51st week of 2008 patent applcation highlights part 61 |
Patent application number | Title | Published |
20080313563 | METHOD AND APPARATUS FOR CREATING MAP TEMPLATE AND METHOD AND APPARATUS FOR MANAGING DEVICES USING MAP TEMPLATE - A method and apparatus to create a map template, and a method and apparatus to manage devices using a map template, the method of managing the devices using the map template including: searching for one or more devices to be managed; selecting a map template that represents an interior structure of a building in which the one or more found devices are located; and arranging the one or more found devices at predetermined positions in the selected map template. Thus, a user can easily manage positions of the devices without any need to upload or edit a map image by using the map template that the user creates or selects as desired. | 2008-12-18 |
20080313564 | SYSTEM AND METHOD FOR TEXT DISAMBIGUATION AND CONTEXT DESIGNATION IN INCREMENTAL SEARCH - Methods and systems for text disambiguation and context designation in incremental search are provided. A method for selecting items in response to ambiguous keystrokes entered by a user and unambiguous metadata associated with a previously selected search result includes receiving ambiguous keystrokes, selecting and presenting a first subset of items and metadata associated with the items presented based on the ambiguous keystrokes. The method also includes receiving a selection of one of the items from the user, and, in response to a locking operation received from the user, locking in fixed relation at least one of the ambiguous keystrokes to at least one metadata term associated with the selected item. The method further includes, subsequent to receiving the locking operation, selecting and presenting a second subset of items based at least in part on the locked metadata term, and presenting the second subset of items. | 2008-12-18 |
20080313565 | DYNAMIC USER INTERFACE FOR IN-DIAGRAM SHAPE SELECTION - Technologies are described herein for providing a dynamic user interface (UI) to allow a user to select an active diagram shape for insertion into a flowchart or other diagram without leaving the drawing canvas. Through the use of the embodiments presented herein, a diagramming application provides a user with a dynamic UI within the drawing canvas that includes a selection of diagram shapes from a shape gallery located adjacent to the drawing canvas. Using the dynamic UI, the user may select and insert a shape into the diagram without leaving the canvas. Additionally, the user may select a replacement shape from the dynamic UI for replacing an existing diagram shape without leaving the drawing canvas. The dynamic UI is triggered for display next to a cursor when the cursor hovers over or navigates in proximity to a diagram shape, a connection control, or any other UI trigger. | 2008-12-18 |
20080313566 | DYNAMIC INTERFACE FOR REMOTE CONTROL OF A HOME AUTOMATION NETWORK - A home automation network system having an automation controller and a remote control is described. The automation controller can dynamically download extracts from a menu database to the remote control as a user navigates through the menus. Downloading can be based on remote control configuration parameters communicated to the automation controller. Menus can be selected based on display limitations and input control types available on the remote control. | 2008-12-18 |
20080313567 | System and Method for Providing Dynamic Prioritization and Importance Filtering of Computer Desktop Icons and Program Menu Items - System and method for displaying an item on a display of a computer, wherein the item represents a file installed on the computer, are described. In one embodiment, the method comprises, responsive to a determination that a usage rate of the file exceeds a predetermined minimum rate, displaying the item representative of the file on the computer display; determining whether the usage rate of the file has changed; and responsive to a determination that the usage rate of the file has changed, updating at least one visual attribute of the item representative of the file to indicate the usage rate change. | 2008-12-18 |
20080313568 | DIGITAL MULTIMEDIA PLAYBACK APPARATUS AND CONTROL METHOD THEREOF - A digital multimedia playback apparatus and a control method thereof in which a user starts touching, on a touch screen, one of an item and a function icon ends touching the other one of the item and function icon to control the items and functions displayed thereon. The digital multimedia playback apparatus includes a touch screen to change the state of the item to the state that corresponds to the function icon; thus, the user can more easily edit files or the like. | 2008-12-18 |
20080313569 | Digital Video Reproduction Apparatus and Method - The invented apparatus includes a part of measuring the duration of activation of a select button on its control pad. When the select button is activated longer than a predetermined period, the apparatus enters a mode of continuously selecting multiple thumbnails for selecting a plurality of successive thumbnails. During this mode, after selecting a range of successive thumbnails with a cursor positioning mechanism on the control pad, when the select button is activated, it becomes determinate that the thumbnails in the selected range be selected and the apparatus exits the mode of continuously selecting multiple thumbnails. | 2008-12-18 |
20080313570 | METHOD AND SYSTEM FOR MEDIA LANDMARK IDENTIFICATION - Methods and systems are described for allowing a user to quickly determine parts of a media item in which the user will be interested. In the methods and systems described, a timeline is provided for the media item and semantic icons are used as media landmarks along the timeline. The semantic icons are related to the content or a description of the content at the location in the media item corresponding to the semantic icon's location on the timeline. The semantic icons, in addition to providing some immediate contextual information at a glance, also allow a user access to annotations of the media item. Semantic icons can represent tags, users who have created or modified annotations for the segment of the media item, or other relevant information. The semantic icons may also be used to determine a relative level of interest in different parts of the media item both with respect to the user and with respect to other users. | 2008-12-18 |
20080313571 | METHOD AND SYSTEM FOR AUTOMATING THE CREATION OF CUSTOMER-CENTRIC INTERFACES - An interface is provided by creating prompts for the interface. The prompts represent tasks to be accomplished by a user and are obtained based on user input. The prompts are grouped according to relationships, obtained from the user input, among the tasks. The interface is updated based on user feedback. Each of the prompts is designated using user terminology obtained from the user input. | 2008-12-18 |
20080313572 | Presenting and Navigating Content Having Varying Properties - Technologies are described herein for presenting and navigating content having varying properties. One or more local or networked providers are searched for content objects. Content objects include associated metadata and may be stored within a content container. Each content object is displayed separately from its associated content container. Displayed content objects may be grouped and filtered based upon the associated metadata. Displayed content objects may also be grouped and filtered based upon the provider from which they were retrieved. Selection of a content object causes the content container associated with the selected content object to be displayed. Alternately, selection of a content object may cause a preview of the selected content object and the metadata associated with the selected content object to be displayed. | 2008-12-18 |
20080313573 | Creating, Displaying, and Editing a Sub-Process Within a Process Diagram - Technologies are described herein for creating, displaying, and editing a sub-process within a process diagram. A diagramming application provides for the grouping of existing process operations of a process diagram into a sub-process. The sub-process is displayed within the process diagram as a container that may be expanded and collapsed in-place within the diagram to display or hide the corresponding sub-process operations without leaving the context of the process diagram. Similarly, a single process operation within a process diagram may be selected for the creation of an associated sub-process. An expanded container including the newly created sub-process operations and a collapsed container representing the sub-process operations replace the single process operation and are concurrently hidden and displayed according to a user selection of a collapse or expand control. | 2008-12-18 |
20080313574 | SYSTEM AND METHOD FOR SEARCH WITH REDUCED PHYSICAL INTERACTION REQUIREMENTS - A user-interface method and system for displaying a set of search results on a user device having a limited display area and having a five-button interface, where a user may explicitly or implicitly choose a search result to be expanded in order to provide space for displaying additional metacontent related to the selected search result, and where the expansion of the chosen search result does not occlude information displayed about other search results. | 2008-12-18 |
20080313575 | SYSTEM AND PROCESS FOR CONTROLLING ELECTRONIC COMPONENTS IN A UBIQUITOUS COMPUTING ENVIRONMENT USING MULTIMODAL INTEGRATION - The present invention is directed toward a system and process that controls a group of networked electronic components using a multimodal integration scheme in which inputs from a speech recognition subsystem, gesture recognition subsystem employing a wireless pointing device and pointing analysis subsystem also employing the pointing device, are combined to determine what component a user wants to control and what control action is desired. In this multimodal integration scheme, the desired action concerning an electronic component is decomposed into a command and a referent pair. The referent can be identified using the pointing device to identify the component by pointing at the component or an object associated with it, by using speech recognition, or both. The command may be specified by pressing a button on the pointing device, by a gesture performed with the pointing device, by a speech recognition event, or by any combination of these inputs. | 2008-12-18 |
20080313576 | SYSTEM AND METHOD FOR INCLUDING PROTECTIVE VOLTAGE SWITCHABLE DIELECTRIC MATERIAL IN THE DESIGN OR SIMULATION OF SUBSTRATE DEVICES - A substrate device is designed by identifying one or more criteria for handling of a transient electrical event on the substrate device. The one or more criteria may be based at least in part on an input provided from a designer. From the one or more criteria, one or more characteristics may be determined for integrating VSD material as a layer within or on at least a portion of the substrate device. The layer of VSD material may be positioned to protect one or more components of the substrate from the transient electrical condition | 2008-12-18 |
20080313577 | VLSI ARTWORK LEGALIZATION FOR HIERARCHICAL DESIGNS WITH MULTIPLE GRID CONSTRAINTS - A system and method are disclosed for legalizing a flat or hierarchical VLSI layout to meet multiple grid constraints and conventional ground rules. Given a set of ground rules with multiple grid constraints and a VLSI layout (either hierarchical or flat) which is layout-versus-schematic (LVS) correct but may not be ground rule correct, the system and method provide a legalized layout which meets the multiple grid constraints while maintaining LVS correctness and fixing the ground rule errors as much as possible with minimum layout perturbation from the input design. The system and method support multiple grid pitch constraints for hierarchical design, and provide for LVS correctness to be maintained while an on-grid solution possibly with some spacing violations. | 2008-12-18 |
20080313578 | Techniques For Use With Automated Circuit Design and Simulations - Various techniques involving snapshots of the contents of registers are described and claimed. In some embodiments, a method includes receiving descriptions of design circuitry including design registers to receive register input signals. The method also includes generating additional descriptions through at least one computer program including descriptions of additional registers (snapshot registers) to receive snapshots of the register input signals, wherein the additional registers provide register initial condition signals for use in a simulation of at least a portion of the design circuitry. Other embodiments are described. | 2008-12-18 |
20080313579 | Techniques For Use With Automated Circuit Design and Simulations - Various techniques related to clocking for use with automated circuit design and simulations are disclosed. In some embodiments, a method includes receiving descriptions of design circuitry including logic to receive input signals. The method further includes generating additional descriptions through at least one computer program including descriptions of a multiplexer to multiplex the input signals and delayed input signals, and provide them to the logic, and a demultiplexer to demultiplex output signals and delayed output signals from the logic. Other embodiments are described. | 2008-12-18 |
20080313580 | Methodology for Hierarchy Separation at Asynchronous Clock Domain Boundaries for Multi-Voltage Optimization Using Design Compiler - This invention transforms a circuit design at an asynchronous clock boundary using a flow involving register grouping, logic modification and level shifter and isolation cell insertion. The level shifter and isolation cell inserted are tested for proper location. The transformed circuit design is suitable for power consumption control by independent control of separate voltage domains. | 2008-12-18 |
20080313581 | INDEPENDENT MIGRATION OF HIERARCHICAL DESIGNS WITH METHODS OF FINDING AND FIXING OPENS DURING MIGRATION - Methods of independently migrating a hierarchical design are disclosed. A method for migrating a macro in an integrated circuit comprises: determining an interface strategy between a base cell in the macro and the macro, the base cell including an interface element involved in the interface strategy; migrating the base cell independently with respect to the macro based on the interface strategy; initially scaling the macro; swapping the migrated base cell into the macro; and legalizing content of the initially scaled macro. | 2008-12-18 |
20080313582 | Accurate Transistor Modeling - A method and system for generating transistor models. In one embodiment, the method includes generating a transistor model that characterizes a topology of a circuit, and characterizes at least one coupling or at least one interaction between at least two transistors of the circuit. | 2008-12-18 |
20080313583 | Apparatus and Method for Testing Sub-Systems of a System-on-a-Chip Using a Configurable External System-on-a-Chip - An apparatus and method are provided in which a previously verified SoC is coupled to a SoC under test via a communication bus or other type of communication interface. The previously verified SoC is provided with the same test stimuli as the SoC under test and thus, generates expected test results data. The test stimuli are sent to the SoC under test via a peripheral communication interface between the previously verified SoC and the SOC under test. The SoC under test generates actual test result data that is output to the previously verified SoC. The previously verified SoC may then compare the expected test results data with the actual test result data generated by the SoC under test to determine if they match. If the two sets of data do not match, then a mismatch notification may be generated and output. | 2008-12-18 |
20080313584 | Logic verification method - A logic verification method is disclosed to a computer to conduct a logic verification process by using a state machine based on a verification property, including the steps of (a) displaying at lease one waveform generated based on a logic verification result of the logic verification process, (b) displaying the verification property, and controlling the step (a) and the step (b) in response to an operation input. The step (c) controls the step (b) to display a first respective portion of a description of the verification property corresponding to a first desired portion of the at least one waveform selected by the operation input by correlating to the first desired portion, by a different display method from other portions in response to the operation input onto the at least one waveform being displayed in the step (a). | 2008-12-18 |
20080313585 | Method of verifying semiconductor integrated circuit and design program - A method of verifying a semiconductor integrated circuit is provided. A controlling cell and a controlled cell controlled by a control signal output from the controlling cell are placed in an IO region of the semiconductor integrated circuit. The method includes: (A) providing a library that includes requirement information specifying the controlling cell required by the controlled cell; (B) obtaining a region information indicating a region within the IO region in which a signal interconnection through which the control signal is transmitted is provided; and (C) verifying whether or not the specified controlling cell is placed within the region, in a case where the controlled cell is placed within the region. | 2008-12-18 |
20080313586 | Resistance net generating apparatus for circuit simulation - In an aspect of the present invention, a resistance net generating apparatus includes a dividing section configured to acquire a data of a wiring pattern which contains connection position with vias and to divide the wiring pattern into rectangular patterns; a division pattern processing section configured to set nodes and resistances base on the rectangular patterns; and an output section configured to output positions of the nodes and the resistances as a resistance net specifying data. The wiring pattern is represented by sidelines extending into an X direction and a Y direction orthogonal to the X direction. The dividing section divides the wiring pattern into the rectangular patterns by extension lines extending from the sidelines into an inside of the wiring pattern. | 2008-12-18 |
20080313587 | Apparatus and method for performing a sequence of verification tests to verify a design of a data processing system - An apparatus and method are provided for performing a sequence of verification tests to verify the design of a data processing system. The apparatus comprises a system under verification representing the design of the data processing system, the system under verification including a component model representing at least one hardware component of the data processing system. The component model includes an interface module through which the component model interacts with other portions of the system under verification during performance of the verification tests. An alternative model is provided for representing the hardware component for selected verification tests, and the interface module comprises a verification interface module which is responsive to switch criteria specified by the alternative model to switch in the alternative model in place of the component model. Accordingly, by such an approach, the alternative model can take the place of the component model during performance of the selected verification tests. This maintains system integrity of the system under verification, whilst providing a simple and effective mechanism for enabling the alternative model to take the place of the component model for certain specific verification tests, for example when testing corner cases in the design. | 2008-12-18 |
20080313588 | METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR COUPLED NOISE TIMING VIOLATION AVOIDANCE IN DETAILED ROUTING - A method, system, and computer program product for coupled noise timing violation avoidance in detailed routing of an integrated circuit design are provided. The method includes calculating a noise induced timing violation sensitivity (NITVS) metric for nets in the integrated circuit design as a measure of sensitivity to a timing violation relative to a coupled noise delay adder, prioritizing routing isolation as a function of the NITVS metric for each of the nets to avoid coupled noise timing violations, and outputting the routing isolation priority. | 2008-12-18 |
20080313589 | Techniques For Use With Automated Circuit Design and Simulations - Various techniques related to clocking signals used for automated circuit design and simulations are disclosed. In some embodiments, a method includes receiving first and second asynchronous clock signals having a first phase relationship at a first time and sampling the second clock signal at transitions of the first clock. The method further includes storing the samples; and analyzing the samples to ascertain the first phase relationship of the second clock signal with respect to the first clock signal and provide a representation of the first phase relationship. Other embodiments are described. | 2008-12-18 |
20080313590 | METHOD AND SYSTEM FOR EVALUATING TIMING IN AN INTEGRATED CIRCUIT - Methods for analyzing the timing in integrated circuits and for reducing the pessimism in timing slack calculations in static timing analysis (STA). The methods involve grouping and canceling the delay contributions of elements having similar delays in early and late circuit paths. An adjusted timing slack is calculated using the delay contributions of elements having dissimilar delays. In some embodiments, the delay contributions of elements having dissimilar delays are root sum squared. Embodiments of the invention provide methods for reducing the pessimism due to both cell-based and wire-dependent delays. The delays considered in embodiments of the invention may include delays due to the location of elements in a path. | 2008-12-18 |
20080313591 | SEMICONDUCTOR INTEGRATED CIRCUIT DESIGNING METHOD - An IC designing method includes planning placement of a first isolated-power supplied region operating between common ground and power bus lines during a normal operation, and second/third isolated-power supplied regions each operating between the common ground bus line and first/second isolated power lines and supplied with potentials different from the common power supply, planning placement of first electrostatic protection circuits connected between the common ground power bus lines and between the common ground bus line and the first/second isolated power lines, and second electrostatic protection circuits connected between the first/second isolated power lines and the common power bus lines, judging presence of a signal transmission between non-adjacent regions among the first to third isolated-power supplied regions, and amending the circuit to insert a buffer circuit powered by the common power bus line in a transmission path when the signal transmission is present. | 2008-12-18 |
20080313592 | MASK LAYOUT EDITOR SHAPE QUERY - A computer program product stored on machine readable media includes machine executable instructions for display a layout of a circuit design, the product including instructions for displaying a layout of a circuit design, the product including instructions for: receiving query input including location information; querying a design layout for object information associated with the location information; and reporting the object information. A system is also provided. | 2008-12-18 |
20080313593 | Occupancy Based on Pattern Generation Method For Maskless Lithography - An occupancy based pattern generation method for a maskless lithography system using micromirrors is disclosed. The present invention includes the steps of recognizing a pattern upon the substrate through the extraction of the pattern boundary and the construction of the pattern region and recognizing the pattern upon the micromirror through the confirmation of the micromirror dependent lithographic pattern region, the extraction of the micromirror dependent pattern based on the occupancy, and the construction of the stream of binary patterns containing binary reflection information for the micromirrors in accordance with the substrate scrolling. | 2008-12-18 |
20080313594 | SYSTEM AND METHOD FOR CREATING MULTI-MODE APPLICATIONS - Multi-mode wireless communication devices capable of wLAN and WAN wireless network communication modes can be configured to communicate for backend services (e.g. Web Services, database, events) via a network gateway to operate in response to available modes. For example, for some activities (e.g. notification messages), the devices may be configured to communication in any available mode (WAN or wLAN) while for other activities (e.g. high bandwidth communications), the devices may be restricted to one mode only (e.g. wLAN). Component applications for execution by the devices can specify message delivery properties to indicate the mode(s) that may used for a particular message. A programming tool and method are described for configuring such component applications to specify mode delivery properties and to be responsive to mode information generated by a runtime environment generating, executing and supporting the component applications. | 2008-12-18 |
20080313595 | METHOD AND SYSTEM FOR ESTIMATING PROJECT PLANS FOR PACKAGED SOFTWARE APPLICATIONS - A system for estimating and generating project plans for implementing packaged software applications, the system includes: a view layer configured to act as a user interface for user inputs and system outputs; a model and control layer configured to implement rules based on a series of estimation and implementation models, and to perform calculations of project plan details and project plan schedules; an estimation knowledge base layer configured to hold and derive the series of estimation and implementation models; and wherein the system for estimating and generating multi-dimensional project plans for implementing packaged software applications is carried out over networks comprising: the Internet, intranets, local area networks (LAN), and wireless local area networks (WLAN). | 2008-12-18 |
20080313596 | METHOD AND SYSTEM FOR EVALUATING MULTI-DIMENSIONAL PROJECT PLANS FOR IMPLEMENTING PACKAGED SOFTWARE APPLICATIONS - A method for scoring and ranking multi-dimensional project plans for implementing packaged software applications, the method includes: determining one or more dimensions for a project plan; assigning one or more attributes to each of the one or more dimensions; assigning one or more utility functions to each of the one or more attributes; assigning one or more weights to each of the one or more attributes; assigning one or more ordering factors to one or more combinations and permutations of the dimensions; calculating a series of scores for the one or more combinations and permutations of the dimensions; ranking the one or more combinations and permutations of the dimensions based on the calculated series of scores; and wherein each of the one or more combinations and permutations of the dimensions represents a different individual multi-dimensional project plan. | 2008-12-18 |
20080313597 | System and Method for Describing Method Process Using Guided Architectural Decisions - A method author uses a method generator to create a customized project-specific method that includes first class decision elements. The decision elements are included in a meta model for a process framework, and describe actual decisions for a user to resolve. Once created, a method advisor uses the project-specific method to guide a user through architectural decisions by refining the project-specific method's process flow based upon the user's decisions. The refining includes removing activity elements and decision elements from the process flow that are not reachable by a path corresponding to the user's choice selection. The method advisor also stores the user's choice selections, along with considerations, conditions, and consequences, for the use to view at a later date. | 2008-12-18 |
20080313598 | Technique for managing the process of developing software - A system that manages development of software is described. During operation, this system aggregates status information and requirement information as a function of time, where the status information specifies the status of the development of the software and the requirement information specifies target requirements for the software. Next, the system dynamically determines a project estimate for the development of the software based on the status information and the requirement information. | 2008-12-18 |
20080313599 | METHOD, SYSTEM AND COMPUTER PROGRAM FOR DEVELOPING SOFTWARE APPLICATIONS WITH INCREASED MODULARITY - A solution is proposed for developing software applications on a data processing system. A corresponding method (A | 2008-12-18 |
20080313600 | BI-DIRECTIONAL PROJECTION - In an embodiment, one or more computer-readable media holding executable instructions is provided. The instructions may be executed on a processing device to project a specification to a platform environment that includes a system model. The media may hold one or more instructions for accessing an algorithm model, the algorithm model being associated with the specification. The media may further hold one or more instructions for projecting the specification to the system model via a forward projection. The media may hold one or more instructions for receiving a reverse projection that includes specification changes, the specification changes identifying suggested changes to the specification. The media may further hold one or more instructions for modifying the algorithm model based on the specification changes, and the media may hold one or more instructions for storing the modified algorithm model. | 2008-12-18 |
20080313601 | Speech IC Simulation Method, System and Medium thereof - In a speech IC simulation method, a system, a medium and a firmware code generation method, the speech IC simulation method for obtaining a simulation result of a speech IC project includes the steps of establishing and compiling a speech IC project in a wizard interface, setting and displaying a visualized in-circuit emulator (ICE) allocation interactively corresponding to the speech IC project in a visualized allocation interface, and setting and performing the clips and corresponsive system trigger events in a visualized clip editing and event setting interface if a modification of the speech IC project is required. Moreover, the firmware code from compiling the speech IC project may be outputted through an output port such as an USB port or a printer port or recorded in a memory of a circuit emulator. | 2008-12-18 |
20080313602 | BOUNDED PROGRAM FAILURE ANALYSIS AND CORRECTION - In one embodiment, a computer system determines that a previously run test scenario configured to test a software program has failed to produce an expected result due to one or more semantic errors, generates error trace code configured to monitor the called component, processes the test scenario using the error trace code, and analyzes error trace information to determine the point at which the semantic error occurs in the called component. In an alternative embodiment, a computer system detects a semantic error in a software component of a software program, constructs an error condition that may include source code representing a minimum condition under which the error occurs, generates an object invariant based on the error condition that represents an opposite condition to that represented by the error condition, and automatically generates source code change recommendations using the object invariant that prevent the semantic error from reoccurring in subsequent test scenarios. | 2008-12-18 |
20080313603 | User interface archive - Source code associated with rendering an interface responsive to a user interaction may be stored in an archive, the source code including one or more network-resource locators identifying network locations of one or more resource files used in the rendering. The one or more resource files may be retrieved from the network locations based on the network-resource locators. The one or more retrieved resource files may be stored in the archive, wherein a local-resource locator identifies a local-resource location of each retrieved resource file in the archive. The network-resource locators may be replaced in the source code with the local-resource locators. | 2008-12-18 |
20080313604 | SYSTEM AND METHOD FOR AUTOMATICALLY DECLARING VARIABLES - A system and method for declaring variables during coding of a software program. The method includes, for each variable type, defining a unique string representing a variable declaration instruction and adapting a coding module wherein, when a string representing a variable declaration instruction is typed adjacent to a new variable name, the coding module automatically generates code for the corresponding variable declaration statement for a new variable having the new variable name and the specified variable type. The method further includes defining a reserved variable declaration area in the software program and placing any code generated by the coding module for the variable declaration statement into the reserved variable declaration area. Each unique string representing a variable declaration instruction may be a prefix or suffix that may be typed adjacent to the new variable name. | 2008-12-18 |
20080313605 | DEVELOPMENT FRAMEWORK FOR AUTOMATED DATA THROUGHPUT OPTIMIZATION | 2008-12-18 |
20080313606 | XSL DIALOG MODULES - A method, system, and computer program product are provided for generating an XDM. VoiceXML documents operating under voice portal applications employ a series of dialog modules that facilitate operational flow through the application by invoking specific caller-centric events. These dialog modules are divided into two components—XML and XSL dialog modules. The division of the modules causes a clean separation between data (the XML component) and behavior (the XSL component). The XSL component in conjunction with an XML framework operable with the XSL component forms an XDM. Because behavioral aspects remain consistent from application to application, a library of XDMs can be provided to facilitate reuse, thereby minimizing redundancy and reducing development time and cost, and facilitating rapid market entry for organizational products. | 2008-12-18 |
20080313607 | UNIFIED INPUT STACK - A unified input stack is disclosed herein. The unified input stack defines a standard mechanism for input data promotion, centralizing the mechanism so that consumers of input data can retrieve the data from a known location in an ideal form. The unified input stack receives input data from an input device and stores the input data in a data object corresponding to the input data. Promoted data corresponding to the input data may then be received. The promoted data may include additional information abstracted from the input data. The promoted data may then be stored in the data object together with the input data. The data object may then be provided to one or more consumers. | 2008-12-18 |
20080313608 | SYSTEM AND METHOD FOR VARIABLE TYPE IDENTIFICATION - There is disclosed a system and method for identifying a variable type during coding of a software program. In an embodiment, the method comprises defining a unique variable type string for the variable type, and when a unique variable type string is typed adjacent to a new variable name, converting the unique variable type string to a variable type identifier tag attached to the new variable name. Each unique variable type string may be defined as a prefix or a suffix. In another embodiment, the method further comprises defining a unique variable scope string for a variable scope, and when a unique variable scope string is typed adjacent to a new variable name, converting the variable scope to a variable scope identifier tag attached to the new variable name. The variable type identifier tag and the variable scope identifier tag may both be attached to the new variable name in a subscript font and/or superscript font. | 2008-12-18 |
20080313609 | CORE OBJECT-ORIENTED TYPE SYSTEM FOR SEMI-STRUCTURED DATA - A type system employing structural subtyping is disclosed herein. A core type system supports several structural types, such as stream, choice, intersection and sequence. Also part of the core type system is a new invariant type, which denotes values whose dynamic type is the same as its static type, and type restrictions for limiting a range of a base type. Furthermore, a streamlined structural version of delegates, called structural delegates and a validation method thereof are introduce into the type system. To further facilitate type safety, strict statically checked interface casts are introduced. | 2008-12-18 |
20080313610 | DISCOSCRIPT: A SIMPLIFIED DISTRIBUTED COMPUTING SCRIPTING LANGUAGE - Scripting core commands and aggregations of such commands are provided to script authors to enable them to generate scripts that can be parallel-processed without requiring the author to be aware of parallel-processing techniques. The scripting core commands and aggregations abstract mechanisms that can be executed in parallel, enabling the script author to focus on higher-level concepts. The scripting core commands provided include commands for applying a function in parallel and distributing and joining data in parallel. For added flexibility, one or more scripting core commands can utilize functions written in a different programming language and referenced appropriately in code blocks. | 2008-12-18 |
20080313611 | PROCESS, SYSTEM AND PROGRAM PRODUCT FOR EXECUTING TEST SCRIPTS AGAINST MULTIPLE SYSTEMS - A process, system and program product for executing a plurality of tests scripts or one or more test script sets against a plurality of systems to be tested. The process comprises providing an instance of a test script set on a server, writing an initial system value corresponding to an initial system to be tested on a web page file hosted on the server, retrieving the initial system value from the web page file and launching a URL using the initial system value retrieved to execute the test script set against the initial system to be tested. The process further includes overwriting the web page file to change the initial system value to a next system value corresponding to a next system to be tested, retrieving the next system value from the web page file and launching a next URL using the next system value retrieved to execute the test script set against the next system to be tested. | 2008-12-18 |
20080313612 | HYSTERESIS FOR MIXED REPRESENTATION OF JAVA BIGDECIMAL OBJECTS - A computer implemented method for determining when to change a representation type of at least one number stored in a memory of a data processing system. An operation is received in a processor of the data processing system. The operation references a number stored as a class of an object-oriented programming language. The number is stored as a first representation type. Responsive to the operation being biased towards the first representation type, a first counter is incremented. Responsive to the operation being biased towards a second representation type, a second counter is incremented. A counter reference is equal to a first value of the first counter subtracted from a second value of the second counter. Responsive to the counter reference exceeding a threshold number, representation of a subsequent number is changed from the first representation type to the second representation type. | 2008-12-18 |
20080313613 | Method for statically checking an object-oriented computer program module - A method for statically checking an object-oriented computer program module includes the step of identifying objects within a computer program module, at least one of the objects having a plurality of references thereto, possibly from multiple clients. A discipline of permissions is imposed on the objects identified within the computer program module. The permissions enable tracking, from among a discrete set of changeable states, a subset of states each object might be in. A determination is made regarding whether the imposed permissions are violated by a potential reference to any of the identified objects. The results of the determination are output to a user. | 2008-12-18 |
20080313614 | EMBEDDED CONTROLLERS AND DEVELOPMENT TOOL FOR EMBEDDED CONTROLLERS - An embedded controller development tool which generates an interface means for preserving and outputting a control data calculated by the control operation means based on a specific computational procedure, and providing said control data to a plurality of control operation means including said control operation means; wherein the control operation means is described as a function in the source code of the program, the reference data used for calculation by said control operation is an argument of the function, said control data calculated by said control operation means is the argument of the function which points the return value or the address of said function. | 2008-12-18 |
20080313615 | REMOTE SERVLETS COLLABORATION - Presents remote servlets collaboration. A method includes: creating a common registry; creating an extended context in response to an external request, wherein the extended context can invoke the resources within the common registry; performing initializing configuration on a plurality of servlets, and registering a plurality of servlets in the common registry, wherein a plurality of servlets being located on different Java virtual machines, or being located in different servlet containers on the same Java virtual machine; and a plurality of servlets collaborate with each other by being invoked through the extended context. It can implement collaboration between servlets located on different virtual machines or even servlets on the same virtual machine but within different servlet containers, because in a converged application service system, not only between HTTP servlets or between SIP servlets but also between HTTP servlets and SIP servlets there is necessity to collaborate. | 2008-12-18 |
20080313616 | METHODS AND SYSTEMS FOR TESTING TOOL WITH COMPARATIVE TESTING - Embodiments of the present invention provide a multi-input comparative testing tool. The present invention looks at the internal structure of the software being tested and compares the two pairs of internal structures. In the present invention, the testing tool is capable of receiving multiple program code files or data files as its input. For each program code file, the testing tool generates a collection of problem objects and compares pairs of the problem collections with each other. The present invention may also run on data files having program code. For example, the present invention is capable of testing extensible markup language (XML) files to determine if they validate against a schema. Problem objects that are in both collections are identified and set aside. The remaining problem objects are then marked either as being resolved or new depending in which collection they exist. | 2008-12-18 |
20080313617 | Analyzing software users with instrumentation data and user group modeling and analysis - Described is a technology by which software instrumentation data collected from user program sessions are analyzed, including by determining program usage metrics and/or command usage metrics. Information representative of the program usage metrics and/or the command usage metrics is output, such as in the form of a report. The software instrumentation data may be further analyzed, such as to determine at least one usage trend over time, and to determine user groups. For example, a usage subset of sessions that meet specified session usage criteria based on a set of session data may be located, along with a subset of users based on users whose sessions meet specified user criteria. The usage and user subsets may be combined via Boolean logic to produce a result set. | 2008-12-18 |
20080313618 | Detaching Profilers - A profiler may be detached from an actively running application by first sealing communications between the application and profiler, then evacuating the profiler by waiting for any profiler-modified or instrumented code to complete execution, profiler runtime code to complete execution, cleaning up any residual items from the profiler, and shutting down the profiler. The profiler may be operational in many different environments, including a managed environment such as a virtual machine and those environments having just in time compiling of executable code. | 2008-12-18 |
20080313619 | Method and apparatus for a configurable java server pages processing framework - A method, apparatus, and computer instructions for a configurable JAVASERVER pages processing framework to process JAVASERVER pages (JSP). A JSP document or page is translated into a document object model (DOM) object that encapsulates elements of the JSP. The syntax of the JSP is validated by a JSP translator with built-in classes and errors are returned if necessary. A JSP visitor configuration file, which defines user configured classes and sequence of execution, is used by the JSP translator to invoke methods of user-defined classes in the order specified by the user to process or visit elements of the DOM object. Result of user-defined class processing may be passed from one class to another within the set. | 2008-12-18 |
20080313620 | SYSTEM AND METHOD FOR SAVING AND RESTORING A SELF-DESCRIBING DATA STRUCTURE IN VARIOUS FORMATS - A system and method for saving and/or restoring a self-describing data structure in various formats is provided. The method includes the steps of executing a data structure engine and an export/import module in a computer system; said export/import module obtaining at least one description set for at least one container data structure from said data structure engine; creating a header for each element in the data structure; declaring the structure by writing its type in a format-specific syntax; outputting each property in the structure and outputting child structures to form an external representation of the self-describing data structure. | 2008-12-18 |
20080313621 | SCALAR CODE REDUCTION USING SHORTEST PATH ROUTING - This document discusses, among other things, a system and method computing the shortest path expression in a loop having a plurality of expressions. Candidate expressions in the loop are identified and partitioned into sets. A cost matrix is computed as a function of the sets. Paths are found through the cost matrix and, if there are cycles in the paths, the cycles are broken. One or more shortest path expressions are generated as a function of the paths and one or more of the expressions in the loop are replaced with the shortest path expressions. | 2008-12-18 |
20080313622 | Low-Level Connectivity Admission Control for Networked Consumer Storage Devices - The present invention relates to a device and a method of accessing a storage of a storage device by reading or writing data to said storage device, wherein said accessing is controlled by an external data controller via a low level in a software stack of said device, and wherein said storage device is accessed without hampering the operation of functionalities at a higher level of said software stack of said device, said device comprises an intermediate storage, and the method comprises the steps of storing commands related to said accessing of data in said intermediate storage as a command queue, executing said commands in said command queue when allowed by a command queue scheduler, said scheduler scheduling in dependence of at least one of the functionalities at said higher level of said software stack. Thereby full control is obtained on storage medium requests by the scheduler. | 2008-12-18 |
20080313623 | CHANGING METADATA WITHOUT INVALIDATING CURSORS - A method and apparatus for changing versioned metadata without invalidating cursors is provided. Cursors may be linked to the appropriate version of metadata at execution time as opposed to compilation time, meaning that they do not require recompilation to link to a new version of metadata. A database system maintains compiled code implementing a plan with respect to data items in a data storage space. The compiled code may have been generated in response to receiving a request to perform an operation that may be implemented using the plan. A version of metadata is also maintained. The metadata describes characteristics of the data storage space implicated by the plan. The compiled code is executed. The step of execution comprises binding the compiled code to the version of metadata. A proxy object referenced in the compiled code may facilitate the binding of the compiled code to the appropriate version of metadata. | 2008-12-18 |
20080313624 | Dynamic loading and unloading for processing unit - Methods and apparatus are provided for enhanced instruction handling in processing environments. A program reference may be associated with one or more program modules. The program modules may be loaded into local memory and information, such as code or data, may be obtained from the program modules based on the program reference. New program modules can be formed based on existing program modules. Generating direct references within a program module and avoiding indirect references between program modules can optimize the new program modules. A program module may be preloaded in the local memory based upon an insertion point. The insertion point can be determined statistically. The invention is particularly beneficial for multiprocessor systems having limited amounts of memory. | 2008-12-18 |
20080313625 | DISCO: A SIMPLIFIED DISTRIBUTED COMPUTING LIBRARY - Core commands and aggregations of such commands are provided to programmers to enable them to generate programs that can be parallel-processed without requiring the programmer to be aware of parallel-processing techniques. The core commands and aggregations abstract mechanisms that can be executed in parallel, enabling the programmer to focus on higher-level concepts. The core commands provided include commands for applying a function in parallel and distributing and joining data in parallel. The output of each core command can implement an interface that can enable underlying mechanisms to stitch together multiple core commands in a cohesive manner to perform more complex actions. | 2008-12-18 |
20080313626 | APPLICABLE PATCH SELECTION DEVICE AND APPLICABLE PATCH SELECTION METHOD - An applicable patch selection device comprises a first extraction unit for extracting, on the basis of information on an application target system, information on all the patches unapplied to the application target system from among information on released patches, an input unit to which a user's policy is input, a second extraction unit for extracting, in accordance with the user's policy input into the input unit, information on an unapplied patch to be actually applied to the application target system from among the information on all the unapplied patches extracted by the first extraction unit, and an unapplied patch obtainment unit for obtaining an unapplied patch corresponding to the information, extracted by the second extraction unit, on the unapplied patch to be actually applied to the application target system. | 2008-12-18 |
20080313627 | INFORMATION PROCESSING APPARATUS, SOFTWARE UPDATING METHOD, AND IMAGE PROCESSING APPARATUS - An information processing apparatus which updates a basic software package is disclosed. The information processing apparatus includes an encryption and decryption unit which stores values calculated uniquely from software and encrypts information based on the calculated values and decrypts encrypted information based on the calculated values. The basic software package includes a firmware authenticating module for authenticating a firmware updating file which includes new software for updating the basic software package, a value uniquely calculated from the new software, and a public key signature. The information processing apparatus further includes a software updating module which updates the basic software package by using the authenticated firmware updating file, and an encryption key managing module for encrypting again the information encrypted by the values based on a value changed by updating the basic software package. | 2008-12-18 |
20080313628 | METRICS PACK DISTRIBUTION FOR DATA REPORTING TOOL - Systems and methods for implementing non-executable configuration files into a resource reporting application are disclosed. In accordance with one embodiment, a method for implementing non-executable configuration files into a resource reporting application includes developing one or more non-executable data files for implementation into the resource reporting application. The non-executable data files are then bundled into a file pack. The file pack is then distributed to the resource reporting application. The resource reporting application then implements one or more non-executable data files into the resource reporting application. In further embodiments, the non-executable data files include XML files. In some embodiments, the non-executable data files are bundled into a .cab file pack. | 2008-12-18 |
20080313629 | Method for installation of objects for a component-based management system for field devices of automation technology - A method for installation of objects for a component-based management system for field devices of automation technology, wherein the management system includes a frame application and a plurality of device managers which can run in the frame application, it is checked in the installation of new objects that such are not inconsistent with earlier installations. | 2008-12-18 |
20080313630 | Method And System For Distributing A Software Application To A Specified Recipient - The present invention is related to a computer-implemented method and system for allowing a user to distribute an application in an electronic device to at least one specified recipient. The method according to the present invention includes invoking a share function in the electronic device by the user, and in response to the user invoking the share function, transmitting automatically an install image associated with the application to the at least one specified recipient. According to the present invention, the install image is an installable copy of the application. | 2008-12-18 |
20080313631 | METHOD FOR INSTALLING FILES, DIGITAL SUBSCRIBER LOOP SYSTEM AND CUSTOMER PREMISES EQUIPMENT - A method for installing files, a digital subscriber loop (DSL) system, and customer premises equipment (CPE) is provided. The method includes the following steps: a CPE acquires a package which includes a command list and payload files, and in which the command list includes an Execute command; the CPE processes the command list, determines corresponding payload files based on the Execute command in the command list, and executes functions of the payload files. In the method and system of the present invention, a new Execute command is added into the command list defined by a TR-069 standard. The payload files in the package are executed under the instruction of the Execute command after the CPE downloads the package carrying the Execute command. The CPE can determine complicated instance or carry out complex operations based on the downloaded package. | 2008-12-18 |
20080313632 | METHODS, DEVICES, AND PRODUCTS FOR PROVIDING ACCESS TO SYSTEM-ADMINISTRATION FUNCTIONS OF A COMPUTER OR RELATED RESOURCES - Methods, devices, and products relating to displaying, in a shared user-interface object, system-administration-related content from a heterogeneous group of resources associated with a computing device and/or executing software operable to cause a system-administration task to be performed. In one embodiment, a user interface for a local program executing on a computing device is presented as a part of a Web page that is supplied from a remote server. | 2008-12-18 |
20080313633 | Software feature usage analysis and reporting - Described is a technology for analyzing usage of a software program's features. Software instrumentation data is during actual user program usage sessions. The collected data is then processed to determine various feature usage counts and other information, cross-feature usage (e.g., among users who use a feature, how many use another feature or program), and characteristics of feature users, e.g., how long, how much, how often and how extensive feature users use a program. Session analysis may be performed to provide information about the number of sessions in which a set of features occur. Feature usage trends over time may also be determined via analysis. A user interface is described for facilitating selection of one or more features to analyze, for facilitating selection of a group of users, and/or for outputting results corresponding to the analysis. | 2008-12-18 |
20080313634 | WORKFLOW MANAGEMENT SERVER AND METHOD - Even when an error has occurred in a device that is executing an activity, the workflow is continued as much as possible. When an error has occurred in an activity that is in progress in a device X, a server notifies the device X of an alternative device. The name of the alternative device (device Y) is displayed on the device X. The operator can send a job catalog request from the device Y to the server and select an aborted job from the provided job catalog. The server is notified of the selected job. When password authentication has succeeded, the device Y is permitted to continue the activity. | 2008-12-18 |
20080313635 | JOB ALLOCATION METHOD FOR DOCUMENT PRODUCTION - Methods and systems of processing print jobs are disclosed. A feasible route for processing each of a plurality of jobs is determined- For each feasible route, the time to process the job via the feasible route is determined. Each job is assigned to a first feasible route. A first objective function value is determined using a time to process each job assigned to each autonomous cell. A job is selected. A second feasible route is selected for the selected job. A second objective function value is determined by substituting the second feasible route for the first feasible route for the selected job. If the first value plus a threshold exceeds the second value, the second value replaces the first value, and the second feasible route replaces the first feasible route. Selection and substitution are repeated for each job. The jobs are then processed. | 2008-12-18 |
20080313636 | SYSTEM AND METHOD FOR SECURE AUTOMATED DATA COLLECTION - The invention provides for an automated data collection having an endpoint coupled to at least one gaming machine to collect data from the at least one gaming machine, at least one concentrator in communication with the endpoint via a personal area network to obtain the data from the endpoint, and at least one remote collection server in communication with the at least one concentrator to receive the data from the at least one concentrator, wherein the data is pushed from the endpoint to the at least one remote collection server at predefined time intervals without interrupting game play on the at least one gaming machine. | 2008-12-18 |
20080313637 | PREDICTION-BASED DYNAMIC THREAD POOL MANAGEMENT METHOD AND AGENT PLATFORM USING THE SAME - The present invention relates to a prediction-based dynamic thread pool management method and an agent platform using the same. An prediction-based dynamic thread pool management method according to the present invention includes: (a) calculating a thread variation to a variation of the number of threads at a time t | 2008-12-18 |
20080313638 | Network Resource Management Device - The present invention introduces a plurality of resource management devices (M | 2008-12-18 |
20080313639 | POLICY BASED SCHEDULING OF SOFTWARE APPLICATIONS - A method and apparatus for using policies to limit resource usage by software applications is disclosed herein. The policies define rules that specify a maximum amount of a resource that a particular application is allowed to use given the current state of the computer system, in one embodiment. The state can be defined based on conditions such as user activity, resource usage, time of day, etc. A scheduler monitors the computer system and the application and enforces the policies to control the resource usage of each application. If the scheduler determines that an application has been using more of a particular resource than is allowed then the scheduler takes some action to reduce resource usage until actual resource usage is at or below allowed resource usage. Each application has its own set of policies associated that allow the application to define rules to limit resource usage, in one embodiment. | 2008-12-18 |
20080313640 | Resource Modeling and Scheduling for Extensible Computing Platforms - Energy management modeling and scheduling techniques are described for reducing the power consumed to execute an application on a multi-processor computing platform within a certain time period. In one embodiment, a sophisticated resource model which accounts for discrete operating modes for computing components/resources on a computing platform and transition costs for transitioning between each of the discrete modes is described. This resource model provides information for a specific heterogeneous multi-processor computing platform and an application being implemented on the platform in a form that can be processed by a selection module, typically utilizing an integer linear programming (ILP) solver or algorithm, to select a task schedule and operating configuration(s) for executing the application within a given time. | 2008-12-18 |
20080313641 | Computer system, method and program for managing volumes of storage system - Provided is a computer system including a host computer, a storage system, and a management computer, in which the storage system receives data I/O request to virtual logical volumes and data I/O request to one or more real logical volumes, each of the virtual logical volumes is allocated to one of one or more pools, storage areas of physical storage systems are allocated to all storage areas defined as the pools, and when a performance problem has occurred in one of the virtual logical volumes, the management computer selects the one of the virtual logical volumes, and selects a pool other than the pool to which the selected virtual logical volume is allocated and the real logical volumes as a migration destination of the selected virtual logical volume, to thereby prevent a performance problem from being caused by interference among the virtual logical volumes sharing the pool. | 2008-12-18 |
20080313642 | SYSTEM AND METHOD FOR ALLOCATING SPARE SYSTEM RESOURCES - A system and method for allocating and/or utilizing spare computing system (e.g., personal computing system) resources. Various aspects of the present invention may, for example and without limitation, provide a system and/or method that communicates incentive information with computing systems, and/or representatives thereof, regarding the allocation of computing resources for utilization by other computing systems and/or incentives that may be associated with such utilization. Various aspects of the present invention may, for example, allocate one or more resources of a computing system for utilization by another computing system based, at least in part, on such communicated incentive information. | 2008-12-18 |
20080313643 | WORKLOAD SCHEDULER WITH CUMULATIVE WEIGHTING INDEXES - A workload scheduler supporting the definition of a cumulative weighting index is proposed. The scheduler maintains ( | 2008-12-18 |
20080313644 | SYSTEM ANALYSIS APPARATUS AND SYSTEM ANALYSIS METHOD - For an information system to be analyzed, restriction information indicating a restriction to be satisfied in the case where the information system is normal is acquired, and an anomalous state failing to satisfy the restriction is specified in a state transition model involving only the automatic transition. Also, the transition from an anomalous state to a normal state is retrieved in the state transition model involving only the manual transition thereby to output management work information indicating a management work specified by the retrieved manual transition as related to the anomalous state. | 2008-12-18 |
20080313645 | Automatic Mutual Exclusion - An automatic mutual exclusion computer programming system is disclosed which allows a programmer to produce concurrent programming code that is synchronized by default without the need to write any synchronization code. The programmer creates asynchronous methods which are not permitted make changes to shared memory that they cannot reverse, and can execute concurrently with other asynchronous methods. Changes to shared memory are committed if no other thread has accessed shared memory while the asynchronous method executed. Changes are reversed and the asynchronous method is re-executed if another thread has made changes to shared memory. The resulting program executes in a serialized order. A blocking system method is disclosed which causes the asynchronous method to re-execute until the blocking method's predicate results in an appropriate value. A yield system call is disclosed which divides asynchronous methods into atomic fragments. When a yield method call is made, shared memory changes are committed if possible or reversed and the atomic fragment is re-executed. | 2008-12-18 |
20080313646 | STORAGE-DEVICE DISCOVERY PROTOCOL - A system and method may include a first storage device supporting a first set of functions and a second storage device supporting a second set of functions different from the first set of functions. The first and second storage devices may be configured to provide a common interface to enable discovery of the first and second sets by invoking a procedure call common to the first and second storage devices. An application, which may initially be unaware of the first and second sets, may be configured to invoke the procedure call and thereby discover the first and second sets, which may be provided as XML documents. The application may be further configured to communicate with the first storage device using the first set of functions, and communicate with the second storage device using the second set of functions using the information discovered by invoking the procedure call. | 2008-12-18 |
20080313647 | Thread virtualization techniques - Various technologies and techniques are disclosed for virtualizing threads. An operating system thread is virtualized by intercepting accesses of the operating system thread state and emulating a normal operating system behavior. A kernel mode thread state is virtualized by intercepting kernel accesses of the kernel mode thread state and emulating a normal kernel mode behavior. A user mode thread state is virtualized by intercepting user mode accesses of the user mode thread state and emulating a normal user mode behavior. If the access is a write access, then the write access is applied to a virtual thread structure. If the access is a read access, then the read access is applied to the virtual thread structure. | 2008-12-18 |
20080313648 | PROTECTION AND COMMUNICATION ABSTRACTIONS FOR WEB BROWSERS - Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management component that facilitates controlled communication between the first resources and the second resources and prevents the first resources and the second resources from accessing other resources that the first resources and the second resources are not permitted to access. The resource management component may be further operable to contain restricted services in a sandbox containment structure and/or to isolate access-controlled resources in a service instance. In addition, the resource management component may be operable to facilitate the flexible display of resources from disparate domains and/or controlled communication therebetween. | 2008-12-18 |
20080313649 | Efficient web services application status self-control system on image-forming device - Techniques and systems for controlling resources used by a device's web services applications are disclosed. In one technique, web services applications release their allocated resources and enter a “sleep mode” after being inactive for a specified period of time. In one technique, a device maintains a shared pool of memory resources. The pool contains data structures that web services applications are likely to re-use. Before allocating a new instance of a needed data structure from free memory, a web services application first determines whether the shared pool already contains a currently unused but allocated instance of a data structure of the needed type, and, if the shared pool does, then the web service application uses that instance, overwriting existing data in the instance as needed. Web services applications return such data structures to the shared pool when those web services applications are finished using those data structures. | 2008-12-18 |
20080313650 | Mutable application experience and user interface - A dynamic and interchangeable set of application behaviors is implemented upon the same underlying software engine. Downloadable data provider behavior descriptors configure the UI generation application dynamically on demand to meet needs that are unknown at ship time, or otherwise cannot be predicted in advance—inputs, formats, contents, and the optimal user interface or experience, all change over time. A data provider supplies the data source locations, data feeds, poll/pull intervals on feeds, parameter definitions, data binding definitions, lists, groups, UI templates, data transformation logic, resources, and UI templates to plug into the base application engine, which transforms the supplied data to create a UI experience tailored to match the appropriate events and available data over time. The base application engine is agnostic to both the data provider and the input data received. | 2008-12-18 |
20080313651 | Event queuing and consumption - Techniques are described to provide event queuing and consumption. In an implementation, events received at an event router are queued after determining that a switch is to be performed from a first event consumer to a second event consumer. Events previously queued at the first event consumer are communicated to the second event consumer, and when completed, the events queued at the event router are communicated to the second event consumer. | 2008-12-18 |
20080313652 | Notifying user mode scheduler of blocking events - Various technologies and techniques are disclosed for detecting and handling blocking events. A user mode thread is assigned a dedicated backing thread. System calls are made on the dedicated backing thread. The kernel detects when a system call results in a blocking event. A core that the dedicated backing thread is currently running on is observed. An entry in a per process table that maps cores to a currently associated primary thread waiting to be woken is consulted. The currently associated primary thread for the core is woken with a special result code to indicate that it was woken due to the blocking system call. The primary thread is released back to the application. A user mode scheduler is notified of the blocking event so a core can continue to be utilized. | 2008-12-18 |
20080313653 | PRINTER DATA STREAM TUNNELING FOR PRINT WORKCELL DEVICE CONTROL - A system and method are disclosed for a printing system that embeds tunneled messages into a data stream transferred along a data path. The embedded messages direct the operation of an associated system or device along the data path. The embedded messages are inserted No Operation or similar commands embedded by a preprocessor into the data stream and then emitted in a printing workcell for controlling the printer or associated system or device. | 2008-12-18 |
20080313654 | INPUT/OUTPUT CONTROL APPARATUS, INPUT/OUTPUT CONTROL SYSTEM, AND INPUT/OUTPUT CONTROL METHOD - An input/output control apparatus includes: a request acceptance unit configured to accept a switch request for requesting to change an operating system occupying any one of the input device and the output device; a control information generator unit configured to generate control information including any one of input destination information and output enable information in response to the switch request; and a control information output unit configured to output any one of the input destination information and the output enable information. The input destination information includes at least information for specifying an input destination operating system to which information inputted from the input device is inputted; and the output enable information includes at least information for specifying whether or not each of the plurality of operating systems can output information to the output device. | 2008-12-18 |
20080313655 | Processing received data - A computer system comprising hardware including a data interface for interfacing between the computer system and a data source; a memory; a first operating system capable of communicating with the hardware; and a second operating system capable of supporting a user-level application and being configured to communicate with the hardware via the first operating system, the second operating system being capable of allocating a region of the memory for use as a buffer by such a user-level application. The data interface is configurable to associate a predetermined data format with a region of the memory that has been allocated for use as a buffer by a user-level application supported by the second operating system and to, on receiving from the data source a data message of that format, automatically store data of that message in that region of the memory without it passing via the first or second operating systems. | 2008-12-18 |
20080313656 | User mode stack disassociation - Various technologies and techniques are disclosed for allowing a user mode stack to be shared by multiple contexts. A user mode stack can be shared between execution contexts that are guaranteed to not need the user mode stack at the same time. For example, each user mode portion of a kernel thread is provided with a dedicated backing thread. When a respective dedicated backing thread is sleeping and not using a respective user mode stack, the user mode stack is allowed to float with a respective user mode portion to other kernel threads. The user mode stack is disassociated from the kernel portion of the thread. The kernel is notified of an address of a user mode thread context. The kernel mode portion of the converted thread becomes a backing thread that waits. The user mode portion of the converted thread can be switched without entering the kernel. | 2008-12-18 |
20080313657 | APPARATUS, SYSTEM, AND METHOD FOR MANAGING TRAY DEVICES - An apparatus, system, and method are disclosed for managing tray devices. A tray slot module creates a tray slot object of a tray slot class that extends a SMI-S CIM CIM_Slot class. The tray slot object describes a tray slot. A tray physical package module creates a tray physical package object of a tray physical package class that extends a SIM-S CIM CIM_PhysicalPackage class. The tray physical package object describes a tray device, references the tray slot object, and comprises a universal unique identifier. A tray object module creates a tray object of a tray class that extends SMI-S CIM CIM_LogicalDevice class. The tray object describes a tray, is referenced by a SMI-S CIM CIM_ComputerSystem object, references the tray physical package object, and comprises a device identifier. A management module manages the tray device using the tray slot object, tray physical package object, and tray object. | 2008-12-18 |
20080313658 | Intelligent Dynamic Multi-Zone Single Expander Connecting Dual Ported Drives - A single fibre channel switch or serial attached SCSI expander applies zoning on the initiator ports to each of the two ports of one or more drives. The fibre channel switch or serial attached SCSI expander uses zoning to connect both ports of each drive to a single expander and set the zones in the expander such that each zone includes at least one initiator port and one drive port. | 2008-12-18 |
20080313659 | Page and device-optimized cascading style sheets - An arrangement for generating page and/or device-optimized cascading style sheets (“CSS”) is disclosed in which CSS blocks are provided in a collection of one or more files. In an illustrative example, the collection of files is arranged as XML (extensible Markup Language) files. Each CSS block is marked with attributes that indicate to which modules used to compose a page it applies, and/or its applicability to a specific device. At page rendering time, the CSS for the page is dynamically generated by selecting CSS blocks from the files based on detected device capabilities and/or the modules on the page. | 2008-12-18 |
20080313660 | APPARATUS, SYSTEM, AND METHOD FOR SOAP ACCESS TO DATA SOURCE PROCEDURES - An apparatus, system, and method are disclosed for web service access to a remote data source procedure. The method includes receiving a web service request from a client and identifying the procedure call identifier within the web service request. The web service request includes a procedure call identifier and zero or more parameters. The method includes creating a procedure call to a data source procedure accessible through an Application Program Interface. The procedure call is created at least in part by ordering parameters of the procedure call based on an order of the zero or more parameters in the web service request. The parameters of the procedure call are ordered without using an explicit parameter mapping. The method includes sending a web service response to the client in response to receiving a response from the data source procedure. The web service response includes information responsive to the procedure call. | 2008-12-18 |
20080313661 | Administering an Epoch Initiated for Remote Memory Access - Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed. | 2008-12-18 |
20080313662 | Disk-Clamping Device - A disk-clamping device includes a plurality of clamp pawls which project and pull in through a plurality of windows | 2008-12-18 |