doc_id
stringlengths 7
11
| appl_id
stringlengths 8
8
| flag_patent
int64 0
1
| claim_one
stringlengths 12
21.5k
|
---|---|---|---|
10003601 | 15474372 | 1 | 1. A method, comprising: identifying, by a security enabled application executing on at least one processor, user credentials associated with an access attempt; generating, by the security enabled application, a query based on the user credentials to identify whether the user credentials are associated with at least one predetermined group membership; receiving, by the security enabled application, a response to the query comprising group information corresponding to the user; and comparing, by the security enabled application, the group information to a set of predetermined rules to determine whether the group information comprises privilege rules used to grant access to the access attempt; wherein the set of predetermined rules are stored in a data file that specifies one or more privilege rules for a plurality of groups; wherein a decision to grant access to the access attempt is dependent on a role of the user and on the group information such that a first user having a first role and first group information is granted access under different conditions to a second user having the first role and a second group information different to the first group information; wherein at least one rule makes changes to at least one current role of the user to provide limited access on-the-fly to provide the user with access for the access attempt; wherein at least one rule in the data file that grants access to the access attempt is identified; wherein the access attempt and at least one task associated with the access attempt is allowed; wherein if a user account associated with the access attempt is part of at least one group of user accounts, the user account is granted access to administrative privileges which are granted to at least one other user in the at least one group. |
9002746 | 13465815 | 1 | 1. A computer-implemented method for managing license information associated with digital content comprising: under control of one or more serve computers implemented with specific computer readable instructions, identifying a number of playback devices that can be authorized to playback digital content associated with a license, each playback device including a processor configured to facilitate playback of the digital content, wherein the number of playback devices is indicated by the license, and wherein the number of playback devices are authorized regardless of type of playback device; transmitting via a communication network, first license information corresponding to the license to a set of playback devices, wherein the set of playback devices includes no more than the number of playback devices authorized by the license; generating second license information corresponding to the license, wherein the second license information, when associated with an item of digital content, authorizes a playback device to play the item of digital content only if the playback device includes the first license information; and transmitting the second license information to at least one playback device of the set of playback devices. |
9715587 | 15051997 | 1 | 1. An apparatus, comprising: a memory storing (i) a plurality of functions and (ii) a mapping of locations of the plurality of functions in the memory; a processor configured to: generate a callback to a security function of the plurality of functions in response to a request from a process being executed by the processor, wherein the process (i) is a kernel, (ii) is a boot loader, or (iii) is requesting the security function, wherein the callback is a function call for the security function to execute, in response to the callback, determine a location in the memory of the security function using the mapping, use the mapping to select the security functions of the plurality of functions to execute when operating after booting, and execute the security function upon branching to the location of the security function in the memory according to the mapping. |
20170124065 | 15404916 | 0 | 1. A computer-readable storage medium that is not a signal, the computer-readable storage medium for storing data for access by a program being executed on a data processing system, comprising: a dictionary data structure stored in the computer-readable storage medium, the dictionary data structure including information used by the program and comprising: a first table comprised of entries each representing a natural language term, each entry of the first table containing a term ID identifying its term; a second table comprised of entries each representing a definition, each entry of the second table containing a definition ID identifying its definition; and a third table comprised of entries each representing correspondence between a term and a definition defining the term, each entry of the third table containing a term ID identifying the defined term and a definition ID identifying the defining definition, such that the contents of the data structure are usable to identify any definitions corresponding to a term. |
20140143521 | 13680133 | 0 | 1. An apparatus for providing an instruction to a processor core in a multi-core microprocessor, the apparatus comprising: a match register storing an opcode that identifies an instruction to be replaced; an instruction fetch logic device receiving an incoming instruction to be run by the processor core, identifying an opcode of the incoming instruction, and storing the identified opcode of the incoming instruction in an instruction register; a swap register storing an instruction that replaces the identified instruction; a comparator determining whether the opcode stored in the instruction register and the opcode stored in the match register are same; and a multiplexer replacing the incoming instruction with the instruction stored in the swap register in response to determining that the opcode stored in the instruction register and the opcode stored in the match register are same. |
20170187838 | 15246062 | 0 | 1. A mobile device comprising: a wireless transceiver configured to communicate with a developer exchange system over a wireless communications medium; a processor; and a non-transitory computer-readable medium storing instructions for execution on the processor, wherein the instructions include downloading and installing a first application from a digital distribution platform, and wherein the instructions include, in response to a user of the mobile device navigating to a state of the first application: instantiating the state from a first state template of the first application: selecting a first function module identifier from a plurality of predetermined function module identifiers, wherein each of the plurality of predetermined function module identifiers corresponds to a first function offered by the first state template, wherein the plurality of predetermined function module identifiers and an associated rank ordering are predetermined by a consuming developer of the first application before providing the first application to the digital distribution platform, and wherein in a first operating mode the selecting is based on a highest-ranked function module identifier in the rank ordering; transmitting a function module request to the developer exchange system using the wireless transceiver, wherein the function module request includes the first function module identifier, which uniquely identifies a first function module, wherein the first function module was provided by one of a plurality of producing developers to the developer exchange system prior to the function module request being transmitted; receiving, via the wireless transceiver, the first function module from the developer exchange system; storing the first function module; executing the first function module; and presenting display data generated by execution of the first function module, wherein the display data is presented in an area reserved for the first function by the first state template. |
8589873 | 12187410 | 1 | 1. A method of engineering a software component, comprising: providing the software component with an input interface, an output interface, and a control interface, the control interface being configurable to receive external conditions or parameters that are specific to an environment or to a domain, and to allow said software component to automatically and dynamically adapt to said received external conditions or parameters during runtime, wherein said automatic and dynamic adaptation is not dictated by the activation of preprogrammed code within said software component; providing one or more externally modifiable adapters, the one or more externally modifiable adapters having environment-specific or domain-specific data, and being configurable to be dynamically bound to the software component in dependence upon external conditions or parameters that are specific to an environment or to a domain in which the software component is to be executed; selecting an externally modifiable adapter in dependence upon external conditions or parameters that are specific to an environment or to a domain in which the software component is to be executed; and dynamically binding the selected externally modifiable adapter to the software component in dependence upon external conditions or parameters that are specific to an environment or to a domain in which the software component is to be executed; wherein the selected externally modifiable adapter is dynamically bound to the software component using dynamic binding capability of a programming language in dependence upon external conditions or parameters that are specific to an environment or to a domain in which the software component is to be executed. |
10013059 | 14678271 | 1 | 1. A method, comprising: outputting for display in an animation tool, a graphical representation of a layout of a plurality of actuators of a vibrotactile array, each of the plurality of actuators configured to output haptic feedback; generating a plurality of triangles representing the plurality of actuators, wherein each triangle is defined by three of the plurality of actuators; receiving input specifying a location and a size of a first haptic animation object in the animation tool; generating a set of barycentric coordinates of the first haptic animation object based on the position of the first haptic animation object relative to a first triangle of the plurality of triangles; computing, based on a rendering algorithm applied to the set of barycentric coordinates of the first haptic animation object, a vector profile for each of the actuators, wherein the rendering algorithm defines a relationship between the size of the first haptic animation object and an amplitude of the haptic feedback outputted by the respective actuator, wherein the rendering algorithm comprises one of: (i) a linear function, (ii) a logarithmic function, and (iii) a power function; computing an intensity value for each of the actuators based on the rendering algorithm applied to the size of the first haptic animation object and the vector profile of the respective actuator; and outputting the intensity values to each of the actuators to produce a haptic feedback representing the first haptic animation object. |
20020143792 | 09818134 | 0 | 1. A method for creating, in response to only a single action by a user, a self-extracting file, the method comprising: receiving, from a user, an input file to be used in creating a self-extracting file; and without further action by the user, creating a self-extracting file using the input file, wherein the input file is automatically launched upon execution of the self-extracting file. |
20130290371 | 13930713 | 0 | 1. A method of generating predictive reports in a database system, the method comprising: recording, by a processing device, a user identification, a timestamp and a query, the timestamp including a connection date, the query being associated with a report requested by a user from the database system for each connection to the database system associated with the user identification during a predetermined period; defining, by the processing device, a plurality of intervals in the predetermined period based on a pattern of connections to the database system associated with the user identification; retrieving, by the processing device, instances of the user identification associated with connections to the database system associated with the user identification during a threshold number of the plurality of intervals based on a position that a current date occupies in a current interval, such that a position of each connection date in a respective interval is the same as the position that the current date occupies in the current interval, the respective interval and the current interval being the same; and executing, by the processing device, the query to generate the report from the database system on the current date associated with a current connection of the user identification to the database system prior to a request for the report from the user. |
20140089626 | 13628314 | 0 | 1. A computer-implemented method, comprising: determining an amount of a memory space in a physical memory allocated to a first processing unit during system initialization; consolidating the determined amount of the memory space; and reallocating the consolidated memory space to a second processing unit during runtime. |
4675715 | 06785030 | 1 | 1. A semiconductor integrated circuit including an impedance element comprising: (a) a semiconductor body having a major planar horizontal surface; (b) an insulating layer located on the major surface; (c) a polycrystalline silicon plug substantially filling an aperture having substantially vertical sidewalls in the insulating layer and thereby directly contacting the major surface of the body at the bottom of the aperture, the plug having a vertical height greater than one-half the maximum width of the aperture, the grain boundaries in the plug running substantially solely horizontally in a region thereof situated at a distance of more than one-half such width from the major surface of the body, said region including a complete horizontal cross section of the aperture. |
9721214 | 15231534 | 1 | 1. A system for training a machine learning model having parameters by determining a respective trained parameter value for each of the parameters of the machine learning model, the system comprising: a plurality of computing units; and a plurality of parameter server shards, wherein each shard executes on a respective computing unit, wherein each shard is configured to maintain values of a respective disjoint partition of the parameters of the machine learning model, and wherein a first shard of the plurality of shards is configured to perform operations comprising: receiving a first request for parameter values from a first replica of a plurality of replicas of the machine learning model, wherein each of the plurality of replicas implements an identical instance of the machine learning model with possibly different parameter values for the parameters of the machine learning model, and wherein the first request for parameter values is a request for parameter values for use in a particular iteration of a plurality of iterations of a machine learning training process to be performed by each of the replicas; in response to the first request, downloading a respective current value of each requested parameter to the first replica for use in performing the particular iteration of the machine learning training process; updating the current values of the parameters in the partition maintained by the parameter server shard based on one or more uploads of delta values computed by one or more replicas in the plurality of replicas to generate updated parameter values; receiving a second request for parameter values from a second replica of the plurality of replicas, wherein the second request for parameter values is also a request for parameter values for use in the particular iteration of the machine learning training process; and in response to the second request, downloading a respective updated value of each requested parameter to the second replica for use in performing the particular iteration of the machine learning training process. |
9317125 | 13869771 | 1 | 1. A computer-implemented method for searching a line pattern representation amongst a collection of line pattern representations, the method performed by executing computer executable instructions on one or more processors of the computer, the method comprising: detecting an input gesture input by a user into a computing system; encoding the input gesture by segmenting a line pattern associated with the input gesture into a plurality of segments and assigning a quantized value to each segment of the line pattern; automatically matching the input gesture against each of a plurality of line pattern representations, each representation representing a line pattern having a changing value in a first dimension as a function of a value in a second dimension, and each representation having an encoding comprising a plurality of quantized values associated with a plurality of segments of the each line pattern, and automatically matching comprising determining a measure of commonality between the encoding of the input gesture and the encoding of each of the plurality of line pattern representations; and visualizing at least one line pattern representation of the matched set on a display of the computing system. |
7552119 | 11613757 | 1 | 1. A computer program product comprising a computer readable storage medium having computer usable program code programmed for skipping XML index scans with common ancestors of a previously failed predicate, the operations of the computer program product comprising: receiving an XML query comprising search predicates for locating information in an XML document; selecting entries from an XML document index such that the selected entries satisfy at least one predicate of the XML query, the XML document index generated from the XML document using an XML query expression, the XML document index comprising one or more entries, each entry comprising an XML document path, a document identifier, a node identifier, and a value, wherein the XML document path describes paths to values of the XML document and the node identifier comprises one or more fields corresponding to one or more branches in an XML tree, wherein a single field corresponds to a single branch; evaluating each of the selected entries to determine whether an XML document path in the selected entry satisfies the remaining predicates of the XML query, the remaining predicates being different from the at least one predicate of the XML query; determining an XML document path in the selected entry that fails one of the remaining predicates; and skipping entries from the set of selected entries, each skipped entry identified by a node identifier for the entry wherein the node identifier comprises a field corresponding to the failed XML document path, the skipped entries having an ancestor XML node at a hierarchical level and position that matches an ancestor XML node at the hierarchical level and position of the associated selected entry that fails one of the remaining predicates. |
20150150144 | 14614279 | 0 | 1. (canceled) |
6029188 | 08503673 | 1 | 1. An information processing system for architecture model for interfacing with humans, said architectural model having a plurality of software modules divided into independent element functions, and a work memory area for reading and writing various information as a shared medium, said information processing system comprising: work memory area management means for managing history of task phase descriptions delivered to the work memory area as context information; a bid arbiter means, operably coupled to said work memory area management means, for receiving bids in a contract net protocol, for receiving context information accumulated by said work memory area management means, for evaluating bids in said contract net protocol using the context information, and for performing condition branching based on the bid evaluation in a contract net protocol; a dialog manager means for explaining a course of processing to a user and for providing means to customize the processing to the user, said processing being context information dependent, wherein said software modules communicate with each other by inputting and outputting said task phase descriptions to and from the work memory area by way of said work memory area management means, wherein said software modules operate based on the results of the bid evaluation, and wherein contract bidding is executed in accordance with a task to be executed when the bid is successfully awarded and in the form of bid-context condition strings showing a preceding processing needed for a planned task to be executed. |
20140258844 | 14218261 | 0 | 1. A system, comprising: one or more processors configured to: generate a plurality of navigation hierarchical structure diagrams based on a website navigation category diagram; determine a plurality of searching costs corresponding to respective ones of the plurality of navigation hierarchical structure diagrams; select a selected navigation hierarchical structure diagram of the plurality of navigation hierarchical structure diagrams based on the plurality of searching costs; and implement at least in part a website navigation process using the selected navigation hierarchical structure diagram; and one or more memories coupled to the one or more processors and configured to provide instructions to the one or more processors. |
20100308993 | 12850294 | 0 | 1. A system comprising: a processor; a radio frequency-based electronic tracking device, the electronic tracking device coupled to the processor; and one or more transmitters, the electronic tracking device configurable to read the one or more transmitters; wherein each of the one or more transmitters is configurable to be associated with a particular individual of a group of individuals; wherein the processor is configurable to cluster data from the one or more transmitters; and wherein the processor is configurable to analyze the clustered data to determine a group behavior pattern among the group of individuals. |
8972791 | 13362751 | 1 | 1. A method of managing code-tracing data in a target program, the method comprises the steps of: identifying when an exception occurs in the target program; accessing a stack trace of a call stack to identify a module in the target program that threw the exception; assigning a level of code tracing in that module including activating code-tracing at a high detail level in that module; and returning the code-tracing levels to a default value after a time period expires with no exception being thrown. |
20080183473 | 12022333 | 0 | 1. A system for generating synthetic speech, comprising: a phoneme segment storage section for storing a plurality of phoneme segment data pieces indicating a plurality of sounds of phonemes which are different from each other; and a synthesis section for generating voice data representing synthetic speech of text by receiving an inputted text, by reading out phoneme segment data pieces that correspond to respective phonemes indicating the pronunciation of the inputted text, and then by connecting the read-out phoneme segment data pieces to each other; a computing section for computing a score indicating the unnaturalness of the synthetic speech of the text, on the basis of the voice data; a paraphrase storage section for storing a plurality of second notations, the second notations being paraphrases of first notations and for associating the second notations with the respective first notations; a replacement section for searching the text for a notation matching with any of the first notations and for replacing the searched-out notation with the second notation corresponding to the first notation; and a judgment section for receiving the score and for outputting the generated voice data on condition that the score is smaller than a predetermined reference value, and for inputting the text to the synthesis section in order for the synthesis section to generate further voice data for the text after replacement when the score is equal to or greater than the reference value. |
9130827 | 13908699 | 1 | 1. A method comprising: receiving, at a coordinator device executing a sampling application, a data element comprising a binary string, the binary string generated by a site server of a plurality of site servers in communication with the coordinator device, wherein the binary string comprises a first bit, a second bit, and a third bit, and wherein the binary string is transmitted by the site server in accordance with a probability established by the coordinator device; examining, by the coordinator device, the second bit of the binary string to determine whether to assign the data element to a first sample or to assign the data element to a second sample; determining, by the coordinator device, if the first sample comprises a predetermined number of data elements; and taking an action, by the coordinator device, in response to determining that the first sample comprises the predetermined number of data elements. |
20170293425 | 15093243 | 0 | 1. A memory system, comprising: a NAND flash memory array comprising a plurality of data blocks that each includes a plurality of pages; a controller configured to: receive a program request to write data into a first block of the data blocks; evaluate the program request and a plurality of previously queued program requests to determine if a threshold corresponding to the first block is satisfied, wherein each of the plurality of previously queued program requests writes data to the first block; and execute the program request and the plurality of queued program requests only upon determining the threshold is satisfied. |
8892953 | 13549871 | 1 | 1. A method for testing software using test suites, the method comprising: defining a plurality of testing goals and a testing strategy for the software; determining a plurality of objects under test within said software; designing a plurality of test eases, and a plurality of test suites for said defined testing strategy; defining a plurality of test categories for said designed plurality of test suites; generating a test automation framework for executing said designed plurality of test suites defining: a test execution sequence for said designed plurality of test suites, and said defined plurality of test categories; and for each of said plurality of test suites, test continuation rules defining whether the test execution sequence, upon an occurrence of at least one of an error in a test object and a fail event in the test system during execution of that test suite, shall (a) terminate execution of the remaining test sequence for the remainder of that test suite and any remaining test suites to be executed, (b) terminate execution of the remainder of that test suite but continue with execution of the next test suite in the test execution sequence, or (c) continue execution of that test suite despite the error or fail event: wherein different test continuation rules are defined for at least two of the test suites in the plurality of test suites in the test automation framework; running the test automation framework on said software under test, and analyzing the results obtained from running the test automation framework on said software. |
8600715 | 13230928 | 1 | 1. A method in a computer system for generating predicted product values of a product manufactured by a machine having a plurality of actuators and a plurality of mechanical elements, the machine being controlled by programmable logic control code, the method comprising the steps of: presenting a plurality of machine input fields requesting a plurality of parameters associated with the plurality of actuators and the plurality of mechanical elements; presenting a plurality of product input fields requesting a plurality of desired product properties of the product; receiving one or more parameters from the plurality of machine input fields; receiving one or more desired product properties from the plurality of product input fields; calculating output response data by an emulation of a mechanical operation of the machine using one or more parameters and the one or more desired product properties, wherein the emulation simulates the programmable logic control code; providing at least a portion of the output response data to a product model wherein the product model is a mathematical model configured to calculate one or more predicted product values based at least in part on the output response data provided to the product model; and, presenting the one or more predicted product values. |
8554701 | 13051309 | 1 | 1. A computer-implemented method of classifying sentences as to sentiment, the method comprising executing instructions in a computer system to perform the operations of: acquiring training data comprising a plurality of sentences labeled as to sentiment; pre-processing the plurality of labeled sentences from the training data; generating a list of terms from the plurality of labeled sentences; determining sentiment scores for the terms in the list of terms utilizing a machine learning technique based on the plurality of labeled sentences; receiving a collection of sentences to be classified; pre-processing the collection of sentences; classifying each sentence from the collection of sentences as having a neutral sentiment or a non-neutral sentiment utilizing a first logistic regression classifier trained on the sentiment scores determined for the terms in the list of terms; and classifying each sentence having a non-neutral sentiment from the collection of sentences as having a positive sentiment or a negative sentiment by applying a second logistic regression classifier trained on the sentiment scores determined for the terms in the list of terms to determine a positive score for the sentence, applying a third logistic regression classifier trained on the sentiment scores determined for the terms in the list of terms to determine a negative score for the sentence, and combining the positive score and the negative score for the sentence. |
20040034582 | 10452941 | 0 | 1. A method for enforcing rights expressions specifying manners of use of an item, said method comprising: specifying by a potential recipient of an item a first rights expression indicating a first manner of use of said item proposed by said recipient; specifying by a provider of said item a second rights expression indicating a second manner of use of said item proposed by said provider; determining if there is a correspondence between said first rights expression and said second rights expression; and applying a rule to a determined correspondence between said first rights expression and said second rights expression to determine if said recipient should be granted use of said item. |
5535394 | 08540420 | 1 | 1. In a computer processor executing a computer compiler, a compile-time method for interprocedurally distinguishing dynamically allocated storage locations within a computer application that is implemented within the computer compiler, comprising the steps of: a. constructing a Program Call Graph of the computer application, the Program Call Graph having a plurality of Program Call Graph nodes and edges, each Program Call Graph node representing a procedure in the computer application, the procedure having one or more statements, and each Program Call Graph edge connecting two Program Call Graph nodes, a source node being a calling Program Call Graph node and a target node being a called Program Call Graph node and a Program Call Graph edge having a forward direction from the calling Program Call Graph node to the called Program Call Graph node, each of the Program Call Graph edges having an edge name; b. constructing a representation of each procedure in the computer application, each of the procedures having a representation with an entry node, an exit node, and zero or more call site nodes, zero or more of the procedures being a calling procedure with one or more call site nodes, each call site node of the calling procedure designating a called procedure and each call site node of the calling procedure having a return point, the return point indicating a point of return of a control flow of the called procedure back to the calling procedure; c. for each procedure in the computer application, initializing an entry alias solution with an entry alias solution value for the entry node and an exit alias solution with an with alias solution value for the exit node, the entry alias solution value and the exit alias solution value capable of having zero or more names, zero or more of the names being dynamically allocated object names, each dynamically allocated object name identifying a dynamically allocated storage location; d. during an interprocedural alias analysis, performing the following steps: d1. adding all procedures in the computer application to a visit list; d2. removing one of the procedures, being a visited procedure, from the visit list; d3. identifying each statement in the visited procedure which allocates one or more of the dynamically allocated storage locations and associating each dynamically allocated storage location with a root name, the root name being all or part of the dynamically allocated object name of the respective dynamically allocated storage location; d4. performing an intraprocedural alias analysis on the visited procedure using the entry alias solution value to compute a call site alias solution value at each call site of the visited procedure and a new exit alias solution value; d5. propagating, in the forward direction, the call site alias solution value from each call site within the visited procedure to the entry node of the called procedure being called by the respective call site of the visited procedure, the call site alias solution value including zero or more of the dynamically allocated object names, the dynamically allocated object names being unchanged during this step; d6. propagating the new exit alias solution value from the exit node of the visited procedure in a backward direction to the return points of the procedures calling the visited procedure and adding the edge name of the Program Call Graph edge to each dynamically allocated object name being propagated in the backward direction; d7. repeating steps d2 through d6 while the visit list is not empty; e. repeating steps d1 through d7 until all the entry alias solution values and all the exit alias solution values do not change; f. identifying a first and a second dynamically allocated object name as identical if the first dynamically allocated object name is a substring of the second dynamically allocated object name and distinguishing a first and a second dynamically allocated storage location if the first and the second dynamically allocated object names of the respective dynamically allocated storage locations are not identical. |
RE41012 | 10860669 | 1 | 1. A data processor with register file indexing comprising: an instruction sequencer and N execution units capable of executing up to N instructions in parallel; a plurality of register files with registers which contain data operands read and written by the N execution units, each register file having read ports to and write ports from the N execution units; and read and write ports associated with each execution unit which have associated control circuitry and register file index (RFI) control registers which control the selection of a first addressing approach and a second indirect addressing approach and allow registers to be addressed using both a the first addressing approach in which fields of an instruction word made available to a particular execution unit directly specify addresses, and a the second indirect addressing approach in which the contents of register file index look ahead registers are utilized in specifying the addresses. |
20150212501 | 14573090 | 0 | 1. A method for optimizing a system operating in a first mode of operation, the method comprising: detecting an event associated with a cycle operating in a first mode of operation; determining whether data associated with the cycle satisfies steady state criteria; generating optimization targets for the first mode of operation based on the data; and applying control signals comprising the optimization targets, using one or more processors, for a next cycle operating in the first mode of operation. |
20010042040 | 09801495 | 0 | 1. A method of facilitating trading, comprising: automatically supporting a set of trading processes, each trading process operating according to a respective trading methodology selected by a user of the trading process, each of the trading methodologies incorporating standards for using a trading platform, and automatically routing orders from the set of trading processes to a plurality of markets in accordance with the respective trading methodologies. |
4733179 | 06763143 | 1 | 1. A method of determining an interference magnetic field component in a motor vehicle provided with an electronic compass, the compass having a fixedly mounted magnometer consisting of two probes, each probe having a horizontally arranged rod-like core of magnetisable material, the cores in respective probes including an angle of 90.degree. relative to each other and each supporting a winding, means for applying an alternating auxilliary voltage to said windings to alternately magnetize said cores up to saturation, said auxilliary voltage being combined with voltages induced in said windings due to a constant magnetic field composed of an earth's magnetic field component and an interference magnetic field component, said combined voltages producing an alternating measuring voltage, and means for evaluating the duty cycle ratio of positive and negative halfwaves of said measuring voltage, the method comprising the steps of measuring the magnitude and direction (Hg1) of the constant magnetic field in a first position of the vehicle, then measuring the magnitude and direction (Hg2) of the constant magnetic field in a second position in which the vehicle is turned around a vertical axis by 180.degree., then computing from the determined values (Hg1, Hg2) the magnitude of the interference field component (Hs) according to vector equation EQU H.sub.s =1/2(Hg1+Hg2) and storing the computed H.sub.s value for further processing. |
20080195360 | 11825365 | 0 | 1. Automated policy generation for networks comprising the steps of: building a model of a network; providing known performance objectives of the network; and maximizing possible utility, Utility max where Utility max =MAX{Utility i } i=1, 2, 3,. .. where Utility i =U(NM, Policy i ) and NM is data representation of the network, U are the network objectives, and Policy i is the i th policy to be evaluated by finding a policy set, Policy max , that optimizes U with a utility value Utility max . |
20100241654 | 12730198 | 0 | 1. A method of maintaining a data structure adapted to associate storage blocks with corresponding file system objects, the method comprising: receiving a storage request from a storage client, wherein the storage request includes a reference to at least one storage block in a file system; forwarding the storage request to a storage device for processing; identifying at least a first file system object and a second file system object associated with the referenced storage block; monitoring first file system metadata associated with the first file system object and second file system metadata associated with the second file system objects to detect at least one change in response to the storage request; in response to the detection of a change in the first file system metadata, updating a first portion of a data structure associating the referenced storage block with the first file system object; and in response to the detection of a change in the second file system metadata, updating a second portion of the data structure associating the referenced storage block with the second file system object. |
7797289 | 11850566 | 1 | 1. A method for automatically executing a rule in an enterprise system, wherein the rule is associated with an event, the method comprising: receiving an event object at the enterprise system; creating an intermediate event object based on the event object, wherein the intermediate object is an invocation context for the rule; filtering a set of rules with the intermediate event object to obtain a subset of rules; selecting a rule that is associated with the event from the subset of rules; and executing the rule. |
7516120 | 10898040 | 1 | 1. A process for providing decision support to a user of a workflow application, the process comprising: using the workflow application stored in a memory connected to a computer, causing a processor of the computer to coordinate a plurality of workflow processes within the workflow application; using an application program interface from a plurality of application program interfaces, connecting a decision support engine to the plurality of workflow processes within the workflow application and to a plurality of external data sources; at a workflow process within the workflow application, sending a query that identifies an external data source within the plurality of external data sources; using a query manager of the decision support engine, receiving the query; using the query manager of the decision support engine, extracting from the query an identity of the external data source; using a connection manager of the decision support engine, opening a connection to the external data source; using the query manager of the decision support engine, transmitting the query to the external data source; using the query manager of the decision support engine, receiving a query result from the external data source; and using the query manager of the decision support engine, providing the query result to the workflow application, wherein the plurality of external data sources are logically connected to the workflow application only through the decision support engine, wherein the application program interface includes a set of utility programs, methods or objects used by an application developer to integrate a functionality of the decision support engine into the workflow application so that the decision support engine services a plurality of queries that support decision making from the plurality of workflow processes, wherein each workflow process of the plurality of workflow processes interfaces with the decision support engine through a corresponding application program interface to specify at least one external data source and to submit at least one query to the decision support engine, wherein a data source is any medium used to store structured data or any computer program to retrieve data from a structured data storage medium including a file, a database, a data mining application, an internet web service and an application service provider, wherein the workflow application uses the application program interface to implement decision support logic, and wherein the application developer implements the decision support logic into the workflow application without implementing logic to access the data source. |
8364985 | 12636536 | 1 | 1. A method comprising: determining, by a computer, that plaintext data stored in a plaintext buffer is to be written out to an encrypted storage resource; in response to the determination, allocating an encryption buffer; copying the plaintext data from the plaintext buffer to the encryption buffer; encrypting the plaintext data of the encryption buffer to generate encrypted data; writing the encrypted data from the encryption buffer to the encrypted storage resource; de-allocating the encryption buffer; and simultaneously satisfying read and write requests from a client by retrieving the plaintext data from the plaintext buffer while the encryption is proceeding. |
8404553 | 12861666 | 1 | 1. A method of forming a non volatile memory device, comprising: providing a substrate having a surface region; forming a first dielectric material overlying the surface region of the semiconductor substrate; forming a first wiring material overlying the first dielectric material; forming a contact material comprising a doped polysilicon material overlying the first wiring material; forming a switching material comprising an amorphous silicon material overlying the contact material; subjecting the switching material to a first pattering and etching process, separating a first strip of switching material from a second strip of switching material, the first strip of switching material and the second strip of switching material being spatially oriented in a first direction; and subjecting the first strip of switching material, the second strip of switching material, the contact material, and the first wiring material to a second patterning and etching process, forming at least a first switching element from the first strip of switching material and at least a second switching element from the second strip of switching material, and a first wiring structure comprising at least the first wiring material and the contact material, the first wiring structure being extended in a second direction at an angle to the first direction. |
20090112880 | 11981624 | 0 | 1. A method of managing file objects in a data storage system, comprising: providing a plurality of metadata servers, each metadata server having information for only a subset of file objects in the storage system, each subset for each of the metadata servers being less than a total number of file objects for the system; and providing at least one metadata location server, wherein an entity accessing a specific file object of the system determines which of the metadata servers contains data for the specific file object by first accessing the at least one metadata location server. |
7941790 | 10003570 | 1 | 1. A method for generating in an apparatus program source code for translating high level code into instructions for a target processor, the method comprising: determining a program code characteristic corresponding to said target processor; deriving one or more program code modules in accordance with said program code characteristic; and generating program source code for translating high level code into instructions for said target processor from said one or more program code modules. |
20050114762 | 10893692 | 0 | 1. A system for processing of markup language information, the system comprising: a first data processor for receiving markup language information, identifying at least a part thereof for compression, assigning a label representative of the part to form compressed information representative of the mark up language information comprising the label; and a second data processor, in communication with the first data processor, for receiving the compressed information from the first data processor, decompressing the information, identifying the label and associating the label with the part of markup language information. |
10104229 | 15606209 | 1 | 1. A system comprising: a computing device comprising a processor; and a memory that stores computer-executable instructions that, when executed by the processor, cause the processor to perform operations comprising obtaining a routing scenario associated with a user of a routing service, wherein the routing scenario specifies customer data that is to be accessed when a call is received to determine a call handling decision, wherein the customer data is stored at a customer data source that is remote from the computing device, wherein the call is directed to a called device associated with the user, and wherein the call is received from the calling party, obtaining, from the customer data source and during the call, customer data that is associated with the calling party and with the computing device, determining, based on the customer data and during the call, the call handling decision, and providing the call handling decision to a network to route the call. |
20030061020 | 10251108 | 0 | 1. A test and debug processor, comprising a. a JTAG-bus controller logic; b. a JTAG port coupled to said JTAG-bus controller logic; c. means to access a memory structure; and, d. an instruction decoding unit connected to said JTAG-bus controller capable of fetching or requesting JTAG instructions from a memory structure. |
9288041 | 14155756 | 1 | 1. An apparatus for performing a compression operation in a hash algorithm, comprising: a message extension unit for receiving a message and generating 32, 384-bit extended messages; a chaining variable initial conversion unit for receiving chaining variable data and converting the chaining variable data into 512-bit initial state data; a step function operation unit for repeatedly calculating a step function based on the initial state data and the plurality of extended messages and then producing final state data, wherein: the step function operation unit produces the final state data by repeatedly calculating the step function based on the 512-bit initial state data (X 0 =X 0 [0]∥X 0 [1]∥ • • • ∥X 0 [14]∥X 0 [15]) and the 32, 384-bit extended messages (W r =W r [0]∥W r [1]∥ • • • ∥W r [10]∥W r [11]), and the step function is a function for calculating the following Equations (1) to (5):
T r [i]=X r [i]⊕W r [i], 0≦ i≦ 11 (1)
X r+1 [i]=ROL 9 ( T r [i] T r [i+ 4]),0≦ i≦ 3 (2)
X r+1 [i]=ROL 27 ( T r [i] T r [i+ 4]),4≦ i≦ 7 (3)
X r+1 [i]=ROL 29 ( T r [i] X r [i+ 4]),8≦ i≦ 11 (4)
X r+1 [i]=T r [i− 12],12≦ i≦ 15 (5) where x⊕y denotes an exclusive OR operation on x and y which respectively have 32-bit values, x y denotes an operation of outputting a remainder of division when a sum of values representing the 32-bit x and y by positive integers, respectively, is divided by 2 32 , in 32 bits, and ROL a (x) denotes an operation of cyclically shifting the 32-bit x to left by ‘a’ bits and outputting a shifted value; and a chaining variable final conversion, unit for generating updated chaining variable data from the chaining variable data using the final state data, and outputting the updated chaining variable data. |
9762607 | 14689973 | 1 | 1. A method of operating a processing system of an advisement system to implement security actions for a computing environment comprising a plurality of computing assets, the method comprising: providing security incident information to an administrator associated with the computing environment, wherein the security incident information comprises asset identifiers for assets related to a security incident and enrichment information for the security incident obtained from internal or external sources; in response to providing the security incident information, identifying a user generated security action in a command language for the computing environment; identifying one or more computing assets related to the security action; obtaining hardware and software characteristics for the one or more computing assets; translating the security action in the command language to one or more action procedures based on the hardware and software characteristics; and initiating implementation of the one or more action procedures in the one or more computing assets. |
20080228717 | 11685536 | 0 | 1. A computer system directed to a management of distributed database data and file access and retrieval by providing multiple parameter data media search, the system comprising: a plurality of parameters, each of the plurality of parameters being associated with a respective range of terms; a first display unit configured to display the plurality of parameters; a second display unit configured to display the respective ranges of terms; a search engine configured to perform a search based on soliciting from a user at least one search selection from the respective ranges of terms for a parameter; and an output module rendering results of the search to the user. |
9965059 | 15096240 | 1 | 1. A method, comprising, receiving motion data corresponding to first physical contact, the motion data generated by a sensor of an activity tracking device, the first physical contact being received on a touch sensitive screen mounted on a housing of the activity tracking device, the touch sensitive screen of the activity tracking device configured to display a plurality of metrics, the plurality of metrics being arranged in a pre-defined scroll order, wherein the physical contact received on the touch sensitive screen comprises one or more taps by a bare finger of a user of the activity tracking device, wherein the activity tracking device is wearable by the user and programmable by the user on a computing device associated with the user to display a pre-defined first metric from among the plurality of metrics on the touch sensitive screen; determining, based on the motion data, that the first physical contact qualifies as a double tap input for the activity tracking device; in response to determining that the first physical contact qualifies as the double tap input, causing the touch sensitive screen of the activity tracking device to be activated, the touch sensitive screen being configured to display, upon activation, the first metric of the plurality of metrics; determining, based on additional motion data generated by the sensor in response to second physical contact received on the touch sensitive screen subsequent to the first physical contact, whether the second physical contact qualifies as a single tap input that is different from the double tap input; in response to determining that the second physical contact qualifies as the single tap input, causing the first metric displayed on the touch sensitive screen to be replaced with a next one of the plurality of metrics in the scroll order that is different from the first metric to be displayed on the touch sensitive screen such that only one metric of the plurality of metrics in the scroll order is displayed at a time; and for each subsequent physical contact that qualifies as the single tap input, causing another next one of the plurality of metrics in the scroll order to be displayed on the touch sensitive screen, the method being executed by one or more processors of the activity tracking device. |
9838502 | 14819326 | 1 | 1. An automated method for collaborative enterprise information management by way of a networked collaborative information management system, the method comprising: storing user information corresponding to each of a plurality of users of the collaborative information management system, wherein for each of the plurality of users the user information (a) uniquely identifies the user, (b) indicates an association between the user and a particular business enterprise, and (c) identifies a user role that indicates a type of business related position, function, or purpose that the user has with respect to the particular business enterprise; providing a plurality of widgets, each widget comprising a software object configured for processing and/or presenting data corresponding to at least one business enterprise and performing an automated business enterprise function, activity, or task, wherein each widget has at least one visual representation that indicates the business enterprise function, activity, or task the widget performs; providing a set of libraries storing or referencing a plurality of responsive web design (RWD) web apps and/or widgets, each RWD web app comprising a set of program instructions executable on multiple types of electronic/computing devices and configured for providing information display functionality that is automatically adaptive with respect to different electronic/computing device display sizes and/or resolutions across the multiple types of electronic/computing devices, wherein each RWD web app is implemented by way of and has a visual representation provided by at least one widget; and providing a set of collaborative information management servers configured for selectively enabling user access to RWD web apps and/or widgets of the set of libraries based on user roles. |
8463641 | 11868245 | 1 | 1. A method for troubleshooting a fault to determine a root cause of the fault, the method comprising: using a computer to create a Bayesian network model based on information obtained from a Fault Isolation Manual (FIM), where said FIM provides tests to be performed in troubleshooting said fault to determine a root cause of said fault; using heuristics to determine a structure and conditional probabilities for the Bayesian network; imputing a plurality of test costs to the computer which are inherent in the FIM by first generating a plurality of constraints between the cost of each test and fault probabilities that hold for all fault scenarios; using a linear programming algorithm running on the computer to solve said plurality of constraints, and to construct a tuned Bayesian network model; causing the computer to use the tuned Bayesian network model to compute, at each operation of the troubleshooting process: a first set of information including a ranked list of possible component faults along with a probability associated with each one of said possible component faults, according to probabilities given accumulating test evidence, and a second set of information including a prioritized list of troubleshooting tests, along with a test value for each one of said troubleshooting tests, with the prioritized list of said trouble shooting tests being ranked according to their test value; and using the computer to simultaneously display on a display system, at each operation of the troubleshooting process: the ranked list of possible component faults along with the probability associated with each one of said possible component faults; said prioritized list of troubleshooting tests being in an ordered list on the display; the test value determined for each one of said troubleshooting tests being displayed adjacent its associated one of the troubleshooting tests; and wherein each said test value further comprises a sum of information entropy, if a specific test outcome is known, and a test cost of a specific one of said tests. |
9990423 | 14526493 | 1 | 1. A computer-implemented method comprising: receiving, at a first cluster, a search query, the first cluster being a first data intake and query system; transmitting, through a firewall of either the first cluster or a cloud-based cluster, a request for information identifying a plurality of indexers of the cloud-based cluster, the cloud-based cluster being a second data intake and query system; in response to the request, obtaining, from the cloud-based cluster, the information identifying the plurality of indexers, wherein the first cluster and the cloud-based cluster each include at least one master node that is knowledgeable about active indexers within its respective cluster, and the information identifies the plurality of indexers based on the at least one master node of the cloud-based cluster identifying the active indexers; distributing the search query to the plurality of indexers of the cloud-based cluster and one or more indexers of the first cluster, said distributing using the obtained information identifying the plurality of indexers and being through the firewall; and receiving, at the first cluster, a response to the distributed search query from at least one of the plurality of indexers of the cloud-based cluster wherein each response from a respective indexer is produced by the respective indexer based on an evaluation, by the respective indexer, of the distributed search query. |
20120209582 | 13372636 | 0 | 1. A system for providing an online optimization for a cognitive wireless network, said network having a qualitative model of the system dynamics , the system comprising: an input means configured to capture network state information comprising a plurality of state variables and are included in the qualitative model of the system dynamics; a control engine configured to analyze each state variable for determination of action and cognition resulting in a controlled cognitive wireless network, the control engine further comprising: an evaluation module configured to cumulatively build a compact history for each encountered bad configuration for enhanced cognition to achieve a goal variable associated with the state variable; an optimization module adapted to achieve an optimum control configuration of the cognitive wireless network by using the network state information; and an output means configured to generate one or more control parameters to achieve desired goal. |
20040239681 | 10764341 | 0 | 1. A method for displaying visual content on a client, comprising at the client: providing an input description of visual content; generating a first displayable representation from the input description of at least a first portion of the visual content; generating a second displayable representation of at least a second portion of the visual content; defining a relationship between the first displayable representation and the second displayable representation; displaying at least partially the first displayable representation; and displaying at least partially the second displayable representation in response to a selection from the first displayable representation, the selection corresponding to the relationship between the first displayable representation and the second displayable representation. |
8539516 | 12031678 | 1 | 1. A method for synchronizing access to a memory buffer, the method comprising: causing a semaphore buffer associated with the memory buffer to be allocated at a first memory location accessible to both a first driver and a second driver; causing the memory buffer to be accessible to the first driver; receiving a request to cause the memory buffer to be accessible to the second driver; in response to receiving the request, determining that the memory buffer is not accessible to both the first driver and the second driver, moving the memory buffer to a second memory location that is also accessible to both the first driver and the second driver, and marking the memory buffer as registered to retain the memory buffer at the second memory location; causing the execution of commands transmitted by the second driver to a processing unit to be suspended until information stored in the semaphore buffer has been modified to indicate that the first driver has completed accessing the memory buffer; and causing the information stored in the semaphore buffer to be modified to indicate that the first driver has completed accessing the memory buffer. |
20140215446 | 14160521 | 0 | 1. A method to transform source code from an input architecture to a target architecture comprising: receiving one or more input source code files of an n-tier application, the input source code files comprising a plurality of programming language code constructs; receiving one or more target grammars corresponding to the mobile form-factor constrained target architecture; receiving an architectural specification corresponding to the n-tier input application; receiving an architectural specification corresponding to the target architecture; generating an annotated abstract syntax tree representing at least one code construct from at least one input source code file, based at least on one or more target grammars, the n-tier architectural specification and the target architecture specification, wherein at least one of the annotations comprises a transformation rule to map the code construct from the at least one of the input source code files represented in the annotated abstract syntax tree to the target architecture; and generating target source code based at least on the annotated abstract syntax tree comprising at least one mobile component and at least one server component. |
9818060 | 15354122 | 1 | 1. A method for monitoring a computing system by cognitive fingerprinting, comprising: extracting, by a processor, a data set from a plurality of input sources across a monitored computing system; compiling a dictionary of unique elements identified in the data set, each unique element representing a unique discrete portion of the data set corresponding to a portion of the monitored computing system or a status of the portion of the monitored computing system; organizing the unique elements of the data set into a two-dimensional geometric structure, portions of the data in the geometric structure further grouped into a plurality of sub geometric structures; generating a heuristic describing the two or greater-dimensional geometric structure, the plurality of sub geometric structures, one or more base properties determined for each sub geometric structure, the base properties determined using the dictionary of unique elements, and one or more trends identified in the base properties among the sub geometric structures; applying one or more pattern recognizers to the heuristic to produce a set of fingerprint elements corresponding to one or more discrete qualities in or attributes of the data set corresponding to the monitored computing system; creating a cognitive fingerprint corresponding to the fingerprint elements; comparing, by the processor, the cognitive fingerprint to a previously recorded cognitive fingerprint by taking a sum of squared differences between each element in the final set of elements and each element of the previously recorded cognitive fingerprint to determine a scalar value for comparison to a threshold of a target goal; and one or more of shutting down the monitored computing system or quarantining at least a portion of the extracted data in response to the scalar value being within the threshold of the target goal. |
20180048468 | 15234306 | 0 | 1. A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (DSN), the method comprises: identifying, for a DSN memory using multiple IDA (Information Dispersal Algorithm) configurations simultaneously, a first IDA configuration with a highest security level relative to each of the multiple IDA configurations; generating a master key; encoding the master key with a secure error coding function to produce master key slices according to the first IDA configuration; storing the master key slices in the DSN memory using the first IDA configuration; and when storing data with a second IDA configuration having a security level lower than the first IDA configuration, retrieving the master key slices, decoding the master key slices to obtain the master key and encrypting the data using the master key. |
20130060596 | 13293965 | 0 | 1. A computer-implemented method performed by one or more processors for generic process modeling, the method comprising the following operations: identifying a business process for execution, the business process defined by one or more process steps; identifying a process routing table associated with the identified business process, at least a portion of the process routing table including one or more entries defining a set of business process rules for the identified business process; identifying a particular entry in the process routing table associated with a current state of the identified business process; and performing at least one action defined by the identified particular entry in the process routing table. |
20140143809 | 14087399 | 0 | 1. A system, comprising: an end device configured to: transmit a user input; and a television apparatus configured to: receive the user input from the end device, determine a query that is associated with a function that is executable by the television apparatus, based at least in part on the user input, execute the function that corresponds to the determined query, and generate a reply to the determined query based at least in part on a result of the execution of the function. |
9816826 | 14474948 | 1 | 1. A method of correcting digitized map data provided by a map data supplier and stored in a map database of a navigation device, the map data comprising routing data in the form of route links and shape points, wherein each route link is associated with a sequence of shape points representing a course of a road segment for display on a screen, the method comprising the steps of: switching to an editing mode indicating to the user that at least one of displayed road segments and/or shape points can be graphically manipulated on the screen and providing to the user a map data correct reference by displaying a current user position on the screen without matching the user position to the nearest neighboring road segment of the displayed road network by setting a matching algorithm inactive; detecting a first user input operation indicative of a selection of a road segment displayed on the screen; displaying on the screen, based on the map data provided by the map data supplier, at least one existing shape point of the sequence of shape points stored in the map database for the selected road segment; detecting at least one second user input operation indicative of a graphical manipulation of the course of the selected road segment on the screen, wherein the graphical manipulation comprises a positional displacement of at least one existing shape point of the sequence of shape points displayed on the screen by shifting the at least one existing shape point from the displayed screen position to a new screen position; generating on basis of the detected second user input operation corrected routing data reflecting the manipulated course of the selected road segment; and storing the corrected routing data in the map database by overwriting the existing routing data of the selected road segment by the generated corrected routing data without modifying a structure of the original map database provided by the map data supplier, wherein the corrected routing data in the map database is subsequently employed for one of a route guidance process, a map displaying process and a map matching process. |
8051288 | 12358695 | 1 | 1. A computer system for facilitating management of a data mapping validation system, the computer system comprising: a processor coupled to a computer storage medium; the computer storage medium that stores thereon a plurality of computer software components executable by the processor; a signature generation component that receives management information associated with generating at least one data signature of a data source and generating at least one data signature of a data target; a sampling component that receives management information associated with obtaining at least one data sample of the data source and obtaining at least one data sample of the data target; and a processing component that obtains a signature compare output from the signature generation component and a sample compare output from the sampling component, converts the signature compare output and the sample compare output into a common format, and compares the signature compare output and the sample compare output to determine equivalency between the signature compare output and the sample compare output. |
9996551 | 14210650 | 1 | 1. An asset information management system for obtaining and storing information on assets disposed within a physical structural environment, the system comprising: at least one mobile interface device configured for variable disposition within a physical dynamic structure in the physical structural environment, for capturing information about a target object disposed within the physical dynamic structure, and for transmitting the target object information over a network; a local positioning system in communication with the at least one mobile interface device via the network and configured to provide information usable to determine a mobile device pose, said mobile device pose comprising a position and orientation of the mobile interface device relative to the physical structural environment; a central processor in communication with the at least one mobile interface device and the local positioning system via the network and having an information management operating system operating thereon, the information management operating system being configured for receiving and processing the target object information; a domain coordinate management system comprising one or more computers configured for establishing and maintaining spatial addresses for spaces and points within the physical structural environment, for receiving first spatial address information from the local positioning system and second spatial address information from a three-dimensional model of the physical dynamic structure, and for determining differences between the first and second spatial address information resulting from spatial changes in the physical dynamic structure; an asset log comprising one or more data storage modules configured for storing information associated with objects disposed within the physical structural environment; and a spatial indexing engine in communication with the domain coordinate management system, the asset log and the central processor, the spatial indexing engine being configured for assigning a spatial address to the target object and for storing information associated with the target object in the asset log. |
20100092084 | 12251689 | 0 | 1. A method for generating a representation of an image comprising: receiving an image for which a representation is to be generated; for each of a plurality of regions of the image, computing a runlength histogram; generating a representation of the image based on the runlength histograms; and outputting the representation of the image. |
8732474 | 13110895 | 1 | 1. A computer-implemented method for installing a browser extension in a browser application, the method comprising: receiving, in a main process of the browser application running on a computing system, a browser extension installation package for installation in the browser application, the browser extension installation package including a plurality of constituent files of the browser extension; extracting a public key from the browser extension installation package; and validating a digital signature of the browser extension installation package using the public key, wherein: if validation of the digital signature is unsuccessful, installation of the browser extension is canceled; and if validation of the digital signature is successful, the method comprises: launching a sandboxed sub-process of the browser application; in the sandboxed sub-process, transcoding or recoding at least one of the plurality of constituent files, the at least one transcoded or recoded file replacing a corresponding original constituent file of the plurality of constituent files in the browser extension installation package; after the transcoding or recoding, passing the constituent files from the sandboxed sub-process to the main browser process; and in the main process of the browser application, installing the browser extension to the browser application using the at least one transcoded or recoded constituent file. |
20100185579 | 12692575 | 0 | 1. A user-based collaborative filtering recommendation method comprising: a first step of calculating the similarity between a recommend probable user A and the other user B; a second step of amending the calculated similarity by using each user preference information entropy of the recommend probable user A and the other user B; a third step of forming a nearest neighbor list of the recommend probable user A based on the amended similarity; and a fourth step of predicting the preference of the recommend probable user A by using the preference of the users in the formed nearest neighbor list. |
20080244548 | 12138110 | 0 | 1. A method for adjusting a profile collected for an executing application to account for one or more actions applied to the executing application to determine whether there is improvement in the execution of the executing application after the profile was collected, the method comprising: (a) collecting a first profile for the executing application; (b) predicting, based on the first profile and the one or more actions applied to the executing application, an impact on the executing application of applying the one or more actions to the executing application; (c) adjusting the first profile to form a normalized profile according to the predicted impact; (d) collecting a second profile for the executing application after applying the one or more actions; (e) evaluating the second profile against the normalized profile to determine whether there is expected improvement in the execution of the executing application; and (f) applying second one or more actions to undo the one or more actions applied to the executing application if there is no expected improvement in the executing application. |
20180060067 | 15252284 | 0 | 1. A computer-implemented method for facilitating generation and revision of software documentation, the method comprising: initiating, by one or more computing systems configured to facilitate generation and revision of software documentation, monitoring execution of a software application having a plurality of software modules; receiving, by the one or more computing systems at a first time, a user instruction to insert a code anchor in a first portion of documentation related to the software application; identifying, by the one or more computing systems and responsive to receiving the user instruction, a first subset of the plurality of software modules being executed at the first time; and modifying, by the one or more computing systems, one or more files comprising the first portion of documentation to include a code anchor associated with the first subset of software modules. |
8176080 | 12399675 | 1 | 1. A method for desensitizing character strings, comprising: ordering, by a processing device, a set of sensitive character strings; generating, by the processing device, a tree having a plurality of nodes corresponding to sensitive characters of the sensitive character strings; desensitizing, by the processing device, the sensitive characters on corresponding nodes of the tree in depth-first order, wherein the desensitizing includes assigning desensitization characters from a set of ordered desensitization characters to respective ones of the sensitive characters; and generating, by the processing device, a desensitized character string set having a same ordering as the ordered set of sensitive character strings, the desensitized character string set including desensitized character strings corresponding to respective ones of the sensitive character strings, wherein the desensitized character strings include respective strings of the desensitization characters. |
7636083 | 11060012 | 1 | 1. A method, comprising the steps of: mapping each character or phonetic symbol in a language to a key on a reduced keyboard by associating its corresponding sound with the closest phonetic sound corresponding to a Latin-based letter assigned to a reduced keyboard key; entering a series of constituent base characters of a desired word in a phonetic order using said mapped phonetic symbols, wherein said step of entering comprises: receiving at least a first input signal representing a Latin phonetic equivalent of at least one character; receiving a switching signal indicating a mode change followed by receiving at least one additional input signal in a particular position within the series of constituent base characters, wherein said at least one additional input signal is translated into a Hindu, Bengali, or Tamil character, forming a specific language character intended for a particular position; and forming a list of possible word constructs containing both (1) said first input signal representing a Latin phonetic equivalent of at least one character and (2) said at least one additional input signal represented as a Hindu, Bengali, or Tamil character, wherein said list possible word constructs includes possible word constructs containing said constituent base characters in an order different than said phonetic order; filtering possible word constructs not containing said specific language character in the intended position from said list of possible word constructs, forming a filtered list of word constructs; and displaying said filtered list of word constructs. |
8838649 | 13614951 | 1 | 1. A computer-implemented method comprising: receiving a query from a user device; selecting a plurality of search results that are responsive to the query, wherein each of the search results identifies a respective primary resource and is associated with a respective score; for each of the search results, adjusting the respective score of the search result based on a respective aggregate score for the primary resource identified by the search result, wherein the respective aggregate score is based on historical user feedback data associated with user interactions with the one or more secondary resources, wherein the one or more secondary resources are resources that are reachable through one or more links of a primary resource, and wherein the secondary resources are within a specified number of hops from the primary resource; ordering the plurality of search results based on the respective scores and the adjusted respective scores; and providing the ordered search results to a user device in response to the query. |
8655668 | 13836234 | 1 | 1. A system comprising: a receiving unit configured to receive a communication between a practitioner and a patient; a processing unit in communication with the receiving unit, the processing unit configured to identify a presence of a cultural sensitivity of the patient in the received communication, determine guidance for dealing with the identified cultural sensitivity, and interpret and/or translate the received communication into a target language. |
10133731 | 15427319 | 1 | 1. A computer-implemented method for generating a summary of a digital text, the method executable on a server, the server coupled to a communication network, the method comprising: acquiring by the server, an indication of the digital text to be processed, the digital text comprising a plurality of sentences; parsing by the server, each of plurality of sentences into one or more concept phrases, each of the one or more concept phrases having at least one word; the parsing being executed by applying at least one parsing parameter; executing, by the server, a first analysis to generate a context-independent relation (CIR) value for a given concept phrase of the one or more concept phrases, the CIR value representing a first ratio of a co-inclusion of: (i) at least one word of the given concept phrase and (ii) at least one word of each of the remaining concept phrases of the one or more concept phrases; executing, by the server, a second analysis to generate a context-dependent relation (CDR) value for the given concept phrase, the CDR value representing a second ratio of: (i) a number of sentences where the given concept phrase co-occurs with another concept phrase of the one or more concept phrases to (ii) a total number of the plurality of sentences containing the other concept phrase within the digital text; determining by the server, a total CIR weight and a total CDR weight for each of the concept phrases; determining by the server, for each of the concept phrase, a concept meaning value, based at least in part on its respective total CIR weight and the total CDR weight; determining by the server, for a given sentence of the plurality of sentences, a sentence meaning value, based at least in part of the concept meaning value of each concept phrase contained in the given sentence; ranking by the server, each sentence based at least on the determined sentence meaning value; and, generating by the server, the summary of the digital text, the summary of the digital text comprising at least one sentence extracted from the digital text based on its determined ranking. |
7957934 | 12120645 | 1 | 1. A method to process application performance data, the method performed by at least one computer processor executing computer-readable instructions tangibly stored on at least one computer-readable medium, the method comprising the steps of: (A) injecting an agent into a monitored application; (B) at the agent: (B)(1) capturing original byte code of the monitored application; (B) (2) sending the captured byte code of the monitored application to a monitoring server external to the monitored application; (C) at an instrumentation engine in the monitoring server: (C) (1) inserting sensor bytecode into the captured original bytecode to generate instrumented byte code at runtime of the application and without altering source code of the application; (C) (2) transmitting the instrumented byte code to the monitored application; (D) at the monitored application: (D) (1) loading the instrumented byte code instead of the original bytecode; (D) (2) executing the sensor bytecode to generate measurement data which describes performance characteristics of the original bytecode; and (D) (3) writing the measurement data to a data set of fixed size. |
20120159021 | 12972010 | 0 | 1. A method of defining a storage topology of a distributed computing system including a set of machine nodes, the method comprising: dynamically receiving from a plurality of nodes in the distributed computing system information about storage devices, each node sending information about storage devices connected to that particular node, wherein the information is sent dynamically from each node as conditions related to storage change and as a result of conditions related to storage changing; and from the received information dynamically constructing a storage topology representation of the distributed computed system. |
9223667 | 13671842 | 1 | 1. A method for identifying root cause failure in a multi-parameter self learning machine application model comprising: providing at least one multi-function sensor having the capability to measure at least one of a voltage and current of the machine application model; measuring voltages and currents of a multi-phase load with the multi-function sensors in a passive manner which includes sensing existing voltages and currents; storing and accepting the measured voltages and currents into memory by a computer controlled analog to digital converter; calculating at least one of a time-varying variable KW, PF, kVAr, or Z out of the measured voltages and currents; calculating at least one of a first, second or third order derivative of the at least one time-varying variable; classifying segments of at least one of the time-varying variables depending on a state; choosing at least one of the calculated time-varying variables and learning their normal behavior; comparing the normal behavior to a pattern difference; identifying a root cause meaning to the pattern difference; plotting Min, Max and Median values of the measured voltages and currents in a candlestick chart format; and determining the directions with which the measured voltages and currents are heading using the Min, Max and Median values. |
20030060981 | 10236204 | 0 | 1. A method for determining a parameter of interest of a region of interest of the earth, the method comprising: (a) measuring at least one component of potential fields data at a plurality of locations over a region of interest including a subterranean formation of interest, said potential fields data selected from magnetic data and gravity data; (b) determining an initial geophysical model of the region including the subterranean formation of interest; (c) for said model, estimating a value of said at least one component of geophysical tensor data at said plurality of locations using an interior-point method for constrained optimization; (d) determining a difference between said estimated value and said measured value of said measurements at said plurality of locations; (e) updating the geophysical model of the region based on said difference; (f) iteratively repeating steps c-e until said difference is less than a predetermined value; and (g) using said updated model to determine the parameter of interest. |
20050071194 | 10794933 | 0 | 1. An enterprise healthcare information management system comprising: a first deployment and a second deployment; each deployment including data stored within a data structure, the data at least relating to a data entity of the enterprise healthcare system and each deployment operable for autonomous management of the data stored within its respective data structure; a communication network communicatively coupling the first and second deployments; and each deployment having a data correspondence functionality facilitating reconciliation, manipulation, modification or synchronization of data stored in the data structures of either of the first and second deployments. |
8681902 | 13234775 | 1 | 1. A method for reconstructing a signal from a set of noisy measurements, the method comprising: receiving, by a receiving unit, the set of noisy measurements; identifying, by a reconstruction unit, a new element of support of the signal in a sparse domain based on a projection matrix, the set of noisy measurements and at least one postulated parameter, the projection matrix transforming the signal from a sparse domain to a compressed domain; and obtaining, by the reconstruction unit, an estimate of the signal based on at least the set of noisy measurements, the identified new element of support, the at least one postulated parameter and the projection matrix. |
20140068611 | 13605563 | 0 | 1. A computer-implemented method, comprising: monitoring, by a load balancer executing on a computing device, an overall load measurement of containers associated with an application executed on virtual machines (VMs) in a multi-tenant Platform-as-a-Service (PaaS) system, wherein the overall load measurement is a summation of individual current loads at the containers; comparing, by the load balancer, the overall load measurement to an overall load threshold for the containers; and when the overall load measurement exceeds the overall load threshold, causing resources to be added to execute functionality of the application in the VMs of the multi-tenant PaaS system. |
8495068 | 12603343 | 1 | 1. A system for classifying a new item for purposes of estimating an import fee associated with the new item, the system comprising: a data store that stores information regarding a plurality of previously classified items, the information regarding each previously classified item comprising a classification code that may be used to estimate an import fee associated with each previously classified item; and a computing system comprising one or more computing devices, said computing system in communication with the data store and operative to: for each of a plurality of previously classified items, calculate an item similarity score representing a relative level of similarity between a given previously classified item and the new item, wherein the item similarity score for the given previously classified item is calculated at least partly by: determining an attribute similarity score for the given previously classified item, wherein the attribute similarity score is determined at least in part by determining a number of common attributes associated with the given previously classified item and the new item, wherein a common attribute comprises an attribute that is associated with the given previously classified item and is also associated with the new item; and determining an attribute value similarity score for the given previously classified item, wherein the attribute value similarity score is determined at least in part by determining a number of attribute values, of one or more of the common attributes, that are associated with an attribute of the given previously classified item and also associated with a corresponding attribute of the new item; wherein the item similarity score is calculated based at least in part on both the determined attribute similarity score and the determined attribute value similarity score; and determine a closest item match for the new item, wherein the closest item match corresponds to a previously classified item having a highest degree of similarity to the new item among the plurality of previously classified items based on item similarity score; assign an item classification code associated with the closest item match to the new item for purposes of estimating an import fee associated with the new item; and estimate an import fee associated with the new item based on the assigned item classification code. |
9104435 | 12423374 | 1 | 1. A method to provide annotations to a target system to use to execute a code block, the method comprising: examining the code block to be annotated with one or more static annotations and one or more dynamic annotations, wherein the dynamic annotation changes at the target system during execution of the code block; specifying a quality of service level to execute the code block with a reduced energy expenditure, wherein the quality of service level is different from the reduced energy expenditure; while examining the code block to be annotated, determining a hardware customization to support the specified quality of service level; identifying annotations based, at least partially, upon the determined hardware customization and a system software configuration associated with a data block and that specifies how to process the data block when the code block is executed; and providing the identified annotations to the target system to cause the target system to: modify one or more of the identified annotations to vary the determined hardware customization as a function of available energy, available memory, or available storage capacity on the target system to obtain a varied hardware customization associated with the modified one or more annotations, and apply the one or more annotations at the target system during an execution of the code block at the target system using the varied hardware customization associated with the modified one or more annotations. |
20050097412 | 11006328 | 0 | 1. A memory device, comprising: address input connections to receive externally provided signals; and control circuitry coupled to the address input connections, wherein the control circuitry is adapted to place the non-volatile memory device in a test mode in response to the externally provided signals. |
8352447 | 13037649 | 1 | 1. An storage system coupled to a server for managing object-based data comprising: a processor; a memory; and a plurality of storage devices, wherein in deduplicating data, said storage system obtains information of boundary location of objects included in the data subject to deduplication, divides the data subject to deduplication based on said information of boundary location of the objects, and calculates hash value of said divided data, wherein said storage system provides a plurality of virtual volumes to said server, and each page of said plurality of virtual volumes are allocated from a plurality of logical volumes allocated from said plurality of storage devices, said allocation of each said page from said plurality of logical volumes is performed when the page is subject to a write command, wherein said memory maintains said information of the boundary location of objects and allocation between the pages of said plurality of virtual volumes and said plurality of logical volumes, wherein said server includes an application program which reads data from said plurality of virtual volumes, processes said data, and writes the data to said plurality of virtual volumes, wherein said information of boundary location of objects are managed by said application program, said information of boundary location of objects including an address of said virtual volume, and wherein said information of boundary location of objects are obtained from said server. |
20160293207 | 14673342 | 0 | 1. A method of randomly writing data to a storage device that includes E-regions and I-regions, wherein data written to at least the I-region is written utilizing a shingled magnetic recording scheme, the method comprising: receiving a request to write data to a logical block address (LBA), wherein the LBA is mapped to a physical block address (PBA) on a storage medium of the storage device; determining whether the data is eligible for a write-in place update to an area of the I-region, wherein initial eligibility of write-in place updates is based on a mapping list of LBAs to PBAs; and writing the data to the area of the I-region determined to be eligible for a write-in place update, wherein writing the data further includes writing management information to the I-region that identifies a starting LBA of the write-in place update and a length of the write-in place update. |
9904587 | 14975295 | 1 | 1. A computer-implemented method, comprising: determining an event generated at a processing system of a host computing device in a multi-tenant environment, the event being generated in response to execution of a workload on an instance running on the host computing device, the instance associated with a customer having an account with a provider of the multi-tenant environment; receiving, at a first interval, a current value of a first hardware counter at a privileged instance running on the host computing device, the first hardware counter being at the processing system of the host computing device, a type of the first hardware counter being associated with the event and the value corresponding to a number of occurrences of the event on the host computing device; sending, from the privileged instance running on the host computing device, the current value of the first hardware counter to a central computing device in the multi-tenant environment; obtaining, from a database at the central computing device, one or more hardware counter patterns derived at least from reference values of the type of counter, the hardware counter patterns determined to be indicative of anomalous behavior; comparing the current value of the first hardware counter to the one or more hardware counter patterns; and determining, in response to the current value of the hardware counter corresponding to at least one of the one or more hardware counter patterns, that anomalous behavior is associated with the execution of the workload, wherein the determination of anomalous behavior is performed without accessing data stored on the instance associated with the customer. |
20130159564 | 13328739 | 0 | 1. A method for performing direct memory access, the method comprising: obtaining, by a first application executing on a host, a first kernel address space identifier of a first driver kernel memory, wherein the first driver kernel memory is a portion of kernel space allocated to a first device driver, and wherein the first device driver is for a first device operatively connected to the host; sending, by the first application, the first kernel address space identifier to a second device driver, wherein the second device driver is for a second device operatively connected to the host; obtaining, by the second device driver and using the first kernel address space identifier, a cookie structure binding the first driver kernel memory to a second device driver address space for the first driver kernel memory; sending, by the first application, a first request for a first direct memory access operation, wherein the first request comprises a first location identifier of a first location storing a first data object in the first driver kernel memory; and performing, by the second device driver, based on the cookie structure, and using the first location identifier, the first direct memory access operation to transfer the first data object from the first driver kernel memory to a second driver kernel memory, wherein the second driver kernel memory is a portion of kernel space allocated to the second device driver. |
20020180743 | 10174918 | 0 | 1. An electronic system comprising coupled to a memory comprising: a display device; a fast bus; and a decoder coupled to the fast bus for receiving compressed images and displaying the decoded images on the display device; the decoder coupled to the memory storing at least one previously decoded image used to decode a current image, wherein the memory is a region of a main memory of the computer, accessible through the fast bus. |
8223088 | 13157038 | 1 | 1. A head-mountable display (HMD) system comprising: a non-transitory computer-readable medium; and program instructions stored on the non-transitory computer-readable medium and executable by a processor to: provide a multimode input field in a graphical display of a head-mountable display (HMD), wherein the multimode input field is a single graphical interface element that is controllable to display content based on a plurality of modalities of input data received from any of a plurality of input sources, and wherein the plurality of modalities comprises point-of-view video and at least one of audio, image, text, and video; receive input data from the plurality of input sources; monitor the received input data for one or more data patterns indicated by input-selection criteria, wherein the one or more data patterns comprise: (a) at least one data pattern that corresponds to implicit information that is indicative of desired content for the multimode input field and (b) at least one data pattern corresponding to an explicit input-content instruction that indicates desired content for the multimode input field; select at least one input source from the plurality of input sources in response to detection of a data pattern in the received input data, wherein the detected data pattern matches a corresponding one of the data patterns indicated by the input-selection criteria; and display content in the multimode input field, wherein the displayed content is based on input data received from the at least one selected input source. |
8321364 | 13471149 | 1 | 1. A method for providing instructions to a robotic device performed by a computing system having a processor and memory, the method comprising: receiving information associated with a first party, wherein the first party is connected to a second party by a social-network, wherein the second party is associated with the robotic device, wherein the social-network comprises a network of parties, including the first party and the second party, that are related via one or more relationships, the one or more relationships indicating a type of connection between the first party and the second party; based on the received information, querying a behavioral database to obtain a behavioral expectation associated with the first party, wherein the behavioral expectation indicates an action associated with the first party; comparing the behavioral expectation associated with the first party to a stored behavioral expectation associated with the second party to determine if the behavioral expectation associated with the first party differs from the stored behavioral expectation associated with the second party; based on the comparing, modifying the stored behavioral expectation associated with the second party based on the behavioral expectation associated with the first party; and providing instructions, which are executable to perform an action associated with the modified behavioral expectation, to the robotic device associated with the second party. |
20120005221 | 12827070 | 0 | 1. A method of presenting facts extracted from a social network on a device having a processor and a fact store, respective facts associated with at least one topic, the method comprising: executing on the processor instructions configured to: upon receiving from a user a message within the social network: identify in the message at least one fact associated with at least one topic, and store the fact in the fact store associated with the topic; and upon receiving from a user a query related to a topic: select from the fact store at least one fact associated with the topic, and present the at least one fact to the user. |
9780935 | 13521659 | 1 | 1. A method for transmitting a dedicated pilot, comprising the steps of: configuring a dedicated pilot with an orthogonal sequence over a resource for transmission of the dedicated pilot according to a preset mapping rule; and transmitting the dedicated pilot in a Code Division Multiplexing, CDM, mode or in a hybrid CDM and Frequency Division Multiplexing, FDM, mode, wherein adjacent sub-carriers, corresponding to the same port, for transmission of the dedicated pilot have their orthogonal sequences selected from different sets of orthogonal sequences; for a system at a transmission rank of 1 to 4, two adjacent sub-carriers, corresponding to the same port, for transmission of the dedicated pilot have their orthogonal sequences selected from different sets of orthogonal sequences; for a system at a transmission rank of 5 to 8, two adjacent sub-carriers, corresponding to the same port, for transmission of the dedicated pilot have their orthogonal sequences selected from different sets of orthogonal sequences; wherein for a system at the transmission rank of 1 to 4, two adjacent sub-carriers, corresponding to the same port, for transmission of the dedicated pilot have their orthogonal sequences selected from different sets of orthogonal sequences in a frequency order within a system bandwidth; for a system at the transmission rank of 5 to 8, two adjacent sub-carriers, corresponding to the same port, for transmission of the dedicated pilot have their orthogonal sequences selected from different sets of orthogonal sequences in a frequency order within a system bandwidth. |
20100077194 | 12563239 | 0 | 1. A computer system comprising: a hard disk drive that stores a first set of data that includes boot up data; a non-volatile semiconductor memory that is distinct from semiconductor memory of the hard disk drive and semiconductor memory of a host of the computer system; and a turbo boot driver module that stores the boot up data in the non-volatile semiconductor memory and that transfers the boot up data from the non-volatile semiconductor memory to a file system of the host during a boot up mode of the host. |
9594696 | 14740793 | 1 | 1. A system configured to generate automatically a procedure operative to distributively process a plurality of data sets stored on a plurality of memory modules, comprising: a first database configured to store a code sequence describing an action to be performed by a target system on each of a plurality of data sets stored in a shared memory pool comprising a plurality of memory modules associated respectively with a plurality of data interfaces all belonging to the target system, in which the action per each of the plurality of data sets comprises: (i) fetching the data set from the shared memory pool in the target system, and (ii) processing said data set fetched; and a first compute element outside the target system, having access to said first database, and configured to convert said code sequence into a sequence of executable instructions, in which said sequence of executable instructions, when executed simultaneously by each of a plurality of compute elements of the target system, results in a distributive fetching-and-processing procedure operative, per each of the plurality of compute elements, to: send a plurality of data requests to at least some of the plurality of data interfaces, in which each of the data requests is sent to one of the plurality of data interfaces; receive, as a response to each of the data requests, from the data interface receiving the data request, a reply comprising a specific one of the data sets stored in the memory module associated with the data interface; and process said data sets received, such that: said sending, receiving, and processing, by each of the plurality of compute elements, are done asynchronously with any other of the sending, receiving, processing done by any other of the compute elements, until a first condition is met. |
9396012 | 13828183 | 1 | 1. A method comprising: creating, at a hypervisor of a computing device, at least a first virtual processor for a first guest operating system; and scheduling, for execution on a hardware processor of the computing device, the first virtual processor and at least a second virtual processor created for a second guest operating system, wherein the first virtual processor has a first priority corresponding to a first task priority of a corresponding first task, wherein the second virtual processor has a second priority corresponding to a second task priority of a corresponding second task, wherein the first task priority is assigned to the first task by the first guest operating system and the second task priority is assigned to the second task by the second guest operating system, wherein the hypervisor has access to priority information associated with tasks of the first guest operating system including the first task and tasks of the second guest operating system including the second task, and wherein the hypervisor assigns priority to the first virtual processor and to the second virtual processor based on the priority information associated with the first task and the second task. |
8996374 | 13669907 | 1 | 1. A method for processing a plurality of feature vectors, the method comprising: receiving a first feature vector and a second feature vector from a server device; accessing an acoustic model for a senone; and concurrently calculating a first senone score associated with the first feature vector and a second senone score associated with the second feature vector both based on the senone, wherein the calculating comprises a single read access to the acoustic model when calculating the first and second senone scores. |
20160092992 | 14528587 | 0 | 1. A method implemented at least in part by a computer, the method comprising: allocating a plurality of accounting cost senders to a plurality of different tasks; and within the tasks, locally working through the accounting cost senders via a method comprising (a)-(b): (a) for a given accounting cost sender, locally identifying one or more pinpoint accounting cost receivers; and (b) locally distributing accounting costs for the given accounting cost sender among the pinpoint accounting cost receivers. |
7657892 | 11132601 | 1 | 1. A system for self-tuned threading model in an application server, comprising: a server, including one or more processors, which receives requests from clients or other servers for execution by service classes at the server; a plurality of threads operating at the server for use in processing the requests; a priority queue operating at the server for storing the requests until the requests can be processed by the threads; a configuration file, which defines a plurality of service classes executing at the server to which each of the requests can be directed, wherein the configuration file includes numeric share values associated with the plurality of service classes, including a share value for each service class, and wherein each of the share values represents a proportional entitlement to thread usage for its associated service class as compared to other service classes having other share values; a software process that operates on the server and maintains the priority queue for allocating threads to requests, according to the service class to which the requests are directed and the proportional entitlement priority to thread usage for each service class, including determining that service class to which a received request is directed, determining the share value associated with that service class, and placing that request in the priority queue in proportion to the share value for each request's service class, so that the threads are provided with requests for each service class in a ratio matching those service classes proportional entitlement; and wherein one or more numeric share values associated with the plurality of service classes and defined in the configuration file can be modified, to reflect a different proportional entitlement, and wherein the software process automatically modifies the placement of subsequent received requests in the priority queue, to reflect the different proportional entitlement. |
20060190228 | 11112437 | 0 | 1. A method of computer modeling and testing a security system comprising: a) selecting one or more security elements of a security system for a predetermined security area; b) modeling the security system using the selected security elements placed in locations in the security area; c) selecting a breach scenario to test the modeled security system; and d) executing the breach scenario. |
20080215298 | 11973693 | 0 | 1. A method for parameterization of data distributions for efficient information sharing in distributed sensor networks including a plurality of sensors, comprising the steps of: performing Bayesian multi-source data fusion; and sharing probalistic data information. |
20040158671 | 10479635 | 0 | 1. A semiconductor memory device having a memory cell array comprising memory cells which need refresh and receiving asynchronously a write request and write data together with an access address, wherein the semiconductor memory device comprises: an access means for executing a refresh of said memory cell array subsequently to a write cycle to the access address; a write control means for rendering said access means perform a late write operation, using said access address and said write data given in said memory cycle, after a memory cycle in which said write request has been given; and a read inhibit control means for inhibiting a read operation based in an output enable signal in said write cycle having said execution of said late write operation. |
9600290 | 14570203 | 1 | 1. A computer program product for evaluating a response time in a computer system, wherein a plurality of units of execution are run in parallel on individual processor cores while sharing internal hardware resources, the computer program product comprising a computer readable storage medium having computer readable instructions embodied therewith, the instructions executable by a computer to cause the computer to: normalize a utilization state of the computer system with the state of parallelism of the units of execution and evaluate the utilization state, wherein normalizing the utilization state comprises obtaining a utilization state of all CPU threads of the processor cores, and calculating a normalized utilization value from the obtained utilization state of each CPU thread with reference to a case in which a number of active threads is 1; calculate an expected value of response time in a desired state of parallelism of the units of execution from the normalized utilization state on the basis of queueing theory, wherein changes in an average single-thread performance of the units of execution according to the parallel running state are taken into account; determine a degree of parallelism or a combination of degrees of parallelism at which the calculated expected value of response time is optimized as the state of parallelism of the units of execution used in the utilization state; and update the state of parallelism of the units of execution used on the basis of the calculated result of the expected value of response time in the state of parallelism, wherein the plurality of units of execution are run in parallel on the individual processor cores using a simultaneous multi-threading (SMT) function, and the expected value of response time is calculated while the SMT function is enabled. |