordance with the process. Upon a conclusion of the process, the change is removed. If the conflict will occur, the process not allowed to continue.

Method, apparatus and system for protecting identity information

A method, apparatus and system for using login information includes an account where login information is used to access the account, a login information usage data for storing the login information used on the account and a manager application coupled to the accounts through a network. The manager application is configured to access the login information and determine at least one potentially or actually compromised account, determine login information related to the at least one potentially or actually compromised account, determine at least one other account having similar login information and notify a user regarding a potential threat to the at least one other account.

INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER READABLE MEDIUM
20170277754 · 2017-09-28 · ·

An information processing apparatus includes a first management unit that manages information of an object, of which at least one of a parent or a child is determined, by a memory within the information processing apparatus, a second management unit that manages information of an object, of which at least one of a parent or a child is determined, by a memory accessible from plural information processing apparatuses, a receiving unit that receives a request which is intended for a target object managed by the first management unit or the second management unit, and a processing unit that performs processing corresponding to the request on information of the target object based on a comparison result between an owner object for which the piece of authority information is authorized and an object which is a parent of the authority object.