International Business Machines Patent applications |
Patent application number | Title | Published |
20150312703 | TIMED AND VARIABLE DURATION FOR MULTIPLE DEVICE SYNCHING - A Bluetooth system is comprised of a Bluetooth device and multiple network devices connectable to the Bluetooth device. This Bluetooth device can selectively switch connection pairings with devices in the network based on some triggering event. The switching function automatically occurs between the Bluetooth and network devices without any user intervention. This pairing enables seamless collaboration between devices owned by an owner based on the power settings and usage of the system without needing the user's interaction. | 10-29-2015 |
20150286810 | SMART PEN SYSTEM TO RESTRICT ACCESS TO SECURITY SENSITITIVE DEVICES WHILE CONTINUOUSLY AUTHENTICATING THE USER - Continuous authentication of a user of a computing device is established to ensure security of the computing device. A smart pen fingerprint print reader identifies a user fingerprint and a determination is made to grant access to a computer device for this user. Communication with the computing device is accomplished through the smart pen. A security event is detected when the continuous user contact with the smart pen device is disrupted. In addition, user inactivity or exceeding a threshold distance between the smart pen device and the computing device may also trigger a security event. Detection of a security event will cause the screen content of the computing device to become unintelligible and the computing device becomes inoperable. | 10-08-2015 |
20140287758 | Method and System for Load Balancing of Large File Transfers on a Wireless Network - A method and system identifies a data file for transfer to a user. The invention also detects the movement of the user device from which the data file transfer was made and calculates a projected path for movement of the user device. Based on the projected path of movement, the sections of the requested data file are transferred in parallel to node areas where the user device is projected to move according to the projected path. As the user enters a node area, the section of the data file downloaded to that node area is locally transferred to the user device and thereby substantially reducing download time of a large data file. | 09-25-2014 |
20140095531 | DYNAMIC OUTPUT SELECTION USING HIGHLY OPTIMIZED DATA STRUCTURES - A node container is constructed with multiple binary tree views. A processing device creates a primary view binary tree within the node container based on a primary key. A set of records that match fields of the primary key is chained to the primary view. The processing device also creates one or more alternate views within the node container to allow access to the same set of records via one or more alternate keys, which are subsets of the fields of the primary key. The chain of records is extracted from the node container when matched to a subsequent query search. | 04-03-2014 |
20140095508 | EFFICIENT SELECTION OF QUERIES MATCHING A RECORD USING A CACHE - A method is provided for constructing a cache for storing results of previously evaluated queries in a binary tree based on a cache key. The cache is searched, by a processing device, for a node representing a set of previously evaluated queries that match a given record using an instance of the cache key. In response to finding a representative node that matches the instance of the cache key, the method performs processing associated with the set of previously evaluated queries. In response to finding no representative nodes, the method creates a new node using the instance of the cache key. The method of the invention then updates the cache by classifying the compatibility of newly registered queries with the cache key and evaluating whether compatible newly registered queries match the record. | 04-03-2014 |
20140068215 | METHOD AND APPARATUS FOR ACCESSING DATA IN A DATA STORAGE SYSTEM - A data storage system, and a method for accessing data in a data storage system, wherein the data storage system comprises at least a first volume and a second volume, and the first volume and the second volume remain consistent by a synchronous copy relationship, the method comprising: setting a virtual unique identifier of the second volume as a unique identifier of the first volume; creating a first path from a host to the first volume and a second path from the host to the second volume by using the unique identifier of the first volume; accessing data by using the first path from the host to the first volume; and setting the second path from the host to the second volume as unavailable. | 03-06-2014 |
20140063987 | MEMORY OPERATION UPON FAILURE OF ONE OF TWO PAIRED MEMORY DEVICES - A method and apparatus for continued operation of a memory module, including a first and second memory device, when one of memory devices has failed. The method includes receiving a write operation request to write a data word, having first and second sections, by a first memory module. The memory module may have a first memory device and a second memory device, for respectively storing the first and second sections of the data word. A determination if one of the first and second memory devices is inoperable is made. If one of the first and second memory devices is inoperable, a write operation is performed by writing the first and second sections of the data word to the operable one of the first and second memory devices. | 03-06-2014 |
20140059044 | NODE VALIDATION IN A NETWORK - A method of operating a network of connected nodes comprises the steps of maintaining a trust value for each node in the network, maintaining one or more attributes for each node in the network, each attribute comprising a value and a respective confidence level, and performing a validation of a specific attribute of a specific node. The validation comprises the steps of querying nodes connected to the specific node for specific attribute values for the specific node, creating a results set from the returned attribute values from the connected nodes and the trust values of the connected nodes, and processing the results set according to a predefined algorithm to determine a new value and/or a new confidence level for the specific attribute of the specific node. | 02-27-2014 |
20130346997 | MECHANISM OF SUPPORTING SUB-COMMUNICATOR COLLECTIVES WITH O(64) COUNTERS AS OPPOSED TO ONE COUNTER FOR EACH SUB-COMMUNICATOR - A system and method for enhancing barrier collective synchronization on a computer system comprises a computer system including a data storage device. The computer system includes a program stored in the data storage device and steps of the program being executed by a processor. The system includes providing a plurality of communicators for storing state information for a barrier algorithm. Each communicator designates a master core in a multi-processor environment of the computer system. The system allocates or designates one counter for each of a plurality of threads. The system configures a table with a number of entries equal to the maximum number of threads. The system sets a table entry with an ID associated with a communicator when a process thread initiates a collective. The system determines an allocated or designated counter by searching entries in the table. | 12-26-2013 |
20130311812 | Power Shifting in Multicore Platforms by Varying SMT Levels - Power consumption in a microprocessor platform is managed by setting a peak power level for power consumed by a multi-core microprocessor platform executing multi-threaded applications. The multi-core microprocessor platform contains a plurality of physical cores, and each physical core is configurable into a plurality of logical cores. A simultaneous multithreading level in at least one physical core is adjusted by changing the number of logical cores on that physical core in response to a power consumption level of the multi-core microprocessor platform exceeding the peak power level. Performance and power data based on simultaneous multi-threading levels are used in selecting the physical core to be adjusted. | 11-21-2013 |
20130311811 | Power Shifting in Multicore Platforms by Varying SMT Levels - Power consumption in a microprocessor platform is managed by setting a peak power level for power consumed by a multi-core microprocessor platform executing multi-threaded applications. The multi-core microprocessor platform contains a plurality of physical cores, and each physical core is configurable into a plurality of logical cores. A simultaneous multithreading level in at least one physical core is adjusted by changing the number of logical cores on that physical core in response to a power consumption level of the multi-core microprocessor platform exceeding the peak power level. Performance and power data based on simultaneous multi-threading levels are used in selecting the physical core to be adjusted. | 11-21-2013 |
20130311517 | Representing Incomplete and Uncertain Information in Graph Data - A method for representing and querying incomplete and uncertain information in graph data receives a plurality of graphs containing subject nodes, object nodes and predicates extending between subject and object nodes. The subject nodes and predicates can be URIs or blank, and the object nodes can be URIs, literals or blank. Incomplete graph data sets are created by a variable into each blank subject node, each blank predicate and each blank object node, and uncertain graph data sets are created by substituting alternative values for all variables in the incomplete data graph. A query is received from a user and a naïve search of the graph data is performed for certain data. The incomplete and uncertain graphs are then used to determine potential answers and certain potential answers based on user-specified requirements. The certain answers and potential certain answers are returned to the user. | 11-21-2013 |
20130311507 | Representing Incomplete and Uncertain Information in Graph Data - A method for representing and querying incomplete and uncertain information in graph data receives a plurality of graphs containing subject nodes, object nodes and predicates extending between subject and object nodes. The subject nodes and predicates can be URIs or blank, and the object nodes can be URIs, literals or blank. Incomplete graph data sets are created by a variable into each blank subject node, each blank predicate and each blank object node, and uncertain graph data sets are created by substituting alternative values for all variables in the incomplete data graph. A query is received from a user and a naïve search of the graph data is performed for certain data. The incomplete and uncertain graphs are then used to determine potential answers and certain potential answers based on user-specified requirements. The certain answers and potential certain answers are returned to the user. | 11-21-2013 |
20130307033 | Borderless Contact For An Aluminum-Containing Gate - An aluminum-containing material is employed to form replacement gate electrodes. A contact-level dielectric material layer is formed above a planarization dielectric layer in which the replacement gate electrodes are embedded. At least one contact via cavity is formed through the contact-level dielectric layer. Any portion of the replacement gate electrodes that is physically exposed at a bottom of the at least one contact via cavity is vertically recessed. Physically exposed portions of the aluminum-containing material within the replacement gate electrodes are oxidized to form dielectric aluminum compound portions. Subsequently, each of the at least one active via cavity is further extended to an underlying active region, which can be a source region or a drain region. A contact via structure formed within each of the at least one active via cavity can be electrically isolated from the replacement gate electrodes by the dielectric aluminum compound portions. | 11-21-2013 |
20130275569 | Scalable Common Infrastructure for Information Collection from Networked Devices - A common infrastructure collects diverse data and information from large numbers of mobile devices and traditional sensors at Internet scale to support multiple different applications simultaneously. The infrastructure includes a backend phenomenon layer that provides high level abstractions to applications such that they can express their data and information needs in a declarative fashion and coordinate the data collection and processing activities for all applications. An edge layer that manages devices, receives collection requirements from the backend layer, configures and instructs devices for data collection, and conducts aggregation and primitive processing of the data. This layer contains network edge nodes, such as base stations in a cellular network. Each node manages a set of local data generating networked devices. The device agent data layer using common agents on the data generating networked devices receives data collection instructions from the edge layer, performs data collection. | 10-17-2013 |
20130273901 | Scalable Common Infrastructure for Information Collection from Networked Devices - A common infrastructure collects diverse data and information from large numbers of mobile devices and traditional sensors at Internet scale to support multiple different applications simultaneously. The infrastructure includes a backend phenomenon layer that provides high level abstractions to applications such that they can express their data and information needs in a declarative fashion and coordinate the data collection and processing activities for all applications. An edge layer that manages devices, receives collection requirements from the backend layer, configures and instructs devices for data collection, and conducts aggregation and primitive processing of the data. This layer contains network edge nodes, such as base stations in a cellular network. Each node manages a set of local data generating networked devices. The device agent data layer using common agents on the data generating networked devices receives data collection instructions from the edge layer, performs data collection. | 10-17-2013 |
20130247062 | VERIFYING SYNCHRONIZATION COVERAGE IN LOGIC CODE - A computer implemented system and method for measuring synchronization coverage for one or more concurrently executed threads is provided. The method comprises updating an identifier of a first thread to comprise an operation identifier associated with a first operation, in response to determining that the first thread has performed the first operation; associating the identifier of the first thread with one or more resources accessed by the first thread; and generating a synchronization coverage model by generating a relational data structure of said one or more resources, wherein a resource is associated with at least the identifier of the first thread and an identifier of a second thread identifier, such that the second thread waits for the first thread before accessing said resource. | 09-19-2013 |
20130246841 | METHOD, APPARATUS, AND SYSTEM FOR A REDUNDANT AND FAULT TOLERANT SOLID STATE DISK - A solid state drive includes a first solid state disc controller (SSDC), a second SSDC and a flash array. The flash array includes a first flash port and a second flash port. The first SSDC is configured to connect to the flash array through the first flash port and the second flash array is configured to connect to the flash array through the second flash port. | 09-19-2013 |
20130246723 | Efficient Loading of Data into Memory of a Computing System - The method comprises receiving mapping information from a data storage system. The mapping information associates a first data chunk stored in the data storage system with a unique identifier to support deployment of a first virtual machine on a host computing system. Once the mapping information is received, the mapping information is utilized to determine whether any copies of the first data chunk have already been loaded into a memory of the host computing system in association with deployment of the first virtual machine or a second virtual machine on the host computing system. If no copies of the first data chunk have already been loaded into the memory, the first data chunk is retrieved from the data storage system, loaded into the memory, and utilized to deploy the first virtual machine on the host computing system. | 09-19-2013 |
20130185363 | Selective Display of Past Instant Messages - A method for allowing selective display of past instant messages includes establishing an instant messaging session among at least two participants. Each participant has an associated computer system, with all of the associated computing systems in communication across a network. A list of instant messages between the at least two participants is displayed on monitors associated with the computing systems. At least one instant message is selected from the list of instant messages using an access control. At least one new participant is invited to join the instant messaging session. When the selected at least one instant message corresponds to the at least one new participant, the selected at least one instant message is displayed on a monitor used by the at least one new participant. | 07-18-2013 |
20130185330 | RULE-DRIVEN RUNTIME CUSTOMIZATION OF KEYWORD SEARCH ENGINES - Described herein are methods, systems, apparatuses and products for rule-driven runtime customization of keyword search engines. An aspect provides a method for rule-driven customization of keyword searches, including: receiving by a computer an input keyword query; determining from the input keyword query and a dataset to be queried at least one rule selected from the group consisting of: a re-write rule; a category ranking rule, and a category grouping rule; and applying the at least one rule to generate search results based on domain knowledge of the dataset. Other embodiments are disclosed. | 07-18-2013 |
20130185304 | RULE-DRIVEN RUNTIME CUSTOMIZATION OF KEYWORD SEARCH ENGINES - Described herein are methods, systems, apparatuses and products for rule-driven runtime customization of keyword search engines. An aspect provides a method for rule-driven customization of keyword searches, including: receiving by a computer an input keyword query; determining from the input keyword query and a dataset to be queried at least one rule selected from the group consisting of: a re-write rule; a category ranking rule, and a category grouping rule; and applying the at least one rule to generate search results based on domain knowledge of the dataset. Other embodiments are disclosed. | 07-18-2013 |
20130158695 | METHOD, SYSTEM AND PROGRAM FOR CONSTRUCTING A CONTROLLER - A system, program and related computer implemented method for selecting a controller and constructing it to automate one or more processes is provided. The method comprises the steps of: constructing a controller from a plant described by an LPV model to which a scheduling parameter is given by: a) calculating one or more v gaps and a mean value of each candidate of a plant parameter vector of said LPV model based on a requirement of preselected constraints; b) choosing a candidate via information gathered by proof based on the magnitude of differences between the v gaps; c) converting the LPV model into LMI and finding controllers, according to an H | 06-20-2013 |
20130138923 | MULTITHREADED DATA MERGING FOR MULTI-CORE PROCESSING UNIT - Described herein are methods, systems, apparatuses and products for multithreaded data merging for multi-core central and graphical processing units. An aspect provides for executing a plurality of threads on at least one central processing unit comprising a plurality of cores, each thread comprising an input data set (IDS) and being executed on one of the plurality of cores; initializing at least one local data set (LDS) comprising a size and a threshold; inserting IDS data elements into the at least one LDS such that each inserted IDS data element increases the size of the at least one LDS; and merging the at least one LDS into a global data set (GDS) responsive to the size of the at least one LDS being greater than the threshold. Other aspects are disclosed herein. | 05-30-2013 |
20130069688 | DIGITAL TEST SYSTEM AND METHOD FOR VALUE BASED DATA - Embodiments of the present invention provide an inequality indication system (IIS). The IIS provides built in test support which enables evaluation, in an on-chip digital logic circuit, of digital values as inequalities, with either a single pass/fail bit expressed on a device I/O or a readable register containing inequality evaluation results. The IIS enables the movement of value evaluation onto the device (chip) using a common simple method, well suited to address/data type structures or scan based structures, instead of off-chip, which then requires tester dependent custom code. The IIS, when enabled, overrides the TDO signal to allow it to function as an inequality indicator instead of a standard test data out signal. | 03-21-2013 |
20130019929 | REDUCTION OF LIGHT INDUCED DEGRADATION BY MINIMIZING BAND OFFSET - A device and method for reducing degradation in a photovoltaic device includes adjusting a band offset of the device during one or more of forming an electrode, forming a first doped layer or forming an intrinsic layer. The adjusting reduces a band offset between one or more of the electrode, the first doped layer and the intrinsic layer to reduce light-induced degradation of the device. A second doped layer is formed on the intrinsic layer. | 01-24-2013 |
20130019011 | POLICY-DRIVEN CAPACITY MANAGEMENT IN RESOURCE PROVISIONING ENVIRONMENTS - Systems and methods for policy-driven capacity management in a resource provisioning environment, the method comprising storing, in an operational database one or more virtual resource sets (VRSs) and elasticity ranges for components to be deployed in a resource provisioning environment, and probabilistic guarantees on the elasticity ranges defined in a service manifest provided by a service subscriber; collecting historical data about capacity usage in the resource provisioning environment and failure statistics from the operational database, in addition to prior service commitments due to previously contracted service level agreements (SLAs) stored in a SLA repository; calculating equivalent capacity for the resource provisioning environment based on a defined residual benefit goal, and other business goals instrumented by way of a policy engine; and placing requested virtual resources on physical resources, in response to determining that sufficient physical capacity is available to host the calculated equivalent capacity. | 01-17-2013 |
20130016916 | PERSONALIZED TAG RANKING - Personalized tag ranking of images, including identifying within a reference image collection any images that are similar to an input image, identifying within a source image collection any images that have associated tags that are similar to a set of input tags associated with the input image, identifying among the images identified in the reference image collection any images that are similar to the images identified in the source image collection, and calculating a weight for each of a plurality of tag pairs, where each of the tags in each of the tag pairs is associated with a different subset of the images in the reference image collection identified as being similar to the images identified in the source image collection, and ranking the input tags of the input image in accordance with a predefined ranking function as applied to the tag pair weights. | 01-17-2013 |
20130014087 | SYNCHRONIZATION COVERAGE IN LOGIC CODE - A method for enhancing synchronization coverage for a logic code is provided. The method comprises tracking whether one or more code sections in the logic code are blocked by at least another code section in the logic code, or whether one or more code sections in the logic code are blocking at least another code section in the logic code, during one or more test runs; and including one or more delay mechanisms in the logic code to introduce a delay in execution of a first code section in the logic code, wherein length of introduced delay is dependent on whether the first code section was blocked by a second code section or whether the first code section was blocking the second code section. | 01-10-2013 |
20130013179 | System and Method for Self-Optimizing Traffic Flow Using Shared Vehicle Information - A system and method for self-optimizing traffic flow using shared vehicle information that utilizes multiple controllers in dynamic communication to optimize the flow of traffic. The system and method utilizes one or more traffic synchronization controllers (TSCs) (receivers) that receive information from one or more vehicle based transmitters called vehicle information agents (VIAs) and/or a network of traffic control devices (TCDs) associated with the traffic synchronization controllers to determine a variety of information related to traffic within a geographic region, including volume, speed, destination, intended route of the vehicle, as well as other vehicle related information, in order to determine the optimal flow of traffic within the region. The system and method then transmits traffic control signals to the various traffic control devices within the region or adjacent regions in order to optimally control the flow of traffic. The system and method may also share information amongst traffic synchronization controllers within the network in order to optimize the flow of traffic over a larger region. | 01-10-2013 |
20130011023 | REFLEXIVE IRIS TEMPLATE - A system, method and program product for providing a reflexive data collection system. A system is provided that includes: a system for defining a set of environmental conditions; a device for automatically implementing the set of environmental conditions; a system for collecting biometric data under the set of environmental conditions; and a system for encoding the biometric data and the set of environmental conditions into a reflexive template. | 01-10-2013 |
20130007528 | USING REVERSE TIME FOR COVERAGE ANALYSIS - Coverage analysis may be performed using reverse time. The coverage analysis may be based on last hit data. The last hit data may comprise a timestamp indicating a last time in which a coverage event was covered. Utilizing last hit data instead of first hit data as is known in the art enables distinction between coverage goals that were never covered and coverage goals that were not covered lately. | 01-03-2013 |
20130007390 | CONCURRENT DATA PROCESSING USING SNAPSHOT TECHNOLOGY - A method for processing data using snapshots is provided. The method comprises generating a primary snapshot of data stored in a first storage medium, wherein the primary snapshot is a copy of the data stored in the first storage medium at a point in time; generating one or more secondary snapshots of the primary snapshot, wherein the secondary snapshots are copies of the data stored on the first storage medium at the point in time; and extracting the data stored in the first storage medium at the point in time by accessing the data included in the secondary snapshots, wherein multiple processing units concurrently transform the extracted data and load the transformed data onto a second storage medium. | 01-03-2013 |
20130006976 | SEARCH TOOL THAT UTILIZES SCIENTIFIC METADATA MATCHED AGAINST USER-ENTERED PARAMETERS - A method for providing proximate dataset recommendations can begin with the creation of metadata records corresponding to datasets that represent scientific data by a scientific dataset search tool. The metadata records can conform to a standardized structural definition, and may be hierarchical. Values for the data elements of the metadata records can be contained within the datasets. Metadata records with a value that is proximate to a user-entered search parameter can be identified. A proximity score can be calculated for each identified metadata record. The proximity score can express a relevance of the corresponding dataset to the user-entered search parameters. The identified metadata records can be arranged in descending order by the calculated proximity rating, creating a list of proximate dataset results. The proximate dataset results can be presented within a user interface. | 01-03-2013 |
20130006635 | METHOD AND SYSTEM FOR SPEAKER DIARIZATION - A method and system for speaker diarization are provided. Pre-trained acoustic models of individual speaker and/or groups of speakers are obtained. Speech data with multiple speakers is received and divided into frames. For a frame, an acoustic feature vector is determined extended to include log-likelihood ratios of the pre-trained models in relation to a background population model. The extended acoustic feature vector is used in segmentation and clustering algorithms. | 01-03-2013 |
20120331453 | VECTORIZATION OF PROGRAM CODE - A method for vectorization of a block of code is provided. The method comprises receiving a first block of code as input; and converting the first block of code into at least a second block of code and a third block of code. The first block of code accesses a first set of memory addresses that are potentially misaligned. The second block of code performs conditional leaping address incrementation to selectively access a first subset of the first set of memory addresses. The third block of code accesses a second subset of the first set of memory addresses starting from an aligned memory address, simultaneously accessing multiple memory addresses at a time. No memory address belongs to both the first subset and the second subset of memory addresses. | 12-27-2012 |
20120331449 | DEVICE, METHOD AND COMPUTER PROGRAM PRODUCT FOR EVALUATING A DEBUGGER SCRIPT - A method for evaluating a debugger script, the method includes: (i) receiving a debugger script that includes a first debugger breakpoint that is associated with a certain program line number; and determining a validity of the first debugger breakpoint in response to a comparison between expected content associated with the first debugger breakpoint and between an actual content of at least a portion of a certain program line group that comprises a certain program line identified by the certain program line number. | 12-27-2012 |
20120313153 | SYSTEM AND METHOD OF PLATING CONDUCTIVE GATE CONTACTS ON METAL GATES FOR SELF-ALIGNED CONTACT INTERCONNECTIONS - According to one embodiment of the invention, the gate contact is formed by a selective deposition on the gate electrode. One acceptable technique for the selective deposition is by plating. Plating is one process by which a metal structure, such as a gate contact, may be formed directly on the gate electrode. The plating is carried out by immersing the semiconductor die in a plating solution with the gate electrode exposed. The gate contact is plated onto the gate electrode and thus is ensured of being fully aligned exactly to the gate electrode. After this, the appropriate dielectric layers are formed adjacent the gate contact and over the source and drain to ensure that the gate electrode is electrically isolated from other components of the transistor. | 12-13-2012 |
20120313144 | RECESSED GATE FIELD EFFECT TRANSISTOR - A semiconductor device having a gate positioned in a recess between the source region and a drain region that are adjacent either side of the gate electrode. A channel region is below a majority of the source region as well as a majority of the drain region and the entire gate electrode. | 12-13-2012 |
20120304192 | LIFELINE-BASED GLOBAL LOAD BALANCING - Work-stealing is efficiently extended to distributed memory using low degree, low-diameter, fully-connected directed lifeline graphs. These lifeline graphs include k-dimensional hypercubes. When a node is unable to find work after w unsuccessful steals, that node quiesces after informing the outgoing edges in its lifeline graph. Quiescent nodes do not disturb other nodes. Each quiesced node reactivates when work arrives from a lifeline, itself sharing this work with its incoming lifelines that are activated. Termination occurs when computation at all nodes has quiesced. In a language such as X10, such passive distributed termination is detected automatically using the finish construct. | 11-29-2012 |
20120284346 | Requesting Computer Data Assets - A computer management apparatus, method and computer program operable for displaying a data file on a client computer, wherein the data file comprises a structure file and a first plurality of data elements, the apparatus comprising: a send component operable for sending a first message comprising a request for the structure file; a receive component operable for receiving the structure file; an evaluate component operable for determining a second plurality of data elements, wherein the second plurality of data elements is associated with a visible area; a send component further operable for sending a second message, wherein the second message comprises a request for the second plurality of data elements; a receive component further operable for receiving the second plurality of data elements; and a display component, responsive to receipt of the second plurality of data elements, operable for displaying the second plurality of data elements in the visible area. | 11-08-2012 |
20120284267 | Item Randomization with Item Relational Dependencies - An embodiment of the invention provides a method and system for randomizing items within a storage device. A linkage module links a first linked item in the storage device to one or more second linked items in the storage device based on attributes of the items. The linking is performed without input from a user of the storage device. The second linked item has at least one attribute in common with the first linked item. A list generating module connected to the linkage module generates a list, wherein the list includes a random sequence of items. The generating of the list groups the first linked item and the second linked item(s) in the list such that there are no items between the first linked item and the second linked item(s) in the list. | 11-08-2012 |
20120283971 | BUILT-IN AUTOMATED ELECTROSTATIC DISCHARGE MONITOR FOR COMPUTING UNITS - A method, computer program product, and computer system for monitoring for electrostatic discharge (ESD) events. An ESD monitor for potential of electrostatic discharge events in a sensed area through a plurality of ESD sensors coupled to the ESD monitor. The monitor senses for a charge level which could cause ESD event and entry of an operator into a sensed area. If an ESD event is detected, issue an ESD event alert to the operator and recording data to a tangible storage device; determine environmental factors at time and date of the ESD event; compare the ESD event and associated environmental factors to other ESD events with associated environmental factors; and determine if a correlation exists between the ESD event and associated environmental factors and the other ESD events with associated environmental factors. | 11-08-2012 |
20120278353 | SEARCHING WITH TOPIC MAPS OF A MODEL FOR CANONICAL MODEL BASED INTEGRATION - Receiving a search query from a user including a domain, a topic, a scope and a radix. Searching within a topic map based index of a topic map meta-model with instance ontology using as search parameters, the domain, the topic, the scope, and the radix of the search query. Displaying, for a user, results from the topic map meta-model with instance ontology which satisfy all of the search parameters of the search query. | 11-01-2012 |
20120266178 | System Providing Resources Based on Licensing Contract with User by Correcting the Error Between Estimated Execution Time from the History of Job Execution - A network system includes an application service provider (ASP) which is connected to the Internet and executes an application, and a CPU resource provider which is connected to the Internet and provides a processing service to a particular computational part (e.g., computation intensive part) of the application, wherein: when requesting a job from the CPU resource provider, the application service provider (ASP) sends information about estimated computation time of the job to the CPU resource provider via the Internet; and the CPU resource provider assigns the job by correcting this estimated computation time based on the estimated computation time sent from the application service provider (ASP). | 10-18-2012 |
20120239767 | Method to Change Instant Messaging Status Based on Text Entered During Conversation - An embodiment of the invention provides a method for communication within a system, wherein an instant messaging conversation is initiated between a first user and a second user. An indicator and a text entry are received from the first user during the instant messaging conversation. The status of the first user is changed, including automatically setting the text entry as the status of the first user, and automatically including the name of the second user in the status of the first user if preferences of the first user indicate that the name of the second user is to be included in the status of the first user. Further, the text entry is automatically sent to the second user if the preferences of the first user indicate that a text entry following the indicator is to be automatically sent to the second user. | 09-20-2012 |
20120222016 | Identifying Potential Lock Conditions in Transactional Software Applications - Methods for testing a transactional software application which interacts with a database structure. The software application includes a plurality of application units, which are adapted to be executed at least in part concurrently. The method includes executing the software application. Executing the software application includes executing a plurality of transaction operations on the database structure by a plurality of respective invocations of a database management system of the database structure by the respective plurality of application units. The method also includes determining locks being applied by the database management system on elements of the database structure for each transaction operation executed by each application unit individually. The method also includes identifying potential lock conditions of the software application in possible successions of application of the locks according to possible interleaving of the application units. | 08-30-2012 |
20120203912 | Autonomic computing system with model transfer - Methods and systems are provided for autonomic control and optimization of computing systems. A plurality of component models for one or more components in an autonomic computing system are maintained in a system level database. These component models are obtained from a source external to the management server including the components associated with the models. Component models are added or removed from the database or updated as need. A system level management server in communication with the database utilizes the component models maintained in the system level database and generic component models as needed to compute an optimum state of the autonomic computing system. The autonomic computing system is managed in accordance with the computed optimum state. | 08-09-2012 |
20120192078 | METHOD AND SYSTEM OF MOBILE VIRTUAL DESKTOP AND VIRTUAL TRACKBALL THEREFOR - A method and system for remote control of a desktop computer from a hand held mobile device having a display. A desktop screen image is split into regions, showing a part of a region on the screen of the mobile device. A virtual trackball is provided which includes a location button and trackball button. The location button operates as a virtual mouse which can be used to click on hotspots and when the virtual mouse cursor is about to cross the boundary of screen regions the next available screen region will smoothly slide onto the device screen. The trackball button is useable to switch between hotspots which can be identified through local image analysis. | 07-26-2012 |
20120185860 | Component Lock Tracing - Methods for lock tracing at a component level. The method includes associating one or more locks with a component of the operating system; initiating lock tracing for the component; and instrumenting the component-associated locks with lock tracing program instructions in response to initiating lock tracing. The locks are selected from a group of locks configured for use by an operating system and individually comprise locking code. The component lock tracing may be static or dynamic. | 07-19-2012 |
20120110664 | METHOD AND APPARATUS FOR AVOIDING DENIAL OF SERVICE IN WEB-SERVICE BASED SYSTEMS - The disclosure relates to a method for identifying and preventing propagation of a DOS attack on a WS-Notification NotificationBroker by inspecting the subscription request. If the address of the NotificationConsumer identified by the subscription request is equivalent to that of the NotificationBroker then the subscription request is rejected. | 05-03-2012 |
20120084580 | Power Budget Allocation in Multi-Processor Systems - Systems, apparatuses, methods, and software that implement power budget allocation optimization algorithms in multi-processor systems, such as server farms. The algorithms are derived from a queuing theoretic model that minimizes the mean response time of the system to the jobs in the workload while accounting for a variety of factors. These factors include, but are not necessarily limited to, the type of power (frequency) scaling mechanism(s) available within the processors in the system, the power-to-frequency relationship(s) of the processors for the scaling mechanism(s) available, whether or not the system is an open or closed loop system, the arrival rate of jobs incoming into the system, the number of jobs within the system, and the type of workload being processed. | 04-05-2012 |
20120075925 | PCRAM With Current Flowing Laterally Relative to Axis Defined By Electrodes - An improved phase change memory device has a phase change structure including a thin part between a contact surface of an electrode and a dielectric structure. For example, the thin part has a maximum thickness that is smaller than a maximum width of the contact surface of the electrode. In another example, the phase change structure surrounds the dielectric structure. Several variations improve the contact between the phase change structure and an electrode. | 03-29-2012 |
20120023175 | Method to Change Instant Messaging Status Based on Text Entered During Conversation - An embodiment of the invention provides a method for communication within a system, wherein an instant messaging conversation is initiated between a first user and a second user. An indicator and a text entry are received from the first user during the instant messaging conversation. The status of the first user is changed, including automatically setting the text entry as the status of the first user, and automatically including the name of the second user in the status of the first user if preferences of the first user indicate that the name of the second user is to be included in the status of the first user. Further, the text entry is automatically sent to the second user if the preferences of the first user indicate that a text entry following the indicator is to be automatically sent to the second user. | 01-26-2012 |
20110320722 | MANAGEMENT OF MULTIPURPOSE COMMAND QUEUES IN A MULTILEVEL CACHE HIERARCHY - An apparatus for controlling access to a pipeline includes a plurality of command queues including a first subset of the plurality of command queues being assigned processes the commands of first command type, a second subset of the plurality of command queues being assigned to process commands of the second command type, and a third subset of the plurality of the command queues not being assigned to either the first subset or the second subset. The apparatus also includes an input controller configured to receive requests having the first command type and the second command type and assign requests having the first command type to command queues in the first subset until all command queues in the first subset are filled and then assign requests having the first command type to command queues in the third subset. | 12-29-2011 |
20110279713 | Photo Sensor Array Using Controlled Motion - A movable sensor including a plurality of photo pixel sites arranged in an array comprising a photo sensor and a neutral density filter filtering the photo sensor. Each of the neutral density filters have a density value that are graduated over a range of densities. The sensor is linearly movable across an image. Each point in the image is exposed to at least one pixel site with the graduated density values and each of the photo pixel sites of the array is exposed to a same light input during a time span of exposure, such that the image is captured at a defined range of exposure values and can be combined into a single high dynamic range image. | 11-17-2011 |
20110194678 | System and Method for Handling Telephone Interruptions - A system and method for handling telephone call interruptions from a common telephone number or common user that provides the user with intelligent options to efficiently manage the interruption. The system is particularly efficient in handling interruptions that involve voicemail messages. The system identifies matches of outgoing calls to and incoming calls from common numbers and/or users and presents various options to the user to handle the call. These options include allowing the user to cancel or delete voicemail messages that are in progress while simultaneously accepting the incoming call. | 08-11-2011 |
20110161936 | METHOD AND APPARATUS FOR REGRESSION TESTING SELECTION FOR A FRAMEWORK-BASED APPLICATION - A selection method and related application is provided for a framework-based application having programming applications with both language program files and configuration files. In one embodiment, the method comprises abstracting a frame configuration model instance by analyzing configuration files prior to any modifications made to the program. The frame configuration model instance denoting individual configuration nodes in the framework model and further defining relationship between one or more code units in the configuration nodes and program code units in the application. Then one or more control test cases are constructed by profiling select test cases of the application, wherein the control flow consists of code units traversed during test case execution and control flow of said code units. Subsequently, an extended control flow is obtained by correlating configuration nodes in the framework configuration model instance with the code units in said control flow. | 06-30-2011 |
20110147794 | STRUCTURE AND METHOD FOR A SILICON CONTROLLED RECTIFIER (SCR) STRUCTURE FOR SOI TECHNOLOGY - A design structure is embodied in a machine readable medium for designing, manufacturing, or testing a design. The design structure includes a P+-N body diode and an N+-P body diode. The P+-N body diode and the N+-P body diode are laterally integrated. | 06-23-2011 |
20110119236 | CENTRAL DATABASE SERVER APPARATUS AND METHOD FOR MAINTAINING DATABASES ON APPLICATION SERVERS - A central database server ( | 05-19-2011 |
20110113233 | SYSTEM, SERVER, METHOD, AND COMPUTER PROGRAM FOR RELAYING ELECTRONIC MAIL - A system, a server, a method, and a computer program are described for relaying an electronic mail without a leak of secret information included in a quoted electronic mail to an unintended recipient without impairing the usability of the electronic mail system. The server receives an electronic mail that is newly created by one of the clients with quotation from one or a plurality of electronic mails received in the past. The server determines, for each quoted electronic mail quoted in the received electronic mail, whether a destination designated in the received electronic mail is included in an originator and a destination set in each quoted electronic mail. The server edits the content of each quoted electronic mail that is determined not to include the destination designated in the received electronic mail. The server transfers the electronic mail including the edited quoted electronic mail to the designated destination. The server stores edition information for returning the edited quoted electronic mail to a state before the editing in association with information that identifies the received electronic mail. | 05-12-2011 |
20110083126 | Detecting Impact of Operating System Upgrades - Methods, systems, and products for detecting impact of operating system upgrades on software components. Embodiments detect the impact of differences between a current operating system and an upgraded operating system. The operating system is configured to provide a run-time environment. In one embodiment, a method comprises detecting a call from a software entity running on a first data processing system to the current operating system of the data processing system; recording the detected call in a data structure configured to contain one or more recorded calls; scanning the upgraded operating system on a second data processing system upon which the upgraded operating system is installed and running, before execution of the software entity in the run-time environment of the upgraded operating system, to identify the recorded calls in the data structure that are not supported by the upgraded operating system; and presenting an indication of the identified calls. | 04-07-2011 |
20110078499 | BUSINESS PROCESS ERROR HANDLING THROUGH PROCESS INSTANCE BACKUP AND RECOVERY - According to one embodiment of the present invention, a method for business process error handling through process instance backup and recovery includes the step of creating a backup profile of selected one or more portions of a business process model at modeling stage. The method also includes the steps of deploying the backup profile into a runtime environment, and upon occurrence of an error in execution instances of the business process model, re-executing at least one of the one or more portions of the backup profile to recover from the error. | 03-31-2011 |
20110077797 | COOLING SYSTEM - A method of operating a cooling system for a hardware component is disclosed. The cooling system comprises one or more cooling devices and the method comprising the steps of monitoring commands that result in one or more operations for the hardware component, detecting a command that will result in a processing intensive operation for the hardware component, and operating a cooling device to cool the hardware component, in response to the detected operation. In a preferred embodiment, following the detection of a command that will result in a processing intensive operation for the hardware component, a predefined profile for the specific operation is accessed, and the operation of the cooling device to cool the hardware component, in response to the detected operation, comprises operating the cooling device according to predefined profile. The profile can be created automatically following previous operations. | 03-31-2011 |
20110075447 | SINGLE STAGE POWER CONVERSION UNIT WITH CIRCUIT TO SMOOTH AND HOLDUP DC OUTPUT VOLTAGE - The Power Conversion Unit includes a single stage rectifier circuit that generates a DC voltage which is stored on a first capacitor. A circuit arrangement connected to the first capacitor monitors the DC voltage at the capacitor and other predefined signals to generate signals for smoothing ripples associated with the DC voltage and maintains the DC voltage at a predefined level for a predefined time interval. The holdup and smoothing voltages are generated by developing and storing a high voltage on a second capacitor. A switching device connected to the second capacitor causes energy to flow from the second capacitor into the primary winding of a transformer whose secondary winding are switched to deposit the energy stored in said transformer onto the first capacitor. A circuit for charging the second capacitor is also provided. | 03-31-2011 |
20110066860 | Virtual World Embedded Security Watermarking - A method, apparatus, and program product are provided for using watermarks to embed security features on avatars in a virtual world. A watermark engine receives security information for an avatar in a virtual world. The watermark engine creates a watermark for the avatar using the security information and associates the watermark with the avatar. The watermark may comprise at least one of: security preferences for the avatar, contact information for an owner of the avatar, and graphical information to cause alteration of the avatar when the avatar is recorded. | 03-17-2011 |
20110055175 | SYSTEM, METHOD, AND APPARATUS FOR MANAGEMENT OF MEDIA OBJECTS - A computer program product that includes a computer useable storage medium to store a computer readable program for tracking media object data that, when executed on a computer, causes the computer to perform operations. The operations include storing usage data for a media object which is used in a first message. The usage data indicates historical usage of the media object by a user. The operations also include recalling the stored usage data for the media object in response to associating the media object with a second message. The operations also include communicating to the user the stored usage data corresponding to the media object prior to sending the second message with the media object to a recipient. | 03-03-2011 |
20110033090 | REFLEXIVE IRIS TEMPLATE - A system, method and program product for providing a reflexive data collection system and a reflexive data verification system. A system is provided that includes: a system for defining a set of environmental conditions; a device for automatically implementing the set of environmental conditions; a system for collecting biometric data under the set of environmental conditions; and a system for encoding the biometric data and the set of environmental conditions into a reflexive template. A further system is provided that includes a system for retrieving and decoding a reflexive template associated with the individual to obtain at least one biometric data value and a set of environmental conditions under which the at least one biometric data value was obtained; a device for implementing the set of environmental conditions; a system for collecting at least one new biometric data value under the set of environmental conditions; a system for comparing the at least one biometric data value with the at least one new biometric data value to determine if a match exists; and a system for outputting a verification result. | 02-10-2011 |
20110029105 | Filtering Application Sounds - A system, method, and program product are provided for filtering sound from a selected application on a computer without interrupting voice communications on the computer. The method comprises: monitoring a selected program for an outgoing digital audio signal from a selected application; detecting said digital audio signal; and filtering an analog microphone input with the digital audio signal. | 02-03-2011 |
20110016074 | METHOD AND SYSTEM FOR ENCAPSULATION AND RE-USE OF MODELS - A method and system are provided for encapsulation and re-use of a model. A modeling platform creates a governance contract governing the exportation and modification of elements of the model by other models. In response to a request to import at least one element of the model into a second model, the modeling platform exports the requested at least one element by reference only if the element has a governance setting that allows for exportation. In response to a request to modify at least one imported element of the model in the second model, the modeling platform determines the governance setting for the element. Then, the modeling platform modifies the element by composing the modification in the second model only if the element has a governance setting that allows modification. | 01-20-2011 |
20100325738 | DYNAMIC DUAL PERMISSIONS-BASED DATA CAPTURING AND LOGGING - Embodiments of the present invention address deficiencies of the art in respect to application data logging and provide a novel and non-obvious method, system and computer program product for capturing and logging application data. In an embodiment of the invention, a method for capturing and logging application data can include consulting both administrative permissions for capturing and logging application data, and also user permissions for capturing and logging application data. Subsequently, application data can be captured and logged only if permitted by the administrative permissions and the user permissions. In this regard, it can be determined from either or both of the permissions whether capturing and logging of application data is permitted generally, and also a type or portion of the application data that is permitted to be captured and logged. | 12-23-2010 |
20100269053 | METHOD FOR SECURITY AND MARKET SURVEILLANCE OF A VIRTUAL WORLD ASSET THROUGH INTERACTIONS WITH A REAL WORLD MONITORING CENTER - An embodiment of the invention provides a method for security and market surveillance of a virtual world asset through interactions with a real world monitoring center. The method monitors at least one virtual world object in a virtual world, including detecting at least one virtual world event associated with the virtual world object. A notification of the virtual world event is received by a real world operations center. In response to the receiving of the notification, the real world operations center automatically sends the real world response to an end user and/or the virtual world response to the virtual world. The real world response includes a telephone call, a text message, an email, an audible alert, and/or a silent alert. | 10-21-2010 |
20100251239 | Component Lock Tracing - Methods, systems, and products for lock tracing at a component level. The method includes associating one or more locks with a component of the operating system; initiating lock tracing for the component; and instrumenting the component-associated locks with lock tracing program instructions in response to initiating lock tracing. The locks are selected from a group of locks configured for use by an operating system and individually comprise locking code. The component lock tracing may be static or dynamic. | 09-30-2010 |
20100174923 | Regulating Power Consumption - Methods, systems, and design structures for providing power-regulated multi-core processing. The method includes determining a configuration of processing cores for optimal power consumption. The configuration of processing cores for optimal power consumption comprises a managing core and zero or more active processing cores wherein the active processing cores are selected from one or more available processing cores operatively coupled to the managing core. The managing core receives processing requests and processes them by dynamically retaining or distributing power to the configuration of processing cores. The managing core presents an appearance of a single core to an electronic system comprising the processing cores. | 07-08-2010 |
20100141778 | PHOTOGRAPH AUTHORIZATION SYSTEM - An electronic photographic device that automatically communicates an authorization signal that enables receivers of the authorization signal to authorize use of a likeness captured in a photographic image. The electronic authorization device includes an image capture mechanism for capturing the photographic image, a controller for initiating photographic authorization by generating an authorization signal at the capture of the photographic image by the image capture mechanism and a transmitter for transmitting the authorization signal generated by the controller towards a physical location at which the photographic image is captured. The authorization signal identifies a website URL at which information relating to the captured photographic image can be accessed to allow a person who has received the authorization signal to access the website and provide or deny an authorization for its use. | 06-10-2010 |
20100141665 | System and Method for Photorealistic Imaging Workload Distribution - A graphics client receives a frame, the frame comprising scene model data. A server load balancing factor is set based on the scene model data. A prospective rendering factor is set based on the scene model data. The frame is partitioned into a plurality of server bands based on the server load balancing factor and the prospective rendering factor. The server bands are distributed to a plurality of compute servers. Processed server bands are received from the compute servers. A processed frame is assembled based on the received processed server bands. The processed frame is transmitted for display to a user as an image. | 06-10-2010 |
20100141652 | System and Method for Photorealistic Imaging Using Ambient Occlusion - Scene model data, including a scene geometry model and a plurality of pixel data describing objects arranged in a scene, is received. A first pixel data of the plurality of pixel data is selected. A primary pixel color and a primary ray are generated based on the first pixel data. If the primary ray intersects an object in the scene, an intersection point, P is determined. A surface normal, N, is determined based on the object intersected and the intersection point, P. A primary hit color is determined based on the intersection point, P. The primary pixel color is modified based on the primary hit color. A plurality of ambient occlusion (AO) rays are generated based on the intersection point, P and the surface normal, N, with each AO ray having a direction, D. For each AO ray, the AO ray direction is reversed, D, the AO ray origin, O, is set to a point outside the scene. Each AO ray is marched from the AO ray origin into the scene to the intersection point, P. If an AO ray intersects an object before reaching point P, that AO ray is excluded from ambient occlusion calculations. If an AO ray does not intersect an object before reaching point P, that ray is included in ambient occlusion calculations. Ambient occlusion is estimated based on included AO rays. The primary pixel color is shaded based on the ambient occlusion and the primary hit color and an image is generated based on the primary pixel color for the pixel data. | 06-10-2010 |
20100134145 | System and Method for Converting Between CML Signal Logic Families - A system includes a first CML buffer configured to receive a first bias signal and a first CML signal of a first CML logic family. The first CML buffer produces a second CML signal of the first CML logic family based on the first CML signal and the first bias signal. A first coupling capacitor module couples to the first CML buffer. The first coupling capacitor module receives the second CML signal and produces a third CML signal based on the second CML signal. A second CML buffer couples to the coupling capacitor module and receives a second bias signal and the third CML signal, producing a fourth CML signal of a second CML logic family. A feedback module couples to the second CML buffer and receives the fourth CML signal producing a fifth CML signal. The second CML buffer is produces the fourth CML signal based on the second bias signal, the third CML signal, and the fifth CML signal. | 06-03-2010 |
20100083266 | METHOD AND APPARATUS FOR ACCESSING A SHARED DATA STRUCTURE IN PARALLEL BY MULTIPLE THREADS - A method of accessing a shared data structure in parallel by multiple threads in a parallel application program is disclosed, in which a lock of the shared data structure is granted to one thread of the multiple threads, an operation of the thread which acquires the lock is performed on the shared data structure, then an operation of each thread of the multiple threads which does not acquire the lock is buffered, and finally the buffered operations are performed on the shared data structure when another thread of the multiple threads subsequently acquires the lock. By using this method, the operations of other threads which do not acquire the lock of the shared data structure can be buffered automatically when the shared data structure is locked by one thread, and all the buffered operations can be performed when another thread acquires the lock. Therefore when the shared data structure is modified, the occurences of an element shift in the shared data structure can be greatly reduced and the access performance of the multiple threads can be improved. A corresponding apparatus and program product are also disclosed. | 04-01-2010 |
20100083099 | XML Streaming Parsing with DOM Instances - An apparatus, method, and program product are provided for parsing a document. A match point tuple is passed to a parser instance. The match point tuple comprises a match point. The parser instance stream parses an XML stream. In response to a match point statement in the XML stream matching the match point expression in the match point tuple, the parser instance constructs a DOM instance comprising XML content matching the match point. In a sample embodiment, the match point tuple further comprises a filter, and the parser instance adds XML statements that pass the filter to the DOM instance and discards statements that do not pass the filter. | 04-01-2010 |
20100077449 | Calculating multi-tenancy resource requirements and automated tenant dynamic placement in a multi-tenant shared environment - A method for assigning tenants of users to offering instances of an application or middleware includes representing a set of offerings as respective offering instances of the application or middleware available from a server, determining server resource capacity of the server, representing constraints associated with the tenants and the offering instances, generating a mapping of the tenants to the offering instances based on the server resource capacity and constraints, and assigning a tenant to an offering instance according to the mapping, wherein the offering instance is made accessible to the users of the assigned tenant. | 03-25-2010 |
20100063974 | IDENTIFYING OPTIMAL MULTI-SCALE PATTERNS IN TIME-SERIES STREAMS - A computer-implemented method, system, and a computer readable article of manufacture identify local patterns in at least one time series data stream. A data stream is received that comprises at least one set of time series data. The at least one set of time series data is formed into a set of multiple ordered levels of time series data. Multiple ordered levels of hierarchical approximation functions are generated directly from the multiple ordered levels of time series data. A set of approximating functions are created for each level. A current window with a current window length is selected from a set of varying window lengths. The set of approximating functions created at one level in the multiple ordered levels is passed to a subsequent level as a set of time series data. The multiple ordered levels of hierarchical approximation functions are stored into memory after being generated. | 03-11-2010 |
20100061382 | METHOD, APPARATUS AND COMPUTER PROGRAM FOR PROCESSING A MESSAGE USING A MESSAGE PROCESSING NODE - There is disclosed a method, apparatus and computer program product for processing a message using a message processing node. A message is received at the message processing node and at least one parameter value is extracted from the message. An attempt is made to select a node from a library of pre-configured nodes by using the at least one parameter value and the message is processed using the selected node. In attempting to select a node, an attempt is made to locate a pre-configured node that is appropriate for the message received and responsive to being unable to locate such a pre-configured node, a new node is configured using any parameter values extracted from the message. | 03-11-2010 |
20100028530 | High Performance Magnetic Tunnel Barriers with Amorphous Materials - A magnetic tunneling element is constructed from a MgO or Mg—ZnO tunnel barrier and an amorphous magnetic layer in proximity with the tunnel barrier. The amorphous magnetic layer includes Co and at least one additional element selected to make the layer amorphous. Magnetic tunnel junctions formed from the amorphous magnetic layer, the tunnel barrier, and an additional ferromagnetic layer have tunneling magnetoresistance values of up to 200% or more. | 02-04-2010 |
20100017385 | CREATING AND MANAGING REFERENCE ELEMENTS OF DEPLOYABLE WEB ARCHIVE FILES - In some embodiments a method includes creating a bookmark of a deployable web archives In some embodiments, the bookmark includes deployment and runtime information of current and prior invocations of the deployable web archive, at least one user- and/or author-defined external specified tag describing the deployable web archive, and/or reference/link/access information to the deployable web archives | 01-21-2010 |
20100009524 | METHOD FOR IMPROVING SEMICONDUCTOR SURFACES - A semiconductor fabrication method. The method includes providing a semiconductor substrate, wherein the semiconductor substrate includes a semiconductor material. Next, a top portion of the semiconductor substrate is removed. Next, a first semiconductor layer is epitaxially grown on the semiconductor substrate, wherein a first atom percent of the semiconductor material in the first semiconductor layer is equal to a certain atom percent of the semiconductor material in the semiconductor substrate. | 01-14-2010 |
20090328208 | METHOD AND APPARATUS FOR PREVENTING PHISHING ATTACKS - The disclosure generally relates to a method for preventing phishing attacks on a computer browser. The method includes the steps of: providing a web browser having a bookmark group; directing the browser to a first Uniform Resource Locator (“URL”) having a first URL address, the first URL address having a plurality of alpha-numeric characters pointing to a first IP address; saving the first URL address in the bookmark group as a first bookmark; receiving an email communication containing a second URL address, the second URL address having a plurality of alpha-numeric characters similar to the first URL address and purporting to point to the first IP address; comparing the first URL address with the second URL address; and determining whether the first URL address and the second URL address share an identical IP addresses. | 12-31-2009 |
20090327866 | SYSTEM AND METHOD FOR CREATING AN INTERNATIONALIZED WEB APPLICATION - A method and a system for creating an internationalized Web application are provided. The method comprises loading a Web page into a browser in response to an operation of activating the browser by a user; scanning a Document Object Model (DOM) tree of the Web page to find all contents which possibly need to be translated in the Web page, and marking the contents visibly on the browser; collecting information related to contents to be translated corresponding to a direct selection made by the user in the contents which are identified as possibly needing to be translated in response to the selection; and extracting the contents to be translated from the Web page according to the collected information and storing the contents to be translated, and storing translated contents corresponding to the contents to be translated. | 12-31-2009 |
20090307221 | METHOD, SYSTEM AND COMPUTER PROGRAMING FOR MAINTAINING BOOKMARKS UP-TO DATE - A solution is proposed for facilitating accessing resources of a data processing system with distributed architecture by a data processing entity of the system (with each resource that is accessible via a corresponding address). A set of bookmarks are provided for corresponding resources. Each bookmark is associated with a stored address of the corresponding resource—for accessing the corresponding resource in response to a selection of the bookmark. In the solution according to an embodiment of the invention, a signature identifying the corresponding resource is associated with each bookmark. Each bookmark is updated by verifying accessibility of the resource at the stored address matches the signature. The resource matching the signature is then located via a search engine in response to the non-accessibility of the resource. It is then possible to replace the stored address with a new address of the located resource. | 12-10-2009 |
20090300113 | Team-Based Task Invitations - A method for managing invitations to one or more events includes identifying an attribute required to perform an event. An invitation may be created so that invitees are selected according to the identified attribute required to perform the event. At least one person associated with a attribute may then be invited to attend the event. An invitation is sent to one or more persons associated with the attribute. | 12-03-2009 |
20090298206 | METHOD AND APPARATUS TO MINIMIZE STRESS DURING REFLOW PROCESS - Utilizing an appropriately configured laser interferometer, the warpage of a silicon chip can be easily monitored during the solder reflow attachment process in an effort to determine the amount of stress encountered by the chip. Warpage measurements can then be continuously monitored throughout the process and related data can be stored to easily suggest the level of warpage generated by various processing parameters. By dynamically monitoring warpage in conjunction with processing parameters, a correlation can be established between the various parameters chosen, and resulting warpage. Based upon this correlation, the evaluators can easily identify those parameters which produce minimum stress, thus avoiding potential for breakage and damage during reflow operations. | 12-03-2009 |
20090292742 | System, Method, and Computer Readable Media for Identifying a Log File Record in a Log File - A system, a method, and a computer readable media for identifying a log file record in a log file are provided. The log file has a plurality of log file records therein. The plurality of log file records has a repeating pattern of log file records. The method includes displaying a first graphical user interface on a display device. The method further includes selecting the log file utilizing the first graphical user interface. The method further includes analyzing the log file to determine the repeating pattern of log file records. The method further includes selecting a first command button on the first graphical user interface that executes an algorithm to analyze additional log file records that were automatically added to the log file by a software program. The additional log file records are associated with the repeating pattern of log file records. The method further includes storing the first log file record in a memory device if a first log file record in the additional log file records has at least one command-related attribute that does not correspond to command-related attributes in the repeating pattern of log file records. | 11-26-2009 |
20090282211 | Network On Chip With Partitions - Data processing with a network on chip (‘NOC’) that includes integrated processor (‘IP’) blocks, routers, memory communications controllers, and network interface controller, including: organizing the network into partitions; assigning all IP blocks of a partition a partition identifier (‘partition ID’) that uniquely identifies for an IP block a particular partition in which the IP block is included; establishing one or more permissions tables associating partition IDs with sources and destinations of data communications on the NOC, each record in the permissions tables representing a restriction on data communications on the NOC; executing one or more applications on one or more of the partitions, including transmitting data communications messages among IP blocks and between IP blocks and memory, each data communications message including a partition ID of a sender of the data communications message; and controlling data communications among the partitions in dependence upon the permissions tables and the partition IDs. | 11-12-2009 |
20090271199 | Records Disambiguation In A Multimodal Application Operating On A Multimodal Device - Methods, apparatus, and products are disclosed for record disambiguation in a multimodal application operating on a multimodal device, the multimodal device supporting multiple modes of interaction including at least a voice mode and a visual mode, that include: prompting, by the multimodal application, a user to identify a particular record among a plurality of records; receiving, by the multimodal application in response to the prompt, a voice utterance from the user; determining, by the multimodal application, that the voice utterance ambiguously identifies more than one of the plurality of records; generating, by the multimodal application, a user interaction to disambiguate the records ambiguously identified by the voice utterance in dependence upon record attributes of the records ambiguously identified by the voice utterance; and selecting, by the multimodal application for further processing, one of the records ambiguously identified by the voice utterance in dependence upon the user interaction. | 10-29-2009 |
20090271189 | Testing A Grammar Used In Speech Recognition For Reliability In A Plurality Of Operating Environments Having Different Background Noise - Methods, systems, and products for testing a grammar used in speech recognition for reliability in a plurality of operating environments having different background noise that include: receiving recorded background noise for each of the plurality of operating environments; generating a test speech utterance for recognition by a speech recognition engine using a grammar; mixing the test speech utterance with each recorded background noise, resulting in a plurality of mixed test speech utterances, each mixed test speech utterance having different background noise; performing, for each of the mixed test speech utterances, speech recognition using the grammar and the mixed test speech utterance, resulting in speech recognition results for each of the mixed test speech utterances; and evaluating, for each recorded background noise, speech recognition reliability of the grammar in dependence upon the speech recognition results for the mixed test speech utterance having that recorded background noise. | 10-29-2009 |
20090214780 | Negative Coefficient of Thermal Expansion Particles and Method of Forming the Same - A negative coefficient of thermal expansion particle includes a first bilayer having a first bilayer inner layer and a first bilayer outer layer, and a second bilayer having a second bilayer inner layer and a second bilayer outer layer. The first and second bilayers are joined together along perimeters of the first and second bilayer outer layers and first and second bilayer inner layers, respectively. The first bilayer inner layer and the second bilayer inner layer are made of a first material and the first bilayer outer layer and the second bilayer outer layer are made of a second material. The first material has a greater coefficient of thermal expansion than that of the second material. | 08-27-2009 |
20090172692 | Enterprise Resource Planning with Asynchronous Notifications of Background Processing Events - Methods, systems, and computer program products for operating an enterprise resource planning system. The method includes running a placeholder job in said enterprise resource planning system in response to a request from at least one client application for notification of at least one background processing event, wherein the placeholder job is executed in response to the at least one background processing event. | 07-02-2009 |
20090172034 | ENABLING SYMPTOM VERIFICATION - Systems, products and methods for enabling symptom verification. Verifying a symptom may include eliminating repeated symptom definitions or eliminating symptoms having low accuracy. A computer system enables verification of a symptom including a rule for detecting a set of events related to a given problem. The computer system includes a symptom database which stores the symptom, a specimen database which stores a specimen including a set of events detected according to a rule of a certain symptom, and an analysis unit which analyzes the specimen stored in the specimen database using a new symptom in order to determine whether to add the new symptom to the symptom database. The present disclosure also includes a method and a computer program for enabling verification of a symptom including a rule for detecting a set of events related to a given problem. | 07-02-2009 |
20090164256 | DEVICE, SYSTEM, AND METHOD OF COLLABORATIVE INSURANCE - Device, system and method of collaborative insurance. For example, a system for electronic insurance transactions includes: a server to receive a risk description posted through a customer terminal, to publish the risk description to one or more insurer terminals, and to determine whether or not to underwrite an insurance covering at least a portion of a risk included in the risk description based on an analysis of aggregated data, wherein the aggregated data comprises data related to said risk description and data related to one or more other posted risk descriptions. | 06-25-2009 |
20090150762 | ENTERING DATA INTO A WEBPAGE - Methods, systems, and computer program products for entering data into a web page by means of a data processing system. The method includes detecting a wireless device and forming a communication link between the data processing system and the wireless device. The method also includes retrieving data from the wireless device. The method also includes populating fields in the web-page with the retrieved data. | 06-11-2009 |
20090148100 | Aligner Apparatus for Connecting Optical Waveguides - Apparatus which adjusts an optical connection between a waveguide and an optical interconnection component that launches light into the waveguide or receives light emitted from the waveguide. The apparatus includes: an excitation light element emitting light that causes the waveguide to fluoresce into the waveguide via the optical interconnection component; an observation unit that observes the waveguide from a side face, different from the end face into which light is launched into the waveguide or light having propagated through the waveguide is emitted, and which receives fluorescent light emitted by the waveguide; and a connection adjusting component that adjusts the optical connection between the optical interconnection component and the waveguide based on the intensity of the fluorescent light received at the light observing section. | 06-11-2009 |
20090144706 | IDENTIFYING POTENTIAL LOCK CONDITIONS IN TRANSACTIONAL SOFTWARE APPLICATIONS - Methods, systems, and products for testing a transactional software application which interacts with a database structure. The software application includes a plurality of application units, which are adapted to be executed at least in part concurrently. The method includes executing the software application. Executing the software application includes executing a plurality of transaction operations on the database structure by a plurality of respective invocations of a database management system of the database structure by the respective plurality of application units. The method also includes determining locks being applied by the database management system on elements of the database structure for each transaction operation executed by each application unit individually. The method also includes identifying potential lock conditions of the software application in possible successions of application of the locks according to possible interleaving of the application units. | 06-04-2009 |
20090133120 | PREVENTING TRIVIAL CHARACTER COMBINATIONS - Methods, systems, and products for preventing the selection of trivial character combinations in passwords. Methods may include maintaining a database of trivial patterns representing sequences on the keyboard and independent from the starting point of the sequence. When a new password is proposed a check is done to verify if the pattern of the new password matches with an existing “forbidden” pattern and in such case it is refused by the system. Any number and kind of trivial patterns may be forbidden. The security administrator may choose patterns which should not be permitted. | 05-21-2009 |
20090132604 | STORING INFORMATION WITH A DESCRIPTION LOGIC FILE SYSTEM - Methods, systems, and products for storing information in a data processing system. The method includes providing a knowledge base for a file system manager that is adapted to organize a plurality of real files on a mass memory of the data processing system. The knowledge base defines a collection of knowledge that includes a set of concepts, a set of relations among the concepts, and a set of relations of inclusion that describe each real file as an instance of at least one concept. The method includes detecting a command for the file system manager for accessing a set of selected instances. The method also includes identifying a set of selected real files, which are described by the selected instances (according to the knowledge), and accessing the selected real files on the mass memory. | 05-21-2009 |
20090048776 | Stream Processing Based Intelligent Transport Systems - A stream processing system for processing a routing request specifying a first location and a destination location in a network of interconnected locations includes a plurality of data processing elements, a memory connected to the plurality of data processing elements for storing a plurality of maps having different scopes, wherein each of the data processing elements is associated with one of the plurality of maps and determines a section of a path from the first location to the destination location in the network of interconnected locations, and a routing selection element for merging the sections of the path as a solution to the routing request. | 02-19-2009 |
20090042414 | LAND GRID ARRAY FABRICATION USING ELASTOMER CORE AND CONDUCTING METAL SHELL OR MESH - Methods for fabricating Land Grid Array (LGA) interposer contacts that are both conducting and elastic. Also provided are LGA interposer contacts as produced by the inventive methods. Provided is LGA type which utilizes a pure unfilled elastomer button core that is covered with an electrically-conductive material that is continuous from the top surface to the bottom surface of the button structure. In order to obviate the disadvantages and drawbacks which are presently encountered in the technology pertaining to the fabrication and structure of land grid arrays using electrically-conductive interposer contacts, there is provided both methods and structure for molding elastomer buttons into premetallized LGA carrier sheets, and wherein the non-conductive elastomer buttons are surface-metallized in order to convert them into conductive electrical contacts. | 02-12-2009 |
20090015294 | LEAKAGE DEPENDENT ONLINE PROCESS VARIATION TOLERANT TECHNIQUE FOR INTERNAL STATIC STORAGE NODE - A device is disclosed for providing compensation current continuously to compensate for leakage current at the node of an electrical circuit, such as a chip. The device includes a dummy storage cell, a single staged current mirror circuit and a non reconfigurable keeper circuit. The keeper can be used to compensate for a wide range of leakage corners where the internal storage is located. The adaptive keeper circuit not only increases the robustness of the storage node against leakage caused by process variation but also improves the overall performance of the static storage device connected to the node. | 01-15-2009 |
20090010043 | Configurable SRAM System and Method - A static random access memory (SRAM) circuit includes first SRAM cell and a second SRAM cell that are configured to operate in a shared mode and/or an independent mode. In one example, a shared mode includes the sharing of a memory node of a first SRAM cell. In another example, an independent mode includes isolating a first SRAM cell from a second SRAM cell such that they operate independently. | 01-08-2009 |
20080307326 | SYSTEM, METHOD, AND SERVICE FOR INDUCING A PATTERN OF COMMUNICATION AMONG VARIOUS PARTIES - A communication pattern inducing system focuses on the propagation of topics amongst a plurality of nodes based on the text of the node rather than hyperlinks of the node. A node could represent a weblog or any other source of information such as person, a conversation, images, etc. The system utilizes a model for information diffusion, wherein the parameters of the model capture how a new topic spreads from node to node. The system further comprises a process to learn the parameters of the model based on real data and to apply the process to real (or synthetic) node data. Consequently, the system is able to identify particular individuals that are highly effective at contributing to the spread of topics. | 12-11-2008 |
20080294604 | XQUERY JOIN PREDICATE SELECTIVITY ESTIMATION - A method for estimating a selectivity of a join predicate in an XQuery expression is provided. The method provides for determining a first sequence size of a first sequence in the join predicate, determining a second sequence size of a second sequence in the join predicate, determining a type of comparison operator used between the first sequence and the second sequence, estimating the selectivity of the join predicate based on the first sequence size, the second sequence size, and the type of comparison operator used, selecting an execution plan for the XQuery expression based on the selectivity of the join predicate estimated, and executing the XQuery expression using the execution plan selected. | 11-27-2008 |
20080243735 | ACTIVE SAMPLING COLLABORATIVE PREDICTION METHOD FOR END-TO-END PERFORMANCE PREDICTION - Active sample collaborative prediction method, system and program storage device are provided. A method in one aspect may include determining approximation X for matrix Y using collaborative prediction, said matrix Y being sparse initially and representing pairwise measurement values; selecting one or more unobserved entries from said matrix Y representing active samples using said approximation X and an active sample heuristic; obtaining values associated with said unobserved entries; inserting said values to said matrix Y; and repeating the steps of determining, selecting, obtaining and inserting until a predetermined condition is satisfied. | 10-02-2008 |
20080243629 | APPARATUS, SYSTEM, AND METHOD FOR LOGICALLY PACKAGING AND DELIVERING A SERVICE OFFERING - An apparatus, system, and method are disclosed for logically packaging and delivering a service offering. A set of service implementation artifacts, a service ordering process, and a service provisioning process are selected and configured to implement a service offering. A requirements specification for the set of service implementation artifacts is defined. Logical associations between parameters are defined such that a change of a parameter for a first component triggers a change for a parameter of a second component. Beneficially, such an apparatus, system, and method accelerates the self-service ordering and deployment of service offerings. | 10-02-2008 |
20080235476 | Media Vaulting in an Automated Data Storage Library - Disclosed are a system, a method, and article of manufacture to provide for managing data storage media to provide secure storage of the data storage media in an automated data storage library. A logical library partition vault is created in the automated data storage library that is not accessible by any host computer. Data storage media in the logical library partition vault may only be accessed by an operator using a secure means. The logical library partition vault may comprise various components of the automated data storage library by assigning storage shelves, service bays, data storage media, data storage drives or other library components to the logical library partition vault. | 09-25-2008 |
20080233709 | METHOD FOR REMOVING MATERIAL FROM A SEMICONDUCTOR - A method for removing a material from a trench in a semiconductor. The method includes placing the semiconductor in a vacuum chamber, admitting a reactant into the chamber at a pressure to form a film of the reactant on a surface of the material, controlling the composition and residence time of the film on the surface of the material to etch at least a portion of the material, and removing any unwanted reactant and reaction product from the chamber or the surface of the material. | 09-25-2008 |
20080228831 | METHOD, SYSTEM AND PROGRAM FOR PRIORITIZING MAINTENANCE OF DATABASE TABLES - There is disclosed a data processing system implemented method, a data processing system, and an article of manufacture for directing a data processing system to maintain a database table associated with an initial maintenance scheduling interval. The data processing system implemented method includes selecting a randomizing factor, and selecting a new maintenance scheduling interval for the database table based on the initial maintenance scheduling interval and the selected randomizing factor. | 09-18-2008 |
20080212350 | CAM Asynchronous Search-Line Switching - This patent describes a method for switching search-lines in a Content Addressable Memory (CAM) asynchronously to improve CAM speed and reduce CAM noise without affecting its power performance. This is accomplished by resetting the match-lines prior to initiating a search and then applying a search word to the search-lines. A reference match-line is provided to generate the timing for the search operation and provide the timing for the asynchronous application of the search data on the SLs. Additional noise reduction is achieved through the staggering of the search data application on the SLs through programmable delay elements | 09-04-2008 |