At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Proximity-based addressing for supporting in-place execution in virtual
One embodiment of the present invention provides a system that facilitates performing proximity-based addressing in a platform-independent virtual machine....
Method and system for timing modeling for custom circuit blocks
A method is provided for modeling timing characteristics of a circuit block of an integrated circuit, which includes a main circuit and a timing circuit. The...
A computer assembly for example for use as a network server comprises housing a host processor located within the housing and, a service processor also located...
Error reporting to diagnostic engines based on their diagnostic
A method, apparatus, and computer program product diagnosing and resolving faults is disclosed. A disclosed fault management architecture includes a fault...
Method and apparatus for hybrid group key management
A system for group key management including a keying material infrastructure including a root portion configured to store a root public key, a key encryption key...
Technique for reducing traffic in an instruction fetch unit of a chip
A processor includes a fetch pipeline, out-of-order (OOO) logic and a strand selector. The fetch pipeline is configured to provide instructions from an...
Software transactional memory for dynamically sizable shared data
We propose a new form of software transactional memory (STM) designed to support dynamic-sized data structures, and we describe a novel non-blocking...
Method and system for remote execution of code on a distributed data
In accordance with the invention, a data storage system for storing and retrieving fixed data content includes: a storage system network; one or more peer node...
Methods and apparatus for distributing interrupts
The present invention relates to handling interrupts in a multiprocessor system. An interrupt controller can receive input from a variety of interrupt sources,...
Dynamic location storage and retrieval in a wireless portal server
Embodiments of the present invention relate to a method and mechanism for managing location information in a wireless portal environment. The method consists of...
Collaborative content coherence using mobile agents in peer-to-peer
A mobile agent may be provided for collaborative content control in peer-to-peer networks. A peer may launch a mobile agent including an itinerary of peers to be...
System and method for adding speech recognition to GUI applications
A system and method for adding speech recognition to graphics user interface based applications for a computer system is described. The speech recognition system...
Combined buffering of infiniband virtual lanes and queue pairs
A system and method for shared buffering of InfiniBand virtual lanes and queue pairs. Instead of allocating dedicated memory space (e.g., a set of FIFO queues),...
Prefetching techniques for network interfaces
A prefetching technique for a network interface is provided to give the network interface the opportunity to prefetch data out-of-order into send queues in the...
Cooling failure mitigation for an electronics enclosure
A system for permitting orderly shutdown of electronic components. The system includes an enclosure populated with one or more electronic components. A fan...
Apparatus for extending and retracting a pool cover
Apparatus for extending and retracting a cover for a swimming pool includes a motor for selectively rotating a clutch in one direction or the other direction. A...
Armadillo mug with handle
Clock skew modelling using delay stamping
A method for determining clock skew to avoid hold time violations is provided. The method includes obtaining a total delay to a source by adding a first delay...
Automatic device strength based sensitization generation for sequential
The method and apparatus for analysis of integrated circuits using static timing analysis. For a circuit being analyzed, the value of the state net for the case...
Method and system for selectively retrieving updated information from one
or more websites
A computer system having a user specified web browsing system for selectively retrieving content from a variety of web sites is disclosed. The web browser of the...
An information processing system is provided. The information processing system comprises: an information processing subsystem including a processor and a...
Log-on service providing credential level change without loss of session
A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single...
Method for monitoring heap for memory leaks
A low overhead method for identifying memory leaks is provided. The low overhead method includes a) detecting completion of a garbage collection cycle; and b)...
Mechanism and method for cache snoop filtering
A mechanism for filtering snoop requests to a cache memory includes, in one embodiment, a storage including a plurality of entries configured to store...
Techniques for reducing off-chip cache memory accesses
Cache lines stored in an on-chip cache memory are associated with one or more state bits that indicate whether data stored in the cache lines was sourced from an...
Transmitting odd-sized packets over a double data rate link
A method may involve: receiving an even number of odd-sized packets for transmission over a double data rate link; re-packetizing the even number of odd-sized...
Contact load profile modification for a compression socketed CPU
A integrated circuit housing includes a first clamping hardware, a second clamping hardware operatively connected to the first clamping hardware, and an...
Phthalocyanine pigments with neutral metallic down flop
Phthalocyanine pigments having 0-4 chlorine atoms have a narrow particle-size range with 90% of particles between about 0.01-0.10 .mu.m, the average particle...
Fastening structure for headband of ski goggles
A headband fastening structure for ski goggles includes a lens fitted in a goggle frame and a headband. The lens and having a pair of extending segments on...
Method and apparatus for forwarding references to objects concurrently
with space-incremental garbage collection
In order to prevent concurrent garbage collection using a space-incremental algorithm from corrupting objects, objects are evacuated by copying them to relocated...
Block-based, adaptive, lossless image coder
Method and system for lossless compression coding of a digitally represented image. The image is expressed as one or more blocks, each block having a sequence of...
Non-volatile fault indication
In a computer system a non-volatile fault indicator in a positional relationship with at least one system component is settable to maintain a fault indication...
Chemical time modification of an object
A method for modifying an object involves determining a modification rate for the object, creating a first reservoir and a first wicking channel based on the...
Auxiliary device for engine spark plug ignition
An auxiliary device for sparkplug ignition is provided having a case, and provided therein, electrolytic capacitors connected in parallel between ground...
Wristband timer watch
Method and system for detecting deprecated elements during runtime
A method for controlling access to deprecated methods of an implementation is provided. The method includes receiving a request to access a method that has been...
Method and system for verification of soft error handling with application
to CMT processors
A method provides for verifying soft error handling in an integrated circuit (IC) design. A diagnostic program is executed on a virtual IC based on the IC design...
Method and apparatus for a transaction-based secure storage file system
A method for generating a secure storage file system, including encrypting data using a symmetric key to obtain encrypted data, encrypting the symmetric key...
Synchronization primitives for flexible scheduling of functional unit
A processor employing synchronization primitives for flexible scheduling of functional unit operations. In one embodiment, a processor may include a number of...
Object mutation determination for incremental state saves
A client-server system may include a distributed store configured to maintain a primary state of session data. The system may also include one or more...
Mechanism for caching dynamically generated content
A mechanism for caching dynamically generated content is disclosed, wherein initially, a server receives a request from a client for a set of dynamically...
Blocking access to selected APIs
A method for testing operation of a computer application. An emulator is provided to run on a development platform subject to limitations of multiple different...
Slam latch for rackmount rail
A rackmount system for a component may include outer slide members that couple with inner slide members. The outer slide members may be coupled to a rack with...
Method, system, and program for dispatching a method call
Provided are a method, system, and program for processing a call. A call is invoked from a caller object to a target object, wherein the caller and target...
Methods for execution control acquistion of a program and for executing an
optimized version of a program
In a method for execution control acquisition of a program, during the execution of the program, it is determined when a hardware performance counter has reached...