Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: sun





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-7,318,222 Methods for execution control acquistion of a program and for executing an optimized version of a program
In a method for execution control acquisition of a program, during the execution of the program, it is determined when a hardware performance counter has reached...
US-7,318,128 Methods and apparatus for selecting processes for execution
Mechanisms and techniques operate in a multiprocessing computer system having a plurality of processing devices and provide an affinity-based wakeup locality...
US-7,318,114 System and method for dynamic memory interleaving and de-interleaving
In one embodiment, a system includes a plurality of memory controllers each coupled between a processor and a respective memory. Each memory controller includes...
US-7,317,110 Low dielectric constant organo-soluble polyimides
The present invention provides a series of easily processable poly(ether-imide)s that are organic-soluble and afford low dielectric constants of films, their...
US-7,316,021 Switching method in a multi-threaded processor
A processor includes logic for attaining a very fast exception handling functionality while executing non-threaded programs by invoking a multithreaded-type...
US-7,316,010 Methods for sharing conditionally across class loaders dynamically compiled code
A method for conditionally sharing dynamically compiled code between different class loaders is provided. In this method, bytecodes of a first class type are...
US-7,316,007 Optimization of n-base typed arithmetic expressions
A method for arithmetic expression optimization includes receiving a first instruction defined for a first processor having a first base, the first instruction...
US-7,315,919 Bandwidth reduction technique in a snooping-based cache-coherent cluster of multiprocessing nodes
A cluster of multiprocessing nodes uses snooping-based cache-coherence to maintain consistency among the cache memories of the multiprocessing nodes. One or more...
US-7,315,218 Method and apparatus to center the frequency of a voltage-controlled oscillator
A circuit and method are provided for calibrating an analog oscillator in the digital domain. The circuit and method disclosed herein centers an oscillation...
US-D558,523 Round mug with triangular base
US-7,313,795 Method and system for managing resource allocation in non-uniform resource access computer systems
A method and system of managing resource allocation in a non-uniform resource access computer system is disclosed. A method comprises determining access costs...
US-7,313,789 Methods and systems for reducing a program size
A method for reducing a size of an image of a class file is provided. In this method, a first stack map that is associated with a first bytecode of a method and...
US-7,313,767 System and method for presenting time related data on a small screen device
An invention is provided for presenting time related data on small screen devices is disclosed. The invention includes examining a plurality of time related data...
US-7,313,745 Decoder for pin-based scan test
An integrated circuit design block includes combinational and sequential logic defining core logic of the integrated circuit design block, and boundary logic...
US-7,313,735 In-line server health checking
A system and method provide in-line server health checks to determine server health without having to wait for a next out-of-band polling interval as with...
US-7,313,717 Error management
A computer system includes a plurality of field replaceable units. A system controller monitors system errors. A diagnostic engine is responsive to the system...
US-7,313,661 Tool for identifying causes of memory leaks
A method for identifying memory leak causes is provided. The method initiates with tracking a number of allocations of objects during a time period. Potentially...
US-7,313,614 Switching system
A system and method for provided a switch system (100) having a first configurable set of processor elements (102) to process storage resource connection...
US-7,313,566 Method and apparatus for isolating selected heap objects using a faulting address trap
All references to an object subset to which an atomic operation is to be applied are deliberately transformed so that an attempt by an application thread to...
US-7,313,547 Manager level device/service arbitrator and methods
A method for managing access to service entities (e.g., such as a devices, resources, and services, which are limited resources) is provided. The method includes...
US-7,313,148 Method and system for TCP large segment offload with ack-based transmit scheduling
A method and system for offloading the transmission of large blocks of data from Transmission Control Protocol residing on a transmitting host computer to an...
US-7,313,139 Method for batch processing received message packets
Embodiments of the present invention are directed to a method for batch processing received message packets. A plurality of message packets are sent in a batch...
US-7,311,294 Jack bar with extendable tubes and fixturing mechanism
A jack bar includes an outer tube, an inner tube and a positioner tube coaxially located. The positioner tube is extendable to adjust a length to the jack bar in...
US-7,310,718 Method for enabling comprehensive profiling of garbage-collected memory systems
A method and apparatus for profiling a heap. According to the method, a flexible and comprehensive general-purpose profiling interface that uniformly...
US-7,310,712 Virtual copy system and method
A method of a copying data includes a cache subsystem loading data to be copied from a first address, and placing the data in a cache as if the data had been...
US-7,310,709 Method and apparatus for primary cache tag error handling
A method and apparatus is disclosed for maintaining coherency between a primary cache and a secondary cache in a directory-based cache system. Upon identifying a...
US-7,310,231 Heat sink having magnet array for magneto-hydrodynamic hot spot cooling
A heat sink has a plurality of pipes that are connected to an array of magnets. The plurality of pipes are connected to a lid that is operatively connected to an...
US-7,310,184 Cylindrical body of a Newton reflective telescope
A cylindrical body of a Newton reflective telescope includes a first cylindrical body and a second cylindrical body combined together. The first cylindrical body...
US-7,310,103 Pipelined 2D viewport clip circuit
A system and method for performing viewport clipping for multiple viewports using a pipeline. The pixel address coordinates are compared against boundaries of a...
US-7,308,532 Method for dynamically implementing N+K redundancy in a storage subsystem
In one embodiment, a storage subsystem includes a plurality of storage arrays each including a plurality of storage devices. The storage subsystem also includes...
US-7,308,504 System and method for dynamically disabling partially streamed content
A system and method for dynamically disabling partially streamed content may include a server receiving a request from a client. A session may be initiated or...
US-7,308,496 Representing trust in distributed peer-to-peer networks
Embodiments may provide mechanisms for representing trust between peers or systems in decentralized networking environments including peer-to-peer networking...
US-7,308,448 Method and apparatus for implementing a lock-free skip list that supports concurrent accesses
One embodiment of the present invention provides a system that supports concurrent accesses to a skip list that is lock-free, which means that the skip list can...
US-7,308,000 Methods and systems for efficient multi-packet data processing in a layered network protocol
Methods and systems consistent with the present invention provide a mechanism for accepting extended amounts of data in a layered network protocol. The methods...
US-7,305,671 Conversion of an object model to a source file generation model
An infrastructure is provided for creating applications for mobile information devices, using a tag-based markup language. Developers can use the markup language...
US-7,305,669 Software upgrades with multiple version support
A method and system thereof for supporting multiple versions of software, such as software organized as components or objects. In one embodiment, a software...
US-7,305,662 Mechanism for lossless tracing in an arbitrary context
A method for tracing an instrumented program, including triggering a probe in the instrumented program, obtaining an original instruction associated with the...
US-7,305,661 Mechanism for lossless tracing in an architecture having a delay slot
A method for tracing an instrumented program using a thread, including transferring control of the instrumented program to a trap handler to obtain an original...
US-7,305,537 Method and system for I/O scheduler activations
A method for storing data, that includes receiving a request to store data in a storage pool, queuing the request in an Input/Output (I/O) queue, and issuing the...
US-7,303,298 Flashlight radio
A combination flashlight audio device wherein the flashlight has an elongated body with an integral mounting flange to which the audio component mounts by way of...
US-D556,614 Calculator ruler
US-D556,513 Armadillo mug
US-7,302,617 Managing and predicting risk for computer devices using exposure management techniques
Methods, systems, and articles of manufacture consistent with the present invention provide for managing and predicting risk for computer-based systems....
US-7,302,568 Method, system, and article of manufacture for remote management of devices
Provided are a method, system, and article of manufacture. A first process creates a second process. A cipher is generated. The first process is terminated....
US-7,302,542 Mechanism for dynamically-allocated variables in an arbitrary-context tracing framework
A method of dynamically allocating a variable in a tracing framework, including allocating a dynamic memory in the tracing framework having a plurality of data...
US-7,302,515 Exploiting popular objects to reduce mutator overhead
A garbage collector that reclaims memory for a mutator does so space-incrementally, employing remembered sets associated with respective heap regions to keep...
US-7,302,439 Information model mapping with shared directory tree representations
A registry service is described which uses a partitioned publisher assertion recording and accessing scheme. A publisher assertion regarding a relationship...
US-7,301,611 Security imaging system
Method and system for detecting authenticate products based upon alteration of emission characteristics due to interaction of the emissions with the product and...
US-7,301,227 Package lid or heat spreader for microprocessor packages
A package for an integrated circuit (IC) die comprises a substrate and a lid. The substrate has an upper surface facing an interior of the package and a lower...
US-7,300,627 Test sample collection system
A collection system for collecting a liquid test sample that includes a spoon-like member having a bowl portion for collecting and holding the test sample, a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.