Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

International Business Machine Corporation patents (2014 archive)


Recent patent applications related to International Business Machine Corporation. International Business Machine Corporation is listed as an Agent/Assignee. Note: International Business Machine Corporation may have other listings under different names/spellings. We're not affiliated with International Business Machine Corporation, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | International Business Machine Corporation-related inventors


12/25/14 / #the present invention relates to electronic mail. in particular, it relates to a method and system for processing electronic mail, wherein mails are stored in a space efficient way by removing redundancy from the content. prior art is known for doing a limited version of this on a mail client.

International Business Machines Corporation

. . ... International Business Machine Corporation

12/25/14 / #20140380491

Endpoint security implementation

A method includes a computer detecting an element from a data flow for at least one endpoint device; the computer using the detected element and a protection engine to assess security requirements for the flow of data for the at least one endpoint device; and the computer causing the protection engine to issue additional security controls for the at least one endpoint device.. . ... International Business Machine Corporation

12/25/14 / #20140380484

Intelligent risk level grouping for resource access recertification

A computing device receives requests for approval of a plurality of access entitlements, which includes respective identity accounts, each associated with security intelligence information. The computing device determines risk factors for each respective identity account and associated security intelligence information, and determines a risk level for each of the plurality of access entitlements based at least in part on the risk factors. ... International Business Machine Corporation

12/25/14 / #20140380478

User centric fraud detection

A computer detects fraudulent access to user accounts of a network application. The computer receives user account usage profile information for a plurality of user accounts. ... International Business Machine Corporation

12/25/14 / #20140380475

User centric fraud detection

A computer detects fraudulent access to user accounts of a network application. The computer receives user account usage profile information for a plurality of user accounts. ... International Business Machine Corporation

12/25/14 / #20140380463

Password setting and verification

Methods for setting and verifying a password in a password protected device. Setting a password includes receiving a configuration password entered via a keyboard, wherein the configuration password includes position information of at least one key on the keyboard, and symbol information of at least one key on the keyboard, and storing the configuration password. ... International Business Machine Corporation

12/25/14 / #20140380320

Joint optimization of multiple phases in large data processing

Methods and arrangements for task scheduling. A plurality of jobs is received, each job comprising at least a map phase, a copy/shuffle phase and a reduce phase. ... International Business Machine Corporation

12/25/14 / #20140380319

Address translation/specification field for hardware accelerator

Embodiments relate an address translation/specification (ats) field. An aspect includes receiving a work queue entry from a work queue in a main memory by a hardware accelerator, the work queue entry corresponding to an operation of the hardware accelerator that is requested by user-space software, the work queue entry comprising a first ats field that describes a structure of the work queue entry. ... International Business Machine Corporation

12/25/14 / #20140380310

Sharing usb key by multiple virtual machines located at different hosts

A system for sharing a usb key by multiple virtual machines located at different hosts including at least two virtual machine managers, each virtual machine manager including a virtual machine transceiver module which is configured to receive a request for accessing a usb key from a virtual machine within its host; a storage module which is configured to store an association relationship between a usb key and the virtual machine authenticated by the usb key; a verification module which is configured to, in response to judging that the virtual machine of the received request can access the usb key, transmit the request for accessing the usb key to a usb key transceiver module of a virtual machine manager of the host where the usb key is located; and a usb key transceiver module which is configured to receive a request for accessing a usb key, and to transmit an access request to a connected usb key.. . ... International Business Machine Corporation

12/25/14 / #20140380303

Storage management for a cluster of integrated computing systems

Integrated computing systems with independently managed infrastructures including compute nodes and storage nodes form a cluster. Storage resource agents manage storage resources in the cluster. ... International Business Machine Corporation

12/25/14 / #20140380302

Computer program installation across multiple memories

Embodiments herein are directed to a method for installing a program across multiple memories. The method includes calculating a memory space requirement of the program. ... International Business Machine Corporation

12/25/14 / #20140380301

Launching a target application based on characteristics of a string of characters in a source application

A method and system for launching a target application. A predefined data type is identified by: determining that a first row of a parser table including a first regular expression formulating a string of characters includes rows ordered from a more general to a more specific regular expression; setting a first regular expression as a regular expression matching the string; resetting the regular expression with a second regular expression, of a next row of the parser table, that formulates the string more specifically than the first regular expression; and selecting the predefined data type in the row of the regular expression as the predefined data type of the string, upon performing the resetting for all rows of the parser table. ... International Business Machine Corporation

12/25/14 / #20140380297

Hypervisor subpartition as concurrent upgrade

A processor-implemented method for a concurrent software service upgrade is provided. The processor implemented method may include receiving a type of service request corresponding to the software service upgrade, determining, by the processor, the type of service request and then generating a plurality of subpartitions corresponding to a hypervisor. ... International Business Machine Corporation

12/25/14 / #20140380291

Extracting stream graph structure in a computer language by pre-executing a deterministic subset

Compile-time recognition of graph structure where graph has arbitrary connectivity and is constructed using recursive computations is provided. In one aspect, the graph structure recognized at compile time may be duplicated at runtime and can then operate on runtime values not known at compile time.. ... International Business Machine Corporation

12/25/14 / #20140380290

Extracting stream graph structure in a computer language by pre-executing a deterministic subset

Compile-time recognition of graph structure where graph has arbitrary connectivity and is constructed using recursive computations is provided. In one aspect, the graph structure recognized at compile time may be duplicated at runtime and can then operate on runtime values not known at compile time.. ... International Business Machine Corporation

12/25/14 / #20140380280

Debugging tool with predictive fault location

Identifying a code segment that has a likelihood of causing a program failure. Program code is executed to a failure point. ... International Business Machine Corporation

12/25/14 / #20140380279

Prioritizing test cases using multiple variables

A computer identifies lines of code of a product program that have been modified after an initial test of the product program. The computer determines the overlap between lines of code that have been modified and a mapped test case. ... International Business Machine Corporation

12/25/14 / #20140380261

Semiconductor device reliability model and methodologies for use thereof

Systems and methods for semiconductor device reliability qualification during semiconductor device design. A method is provided that includes defining performance process window bins for a performance window. ... International Business Machine Corporation

12/25/14 / #20140380255

Printing process calibration and correction

Various embodiments include approaches for calibrating a model for a lithographic printing process. Some embodiments include a computer-implemented method for calibrating a model for a lithographic printing process. ... International Business Machine Corporation

12/25/14 / #20140380242

Displaying data protection levels

For displaying data protection levels, a protection module receives a data protection level for a file system object. A display module modifies an icon representing the file system object in a file system graphical user interface to display the data protection level for the file system object.. ... International Business Machine Corporation

12/25/14 / #20140380196

Creation and prioritization of multiple virtual universe teleports in response to an event

Useful work or services can be automated or otherwise facilitated or solutions to real world events developed by emulation of a real-world environment (which can contain objects representing virtual objects) with a virtual environment and generating a prioritized sequence of locations and associated tasks in accordance with resources related to the event in a virtual universe. Performance of the prioritized tasks at the prioritized locations is facilitated in the virtual universe by locally generating teleportation invitations corresponding to locations in the ordered sequence of locations.. ... International Business Machine Corporation

12/25/14 / #20140380174

Optimizing a clustered virtual computing environment

Exemplary embodiments of the present invention disclose a method, computer program product, and system for optimizing a clustered virtual computing environment. In exemplary embodiments, performance attributes are identified for a set of operating devices within the clustered virtual computing environment. ... International Business Machine Corporation

12/25/14 / #20140380160

Pattern based video frame navigation aid

Recommending and graphically displaying viewed video data sensitive to the viewing pattern of a user. Responsive to viewing a plurality of video frames of a video file, a navigation profile is captured to document the viewing pattern of the video frames. ... International Business Machine Corporation

12/25/14 / #20140380147

Loading a web page

A method for loading a web page comprises: searching a web application for user interface change portions, execution of the user interface change portions being capable of triggering a user interface to change; marking the user interface change portions to interrupt, upon execution of the web application, the execution at least once and to execute, upon interruption, at least one of the user interface change portions.. . ... International Business Machine Corporation

12/25/14 / #20140380118

Unequal error protection scheme for headerized sub data sets

A method for decoding a headerized sub data set (sds) according to one embodiment includes decoding a header from a headerized sds to obtain a sds. C1 and c2 decoding are performed on the sds in a number of iterations based on a number of interleaves in each row of the sds. ... International Business Machine Corporation

12/25/14 / #20140380099

Base protocol layer testing device

Embodiments relate to testing of a computing system using a base protocol layer testing device. An aspect includes, based on determining, by the base protocol layer testing device, that a current test comprises a test of a base protocol layer of the computing system, enabling a low level test assist device of the base protocol layer testing device for the current test, wherein the low level test assist device comprises a hardware device that is directly attached to an input/output (i/o) card of the computing system. ... International Business Machine Corporation

12/25/14 / #20140380097

Recovering a volume table and data sets

Provided are a computer program product, system, and method for recovering a volume table and data sets from a volume. Content from a backup volume table comprising a valid backup of a volume table from backup of the volume is processed to generate a recovery volume table for a recovery volume. ... International Business Machine Corporation

12/25/14 / #20140380096

Memory uncorrectable error handling technique for reducing the impact of noise

Techniques for handling uncorrectable errors occurring during memory accesses reduce the likelihood of mis-correction of errors due to the presence of noise. When an uncorrectable memory error is detected in response to an access to a memory device, a memory controller managing the interface to the memory halts issuing of access requests to the memory device until a predetermined time period has elapsed. ... International Business Machine Corporation

12/25/14 / #20140380095

Memory uncorrectable error handling technique for reducing the impact of noise

Techniques for handling uncorrectable errors occurring during memory accesses reduce the likelihood of mis-correction of errors due to the presence of noise. When an uncorrectable memory error is detected in response to an access to a memory device, a memory controller managing the interface to the memory halts issuing of access requests to the memory device until a predetermined time period has elapsed. ... International Business Machine Corporation

12/25/14 / #20140380094

Avoiding restart on error in data integration

According to one embodiment of the present invention, a system avoids restart on an error in a data integration process. The system processes data received from a data source in accordance with a parallel processing pipeline and partitioning scheme and submits said processed data to a destination. ... International Business Machine Corporation

12/25/14 / #20140380087

Fault tolerance solution for stateful applications

A fault tolerance method and system for vms on a cluster identifies a client state for each client session for those applications. The method replicates the client session onto a primary and a backup vm, and uses a network controller and orchestrator to direct network traffic to the primary vm and to periodically replicate the state onto the backup vm. ... International Business Machine Corporation

12/25/14 / #20140380084

Detecting full-system idle state in adaptive-tick kernels

A technique for detecting full-system idle state in an adaptive-tick kernel includes detecting non-timekeeping cpu idle state, initiating a hysteresis period, waiting for the hysteresis period to end, manipulating a data structure whose state indicates whether a scheduling clock tick may be disabled on all cpus, and disabling the scheduling clock tick if the data structure is in an appropriate state. In a first embodiment, non-timekeeping cpus manipulate a global counter when entering an idle state, but add hysteresis to avoid thrashing the counter. ... International Business Machine Corporation

12/25/14 / #20140380051

Secure data access using sql query rewrites

A mechanism is provided for secure data access in a data processing system. A database having two tables is provided. ... International Business Machine Corporation

12/25/14 / #20140380044

Accessing local applications when roaming using a nfc mobile device

A method of accessing local applications when roaming on a nfc mobile device may include creating a first partition and a second partition on a secure element (se) of a subscriber identification module (sim) of a near field communication (nfc) enabled device. The home tsm separates the first partition and the second partition by public key encryption. ... International Business Machine Corporation

12/25/14 / #20140380035

Encrypting and decrypting a virtual disc

A computer-readable storage medium containing machine executable instructions that when executed by a processor cause the processor to encrypt a virtual disc; wherein the virtual disc comprises a virtual disc image; and wherein execution of the machine executable instructions cause the processor to: receive the virtual disc; increase the size of the virtual disc; write a decryption-master-boot-record and a decryption program to the virtual disc; encrypt at least a portion of the virtual disc image, wherein the decryption program comprises decryption-machine-executable-instructions for decrypting the at least partially encrypted virtual disc image in accordance with a cryptographic key.. . ... International Business Machine Corporation

12/25/14 / #20140380013

Execution of a perform frame management function instruction

Optimizations are provided for frame management operations, including a clear operation and/or a set storage key operation, requested by pageable guests. The operations are performed, absent host intervention, on frames not resident in host memory. ... International Business Machine Corporation

12/25/14 / #20140379997

Coherent attached processor proxy having hybrid directory

A coherent attached processor proxy (capp) includes transport logic having a first interface configured to support communication with a system fabric of a primary coherent system and a second interface configured to support communication with an attached processor (ap) that is external to the primary coherent system and that includes a cache memory that holds copies of memory blocks belonging to a coherent address space of the primary coherent system. The capp further includes one or more master machines that initiate memory access requests on the system fabric of the primary coherent system on behalf of the ap, one or more snoop machines that service requests snooped on the system fabric, and a capp directory having a precise directory having a plurality of entries each associated with a smaller data granule and a coarse directory having a plurality of entries each associated with a larger data granule.. ... International Business Machine Corporation

12/25/14 / #20140379992

Two handed insertion and deletion algorithm for circular buffer

Exemplary embodiments of the present invention disclose a method and system for selecting an eviction location of an item to evict and an insertion location for a new item in a circular buffer. In a step, an exemplary embodiment specifies an insertion location with an insertion pointer. ... International Business Machine Corporation

12/25/14 / #20140379989

Coherent attached processor proxy having hybrid directory

A coherent attached processor proxy (capp) includes transport logic having a first interface configured to support communication with a system fabric of a primary coherent system and a second interface configured to support communication with an attached processor (ap) that is external to the primary coherent system and that includes a cache memory that holds copies of memory blocks belonging to a coherent address space of the primary coherent system. The capp further includes one or more master machines that initiate memory access requests on the system fabric of the primary coherent system on behalf of the ap, one or more snoop machines that service requests snooped on the system fabric, and a capp directory having a precise directory having a plurality of entries each associated with a smaller data granule and a coarse directory having a plurality of entries each associated with a larger data granule.. ... International Business Machine Corporation

12/25/14 / #20140379985

Multi-level aggregation techniques for memory hierarchies

Embodiments include method, system, and computer program product for providing aggregation hierarchy that is related memory hierarchies. In one embodiment, the method includes determining capacity of a first level memory of a memory hierarchy for processing data relating to completion of an aggregation process and generating a per thread local look-up table in said first level memory upon determining said capacity. ... International Business Machine Corporation

12/25/14 / #20140379981

Application discovery using storage system signatures

Exemplary embodiments of the present invention disclose a method and system for identifying one or more applications stored on a storage system that is shared by one or more computer systems. In a step, an exemplary embodiment accesses the storage system. ... International Business Machine Corporation

12/25/14 / #20140379980

Selective duplication of tape cartridge contents

A copy-source tape storage medium is prepared and includes a index partition for storing updated file metadata and associated metadata indexes and a data partition (dp) for storing valid data and associated valid data indexes and for storing invalid data that has changed or has been deleted or has been invalidated by the update and for storing associated invalid data indexes. Metadata indexes are retrieved and analyzed and a valid record number list indicating a range of record numbers of valid data is created. ... International Business Machine Corporation

12/25/14 / #20140379979

Memory access alignment in a double data rate ('ddr') system

Memory access alignment in a double data rate (‘ddr’) system, including: executing, by a memory controller, one or more write operations to a predetermined address of a ddr memory module, including sending to the ddr memory module a predetermined amount of data of a predetermined pattern along with a data strobe signal; executing, by the memory controller, a plurality of read operations from the predetermined address of the ddr memory module, including capturing data transmitted from the ddr memory module; and determining, by the memory controller, a read adjust value and a write adjust value in dependence upon the data captured in response to the read operations.. . ... International Business Machine Corporation

12/25/14 / #20140379958

Firmware storage and maintenance

A mechanism is provided for improved firmware storage and maintenance. For each master device in a plurality of master devices: an amount of flash memory space required by the master device is identified and the amount of flash memory space from a flash component is allocated to the master device as a virtual flash memory allocation. ... International Business Machine Corporation

12/25/14 / #20140379957

Firmware storage and maintenance

A mechanism is provided for improved firmware storage and maintenance. For each master device in a plurality of master devices: an amount of flash memory space required by the master device is identified and the amount of flash memory space from a flash component is allocated to the master device as a virtual flash memory allocation. ... International Business Machine Corporation

12/25/14 / #20140379956

Managing a translation lookaside buffer

Method and apparatus for managing a translation lookaside buffer (tlb) at hardware in a virtualization enabled system. According to embodiments of the present invention, a series of operations caused by tlb miss would not need intervening from the hypervisor. ... International Business Machine Corporation

12/25/14 / #20140379953

Continuous in-memory accumulation of hardware performance counter data

In-memory accumulation of hardware counts in a computer system is carried out by continuously sending count values from full-speed hardware counter units to a memory controller. A sending unit periodically samples performance data from the hardware counter units, and transmits count values to a bus interface for an interconnection bus which communicates with the memory controller. ... International Business Machine Corporation

12/25/14 / #20140379948

Providing indirect data addressing in an input/output processing system where the indirect data address list is non-contiguous

A computer program product for processing input/output (i/o) data is provided for performing a method, which includes receiving a control word having an indirect data address including a starting location of a list of storage addresses, gathering the data and transmitting gathered data to a control unit in the i/o processing system. Gathering includes accessing an entry of the list, the entry located at an entry storage location and including an address. ... International Business Machine Corporation

12/25/14 / #20140379934

Managing a network connection for use by a plurality of application program processes

A method, system, and/or computer program product manages a network connection for use by a plurality of application program processes. A set of application program processes, which utilize a network connection, are categorized into a plurality of categories. ... International Business Machine Corporation

12/25/14 / #20140379919

Applying a platform code level update to an operational node

Provided are a computer program product, system, and method for applying a platform code level update to update a source partition in a computing system. Computational resources in the computing system are allocated to a destination partition. ... International Business Machine Corporation

12/25/14 / #20140379881

Network device configuration management

Method and system are provided for network device configuration management. The method includes: receiving a set of user commands for configuration of a network device; retrieving a syntactic model of a network device configuration interface for a network device type and generating a modelled configuration of a current configuration of the network device; predicting the effect of the user command on the modelled configuration to generate a predicted modelled configuration; and applying rules for a user and/or network device type to determine if the command is permitted based on the predicted modelled configuration of the network device. ... International Business Machine Corporation

12/25/14 / #20140379856

Management of outbound transactions to an enterprise information system

A system, method, and/or computer program product manages outbound transactions in a computing environment. At least one communication request is received during a pre-defined time period. ... International Business Machine Corporation

12/25/14 / #20140379849

Management of outbound transactions to an enterprise information system

A system, method, and/or computer program product manages outbound transactions in a computing environment. At least one communication request is received during a pre-defined time period. ... International Business Machine Corporation

12/25/14 / #20140379818

Aggregating message responses into topic-organized content

A computer processor receives a response to an electronic message, the response containing content elements. The computer processor determines one or more topics based on the content elements of the response to the electronic message. ... International Business Machine Corporation

12/25/14 / #20140379815

Aggregating message responses into topic-organized content

A computer processor receives a response to an electronic message, the response containing content elements. The computer processor determines one or more topics based on the content elements of the response to the electronic message. ... International Business Machine Corporation

12/25/14 / #20140379812

Methodology that uses culture information as a means to detect spam

A method, system and computer-usable medium are disclosed for using culture-related information for detecting spam. Cultural aspect data corresponding to a recipient or a sender of an electronic communication is processed to generate spam detection rules, which are in turn used to detect electronic communications that may be spam.. ... International Business Machine Corporation

12/25/14 / #20140379796

Managing past activities based on relationship changes in a social network

Various embodiments provide for dynamically and automatically managing activities of two parties (e.g., friends, business associates, family members) based on a change in relationship (e.g., no longer friends, break-up, divorce, no longer working together) between the two parties in a network (e.g., a social network implemented using a social networking website). In one specific example, mechanisms are provided for dynamically and automatically adjusting privacy control (e.g. ... International Business Machine Corporation

12/25/14 / #20140379766

Distributed high performance pool

For a distributed high performance pool, the distributed high performance pool is provided with a fast rank. A management module promotes an extent from a storage pool to the distributed high performance pool in response to the extent satisfying promotion criteria. ... International Business Machine Corporation

12/25/14 / #20140379764

Enterprise evidence repository

A controller is configured to generate and propagate instructions to an execution agent which, in turn, is configured to collect and deposit collected artifacts into a repository. Write access to a location in the repository for collected artifacts that are to be deposited into a specified location is granted to the execution agent. ... International Business Machine Corporation

12/25/14 / #20140379752

Method and system for filtering movements between virtual environments

In response to a teleport request, teleport destination characteristics are determined and compared against preferences, characteristics and restrictions of an avatar as indicated by metadata or tags to determine if the teleport destination is suitable for teleportation of that avatar. If the destination is found unsuitable, a search is conducted, preferably based on unmatched metadata of the avatar or the destination to suggest or directly substitute a suitable teleportation destination. ... International Business Machine Corporation

12/25/14 / #20140379748

Verifying compliance of a land parcel to an approved usage

A computer implemented method, system and a computer program product for verifying compliance of a land parcel to an approved usage includes monitoring one or more updatable sources of information to detect availability of new information with respect to the land parcel, processing the new information to determine location information and current usage of the land parcel, querying a database storing location information of land parcels having at least approved usage information to determine approved usage of the land parcel. Finally, the current and approved usages of the land parcel are compared to determine compliance of the current usage to the approved usage of the land parcel.. ... International Business Machine Corporation

12/25/14 / #20140379736

Identifying unknown parameter and name value pairs

A mechanism is provided for identifying parameter and name/value pair separators within two or more strings of data. The identifying is performed by selecting at least one name/value pair separator candidate from the two or more strings of data, and filtering the at least one name/value pair separator candidate using one or more rules, thereby removing any of the name/value pair separator candidates that do not conform to any of the one or more rules. ... International Business Machine Corporation

12/25/14 / #20140379734

Recommendation engine

Techniques of the disclosure may include a method comprising receiving a first request for a recommendation to configure input data for output, determining, based at least in part upon templates, an object class corresponding to the first request, determining, based at least in part on input data and the templates, one or more output objects and one or more scores, wherein the output objects comprise configurations of the input data for the determined object class, and where each of the output objects is associated with a score. The method may further comprise outputting a indication of the output objects having an associated score that exceeds a specified threshold value, responsive to receiving a second request to resolve a specified output object, determining, based at least in part on the one or more templates and the second request, a resolved output object and outputting an indication of the resolved output object.. ... International Business Machine Corporation

12/25/14 / #20140379728

Multifaceted search

A query is received that includes two or more facets of a multidimensional inverted index for a collection of documents. Each document is associated with at least one facet. ... International Business Machine Corporation

12/25/14 / #20140379716

Process-aware code migration

A mechanism is provided for process-aware code migration. A plurality of nodes and a plurality of edges are annotated within a call graph with information from execution data for executing the code and a topology of the data processing system to form an annotated call graph. ... International Business Machine Corporation

12/25/14 / #20140379711

Managing passthru connections on an operator graph

Embodiments of the disclosure provide a method, system, and computer program product for processing data such as a stream of tuples. Each tuple can contain one or more attributes. ... International Business Machine Corporation

12/25/14 / #20140379710

Pattern based video frame navigation aid

Systems and computer program products may perform unattended software installation. The systems and computer program products may include receiving a user's selection of one or more software installation files, and reading at least a portion of the one or more user-selected software installation files. ... International Business Machine Corporation

12/25/14 / #20140379681

Cross-channel social search

Search results are received that were generated by a search engine in response to a search query entered by a user. The search results include a first result which contains a first set of identifying data. ... International Business Machine Corporation

12/25/14 / #20140379679

Device and method for acquiring resource lock

A lock control device receives a lock acquisition request from an application and transmits a lock acquisition request to a dbms, receives a lock acquisition response from the dbms, and transmits a lock acquisition response to the application, and each time, acquires statistical time information including the lock request counter, subsequent lock request counter, lock request time, lock acquisition time, initial lock acquisition time, and subsequent lock request time. The statistical processing device calculates the lock request count for each resource, subsequent lock request count for each resource, average lock wait time, and average lock acquisition delay expectation time, based on the statistical time information. ... International Business Machine Corporation

12/25/14 / #20140379678

Highly scalable tree-based trylock

A tree-based trylock technique for reducing contention on a root trylock includes attempting to acquire a trylock at each node of a tree-based hierarchical node structure while following a traversal path that begins at a leaf node, passes through one or more of internal nodes, and ends at a root node having the root trylock. The trylock acquisition operation succeeds if each trylock on the traversal path is acquired, and fails if any trylock on the traversal path cannot be acquired. ... International Business Machine Corporation

12/25/14 / #20140379676

Highly scalable tree-based trylock

A tree-based trylock technique for reducing contention on a root trylock includes attempting to acquire a trylock at each node of a tree-based hierarchical node structure while following a traversal path that begins at a leaf node, passes through one or more of internal nodes, and ends at a root node having the root trylock. The trylock acquisition operation succeeds if each trylock on the traversal path is acquired, and fails if any trylock on the traversal path cannot be acquired. ... International Business Machine Corporation

12/25/14 / #20140379674

Providing multiple concurrent transactions on a single database schema using a single concurrent transaction database infrastructure

Executing multiple concurrent transactions on the single database schema using a single concurrent transaction database infrastructure, wherein the single database schema is a single concurrent transactional relational database.. . ... International Business Machine Corporation

12/25/14 / #20140379667

Data quality assessment

According to one embodiment of the present invention, a system assesses the quality of column data. The system assigns a pre-defined domain to one or more columns of the data based on a validity condition for the domain, applies the validity condition for the domain assigned to a column to data values in the column to compute a data quality metric for the column, and computes and displays a metric for a group of columns based on the computed data quality metric of at least one column in the group. ... International Business Machine Corporation

12/25/14 / #20140379666

Error correction in tables using discovered functional dependencies

Mechanisms are provided for performing tabular data correction in a document. Tabular data is received and analyzed to identify at least one portion of the tabular data having an erroneous/missing data value. ... International Business Machine Corporation

12/25/14 / #20140379663

Reducing reading of database logs by persisting long-running transaction data

According to one embodiment of the present invention, a system reduces re-reading of database logs by persisting long running transaction data. The system processes the database log records of the database transaction log; generates a snapshot of the database log records at periodic intervals, wherein each snapshot includes database log records for pending transactions; and in response to an interruption in processing of the database log records, utilizes a snapshot to restore database log records for the pending transactions and resume processing of the database transaction log from a position succeeding the database log records of the selected snapshot.. ... International Business Machine Corporation

12/25/14 / #20140379657

Document provenance scoring based on changes between document versions

A computer-implemented method, system and computer program product is provided for optimizing a document change or provenance scoring system by weighting sections of a document, scoring the changes for each section, and then combining the change scores for each section to generate an overall change score. An associated report may also be generated that catalogs all of the various scoring elements. ... International Business Machine Corporation

12/25/14 / #20140379632

Smarter big data processing using collaborative map reduce frameworks

Map reduce processing is performed holistically, to yield map reduce results data, on an aggregated group of data sets, which had been generated and maintained with “splits” separating the separate date sets, rather than being performed separately on the split data sets and then aggregating (or attempting to aggregate) the map reduce processing results.. . ... International Business Machine Corporation

12/25/14 / #20140379628

Privacy risk metrics in location based services

The present disclosure relates generally to mechanisms for the estimation of location privacy risk, comprising: building one or more trajectory models from auxiliary information (e.g., one or more maps, one or more routes); capturing common behavioral patterns (e.g., shortest route(s),/fastest route(s)); identifying, given unlinked trajectories for a plurality of users, most likely linkages using the trajectory model(s); eliminating one or more unlikely linkages based on deviation from the shortest route(s) and/or the fastest route(s); measuring privacy as the percentage of linkages correctly identified; and outputting the measured privacy.. . ... International Business Machine Corporation

12/25/14 / #20140379625

Spike tagging for debugging, querying, and causal analysis

Embodiments of the invention relate to spike tagging for a neural network. One embodiment comprises a neural network including multiple electronic neurons and a plurality of weighted synaptic connections interconnecting the neurons. ... International Business Machine Corporation

12/25/14 / #20140379557

Visual representation of accounts

A method for visual representation of actual accounts which includes displaying by a display a plurality of visual account representations which visually represent the actual accounts and are linked to the actual accounts, the plurality of visual account representations changing shape when a transaction is performed with respect to the plurality of visual account representations; responsive to transaction input with respect to one of the visual account representations, changing shape by the display of the one visual account representation in proportion to the size of the transaction input; and responsive to the transaction input with respect to the one of the visual account representations, changing shape by the display of a second visual account representation in proportion to the size of the transaction input. Also disclosed is a computer program product for visual representation of accounts.. ... International Business Machine Corporation

12/25/14 / #20140379484

Visually generated consumer product presentation

A personalization enhancement method and system. The method includes retrieving and analyzing digital content associated with a user. ... International Business Machine Corporation

12/25/14 / #20140379439

Aggregation of subsets of opinions from group collaborations

A method and system for aggregating opinions on questions from participants. The selection of a category is received from each participant for each question previously presented to each participant. ... International Business Machine Corporation

12/25/14 / #20140379431

Application of mobile devices for event data

Predicting a future behavior through extraction of data from a mobile device within a geo-coordinate boundary. A geo-coordinate boundary of a geographic locale is ascertained. ... International Business Machine Corporation

12/25/14 / #20140379430

Application of mobile devices for event data

Predicting a future behavior through extraction of data from a mobile device within a geo-coordinate boundary. A geo-coordinate boundary of a geographic locale is ascertained. ... International Business Machine Corporation

12/25/14 / #20140379409

Systems engineering solution analysis

A method and system for performing a technical solution analysis is provided. The method includes receiving requirements associated with an it system for design, assumptions, dependency data, stakeholder data, and entry criteria readiness data. ... International Business Machine Corporation

12/25/14 / #20140379405

Modifying service levels in online meeting system

Systems, methods and computer program products for modifying of service levels based on contextual data of meeting entries in electronic calendars. An example system includes an electronic calendar module executed by a central processing unit. ... International Business Machine Corporation

12/25/14 / #20140379404

Location triggered scheduling

Mechanisms for facilitating in-person meetings are provided. Such mechanisms may comprise: identifying a set of participants for a meeting according to one or more scheduling criterion; utilizing location information associated with the set of participants; and scheduling an in-person (face-to-face) meeting with at least two members of the set of participants.. ... International Business Machine Corporation

12/25/14 / #20140379403

Modifying service levels in online meeting system

Systems, methods and computer program products for modifying of service levels based on contextual data of meeting entries in electronic calendars. An example system includes an electronic calendar module executed by a central processing unit. ... International Business Machine Corporation

12/25/14 / #20140379331

Automatic semantic rating and abstraction of literature

Deep semantic analysis is performed on an electronic literary work in order to detect plot elements and optional other storyline elements such as characters within the work. Multiple levels of abstract are generated into a model representing the literary work, wherein each element in each abstraction level may be independently rated for preference by a user. ... International Business Machine Corporation

12/25/14 / #20140379330

Natural language question expansion and extraction

Methods, computer program products and systems for generating at least one factual question from a set of seed questions and answer pairs. One method includes: obtaining at least one seed question and answer pair from the set of seed question and answer pairs; extracting a set of features associated with the at least one seed question and answer pair using at least one common analysis system (cas) in a set of cass and a specific knowledge base; generating a set of candidate questions from the extracted set of features using a logistic regression algorithm and the specific knowledge base; and ranking each candidate question relative to a remainder of candidate questions in the set of candidate questions based on the extracted set of features and the at least one seed question and answer pair.. ... International Business Machine Corporation

12/25/14 / #20140379327

Apparatus and method for helping in the reading of an electronic message

An apparatus and method for determining whether the meaning of a word included in an electronic message needs to be presented to a user, according to a dynamic determination whether the user currently knows the meaning of the word. In a client, a communication control unit receives a message sent from a user a to a user b, a morphological analysis unit extracts a word from the message, and a history acquisition unit acquires history information on viewing, usage, or the like of the word by the user b. ... International Business Machine Corporation

12/25/14 / #20140379288

Characterization and validation of processor links

A processor link that couples a first processor and a second processor is selected for validation and a plurality of communication parameter settings associated with the first and the second processors is identified. The first and the second processors are successively configured with each of the communication parameter settings. ... International Business Machine Corporation

12/25/14 / #20140378108

Location-based conference call dial-in number retrieval and inclusion

A dial-in number is provided to a participant of a conference call. A computer identifies a participant of a conference call, and attempts to determine the location of the participant. ... International Business Machine Corporation

12/25/14 / #20140378097

Transferring information on a first mobile computing device to a peer mobile computing device

The program code identifies a problem with a first mobile computing device, wherein the problem is capable of preventing completion of an action attempted by a first end-user via the first mobile computing device. In response to identifying the problem, the program code determines the first end-user wants to complete the action on a first peer mobile computing device of a second end-user. ... International Business Machine Corporation

12/25/14 / #20140377929

Resistive memory with a stabilizer

A resistive memory device and a method for fabricating the resistive memory device. The memory device includes a first electrode and a resistive memory element in electrical contact. ... International Business Machine Corporation

12/25/14 / #20140377927

Self-aligned contact structure for replacement metal gate

A metallic top surface of a replacement gate structure is oxidized to convert a top portion of the replacement gate structure into a dielectric oxide. After removal of a planarization dielectric layer, selective epitaxy is performed to form a raised source region and a raised drain region that extends higher than the topmost surface of the replacement gate structure. ... International Business Machine Corporation

12/25/14 / #20140377925

Selective laser anneal on semiconductor material

A method of forming a semiconductor device including providing a substrate having a first region of a first semiconductor material and a second region of a second semiconductor material and forming a first gate structure in a first region of the semiconductor material and a second gate structure in a second region of the substrate. A first source region and a first drain region is implanted in the first region of the substrate. ... International Business Machine Corporation

12/25/14 / #20140377924

Strained finfet with an electrically isolated channel

A fin structure includes an optional doped well, a disposable single crystalline semiconductor material portion, and a top semiconductor portion formed on a substrate. A disposable gate structure straddling the fin structure is formed, and end portions of the fin structure are removed to form end cavities. ... International Business Machine Corporation

12/25/14 / #20140377923

Method to form finfet/trigate devices on bulk semiconductor wafers

A method for fabricating a finfet device having an insulating layer that insulates the fin from a substrate is described. The insulating layer can prevent leakage current that would otherwise flow through bulk semiconductor material in the substrate. ... International Business Machine Corporation

12/25/14 / #20140377918

Overlapped iii-v finfet with doped semiconductor extensions

A semiconductor structure that includes a semiconductor fin comprising an iii-v compound semiconductor material. A functional gate structure straddles a portion of the semiconductor fin. ... International Business Machine Corporation

12/25/14 / #20140377917

Semiconductor device including source/drain formed on bulk and gate channel formed on oxide layer

A semiconductor device having a doped well area includes a doped substrate layer formed on a substrate portion of the semiconductor device. The doped substrate layer extends along a first direction to define a length and a second direction perpendicular to the first direction to define a width. ... International Business Machine Corporation

12/25/14 / #20140377900

Manufacturable sub-3 nanometer palladium gap devices for fixed electrode tunneling recognition

A technique is provided for manufacturing a nanogap in a nanodevice. An oxide is disposed on a wafer. ... International Business Machine Corporation

12/25/14 / #20140377735

Caching natural language questions and results in a question and answer system

Mechanisms are provided for answering an input question. An input question to be answered from a source is received and processed to one or more extract features of the input question. ... International Business Machine Corporation

12/25/14 / #20140377572

Injection of a filler material with homogeneous distribution of anisotropic filler particles through implosion

A method for providing a matrix material between a bonded pair of substrates with a homogeneous distribution of anisotropic filler particles is provided. Functionalized anisotropic filler particles are mixed uniformly with a matrix material to form a homogenous mixture. ... International Business Machine Corporation

12/25/14 / #20140377571

Injection of a filler material with homogeneous distribution of anisotropic filler particles through implosion

A method for providing a matrix material between a bonded pair of substrates with a homogeneous distribution of anisotropic filler particles is provided. Functionalized anisotropic filler particles are mixed uniformly with a matrix material to form a homogenous mixture. ... International Business Machine Corporation

12/25/14 / #20140376775

Estimation of object properties in 3d world

Objects within two-dimensional video data are modeled by three-dimensional models as a function of object type and motion through manually calibrating a two-dimensional image to the three spatial dimensions of a three-dimensional modeling cube. Calibrated three-dimensional locations of an object in motion in the two-dimensional image field of view of a video data input are determined and used to determine a heading direction of the object as a function of the camera calibration and determined movement between the determined three-dimensional locations. ... International Business Machine Corporation

12/25/14 / #20140376722

Accessing local applications when roaming using a nfc mobile device

A method of accessing local applications when roaming on a nfc mobile device may include creating a first partition and a second partition on a secure element (se) of a subscriber identification module (sim) of a near field communication (nfc) enabled device. The home tsm separates the first partition and the second partition by public key encryption. ... International Business Machine Corporation

12/25/14 / #20140376603

Testing a decision feedback equalizer ('dfe')

Testing a decision feedback equalizer (‘dfe’), the dfe including a summing amplifier operatively coupled to a plurality of latches and an input signal line for receiving a data signal, including: preventing a differential data signal from being received by the summing amplifier; and iteratively for each tap to be tested: setting a tap coefficient for each tap to zero; setting an output of the plurality of latches to a predetermined value; setting a tap coefficient for the tap to be tested to a full scale value; and determining whether a resultant output signal from the dfe matches a predetermined expected output signal.. . ... International Business Machine Corporation

12/25/14 / #20140376595

Thermoresistance sensor structure for integrated circuits and method of making

A first pair of resistors formed in a first layer of material, and a second pair of resistors formed in the first layer or in a second layer can be wired into a wheatstone bridge to form a temperature sensor. Either layer can include a semiconductor or a dielectric. ... International Business Machine Corporation

12/25/14 / #20140376556

Selectively refreshing address registration information

Facilitating communications within a processing environment. Inbound traffic and outbound traffic on one or more virtual interfaces of the processing environment are monitored for a predefined amount of time. ... International Business Machine Corporation

12/25/14 / #20140376385

Mitigating network connection problems using supporting devices

An approach for mitigating network connection problems when a first computing device is unable to connect to a remote resource is described. A second computing device receives a request for diagnostic testing over a second network from the first computing device. ... International Business Machine Corporation

12/25/14 / #20140376149

Phase change material variable capacitor

A method of manufacturing a variable capacitor includes forming a capacitor conductor. The method also includes forming a phase change material adjacent the capacitor conductor. ... International Business Machine Corporation

12/25/14 / #20140376123

Products with tape formats having one or more spare areas and apparatuses configured for use with such products

An apparatus includes a magnetic head having an array of transducers. The apparatus is configured to read and/or write to a magnetic recording tape according to a format. ... International Business Machine Corporation

12/25/14 / #20140375842

Generating an image of a seal impression

A method and apparatus for generating an image of a seal impression. N still images of a face of a seal are combined. ... International Business Machine Corporation

12/25/14 / #20140375682

Interactive control over augmented reality content

In a method for performing a computer action to manage a visual display on an augmented reality computing device, parameters are received representing a user command entered on at least one tactile sensor of an augmented reality computing device. One or more processors determine a computer action represented by the user command. ... International Business Machine Corporation

12/25/14 / #20140375550

Generating an operating procedure manual

A device generates an operating procedure manual for software including a captured image of a screen displayed by the software. An image acquiring hardware unit acquires a plurality of captured images of a plurality of screens displayed by software in response to a plurality of operations with respect to the software. ... International Business Machine Corporation

12/25/14 / #20140375483

High throughput decoding of variable length data symbols

A method of decoding data includes: receiving an encoded data stream transmitted as a plurality of variable length symbols; dividing the data stream into a sequence of blocks, each block having a sequence of adjacent bit positions starting a first bit position and ending with a last bit position; pre-processing each block prior to fully decoding each block, wherein pre-processing includes, for each block, selecting a bit position in a current block and determining a starting position of a first symbol in an adjacent block based on the selected bit position, wherein determining is initially performed for the last bit position in the current block, and is repeated sequentially for each preceding bit position through and including the first bit position; and fully decoding each block by decoding a first block starting at the first bit position and decoding each adjacent block starting at the starting position.. . ... International Business Machine Corporation

12/25/14 / #20140375482

High throughput decoding of variable length data symbols

A method of decoding data includes: receiving an encoded data stream transmitted as a plurality of variable length symbols; dividing the data stream into a sequence of blocks, each block having a sequence of adjacent bit positions starting a first bit position and ending with a last bit position; pre-processing each block prior to fully decoding each block, wherein pre-processing includes, for each block, selecting a bit position in a current block and determining a starting position of a first symbol in an adjacent block based on the selected bit position, wherein determining is initially performed for the last bit position in the current block, and is repeated sequentially for each preceding bit position through and including the first bit position; and fully decoding each block by decoding a first block starting at the first bit position and decoding each adjacent block starting at the starting position.. . ... International Business Machine Corporation

12/25/14 / #20140375380

Optimizing operating range of an electronic circuit

According to a method herein, a portion of an electronic circuit is identified. The electronic circuit comprises logic circuitry. ... International Business Machine Corporation

12/25/14 / #20140374903

Metal to metal bonding for stacked (3d) integrated circuits

The present invention provides a stabilized fine textured metal microstructure that constitutes a durable activated surface usable for bonding a 3d stacked chip. A fine-grain layer that resists self anneal enables metal to metal bonding at moderate time and temperature and wider process flexibility.. ... International Business Machine Corporation

12/25/14 / #20140374878

Memory cell with integrated iii-v device

A method including forming an oxide layer on a top of a substrate; forming a deep trench capacitor in the substrate; bonding a iii-v compound semiconductor to a top surface of the oxide layer; and forming a iii-v device in the iii-v compound semiconductor.. . ... International Business Machine Corporation

12/25/14 / #20140374874

Programmable fuse structure and methods of forming

Methods of forming an electrically programmable fuse (e-fuse) structure and the e-fuse structure are disclosed. One embodiment of an e-fuse structure includes: a silicon structure; a pair of silicide contact regions overlying the silicon structure; and a silicide link overlying the silicon structure and connecting the pair of silicide regions, the silicide link having a depth less than a depth of each of the pair of silicide contact regions.. ... International Business Machine Corporation

12/25/14 / #20140374844

Method for forming metal semiconductor alloys in contact holes and trenches

A semiconductor device is provided that includes a gate structure on a channel region of a substrate. A source region and a drain region are present on opposing sides of the channel region. ... International Business Machine Corporation

12/25/14 / #20140374839

Semiconductor device including source/drain formed on bulk and gate channel formed on oxide layer

A semiconductor device having a doped well area includes a doped substrate layer formed on a substrate portion of the semiconductor device. The doped substrate layer extends along a first direction to define a length and a second direction perpendicular to the first direction to define a width. ... International Business Machine Corporation

12/25/14 / #20140374802

Bipolar transistor with maskless self-aligned emitter

Embodiments of the present invention include a method for forming a semiconductor emitter and the resulting structure. The invention comprises forming an epitaxial base layer on a semiconductor substrate. ... International Business Machine Corporation

12/25/14 / #20140374800

Overlapped iii-v finfet with doped semiconductor extensions

A semiconductor structure that includes a semiconductor fin comprising an iii-v compound semiconductor material. A functional gate structure straddles a portion of the semiconductor fin. ... International Business Machine Corporation

12/25/14 / #20140374796

Semiconductor structure with aspect ratio trapping capabilities

A semiconductor structure includes a first semiconductor region. The first semiconductor region includes a first semiconductor layer composed of a group iv semiconductor material having a top surface and a back surface. ... International Business Machine Corporation

12/25/14 / #20140374702

Carbon nanostructure device fabrication utilizing protect layers

Hall effect devices and field effect transistors are formed incorporating a carbon-based nanostructure layer such as carbon nanotubes and/or graphene with a sacrificial metal layer formed there over to protect the carbon-based nanostructure layer during processing.. . ... International Business Machine Corporation

12/25/14 / #20140374695

Nanogap device with capped nanowire structures

An anti-retraction capping material is formed on a surface of a nanowire that is located upon a dielectric membrane. A gap is then formed into the anti-retraction capping material and nanowire forming first and second capped nanowire structures of a nanodevice. ... International Business Machine Corporation

12/25/14 / #20140374694

Manufacturable sub-3 nanometer palladium gap devices for fixed electrode tunneling recognition

A technique is provided for manufacturing a nanogap in a nanodevice. An oxide is disposed on a wafer. ... International Business Machine Corporation

12/25/14 / #20140374687

Resistive memory with a stabilizer

A resistive memory device and a method for fabricating the resistive memory device. The memory device includes a first electrode and a resistive memory element in electrical contact. ... International Business Machine Corporation

12/18/14 / #20140373177

Providing access control for public and private document fields

A computer determines, based on a degree of authorization of a user, that a user has authorization to view a type of field. Based on the degree of authorization of the user, the computer generates a modified list of search terms by adding additional search terms to a list of search terms. ... International Business Machine Corporation

12/18/14 / #20140373176

Providing access control for public and private document fields

A computer determines, based on a degree of authorization of a user, that a user has authorization to view a type of field. Based on the degree of authorization of the user, the computer generates a modified list of search terms by adding additional search terms to a list of search terms. ... International Business Machine Corporation

12/18/14 / #20140373159

After-the-fact configuration of static analysis tools able to reduce user burden

A method includes mapping, based on a first mapping from possible security findings to possible configuration-related sources of imprecision, actual security findings from a static analysis of a program to corresponding configuration-related sources of imprecision, the mapping of the actual security findings creating a second mapping. A user is requested to configure selected ones of the configuration-related sources of imprecision from the second mapping. ... International Business Machine Corporation

12/18/14 / #20140373158

Detecting security vulnerabilities on computing devices

Identifying security vulnerabilities on computing devices by gathering information about a first software application with which a computing device is configured, selecting, using any of the information, an attack specification from a set of predefined attack specifications, attacking the first software application on the computing device with an attack that is in accordance with the selected attack specification, identifying a post-attack condition associated with the first software application, determining whether the post-attack condition is consistent with a predefined security vulnerability, and performing a predefined action associated with the predefined security vulnerability responsive to determining that the post-attack condition is consistent with the predefined security vulnerability, where the gathering, selecting, attacking, identifying, determining, and performing are performed by a second software application during execution of the second software application on the computing device.. . ... International Business Machine Corporation

12/18/14 / #20140373157

After-the-fact configuration of static analysis tools able to reduce user burden

A method includes mapping, based on a first mapping from possible security findings to possible configuration-related sources of imprecision, actual security findings from a static analysis of a program to corresponding configuration-related sources of imprecision, the mapping of the actual security findings creating a second mapping. A user is requested to configure selected ones of the configuration-related sources of imprecision from the second mapping. ... International Business Machine Corporation

12/18/14 / #20140373119

Providing time ratio-based password/challenge authentication

Providing registration for password/challenge authentication includes receiving an access code or pattern inputted by a user, recording a time message associated with each component of the access code or pattern via a processor, generating a data record in combining each component of the access code or pattern with the associated time message, and storing the data record.. . ... International Business Machine Corporation

12/18/14 / #20140373089

Approval of content updates

A method, computer program product, and system is described. An indication of a problem regarding a content item is received, the content item being subject to a workflow including an approval protocol. ... International Business Machine Corporation

12/18/14 / #20140373031

Method, device and computer program for visualizing risk assessment values in event sequences

The present invention provides a method, system and computer program in which risk assessment values are calculated and displayed for event sequences, in which the event sequences consist of events of a finite number m of types and in which some of the event group is a partially ordered set in a time series. An m-dimensional sparsely ordered matrix is generated on the basis of an event sequence, interpolation is performed between the elements of the generated sparsely ordered matrix, and a densely ordered matrix is calculated. ... International Business Machine Corporation

12/18/14 / #20140373029

Recording activity of software threads in a concurrent software environment

The present disclosure provides a method for identifying idleness in a processor via a concurrent software environment. A thread state indicator records an indication of a synchronization state of a software thread that is associated with an identification of the software thread. ... International Business Machine Corporation

12/18/14 / #20140373019

Generating differences for tuple attributes

A sequence of tuples, each having one or more attributes, is received at one of one or more processing elements operating on one or more processors. Each processing element may have one or more stream operators. ... International Business Machine Corporation

12/18/14 / #20140373018

Dynamically adjusting a log level of a transaction

A method dynamically adjusts a log level of a transaction. The method includes: buffering the most detailed logs of a transaction having highest log level into a memory; checking if all dependency-defined transactions within a dependency list/tree for the transaction are completed; and, in response to the completion of all dependency-defined transactions within the dependency list/tree for the transaction, obtaining a log filter level for the transaction in association with the transaction results (success/failure) of dependency-defined transactions, wherein the log filter level is a new log level for the transaction.. ... International Business Machine Corporation

12/18/14 / #20140373013

Synchronizing multicast groups

Embodiments of the invention relate to synchronizing multicast groups of a virtual machine during migration of the virtual machine. A first list and a second list, indicating multicast groups corresponding to the first port and second port respectively, are obtained in response to detection of migration of the virtual machine from a first port to a second port of a same switch. ... International Business Machine Corporation

12/18/14 / #20140373011

Generating a deployment pattern for reuse in a networked computing environment

An approach for generating a deployment pattern for reuse after the deployment of a set of virtual machines and related application artifacts in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, information associated with one or more previously provisioned application environments is derived and, after analyzing the information, a deployment pattern is created in the form of tangible artifacts which may be reuse for further deployments without the need to trace back the original procedures used to deploy the previously previsioned application environment.. ... International Business Machine Corporation

12/18/14 / #20140373010

Intelligent resource management for virtual machines

Embodiments of the present invention disclose a method, computer program product, and system for resource management for virtual machines. A computer receives information associated with one or more virtual machines, wherein the received information includes utilization information and workload information associated with each virtual machine of the one or more virtual machines. ... International Business Machine Corporation

12/18/14 / #20140373007

Provisioning a secure customer domain in a virtualized multi-tenant environment

To provision a secure customer domain in a virtualized multi-tenant environment, a virtual machine (vm) is configured for a customer in the customer domain. A first, second, and third virtual network interfaces (vnics) are configured in the vm. ... International Business Machine Corporation

12/18/14 / #20140372996

Compiler optimization for memoization of pure function arguments

Exemplary embodiments of the present invention disclose a method and system for replacing an unevaluated input that is constant at runtime to a group of instructions that calculates an output and can not modify the unevaluated input with invocation code that calls evaluation code. In a step, an exemplary embodiment identifies a group of instructions with an unevaluated input that is constant at runtime that calculates an output and can not modify the unevaluated input. ... International Business Machine Corporation

12/18/14 / #20140372982

Standardization of variable names in an integrated development environment

A method for providing for standardization of variable names in an integrated development environment is provided. The method includes scanning a project source code for variable names, where the project source code is managed by a development team in an integrated development environment. ... International Business Machine Corporation

12/18/14 / #20140372977

Modifying a middleware

A method for modifying a middleware shared by multiple tenants by preparing a data packet comprising modification information and tenant information, the modification information comprising information of a specific class to be modified in the middleware as well as modification content for the specific class, the tenant information indicating a specific tenant of the plurality of tenants to which the modification content is directed; and in response to acquisition of the data packet: modifying the specific class in the middleware in runtime according to the modification information to create a modified specific class; and applying the modified content only to the specific tenant. When multiple tenants share a same middleware, different versions of the middleware may be provided for respective tenants, without affecting the use by other tenants, thereby satisfying sharing and customization requirements of each of the multiple tenants.. ... International Business Machine Corporation

12/18/14 / #20140372970

Method to auto generate jax-rs rest service implementation classes from existing interfaces

A method, computer program product, and system for auto generating a java application programming interface (jax-rs) for representational state transfer (rest) web services. A reference interface for a rest service object is received by a server computer system. ... International Business Machine Corporation

12/18/14 / #20140372969

Computer aided visualization of a business object model lifecycle

A method, system and apparatus for visualization of versions of a bom. In accordance with an embodiment of the invention, at least two different versions of a bom can be loaded into a versioning data processing system of a modeling tool executing in memory of a computer. ... International Business Machine Corporation

12/18/14 / #20140372964

Dynamic java bean for visualage for java

A uniform strategy for the general problem of providing custom editors and initialization strings for beans (all “dynabeans” inherit from a common bean class that incorporates this strategy. This is then extended to allow the initialization strings to be stored in a relational database. ... International Business Machine Corporation

12/18/14 / #20140372960

Machine-learning based datapath extraction

A datapath extraction tool uses machine-learning models to selectively classify clusters of cells in an integrated circuit design as either datapath logic or non-datapath logic based on cluster features. A support vector machine and a neural network can be used to build compact and run-time efficient models. ... International Business Machine Corporation

12/18/14 / #20140372869

Partial data report generation with data costing notification

Embodiments of the present invention provide a method, system and computer program product for partial data report generation with data costing notification. In an embodiment of the invention, a method for partial data report generation with data costing notification is provided. ... International Business Machine Corporation

12/18/14 / #20140372848

Optimizing automated interactions with web applications

Optimizing automated interactions with web pages by identifying, for each of multiple web pages, path information including an incoming hyperlink path having at least one hyperlink, where the incoming hyperlink path leads to the web page, and/or an outgoing hyperlink path having at least one hyperlink, where the outgoing hyperlink path emanates from the web page, determining whether the path information of each of the web pages meets a similarity condition, excluding from an interaction set of the web pages any of the web pages whose path information meets the similarity condition, and causing an automated interaction to be performed with any of the web pages in the interaction set.. . ... International Business Machine Corporation

12/18/14 / #20140372847

Optimizing automated interactions with web applications

Optimizing automated interactions with web pages by identifying, for each of multiple web pages, path information including an incoming hyperlink path having at least one hyperlink, where the incoming hyperlink path leads to the web page, and/or an outgoing hyperlink path having at least one hyperlink, where the outgoing hyperlink path emanates from the web page, determining whether the path information of each of the web pages meets a similarity condition, excluding from an interaction set of the web pages any of the web pages whose path information meets the similarity condition, and causing an automated interaction to be performed with any of the web pages in the interaction set.. . ... International Business Machine Corporation

12/18/14 / #20140372846

Reader-configurable augmentation of document content

Document content is parsed using a reader-defined content creation profile. The document content includes information and information layout specified by an author of the document content. ... International Business Machine Corporation

12/18/14 / #20140372845

Partial data report generation with data costing notification

Embodiments of the present invention provide a method, system and computer program product for partial data report generation with data costing notification. In an embodiment of the invention, a method for partial data report generation with data costing notification is provided. ... International Business Machine Corporation

12/18/14 / #20140372827

Pulsed-latch based razor with 1-cycle error recovery scheme

Systems and methods for error recovery include determining an error in at least one stage of a plurality of stages during a first cycle on a hardware circuit, each of the plurality of stages having a main latch and a shadow latch. A first signal is transmitted to an output stage of the at least one stage to stall the main latch and the shadow latch of the output stage during a second cycle. ... International Business Machine Corporation

12/18/14 / #20140372808

Second failure data capture in co-operating multi-image systems

A method captures diagnostic trace information in a computer system having a plurality of software images. Information is received that is associated with a first failure in a first one of the plurality of software images. ... International Business Machine Corporation

12/18/14 / #20140372801

Implementing shared adapter configuration updates concurrent with maintenance actions in a virtualized system

A method, system and computer program product are provided for implementing shared adapter configuration updates concurrent with maintenance actions for a single root input/output virtualization (sriov) adapter in a computer system. A configuration of the adapter is decoupled from the state of the adapter during a recovery period. ... International Business Machine Corporation

12/18/14 / #20140372800

Message reconciliation during disaster recovery

A mechanism is provided for message reconciliation during disaster recovery in an asynchronous replication system. A message is intercepted at a gateway remote from a primary data centre to which the message is being sent. ... International Business Machine Corporation

12/18/14 / #20140372797

Pulsed-latch based razor with 1-cycle error recovery scheme

Systems and methods for error recovery include determining an error in at least one stage of a plurality of stages during a first cycle on a hardware circuit, each of the plurality of stages having a main latch and a shadow latch. A first signal is transmitted to an output stage of the at least one stage to stall the main latch and the shadow latch of the output stage during a second cycle. ... International Business Machine Corporation

12/18/14 / #20140372795

Implementing distributed debug data collection and analysis for a shared adapter in a virtualized system

A method, system and computer program product are provided for implementing distributed debug data collection and analysis for a hardware i/o adapter, such as, a single root input/output virtualization (sriov) adapter in a virtualized system. A predetermined event triggers a base error collection sequence. ... International Business Machine Corporation

12/18/14 / #20140372794

Implementing concurrent device driver maintenance and recovery for an sriov adapter in a virtualized system

A method, system and computer program product are provided for implementing concurrent adapter driver maintenance and recovery for a single root input/output virtualization (sriov) adapter in a computer system. An adapter driver at start up time performs configuration of the adapter and each of a set of virtual functions (vfs). ... International Business Machine Corporation

12/18/14 / #20140372789

Implementing enhanced error handling of a shared adapter in a virtualized system

A method, system and computer program product are provided for implementing enhanced error handling for a hardware i/o adapter, such as a single root input/output virtualization (sriov) adapter, in a virtualized system. The hardware i/o adapter is partitioned into multiple endpoints, with each partitionable endpoint (pe) corresponding to a function, and there is an adapter pe associated with the entire adapter. ... International Business Machine Corporation

12/18/14 / #20140372767

Pooling entropy to facilitate mobile device-based true random number generation

A mobile device operating system pools any available entropy. The resulting entropy pool is stored in device memory. ... International Business Machine Corporation

12/18/14 / #20140372748

Topic protection policy for publish-subscribe messaging system

Exemplary embodiments of the present invention disclose a method and system for securing a message published to a topic by a publisher in a publish-subscriber messaging system with a topic policy for the topic. In a step, an exemplary embodiment establishes a topic policy for a topic. ... International Business Machine Corporation

12/18/14 / #20140372747

System and method for managing tls connections among separate applications within a network of computing systems

An approach for reutilizing transport layer security (tls) connections among separate application is provided. In one aspect, a computing system establishes a a transmission control program/internet protocol (tcp/ip) connection between a first application of a first endpoint and a second application on a second endpoint. ... International Business Machine Corporation

12/18/14 / #20140372746

Port throttling across an operating system restart during a hot upgrade

A method includes tagging, by a processor executing a first operating system kernel, a region of a memory used by a first storage area network (san) adapter driver coupled to a san adapter, and decoupling the first san adapter driver from the san adapter. A boot of a second operating system kernel is then initiated while preserving in the tagged region of the memory contents stored therein. ... International Business Machine Corporation

12/18/14 / #20140372739

Implementing concurrent adapter firmware update for an sriov adapter in a virtualized system

A method, system and computer program product are provided for implementing concurrent adapter firmware update of a single root input/output virtualization (sriov) adapter in a virtualized system. An adapter driver is used to update adapter firmware concurrent with normal i/o operations. ... International Business Machine Corporation

12/18/14 / #20140372725

Allocation of distributed data structures

Allocating distributed data structures and managing allocation of a symmetric heap can include defining, using a processor, the symmetric heap. The symmetric heap includes a symmetric partition for each process of a partitioned global address space (pgas) system. ... International Business Machine Corporation

12/18/14 / #20140372724

Allocation of distributed data structures

Allocating distributed data structures and managing allocation of a symmetric heap can include defining, using a processor, the symmetric heap. The symmetric heap includes a symmetric partition for each process of a partitioned global address space (pgas) system. ... International Business Machine Corporation

12/18/14 / #20140372723

Dynamically optimizing memory allocation across virtual machines

A method for allocating memory among a plurality of computing systems includes assigning a free memory threshold to each computing system, dynamically varying at least one free memory threshold for at least one computing system based on a past memory usage of the at least one computing system, periodically monitoring each computing system for memory usage and in response to the monitoring determining that an amount of free memory for the computer system is below the free memory threshold for the computing system, allocating memory from the free memory pool to the computing system.. . ... International Business Machine Corporation

12/18/14 / #20140372718

Data integrity protection in storage volumes

A plurality of logical volumes are stored at a plurality of sites. A command to execute an operation on a logical volume is received. ... International Business Machine Corporation

12/18/14 / #20140372716

Parallel mapping of client partition memory to multiple physical adapters

Techniques are disclosed for performing input/output (i/o) requests to two or more physical adapters in parallel. One method for performing an input/output (i/o) request includes mapping an address for at least a first page associated with a virtual i/o request to an entry in a virtual tce table and identifying a plurality of physical adapters required to service the virtual i/o request. ... International Business Machine Corporation

12/18/14 / #20140372712

Concurrent dumping of large address space

A method for managing concurrent system dumps of address spaces of memory of a computing system. The method comprises analyzing address space of memory to determine high priority areas and low priority areas of the address space. ... International Business Machine Corporation

12/18/14 / #20140372708

Scheduler training for multi-module byte caching

Embodiments of the present invention provide a method, system and computer program product for dynamic caching module selection for optimized data deduplication. In an embodiment of the invention, a method for dynamic caching module selection for optimized data deduplication is provided. ... International Business Machine Corporation

12/18/14 / #20140372705

Least-recently-used (lru) to first-dirty-member distance-maintaining cache cleaning scheduler

A technique for scheduling cache cleaning operations maintains a clean distance between a set of least-recently-used (lru) clean lines and the lru dirty (modified) line for each congruence class in the cache. The technique is generally employed at a victim cache at the highest-order level of the cache memory hierarchy, so that write-backs to system memory are scheduled to avoid having to generate a write-back in response to a cache miss in the next lower-order level of the cache memory hierarchy. ... International Business Machine Corporation

12/18/14 / #20140372704

Least-recently-used (lru) to first-dirty-member distance-maintaining cache cleaning scheduler

A technique for scheduling cache cleaning operations maintains a clean distance between a set of least-recently-used (lru) clean lines and the lru dirty (modified) line for each congruence class in the cache. The technique is generally employed at a victim cache at the highest-order level of the cache memory hierarchy, so that write-backs to system memory are scheduled to avoid having to generate a write-back in response to a cache miss in the next lower-order level of the cache memory hierarchy. ... International Business Machine Corporation

12/18/14 / #20140372684

Enabling throttling on average write throughput for solid state storage devices

A mechanism is provided for enabling throttling on average write throughput instead of peak write throughput for solid-state storage devices. The mechanism assures an average write throughput within a range but allows excursions of high throughput with periods of low throughput offsetting against those of heavy usage. ... International Business Machine Corporation

12/18/14 / #20140372650

System and method for generating intentional interruptions during gatherings

Systems and methods for generating interruptions are provided. A method for generating interruptions, comprises generating a message for one or more recipients, detecting that a computing device is being used for a presentation, concluding, using a processor, that the one or more recipients are in an audience for the presentation, and after concluding that the one or more recipients are in the audience, interrupting the presentation with the message.. ... International Business Machine Corporation

12/18/14 / #20140372640

Processing input/output requests using proxy and owner storage systems

A first storage system is configured as a proxy for a logical volume stored on a second storage system. The first computer system receives an i/o request from a host computer for the logical volume, the host computer, and identifies a port on the second storage system for the i/o request. ... International Business Machine Corporation

12/18/14 / #20140372639

Online migration of a logical volume between storage systems

Methods, apparatus and computer program products implement embodiments of the present invention that include configuring, by a source storage system, a logical volume to comprise source regions of the source storage system that have a mapping between a host computer and the source storage system, the source regions storing source data. The source data is copied from the source regions to target data in target regions of a target storage system, the target regions being in a one-to-one correspondence with the source regions, and the volume is reconfigured so that the target regions have the mapping between the host computer and the source storage system. ... International Business Machine Corporation

12/18/14 / #20140372638

Implementing capacity and user-based resource allocation for a shared adapter in a virtualized system

A method, system and computer program product are provided for implementing capacity and user-based resource allocation for a hardware i/o adapter, such as, a single root input/output virtualization (sriov) adapter in a virtualized system. Configuring a virtual function (vf) is provided by supplying a capacity value of a port. ... International Business Machine Corporation

12/18/14 / #20140372636

Safely mapping and unmapping host scsi volumes

Methods, apparatus and computer program products implement embodiments of the present invention that include detecting, by a storage system, a change in a mapping of a logical volume to one or more host ports of a host computer communicating with the storage system via a storage area network (san). Subsequent to detecting the change, first and second input/output (i/o) requests for the logical volume are received from a given host port, and a first unit attention message is conveyed to the given host port in response to the first i/o request. ... International Business Machine Corporation

12/18/14 / #20140372635

Unit attention processing in proxy and owner storage systems

Methods, apparatus and computer program products implement embodiments of the present invention that include a storage device configured to store a logical volume mapped between a host computer and a computer having multiple initiator ports, and a processor configured to detect a unit attention condition for the logical volume. Examples of unit attention conditions for the logical volume include management operations on the logical volume and host requests for the logical volume. ... International Business Machine Corporation

12/18/14 / #20140372634

Indicating and detecting correct cable connections

A method for indicating and detecting correct cable connections within a computer network environment. The method includes determining a topology layout for one or more cables that are connected to one or more system units within a computer network environment. ... International Business Machine Corporation

12/18/14 / #20140372632

Impersonating scsi ports through an intermediate proxy

Methods, apparatus and computer program products implement embodiments of the present invention that include ascertaining, by a first storage system, a respective port identifier for each of one or more host ports defined to the first storage system for a logical volume stored on a second storage system. Examples of the port identifiers include wwpn and iscsi iqn identifiers. ... International Business Machine Corporation

12/18/14 / #20140372631

Adaptive cable interface

A computer implemented method, a computer program product, and a computer negotiate pin assignment for a cabling interface. A cabling interface discovers an attached device through an interrogation from a connected port. ... International Business Machine Corporation

12/18/14 / #20140372630

Service oriented architecture service dependency determination

Service dependency is determined for services in a service oriented architecture (soa) environment. The steps in determining service dependency include: recording a first triple describing a first service call where the first service calls the second service, and determining the first service is dependent upon the second service based, at least in part, upon the first triple. ... International Business Machine Corporation

12/18/14 / #20140372615

Workload and defect management systems and methods

Disclosed herein are methods and systems for workload and defect management. According to an aspect, a method includes communicating, to a first computing device, an identifier associated with a second computing device. ... International Business Machine Corporation

12/18/14 / #20140372609

Dynamically expanding computing resources in a networked computing environment

Embodiments of the present invention provide an approach for dynamically expanding cloud capacity (e.g., computing resources), based on infrastructure needs. In a typical embodiment, an available capacity of a set (e.g., at least one) of computing resources in the networked computing environment will be determined. ... International Business Machine Corporation

12/18/14 / #20140372606

It system infrastructure prediction based on epidemiologic algorithm

A computer-implemented method for prediction of required number of server computing systems for future computing workload is provided. The computer implemented method comprises connecting a portion of a plurality of server computing systems of a data center. ... International Business Machine Corporation

12/18/14 / #20140372600

Storage disk file subsystem and defect management systems and methods

In accordance with one or more embodiments of the present invention, methods and systems disclosed herein provide for storage disk file and defect management. According to an aspect, a method includes communicating, to a first computing device, an identifier associated with a storage device. ... International Business Machine Corporation

12/18/14 / #20140372598

Optimizing resource usage in systems which include heterogeneous devices, including sensors and smartphones

Managing devices in a system may comprise receiving information associated with a first device in the system and a first set of capabilities provided in the first device; receiving information associated with a second device in the system and a second set of capabilities provided in the second device; determining one or more required capabilities that need to be activated for the system, the system comprising at least the first device and the second device; for each of the one or more required capabilities, selecting automatically by a processor based on the information received and one or more criteria, which capability in the first device and the second device to activate to satisfy the one or more required capabilities; and activating said selected capability in the first device or the second device.. . ... International Business Machine Corporation

12/18/14 / #20140372597

Optimizing resource usage in systems which include heterogeneous devices, including sensors and smartphones

Managing devices in a system may comprise receiving information associated with a first device in the system and a first set of capabilities provided in the first device; receiving information associated with a second device in the system and a second set of capabilities provided in the second device; determining one or more required capabilities that need to be activated for the system, the system comprising at least the first device and the second device; for each of the one or more required capabilities, selecting automatically by a processor based on the information received and one or more criteria, which capability in the first device and the second device to activate to satisfy the one or more required capabilities; and activating said selected capability in the first device or the second device.. . ... International Business Machine Corporation

12/18/14 / #20140372596

Passive monitoring of virtual systems using agent-less, near-real-time indexing

Aspects of the present invention provide a solution for passively monitoring a computer system. In an embodiment, a read-only target is created based on the configuration of the virtual server disk used by the virtual server to access the storage associated therewith. ... International Business Machine Corporation

12/18/14 / #20140372595

Determining location of hardware components in a cloud computing environment based on hardware components self-locating other hardware components

A method, system and computer program product for managing hardware components in a cloud computing environment. Each hardware component in a data center of the cloud computing environment detects and identifies other hardware components within a communication range of the hardware component using a wireless protocol. ... International Business Machine Corporation

12/18/14 / #20140372584

Workload and defect management systems and methods

Disclosed herein are methods and systems for workload and defect management. According to an aspect, a method includes communicating, to a first computing device, an identifier associated with a second computing device. ... International Business Machine Corporation

12/18/14 / #20140372556

Ensuring health and compliance of devices

A compliance method and associated system is provided. The method includes generating backup devices for devices of a list of devices associated with a data storage environment. ... International Business Machine Corporation

12/18/14 / #20140372549

Load balancing input/output operations between two computers

Methods, apparatus and computer program products implement embodiments of the present invention that include identifying, by a first computer, multiple network paths to a second computer, and splitting an input/output (i/o) request for a logical volume stored on the second computer into sub-requests. A probe request defining an association between the i/o request and the sub-requests is conveyed to the second computer, and each of the sub-requests is assigned to a respective one of the multiple network paths. ... International Business Machine Corporation

12/18/14 / #20140372538

System and method for generating intentional interruptions during gatherings

Systems and methods for generating interruptions are provided. A method for generating interruptions, comprises generating a message for one or more recipients, detecting that a computing device is being used for a presentation, concluding, using a processor, that the one or more recipients are in an audience for the presentation, and after concluding that the one or more recipients are in the audience, interrupting the presentation with the message.. ... International Business Machine Corporation

12/18/14 / #20140372519

Diagnostic heartbeating in a distributed data processing environment

A first component receives from a second component a set of diagnostic parameters to include in a diagnostic heartbeat packet, and information identifying a data communication protocol to be used for transmitting the diagnostic heartbeat packet. The diagnostic heartbeat packet is a packet comprising a header, a set of heartbeat parameters, and the set of diagnostic parameters. ... International Business Machine Corporation

12/18/14 / #20140372497

Determining location of hardware components in a cloud computing environment based on hardware components self-locating other hardware components

A method, system and computer program product for managing hardware components in a cloud computing environment. Each hardware component in a data center of the cloud computing environment detects and identifies other hardware components within a communication range of the hardware component using a wireless protocol. ... International Business Machine Corporation

12/18/14 / #20140372475

Segmenting documents within a full text index

A system, method and computer program product for searching documents within a collection includes partitioning the collection into a plurality of document segments based on a range of values for a document attribute. Each document segment is associated with a different value range for the document attribute and includes documents each with a value for the document attribute within the associated value range. ... International Business Machine Corporation

12/18/14 / #20140372474

Employing organizational context within a collaborative tagging system

A computer-implemented method of employing organizational context within a collaborative tagging system can include receiving at least one tag for an artifact from a user, determining at least one attribute of the user, and storing a tag record including the tag, the attribute of the user, and an association of the tag with the artifact.. . ... International Business Machine Corporation

12/18/14 / #20140372470

On-the-fly encoding method for efficient grouping and aggregation

Embodiments include a system for encoding data while it is being processed. The system includes a processor, an encoder and a decoder. ... International Business Machine Corporation

12/18/14 / #20140372452

Managing changes to one or more files via linked mapping records

A method for managing changes to one or more files via a link is associated with the changes that result in an updated version of the one or more files. A changed section determiner determines which sections associated with the one or more files have changed. ... International Business Machine Corporation

12/18/14 / #20140372446

Email content management and visualization

Embodiments of the present invention provide a system, method, and program product to manage and visualize email content using metadata tags. In an embodiment, the method comprises a computing device receiving an email message that is addressed to a recipient and includes a metadata tag; associating the metadata tag with a predefined category and/or subcategory; transmitting a predefined category and/or subcategory to be displayed using at least a pie chart icon that includes a circular chart divided into sectors that illustrate a numerical portion of the transmitted predefined category and/or subcategory associated with a metadata tag, wherein each sector includes an arc length that is proportional to a quantity of email messages received that have a metadata tag associated with the sector; and generating an object associated with the transmitted predefined category and/or subcategory, wherein in response to a user interacting with the object an action is generated.. ... International Business Machine Corporation

12/18/14 / #20140372431

Generating differences for tuple attributes

A sequence of tuples, each having one or more attributes, is received at one of one or more processing elements operating on one or more processors. Each processing element may have one or more stream operators. ... International Business Machine Corporation

12/18/14 / #20140372426

Filtering event log entries

A method for efficient logging in a control system is provided. A first plurality of registers, frequently accessed registers, is identified. ... International Business Machine Corporation

12/18/14 / #20140372421

Optimal zoom indicators for map search results

A system and computer program product for indicating an optimal magnification level for displaying search query results in a mapping application running in a computer device. The method comprises: obtaining search results for a business or category of interest in a geographical area; determining the search results to be displayed within a mapping application; determining an optimal magnification level corresponding to a search result; generating a magnification indicator for indicating an optimal magnification level for the search result to be displayed within the mapping application; and adjusting the display within the mapping application to change to the determined optimal magnification level responsive to selecting the magnification indicator for that search result.. ... International Business Machine Corporation

12/18/14 / #20140372411

On-the-fly encoding method for efficient grouping and aggregation

Embodiments include a method and computer program product for encoding data while it is being processed as part of a query is provided. The method includes receiving a query request and determining a set of values associated with data to be encoded for completing the query request. ... International Business Machine Corporation

12/18/14 / #20140372407

Join operation partitioning

Partitioned join operations are performed between a first database object and a second database object by determining an agent group for an agent in response to the agent receiving rows of the second database object to process; partitioning the rows to determine a target hash table for each row and adding the partitioned rows to work to be performed by the agent group; and distributing the work for the group to agents of the group by assigning to a single agent all the rows associated with a particular hash table to perform a join operation on the assigned rows. Each partition is assigned a first counter value indicating an upper bound of a task id range that is most recently assigned to an agent in the agent group for processing, and a second counter value indicating the highest task id that has been processed for that partition.. ... International Business Machine Corporation

12/18/14 / #20140372397

Reducing lock occurrences in server/database systems

Limiting the number of concurrent requests in a database system. Arranging requests to be handled by the database system in at least one queue. ... International Business Machine Corporation

12/18/14 / #20140372392

Reducing collisions within a hash table

Collisions in hash tables are reduced by removing each empty bucket from a hash table and compacting the non-empty buckets, generating a map of the hash table indicating a status of the buckets of the hash table, and accessing data in the hash table by applying a hash key to the generated map to determine a corresponding bucket containing the data.. . ... International Business Machine Corporation

12/18/14 / #20140372391

Content validation for documentation topics using provider information

At least one processor may determine one or more issues in one or more of a plurality of documentation topics that document at least one software functionality based at least upon applying one or more business rules to the one or more of the plurality of documentation topics. Responsive to determining the one or more issues, one or more entries may be inserted into an issues report, wherein the one or more entries include information regarding the one or more issues.. ... International Business Machine Corporation

12/18/14 / #20140372389

Data encoding and processing columnar data

Aspects of the invention are provided for accessing a plurality of data elements. A page of column data is stored in a format that includes compressed and/or non-compressed elements, with the format including a plurality of arrays and a vector. ... International Business Machine Corporation

12/18/14 / #20140372388

Hashing scheme using compact array tables

Embodiments include a method, system, and computer program product for creating an array table. In one embodiment the method includes identifying keys associated with values in a database and identifying bits common between the plurality of keys using logical functions and removing the common bits to form condensed keys. ... International Business Machine Corporation

12/18/14 / #20140372379

Method and system for data backup

The present invention relates to a method, system, and computer program product for data backup, the method comprising: performing first chunking on current data by using the same chunking method as that used by original backup data to obtain a current chunk; calculating hash value of the current chunk; and acquiring, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk, and incrementing number of continuous matched chunks by one. Since the pertinence between original backup data and current data is maximally utilized, performance of de-duplication method can be efficiently improved.. ... International Business Machine Corporation

12/18/14 / #20140372374

Difference determination in a database environment

Techniques are disclosed to determine differences between a source table and a target table in a database environment, as being persistent or transient. A first set of differences between the source table and the target table is determined at a first point in time. ... International Business Machine Corporation

12/18/14 / #20140372366

Adaptive warehouse data validation tool

Techniques for data validation may include dynamically generating one or more database queries to be performed on a target data warehouse and a baseline data warehouse based on warehouse model metadata for the target data warehouse and the baseline data warehouse. The techniques may further include executing the one or more database queries against the target data warehouse and the baseline data warehouse to receive one or more data sets from the baseline data warehouse and one or more data sets from the target data warehouse. ... International Business Machine Corporation

12/18/14 / #20140372364

Utility-based ontology evolution

Exemplary embodiments of the present invention disclose a method, computer program product, and system for updating an ontology when a set of evidences and a set of constraints are given as inputs. Exemplary embodiments categorize concepts into three sets, a definitely relevant set, a possibly relevant set, and an irrelevant set. ... International Business Machine Corporation

12/18/14 / #20140372335

Cooperative path tracking

An approach is provided in which a tracking device is attached to an object and receives nearby object routes from multiple nearby tracking devices, each attached to respective nearby objects. The tracking device compares an expected route corresponding to the object with the received nearby object routes to determine whether the object is being transported along the expected route. ... International Business Machine Corporation

12/18/14 / #20140372217

Optimal zoom indicators for map search results

A system, method and computer program product for indicating an optimal magnification level for displaying search query results in a mapping application running in a computer device. The method comprises: obtaining search results for a business or category of interest in a geographical area; determining the search results to be displayed within a mapping application; determining an optimal magnification level corresponding to a search result; generating a magnification indicator for indicating an optimal magnification level for the search result to be displayed within the mapping application; and adjusting the display within the mapping application to change to the determined optimal magnification level responsive to selecting the magnification indicator for that search result.. ... International Business Machine Corporation

12/18/14 / #20140372211

Real-time advertisement based on common point of attraction of different viewers

A method for providing real-time advertisements includes using one or more cameras to determine a direction of focus of attention of a plurality of persons by determining a direction of the head of each person of the plurality of persons located in a vicinity of a plurality of products. The method includes extrapolating the direction of focus for each person of the plurality of persons and determining, for each product of the plurality of products, a number of persons of the plurality of persons that have a direction of focus on the product where the determination is based on the extrapolated direction of focus for each person. ... International Business Machine Corporation

12/18/14 / #20140372209

Real-time advertisement based on common point of attraction of different viewers

An apparatus for advertising includes a focal direction module that uses cameras to determine a direction of focus of attention of a plurality of persons by determining a direction of the head of each person located in a vicinity of a plurality of products. A focus extrapolation module extrapolates the direction of focus for each person. ... International Business Machine Corporation

12/18/14 / #20140372106

Assisted free form decision definition using rules vocabulary

A method of decision definition using a rules vocabulary includes: receiving free form input; identifying terms contained within the free form input; searching the rules vocabulary objects for terms; responsive to the term being found, obtaining input from a user as to whether to use the found term; responsive to the term not being found; searching the rules vocabulary attributes for terms having attributes corresponding to the term; responsive to the term being found, obtaining input from a user as to whether to use the found term; and refactoring the free form input with the found term accepted by the user. The method also includes updating the rules vocabulary with the term identified in the free form input as a synonym for the term found in said rules vocabulary. ... International Business Machine Corporation

12/18/14 / #20140372083

Derived restrictions in a combinatorial model

A method, apparatus and product for determining a derived restriction in a combinatorial model. The method comprising: obtaining a combinatorial model defining a test space, the combinatorial model comprising a set of attributes, a respective domain for each attribute, and a set of restrictions, wherein the restrictions define a combination of values of the attributes that are restricted from the test space; and automatically determining a derived restriction that is derived from at least a first restriction and a second restriction, the first and second restrictions are comprised by the set of restrictions, wherein the derived restriction restricts at least one combination of values that is not restricted by the first restriction and at least one combination of values that is not restricted by the second restriction.. ... International Business Machine Corporation

12/18/14 / #20140372076

Providing known distribution patterns associated with specific measures and metrics

A computer receives one or more keywords input by a user to describe a metric or a test and identifies a first document that includes at least one of the keywords. The computer identifies, in the first document, a known distribution pattern and an associated metric or measure that relate to the one or more keywords. ... International Business Machine Corporation

12/18/14 / #20140372066

Varying power load conditions on systems under test

An apparatus includes a system test module that initiates a system power test for a computer system. The computer system includes one or more power supplies that provide power to system components. ... International Business Machine Corporation

12/18/14 / #20140371902

Fast-access self-repairing tape library using mobile robots

Various methods for threading a tape on the one or more reels onto the tape drive. A method according to one embodiment uses a mobile robot to thread a tape on the one or more reels onto the tape drive. ... International Business Machine Corporation

12/18/14 / #20140371411

Polymer composition with saliva labile aversive agent

For a polymer composition, a polymerizable aversive agent is chemically coupled to a substrate element. The chemical coupling is labile to saliva.. ... International Business Machine Corporation

12/18/14 / #20140370992

Player substitution to preserve team balance

Exemplary embodiments determine a type, and a status of a first character included in a group of characters participating in a gaming session. Exemplary embodiments determine a goal of the group of characters. ... International Business Machine Corporation

12/18/14 / #20140370981

Reducing the bandwidth requirements of multiplayer gaming sessions

A computer identifies a group of players that are participating in a gaming session that is hosted by the computer. The computer identifies the location of an avatar of a first player included in the group of players. ... International Business Machine Corporation

12/18/14 / #20140370814

Connecting wireless devices

The present invention provides a method and system for connecting wireless devices by receiving from a user's wireless device an environmental sound of the environment where the user is located. The method also includes obtaining a list of other wireless devices that are in the same environment as the user, according to the environmental sound and sending the list of wireless devices to the user for the user to select from the list of wireless devices one or more wireless devices for connecting.. ... International Business Machine Corporation

12/18/14 / #20140370721

Interleaving ejector latches enabling a reduced end-to-end spacing between memory module connectors

First and second memory module connectors are secured in end-to-end alignment on a circuit board for receiving memory modules along a central plane. Each memory module connector has an ejector latch pivotally coupled to the adjacent ends of the memory module connectors to pivot about an axis perpendicular to the plane. ... International Business Machine Corporation

12/18/14 / #20140370683

T-shaped compound semiconductor lateral bipolar transistor on semiconductor-on-insulator

A base region extends upward from a recessed semiconductor surface of a semiconductor material portion present on an insulator. The base region includes a vertical stack of, an extrinsic base region and an intrinsic base region. ... International Business Machine Corporation

12/18/14 / #20140370681

Field-effect transistor (fet) with source-drain contact over gate spacer

A field-effect transistor (fet) and methods for fabricating such. The fet includes a substrate having a crystalline orientation, a source region in the substrate, and a drain region in the substrate. ... International Business Machine Corporation

12/18/14 / #20140370671

Reliable electrical fuse with localized programming and method of making the same

An electrical fuse has an anode contact on a surface of a semiconductor substrate. The electrical fuse has a cathode contact on the surface of the semiconductor substrate spaced from the anode contact. ... International Business Machine Corporation

12/18/14 / #20140370667

Tapered nanowire structure with reduced off current

Non-planar semiconductor devices including at least one semiconductor nanowire having a tapered profile which widens from the source side of the device towards the drain side of the device are provided which have reduced gate to drain coupling and therefore reduced gate induced drain tunneling currents.. . ... International Business Machine Corporation

12/18/14 / #20140370662

Copper post solder bumps on substrates

A method comprises forming semiconductor flip chip interconnects having electrical connecting pads and electrically conductive posts terminating in distal ends operatively associated with the pads. We solder bump the distal ends by injection molding, mask the posts on the pads with a mask having a plurality of through hole reservoirs and align the reservoirs in the mask to be substantially concentric with the distal ends. ... International Business Machine Corporation

12/18/14 / #20140370637

Nanochannel process and structure for bio-detection

Nanochannel sensors and methods for constructing nanochannel sensors. An example method includes forming a sacrificial line on an insulating layer, forming a dielectric layer, etching a pair of electrode trenches, forming a pair of electrodes, and removing the sacrificial line to form a nanochannel. ... International Business Machine Corporation

12/18/14 / #20140370636

Extended gate sensor for ph sensing

A sensing device includes a substrate having a source region and a drain region formed therein. A gate structure is formed over the substrate and includes a gate dielectric and a gate conductor. ... International Business Machine Corporation

12/18/14 / #20140370624

Wafer alignment and bonding tool for 3d integration

A bonding apparatus for 3d integration may include a plurality of infrared microscopes that emit and receive infrared light for imaging, a first bonding chuck that holds a first semiconductor structure, and a second bonding chuck that holds a second semiconductor structure, whereby the second bonding chuck has a plurality of openings that are transparent to the received infrared light. A force pin is coupled to the first bonding chuck for applying a predetermined force to the first semiconductor structure for bonding to the second semiconductor structure. ... International Business Machine Corporation

12/18/14 / #20140370469

Utilizing appliance operating patterns to detect cognitive impairment

A method, system or computer usable program product for detecting a change in appliance operating patterns as an indication of cognitive impairment including monitoring a first operating pattern for an appliance by a user to establish a baseline operating pattern; and responsive to detecting a second operating pattern for the appliance by the user deviating from the established baseline operating pattern exceeding a threshold, providing an indication of a possible cognitive impairment of the user.. . ... International Business Machine Corporation

12/18/14 / #20140370423

Extreme ultraviolet (euv) radiation pellicle formation method

An extreme ultraviolet (euv) photolithography pellicle with at least 70% transmissivity to euv can be formed from a layer of semiconductor material applied to a substrate. The bottom surface of the layer can be exposed by forming support structure(s) from the substrate. ... International Business Machine Corporation

12/18/14 / #20140370326

Nanoporous structures by reactive ion etching

A method for forming porous metal structures and the resulting structure may include forming a metal structure above a substrate. A masking layer may be formed above the metal structure, and then etched using a reactive ion etching process with a mask etchant and a metal etchant. ... International Business Machine Corporation

12/18/14 / #20140370064

Film-forming compositions of self-crosslinkable nanogel star polymers

A film-forming composition comprises a solvent and unimolecular nanoparticles of a self-crosslinkable nanogel star polymer. The nanogel star polymer comprises i) a crosslinked polymer core (nanogel core) and ii) 6 or more independent polymer arms covalently linked to the core by respective first end groups. ... International Business Machine Corporation

12/18/14 / #20140369183

Performing failover in a redundancy group

A method, system, and computer program product for performing failover in a redundancy group, where the redundancy group comprises a plurality of routers including an active router and a standby router, the failover being characterized by zero black hole or significantly reduced black hole conditions versus a conventional failover system. The method comprises the steps of: receiving an incoming message at a switch; sending a request of identification to the plurality of routers to identify a current active router, where the current active router represents a virtual router of the redundancy group; and in response to receiving a reply containing an identification from the current active router within a predetermined time, forwarding the incoming message to the current active router.. ... International Business Machine Corporation

12/18/14 / #20140369114

Phase-change memory cells

Improved phase-change memory cells are provided for storing information in a plurality of programmable cell states. A phase-change material is located between first and second electrodes for applying a read voltage to the phase-change material to read the programmed cell state. ... International Business Machine Corporation

12/18/14 / #20140369113

Phase-change memory cells

A phase-change memory cell for storing information in a plurality of programmable cell states. The memory cell includes: a phase-change material located between a first electrode and a second electrode for applying a read voltage to the phase-change material to read a programmed cell state; and an electrically-conductive component extending in a direction between the first and second electrodes in contact with the phase-change material and arranged to present, to a cell current produced by the read voltage, a lower-resistance current path than an amorphous phase of the phase-change material in any of the plurality of programmable cell states, said current path having a length dependent on a size of said amorphous phase, wherein a volume of the electrically-conductive component is greater than about half that of said phase-change material.. ... International Business Machine Corporation

12/18/14 / #20140368953

Tape head with tape-bearing surface exhibiting an array of protruding topographic features

A tape head, adapted for reading and/or writing to a magnetic tape, has a tape-bearing surface and is configured to urge a magnetic tape against the bearing surface, in operation. The bearing surface includes a transducer area, having at least one transducer that is a read and/or write element, designed for reading and/or writing to a magnetic tape, and a structured area adjacent to the transducer area, comprising a periodic array of topographic features, the topographic features configured within the structured area to determine a minimal distance between the transducer area and a tape.. ... International Business Machine Corporation

12/18/14 / #20140368898

Device and system for reflective digital light processing (dlp)

Aspects of the present invention include systems for reflective digital light processing (dlp). Embodiments include a light source, a plurality of optically reflective switching devices each having an optically reflective layer in contact with a substrate; a circuit means and power source; controller logic; a projection means; and a display means; wherein each of said plurality of devices is a capable of receiving light from said light source and thereafter reflecting said received light in direct response to a reflective state condition of said each device.. ... International Business Machine Corporation

12/18/14 / #20140368543

Directed communication in a virtual environment

The present invention relates to directed communication between avatars in a virtual environment controlled by end-users from outside the virtual environment. A method in accordance with an embodiment includes: determining a relative location of a first avatar and a second avatar in a virtual environment, wherein at least one end-user of the first avatar and the second avatar wears a headset configured to track head movements thereof, wherein the head movements of the end-user translate to their avatar and influence volume of voice communication from their avatar; adjusting aspects of a voice communication between the first avatar and the second avatar based on the relative location and the track head movements; referring to a list of avatars whose audio characteristics are to be portrayed differently in a voice communication; and further adjusting the audio characteristics of one of the first avatar and the second avatar in accordance with the list.. ... International Business Machine Corporation

12/18/14 / #20140368315

Remote control of powering of electrical appliances

A method is provided for remotely controlling a supply of power to a plurality of electrical appliances. In response to attaching a plug of a first electrical appliance of a plurality of electrical appliances to a first socket of the one or more sockets connected to a main power supply, a control system activates a transceiver at a first of the first socket and the plug; stimulates, via the transceiver, a tag at a second of the first socket and the plug to determine a unique identifier of the tag. ... International Business Machine Corporation

12/18/14 / #20140368292

Micro-electro-mechanical system (mems) structure and design structures

Micro-electro-mechanical system (mems) structures, methods of manufacture and usage, and design structures are disclosed herein. The method includes applying a first voltage polarity to an actuator of a micro-electro-mechanical system (mems) structure to place the mems structure in a predetermined state for a first operating condition. ... International Business Machine Corporation

12/18/14 / #20140368286

Low noise voltage controlled oscillator

An enhanced negative resistance voltage controlled oscillator (vco) circuit is provided, in which a parallel connection of a capacitor and a resistor configured to provide frequency-dependent transconductance is present across source nodes of a first pair of field effect transistors in which gate nodes and drain nodes are cross-coupled. The source nodes of the first pair of field effect transistors are electrically shorted to drain nodes of a second pair of field effect transistors of which the gate nodes are electrically shorted to the gate nodes of the first pair of field effect transistors. ... International Business Machine Corporation

12/18/14 / #20140368234

Multiple-qubit wave-activated controlled gate

A device includes a housing, at least two qubits disposed in the housing and a resonator disposed in the housing and coupled to the at least two qubits, wherein the at least two qubits are maintained at a fixed frequency and are statically coupled to one another via the resonator, wherein energy levels. . ... International Business Machine Corporation

12/18/14 / #20140368227

In-line measurement of transistor device cut-off frequency

A test circuit within a semiconductor wafer that measures a cut-off frequency for a transistor device under test may include a radio frequency source, located within a region of the wafer, that generates a radio frequency signal. A biasing circuit, also located within the region, may provide a current bias setting to the transistor device under test. ... International Business Machine Corporation

12/18/14 / #20140368182

Identifying a signal on a printed circuit board under test

Apparatus and methods for identifying a signal on a printed circuit board (pcb) under test, including an integrated circuit mounted on the pcb, the integrated circuit having a test signal generator that transmits a test signal to an output pin of the integrated circuit, with the output pin connected to a test point on the pcb; the integrated circuit also having signal identification logic that inserts into the test signal, an identifier of the signal; a test probe in contact with the test point; and a signal-identifying controller that receives the test signal and the identifier from the test probe and displays, in dependence upon the identifier, the identity of the signal.. . ... International Business Machine Corporation

12/18/14 / #20140367833

Low-temperature sidewall image transfer process using ald metals, metal oxides and metal nitrides

A sit method includes the following steps. An sit mandrel material is deposited onto a substrate and formed into a plurality of sit mandrels. ... International Business Machine Corporation

12/18/14 / #20140367826

Making an efuse

A wafer chip and a method of designing the chip is disclosed. A first fuse is formed having a first critical dimension and a second fuse having a second critical dimension are formed in a layer of the chip. ... International Business Machine Corporation

12/18/14 / #20140367792

Structure and method of latchup robustness with placement of through wafer via within cmos circuitry

A method of manufacturing a semiconductor structure includes: forming a trench in a back side of a substrate; depositing a dopant on surfaces of the trench; forming a shallow trench isolation (sti) structure in a top side of the substrate opposite the trench; forming a deep well in the substrate; out-diffusing the dopant into the deep well and the substrate; forming an n-well and a p-well in the substrate; and filling the trench with a conductive material.. . ... International Business Machine Corporation

12/18/14 / #20140367786

Flexible, stretchable electronic devices

Fabrication methods are disclosed that facilitate the production of electronic structures that are both flexible and stretchable to conform to non-planar (e.g. Curved) surfaces without suffering functional damage due to excessive strain. ... International Business Machine Corporation

12/18/14 / #20140367782

Lateral diode compatible with finfet and method to fabricate same

A structure includes a fin having first end and second ends and a substantially intrinsic portion between the first and second ends. The structure further includes a first region of doped semiconductor material disposed on the first end of the fin and a second region of doped semiconductor material disposed on the second end of the fin. ... International Business Machine Corporation

12/18/14 / #20140367781

Lateral diode compatible with finfet and method to fabricate same

A method to fabricate a diode device includes providing a fin structure formed in a soi layer. The fin structure has a sacrificial gate structure disposed on the fin structure between a first end of the fin structure and a second end of the fin structure. ... International Business Machine Corporation

12/18/14 / #20140367778

Lateral diffusion metal oxide semiconductor (ldmos)

A lateral diffusion metal oxide semiconductor (ldmos) comprises a semiconductor substrate having an sti structure in a top surface of the substrate, a drift region below the sti structure, and a source region and a drain region on opposite sides of the sti structure. A gate conductor is on the substrate over a gap between the sti structure and the source region and partially overlaps the drift region. ... International Business Machine Corporation

12/18/14 / #20140367752

Transistor having all-around source/drain metal contact channel stressor and method to fabricate same

An intermediate transistor structure includes a fin structure disposed on a surface of an insulating layer. The fin structure has a gate structure disposed thereon between first and second ends of the fin structure. ... International Business Machine Corporation

12/18/14 / #20140367749

Nanochannel process and structure for bio-detection

Nanochannel sensors and methods for constructing nanochannel sensors. An example method includes forming a sacrificial line on an insulating layer, forming a dielectric layer, etching a pair of electrode trenches, forming a pair of electrodes, and removing the sacrificial line to form a nanochannel. ... International Business Machine Corporation

12/18/14 / #20140367748

Extended gate sensor for ph sensing

A sensing device includes a substrate having a source region and a drain region formed therein. A gate structure is formed over the substrate and includes a gate dielectric and a gate conductor. ... International Business Machine Corporation

12/18/14 / #20140367745

T-shaped compound semiconductor lateral bipolar transistor on semiconductor-on-insulator

A base region extends upward from a recessed semiconductor surface of a semiconductor material portion present on an insulator. The base region includes a vertical stack of, an extrinsic base region and an intrinsic base region. ... International Business Machine Corporation

12/18/14 / #20140367684

Methods for testing integrated circuits of wafer and testing structures for integrated circuits

Aspects of the present invention relate to methods of testing an integrated circuit of a wafer and testing structures for integrated circuits. The methods include depositing a sacrificial material over a first conductor material of the integrated circuit, and contacting a test probe to the deposited sacrificial material. ... International Business Machine Corporation

12/18/14 / #20140367356

In-situ hardmask generation

In some examples, a process to generate an in-situ hardmask layer on porous dielectric materials using the densifying action of a plasma in conjunction with a sacrificial polymeric filler, the latter which enables control of the hardmask thickness as well as a well-defined interface with the underlying ild.. . ... International Business Machine Corporation

12/18/14 / #20140367248

Extreme ultraviolet radiation (euv) pellicle formation apparatus

Spacers arranged on opposite sides of an article to be processed into an euv pellicle support the article. Plates on opposite ends of the spacer-article combination include respective electrodes. ... International Business Machine Corporation








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with International Business Machine Corporation in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for International Business Machine Corporation with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###