Patent application number | Description | Published |
20120225081 | VEGF-BINDING MOLECULES - VEGF-binding molecules, preferably VEGF-binding immunoglobulin single variable domains like VHHs and domain antibodies, pharmaceutical compositions containing same and their use in the treatment of diseases that are associated with VEGF-mediated effects on angiogenesis. Nucleic acids encoding VEGF-binding molecules, host cells and methods for preparing same. | 09-06-2012 |
20130078247 | BISPECIFIC BINDING MOLECULES BINDING TO DII4 AND ANG2 - Bispecific binding molecules binding to both DII4 and Ang2, preferably in the form of immunoglobulin single variable domains like VHHs and domain antibodies, pharmaceutical compositions containing the same and their use in the treatment of diseases that are associated with DII4- and/or Ang2-mediated effects on angiogenesis are disclosed. Further, nucleic acids encoding bispecific binding molecules, host cells and methods for preparing same are also described. | 03-28-2013 |
20130078248 | BISPECIFIC BINDING MOLECULES BINDING TO VEGF AND ANG2 - Bispecific binding molecules binding to both VEGF and Ang2, preferably in the form of immunoglobulin single variable domains like VHHs and domain antibodies, pharmaceutical compositions containing the same and their use in the treatment of diseases that are associated with VEGF- and/or Ang2-mediated effects on angiogenesis are disclosed. Further, nucleic acids encoding bispecific binding molecules, host cells and methods for preparing same are also described. | 03-28-2013 |
Patent application number | Description | Published |
20080307209 | METHODS AND APPARATUS FOR IMPLEMENTING POLYMORPHIC BRANCH PREDICTORS - A polymorphic branch predictor and method includes a plurality of branch prediction methods. The methods are selectively enabled to perform branch prediction. A selection mechanism is configured to select one or more of the branch prediction methods in accordance with a dynamic setting to optimize performance of the branch predictor during operation in accordance with a current task. | 12-11-2008 |
20080313424 | METHOD AND APPARATUS FOR SPATIAL REGISTER PARTITIONING WITH A MULTI-BIT CELL REGISTER FILE - There is provided a multi-bit storage cell for a register file. The storage cell includes a first set of storage elements for a vector slice. Each storage element respectively corresponds to a particular one of a plurality of thread sets for the vector slice. The storage cell includes a second set of storage elements for a scalar slice. Each storage element in the second set respectively corresponds to a particular one of at least one thread set for the scalar slice. The storage cell includes at least one selection circuit for selecting, for an instruction issued by a thread, a particular one of the storage elements from any of the first set and the second set based upon the instruction being a vector instruction or a scalar instruction and based upon a corresponding set from among the pluralities of thread sets to which the thread belongs. | 12-18-2008 |
20080313437 | METHOD AND APPARATUS FOR EMPLOYING MULTI-BIT REGISTER FILE CELLS AND SMT THREAD GROUPS - There are provided methods and apparatus for multi-bit cell and SMT thread groups. An apparatus for a register file includes a plurality of multi-bit storage cells for storing a plurality of bits respectively corresponding to a plurality of threads. The apparatus further includes a plurality of port groups, operatively coupled to the plurality of multi-bit storage cells, responsive to physical register identifiers. The plurality of port groups is responsive to respective ones of a plurality of thread identifiers. Each of the plurality of thread identifiers are for uniquely identifying a particular thread from among a plurality of threads. | 12-18-2008 |
20090077425 | Method and Apparatus for Detection of Data Errors in Tag Arrays - A method for detecting errors in a tag array includes accessing the tag array with an index, retrieving at least one tag from the tag array, and computing a parity bit based on the expected tag. | 03-19-2009 |
20130086563 | COMPILING CODE FOR AN ENHANCED APPLICATION BINARY INTERFACE (ABI) WITH DECODE TIME INSTRUCTION OPTIMIZATION - A code sequence made up multiple instructions and specifying an offset from a base address is identified in an object file. The offset from the base address corresponds to an offset location in a memory configured for storing an address of a variable or data. The identified code sequence is configured to perform a memory reference function or a memory address computation function. It is determined that the offset location is within a specified distance of the base address and that a replacement of the identified code sequence with a replacement code sequence will not alter program semantics. The identified code sequence in the object file is replaced with the replacement code sequence that includes a no-operation (NOP) instruction or having fewer instructions than the identified code sequence. Linked executable code is generated based on the object file and the linked executable code is emitted. | 04-04-2013 |
20150082009 | METHOD AND APPARATUS FOR THE DYNAMIC CREATION OF INSTRUCTIONS UTILIZING A WIDE DATAPATH - A processing system and method includes a predecoder configured to identify instructions that are combinable to form a single executable internal instruction. Instruction storage is configured to merge instructions that are combinable. An instruction execution unit is configured to execute the single, executable internal instruction on a hardware wide datapath. | 03-19-2015 |
Patent application number | Description | Published |
20160139925 | TECHNIQUES FOR IDENTIFYING INSTRUCTIONS FOR DECODE-TIME INSTRUCTION OPTIMIZATION GROUPING IN VIEW OF CACHE BOUNDARIES - A technique for processing instructions includes examining instructions in an instruction stream of a processor to determine properties of the instructions. The properties indicate whether the instructions may belong in an instruction sequence subject to decode-time instruction optimization (DTIO). Whether the properties of multiple ones of the instructions are compatible for inclusion within an instruction sequence of a same group is determined. The instructions with compatible ones of the properties are grouped into a first instruction group. The instructions of the first instruction group are decoded subsequent to formation of the first instruction group. Whether the first instruction group actually includes a DTIO sequence is verified based on the decoding. Based on the verifying, DTIO is performed on the instructions of the first instruction group or is not performed on the instructions of the first instruction group. | 05-19-2016 |
20160139926 | INSTRUCTION GROUP FORMATION TECHNIQUES FOR DECODE-TIME INSTRUCTION OPTIMIZATION BASED ON FEEDBACK - A technique of processing instructions for execution by a processor includes determining whether a first property of a first instruction and a second property of a second instruction are compatible. The first instruction and the second instruction are grouped in an instruction group in response to the first and second properties being compatible and a feedback value generated by a feedback function indicating the instruction group has been historically beneficial with respect to a benefit metric of the processor. Group formation for the first and second instructions is performed according to another criteria, in response to the first and second properties being incompatible or the feedback value indicating the grouping of the first and second instructions has not been historically beneficial. | 05-19-2016 |
20160139927 | IDENTIFYING INSTRUCTIONS FOR DECODE-TIME INSTRUCTION OPTIMIZATION GROUPING IN VIEW OF CACHE BOUNDARIES - A technique for processing instructions includes examining instructions in an instruction stream of a processor to determine properties of the instructions. The properties indicate whether the instructions may belong in an instruction sequence subject to decode-time instruction optimization (DTIO). Whether the properties of multiple ones of the instructions are compatible for inclusion within an instruction sequence of a same group is determined. The instructions with compatible ones of the properties are grouped into a first instruction group. The instructions of the first instruction group are decoded subsequent to formation of the first instruction group. Whether the first instruction group actually includes a DTIO sequence is verified based on the decoding. Based on the verifying, DTIO is performed on the instructions of the first instruction group or is not performed on the instructions of the first instruction group. | 05-19-2016 |
20160139928 | TECHNIQUES FOR INSTRUCTION GROUP FORMATION FOR DECODE-TIME INSTRUCTION OPTIMIZATION BASED ON FEEDBACK - A technique of processing instructions for execution by a processor includes determining whether a first property of a first instruction and a second property of a second instruction are compatible. The first instruction and the second instruction are grouped in an instruction group in response to the first and second properties being compatible and a feedback value generated by a feedback function indicating the instruction group has been historically beneficial with respect to a benefit metric of the processor. Group formation for the first and second instructions is performed according to another criteria, in response to the first and second properties being incompatible or the feedback value indicating the grouping of the first and second instructions has not been historically beneficial. | 05-19-2016 |
Patent application number | Description | Published |
20120067974 | CAP FOR A DISPLAY - The invention relates to a plug for a display stand for produce, suitable for spraying drops of fluid onto the produce, the plug being suitable for being placed in a section member of such a display stand, and including:
| 03-22-2012 |
20120234937 | METHOD OF CLEANING A SPRAY DEVICE - The device for diffusing sprayed liquid in a reception zone includes a vessel suitable for containing a liquid for spraying and at least one diffuser of sprayed liquid that is arranged in the vessel. The diffuser includes in particular an ultrasound emitter. The cleaning method is such that during a stage of operation of the device in which the device is not diffusing liquid in the reception zone, the following steps are performed: heating a liquid in the vessel up to a predetermined temperature, preferably higher than 60° C., in particular lying in the range 65° C. to 80° C.; and draining the liquid from the vessel via a pipe of the device that is situated outside a circuit for diffusing sprayed liquid in the reception zone. | 09-20-2012 |
20150223513 | MIST DISTRIBUTION HEAD FOR A NEBULIZING APPARATUS - A fog distribution head for a fogging apparatus, which has: a fog inlet, and at least two fog outlets, each suitable for placing the inlet in communication with the outside of the head. The head includes at least two plugs suitable for plugging the respective outlets. Each plug is suitable for plugging a single one of the outlets, the plugs being movably mounted with respect to a frame of the head, independently from one another. | 08-13-2015 |
Patent application number | Description | Published |
20090150860 | METHOD AND SYSTEM FOR COMBINING QUALITY ASSURANCE AND MODEL TRANSFORMATIONS IN A BUSINESS-DRIVEN DEVELOPMENT ENVIRONMENT - A system for combining quality assurance and model transformations in a business-driven development environment includes a host system executing a business modeling application, a transformation framework including a transformation programming interface (TPI) and a quality assurance framework executing on top of the business modeling application, and a plurality of transformation plug-in tools in communication with the TPI. The TPI includes options for model access and traversal, model element creation/removal, model element property editing and analysis. The options are applied to the transformations, via the selected transformation plug-in tools, to a business model resulting in a modified business model that conforms to an information technology (IT)-based executable code. The quality assurance framework performs single-entry-single-exit (SESE) fragment decomposition of the modified business model, control-flow analysis, and notification to the user of any detected error conditions, the notification presented to the user with the modified business model via the TPI. | 06-11-2009 |
20100030732 | SYSTEM AND METHOD TO CREATE PROCESS REFERENCE MAPS FROM LINKS DESCRIBED IN A BUSINESS PROCESS MODEL - A method of constructing a process reference map. The method includes iterating over each of a plurality of process models. An intermediary reference graph is created. A directed link for each reference in the process models is added to the intermediary reference graph, the link pointing from a node in the reference graph representing a process model within which a reference occurred to a node representing a process model that the reference is pointing towards. The method determines, between two process models of the plurality of process models, whether an inconsistency including one of an outbound process reference missing inconsistency, an inbound process reference missing inconsistency, and an unavailable information inconsistency exists. A new process model map is created from the intermediary reference graph with one element each representing a process models and the elements being linked representing the references therebetween. Each link comprises an attribute indicating one of a context, type of reference, and a modeling element. | 02-04-2010 |
20100031230 | METHOD OF AUTOMATIC PATTERN BASED EDITING OF BUSINESS MODELS - A method of automatic pattern based editing of business models on a canvas of business model editing application includes receiving a request to automatically edit a business model, constructing an initial current set C of elements from the business model, constructing an initial next set N of elements from the business model, and connecting elements between the initial current set C and the initial next set N until all elements in both the initial current set C and the initial next set N have been connected. The connecting is based on at least connecting elements sequentially if the elements exist from left to right on the canvas, and connecting elements in parallel or using a decision and merge combination if the elements exist from top to bottom on the canvas. | 02-04-2010 |
20100145746 | Vertical Process Merging By Reconstruction Of Equivalent Models And Hierarchical Process Merging - Methods, systems and computer program products for improvement of vertical process merging by reconstruction of equivalent models and hierarchical process merging. Embodiments of the invention include a method for identifying and resolving differences between business process models, the method including receiving a first business process model project, identifying a second business process model project, performing changes to the second business process model project, merging the first and second business process model projects, creating a delta model configured to analyze the differences between the business process model projects, wherein an analysis of the differences between the first and second business process model projects are in the form of low-level changes and auto-applying the low-level changes of the first business process model project to generate a new business process model project. | 06-10-2010 |
20110145707 | COMPUTER-IMPLEMENTED METHOD AND SYSTEMS FOR ASSISTING A USER IN APPLYING A BUSINESS PROCESS PATTERN - A computer-implemented method for assisting a user in applying a business process pattern. In some embodiments, the computer-implemented method includes providing a graphical user interface (GUI) adapted for displaying a first representation of a business process and for allowing user editing of the business process. The computer-implemented method also includes receiving a user selection of a fragment of the business process as displayed in the first representation. In some embodiments, the computer-implemented method includes calling a second representation of the business process, the second representation including a hierarchy of fragments of business process, and checking whether the fragment selected by the user corresponds to one of the fragments of the second representation. The computer-implemented method may also include instantiating a business process pattern using the selected fragment if the fragment selected corresponds. The selected fragment is re-usable within the business process pattern. | 06-16-2011 |
20140149659 | IDENTIFYING REDUNDANT DATA FOR DISK IMAGE STREAMING - Redundant data in a streaming disk image is identified using commands to indicate unused disk blocks, such as TRIM/UNMAP commands. A TRIM/UNMAP layer is added between an operating system and a disk driver to support the use of TRIM/UNMAP commands. Using the TRIM/UNMAP layer, blocks of a streamed disk image that are unallocated by the operating system are identified. The identified unallocated blocks are streamed to a server for analysis and storage. | 05-29-2014 |
20140149660 | IDENTIFYING REDUNDANT DATA FOR DISK IMAGE STREAMING - Redundant data in a streaming disk image is identified using commands to indicate unused disk blocks, such as TRIM/UNMAP commands. A TRIM/UNMAP layer is added between an operating system and a disk driver to support the use of TRIM/UNMAP commands. Using the TRIM/UNMAP layer, blocks of a streamed disk image that are unallocated by the operating system are identified. The identified unallocated blocks are streamed to a server for analysis and storage. | 05-29-2014 |
20140317394 | PROVISIONING OF OPERATING SYSTEMS TO USER TERMINALS - Methods and apparatus are provided for provisioning an operating system image from a server ( | 10-23-2014 |
20150067404 | FLEXIBLE AND MODULAR LOAD TESTING AND MONITORING OF WORKLOADS - Various embodiments monitor a distributed software system. In one embodiment, at least one monitoring policy associated with a distributed software system is selected. A policy type associated with the monitoring policy is identified. An installer is selected based on the policy type associated with the monitoring policy. Monitoring software is installed in a computing environment utilizing the installer. The monitoring software is configured to monitor the distributed software system based on the monitoring policy. | 03-05-2015 |
20150248283 | NETWORK UPDATABLE USER TRUSTED DEVICE - A user trusted device and a software update method for updating the device. The device includes: a connection interface enabling connection with a host computer; a persistent memory storing a boot enabling data structure and a network updater, wherein: the network updater is configured to interact with firmware of the host computer to initiate communication over a network; and the boot enabling data structure: is detectable by the firmware upon connection of the user trusted device with the host computer; is such that host computer can boot from the user trusted device, as per the data structure of the boot enabling data structure; and includes instructions for the firmware to initiate a transfer of the network updater on the host computer for subsequent execution, upon the host computer booting from the user trusted device. | 09-03-2015 |
20150378744 | BOOTING A COMPUTER FROM A USER TRUSTED DEVICE WITH AN OPERATING SYSTEM LOADER STORED THEREON - In an approach to allowing a computer to boot from a user trusted device (UTD), the computer comprises a data storage device storing operating system (OS) services, and a version of an OS loader. The UTD is connectable to the computer and stores a boot loader, detectable by a firmware executing at the computer, and an OS loader, and wherein the UTD prevents an unauthenticated user to modify the boot loader and the OS loader stored thereon. The computer then, upon connection, lets the boot loader be detected by the firmware for execution of the boot loader at least partly at the computer, to cause to transfer the OS loader from the UTD to the computer, and executes the transferred OS loader at least partly from the computer, to execute at least one crypto driver for the OS, to start the OS services and complete booting of the computer. | 12-31-2015 |
Patent application number | Description | Published |
20150310214 | ENABLING AN EXTERNAL OPERATING SYSTEM TO ACCESS ENCRYPTED DATA UNITS OF A DATA STORAGE SYSTEM - The present invention is notably directed to a method for allowing an operating system, or OS, to access an encrypted data storage system of a computer ( | 10-29-2015 |
20150317471 | USER TRUSTED DEVICE TO ATTEST TRUSTWORTHINESS OF INITIALIZATION FIRMWARE - The present invention is notably directed to a user trusted device ( | 11-05-2015 |
20150317472 | USER TRUSTED DEVICE FOR DETECTING A VIRTUALIZED ENVIRONMENT - The present invention is notably directed to a method for enabling a computer ( | 11-05-2015 |
20150332052 | ENABLING AN EXTERNAL OPERATING SYSTEM TO ACCESS ENCRYPTED DATA UNITS OF A DATA STORAGE SYSTEM - A method for allowing an operating system (OS), to access an encrypted data storage system of a computer, wherein: the data storage system comprises: a partition; and first encrypted data units that comprise partition table data of said data storage system; and said computer is connectable to an external device comprising: a boot loader for an external OS that is not installed on the computer; and partitioning information capturing an expected location of said partition in the data storage system; and wherein second encrypted data units that comprise reference partition table data for said data storage system are available from said computer or said external device, the method comprising: upon connection of said external device to the computer, instructing to boot the computer from said boot loader; and during or after booting of the computer: comparing the first and second encrypted data units; and if the first and second encrypted data units match, allow the external OS to access, based on the partitioning information stored on the external device, one or more data units of said partition on the data storage system. | 11-19-2015 |
20160070914 | SECURE EXECUTION OF SOFTWARE MODULES ON A COMPUTER - A system and method for executing software modules on a computer, the method comprising: executing (S | 03-10-2016 |