are

Games Where You Can Play Optimally with Arena-Independent Finite Memory. (arXiv:2001.03894v2 [cs.GT] UPDATED)

For decades, two-player (antagonistic) games on graphs have been a framework of choice for many important problems in theoretical computer science. A notorious one is controller synthesis, which can be rephrased through the game-theoretic metaphor as the quest for a winning strategy of the system in a game against its antagonistic environment. Depending on the specification, optimal strategies might be simple or quite complex, for example having to use (possibly infinite) memory. Hence, research strives to understand which settings allow for simple strategies.

In 2005, Gimbert and Zielonka provided a complete characterization of preference relations (a formal framework to model specifications and game objectives) that admit memoryless optimal strategies for both players. In the last fifteen years however, practical applications have driven the community toward games with complex or multiple objectives, where memory -- finite or infinite -- is almost always required. Despite much effort, the exact frontiers of the class of preference relations that admit finite-memory optimal strategies still elude us.

In this work, we establish a complete characterization of preference relations that admit optimal strategies using arena-independent finite memory, generalizing the work of Gimbert and Zielonka to the finite-memory case. We also prove an equivalent to their celebrated corollary of great practical interest: if both players have optimal (arena-independent-)finite-memory strategies in all one-player games, then it is also the case in all two-player games. Finally, we pinpoint the boundaries of our results with regard to the literature: our work completely covers the case of arena-independent memory (e.g., multiple parity objectives, lower- and upper-bounded energy objectives), and paves the way to the arena-dependent case (e.g., multiple lower-bounded energy objectives).




are

Active Intent Disambiguation for Shared Control Robots. (arXiv:2005.03652v1 [cs.RO])

Assistive shared-control robots have the potential to transform the lives of millions of people afflicted with severe motor impairments. The usefulness of shared-control robots typically relies on the underlying autonomy's ability to infer the user's needs and intentions, and the ability to do so unambiguously is often a limiting factor for providing appropriate assistance confidently and accurately. The contributions of this paper are four-fold. First, we introduce the idea of intent disambiguation via control mode selection, and present a mathematical formalism for the same. Second, we develop a control mode selection algorithm which selects the control mode in which the user-initiated motion helps the autonomy to maximally disambiguate user intent. Third, we present a pilot study with eight subjects to evaluate the efficacy of the disambiguation algorithm. Our results suggest that the disambiguation system (a) helps to significantly reduce task effort, as measured by number of button presses, and (b) is of greater utility for more limited control interfaces and more complex tasks. We also observe that (c) subjects demonstrated a wide range of disambiguation request behaviors, with the common thread of concentrating requests early in the execution. As our last contribution, we introduce a novel field-theoretic approach to intent inference inspired by dynamic field theory that works in tandem with the disambiguation scheme.




are

Defending Hardware-based Malware Detectors against Adversarial Attacks. (arXiv:2005.03644v1 [cs.CR])

In the era of Internet of Things (IoT), Malware has been proliferating exponentially over the past decade. Traditional anti-virus software are ineffective against modern complex Malware. In order to address this challenge, researchers have proposed Hardware-assisted Malware Detection (HMD) using Hardware Performance Counters (HPCs). The HPCs are used to train a set of Machine learning (ML) classifiers, which in turn, are used to distinguish benign programs from Malware. Recently, adversarial attacks have been designed by introducing perturbations in the HPC traces using an adversarial sample predictor to misclassify a program for specific HPCs. These attacks are designed with the basic assumption that the attacker is aware of the HPCs being used to detect Malware. Since modern processors consist of hundreds of HPCs, restricting to only a few of them for Malware detection aids the attacker. In this paper, we propose a Moving target defense (MTD) for this adversarial attack by designing multiple ML classifiers trained on different sets of HPCs. The MTD randomly selects a classifier; thus, confusing the attacker about the HPCs or the number of classifiers applied. We have developed an analytical model which proves that the probability of an attacker to guess the perfect HPC-classifier combination for MTD is extremely low (in the range of $10^{-1864}$ for a system with 20 HPCs). Our experimental results prove that the proposed defense is able to improve the classification accuracy of HPC traces that have been modified through an adversarial sample generator by up to 31.5%, for a near perfect (99.4%) restoration of the original accuracy.




are

Real-Time Context-aware Detection of Unsafe Events in Robot-Assisted Surgery. (arXiv:2005.03611v1 [cs.RO])

Cyber-physical systems for robotic surgery have enabled minimally invasive procedures with increased precision and shorter hospitalization. However, with increasing complexity and connectivity of software and major involvement of human operators in the supervision of surgical robots, there remain significant challenges in ensuring patient safety. This paper presents a safety monitoring system that, given the knowledge of the surgical task being performed by the surgeon, can detect safety-critical events in real-time. Our approach integrates a surgical gesture classifier that infers the operational context from the time-series kinematics data of the robot with a library of erroneous gesture classifiers that given a surgical gesture can detect unsafe events. Our experiments using data from two surgical platforms show that the proposed system can detect unsafe events caused by accidental or malicious faults within an average reaction time window of 1,693 milliseconds and F1 score of 0.88 and human errors within an average reaction time window of 57 milliseconds and F1 score of 0.76.




are

Does Multi-Encoder Help? A Case Study on Context-Aware Neural Machine Translation. (arXiv:2005.03393v1 [cs.CL])

In encoder-decoder neural models, multiple encoders are in general used to represent the contextual information in addition to the individual sentence. In this paper, we investigate multi-encoder approaches in documentlevel neural machine translation (NMT). Surprisingly, we find that the context encoder does not only encode the surrounding sentences but also behaves as a noise generator. This makes us rethink the real benefits of multi-encoder in context-aware translation - some of the improvements come from robust training. We compare several methods that introduce noise and/or well-tuned dropout setup into the training of these encoders. Experimental results show that noisy training plays an important role in multi-encoder-based NMT, especially when the training data is small. Also, we establish a new state-of-the-art on IWSLT Fr-En task by careful use of noise generation and dropout methods.




are

Bitvector-aware Query Optimization for Decision Support Queries (extended version). (arXiv:2005.03328v1 [cs.DB])

Bitvector filtering is an important query processing technique that can significantly reduce the cost of execution, especially for complex decision support queries with multiple joins. Despite its wide application, however, its implication to query optimization is not well understood.

In this work, we study how bitvector filters impact query optimization. We show that incorporating bitvector filters into query optimization straightforwardly can increase the plan space complexity by an exponential factor in the number of relations in the query. We analyze the plans with bitvector filters for star and snowflake queries in the plan space of right deep trees without cross products. Surprisingly, with some simplifying assumptions, we prove that, the plan of the minimal cost with bitvector filters can be found from a linear number of plans in the number of relations in the query. This greatly reduces the plan space complexity for such queries from exponential to linear.

Motivated by our analysis, we propose an algorithm that accounts for the impact of bitvector filters in query optimization. Our algorithm optimizes the join order for an arbitrary decision support query by choosing from a linear number of candidate plans in the number of relations in the query. We implement our algorithm in Microsoft SQL Server as a transformation rule. Our evaluation on both industry standard benchmarks and customer workload shows that, compared with the original Microsoft SQL Server, our technique reduces the total CPU execution time by 22%-64% for the workloads, with up to two orders of magnitude reduction in CPU execution time for individual queries.




are

Enhancing Software Development Process Using Automated Adaptation of Object Ensembles. (arXiv:2005.03241v1 [cs.SE])

Software development has been changing rapidly. This development process can be influenced through changing developer friendly approaches. We can save time consumption and accelerate the development process if we can automatically guide programmer during software development. There are some approaches that recommended relevant code snippets and APIitems to the developer. Some approaches apply general code, searching techniques and some approaches use an online based repository mining strategies. But it gets quite difficult to help programmers when they need particular type conversion problems. More specifically when they want to adapt existing interfaces according to their expectation. One of the familiar triumph to guide developers in such situation is adapting collections and arrays through automated adaptation of object ensembles. But how does it help to a novice developer in real time software development that is not explicitly specified? In this paper, we have developed a system that works as a plugin-tool integrated with a particular Data Mining Integrated environment (DMIE) to recommend relevant interface while they seek for a type conversion situation. We have a mined repository of respective adapter classes and related APIs from where developer, search their query and get their result using the relevant transformer classes. The system that recommends developers titled automated objective ensembles (AOE plugin).From the investigation as we have ever made, we can see that our approach much better than some of the existing approaches.




are

Shared Autonomy with Learned Latent Actions. (arXiv:2005.03210v1 [cs.RO])

Assistive robots enable people with disabilities to conduct everyday tasks on their own. However, these tasks can be complex, containing both coarse reaching motions and fine-grained manipulation. For example, when eating, not only does one need to move to the correct food item, but they must also precisely manipulate the food in different ways (e.g., cutting, stabbing, scooping). Shared autonomy methods make robot teleoperation safer and more precise by arbitrating user inputs with robot controls. However, these works have focused mainly on the high-level task of reaching a goal from a discrete set, while largely ignoring manipulation of objects at that goal. Meanwhile, dimensionality reduction techniques for teleoperation map useful high-dimensional robot actions into an intuitive low-dimensional controller, but it is unclear if these methods can achieve the requisite precision for tasks like eating. Our insight is that---by combining intuitive embeddings from learned latent actions with robotic assistance from shared autonomy---we can enable precise assistive manipulation. In this work, we adopt learned latent actions for shared autonomy by proposing a new model structure that changes the meaning of the human's input based on the robot's confidence of the goal. We show convergence bounds on the robot's distance to the most likely goal, and develop a training procedure to learn a controller that is able to move between goals even in the presence of shared autonomy. We evaluate our method in simulations and an eating user study.




are

Electricity-Aware Heat Unit Commitment: A Bid-Validity Approach. (arXiv:2005.03120v1 [eess.SY])

Coordinating the operation of combined heat and power plants (CHPs) and heat pumps (HPs) at the interface between heat and power systems is essential to achieve a cost-effective and efficient operation of the overall energy system. Indeed, in the current sequential market practice, the heat market has no insight into the impacts of heat dispatch on the electricity market. While preserving this sequential practice, this paper introduces an electricity-aware heat unit commitment model. Coordination is achieved through bid validity constraints, which embed the techno-economic linkage between heat and electricity outputs and costs of CHPs and HPs. This approach constitutes a novel market mechanism for the coordination of heat and power systems, defining heat bids conditionally on electricity market prices. The resulting model is a trilevel optimization problem, which we recast as a mixed-integer linear program using a lexicographic function. We use a realistic case study based on the Danish power and heat system, and show that the proposed model yields a 4.5% reduction in total operating cost of heat and power systems compared to a traditional decoupled unit commitment model, while reducing the financial losses of each CHP and HP due to invalid bids by up-to 20.3 million euros.




are

Beware the Normative Fallacy. (arXiv:2005.03084v1 [cs.SE])

Behavioral research can provide important insights for SE practices. But in performing it, many studies of SE are committing a normative fallacy - they misappropriate normative and prescriptive theories for descriptive purposes. The evidence from reviews of empirical studies of decision making in SE suggests that the normative fallacy may is common. This article draws on cognitive psychology and behavioral economics to explains this fallacy. Because data collection is framed by narrow and empirically invalid theories, flawed assumptions baked into those theories lead to misleading interpretations of observed behaviors and ultimately, to invalid conclusions and flawed recommendations. Researchers should be careful not to rely solely on engineering methods to explain what people do when they do engineering. Instead, insist that descriptive research be based on validated descriptive theories, listen carefully to skilled practitioners, and only rely on validated findings to prescribe what they should do.




are

AVAC: A Machine Learning based Adaptive RRAM Variability-Aware Controller for Edge Devices. (arXiv:2005.03077v1 [eess.SY])

Recently, the Edge Computing paradigm has gained significant popularity both in industry and academia. Researchers now increasingly target to improve performance and reduce energy consumption of such devices. Some recent efforts focus on using emerging RRAM technologies for improving energy efficiency, thanks to their no leakage property and high integration density. As the complexity and dynamism of applications supported by such devices escalate, it has become difficult to maintain ideal performance by static RRAM controllers. Machine Learning provides a promising solution for this, and hence, this work focuses on extending such controllers to allow dynamic parameter updates. In this work we propose an Adaptive RRAM Variability-Aware Controller, AVAC, which periodically updates Wait Buffer and batch sizes using on-the-fly learning models and gradient ascent. AVAC allows Edge devices to adapt to different applications and their stages, to improve computation performance and reduce energy consumption. Simulations demonstrate that the proposed model can provide up to 29% increase in performance and 19% decrease in energy, compared to static controllers, using traces of real-life healthcare applications on a Raspberry-Pi based Edge deployment.




are

When Retired Soccer Star Briana Scurry Knew Her Career Was Over

After several weeks of not playing because of a concussion and then failing  several baseline tests, Briana Scurry became very worried.




are

The Hit That Ended Briana Scurry's Soccer Career

"I knew I was in trouble ... I didn't know how much trouble," says retired soccer star Briana Scurry.




are

6 Best CMS Software for Website Development & SMBs

Are you looking for a content management system (CMS) that will help you create the digital content you need? With so many options on the market, it’s challenging to know which one is the best CMS software for your business. On this page, we’ll take a look at the six best CMS’s for website development […]

The post 6 Best CMS Software for Website Development & SMBs appeared first on WebFX Blog.




are

Printed Solar Cells Hold Promise for Unlit Rural Areas

By Sci Dev Net Advances in printed solar cell technology promise clean renewable energy, opening possibilities for 1.3 billion people still without electric power in developing countries. The technology, which only requires the use of existing industrial-size printers, can produce … Continue reading




are

In Washington's rural pot shops, the effects of the coronavirus scare can be dramatic

The Cannabis Issue During normal times, I-90 Green House is like a destination resort for marijuana lovers.…




are

From culinary arts to binge-watching, here are some weed-friendly activities to get you through your isolation

The Cannabis Issue It's been almost a month since the COVID-19 pandemic forced folks inside and made "social distancing" part of our daily lexicons.…




are

These are are our neighbors. These are readers. These are the people we're all trying to save.

How the coronavirus outbreak has upended people's lives across the Inland Northwest The numbers don't lie.…



  • News/Local News

are

1917 is designed to look like a single take. Here are some other films that use similar tricks to great effect

Sam Mendes' 1917, which took Best Picture and Best Director awards at the Golden Globes earlier this week, looks like a standard period piece.…



  • Film/Film News

are

Portland's Jenny Don't and the Spurs are back with new music after a quiet 2019

Jenny Don't and the Spurs were right in the middle of recording their third full-length album when a vocal polyp put a halt to the process.…




are

Musicians are posting live streams and personal concerts to make your self-isolation a bit more tuneful

Celebrities: They're just like us! Along with everyone else, famous people are self-isolating at home, and some of them have taken to social media to alleviate the stress of the outside world. We don't need to tell you that events everywhere are canceled, so a few big-time musicians are putting on personal concerts for their fans and followers, and a lot of them — save for that cringe-inducing, star-studded cover of "Imagine" that was going around yesterday — are actually pretty good.…




are

In lieu of in-person performances, musicians are using social media and live streams to connect with fans

Ask any working musician why they play live, why they lug their equipment to and from bars and restaurants and wine-tasting rooms week after week, and they'll point to the same nebulous thing: It's the connection with an audience.…




are

Aerosmith and Guided By Voices celebrate landmark albums this month and are worlds apart in style and popularity — but maybe not as far as you think

Put pictures of 1975-era Aerosmith and 1995-era Guided By Voices next to each other and you probably wouldn’t think the bands have anything in common.…




are

Share your Mount St. Helens memories with us

Forty years ago, Mount St. Helens in southwestern Washington was just days away from a devastating eruption. When the mountain finally did blow, after weeks of frequent quakes and ash belching, on the morning of May 18, 1980, it caused the deadliest and most economically destructive volcanic event in U.S. history.…



  • Arts & Culture

are

Meat gets rarer in the grocery aisle and the drive-thru

By David Yaffe-Bellany and Michael Corkery The New York Times Company Hundreds of Wendy’s restaurants have run out of hamburgers.…



  • Nation & World

are

Supreme Court divided over Obamacare’s contraceptive mandate

By Adam Liptak The New York Times Company…




are

How local wineries are trying to adjust to the new business landscape

Drink Local Life under the COVID-19 pandemic is rough for everyone, individuals and businesses alike.…



  • Food/Food News

are

Local distilleries are relying on curbside bottle sales - and small batches of hand sanitizer - to stay afloat

Drink Local In tumultuous times, one thing remains true: People still want their spirits.…



  • Food/Food News

are

Local breweries are forced to adapt and an upcoming beer collaboration aims to support the industry

Drink Local For the majority of regional craft breweries, most revenue comes from two avenues: direct-to-consumer sales out of a tasting room and selling beer to local bars and restaurants.…



  • Food/Food News

are

A first-timer hits the Bloomsday course on its original date and walks away with some memories - barely

The chafing.…



  • Culture/Arts & Culture

are

Food banks prepare to feed far more as COVID-19 disrupts America's food system at every level

At every level of America's food system, mandated closures and outbreaks of COVID-19 have interrupted the finely tuned network that normally gets food from farmers and food processors to restaurants, grocery stores and food banks.…



  • News/Local News

are

The 'Church at Planned Parenthood' guy is proudly defying Inslee's ban on in-person church services

The puppet's felt hair bounces as she stage-whispers to the other puppets, almost conspiratorially, about their plans.…



  • News/Local News

are

Why COVID-19 patients at the VA hospital in Spokane aren't counted as 'hospitalized'

If you go to check how many people are hospitalized with COVID-19 in Spokane, the Spokane County Regional Health District website will give you an answer. Right now, it lists eight people as currently hospitalized with COVID-19, and that number has been trending downward.…



  • News/Local News

are

Deanna Goguen's favorite spaces in her home are nothing alike

Designology Interiors' Deanna Goguen has three bathrooms in her South Hill-area home, each with its own personality.…




are

With support from schools and parents, students can better prepare for a career in the arts

For parents of budding artists and creative types, it can often seem like the arts get short shrift in the K-12 curricula, especially at a time when STEM — short for science, technology, engineering and math — is the buzzword in education and the most visible casualties of school budget cuts are librarians and music teachers.…



  • Family & Parenting

are

Thai Bamboo founder shares her love of cooking and her culture

Ever wonder why there are no Thai fast food places?…



  • Food & Cooking

are

The Zags are the WCC champs. But why was this season so surprising?

It’s March. The regular season is now in the rearview mirror.…




are

CONCERT REVIEW: Tool's same ol' sound still bursts to creative new highs live at Spokane Arena

Tool's music is not only not for everyone, it's such a challenging polyglot of oft-derided musical styles that it risks not being for anyone. And yet, the quartet's blend of prog-rock, art-rock, metal and performance art has become a genre unto itself over the course of 30 years, and it's a genre that has proved remarkably commercial.…



  • Music/Music News

are

Community leaders are feeding Spokane and supporting local restaurants at the same time

As soon as state Rep. Marcus Riccelli returned home from Olympia, he jumpstarted a community-wide effort to feed Spokane constituents deeply affected by the COVID-19 crisis.…



  • Food/Food News

are

Graphene prepared by using edge functionalization of graphite

Disclosed is a method for producing graphene functionalized at its edge positions of graphite. Organic material having one or more functional groups is reacted with graphite in reaction medium comprising methanesulfonic acid and phosphorus pentoxide, or in reaction medium comprising trifluoromethanesulfonic acid, to produce graphene having organic material fuctionalized at edges. And then, high purity and large scaled graphene and film can be obtained by dispersing, centrifugal separating the functionalized graphene in a solvent and reducing, in particular heat treating the graphene. According to the present invention graphene can be produced inexpensively in a large amount with a minimum loss of graphite. (FIG. 1)




are

Optimization to identify nearest objects in a dataset for data analysis

In one embodiment, a plurality of objects associated with a dataset and a specified number of nearest objects to be identified are received. The received objects are sorted in a structured format. Further, a key object and a number of adjacent objects corresponding to the key object are selected from the sorted plurality of objects, wherein the number of adjacent objects is selected based on the specified number of nearest objects to be identified. Furthermore, distances between the key object and the number of adjacent objects are determined to identify the specified number of nearest objects, wherein the distances are determined until the specified number of nearest objects is identified. Based on the determined distances, the specified number of nearest objects in the dataset is identified for data analysis.




are

Method and apparatus for declarative data warehouse definition for object-relational mapped objects

A data warehouse is constructed using the relational mapping of a transactional database without reconstructing the data relationships of the transactional database. First, an application programmer analyzes an object model in order to describe facts and dimensions using the objects, attributes, and paths of the object model. Each of the dimensions has an identifier that correlates an item in the transactional database to a dimension record in the data warehouse. The fact and dimension descriptions are saved to a description file. Second, a Data Warehouse Engine (DWE) then access the description file and uses the object model, fact and dimension descriptions, and object-relational mapping to map transactional data to the data warehouse.




are

Polyamide moulding materials containing copolyamides for producing transparent moulding parts with low distorsion in climatic testing

Polyamide molding materials for transparent molding parts. The materials comprise transparent copolyamides that contain: (A) 40 to 100 wt % of at least one transparent copolyamide with a glass transition temperature (Tg) of at least 80° C. and not more than 150° C., composed of at least two diamines that are different from each other, wherein the at least two diamines are a mixture of (a) 50 to 90 mol % bis-(4-amino-3-methylcyclohexyl)methane (MACM) and/or bis-(4-amino-3-ethylcyclohexyl)methane (EACM) and/or bis-(4-amino-3,5-dimethylcyclohexyl)methane (TMACM) and b) 10 to 50 mol % aliphatic diamine having 9 to 14 carbon atoms, in particular decandiamine, particularly preferably at least 20 mol % decandiamine, each relative to the total amount of diamines, and of one or more aliphatic dicarboxylic acids, having 6 to 36 carbon atoms, (B) 0 to 60 wt % of at least one further polymer, (C) 0 to 10 wt % of additives, the sum of the components (A), (B) and (C) totaling 100% by weight.




are

Arene-transition metal linkers for solid phase synthesis

Compositions and methods for the solid phase synthesis of organic compounds are provided. The compositions are solid supports having an attached traceless linker precursor and are represented by the formula: ##STR1## In this formula, S0 is a solid support; B is a connecting group; M is a transition metal, for example ruthenium, chromium, iron, molybdenum and manganese; each L is independently a transition metal ligand; the letter n represents an integer of from 1 to 4, such that M has a sufficient number of ligands to fill the available valences; and X- represents an anion which is typically a non-nucleophilic anion.




are

Process of preparing a fluid rare earth alkoxylation catalyst

A process to prepare an improved fluid rare earth phosphate catalyst composition useful in preparing alkylene oxide adducts of organic compounds having active hydrogen atoms is provided. The catalyst is prepared by dissolving a rare earth salt in a C9-C30 active hydrogen containing organic compound and then adding phosphoric acid to the organic compound rare earth mixture.




are

Intelligently responding to hardware failures so as to optimize system performance

A method, system and computer program product for intelligently responding to hardware failures so as to optimize system performance. An administrative server monitors the utilization of the hardware as well as the software components running on the hardware to assess a context of the software components running on the hardware. Upon detecting a hardware failure, the administrative server analyzes the hardware failure to determine the type of hardware failure and analyzes the properties of the workload running on the failed hardware. The administrative server then responds to the detected hardware failure based on various factors, including the type of the hardware failure, the properties of the workload running on the failed hardware and the context of the software running on the failed hardware. In this manner, by taking into consideration such factors in responding to the detected hardware failure, a more intelligent response is provided that optimizes system performance.




are

Introspection of software program components and conditional generation of memory dump

An approach for introspection of a software component and generation of a conditional memory dump, a computing device executing an introspection program with respect to the software component is provided. An introspection system comprises one or more conditions for generating the conditional memory dump based on operations of the software component. In one aspect, a computing device detects, through an introspection program, whether the one or more conditions are satisfied by the software component based on information in an introspection analyzer of the introspection program. In addition, the computing device indicates, through the introspection program, if the one or more conditions are satisfied by the software component. In another aspect, responsive to the indication, the computing device generates the conditional memory dump through the introspection program.




are

Avoiding processing flaws in a computer processor triggered by a predetermined sequence of hardware events

A system, method and computer program product for avoiding a processing flaw in a computer processor triggered by a predetermined sequence of hardware events. The system may include a detecting unit and a power-on reset unit. The detecting unit detects that the predetermined sequence of hardware events is going to occur at the computer processor. The power-on reset unit initializes the computer processor to a state stored in computer memory in response to detecting the sequence of hardware events.




are

Nonvolatile memory device and bad area managing method thereof

Example embodiments relate to a bad area managing method of a nonvolatile memory device. The nonvolatile memory device may include a plurality of memory blocks and each block may contain memory layers stacked on a substrate. According to example embodiments, a method includes accessing one of the memory blocks, judging whether the accessed memory block includes at least one memory layer containing a bad memory cell. If a bad memory cell is detected, the method may further include configuring the memory device to treat the at least one memory layer of the accessed memory block as a bad area.




are

Method and apparatus for performing logical compare operations

A method and apparatus for including in a processor instructions for performing logical-comparison and branch support operations on packed or unpacked data. In one embodiment, instruction decode logic decodes instructions for an execution unit to operate on packed data elements including logical comparisons. A register file including 128-bit packed data registers stores packed single-precision floating point (SPFP) and packed integer data elements. The logical comparisons may include comparison of SPFP data elements and comparison of integer data elements and setting at least one bit to indicate the results. Based on these comparisons, branch support actions are taken. Such branch support actions may include setting the at least one bit, which in turn may be utilized by a branching unit in response to a branch instruction. Alternatively, the branch support actions may include branching to an indicated target code location.