At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
PLI-less co-simulation of ISS-based verification systems in hardware
A method for providing verification for a simulation design, including obtaining the simulation design comprising a programming language interface system call,...
Fully lazy linking with module-by-module verification
A method, computer program, and apparatus verify instructions in a module of a computer program during linking using pre-verification constraints with fully lazy...
Secure access of objects generated from data representation language
representations of the objects in a...
A mechanism for securely decompiling representations of objects into copies of the objects is described. A virtual machine may include extensions for decompiling...
Method and apparatus for providing dynamic locks for global resources
One embodiment of the present invention provides a system that facilitates applying a dynamic lock to a range of a resource within a computer system. Upon...
A system links architecture neutral code downloaded to a resource constrained computer. The code may be separated into one or more packages having one or more...
Inter-process communication using different programming languages
A method for inter-process communication between a first process and a second process. The method includes receiving a request from the first process for...
Method and apparatus for facilitating debugging of an integrated circuit
One embodiment of the present invention provides a system that facilitates debugging an integrated circuit without probing signal lines within the integrated...
RMI-IIOP request failover mechanism
Embodiments of a request failover mechanism may be used to failover requests from clients of server instances in a cluster to alternative server instances. One...
Method and apparatus for delivering device drivers
A method and apparatus for delivering a device driver to an operating system without user intervention. One or more operating systems (e.g., different operating...
Method and system for trace generation using memory index hashing
A method and system for trace generation using memory index hashing. A method may include generating an extended trace representative of M threads of instruction...
Speculative memory accesses in a proximity communication-based off-chip
cache memory architecture
A proximity interconnect module includes a plurality of processors operatively connected to a plurality of off-chip cache memories by proximity communication....
System and method for an efficient transport layer transmit interface
A kernel data transfer optimizing system for dynamically subdividing data blocks which are presented by application programs to be transferred to the kernel's...
Method and apparatus for routing data across an n-dimensional grid network
One embodiment of the present invention provides a system for routing data between integrated circuit devices. This system couples together an n-dimensional grid...
Transferring system identities
First and second host systems can each include a respective repository of host identities. The first host system can encode a host identity to be transferred to...
Application programming interface for provisioning services
An invention is provided for provisioning services to client devices. In one embodiment, discovery transactions are included that allow an adapter software...
Floating point status information accumulation circuit
A floating point flag combining or accumulating circuit includes an analysis circuit that receives a plurality of floating point operands, each having encoded...
Method for scheduling jobs using distributed utility-based preemption
One embodiment of the present invention provides a system that assigns jobs to a system containing a number of central processing units (CPUs). During operation,...
Method and apparatus for identifying a drift in a quantized signal in a
One embodiment of the present invention provides a system that identifies a drift in a signal in a computer system. During operation, the system receives a...
Execution unit for performing the data encryption standard
An execution unit adapted to perform at least a portion of the Data Encryption Standard. The execution unit includes a Left Half input; a Key input; and a Table...
System for scaling by parallelizing network workload
A method for scaling a network system which includes providing at least one network interface and providing a flexible association between packets and a...
Method and apparatus for source authentication in a communications network
One embodiment of the invention provides a method of handling an incoming packet at a node in a network. The method includes associating at least one source...
Reduced-power memory with per-sector ground control
A reduced-power memory (such as for a cache memory system of a processor or a microprocessor) provides per-sector ground control to advantageously reduce power...
25 degree tool-less expansion card bracket
An expansion card bracket for a computer server has an expansion card support attachable to a motherboard and an expansion card accepting portion disposed near a...
High-frequency linear phase-frequency detector with wide-pulse outputs
A circuit and method are provided for detecting a phase difference between at least two periodic signals. The circuit and method disclosed herein provide pulsed...
A cooling fan includes: a casing having a base wall and a surrounding wall that extends transversely from the base wall, and that has an inner wall surface and a...
Pen cap and clip
Set of pot handles
Method for placing graphical user interface components in three dimensions
A method for creating a three-dimensional (3D) graphical user interface (GUI) involves creating a first two-dimensional (2D) container and a second 2D container,...
System and method for guarding against infinite loops from multi-point
redirects in a multi-threaded environment
A computer system having a user specified web browsing system for selectively monitoring application request to web based applications to detect and track...
Resolving conflicts between network service rule sets for network data
traffic in a system where rule patterns...
One embodiment of the present invention provides a system that resolves conflicts between network service rules for network data traffic in a system where rule...
Methods and apparatus for producing a configuration for components of a
A computerized device displays graphical representations of network components of the network where each graphical representation shows corresponding...
Separation of data from metadata in a tracing framework
A method for storing a data set having an enabled probe identification component and an associated data component, including obtaining data from an instrumented...
Postmortem detection of owned mutual exclusion locks
In general, in one aspect, the invention relates to a method for identifying lock ownership, including identifying at least one node in the crash dump,...
Global visibility controls for operating system partitions
In accordance with one embodiment of the present invention, there is provided a mechanism for managing and controlling global visibility of resources in zones...
Apparatus and method for reducing execution latency of floating point
operations having special case operands
An apparatus and method for floating-point special case handling. In one embodiment, a processor may include a first execution unit configured to execute a...
Local and global register partitioning technique
A Very Long Instruction Word (VLIW) processor having a plurality of functional units includes a multi-ported register file that is divided into a plurality of...
A method for allocating space on a disk involving receiving a request to allocate space on the disk having a first size, determining whether contiguous space of...
Logical to physical device topological location mappings
A computer readable medium includes executable instructions for visually representing a status of a plurality of storage device slots and a plurality of attached...
Clock and data recovery wherein an FB-DIMM is connected to signal path and
null and sync frames control the FB-DIMM
Improved clock and data recovery involves transmitting one or more null frames prior to transmitting a sync frame. A receiving component detects for the sync...
Asynchronous control circuit with symmetric forward and reverse latencies
One embodiment of the present invention provides a control queue for an asynchronous circuit that includes a number of control modules coupled together linearly...
Input and output buffering
An Infiniband device is provided. The device has a plurality of input/output ports. Each port has associated therewith an input buffer for storage of a packet...
Thermal caching for liquid cooled computer systems
The failure of a data center liquid cooling system can result in a rapid temperature rise in electronic components that may either damage a component, result in...
Thermoelectric cooling device arrays
In various embodiments, a TEC device array may be coupled to a chip and a heat sink to cool the chip. The TEC device array may include multiple TEC devices...
Computer equipment temperature control system and methods for operating
A system and method for controlling temperature in an equipment enclosure are disclosed. The system includes an enclosure having a top side, side walls, a front...
Alloy rack door
Portable executable source code representations
Platform independent processing of the source code is performed, such as lexical analysis, semantic analysis, syntax analysis, and platform independent...