At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Method and apparatus for classifying data using R-functions
One embodiment of the present invention provides a system that constructs a classifier that distinguishes between different classes of data points. During...
Method and apparatus for maintaining ephemeral keys in limited space
One embodiment of the present invention provides a system that maintains keys using limited storage space on a computing device, such as a smart card. During...
Apparatus and method for enabling a connection over a serial interface
An apparatus for enabling a connection over a serial interface is provided. The apparatus is a connector interface that includes a plurality of switches...
Managing protocol information used in exchanging communications
A method and apparatus for managing protocol information used in exchanging communications is provided. One or more protocol profiles are stored. Each of the...
Heat dissipating fin assembly for clamping dynamic random access memory to
An exemplary heat dissipating fin assembly for clamping the DRAM to dissipate heat includes a number of heat dissipating fins arranged in a stacked fashion and a...
Technique for signal and transducer alignment in a tape drive
In an embodiment, a method is provided for improving signal and transducer alignment in a magnetic tape drive. The method includes writing a first track and a...
Dynamically controlling a temperature profile in a disk drive for a
temperature-dependent reliability study
One embodiment of the present invention provides a system that dynamically controls a temperature profile within a disk drive by generating disk drive activity....
Removable data storage media tracking system
A system for tracking locations of portable data storage media. The system includes media with a wireless tag storing metadata pertaining to its stored data. The...
Active resistor used in a feedback amplifier particularly useful for
An active resistor and its use in a negative feedback amplifier allow wide voltage swings on the input and output signals. One embodiment includes parallel...
Structures for Z-aligned proximity communication
A device includes a first semiconductor die having a first surface and a second surface. The first semiconductor die is configured to communicate by capacitive...
Point-of-service (POS) and POS application compatability
A system for using compatible point-of-service (POS) applications to access and control devices of a POS unit. A server runs a POS application and a set of...
Integrated circuit with embedded test functionality
An integrated circuit including embedded test functionality. An integrated circuit may include a plurality of processor cores each configured to execute...
Integrated circuit with blocking pin to coordinate entry into test mode
An integrated circuit (IC) including a blocking pin. An IC may include state logic, a test control unit configured to coordinate access by external circuitry to...
Plesiochronous transmit pin with synchronous mode for testing on ATE
A method and apparatus for conveying test response data from an integrated circuit to ATE via a plesiochronous interconnect. The integrated circuit includes a...
Cache coherence protocol with write-only permission
A system may include a processor node, and may also include an input/output (I/O) node including a processor and an I/O device. The processor and I/O nodes may...
Adaptive resilvering I/O scheduling
In general, the invention relates to a method for storing data. The method includes receiving an Input/Output (I/O) request to store data in a storage pool,...
Approach for provisioning network devices
An approach for provisioning network devices generally involves supplying boot data to network devices over a network so that the network devices can be booted...
Host-centric storage provisioner in a managed SAN
Various embodiments of a system and method for provisioning a storage consumer with storage in a SAN networked computer system are disclosed. A SAN networked...
Instant messaging using distributed indexes
Embodiments of a distributed instant messaging system that uses a distributed index in peer-to-peer networks. A distributed index may be used to implement an...
Distributed data sharing methods and systems
A system, method, and computer implemented method for sharing data between networked applications is provided. The system includes at least a whiteboard space, a...
Method and system for creating and using shadow roots
A method for storing a first copy of an object, including obtaining the object including a globally unique identifier (GUID), generating a first derived GUID...
Concurrent extensible cuckoo hashing
Concurrent cuckoo hashing is performed on a hash table that includes a number of locations; each may hold a value. A plurality of processes may concurrently...
Method and apparatus for decentralized device and service description and
A resource discovery and description mechanism for decentralized device and service description and discovery in networking environments is described that...
Optimal communication path routing in a system employing interconnected
integrated circuit technology
An electronic system in which integrated circuits employing cornered I/O are arranged in a framework including an optional path manager and at least one...
Integrated heat-dissipating device for portable electronic product
An integrated heat-dissipating device for a portable electronic product includes a heat-conducting base, a heat-dissipating plate, a first heat-dissipating...
Push-cord energy saving lampholder easy for the stripping of cord
The present invention is to provide a push-cord energy saving lamp holder that is easy for the stripping of power cord, which comprises: a lamp holder body,...
Back plate for a heat sink
Method and apparatus for generating a characteristics model for a
pattern-based system design analysis using a...
A method for analyzing a target system that includes generating a characteristics model using a schema defining a domain, obtaining a plurality of...
Use of memory protection to implement replicating collection in an
incremental, copying garbage collector
An incremental collector can include memory pages, preferably virtual memory (VM) pages containing objects. A bit or byte map is created with one entry...
Multiprocessor system that supports both coherent and non-coherent memory
One embodiment of the present invention provides a system that reduces coherence traffic in a multiprocessor system by supporting both coherent memory accesses...
Mechanism for capturing high level events on user interface components
A recording mechanism is disclosed for automatically capturing high level events on user interface (UI) components of a set of software. In one implementation,...
Systems and methods for multi-stage message brokering
A message brokering mechanism for performing a recovery operation in a transaction processing system including first and second stages operable to exchange...
Texture mapping method and apparatus for computer implemented graphical
Texture mapping includes (i) calculating the weighted average of the colors of two texels near a particular pixel, (ii) determining a fractional portion of a...
Plesiochronous receiver pin with synchronous mode for testing on ATE
A method and apparatus for conveying test stimulus data from an ATE system to an integrated circuit (IC) via a plesiochronous interconnect. The IC includes a...
Methods and apparatus for persistence of authentication and authorization
for a multi-tenant internet hosted...
A method for remote services authentication in an internet hosted environment includes a high level process and functionality for a secure, practical and...
System and methods for construction, fusion, prosecution, and maintenance
of minimized operating environments
Several methods are provided for applying minimization to computer systems. A unified security profile is created and applied to a computer system. This provides...
Method and structure for coordinating instruction execution in
out-of-order processor execution using an...
A technique for coordinating execution of instructions in a processor that allows instructions to execute out-of-order includes decoding a particular instruction...
Structure and method for achieving very large lookahead instruction window
via non-sequential instruction fetch...
A multithreading processor achieves a very large lookahead instruction window by allowing non-sequential fetch and processing of the dynamic instruction stream....
Hybrid multi-precision multiplication
Multiple-precision hybrid multiplication is a technique that takes advantage of row-wise multiplication and column-wise multiplication. To generate a product for...
Method and apparatus for concurrently processing remembered sets in a
space-incremental garbage collector
In a space incremental garbage collector, delays caused by scanning remembered sets are reduced by scanning the remembered sets mostly concurrently with the...
Method and apparatus for coupling optical signals onto a semiconductor
A first optical coupler is configured to direct optical signals from an optical fiber onto one or more first optical channels located on a semiconductor chip,...
Method and apparatus for performing syntax-directed application layer data
One embodiment of the present invention provides a system that facilitates buffering data at a kernel in a computer system, wherein the data is buffered based on...
Ultra-wideband antenna structure
An ultra-wideband antenna structure is provided. The ultra-wideband antenna structure includes a substrate with an edge, a first surface and a second surface...
Determining chip separation by comparing coupling capacitances
A semiconductor die includes proximity connectors proximate to a surface of the semiconductor die. This semiconductor die is configured to communicate signals...
Structures and methods for a flexible bridge that enables high-bandwidth
One embodiment of the present invention provides a system that facilitates high-bandwidth communication using a flexible bridge. This system includes a chip with...
Computer security technique employing patch with detection and/or
characterization mechanism for exploit of...
A patch or set of patches may be deployed, often to a subset of potentially vulnerable systems, to address a particular vulnerability while providing a facility...
System and method for providing exceptional flow control in protected code
A system and method for providing exceptional flow control in protected code through watchpoints is described. Code is generated. The generated code includes a...
Branch target aware instruction prefetching technique
Inspecting a currently fetched instruction group and determining branching behavior of the currently fetched instruction group, allows for intelligent...
Method and system for collective file access using an mmap (memory-mapped
A method for processing using a shared file that includes creating a plurality of mmaps between a shared file and a plurality of address spaces, wherein each of...
Re-fetching cache memory enabling low-power modes
A re-fetching cache memory improves efficiency of a processor, for example by reducing power consumption and/or increasing performance. When the cache memory is...