The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
This is a method to expand the memory area which are used by the
optimizing compiler for allocating memory-located values.
English (United States)
This text was extracted from a PDF file.
100% of the total text.
Page 1 of 1
A method to expand the memory area for code generation in Network Processors
Optimizing compilers allocates pieces of the memory area to memory-located values such as spilled-variable, global variables, and memory-passed arguments. Ordinary methods to allocate such memory area have been using a fixed amount of memory pieces. However, the amount of available memory pieces may vary according to the execution status. For example, In IBM network processor, a 16-word memory area is statically secured as a stack for saving the return addresses. Such area can not always be used but available while the stack is not fully used i.e. the nest level of function call is low. To utilize the stack while not being used, we first do the whole program analysis to grab how functions are called and available pieces of the stack area. Second we conduct a liveness analysis for memory-located values that are live across function calls. The memory allocator finally assigns such available pieces of the stack area as well as the other pieces of the memory area to those values.
Disclosed by International Business Machines Corporation