40th week of 2009 patent applcation highlights part 81 |
Patent application number | Title | Published |
20090249252 | LIST-POSITION LOCATOR - A method, system, and medium are provided for efficiently locating a desired item within an ordered list of items, such as a list of contacts, pictures, or football teams. An illustrative method includes presenting a selectable option on a mobile device's display, presenting a positional indicator on the display when the selectable option has been selected that indicates to the user its position within the ordered list of items, and if the selectable option is moved, dynamically indicating the positional indicator's position among the list of items. The selection of the selectable option may be made by any object, such as a finger or stylus. Further, releasing the selection of the selectable option, such as removing the object used from the display, allows for a display of an item in the ordered list of items that corresponds to the position of the positional indicator. | 2009-10-01 |
20090249253 | DISPLAYING MNEMONIC ABBREVIATIONS FOR COMMANDS - Abbreviations are displayed for user-entered text commands, to facilitate discovery of keyboard shortcuts and to reinforce branding. Users enter commands by typing them into a text input field. Commands can be provided in a verb-noun structure, where the verb specifies what is to be done and the noun specifies the object or a parameter for the verb. Upon user entry of a command, or portion thereof, the entered portion is replaced by an abbreviation. The abbreviation can represent a single key, key combination, or multi-character string. The abbreviation can also include a logo or other graphic component, if desired. The abbreviation can replace the verb portion of the entered command, or it can be shown alongside or adjacent to the text input field, or it can be shown in an overlay or according to any other mechanism. A transition effect can be performed when introducing the abbreviation. | 2009-10-01 |
20090249254 | METHOD AND SYSTEM FOR SELECTING RECORDS FROM A DATABASE - The present invention relates generally to methods and systems for searching and retrieving records from a database and in particular to capturing a user's preferences to facilitate retrieval of records from the database in accordance with those preferences. The invention is suitable for use in applications in which the records retrieved from the database correspond to books, films, music or the like and it will be convenient to describe the invention in relation to that exemplary, but non-limiting, application. | 2009-10-01 |
20090249255 | Method of and System for Adaptive Suggestion of Directories When Saving Files - A method of adaptively suggesting directories when saving files receives a request to save a file. The file has a file name and the file was prepared with an application. If a portion of the file name and the application with which the file was prepared are associated in the table with a single directory, the method suggests the single directory for saving the file in the single directory. If the portion of the file name and the application are associated in a table with multiple directories, the method suggests one of the multiple directories having a greatest count value for saving the file. If a user saves the file in the single directory, the method increments a count value in the table for the single directory and updates a time and date in the table for the single directory. If the user saves the file in the one of the directories having the greatest count value, the method increments the count value in the table for the one of the directories having the greatest count value and updates the date and time in the table for the one of the directories having the greatest count value a date and time. | 2009-10-01 |
20090249256 | DYNAMIC CONTEXTUAL SHORTCUTS - Subject matter disclosed herein may relate to dynamically selecting and/or determining terms for use with contextual shortcuts in electronic documents such as, for example, web pages. | 2009-10-01 |
20090249257 | CURSOR NAVIGATION ASSISTANCE - A system and method include transitioning a cursor on a display towards a target, detecting an active cursor navigation control field around the target, and automatically positioning the cursor in a center region of the target when the cursor reaches the cursor navigation control field. | 2009-10-01 |
20090249258 | Simple Motion Based Input System - One embodiment a programmable device embodying a program of executable instructions to perform steps including assigning multiple tasks or symbols to each of a number of motion groups; segmenting motion data from sensor(s); matching the segments to motion groups; composing and then selecting task(s) or symbol sequence(s) from the task(s) and/or symbol(s) assigned to the matched motion groups. | 2009-10-01 |
20090249259 | High-Speed Low-Leakage-Power Standard Cell Library - A high-speed, low leakage-power Standard Cell Library is provided. The high-speed, low-leakage-power Standard Cell Library provides the extra drive-strength of a taller X-Track library (e.g., 14-Track library) and low leakage-power comparable to that of a smaller, N-Track library (e.g., 10-Track library). The high-speed, low leakage-power Standard Cell Library includes a set of cells each having a device area designed to provide maximum drive strength for the cell. The high-speed, low leakage-power Standard Cell Library further includes a second set of cells having varying device areas that provide reduced leakage power characteristics comparable to cells in the smaller, N-Track library. The modified reduced leakage-power cells are formed by adding padding to the cell to achieve a desired leakage-power characteristic of the cell. | 2009-10-01 |
20090249260 | DESCRIPTION PROCESSING DEVICE, DESCRIPTION PROCESSING METHOD, AND RECORDING MEDIUM - A receiving unit | 2009-10-01 |
20090249261 | METHOD AND APPARATUS FOR OPTIMIZING AN OPTICAL PROXIMITY CORRECTION MODEL - A method includes receiving optical profiles for a plurality of design target features associated with an integrated circuit device and optical profiles for a plurality of test features. An optical proximity correction (OPC) model including a plurality of terms is defined. Each term relates to at least one parameter in the optical profiles. A subset of the model terms is identified as being priority terms. Parameters of the optical profiles of the test features are matched to parameters of the optical profiles of the design target features using the priority terms to generate a set of matched test features. A metrology request is generated to collect metrology data from a test wafer having formed thereon at least a first subset of the matched test features and a second subset of the design target features. | 2009-10-01 |
20090249262 | BEHAVIORAL SYNTHESIS DEVICE, BEHAVIORAL SYNTHESIS METHOD, AND COMPUTER PROGRAM PRODUCT - A behavioral synthesis device include a profile unit that implements an electronic circuit at a reconfigurable hardware based on a first register transfer level description generated by a behavioral synthesis unit, actuates the implemented electronic circuit, and causes the electric circuit to output profile information from the actuated electronic circuit; and an optimizer that generates optimization information for optimizing a behavioral synthesis carried out by the behavioral synthesis unit based on the profile information that the profile unit causes the electric circuit to output, and outputs the generated optimization information to the behavioral synthesis unit, wherein the behavioral synthesis unit acquires a first behavioral level description, and subjects the acquired first behavioral level description to behavioral synthesis and generates the second register transfer level description based on the optimization information outputted by the optimizer. | 2009-10-01 |
20090249263 | SEMICONDUCTOR CIRCUIT DESIGN METHOD AND SEMICONDUCTOR CIRCUIT MANUFACTURING METHOD - A computer converts dimensions of design patterns of components of the transistors configuring the semiconductor circuit or component parameters extracted from in-design physical characteristics of the transistors into simulation parameters inputted to the simulator, organize the plurality of transistors included in the semiconductor circuit into a plurality of groups, selects any selection groups from the plurality of groups, sets fixed parameter values as component parameters of the non-selected groups other than the selection groups in the plurality of groups, sets the combinations of the component parameters in the selection groups, acquires circuit characteristics with respect to each combination of the component parameters, selects a group as a next selection group different from the selected groups, and repeatedly executing the setting the fixed parameter values through the selects a group as a next selection group different. | 2009-10-01 |
20090249264 | ANALYZING DEVICE FOR CIRCUIT DEVICE, CIRCUIT DEVICE ANALYZING METHOD, ANALYZING PROGRAM, AND ELECTRONIC MEDIUM - A circuit board analyzing method and a circuit board analyzer are provided which can greatly reduce analyzing time. The circuit board analyzer includes a computing unit | 2009-10-01 |
20090249265 | PRINTED CIRCUIT BOARD DESIGNING APPARATUS AND PRINTED CIRCUIT BOARD DESIGNING METHOD - A method for designing a printed circuit board includes: determining a distance along a conductive line between an electronic component and a signal source which are mounted on the printed circuit board, the signal source transmitting a signal to the electronic component; calculating a maximum distance for preventing a voltage across the electronic component in a steady state from being superimposed with a reflected signal reflected from at the signal source, the maximum distance being between the electronic component and the signal source, the voltage caused by the signal, and simulating whether an amplitude of a voltage applying across the electronic component is within a given range when the distance is longer than the maximum distance. | 2009-10-01 |
20090249266 | Displacing Edge Segments On A Fabrication Layout Based On Proximity Effects Model Amplitudes For Correcting Proximity Effects - Techniques for forming a mask fabrication layout for a physical integrated circuit design layout include correcting the fabrication layout for proximity effects using a proximity effects model. A proximity effects model is executed to produce an initial output. The initial output is based on a first position for a segment in a fabrication layout. The first position is displaced from a corresponding original edge in the original fabrication layout by a distance equal to an initial bias. The model is also executed to produce a second output based on a second position for the segment. The second position is displaced from the corresponding original edge by a distance equal to a second bias. An optimal bias for the segment is determined based on the initial output and the second output. The segment is displaced in the fabrication layout from the corresponding edge based on the optimal bias. | 2009-10-01 |
20090249267 | CONSTRAINED RANDOM SIMULATION COVERAGE CLOSURE GUIDED BY A COVER PROPERTY - One embodiment of the present invention provides a system which verifies a circuit design by biasing input stimuli for the circuit design to satisfy one or more temporal coverage properties to be verified for the circuit design. This system performs a simulation in which random input stimuli are applied to the circuit design. The system performs the simulation by using a finite state automaton (FSA) instance for a temporal coverage property to observe inputs and outputs of the circuit, and by using soft constraints associated with the FSA instance to bias the input stimuli for the circuit design so that the simulation is likely to progress through a sequence of states which satisfy the temporal coverage property. | 2009-10-01 |
20090249268 | WARNING DEVICE AND WARNING METHOD - A warning device checks for errors in design object data and issues a warning for detected errors by storing allowance information, which allows issuance of warning prevention, cancel information, which cancels relevant allowance information to permit issuance of warning for each error identification, and instruction identification, which identifies an edit command for editing generated design object data for error identification. When said edit command is accepted, the error identification for the instruction identification of edit command is acquired. Cancel information can be registered for error identification. Respective errors corresponding to error identifications are checked, when an operation for checking the design object data is accepted, and when a type of an error is identified, whether to issue a warning based on the allowance information and cancel information for relevant error identification is determined. | 2009-10-01 |
20090249269 | PROPERTY CHECKING SYSTEM, PROPERTY CHECKING METHOD, AND COMPUTER-READABLE STORAGE MEDIUM - Checking efficiency of property checking is improved. The operation synthesis tool synthesizes an RTL circuit description from a behavioral level circuit description. In addition, the property generating unit generates a behavioral level property from the behavioral level circuit description. Subsequently, the property converting unit converts the generated behavioral level property into an RTL property. The model checking unit then checks the RTL circuit description by model checking technique using the RTL property. | 2009-10-01 |
20090249270 | METHODS FOR PRACTICAL WORST TEST DEFINITION AND DEBUG DURING BLOCK BASED STATISTICAL STATIC TIMING ANALYSIS - Methods for analyzing timing of an integrated circuit using block-based static statistical timing analysis and for practical worst test definition and debug. The method includes building a timing graph, determining a slack for each of the nodes in the timing graph, and identifying a statistically worst slack for at least one of the nodes. The method further includes replacing this statistically worst slack with a proxy worst slack. | 2009-10-01 |
20090249271 | MICROCONTROLLER, CONTROL SYSTEM AND DESIGN METHOD OF MICROCONTROLLER - Two data processing units having the same function, one of which is used for a master and the other for comparison, are provided, control of a circuit unit is performed by the master, the master data processing unit and the circuit unit are operated in synchronization with a first clock signal, the second data processing unit is operated in synchronization with a second clock signal having the same cycle and different phase from the first clock signal, and processing results of both the data processing units are compared in a comparison circuit. Flip flops are disposed on a signal path from the circuit unit to the comparison data processing unit and on a signal path from the master data processing unit to the comparator, and both the first and second clock signals are used for latch clocks of the flip flops in accordance with input signals thereof. | 2009-10-01 |
20090249272 | STATISTICAL TIMING ANALYZER AND STATISTICAL TIMING ANALYSIS METHOD - A statistical timing analyzer comprises a statistical static-timing analyzing unit that performs a statistical static timing analysis of a semiconductor integrated circuit; a corner-condition determining unit that determines corner conditions of the semiconductor integrated circuit based on a result of the statistical static timing analysis; and a path-timing analyzing unit that performs a static timing analysis of the semiconductor integrated circuit based on the corner conditions. | 2009-10-01 |
20090249273 | LAYOUT CIRCUIT HAVING A COMBINED TIE CELL - A layout circuit is provided, comprising standard cells, a spare cell, combined tie cells and normal filler cells. The standard cells are disposed and routed on a layout area. The spare cell is added on the layout area and provided for replacing one of the standard cells while adding or changing functions later. The combined tie cells are added on the layout area. The normal filler cells are added on the rest of the layout area. The combined tie cell comprises a tie-high circuit, a tie-low circuit and a capacitance circuit. Some standard cells are disposed near at least one combined tie cell for avoiding routing congestion between the combined tie cells and the replaced standard cell. A circuit layout method is also provided. | 2009-10-01 |
20090249274 | INTEGRATED CIRCUIT DESIGN METHOD APPLIED TO A PLURALITY OF LIBRARY CELLS AND INTEGRATED CIRCUIT DESIGN SYSTEM THEREOF - A first library cell and a second library cell each includes a plurality of metal layers, and a metal track direction of the odd metal layers of the first library cell is perpendicular to that of the odd metal layers of the second library cell. An integrated circuit design method applied to these library cells includes the steps of rotating the second library cell to cause the metal track direction of the odd metal layers of the second library cell to be parallel to that of the odd metal layers of the first library cell, and placing the first library cell and the second library cell in an identical integrated circuit design. | 2009-10-01 |
20090249275 | METHOD OF SEMICONDUCTOR INTEGRATED CIRCUIT, RECORDING MEDIUM RECORDING DESIGN PROGRAM OF SEMICONDUCTOR INTEGRATED CIRCUIT, AND DESIGN SUPPORT APPARATUS OF SEMICONDUCTOR INTEGRATED CIRCUIT - A design method of a semiconductor integrated circuit carried out by a computer, including: a DRC step of performing a design rule check (Design Rule Check) with reference to layout information on an internal wiring in a capacitor cell and layout information on a signal wiring in the semiconductor integrated circuit; an integration step of integrating layout information on the internal wiring into layout information on the signal wiring when being determined in the DRC step that there is an error; and an elimination step of eliminating an error portion in the internal wiring from the integrated layout information. | 2009-10-01 |
20090249276 | METHODS AND SYSTEMS FOR FPGA REWIRING AND ROUTING IN EDA DESIGNS - Disclosed are a method and a system for improving FPGA routings of a circuit. The method comprises: identifying candidate alternative wires for a target wire to be replaced in the circuit according to a first preset rule; selecting a first set of alternative wires from the identified candidates according to a second preset rule; filtering the selected first set of candidates so as to reserve a second set of candidates; estimating wire replacing costs of the second set of candidates to select a third set of candidates that can improve FPGA delay performance of the circuit; and replacing the target wire with the selected third set of candidate alternative wires. | 2009-10-01 |
20090249277 | METHOD FOR CREATING UNIFIED BINARY FILES - A method for creating a unified binary file that may be executed on a plurality of hardware platforms. The unified binary file includes hardware independent code and a plurality of hardware dependent binary files for a variety of hardware platforms. When the unified binary file is executed on a supported hardware platform, an appropriate hardware dependent file is identified and installed. A method for preparing a software package supported on a plurality of hardware platforms for distribution. A unified binary file is created for each corresponding file of the software package. Each unified binary file includes installation directory information and dependent file information. | 2009-10-01 |
20090249278 | METHOD AND SYSTEM FOR IMPLEMENTING A COMPLETE SAP SYSTEM LANDSCAPE ON IBM SYSTEM i - A method of implementing a complete SAP system landscape on IBM System i is provided. This method involves preselecting at least one value-added reseller (VAR) for participation in implementing the complete SAP system landscape on IBM System i. The VAR then selects values for flexible parameters according to needs of a customer. The flexible parameters include languages for i5/OS and SAP, an amount of SAP ERC Central Component (ECC) systems ranging from one to three, an inclusion of a SAP Solution Manager, a client landscape, a configuration of SAP systems, and a level of software stack. The level of software stack includes a layer of the SAP systems, a layer implementing country-specific configuration, a layer implementing industry-specific configuration, and a layer of VAR added value. Media is created and implemented with the specified content at a factory using standard SAP procedures. A full backup of the SAP systems is then created using standard i5/OS operating system imaging. The media is restored by the VAR using the standard i5/OS operating system imaging at multiple customer sites. The VAR only need be an i5/OS system administrator having no knowledge about SAP on IBM System i to perform the operation. The VAR communicates feedback to the factory for improving the specified content. | 2009-10-01 |
20090249279 | Software appliance framework - The present invention relates to a method for automating the entire life cycle of a Software solution including construction, deployment, acceptance testing, reporting and maintenance the deployment of a software solution, comprising the step of:
| 2009-10-01 |
20090249280 | UPGRADING SIMPLE APPLICATIONS TO FULL SCALE SOLUTIONS - The architecture provides development tools for the occasional developer to build a substantial portion of an application interface for accessing and interacting with actual data. The lack in knowledge of the occasional developer to complete the project is then supplemented by a development service provider such that experienced developers complete the interface and integrate the interface into the application environment so the occasional developer can use the application to access data for which the interface was developed. The architecture provides tools that are understandable for building in a guided way the framework and the user experience for the application, and then passes on the more complex pieces to IT because coding may be needed or a model should be generated that is scalable for a large number of users, for example. IT then completes the development process and integrates the final solution into the application environment. | 2009-10-01 |
20090249281 | PERFORMANCE-RELATED DECISION SUPPORT FOR MODEL-DRIVEN ENGINEERING - A performance analysis model may be determined based on a development model associated with development of a software process, the development model defining an execution of the software process, and the performance analysis model being annotated with performance data characterizing the execution. At least one user-specified performance profile characterizing performance parameters associated with an improved execution of the software process according to the development model may be determined. An assessment computation model may be determined, using the performance analysis model and the at least one user-specified performance profile. At least one performance-based characteristic associated with the improved execution of the software process according to the development model may be determined. A performance assessment model may be determined using the assessment computation model and the performance-based characteristic, for use in modifying the development model based on the performance assessment model to obtain the improved execution of the software process. | 2009-10-01 |
20090249282 | CROSS PLATFORM COMPOSITIONAL WIDGETS - Mechanisms are afforded for supporting cross platform widgets. A generic widget can be converted into a specialized widget of a corresponding platform. Dually, a specialized widget can be generalized to a generic widget for subsequent deployment on the same or different host. Furthermore, support is provided for compositional widgets across platforms. | 2009-10-01 |
20090249283 | Modelling software appliance - The present invention relates to a method of creation of a software appliance remarkable in that it comprises at least the step of modelling the software appliance. Said step of modelling comprises the step of defining the following set of categories:
| 2009-10-01 |
20090249284 | AUTOMATION FOR VIRTUALIZED IT ENVIRONMENTS - A system automatically builds custom virtual appliances and/or other computing environments and their components, where applicable, based on user requirements and may offer a service for hosting, maintaining, monitoring and managing such appliances remotely. These virtual appliances may be delivered over a network, such as the Internet, and can be run at a customer site or at a hosting provider. Some embodiments of the invention can build these appliances using custom applications developed by customers. | 2009-10-01 |
20090249285 | Automatic Generation of Run-Time Instrumenter - A method and apparatus for automatically generating a run-time instrumenter are disclosed. In accordance with the illustrative embodiment, an off-line analyzer first determines instrumentation locations for a program under test in accordance with a method called the Super Nested Block Method. After the instrumentation locations have been determined, source code for a run-time instrumenter is automatically generated based on the source code for the program under test and the instrumentation locations. The source code for the program under test and the run-time instrumenter are then compiled into executables, and a testing tool then executes the program under test and the run-time instrumenter in parallel. | 2009-10-01 |
20090249286 | METHOD FOR DYNAMICALLY STREAMING AN XSLT TRANSFORMATION - A method in one embodiment includes receiving an XSLT transformation; analyzing the transformation for determining which information about the input is required to generate code that is streaming with respect to the rest of the input; calculating an algorithm which when given the required input information will then execute the entire XSLT transform in a streaming fashion; and generating code for: computing the information about the input that is required for the calculated streaming algorithm while simultaneously buffering all incoming input data. The method further includes storing the generated code; receiving incoming input data; running the generated code for computing the information that is required for the calculated streaming algorithm while simultaneously buffering incoming data; and once the required information has been computed: replaying the buffered data through the calculated streaming algorithm in a streaming manner; and finishing any remaining input through the calculated streaming version of the input algorithm in a streaming manner. | 2009-10-01 |
20090249287 | SYSTEM AND METHOD FOR AN INFRASTRUCTURE THAT ENABLES PROVISIONING OF DYNAMIC BUSINESS APPLICATIONS - A system and method for providing an infrastructure that can be provisioned for use with dynamic business applications. In accordance with an embodiment, the business application infrastructure comprises a plurality of drop-in components which can be added or provisioned as necessary to create a dynamic business application. For example, an integrated composition environment component can be provisioned to allow end-users to quickly develop business applications from an overall business process perspective. In accordance with other embodiments, the business application infrastructure can incorporate additional components as necessary to better support a particular business application, or a particular execution environment. | 2009-10-01 |
20090249288 | REBUILDABLE SERVICE-ORIENTED APPLICATIONS - A method includes receiving a selection of a predefined implementation variation for a variable service component in at least one computing device configured to implement a service-oriented application; and executing source code associated with the variable service component in response to receiving the selection, wherein the source code performs a predetermined rebuilding of at least a portion of the service-oriented application such that the variable service component is redefined according to the selected implementation variation. | 2009-10-01 |
20090249289 | DETECTING MEMORY ERRORS USING WRITE INTEGRITY TESTING - Methods of detecting memory errors using write integrity testing are described. In an embodiment, additional analysis is performed when a program is compiled. This analysis identifies a set of objects which can be written by each instruction in the program. Additional code is then inserted into the program so that, at runtime, the program checks before performing a write instruction that the particular object being written is one of the set of objects that it is allowed to write. The inserted code causes an exception to be raised if this check fails and allows the write to proceed if the check is successful. In a further embodiment, code may also be inserted to perform checks before indirect control-flow transfer instructions, to ensure that those instructions cannot transfer control to locations different from those intended. | 2009-10-01 |
20090249290 | METHOD AND SYSTEM FOR MANAGING ENTERPRISE CONTENT - A method and system for providing a consistent flow documents and data content across different organizational units of a company or agency where the documents and data come from different enterprise systems and data stores but are related to linked processes that share models for organizing the content in the business context and in a format that enables a user to relate the content to the process step or steps they are performing. The system includes a network service that enables a configuration utility to automatically discover the objects and metadata and provides for a mapping of selected fields of the metadata to regions displayed in the user interface view with provision for filtering the data by mapping selected fields to a user input form. Thereby, a business analyst can create solutions without writing and maintaining complex program logic for each combination of presentation environment, enterprise system and data store. | 2009-10-01 |
20090249291 | Method To Transfer Annotation Across Versions of the Data - A method, apparatus, and article are provided for managing migration of annotations between versions of source code. Annotations associated with patterns of source code are identified. A comparison of the modified source code is conducted in conjunction with the identified annotations in a prior version of the source code to determine if the annotations may be migrated to any portions of the modified source code. The comparison includes an exact match and a partial match. With respect to the partial match, a threshold value is employed to define the parameters of a partial match. All annotations that are determine to be an exact match or a partial match are automatically migrated to a location in the modified source code determine to match within the threshold value. | 2009-10-01 |
20090249292 | Processing strings based on whether the strings are short strings or long strings - The specification of a string within source code written in a programming language is received. The source code is processed for ultimate execution of a computer program encompassing the source code, by at least performing the following. It is determined whether the string specified is a short string or a long string. The string is processed in accordance with a first manner where the string is a short string. The string is processed in accordance with a second manner where the string is a long string. | 2009-10-01 |
20090249293 | Defining Workflow Processing Using a Static Class-Level Network in Object-Oriented Classes - Methods for configuring a computer-implemented workflow process in a computing environment include defining a workflow class using an underlying object oriented programming language of the computing environment as a metalanguage, and extending the workflow class with a static class-level model that defines a flow network, | 2009-10-01 |
20090249294 | CONVERTING RULES IN A RULE-BASED SYSTEM TO ONTOLOGICAL INFORMATION - A method and system provides one or more product type descriptions, and constructs a map between the sub-conditions of the product type descriptions and constructs in a Web Ontological Language (OWL). The method converts the product type description rules into new OWL classes by creating a new OWL class for each corresponding rule; adding the new OWL class to the OWL ontology; for each condition of the corresponding rule, extracting sub-conditions; for each the sub-condition extracted; creating new constructs for the new OWL class using the map; and adding new class restrictions to the new OWL class, wherein each of the new class restrictions relates to a corresponding condition of the corresponding rule. | 2009-10-01 |
20090249295 | SYSTEM FOR ESTIMATING A SOFTWARE PRODUCT RELEASE TIME FROM VERSION INFORMATION - Systems and processes for migration of data stored in a label-based software configuration management (CM) system to records of a time-based CM system in a manner that permits for identification, in the time-based system, of contents of releases. In some exemplary implementations, techniques operating according to some of the principles described herein will accept as input information relating to a listing of a label-based system and estimate, based on the software component versions in the listing and their corresponding creation times, a release time indicating a time a release was created. The release time may then be used, in some, but not necessarily all, implementations to create a data structure in the time-based system indicating contents of the version at the particular time. Some exemplary implementations may additionally determine, from the estimated release time, whether any software component versions should be explicitly included or excluded from the data structure. | 2009-10-01 |
20090249296 | INSTANTIATING A COMPOSITE APPLICATION FOR DIFFERENT TARGET PLATFORMS - A method, system, and computer program product for instantiating a composite application for different target platforms. In an exemplary manner, a template that describes a composite application having a plurality of application components is created. The template includes a composite application component assembly descriptor and a plurality of platform-specific handlers. The composite application component assembly descriptor lists each application component of the composite application. The platform-specific handlers handle the deployment of application components for the different target platforms. The composite application component assembly descriptor is evaluated to identify platform-specific implementations of the composite application components. The composite application is instantiated using one of the plurality of platform-specific handlers. The platform-specific handlers are included in the template for a platform-specific deployment for one of the plurality of target platforms. | 2009-10-01 |
20090249297 | Method and System for Automated Testing of Computer Applications - A system includes a testing device to test a computer application in conjunction with a testing tool, the testing device including a test automation engine to initiate a test, the test automation engine including a programmable data source that is testing tool universal, the programmable data source including one or more automation test scripts that define the test and a data storage device to store results from testing the computer application. | 2009-10-01 |
20090249298 | Evaluation of Software based on Change History - A method for software processing includes obtaining change information, which records changes that have been performed in respective locations in software code. The change information is processed so as to assign to at least some of the locations respective priorities, which are indicative of respective likelihoods that the locations contain program faults. The at least some of the locations are presented to a user in accordance with the assigned priorities. | 2009-10-01 |
20090249299 | Evaluation of Software based on Review History - A computer-implemented method for software processing includes obtaining review information pertaining to reviews that have been conducted on respective locations in software code. The review information is processed so as to assign to at least some of the locations respective priorities, which are indicative of respective likelihoods that the locations contain program faults. The at least some of the locations are presented to a user via an output device in accordance with the assigned priorities. | 2009-10-01 |
20090249300 | EVENT SET RECORDING - Recording of functional steps resulting from actions in an application is desirable for performing functional testing or user interface automation of an application. However, certain events that may result from actions occurring in an application are often difficult to record, which may lead to playback failure. Further, a user's intent when performing an action is difficult to determine. In order to obtain effective playback, a reliable and efficient recording of an application's functional steps needs to occur. Injecting wrapper functions into an application and monitoring an event generator's state before and after an action has occurred may yield more reliable and effective results. | 2009-10-01 |
20090249301 | Method and Apparatus for Testing Soft Error Rate of an Application Program - Techniques are provided for determining consequences of an injected fault on a system running a given application program or operating system, in order to measure the software impact of a hardware soft error on the application program/operating system. The application program software is emulated instruction-by-instruction, where source operands are randomly modified before an instruction is executed, and destination operands are randomly modified after an instruction is executed, in order to mimic hardware soft errors. In addition, a program counter is randomly modified after execution of a branch instruction. The resulting consequences of such modifications are monitored such that a fault of an instruction being executed is modeled in order to determine a soft error rate (SER) for a software application program or operating system. | 2009-10-01 |
20090249302 | Method and Apparatus to Trace and Correlate Data Trace and Instruction Trace for Out-of-Order Processors - In a data processing system, a marked bit is used to identify a data access instruction throughout the pipeline to indicate that the instruction meets user-specified criteria (e.g., a meets a data address range of interest). Based on the marked bit, an in-order program correlation message is generated which indicates when the data access instruction occurs relative to the instruction stream. The marked bit is also used to generate an in-order data trace message. As a result, the trace streams including only data access instructions meeting user-specified criteria may be post-processed and correlated precisely. | 2009-10-01 |
20090249303 | RANDOM ACCESS TO HISTORICAL PROGRAM STATE FOR ENHANCED DEBUGGING - A method in one embodiment includes: executing a program; performing testing on the program; logging every input to the program during the testing; logging every result during testing of the program; storing the logged results; and allowing a user to search the logged results. If a failure occurs during the testing: performing a comparison between a successful testing of the program and the failed testing of the program; rerunning the successful testing and the failed testing in parallel; analyzing the logged results for determining occurrence of events during testing of the program; generating a timeline of the events; and outputting the timeline of the events. | 2009-10-01 |
20090249304 | Code Instrumentation Method and Code Instrumentation Apparatus - A code instrumentation method and a code instrumentation apparatus for instrumenting object codes of programs to enable memory access tracing. The code instrumentation method includes: identifying an object code block to be executed circularly in object codes; identifying at least one memory access instruction in the object code block where a memory address to be accessed during the circular execution of the object code block keeps unchanged; and inserting a routine for tracing the memory access to be executed by the at least one memory access instruction outside the object code block. | 2009-10-01 |
20090249305 | Super Nested Block Method to Minimize Coverage Testing Overhead - A method for determining the number and location of instrumentation probes to be inserted into a program is disclosed. The method advantageously inserts the minimum number of probes that are required to obtain execution coverage for every node in the program's control-flow graph. In addition, the method requires only one bit to store each probe and does not require the assignment of weights to arcs or nodes of the control-flow graph. In the illustrative embodiment, the nodes of a control-flow graph are partitioned into non-empty sets, where each non-empty set corresponds to a super nested block of the program. | 2009-10-01 |
20090249306 | Off-Line Program Analysis and Run-Time Instrumentation - A technique is disclosed for determining off-line the number and location of instrumentation probes to be inserted into a program under testing, and subsequently instrumenting the program at run-time based on the off-line analysis. In accordance with the illustrative embodiment, an off-line analyzer first determines instrumentation locations for a program under test in accordance with a method called the Super Nested Block Method. After the instrumentation locations have been determined, a testing/monitoring tool executes the program and a run-time instrumenter in parallel. The run-time instrumenter accordingly inserts probes into the program, removes probes after they have been executed once, and generates and reports information about code coverage based on the probes. | 2009-10-01 |
20090249307 | PROGRAM ANALYSIS APPARATUS, PROGRAM ANALYSIS METHOD, AND PROGRAM STORAGE MEDIUM - There is provided with an apparatus which includes: an inputting unit which inputs a target program and address definition data, a first analyzer which generates definition-reference data associating a line number of a statement, an address of a definition variable and an address of a reference variable; a second analyzer which generates address dependency data that associates the address of the definition variable, the line number of a statement containing the definition variable, and the line number of a statement containing a reference variable of same address as the definition variable; a third analyzer which generates control dependency data that associates the line number of a control statement and the line number of a controlled-object statement; and an extracting unit which extracts a slice as a set of statements reached based on the control dependency data and the address dependency data starting from the statement of a desired line number. | 2009-10-01 |
20090249308 | Efficient Encoding of Instrumented Data in Real-Time Concurrent Systems - A mechanism for encoding and reporting instrumented data is disclosed that requires less storage space and incurs less processor overhead than other methods of the prior art. In accordance with the illustrative embodiment, a bit vector in shared memory corresponds to nodes of a program's control-flow graph that have been instrumented, and the contents of the vector indicate which of these nodes have executed; in addition, character strings in shared memory indicate what file, class, and method each node belongs to. A process that executes concurrently with those of the program under test transmits instrumented data from the shared memory to a database. The illustrative embodiment enables efficient, rapid reporting and storage of instrumented data, and is therefore especially well-suited for run-time analysis of real-time concurrent systems. | 2009-10-01 |
20090249309 | Efficient Program Instrumentation - A method for determining the number and location of instrumentation probes to be inserted into a program is disclosed. The method advantageously inserts the minimum number of probes that are required to obtain execution coverage for every node in the program's control-flow graph. In addition, the method requires only type of node marking and one bit to store each probe, and does not require the assignment of weights to arcs or nodes of the control-flow graph. In the illustrative embodiment, the nodes of a control-flow graph are partitioned into non-empty sets, where each non-empty set corresponds to a super nested block of the program. | 2009-10-01 |
20090249310 | AUTOMATIC CODE TRANSFORMATION WITH STATE TRANSFORMER MONADS - Stateful computations are transformed into stateless computations automatically to facilitate scalability. Programmers can write code in a traditional imperative stateful style, which is subsequently transformed automatically into a stateless, state transformer monadic style. After the transformation, state is passed as an additional argument in a call and returns as a new state as an additional result. | 2009-10-01 |
20090249311 | SHARING A NATIVE MODULE OF COMPILED CODE USING AN ABSTRACTION MODULE OF INTERPRETED CODE IN A VIRTUAL MACHINE ENVIRONMENT - Interpreted code modules configured to be executed within a virtual machine can be identified. Each of the interpreted code modules can be configured to interact with a native module such that dependency information for the native module can be programmatically utilized by each of the interpreted code modules. An abstraction module for the virtual machine written in the interpreted language can be established. The abstraction module can be configured to load an instance of the native module, wherein upon loading the instance of the native module the abstraction module is exposed to the dependency information associated with the instance of the native module. Each of the interpreted code modules can be configured to interact with the native mode module through the abstraction module. The abstraction module is configured to provide the dependency information associated with the instance of the native module to each of the interpreted code modules. | 2009-10-01 |
20090249312 | Process Generation Approach and System for an Integrated Telecom Platform - An approach for process generation for computer telephony integration (CTI) of an integrated telecom platform, including the following steps. Step 1: The process input module receives the flow chart input by a user and saves it as a flow chart record file; Step 2: the process coversion module coverts the flow chart record file into the equivalent source codes and saves them as a flow chart coversion output file; Step 3: the process compilation module compiles the flow chart coversion output file and saves it as a flow chart compilation output file. The invention also announces a process generation system for an integrated telecom platform, including the process input module, the process coversion module and the process compilation module. The invention is an ideal system for various CTI applications, allowing easy and fast subsequent development as well as convenient system upgrade and maintenance. | 2009-10-01 |
20090249313 | System and Method for Prioritizing the Compilation of Bytecode Modules During Installation of a Software Application - A system and method for compiling part of the bytecode for a software application into native code at install time when the software application is installed on a particular computer are described. According to one embodiment of the method, usage information for the software application may be received. The usage information may indicate how frequently or commonly each of a plurality of features of the software application is used. The usage information may be analyzed to determine a rank ordering of the features. The method may further comprise installing the software application on the particular computer. Installing the software application may comprise compiling one or more bytecode modules of the software application into native code, where the one or more bytecode modules are selected from a plurality of bytecode modules depending upon the rank ordering of the features. | 2009-10-01 |
20090249314 | COMPUTER ASSISTED DATA COLLECTION FOR SURVEYS AND THE LIKE - An exemplary MMIC (“Multi-Mode Interviewing Capability”) survey program is a computerized tool that supports various traditional modes of collecting interview data, including telephone interviewing, written interviewing, and personal interviewing, and can be used to manage the whole interview process from questionnaire design, sample management, and fieldwork monitoring to final dataset production. The collected data may also include non-textual data from survey participants such as medical measurements of blood pressure and heart rate. Self-interviewing using the Internet is also possible which permits real time availability of results and the participation of respondents from virtually anywhere in the world, using devices such as PDA's, Smart phones and Web TV's. The MMIC survey structure is non-linear and object oriented, which permits a connection between all the building blocks of the survey to be defined on any level. The compiled survey includes sufficient metadata to facilitate decompilation and the production of equivalent source code in any supported programming language, whether or not it was originally programmed in that language. This stored metadata not only allows researchers to later trace back the exact conditions under which this particular answer was given, but also permits results from multiple iterations of the related surveys to be combined in a rigorous manner that will be transparent to subsequent analysis and research. | 2009-10-01 |
20090249315 | OBJECT STORAGE AND SYNCHRONIZATION HOOKS FOR OCCASIONALLY-CONNECTED DEVICES - A system may include an application programming interface (API) layer, a cache layer, and an object storage/access layer. The API layer may expose an interface to store a business object and an interface to retrieve the business object, and may transmit a request to store the business object and a request to retrieve the business object, and the cache layer may cache the business object and transmit the request to store the business object and the request to retrieve the business object. The object storage/access layer may receive the request to store the business object and, in response to the request to store the business object, to invoke a serialization method exposed by the business object to store the data associated with the object in a data structure. The object storage/access layer may also receive the request to retrieve the business object and, in response to the request to retrieve the business object, to invoke a deserialization method of the business object to deserialize the data associated with the business object in the data structure. | 2009-10-01 |
20090249316 | COMBINING STATIC AND DYNAMIC COMPILATION TO REMOVE DELINQUENT LOADS - A method for combined static and dynamic compilation of program code to remove delinquent loads can include statically compiling source code into executable code with instrumented sections each being suspected of including a delinquent load, and also into a separate intermediate language representation with annotated portions each corresponding to one of the instrumented sections. The method also can include executing the instrumented sections repeatedly and monitoring cache misses for each execution. Finally, the method can include dynamically recompiling selected ones of the instrumented sections using corresponding ones of the annotated portions of the separate intermediate language representation only after a threshold number of executions of the selected ones of the instrumented sections, each recompilation include a pre-fetch directive at a pre-fetch distances tuned to avoid the delinquent load. | 2009-10-01 |
20090249317 | XSLT-SPECIFIC JIT COMPILER - An Extensible Stylesheet Language Transformation (XSLT) processing environment receives an XSLT style sheet and an Extensible Markup Language (XML) input document. The XSLT style sheet is compiled into XSL byte code fragments. A just-in-time (JIT) compiler in the XSLT processing environment compiles the XSL byte code fragments into native code. The native code is executed to transform the XML input document into one or more XML output documents. | 2009-10-01 |
20090249318 | Data Transfer Optimized Software Cache for Irregular Memory References - Mechanisms are provided for optimizing irregular memory references in computer code. These mechanisms may parse the computer code to identify memory references in the computer code. These mechanisms may further classify the memory references in the computer code as either regular memory references or irregular memory references. Moreover, the mechanisms may transform the computer code, by a compiler, to generate transformed computer code in which irregular memory references access a storage of a software cache of a data processing system through a transactional cache mechanism of the software cache. | 2009-10-01 |
20090249319 | Testing method of baseboard management controller - A testing method of baseboard management controller (BMC) is used for testing firmware stability of a BMC in a server. The testing method includes initializing a plurality of virtual operating systems; setting a plurality of virtual intelligent platform management interfaces (IPMIs) and a virtual BMC in the virtual operating systems; performing a firmware update on the virtual BMC through the virtual IPMI to update the firmware of the virtual BMC; performing a stability test through the virtual BMC and the server; and loading the firmware of the virtual BMC passing the stability test into a physical BMC. | 2009-10-01 |
20090249320 | Display Control Device Capable of Automatically Updating Firmware and Method Thereof - A display control device with automatic firmware update and an update method thereof are provided to update the firmware of the display control device rapidly and automatically, thereby improving user convenience and reducing user waiting time. The display control device comprises a transmission interface unit, a memory interface unit, a non-volatile memory interface unit, a first direct memory access (DMA) unit, a second DMA unit and a controller. The transmission interface unit is coupled to a code-providing unit for providing an updated code of the firmware. After detecting that the transmission interface unit is coupled to the code-proving unit, the controller automatically and temporarily stores the updated code provided by the code-providing unit into a dynamic random access memory (DRAM), and further writes the updated code into a non-volatile memory from the DRAM, thereby accomplishing automatic update of the firmware of the display control device. | 2009-10-01 |
20090249321 | APPARATUS AND METHODS FOR WIDGET UPDATE SCHEDULING - Methods and apparatus for scheduling a content update of a mobile widget are provided. The method may include receiving a widget update consideration. The method may also include generating a content update schedule for a mobile widget based on the update consideration. Further, the method may include storing the generated content update schedule for use in updating a content of the mobile widget. | 2009-10-01 |
20090249322 | TECHNIQUES FOR UPDATING SOFTWARE - Techniques for updating software include downloading a software image update from a first data structure wherein the software update image includes one or more content identifiers. Content is then downloaded from a second data structure based on the one or more content identifiers. The content may then be output during or after the software update download and installation process. | 2009-10-01 |
20090249323 | ADDRESS BOOK SHARING SYSTEM AND METHOD FOR NON-VERBALLY ADDING ADDRESS BOOK CONTENTS USING THE SAME - An address book sharing system includes a vehicle, a short-range enabled in-vehicle telematics unit embedded in the vehicle, and a short-range enabled wireless device. The short-range enabled wireless device is configured to be paired with the short-range enabled in-vehicle telematics unit when positioned in the vehicle, and to download an address book to the short-range enabled in-vehicle telematics unit in response to an address book request trigger generated by the short-range enabled in-vehicle telematics unit. Methods for non-verbally adding address book contents using the address book sharing system are also disclosed herein. | 2009-10-01 |
20090249324 | VIRTUALIZED APPLICATION IMAGE PATCHING - Virtual applications are automatically kept up to date with the current version of a virtual application. Instead of the client having to obtain the entire version of the current virtual application, the client obtains the portions of the current virtual application that are changed from its version of the virtual application. After obtaining the changes needed to update its version of the virtual application, the client integrates those changes into its version of the virtual application. | 2009-10-01 |
20090249325 | Network Software Normalization - A fire detection system includes at least one existing fire detection unit, at least one replacement fire detection unit, control circuitry associated with the at least one existing fire detection unit, control circuitry associated with the at least one replacement fire detection unit, a graphical user interface associated with the at least one replacement fire detection unit, and communication media connecting the at least one existing fire detection unit and the at least one replacement fire detection unit. The replacement unit is configured to be compatible with the at least one existing unit, and the graphical user interface controls the configuration of the replacement panel. The control circuitry associated with the replacement unit and the control circuitry associated with the existing unit execute the configuration of the replacement panel. | 2009-10-01 |
20090249326 | System for Signaling An Application to a Host Device and Method Therefor - An application is signaled to a host device using descriptors incorporated into an application information table. Only applications intended for a certain host device are downloaded to that host device. The descriptors allow the host to identify applications that are addressed to the host based on attributes of the host. When addressing is performed at the level of an application, the application signaling is accomplished using a single application information table and the evaluation of logical parameters against selected host attributes to identify all of the applications addressed to the host. When addressing is performed at the level of a table, multiple tables are evaluated using logical parameters applied to selected host attributes to determine which table is addressed to the host. Addressing conflicts are resolved using priority measures assigned to selected host attributes. | 2009-10-01 |
20090249327 | METHOD FOR METERING AN EXTENSIBLE LICENSE FOR JAVA APPLICATIONS - A method in one embodiment includes using a class loader, detecting an entry point to a Java application; using a class loader, detecting each entry point extension to the Java application; and contacting a third party license server for acquiring a license for each of the Java application and extension associated with each detected entry point. | 2009-10-01 |
20090249328 | COMPONENT-BASED SOFTWARE INSTALLATION - A system and method for automated management of a multi-component software installation. The software product comprises multiple components that can operate independently, but which may operate better (e.g., with more or different functionality) if able to call another component (a “supplying” component). A persistent data store records the installation status of the components (e.g., as static Boolean values). Each installed component that depends on another component (i.e., can benefit from calling an element of the other component) is coded to compile conditionally, based on whether the supplying component is installed. If installed, the supplying component can be linked at compile time; if the supplying component is not installed, the installed component compiles and runs without the benefit of the supplying component. | 2009-10-01 |
20090249329 | LIMITED SERVICE LIFE THROUGH VIRTUALIZED SERVICE IMAGES - Techniques for limited service life through virtualized service images are presented. A software application is embodied as a service within a virtual machine (VM) image. Licensing restrictions for the software application are carried with or accessible from VM image. Each time the VM is instantiated on a target processing environment from the VM image, the licensing restrictions are enforced against the software application to thereby limit the service life of the software application embedded within the VM image. | 2009-10-01 |
20090249330 | METHOD AND APPARATUS FOR HYPERVISOR SECURITY CODE - Disclosed is a computer implemented method, apparatus, and computer program product for regulating received data in a multiple operating system environment on an I/O adapter. The method includes a hypervisor for determining that the I/O adapter indicated a receive completion. The hypervisor, responsive to retrieving the receive completion, determines that the receive completion is associated with a successful status. The hypervisor, determines in hypervisor space whether an at least one data packet satisfies a security criterion. The hypervisor, routes the data packet to at least one selected from a group consisting of an operating system partition of the multiple operating system environment and a network address on a local area network. | 2009-10-01 |
20090249331 | APPARATUS, SYSTEM, AND METHOD FOR FILE SYSTEM SHARING - An apparatus, system, and method are disclosed for file system sharing. A Read-Only File System (ROFS) organization module organizes a single ROFS for a plurality of operating systems. Each operating system executes on a distinct virtual machine. Each virtual machine executes on a computer. A Read/Write File System (RWFS) organization module organizes an RWFS for each operating system. An access module accesses the RWFS and ROFS for each operating system. The RWFS and ROFS appear to each operating system as a single, private file system. Each RWFS comprises at least one pointer to the ROFS. | 2009-10-01 |
20090249332 | METHOD AND A COMPUTING DEVICE - The invention relates to a method and a computing device. A first computing device and a second computing device are connected, wherein the first computing device includes a first virtual machine monitor that hosts a first virtual machine. A boot image is provided on the first computing device, wherein the boot image includes a second virtual machine monitor that is adapted to host the first virtual machine. The second computing device is triggered to boot the boot image from the first computing device. A storage network is established between the first computing device and the second computing device, wherein the storage network includes storage space of the first computing device. Lastly, the first virtual machine is migrated from the first computing device to the second computing device, wherein the first virtual machine is executed by the second computing device but still located on the first virtual machine. | 2009-10-01 |
20090249333 | RECORDING MEDIUM HAVING VIRTUAL MACHINE MANAGING PROGRAM RECORDED THEREIN AND MANAGING SERVER DEVICE - A virtual machine managing program manages plural physical machines and makes a computer device execute processing through virtual machines developed on each physical machine. Virtual machines are assigned to physical machines on the basis of CPU usage rate and temperature, and are moved among the physical machines as needed, to maintain acceptable operating conditions. | 2009-10-01 |
20090249334 | RECORDING MEDIUM RECORDING THEREON VIRTUAL MACHINE MANAGEMENT PROGRAM, MANAGEMENT SERVER DEVICE, AND METHOD FOR MANAGING VIRTUAL MACHINE - A virtual machine managing method includes: a dependence relation list generation step of detecting a dependence relation among virtual machines implemented on a physical machine and generating a dependence relation list, based on a detection result; a target management table generation step of reading, when a selection instruction for selecting a target virtual machine to be halted among the plurality of implemented virtual machines is detected; and a halted target presentation step of reading the virtual machine identification information on all of the virtual machines in dependence relation with the target virtual machine to be halted, and visually presenting the read virtual machine identification information on all of the target virtual machines to be halted. | 2009-10-01 |
20090249335 | Delivery of Virtualized Workspaces as Virtual Machine Images with Virtualized Hardware, Operating System, Applications and User Data - Embodiments deliver an operating system and software applications to a personal computer. The operating system and software applications may be managed and configured at a central location prior to delivery. Data that is created or modified on the personal computer may, from time to time, be stored at the central location. When a user switches from one personal computer to another, any and all of the data may be transferred from the central location to the user's current computer. Additionally, the user's current computer may receive suitable versions of the operating system and applications from the central location. In any case, the operating system and software applications may run with a domain of execution that is provided by a hypervisor. Thus, the operating system and software applications may operate within a virtualized machine, perhaps alongside and in isolation from other operating systems and software applications. | 2009-10-01 |
20090249336 | Facility for Centrally Managed and Locally Managed Workspaces on the Same Computer - Embodiments deliver an operating system and software applications to a personal computer. The operating system and software applications may be managed and configured at a central location prior to delivery. Data that is created or modified on the personal computer may, from time to time, be stored at the central location. When a user switches from one personal computer to another, any and all of the data may be transferred from the central location to the user's current computer. Additionally, the user's current computer may receive suitable versions of the operating system and applications from the central location. In any case, the operating system and software applications may run with a domain of execution that is provided by a hypervisor. Thus, the operating system and software applications may operate within a virtualized machine, perhaps alongside and in isolation from other operating systems and software applications. | 2009-10-01 |
20090249337 | Running Multiple Workspaces on a Single Computer with an Integrated Security Facility - Embodiments deliver an operating system and software applications to a personal computer. The operating system and software applications may be managed and configured at a central location prior to delivery. Data that is created or modified on the personal computer may, from time to time, be stored at the central location. When a user switches from one personal computer to another, any and all of the data may be transferred from the central location to the user's current computer. Additionally, the user's current computer may receive suitable versions of the operating system and applications from the central location. In any case, the operating system and software applications may run with a domain of execution that is provided by a hypervisor. Thus, the operating system and software applications may operate within a virtualized machine, perhaps alongside and in isolation from other operating systems and software applications. | 2009-10-01 |
20090249338 | METHOD AND SYSTEM TO MODIFY TASK IN A WORKFLOW SYSTEM - Delegatee of a task in workflow system receives data related to task to be performed. This invention realizes a method and system which provides capability to the said delegatee to initiate the process of modifing to tasks which resemble the task delegated to the delegatee. This capability given to the delegatee to initiate the process of modification of resembling tasks is realized by creating a modification task data which includes rules which identifies the resembling tasks in the workflow system; information regarding proposed modification to the resembling tasks in the workflow system and information which identifies the delegatee of the modification task data. | 2009-10-01 |
20090249339 | ASSOCIATING COMMAND SURFACES WITH MULTIPLE ACTIVE COMPONENTS - The same command surface on a page may be associated with unrelated components and applications. Each of the components registers the commands associated with a shared command surface that they will be utilizing. Each component may utilize an arbitrary number of commands that are associated with the command surface. The command manager acts as a message broker between the components on the page and the command surfaces. When a command that is associated with a command surface is received, the command manager dispatches the command message to the appropriate components. | 2009-10-01 |
20090249340 | Managing the Progress of a Plurality of Tasks - Computer systems, methods and computer program products for managing progress of a plurality of tasks associated with respective configuration items. The configuration items are included in a system defined by a digital design specification. In one embodiment of the invention, a computer system includes a repository for holding a data set representative of at least one predetermined attribute of a configuration item and a relation between the configuration item and another configuration item, data regarding tasks, and association data for associating the configuration item and at least one task; and a discovery unit for detecting data regarding the configuration item. | 2009-10-01 |
20090249341 | PROCESSING ELEMENT, CONTROL UNIT, PROCESSING SYSTEM INCLUDING PROCESSING ELEMENT AND CONTROL UNIT, AND DISTRIBUTED PROCESSING METHOD - A processing system has a processing element and a control unit. The processing element has a processing section which carries out a specific function, a communication section which outputs to an outside, function information related to the specific function according to a request from the outside, and a data holding section which holds the function information. The control unit has a communication section which outputs the function information of the processing element connected, according to a request from the outside. | 2009-10-01 |
20090249342 | SYSTEMS AND METHODS FOR TRANSACTION QUEUE ANALYSIS - A method and system for determining a wait time for a transaction queue is disclosed. In the method, video data related to a first transaction queue is received. The video data is processed to determine a number of items presented by a first entity for a transaction in the first transaction queue. A total transaction time is estimated for the first entity based on the number of items presented by the first entity and a transaction time for each of the number of items. A wait time for the first transaction queue is determined based on the estimated total transaction time for the first entity. If the wait time for the first transaction queue is greater than a first threshold, then the availability of a second transaction queue is indicated to a second entity. | 2009-10-01 |
20090249343 | SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR RECEIVING TIMER OBJECTS FROM LOCAL LISTS IN A GLOBAL LIST FOR BEING USED TO EXECUTE EVENTS ASSOCIATED THEREWITH - A system, method, and computer program product are provided for receiving timer objects from local lists in a global list for being used to execute events associated therewith. A plurality of execution contexts are provided for receiving timer objects. Additionally, a plurality of local lists are provided, each corresponding with one of the execution contexts, for receiving the timer objects therefrom. Furthermore, a global list is provided for receiving the timer objects from the local lists for being used to execute events associated therewith. | 2009-10-01 |
20090249344 | METHOD AND APPARATUS FOR THREADED BACKGROUND FUNCTION SUPPORT - The present invention provides a computer implemented method and apparatus for a built-in function of a shell to execute in a thread of an interactive shell process. The data processing system receives a request to execute the built-in function. The data processing system determines that the request includes a thread creating indicator. The data processing system schedules a thread to execute the built-in function, in response to a determination that the request includes the thread creating indicator, wherein the thread is controlled by the interactive shell process and shares an environment of the interactive shell process. The data processing system declares a variable based on at least one instruction of the built-in function. Finally, the data processing system may access the variable. | 2009-10-01 |
20090249345 | Operating System Fast Run Command - A fast sub-process is provided in an operating system for a digital signal processor (DSP). The fast sub-process executes a sub-process without a kernel first determining whether the sub-process resides in an internal memory, as long as certain conditions have been satisfied. One of the conditions is that a programmer determines that the sub-process has been previously loaded into internal memory and executed. Another condition is that the programmer has ensured that a process calling the sub-process has not called any other sub-process between the last execution and the current execution request. Yet another condition is that the programmer ensures that the system has not called another overlapping sub-process between the last execution and the current execution request. | 2009-10-01 |
20090249346 | IMAGE FORMING APPARATUS, INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD - An image forming apparatus is provided. The image forming apparatus includes: a job reception unit configured, in response to an execution request for a job, to receive a second program in which an insertion process for a first program that executes the job is described or to receive identification information of the second program; an application unit configured to apply the second program to the first program loaded in a memory; and a job execution unit configured to execute the job based on the first program to which the second program is applied. | 2009-10-01 |
20090249347 | VIRTUAL MULTIPROCESSOR, SYSTEM LSI, MOBILE PHONE, AND CONTROL METHOD FOR VIRTUAL MULTIPROCESSOR - A virtual multiprocessor according to the present invention includes: one or more processors that execute programs while switching between the programs at each of assigned times; a scheduling unit that performs scheduling that determines execution sequence of the programs and the one or more processors that are to execute one or more of the programs, wherein the scheduling unit performs the scheduling at a timing dependent on an assigned time associated with a corresponding one of the programs being executed by the one or more processors, in the case where a first mode is set, and performs the scheduling at a timing not dependent on the assigned time so that at least one of the one or more processors does not execute the programs, in the case where a second mode is set. | 2009-10-01 |
20090249348 | METHOD AND APPARATUS FOR OPERATING A THREAD - A method and apparatus for operating a thread are disclosed. The method includes: receiving a thread operation request that carries a thread operation ID and thread information related operation; and operating a thread according to the operation request. The thread in the embodiments of the present disclosure is independent of the actual content. Therefore, the thread file can be operated according to the requirements of the user, and thus the user experience is improved. | 2009-10-01 |
20090249349 | Power-Efficient Thread Priority Enablement - A mechanism for controlling instruction fetch and dispatch thread priority settings in a thread switch control register for reducing the occurrence of balance flushes and dispatch flushes for increased power performance of a simultaneous multi-threading data processing system. To achieve a target power efficiency mode of a processor, the illustrative embodiments receive an instruction or command from a higher-level system control to set a current power consumption of the processor. The illustrative embodiments determine a target power efficiency mode for the processor. Once the target power mode is determined, the illustrative embodiments update thread priority settings in a thread switch control register for an executing thread to control balance flush speculation and dispatch flush speculation to achieve the target power efficiency mode. | 2009-10-01 |
20090249350 | Resource Allocation Through Negotiation - Improved resource allocation methods which use negotiation are described. In an embodiment, a request for access to a resource by a service user is received and an available access slot is allocated, where the slot may be a time or a position in a queue. This allocated slot may or may not meet the service user's requirements and if this allocated time does not meet the service user's requirements, an access time which does meet the requirements but is already allocated to another service user is identified. A message is sent to the user device associated with the other service user requesting a change in allocated access time. If the change is accepted the allocated times are swapped between the two service users. | 2009-10-01 |
20090249351 | Round-Robin Apparatus and Instruction Dispatch Scheduler Employing Same For Use In Multithreading Microprocessor - An apparatus for selecting one of N requesters of a shared resource in a round-robin fashion is disclosed. One or more of the N requestors may be disabled from being selected in a selection cycle. The apparatus includes a first input that receives a first value specifying which of the N requestors was last selected. A second input receives a second value specifying which of the N requestors is enabled to be selected. A barrel incrementer, coupled to receive the first and second inputs, 1-bit left-rotatively increments the second value by the first value to generate a sum. Combinational logic, coupled to the barrel incrementer, generates a third value specifying which of the N requestors is selected next. | 2009-10-01 |