At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Secure protocol handshake offload using TNICs
A method for offloading a secure protocol handshake. The method includes establishing a connection between a host system and a remote peer, and determining...
Method and apparatus for supporting vector operations on a multi-threaded
One embodiment of the present invention provides a system that supports vector operations on a multi-threaded microprocessor. During operation, the system...
Method and apparatus for executing event driven simulations
A system that includes an object store layer configured to store a plurality of objects, wherein each of the plurality of objects comprises a method, a...
Method and apparatus for determining interconnections of network devices
A method and apparatus is disclosed for determining interconnections of network devices. The network devices are connected together based on a set of general...
Method and apparatus for facilitating mark-sweep garbage collection with
A method and a system for facilitating garbage collection (GC) operations in a memory-management system that supports both mark-sweep (MS) objects and...
Virtual network interface card loopback fastpath
A method for routing packets includes receiving an outbound packet issued by a first virtual machine, wherein the first virtual machine is located on a host,...
Low-power semi-dynamic flip-flop with smart keeper
A modified high-speed flip-flop including an input circuit, a smart window circuit, a smart keeper circuit, a pre-charge circuit, a discharge circuit, a slave...
Dynamic refreshed receiver for proximity communication
A system that dynamically refreshes the inputs of a differential receiver. During operation, while a differential transmitter is not transmitting data, the...
Submersible gas burner
A submersible gas burner includes a pilot burner, a closed gas reservoir, and a first and second main burners. The pilot burner has a pilot burner tube with a...
Cooling technique using a heat sink containing swirling
A heat sink has a heat spreader structure containing magneto-hydrodynamic fluid. Also, the heat spreader includes a central metallic cylinder and a metal ring...
Handheld toy communicator
Handheld toy communicator with slidable cover
Method and apparatus for improving user experience for legitimate traffic
of a service impacted by denial of...
A method for isolating legitimate network traffic during a denial of service attack involves receiving a plurality of packets from a network, detecting an attack...
Capturing machine state of unstable Java program
Mechanisms and methods for capturing an execution state of a failing program in a computing environment are disclosed. Embodiments can enable detection of user...
System and method for optimizing a memory controller
A system and method for optimizing a memory controller. The system includes a memory controller and at least two registers for storing a plurality of operating...
Method and system for minor garbage collection
A method for minor garbage collection involves marking cards as clean, where the cards designate ranges of memory locations in a shared older generation, marking...
Method and apparatus for generating media playlists by defining paths
through media similarity space
A media playlist is generated from a set of two or more seed media selections as well as the desired number of selections in the playlist. The seed selections...
Implantable biomedical chip with modulator for a wireless neural
An implantable biomedical chip with modulator for a wireless neural stimulating system. The implantable biomedical chip comprises a power regulator, a...
Generating a clock crossing signal based on clock ratios
A multiple clock domain system. A system comprises two clock domains which receive a source clock signal. The first domain includes a first clock signal with a...
Multi-port S-parameter and T-parameter conversion
A method for making measurements using a vector network analyzer, and for multi-port S-parameter and T-parameter conversion includes a generalized T-matrix...
Method of operating memory cell providing internal power switching
Various implementations are provided that may be used to improve the writeability of individual memory cells providing internal power switching. For example, in...
Expansion card carrier and method for assembling the same
An expansion card carrier is disclosed, the expansion card carrier including a top portion for covering an expansion card, at least one side portion for...
Thermal transfer technique using heat pipes with integral rack rails
A thermal transfer apparatus for cooling a heat-producing electronic component includes an evaporator disposed over the heat-producing electronic component and...
Fabric conditioning compositions
The concentrated liquid fabric softening composition of the present invention comprises an ester-linked triethanolamine (TEA) quaternary ammonium fabric...
A garden composter has a longitudinally extending cylindrical drum which is mounted to a support frame and can be rotated relative to the support frame about an...
Hubbed rotor adapter plate
A hubbed rotor adapter plate for refinishing a hubbed rotor is provided. The hubbed rotor adapter plate includes an adapter drum and a self-centering bearing...
Retrieving events from a queue
Methods and apparatus, including computer program products, implementing and using techniques for retrieving events from an event port. A request to retrieve a...
Portable detection of start and completion of object construction
A method for tracking a target object, involving identifying at least one portion of code corresponding to a constructor for the target object, and inserting a...
Method and apparatus for processing a streamed zip file
In accordance with the invention, there is provided a method and apparatus for receiving a streamed zip file and accessing contents of the zip file's central...
Method and apparatus for formally specifying application-specific
A system for specifying read/write consistency for an application including an application including at least one transaction, wherein the at least one...
Hardware-based network interface per-ring resource accounting
Incoming/outgoing data packets to/from a network are processed by associated receive/send rings of a network interface. A plurality of counters, disposed in...
A multi-band antenna, it comprises: a grounding surface, a supporting base and a radiative metallic portion; the grounding surface has a first shorting point and...
Dynamic voltage scaling for self-timed or racing paths
A timing-constrained circuit (e.g., a self-timed circuit) of optimal performance is achieved by allowing the delay of the circuit to be changed dynamically as a...
Ferrofluid-cooled heat sink
A heat sink uses thermally conductive ferrofluid to cool an integrated circuit. A direction of flow of the ferrofluid in the heat sink is controlled by a...
Secure data broker
A secure data broker has been developed, which provides a restricted message based data exchange between a client application and a secured information resource...
Parallelization scheme for generic reduction
One embodiment of the present invention provides a system that supports parallelized generic reduction operations in a parallel programming language, wherein a...
Using class properties to segregate objects in a generation managed by the
A garbage collector that employs the train algorithm divides object classes into a number of class groups, which are considered to have different ranks. The...
Mechanism for lossless user-level tracing on an architecture supporting
A method for tracing an instrumented program involves triggering a probe in the instrumented program, obtaining an original instruction associated with the...
Breakpoints in a transactional memory-based representation of code
Transactional programming promises to substantially simplify the development and maintenance of correct, scalable, and efficient concurrent programs. Designs for...
Processor including general-purpose and cryptographic functionality in
which cryptographic operations are...
A processor including general-purpose and cryptographic functionality, in which cryptographic operations are visible to user-specified software. According to one...
Proxy-based device sharing
A method is provided for supporting device sharing between hosts via a bus fabric. A master host owns a device tree and provides IO services to at least one...
System and method for tracking infiniband RDMA read responses
A system and method for tracking responses to InfiniBand RDMA Reads. When an RDMA Read or Read request is issued by a transmit module, a receive module is...
Method and apparatus for soft keys of an electronic device
An electronic device includes a keypad portion having at least one multifunction key and a display area displaying screen views having one or more soft key...
Method and apparatus for precisely aligning integrated circuit chips
A system that facilitates precise inter-chip alignment. The system includes a first integrated circuit chip, whose surface has etch pit wells. The system also...
Multi-lid semiconductor package
A multi-lid semiconductor package includes one or more die disposed on a substrate, an interconnect disposed on the substrate, one or more die lids, a die...
Adhesion promoting compound
The invention comprises an adhesion promoter for a printing ink and a printing ink comprising the adhesion promoter. The adhesion promoter comprises the product...
Method and system for creating and using storage threads
A system including a plurality of data units, wherein each of the plurality of data units is associated with a data thread, a plurality of storage engines...
Method and apparatus for reporting failure conditions during transactional
One embodiment of the present invention provides a system that reports reasons for failure during transactional execution. During operation, the system...
Code coverage quality estimator
A method for estimating a quality of code coverage of a test is described. The method includes training a neural network, using the neural network to generate a...
Server authentication in non-secure channel card pin reset methods and
computer implemented processes
A method for resetting a pin on an access card is disclosed. The method includes generating a server authentication (SA) public key and an SA private key and...