Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

International Business Machines Corporation
International Business Machines Corporations
International Business Machines Corporation ibm
International Business Machines Corporation yt
International Business Machines Corporation yorktown
International Business Machines Corporation ibm Corporation
International Business Machines Corporation New Orchard Road
International Business Machines Corporation_20100114
International Business Machines Corporation_20131212
International Business Machines Corporation_20100128
International Business Machines Corporation_20100121
International Business Machines Corporation_20100107
  

IBM patents (2014 archive)

Recent patent applications related to IBM. IBM is listed as an Agent/Assignee. Note: IBM may have other listings under different names/spellings. We're not affiliated with IBM, we're just tracking patents.

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | IBM-related inventors




Date IBM patents (2014 archive) (updated weekly) - BOOKMARK this page
12/25/14Resistive memory with a stabilizer
12/25/14Manufacturable sub-3 nanometer palladium gap devices for fixed electrode tunneling recognition
12/25/14Nanogap device with capped nanowire structures
12/25/14Carbon nanostructure device fabrication utilizing protect layers
12/25/14Semiconductor structure with aspect ratio trapping capabilities
12/25/14Overlapped iii-v finfet with doped semiconductor extensions
12/25/14Bipolar transistor with maskless self-aligned emitter
12/25/14Method of device isolation in cladding si through in situ doping
12/25/14Semiconductor device including source/drain formed on bulk and gate channel formed on oxide layer
12/25/14Method for forming metal semiconductor alloys in contact holes and trenches
12/25/14Programmable fuse structure and methods of forming
12/25/14Memory cell with integrated iii-v device
12/25/14Metal to metal bonding for stacked (3d) integrated circuits
12/25/14Optimizing operating range of an electronic circuit
12/25/14High throughput decoding of variable length data symbols
12/25/14High throughput decoding of variable length data symbols
12/25/14Generating an operating procedure manual
12/25/14Interactive control over augmented reality content
12/25/14Generating an image of a seal impression
12/25/14Products with tape formats having one or more spare areas and apparatuses configured for use with such products
12/25/14Phase change material variable capacitor
12/25/14Mitigating network connection problems using supporting devices
12/25/14Selectively refreshing address registration information
12/25/14Thermoresistance sensor structure for integrated circuits and method of making
12/25/14Testing a decision feedback equalizer ('dfe')
12/25/14Accessing local applications when roaming using a nfc mobile device
12/25/14Estimation of object properties in 3d world
12/25/14Injection of a filler material with homogeneous distribution of anisotropic filler particles through implosion
12/25/14Injection of a filler material with homogeneous distribution of anisotropic filler particles through implosion
12/25/14Caching natural language questions and results in a question and answer system
12/25/14Manufacturable sub-3 nanometer palladium gap devices for fixed electrode tunneling recognition
12/25/14Semiconductor device including source/drain formed on bulk and gate channel formed on oxide layer
12/25/14Overlapped iii-v finfet with doped semiconductor extensions
12/25/14Method to form finfet/trigate devices on bulk semiconductor wafers
12/25/14Strained finfet with an electrically isolated channel
12/25/14Selective laser anneal on semiconductor material
12/25/14Self-aligned contact structure for replacement metal gate
12/25/14Resistive memory with a stabilizer
12/25/14Transferring information on a first mobile computing device to a peer mobile computing device
12/25/14Location-based conference call dial-in number retrieval and inclusion
12/25/14Characterization and validation of processor links
12/25/14Apparatus and method for helping in the reading of an electronic message
12/25/14Natural language question expansion and extraction
12/25/14Automatic semantic rating and abstraction of literature
12/25/14Modifying service levels in online meeting system
12/25/14Location triggered scheduling
12/25/14Modifying service levels in online meeting system
12/25/14Systems engineering solution analysis
12/25/14Application of mobile devices for event data
12/25/14Application of mobile devices for event data
12/25/14Aggregation of subsets of opinions from group collaborations
12/25/14Visually generated consumer product presentation
12/25/14Visual representation of accounts
12/25/14Spike tagging for debugging, querying, and causal analysis
12/25/14Privacy risk metrics in location based services
12/25/14Smarter big data processing using collaborative map reduce frameworks
12/25/14Document provenance scoring based on changes between document versions
12/25/14Reducing reading of database logs by persisting long-running transaction data
12/25/14Error correction in tables using discovered functional dependencies
12/25/14Data quality assessment
12/25/14Providing multiple concurrent transactions on a single database schema using a single concurrent transaction database infrastructure
12/25/14Highly scalable tree-based trylock
12/25/14Highly scalable tree-based trylock
12/25/14Device and method for acquiring resource lock
12/25/14Cross-channel social search
12/25/14Pattern based video frame navigation aid
12/25/14Managing passthru connections on an operator graph
12/25/14Process-aware code migration
12/25/14Multifaceted search
12/25/14Recommendation engine
12/25/14Identifying unknown parameter and name value pairs
12/25/14Verifying compliance of a land parcel to an approved usage
12/25/14Method and system for filtering movements between virtual environments
12/25/14Enterprise evidence repository
12/25/14Distributed high performance pool
12/25/14Managing past activities based on relationship changes in a social network
12/25/14Methodology that uses culture information as a means to detect spam
12/25/14Aggregating message responses into topic-organized content
12/25/14Aggregating message responses into topic-organized content
12/25/14Space-efficient mail storing and archiving based on communication structure
12/25/14Management of outbound transactions to an enterprise information system
12/25/14Management of outbound transactions to an enterprise information system
12/25/14Network device configuration management
12/25/14Applying a platform code level update to an operational node
12/25/14Managing a network connection for use by a plurality of application program processes
12/25/14Providing indirect data addressing in an input/output processing system where the indirect data address list is non-contiguous
12/25/14Continuous in-memory accumulation of hardware performance counter data
12/25/14Managing a translation lookaside buffer
12/25/14Firmware storage and maintenance
12/25/14Firmware storage and maintenance
12/25/14Memory access alignment in a double data rate ('ddr') system
12/25/14Selective duplication of tape cartridge contents
12/25/14Application discovery using storage system signatures
12/25/14Multi-level aggregation techniques for memory hierarchies
12/25/14Coherent attached processor proxy having hybrid directory
12/25/14Two handed insertion and deletion algorithm for circular buffer
12/25/14Coherent attached processor proxy having hybrid directory
12/25/14Execution of a perform frame management function instruction
12/25/14Encrypting and decrypting a virtual disc
12/25/14Accessing local applications when roaming using a nfc mobile device
12/25/14Secure data access using sql query rewrites
12/25/14Detecting full-system idle state in adaptive-tick kernels
12/25/14Fault tolerance solution for stateful applications
12/25/14Avoiding restart on error in data integration
12/25/14Memory uncorrectable error handling technique for reducing the impact of noise
12/25/14Memory uncorrectable error handling technique for reducing the impact of noise
12/25/14Recovering a volume table and data sets
12/25/14Base protocol layer testing device
12/25/14Unequal error protection scheme for headerized sub data sets
12/25/14Loading a web page
12/25/14Pattern based video frame navigation aid
12/25/14Optimizing a clustered virtual computing environment
12/25/14Creation and prioritization of multiple virtual universe teleports in response to an event
12/25/14Displaying data protection levels
12/25/14Printing process calibration and correction
12/25/14Semiconductor device reliability model and methodologies for use thereof
12/25/14Prioritizing test cases using multiple variables
12/25/14Debugging tool with predictive fault location
12/25/14Extracting stream graph structure in a computer language by pre-executing a deterministic subset
12/25/14Extracting stream graph structure in a computer language by pre-executing a deterministic subset
12/25/14Hypervisor subpartition as concurrent upgrade
12/25/14Launching a target application based on characteristics of a string of characters in a source application
12/25/14Computer program installation across multiple memories
12/25/14Storage management for a cluster of integrated computing systems
12/25/14Sharing usb key by multiple virtual machines located at different hosts
12/25/14Address translation/specification field for hardware accelerator
12/25/14Joint optimization of multiple phases in large data processing
12/25/14Password setting and verification
12/25/14User centric fraud detection
12/25/14User centric fraud detection
12/25/14Intelligent risk level grouping for resource access recertification
12/25/14Endpoint security implementation
12/18/14Extreme ultraviolet radiation (euv) pellicle formation apparatus
12/18/14In-situ hardmask generation
12/18/14Methods for testing integrated circuits of wafer and testing structures for integrated circuits
12/18/14T-shaped compound semiconductor lateral bipolar transistor on semiconductor-on-insulator
12/18/14Extended gate sensor for ph sensing
12/18/14Nanochannel process and structure for bio-detection
12/18/14Transistor having all-around source/drain metal contact channel stressor and method to fabricate same
12/18/14Lateral diffusion metal oxide semiconductor (ldmos)
12/18/14Lateral diode compatible with finfet and method to fabricate same
12/18/14Lateral diode compatible with finfet and method to fabricate same
12/18/14Flexible, stretchable electronic devices
12/18/14Structure and method of latchup robustness with placement of through wafer via within cmos circuitry
12/18/14Methods of forming different finfet devices having different fin heights and an integrated circuit product containing such devices
12/18/14Making an efuse
12/18/14Low-temperature sidewall image transfer process using ald metals, metal oxides and metal nitrides
12/18/14Identifying a signal on a printed circuit board under test
12/18/14In-line measurement of transistor device cut-off frequency
12/18/14Multiple-qubit wave-activated controlled gate
12/18/14Low noise voltage controlled oscillator
12/18/14Micro-electro-mechanical system (mems) structure and design structures
12/18/14Remote control of powering of electrical appliances
12/18/14Directed communication in a virtual environment
12/18/14Device and system for reflective digital light processing (dlp)
12/18/14Tape head with tape-bearing surface exhibiting an array of protruding topographic features
12/18/14Phase-change memory cells
12/18/14Phase-change memory cells
12/18/14Performing failover in a redundancy group
12/18/14Film-forming compositions of self-crosslinkable nanogel star polymers
12/18/14Nanoporous structures by reactive ion etching
12/18/14Extreme ultraviolet (euv) radiation pellicle formation method
12/18/14Utilizing appliance operating patterns to detect cognitive impairment
12/18/14Wafer alignment and bonding tool for 3d integration
12/18/14Extended gate sensor for ph sensing
12/18/14Nanochannel process and structure for bio-detection
12/18/14Copper post solder bumps on substrates
12/18/14Tapered nanowire structure with reduced off current
12/18/14Reliable electrical fuse with localized programming and method of making the same
12/18/14Field-effect transistor (fet) with source-drain contact over gate spacer
12/18/14T-shaped compound semiconductor lateral bipolar transistor on semiconductor-on-insulator
12/18/14Interleaving ejector latches enabling a reduced end-to-end spacing between memory module connectors
12/18/14Connecting wireless devices
12/18/14Reducing the bandwidth requirements of multiplayer gaming sessions
12/18/14Player substitution to preserve team balance
12/18/14Polymer composition with saliva labile aversive agent
12/18/14Fast-access self-repairing tape library using mobile robots
12/18/14Varying power load conditions on systems under test
12/18/14Providing known distribution patterns associated with specific measures and metrics
12/18/14Derived restrictions in a combinatorial model
12/18/14Assisted free form decision definition using rules vocabulary
12/18/14Real-time advertisement based on common point of attraction of different viewers
12/18/14Real-time advertisement based on common point of attraction of different viewers
12/18/14Optimal zoom indicators for map search results
12/18/14Cooperative path tracking
12/18/14Utility-based ontology evolution
12/18/14Adaptive warehouse data validation tool
12/18/14Difference determination in a database environment
12/18/14Method and system for data backup
12/18/14Hashing scheme using compact array tables
12/18/14Data encoding and processing columnar data
12/18/14Content validation for documentation topics using provider information
12/18/14Reducing collisions within a hash table
12/18/14Reducing lock occurrences in server/database systems
12/18/14Join operation partitioning
12/18/14On-the-fly encoding method for efficient grouping and aggregation
12/18/14Optimal zoom indicators for map search results
12/18/14Filtering event log entries
12/18/14Generating differences for tuple attributes
12/18/14Email content management and visualization
12/18/14Managing changes to one or more files via linked mapping records
12/18/14On-the-fly encoding method for efficient grouping and aggregation
12/18/14Employing organizational context within a collaborative tagging system
12/18/14Segmenting documents within a full text index
12/18/14Determining location of hardware components in a cloud computing environment based on hardware components self-locating other hardware components
12/18/14Diagnostic heartbeating in a distributed data processing environment
12/18/14System and method for generating intentional interruptions during gatherings
12/18/14Load balancing input/output operations between two computers
12/18/14Ensuring health and compliance of devices
12/18/14Workload and defect management systems and methods
12/18/14Determining location of hardware components in a cloud computing environment based on hardware components self-locating other hardware components
12/18/14Passive monitoring of virtual systems using agent-less, near-real-time indexing
12/18/14Optimizing resource usage in systems which include heterogeneous devices, including sensors and smartphones
12/18/14Optimizing resource usage in systems which include heterogeneous devices, including sensors and smartphones
12/18/14Storage disk file subsystem and defect management systems and methods
12/18/14It system infrastructure prediction based on epidemiologic algorithm
12/18/14Dynamically expanding computing resources in a networked computing environment
12/18/14Workload and defect management systems and methods
12/18/14Service oriented architecture service dependency determination
12/18/14Adaptive cable interface
12/18/14Impersonating scsi ports through an intermediate proxy
12/18/14Indicating and detecting correct cable connections
12/18/14Unit attention processing in proxy and owner storage systems
12/18/14Safely mapping and unmapping host scsi volumes
12/18/14Implementing capacity and user-based resource allocation for a shared adapter in a virtualized system
12/18/14Online migration of a logical volume between storage systems
12/18/14Processing input/output requests using proxy and owner storage systems
12/18/14System and method for generating intentional interruptions during gatherings
12/18/14Enabling throttling on average write throughput for solid state storage devices
12/18/14Least-recently-used (lru) to first-dirty-member distance-maintaining cache cleaning scheduler
12/18/14Least-recently-used (lru) to first-dirty-member distance-maintaining cache cleaning scheduler
12/18/14Scheduler training for multi-module byte caching
12/18/14Concurrent dumping of large address space
12/18/14Parallel mapping of client partition memory to multiple physical adapters
12/18/14Data integrity protection in storage volumes
12/18/14Dynamically optimizing memory allocation across virtual machines
12/18/14Allocation of distributed data structures
12/18/14Allocation of distributed data structures
12/18/14Implementing concurrent adapter firmware update for an sriov adapter in a virtualized system
12/18/14Port throttling across an operating system restart during a hot upgrade
12/18/14System and method for managing tls connections among separate applications within a network of computing systems
12/18/14Topic protection policy for publish-subscribe messaging system
12/18/14Pooling entropy to facilitate mobile device-based true random number generation
12/18/14Implementing enhanced error handling of a shared adapter in a virtualized system
12/18/14Implementing concurrent device driver maintenance and recovery for an sriov adapter in a virtualized system
12/18/14Implementing distributed debug data collection and analysis for a shared adapter in a virtualized system
12/18/14Pulsed-latch based razor with 1-cycle error recovery scheme
12/18/14Message reconciliation during disaster recovery
12/18/14Implementing shared adapter configuration updates concurrent with maintenance actions in a virtualized system
12/18/14Second failure data capture in co-operating multi-image systems
12/18/14Pulsed-latch based razor with 1-cycle error recovery scheme
12/18/14Partial data report generation with data costing notification
12/18/14Reader-configurable augmentation of document content
12/18/14Optimizing automated interactions with web applications
12/18/14Optimizing automated interactions with web applications
12/18/14Partial data report generation with data costing notification
12/18/14Machine-learning based datapath extraction
12/18/14Dynamic java bean for visualage for java
12/18/14Computer aided visualization of a business object model lifecycle
12/18/14Method to auto generate jax-rs rest service implementation classes from existing interfaces
12/18/14Modifying a middleware
12/18/14Standardization of variable names in an integrated development environment
12/18/14Compiler optimization for memoization of pure function arguments
12/18/14Provisioning a secure customer domain in a virtualized multi-tenant environment
12/18/14Intelligent resource management for virtual machines
12/18/14Generating a deployment pattern for reuse in a networked computing environment
12/18/14Synchronizing multicast groups
12/18/14Dynamically adjusting a log level of a transaction
12/18/14Generating differences for tuple attributes
12/18/14Recording activity of software threads in a concurrent software environment
12/18/14Method, device and computer program for visualizing risk assessment values in event sequences
12/18/14Approval of content updates
12/18/14Providing time ratio-based password/challenge authentication
12/18/14After-the-fact configuration of static analysis tools able to reduce user burden
12/18/14Detecting security vulnerabilities on computing devices
12/18/14After-the-fact configuration of static analysis tools able to reduce user burden
12/18/14Providing access control for public and private document fields
12/18/14Providing access control for public and private document fields
12/11/14Semiconductor alloy fin field effect transistor
12/11/14Reduced resistance sige finfet devices and method of forming same
12/11/14Thin-film hybrid complementary circuits
12/11/14Management of input methods
12/11/14Portable computer monitoring
12/11/14System and method to display information on a hard disk drive assembly
12/11/14Generating a composite field of view using a plurality of oblique panoramic images of a geographic area
12/11/14Capacitor backup for sram
12/11/14Structure and method for adjusting threshold voltage of the array of transistors
12/11/14Surface modification using functional carbon nanotubes
12/11/14Current-perpendicular-to-plane magnetoresistive read sensor
12/11/14Gate electrode with stabilized metal semiconductor alloy-semiconductor stack
12/11/14Double self aligned via patterning
12/11/14Information sharing for third party applications in cellular telecommunication infrastructure
12/11/14Surface-selective carbon nanotube deposition via polymer-mediated assembly
12/11/14Managing time-substitutable electricity usage using dynamic controls
12/11/14Optimal selection of building components using sequential design via statistical based surrogate models
12/11/14Data-driven inventory and revenue optimization for uncertain demand driven by multiple factors
12/11/14Resource provisioning for electronic books
12/11/14Failure prediction based preventative maintenance planning on asset network system
12/11/14Method for collecting and processing relative spatial data
12/11/14Retrieving a specific sentence from a document
12/11/14Method, program, and system for processing space-time database
12/11/14Document handling in a web application
12/11/14Qa based on context aware, real-time information from mobile devices
12/11/14Qa based on context aware, real-time information from mobile devices
12/11/14Multi-way number partitioning using weakest link optimality
12/11/14Monitoring similar data in stream computing
12/11/14Integrated circuit system having decoupled logical and physical interfaces
12/11/14Techniques for booting an information processing system
12/11/14Remote power down control of a device
12/11/14Method relating to configurable storage device and adaptive storage device array
12/11/14Rebuilding data of a storage system
12/11/14Resource provisioning for electronic books
12/11/14Visualization-centric performance-based volume allocation
12/11/14Event driven adaptive user interface
12/11/14Remote debugging in a cloud computing environment
12/11/14Reducing application startup time by optimizing spatial locality of instructions in executables
12/11/14Planning execution of tasks with dependency resolution
12/04/14Scalable panel cooling system
12/04/14Temperature triggering ejector mechanism for lock pin soldering type component
12/04/14Replacement gate self-aligned carbon nanostructure transistor
12/04/14Heterojunction light emitting diode
12/04/14Semiconductor device and method of forming the device by forming monocrystalline semiconductor layers on a dielectric layer over isolation regions
12/04/14Lateral bipolar transistors having partially-depleted intrinsic base
12/04/14Self-aligned bottom-gated graphene devices
12/04/14Local interconnects by metal-iii-v alloy wiring in semi-insulating iii-v substrates
12/04/14Self-aligned bottom-gated graphene devices
12/04/14Self-aligned gate electrode diffusion barriers
12/04/14Multi-orientation semiconductor devices employing directed self-assembly
12/04/14Tone inversion of self-assembled self-aligned structures
12/04/14Silicidation blocking process using optically sensitive hsq resist and organic planarizing layer
12/04/14Manganese oxide hard mask for etching dielectric materials
12/04/14Self-selected variable power integrated circuit
12/04/14Authenticating and tracking a valuable asset within the confines of a safe
12/04/14System and method for verifying patient compliance
12/04/14System and method for verifying patient compliance
12/04/14Location info-graphics visualizations
12/04/14Distributed k-core view materialization and maintenance for graphs
12/04/14Controlling automotive rear-view mirror based on eye movement
12/04/14Electronic circuit device with electromagnetic clock signal conveyed along cooling fluid conduit network
12/04/14Link aggregation based on virtual interfaces of vlans
12/04/14Sharing wireless traffic
12/04/14Decision feedback equalizer ('dfe') with a plurality of independently-controlled isolated power domains
12/04/14Fluid-cooled electronic circuit device with cooling fluid conduits having optical transmission medium
12/04/14Battery system for electrical devices
12/04/14Thermally assisted mram with a multilayer encapsulant for low thermal conductivity
12/04/14Wafer bonding misalignment reduction
12/04/14Multi-height finfets with coplanar topography
12/04/14Automated construction of ion-channel models in a multi-comparment models
12/04/14Pronunciation accuracy in speech recognition
12/04/14Hybrid predictive model for enhancing prosodic expressiveness
12/04/14Hybrid predictive model for enhancing prosodic expressiveness
12/04/14Healthcare managment
12/04/14Discovering task dependencies for incident management
12/04/14Asset management for a computer-based system using aggregated weights of changed assets
12/04/14Time-dependent reorder points in supply chain networks
12/04/14Illegal activity detection through interpersonal relationship resolution
12/04/14Detecting electricity theft via meter tampering using statistical methods
12/04/14De-duplication with partitioning advice and automation
12/04/14Managing a multi-version database
12/04/14De-duplication deployment planning
12/04/14Deduplication for a storage system
12/04/14Managing a multi-version database
12/04/14Optimizing query statements in relational databases
12/04/14Eigenvalue-based data query
12/04/14Entity integration using high-level scripting languages
12/04/14Information retrieval from a database system
12/04/14Natural language processing (nlp) query formulation engine for a computing device
12/04/14Implementing synchronization of state information betweeen instances of an application as well as between different applications in an efficient, scalable manner
12/04/14Providing access to a resource for a computer from within a restricted network
12/04/14Differentiation of messages for receivers thereof
12/04/14Differentiation of messages for receivers thereof
12/04/14High performance, distributed, shared, data grid for distributed java virtual machine runtime artifacts
12/04/14Coordinating application migration processes
12/04/14Remote procedure call with call-by-reference semantics using remote direct memory access
12/04/14Comparison between different descriptions of a web service
12/04/14Synchronous extent migration protocol for paired storage
12/04/14Cache allocation in a computerized system
12/04/14Elastic auto-parallelization for stream processing applications
12/04/14Method for deriving a verification token from a credential
12/04/14Svc cluster configuration node failover
12/04/14Identifying anomalies in original metrics of a system
12/04/14Selective purging of a log structure
12/04/14Runtime dynamic performance skew elimination
12/04/14Storage integrity validator
12/04/14Structured placement of hierarchical soft blocks during physical synthesis of an integrated circuit
12/04/14Power delivery network analysis
12/04/14Using hardware transactional memory for implementation of queue operations
12/04/14Dynamic image composition method employing fenced applications
12/04/14Using hardware transactional memory for implementation of queue operations
12/04/14Processing data by using simultaneous multithreading
12/04/14Integrated link-based data recorder for semiconductor chip
12/04/14Policy enforcement using natural language processing
12/04/14Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
12/04/14Voice based biometric authentication method and apparatus
12/04/14Fraudulent data detector
12/04/14Optimizing test data payload selection for testing computer software applications via computer networks
11/27/14Manufacturing a product using a soldering process
11/27/14Contact metallurgy for self-aligned high electron mobility transistor
11/27/14Elemental semiconductor material contactfor high electron mobility transistor
11/27/14Semiconductor device including embedded crystalline back-gate bias planes, related design structure and method of fabrication
11/27/14Integrated circuit having mosfet with embedded stressor and method to fabricate same
11/27/14Integrated circuit having mosfet with embedded stressor and method to fabricate same
11/27/14Bulk semiconductor fins with self-aligned shallow trench isolation structures
11/27/14Detecting sudden changes in acceleration in semiconductor device or semiconductor packaging containing semiconductor device
11/27/14Non-lithographic hole pattern formation
11/27/14Fabricating a microelectronics lid using sol-gel processing
11/27/14Method of reconstructing electrical probes
11/27/14Controlling real-time compression detection
11/27/14Image scaling for images including low resolution text
11/27/14Integrating street view with live video data
11/27/14Apparatus, system, and method for optimally positioning an idle robotic accessor in a tape library
11/27/14Rate adaptive transmission of wireless broadcast packets
11/27/14Apparatus, method and program product for seamless wifi network transitions
11/27/14Techniques for medical image retreival
11/27/14Auto-maintained document classification
11/27/14Non-lithographic line pattern formation
11/27/14Elemental semiconductor material contact for high electron mobility transistor
11/27/14Complementary metal oxide semiconductor (cmos) device having gate structures connected by a metal gate conductor
11/27/14Method, apparatus and computer program product providing performance and energy optimization for mobile computing
11/27/14System and method for the calibration and verification of wireless networks with control network
11/27/14Device, method, and program for crash simulation
11/27/14Providing best practice workflow to aid user in completing project that is constantly updated based on user feedback
11/27/14Providing best practice workflow to aid user in completing project that is constantly updated based on user feedback
11/27/14Estimating the total sales over streaming bids
11/27/14Estimating the total sales over streaming bids
11/27/14Extrapolating user actions
11/27/14Extrapolating user actions
11/27/14Directional filmstrip display in street view
11/27/14Providing a lease period determination
11/27/14Distributed feature collection and correlation engine
11/27/14Distributed feature collection and correlation engine
11/27/14Low overhead contention-based switching between ticket lock and queued lock
11/27/14Text-based command generation
11/27/14Document classification system with user-defined rules
11/27/14Contributor identification tool
11/27/14Simplification of large networks and graphs
11/27/14Calculating node centralities in large networks and graphs
11/27/14Opening a data set
11/27/14Techniques for medical image retreival
11/27/14Calculating node centralities in large networks and graphs
11/27/14Method, apparatus and computer program product providing performance and energy optimization for mobile computing
11/27/14Method and system for transmitting an application message between nodes of a clustered data processing system
11/27/14Sharing web application sessions across multiple devices
11/27/14Utilizing augmented reality for locating computer hardware associated to a reported incident
11/27/14Endpoint management based on endpoint type
11/27/14Selecting between domain name system servers of a plurality of networks
11/27/14Characterizing statistical time-bounded incident management systems
11/27/14Endpoint management based on endpoint type
11/27/14Broadcast for a distributed switch network
11/27/14Providing data attributes to a storage manager to use to select a storage tier to use for a data set management operation
11/27/14Providing data attributes to a storage manager to use to select a storage tier to use for a data set management operation
11/27/14Validation of cache locking using instruction fetch and execution
11/27/14Linked list for lock-free memory allocation
11/27/14Minimizing destaging conflicts
11/27/14Parallel processes for performing multiple incremental copies
11/27/14Recovery from failure of primary storage volumes by using mirrored data maintained with host timestamps
11/27/14Mapping a source workload pattern for a source storage system to a target workload pattern for a target storage system
11/27/14Simplification of large networks and graphs
11/27/14Minimizing delay periods when accessing mirrored disks
11/27/14Storage device with error recovery indication
11/27/14Executing a kernel device driver as a user space process
11/27/14Managing diagnostic information
11/27/14Outputting fault data for a hardware device
11/27/14Testing an integrated circuit
11/27/14Treemap perspective manipulation
11/27/14Treemap perspective manipulation
11/27/14Content navigation having a selection function and visual indicator thereof
11/27/14Characterizing tsv structures in a semiconductor chip stack
11/27/14Prioritizing test cases using multiple variables
11/27/14Error injection into the leaf functions of call graphs
11/27/14Strategic placement of jobs for spatial elasticity in a high-performance computing environment
11/27/14Controlling software processes that are subject to communications restrictions
11/27/14Strategic placement of jobs for spatial elasticity in a high-performance computing environment
11/27/14Executing a kernel device driver as a user space process
11/27/14Targeted sequencing of biomolecules by pulling through a liquid-liquid interface with an atomic force microscope
11/20/14Solid state storage media cartridge
11/20/14Elemental semiconductor material contact for high indium content ingan light emitting diodes
11/20/14Elemental semiconductor material contact for gan-based light emitting diodes
11/20/14Formation of large scale single crystalline graphene
11/20/14Stacked semiconductor nanowires with tunnel spacers
11/20/14Alternating open-ended via chains for testing via formation and dielectric integrity
11/20/14Stacked semiconductor nanowires with tunnel spacers
11/20/14Integrating channel sige into pfet structures
11/20/14Finfet type device using ldmos
11/20/14Under ball metallurgy (ubm) for improved electromigration
11/20/14Crowd movement prediction using optical flow algorithm
11/20/14Graphical user interface for efficiently visualizing multiple messages of different severities in a tabular format
11/20/14Direct current ground fault interrupter
11/20/14Formation of large scale single crystalline graphene
11/20/14Pervasive training over different locations or devices as a function of presence
11/20/14Elemental semiconductor material contact for high indium content ingan light emitting diodes
11/20/14Elemental semiconductor material contact for gan-based light emitting diodes
11/20/14High speed network cable transceiver connector
11/20/14Social network based wi-fi connectivity
11/20/14Resin composition eliminating volatile loss of initiating species for the preparation of printed circuit board laminates
11/20/14Detect driver persona in a vehicle
11/20/14Using pass code verification to organize a vehicle caravan
11/20/14Analyzing documents corresponding to demographics
11/20/14Information technology optimization via real-time analytics
11/20/14Analytics based service catalog management
11/20/14Annotation-based voting for e-readers and social networking enabled browsers
11/20/14Automated guidance for selecting components of an it solution
11/20/14Dynamically modifying workload patterns in a cloud
11/20/14Adaptive cataclysms in genetic algorithms
11/20/14Adaptive cataclysms in genetic algorithms
11/20/14Providing transposable access to a synapse array using column aggregation
11/20/14Verifying legitimate followers in social networks
11/20/14Intelligent indexing
11/20/14Detecting a preferred implementation of an operation
11/20/14Two-directional biometric matching
11/20/14Data clustering and user modeling for next-best-action decisions
11/20/14Population of context-based data gravity wells
11/20/14Efficient logging of processing peaks in control systems
11/20/14Optimizing storage in a publish / subscribe environment
11/20/14Data collection and distribution management
11/20/14Communication system employing subnet or prefix to determine connection to same network segment
11/20/14Annotation-based voting for e-readers and social networking enabled browsers
11/20/14Orchestration of electronic meetings
11/20/14Displaying user's desired content based on priority during loading process
11/20/14Relevant commentary for media content
11/20/14Communication traffic management
11/20/14Orchestration of electronic meetings
11/20/14Electronic mail read receipt processing
11/20/14Establishing social network connections
11/20/14Embedding actionable content in electronic communication
11/20/14Embedding actionable content in electronic communication
11/20/14Managing network utility of applications on cloud data centers
11/20/14Adaptive data collection
11/20/14Auto-switching interfaces to device subsystems
11/20/14Metadata management
11/20/14Accidental shared volume erasure prevention
11/20/14Cluster families for cluster selection and cooperative replication
11/20/14Systems and methods for virtualizing storage systems and managing data independently
11/20/14Stored data analysis
11/20/14Decrypting files for data leakage protection in an enterprise network
11/20/14Remotely awakening an electronic device
11/20/14Certification of non-native data layout in a managed runtime system
11/20/14Arranging data handling in a computer-implemented system in accordance with reliability ratings based on reverse predictive failure analysis in response to changes
11/20/14Webpage display system leveraging osgi
11/20/14Temporal promotion of content to a project activity
11/20/14Project modeling using iterative variable defect forecasts
11/20/14Project modeling using iterative variable defect forecasts
11/20/14Declarative configuration and execution of card content management operations for trusted service manager
11/20/14Controlling access to variables protected by an alias during a debugging session
11/20/14Automatic generation of a resource reconfiguring test
11/20/14Step over operation for machine code function calls
11/20/14Evaluation of statement-level breakpoints
11/20/14Dynamically modifying workload patterns in a cloud
11/20/14Scheduling homogeneous and heterogeneous workloads with runtime elasticity in a parallel processing environment
11/20/14Interruption of chip component managing tasks
11/20/14Assigning levels of pools of resources to a super process having sub-processes
11/20/14System and method for real-time new event detection on video streams
11/20/14Inheriting social network information
11/20/14Firewall based botnet detection
11/20/14Software vulnerability notification via icon decorations
11/20/14Progressive static security analysis
11/20/14Progressive static security analysis
11/20/14Automated management of private information
11/20/14Solid state storage media cartridge
11/20/14Elemental semiconductor material contact for high indium content ingan light emitting diodes
11/20/14Elemental semiconductor material contact for gan-based light emitting diodes
11/20/14Formation of large scale single crystalline graphene
11/20/14Stacked semiconductor nanowires with tunnel spacers
11/20/14Alternating open-ended via chains for testing via formation and dielectric integrity
11/20/14Stacked semiconductor nanowires with tunnel spacers
11/20/14Integrating channel sige into pfet structures
11/20/14Finfet type device using ldmos
11/20/14Under ball metallurgy (ubm) for improved electromigration
11/20/14Crowd movement prediction using optical flow algorithm
11/20/14Graphical user interface for efficiently visualizing multiple messages of different severities in a tabular format
11/20/14Direct current ground fault interrupter
11/20/14Formation of large scale single crystalline graphene
11/20/14Pervasive training over different locations or devices as a function of presence
11/20/14Elemental semiconductor material contact for high indium content ingan light emitting diodes
11/20/14Elemental semiconductor material contact for gan-based light emitting diodes
11/20/14High speed network cable transceiver connector
11/20/14Social network based wi-fi connectivity
11/20/14Resin composition eliminating volatile loss of initiating species for the preparation of printed circuit board laminates
11/20/14Detect driver persona in a vehicle
11/20/14Using pass code verification to organize a vehicle caravan
11/20/14Analyzing documents corresponding to demographics
11/20/14Information technology optimization via real-time analytics
11/20/14Analytics based service catalog management
11/20/14Annotation-based voting for e-readers and social networking enabled browsers
11/20/14Automated guidance for selecting components of an it solution
11/20/14Dynamically modifying workload patterns in a cloud
11/20/14Adaptive cataclysms in genetic algorithms
11/20/14Adaptive cataclysms in genetic algorithms
11/20/14Providing transposable access to a synapse array using column aggregation
11/20/14Verifying legitimate followers in social networks
11/20/14Intelligent indexing
11/20/14Detecting a preferred implementation of an operation
11/20/14Two-directional biometric matching
11/20/14Data clustering and user modeling for next-best-action decisions
11/20/14Population of context-based data gravity wells
11/20/14Efficient logging of processing peaks in control systems
11/20/14Optimizing storage in a publish / subscribe environment
11/20/14Data collection and distribution management
11/20/14Communication system employing subnet or prefix to determine connection to same network segment
11/20/14Annotation-based voting for e-readers and social networking enabled browsers
11/20/14Orchestration of electronic meetings
11/20/14Displaying user's desired content based on priority during loading process
11/20/14Relevant commentary for media content
11/20/14Communication traffic management
11/20/14Orchestration of electronic meetings
11/20/14Electronic mail read receipt processing
11/20/14Establishing social network connections
11/20/14Embedding actionable content in electronic communication
11/20/14Embedding actionable content in electronic communication
11/20/14Managing network utility of applications on cloud data centers
11/20/14Adaptive data collection
11/20/14Auto-switching interfaces to device subsystems
11/20/14Metadata management
11/20/14Accidental shared volume erasure prevention
11/20/14Cluster families for cluster selection and cooperative replication
11/20/14Systems and methods for virtualizing storage systems and managing data independently
11/20/14Stored data analysis
11/20/14Decrypting files for data leakage protection in an enterprise network
11/20/14Remotely awakening an electronic device
11/20/14Certification of non-native data layout in a managed runtime system
11/20/14Arranging data handling in a computer-implemented system in accordance with reliability ratings based on reverse predictive failure analysis in response to changes
11/20/14Webpage display system leveraging osgi
11/20/14Temporal promotion of content to a project activity
11/20/14Project modeling using iterative variable defect forecasts
11/20/14Project modeling using iterative variable defect forecasts
11/20/14Declarative configuration and execution of card content management operations for trusted service manager
11/20/14Controlling access to variables protected by an alias during a debugging session
11/20/14Automatic generation of a resource reconfiguring test
11/20/14Step over operation for machine code function calls
11/20/14Evaluation of statement-level breakpoints
11/20/14Dynamically modifying workload patterns in a cloud
11/20/14Scheduling homogeneous and heterogeneous workloads with runtime elasticity in a parallel processing environment
11/20/14Interruption of chip component managing tasks
11/20/14Assigning levels of pools of resources to a super process having sub-processes
11/20/14System and method for real-time new event detection on video streams
11/20/14Inheriting social network information
11/20/14Firewall based botnet detection
11/20/14Software vulnerability notification via icon decorations
11/20/14Progressive static security analysis
11/20/14Progressive static security analysis
11/20/14Automated management of private information
11/13/14Graphene photodetector
11/13/14Temporary liquid thermal interface material for surface tension adhesion and thermal control
11/13/14Semiconductor device including finfet and diode having reduced defects in depletion region
11/13/14Reduced short channel effect of iii-v field effect transistor via oxidizing aluminum-rich underlayer
11/13/14Reduced short channel effect of iii-v field effect transistor via oxidizing aluminum-rich underlayer
11/13/14Stacked carbon-based fets
11/13/14Fin structure with varying isolation thickness
11/13/14Stacked carbon-based fets
11/13/14Semiconductor device including finfet structures with varied epitaxial regions, related method and design structure
11/13/14Stringer-free gate electrode for a suspended semiconductor fin
11/13/14Stringer-free gate electrode for a suspended semiconductor fin
11/13/14Low extension resistance iii-v compound fin field effect transistor
11/13/14Integrated circuit having raised source drains devices with reduced silicide contact resistance and methods to fabricate same
11/13/14Micro-electro-mechanical system (mems) structures and design structures
11/13/14E-fuse with hybrid metallization
11/13/14E-fuse with hybrid metallization
11/13/14Self-aligned bipolar junction transistor having self-planarizing isolation raised base structures
11/13/14Forming semiconductor chip connections
11/13/14Interconnect structures containing nitrided metallic residues
11/13/14Interconnect with hybrid metallization
11/13/14Interconnect structures containing nitrided metallic residues
11/13/14High performance refractory metal / copper interconnects to eliminate electromigration
11/13/14Inline measurement of through-silicon via depth
11/13/14Random extraction from compressed data
11/13/14Interpreting texture in support of mobile commerce and mobility
11/13/14Quasi-statically oriented head for recording non-legacy formats
11/13/14Magnetic write head having electrically biasable structures
11/13/14Reference voltage modification in a memory device
11/13/14Prioritizing refreshes in a memory device
11/13/14Implementing redundancy on infiniband (ib) networks
11/13/14Infrastructure assessment via imaging sources
11/13/14Graphene photodetector
11/13/14Low extension resistance iii-v compound fin field effect transistor
11/13/14Chat interaction between mobile phone and non-mobile phone devices
11/13/14Automating predictive maintenance for automobiles
11/13/14Interactive acquisition of remote services
11/13/14Controlling language tense in electronic content
11/13/14Controlling language tense in electronic content
11/13/14Method, apparatus, and program for generating training speech data for target domain
11/13/14Managing support team inquiries
11/13/14Content recommendation based on uniqueness of individuals in target audience
11/13/14Generation of shipment tracking report using text analytics
11/13/14Ratings from communication sessions
11/13/14Recommending actions for social media engagements
11/13/14Upper merged ontology for it architecture
11/13/14Comparing database performance without benchmark workloads
11/13/14Informative communication history
11/13/14Providing answers to questions using multiple models to score candidate answers
11/13/14Methods and systems for discovery of linkage points between data sources
11/13/14Altering relevancy of a document and/or a search query
11/13/14Method, computer program and computer for detecting communities in social media
11/13/14Document tagging and retrieval using per-subject dictionaries including subject-determining-power scores for entries
11/13/14Managing support team inquiries
11/13/14Distributed multi-system management
11/13/14Partial match derivation using text analysis
11/13/14Managing file usage
11/13/14Query-driven virtual social network group
11/13/14Facilitation of social interactions
11/13/14Electronic mail delivery negotiation and rejection
11/13/14Historical context for communication
11/13/14Using the distance from a forum posting as criteria to selectively convey email notifications or not
11/13/14Snmp request processing within distributed device architecture
11/13/14Transferring services in a networked environment
11/13/14Location-based domain name system service discovery
11/13/14Execution of an instruction for performing a configuration virtual topology change
11/13/14Reducing false-positive errors in a software change-impact analysis
11/13/14Merging result from a parser in a network processor with result from an external coprocessor
11/13/14Presenting a link label for multiple hyperlinks
11/13/14Presenting a link label for multiple hyperlinks
11/13/14Graphical marking to indicate edited data
11/13/14Generating a user interface for activating multiple applications
11/13/14Optimized non-grid based navigation
11/13/14Representation and control of the scope of impact in inherited settings
11/13/14Generating test scripts through application integration
11/13/14Virtual machine deployment planning method and associated apparatus
11/13/14Termination of requests in a distributed coprocessor system
11/13/14Policy-based automated consent
11/13/14Evaluating security of data access statements
11/13/14Cross-platform authentication from within a rich client
11/13/14Facilitation of social interactions
11/06/14Techniques for fabricating janus sensors
11/06/14Printed circuit boards fabricated using congruent molds
11/06/14Techniques for fabricating janus sensors
11/06/14Interconnect structure and method of making same
11/06/14Integrated nanowire/nanosheet nanogap and nanopore for dna and rna sequencing
11/06/14Method to make dual material finfet on same substrate
11/06/14Raised source/drain and gate portion with dielectric spacer or air gap spacer
11/06/14Dual shallow trench isolation (sti) field effect transistor (fet) and methods of forming
11/06/14Finfet semiconductor device with a recessed liner that defines a fin height of the finfet device
11/06/14Finfet devices having recessed liner materials to define different fin heights
11/06/14Bipolar junction transistors with self-aligned terminals
11/06/14Trench isolation structures and methods for bipolar junction transistors
11/06/14Intelligent power strip
11/06/14Physical unclonable function generation and management
11/06/14Physical unclonable function generation and management
11/06/14Cable tracing in a datacenter
11/06/14Cable tracing in a datacenter
11/06/14Real-time advisor system with projected augmentable annotations
11/06/14Multifunctional sky camera system for total sky imaging and spectral radiance measurement
11/06/14Magnetic head having canted arrays
11/06/14Adjusting tension in a tape media to counter tape dimensional stability (tds) errors in a tape media
11/06/14Magnetic head and system having offset arrays
11/06/14Implementing computational memory from content-addressable memory
11/06/14Reduced stress high voltage word line driver
11/06/14Memory margin management
11/06/14Discovering network topology from routing information
11/06/14Virtual data center bridging exchange (vdcbx) protocol
11/06/14Analyzing and transmitting environmental sounds
11/06/14Summarizing salient events in unmanned aerial videos
11/06/14Providing location-relevant goal fulfillment recommendations while inside a non-residential location
11/06/14Fabricating a small-scale radiation detector
11/06/14Formation of semiconductor structures with variable gate lengths
11/06/14Method and system for simulation of online social network
11/06/14Verifying the terms of use for access to a service
11/06/14Performance driven municipal asset needs and sustainability analysis
11/06/14Application and service selection for optimized promotion
11/06/14Leveraging reader performance to provide a publication recommendation
11/06/14E-commerce system that allows for seller restrictions based on social media account characteristics
11/06/14Analytic solution integration
11/06/14Stochastic investment planning system
11/06/14Asset lifecycle management
11/06/14Stochastic investment planning system
11/06/14Asset lifecycle management
11/06/14Selecting strangers for information spreading on a social network
11/06/14Comparing markup language files
11/06/14Automating generation of messages in accordance with a standard
11/06/14Automatic suggestion for query-rewrite rules
11/06/14Retrieving information using a graphical query
11/06/14Retrieving information using a graphical query
11/06/14Tape drive system server
11/06/14Storing changes made toward a limit
11/06/14Comparing markup language files
11/06/14Document order management via relaxed node indexing
11/06/14Managing file transfer commands
11/06/14Comprehensive bottleneck detection in a multi-tier enterprise storage system
11/06/14System and method for brokering and provisioning in high-speed networks
11/06/14Enhanced command selection in a networked computing environment
11/06/14Intelligent power strip
11/06/14Selectively securing a hot-swappable data storage device to prevent data corruption
11/06/14Software performance by identifying and pre-loading data pages
11/06/14Recovering from uncorrected memory errors
11/06/14Application-directed memory de-duplication
11/06/14Dynamically adjusting power disturbance hold up times
11/06/14Node failure management
11/06/14Enabling remote debugging of virtual machines running in a cloud environment
11/06/14Enabling remote debugging of virtual machines running in a cloud environment
11/06/14Managing redundancy repair using boundary scans
11/06/14Document order management via binary tree projection
11/06/14Template based copy and paste function
11/06/14Analyzing sparse wiring areas of an integrated circuit design
11/06/14Detecting corresponding paths in combinationally equivalent circuit designs
11/06/14Analysis of source code changes
11/06/14Inserting implicit sequence points into computer program code to support debug operations
11/06/14Inserting implicit sequence points into computer program code to support debug operations
11/06/14Live application mobility from one operating system level to an updated operating system level
11/06/14Reconfiguring a snapshot of a virtual machine
11/06/14Context-aware permission control of hybrid mobile applications
11/06/14Authentication policy enforcement
11/06/14Abstracted authenticated client connectivity application programming interface (api)
11/06/14Context-aware permission control of hybrid mobile applications
11/06/14Secure isolation of tenant resources in a multi-tenant storage system using a gatekeeper
11/06/14Techniques for fabricating janus sensors
11/06/14Printed circuit boards fabricated using congruent molds
11/06/14Techniques for fabricating janus sensors
11/06/14Interconnect structure and method of making same
11/06/14Integrated nanowire/nanosheet nanogap and nanopore for dna and rna sequencing
11/06/14Method to make dual material finfet on same substrate
11/06/14Raised source/drain and gate portion with dielectric spacer or air gap spacer
11/06/14Dual shallow trench isolation (sti) field effect transistor (fet) and methods of forming
11/06/14Finfet semiconductor device with a recessed liner that defines a fin height of the finfet device
11/06/14Finfet devices having recessed liner materials to define different fin heights
11/06/14Bipolar junction transistors with self-aligned terminals
11/06/14Trench isolation structures and methods for bipolar junction transistors
11/06/14Intelligent power strip
11/06/14Physical unclonable function generation and management
11/06/14Physical unclonable function generation and management
11/06/14Cable tracing in a datacenter
11/06/14Cable tracing in a datacenter
11/06/14Real-time advisor system with projected augmentable annotations
11/06/14Multifunctional sky camera system for total sky imaging and spectral radiance measurement
11/06/14Magnetic head having canted arrays
11/06/14Adjusting tension in a tape media to counter tape dimensional stability (tds) errors in a tape media
11/06/14Magnetic head and system having offset arrays
11/06/14Implementing computational memory from content-addressable memory
11/06/14Reduced stress high voltage word line driver
11/06/14Memory margin management
11/06/14Discovering network topology from routing information
11/06/14Virtual data center bridging exchange (vdcbx) protocol
11/06/14Analyzing and transmitting environmental sounds
11/06/14Summarizing salient events in unmanned aerial videos
11/06/14Providing location-relevant goal fulfillment recommendations while inside a non-residential location
11/06/14Fabricating a small-scale radiation detector
11/06/14Formation of semiconductor structures with variable gate lengths
11/06/14Method and system for simulation of online social network
11/06/14Verifying the terms of use for access to a service
11/06/14Performance driven municipal asset needs and sustainability analysis
11/06/14Application and service selection for optimized promotion
11/06/14Leveraging reader performance to provide a publication recommendation
11/06/14E-commerce system that allows for seller restrictions based on social media account characteristics
11/06/14Analytic solution integration
11/06/14Stochastic investment planning system
11/06/14Asset lifecycle management
11/06/14Stochastic investment planning system
11/06/14Asset lifecycle management
11/06/14Selecting strangers for information spreading on a social network
11/06/14Comparing markup language files
11/06/14Automating generation of messages in accordance with a standard
11/06/14Automatic suggestion for query-rewrite rules
11/06/14Retrieving information using a graphical query
11/06/14Retrieving information using a graphical query
11/06/14Tape drive system server
11/06/14Storing changes made toward a limit
11/06/14Comparing markup language files
11/06/14Document order management via relaxed node indexing
11/06/14Managing file transfer commands
11/06/14Comprehensive bottleneck detection in a multi-tier enterprise storage system
11/06/14System and method for brokering and provisioning in high-speed networks
11/06/14Enhanced command selection in a networked computing environment
11/06/14Intelligent power strip
11/06/14Selectively securing a hot-swappable data storage device to prevent data corruption
11/06/14Software performance by identifying and pre-loading data pages
11/06/14Recovering from uncorrected memory errors
11/06/14Application-directed memory de-duplication
11/06/14Dynamically adjusting power disturbance hold up times
11/06/14Node failure management
11/06/14Enabling remote debugging of virtual machines running in a cloud environment
11/06/14Enabling remote debugging of virtual machines running in a cloud environment
11/06/14Managing redundancy repair using boundary scans
11/06/14Document order management via binary tree projection
11/06/14Template based copy and paste function
11/06/14Analyzing sparse wiring areas of an integrated circuit design
11/06/14Detecting corresponding paths in combinationally equivalent circuit designs
11/06/14Analysis of source code changes
11/06/14Inserting implicit sequence points into computer program code to support debug operations
11/06/14Inserting implicit sequence points into computer program code to support debug operations
11/06/14Live application mobility from one operating system level to an updated operating system level
11/06/14Reconfiguring a snapshot of a virtual machine
11/06/14Context-aware permission control of hybrid mobile applications
11/06/14Authentication policy enforcement
11/06/14Abstracted authenticated client connectivity application programming interface (api)
11/06/14Context-aware permission control of hybrid mobile applications
11/06/14Secure isolation of tenant resources in a multi-tenant storage system using a gatekeeper
10/30/14Silicon oxide nanopore wetting and stabilization by molecular coating
10/30/14Nanopore sensor for detecting molecular interactions
10/30/14Nanopore device for drug-like molecule screening or lead optimization to a targeted protein
10/30/14Nanopore sensor for detecting molecular interactions
10/30/14Carbon nanotube based nanoporous membranes
10/30/14Carbon nanotube based nanoporous membranes
10/30/14Accessing transaction documents
10/30/14Far back end of the line metallization method and structures
10/30/14Tsv structure with a built-in u-shaped fet transistor for improved characterization
10/30/14Programmable electrical fuse
10/30/14Hybrid graphene-metal interconnect structures
10/30/14Anticipatory implant for tsv
10/30/14Progressively sized digitally-controlled oscillator
10/30/14Text extraction from graphical user interface content
10/30/14Routing information processing method, computer program, and system
10/30/14Active matrix triode switch driver circuit
10/30/14Multifunctional sky camera system for total sky imaging and spectral radiance measurement
10/30/14Dynamically managing vehicle glass dimming
10/30/14Tape head with thermal tape-head distance sensor
10/30/14Multiple writers with reduced crosstalk
10/30/14Power distribution method, power distribution apparatus, and information handling system
10/30/14Electrical socket
10/30/14Reducing latencies through packet aggregation
10/30/14Home base station system and data access processing method thereof
10/30/14Parallel data processing
10/30/14Conference call authentication utilizing passcodes personal to users
10/30/14Managing social network distance in social networks using photographs
10/30/14Vertically curved waveguide
10/30/14Conference call authentication utilizing passcodes personal to users
10/30/14Trajectory-aware location-based hand-offs
10/30/14Responding to an unavailable communication target device
10/30/14Determining combinations of odors to produce a target olfactory pleasantness
10/30/14Safe distance determination
10/30/14Machine learning approach for analysis and prediction of cloud particle size and shape distribution
10/30/14Machine learning approach for analysis and prediction of cloud particle size and shape distribution
10/30/14Cross-domain data artifacts consolidation in model context
10/30/14Combined sewer overflow warning and prevention system
10/30/14Translation validation
10/30/14Assigning parts to storage locations in a warehouse
10/30/14Risk-limited dispatch of knowledge work
10/30/14Risk-limited dispatch of knowledge work
10/30/14Business process discovery using document tracking technologies
10/30/14Automated business function implementation analysis and adaptive transaction integration
10/30/14Business process discovery using document tracking technologies
10/30/14Expedited process execution using probabilities
10/30/14System and method for modeling and forecasting cyclical demand systems with dynamic controls and dynamic incentives
10/30/14Using real-time online analytics to automatically generate an appropriate measurement scale
10/30/14Simultaneous retail and transfer price optimizations
10/30/14Analysis and annotation of interactions obtained from network traffic
10/30/14Analysis and annotation of interactions obtained from network traffic
10/30/14Multi-dimensional surface-based bid matching
10/30/14Maximizing the utility of information in multiple intersecting data structures using platonic solids and related polyhedra and polytopes
10/30/14Expedited process execution using probabilities
10/30/14Techniques for managing a data replication mode
10/30/14Data management
10/30/14Extending document editors to assimilate documents returned by a search engine
10/30/14Dynamic assignment of business logic based on schema mapping metadata
10/30/14Method, program, and system for classification of system log
10/30/14Management of a database system
10/30/14Management of a database system
10/30/14Data driven parallel sorting system and method
10/30/14Guaranteeing anonymity of linked data graphs
10/30/14Reclamation of empty pages in database tables
10/30/14Determining combinations of odors to produce a target olfactory pleasantness
10/30/14Instant message routing and multi-machine log-on management
10/30/14Rdma-optimized high-performance distributed cache
10/30/14Maximizing throughput of streaming media by simultaneously connecting to streaming media server over multiple independent network connections
10/30/14Maximizing throughput of streaming media by simultaneously connecting to streaming media server over multiple independent network connections
10/30/14Intelligent adaptation of mobile applications based on constraints and contexts
10/30/14Robust service deployment
10/30/14Content delivery infrastructure with non-intentional feedback parameter provisioning
10/30/14High throughput hardware acceleration using pre-staging buffers
10/30/14Memory system and method for operating a memory system
10/30/14Automatic creation, deployment, and upgrade of disk images
10/30/14Input/output de-duplication based on variable-size chunks
10/30/14Managing global cache coherency in a distributed shared caching for clustered file systems
10/30/14Cross-partition shared memory attach for data processing environment
10/30/14Invalidating a range of two or more translation table entries and instruction therefore
10/30/14Heap management using dynamic memory allocation
10/30/14Simultaneous finish of stores and dependent loads
10/30/14Distribution of encrypted information in multiple locations
10/30/14Automatic generation of actionable recommendations from problem reports
10/30/14Controlling data storage in an array of storage devices
10/30/14System, method and program for estimating risk of disaster in infrastructure
10/30/14Read-detection in multi-level cell memory
10/30/14Reliable multicast broadcast in wireless networks
10/30/14Method and system for scrubbing data within a data storage subsystem
10/30/14Replacing problem web links using context information
10/30/14Active & efficient monitoring of a graphical user interface
10/30/14Applying contextual function to a graphical user interface using peripheral menu tabs
10/30/14Referencing and synchronization of email threads into integrated development environment (ide)
10/30/14Generating test scripts through application integration
10/30/14Techniques for testing software
10/30/14Selective speculative class-based optimization
10/30/14Selective speculative class-based optimization
10/30/14Bandwidth-efficient virtual machine image delivery
10/30/14Bandwidth-efficient virtual machine image delivery
10/30/14Dynamic configuration of virtual appliances
10/30/14Variable wait time in an asynchronous call-back system
10/30/14Method and system for allocating resources to tasks in a build process
10/30/14File system level data protection during potential security breach
10/30/14Automatic recovery of license key information
10/30/14Guaranteeing anonymity of linked data graphs
10/30/14Silicon oxide nanopore wetting and stabilization by molecular coating
10/30/14Nanopore sensor for detecting molecular interactions
10/30/14Nanopore device for drug-like molecule screening or lead optimization to a targeted protein
10/30/14Nanopore sensor for detecting molecular interactions
10/30/14Carbon nanotube based nanoporous membranes
10/30/14Carbon nanotube based nanoporous membranes
10/30/14Accessing transaction documents
10/30/14Far back end of the line metallization method and structures
10/30/14Tsv structure with a built-in u-shaped fet transistor for improved characterization
10/30/14Programmable electrical fuse
10/30/14Hybrid graphene-metal interconnect structures
10/30/14Anticipatory implant for tsv
10/30/14Progressively sized digitally-controlled oscillator
10/30/14Text extraction from graphical user interface content
10/30/14Routing information processing method, computer program, and system
10/30/14Active matrix triode switch driver circuit
10/30/14Multifunctional sky camera system for total sky imaging and spectral radiance measurement
10/30/14Dynamically managing vehicle glass dimming
10/30/14Tape head with thermal tape-head distance sensor
10/30/14Multiple writers with reduced crosstalk
10/30/14Power distribution method, power distribution apparatus, and information handling system
10/30/14Electrical socket
10/30/14Reducing latencies through packet aggregation
10/30/14Home base station system and data access processing method thereof
10/30/14Parallel data processing
10/30/14Conference call authentication utilizing passcodes personal to users
10/30/14Managing social network distance in social networks using photographs
10/30/14Vertically curved waveguide
10/30/14Conference call authentication utilizing passcodes personal to users
10/30/14Trajectory-aware location-based hand-offs
10/30/14Responding to an unavailable communication target device
10/30/14Determining combinations of odors to produce a target olfactory pleasantness
10/30/14Safe distance determination
10/30/14Machine learning approach for analysis and prediction of cloud particle size and shape distribution
10/30/14Machine learning approach for analysis and prediction of cloud particle size and shape distribution
10/30/14Cross-domain data artifacts consolidation in model context
10/30/14Combined sewer overflow warning and prevention system
10/30/14Translation validation
10/30/14Assigning parts to storage locations in a warehouse
10/30/14Risk-limited dispatch of knowledge work
10/30/14Risk-limited dispatch of knowledge work
10/30/14Business process discovery using document tracking technologies
10/30/14Automated business function implementation analysis and adaptive transaction integration
10/30/14Business process discovery using document tracking technologies
10/30/14Expedited process execution using probabilities
10/30/14System and method for modeling and forecasting cyclical demand systems with dynamic controls and dynamic incentives
10/30/14Using real-time online analytics to automatically generate an appropriate measurement scale
10/30/14Simultaneous retail and transfer price optimizations
10/30/14Analysis and annotation of interactions obtained from network traffic
10/30/14Analysis and annotation of interactions obtained from network traffic
10/30/14Multi-dimensional surface-based bid matching
10/30/14Maximizing the utility of information in multiple intersecting data structures using platonic solids and related polyhedra and polytopes
10/30/14Expedited process execution using probabilities
10/30/14Techniques for managing a data replication mode
10/30/14Data management
10/30/14Extending document editors to assimilate documents returned by a search engine
10/30/14Dynamic assignment of business logic based on schema mapping metadata
10/30/14Method, program, and system for classification of system log
10/30/14Management of a database system
10/30/14Management of a database system
10/30/14Data driven parallel sorting system and method
10/30/14Guaranteeing anonymity of linked data graphs
10/30/14Reclamation of empty pages in database tables
10/30/14Determining combinations of odors to produce a target olfactory pleasantness
10/30/14Instant message routing and multi-machine log-on management
10/30/14Rdma-optimized high-performance distributed cache
10/30/14Maximizing throughput of streaming media by simultaneously connecting to streaming media server over multiple independent network connections
10/30/14Maximizing throughput of streaming media by simultaneously connecting to streaming media server over multiple independent network connections
10/30/14Intelligent adaptation of mobile applications based on constraints and contexts
10/30/14Robust service deployment
10/30/14Content delivery infrastructure with non-intentional feedback parameter provisioning
10/30/14High throughput hardware acceleration using pre-staging buffers
10/30/14Memory system and method for operating a memory system
10/30/14Automatic creation, deployment, and upgrade of disk images
10/30/14Input/output de-duplication based on variable-size chunks
10/30/14Managing global cache coherency in a distributed shared caching for clustered file systems
10/30/14Cross-partition shared memory attach for data processing environment
10/30/14Invalidating a range of two or more translation table entries and instruction therefore
10/30/14Heap management using dynamic memory allocation
10/30/14Simultaneous finish of stores and dependent loads
10/30/14Distribution of encrypted information in multiple locations
10/30/14Automatic generation of actionable recommendations from problem reports
10/30/14Controlling data storage in an array of storage devices
10/30/14System, method and program for estimating risk of disaster in infrastructure
10/30/14Read-detection in multi-level cell memory
10/30/14Reliable multicast broadcast in wireless networks
10/30/14Method and system for scrubbing data within a data storage subsystem
10/30/14Replacing problem web links using context information
10/30/14Active & efficient monitoring of a graphical user interface
10/30/14Applying contextual function to a graphical user interface using peripheral menu tabs
10/30/14Referencing and synchronization of email threads into integrated development environment (ide)
10/30/14Generating test scripts through application integration
10/30/14Techniques for testing software
10/30/14Selective speculative class-based optimization
10/30/14Selective speculative class-based optimization
10/30/14Bandwidth-efficient virtual machine image delivery
10/30/14Bandwidth-efficient virtual machine image delivery
10/30/14Dynamic configuration of virtual appliances
10/30/14Variable wait time in an asynchronous call-back system
10/30/14Method and system for allocating resources to tasks in a build process
10/30/14File system level data protection during potential security breach
10/30/14Automatic recovery of license key information
10/30/14Guaranteeing anonymity of linked data graphs
10/23/14Status indicating retractable connection label assembly
10/23/14Fabrication of tunneling junction for nanopore dna sequencing
10/23/14Substrate holder assembly for controlled layer transfer
10/23/14Controlling the transport of a tape within a tape transport system
10/23/14Colorimetric radiation dosimetry based on functional polymer and nanoparticle hybrid
10/23/14Titanium-nitride removal
10/23/14Self-aligned borderless contacts using a photo-patternable dielectric material as a replacement contact
10/23/14Self-aligned borderless contacts using a photo-patternable dielectric material as a replacement contact
10/23/14Non-volatile memory device integrated with cmos soi fet on a single chip
10/23/14Self aligned embedded gate carbon transistors
10/23/14Self aligned embedded gate carbon transistors
10/23/14Finfet devices containing merged epitaxial fin-containing contact regions
10/23/14Finfet devices containing merged epitaxial fin-containing contact regions
10/23/146t sram architecture for gate-all-around nanowire devices
10/23/14Contact structure employing a self-aligned gate cap
10/23/14Through-vias for wiring layers of semiconductor devices
10/23/14Through-vias for wiring layers of semiconductor devices
10/23/14Substrate holder assembly for controlled layer transfer
10/23/14Computer system component bay
10/23/14Tunable interconnect structures, and integrated circuit containing the same
10/23/14Providing user controlled ability to determine data level of detail in a graph
10/23/14Display of photographic attributes related to a geographic location
10/23/14Data writing method and program for tape drive
10/23/14Overlay network priority inheritance
10/23/14Automated essay evaluation system
10/23/14Colorimetric radiation dosimetry based on functional polymer and nanoparticle hybrid
10/23/146t sram architecture for gate-all-around nanowire devices
10/23/14Contact structure employing a self-aligned gate cap
10/23/14Crack control for substrate separation
10/23/14Grapho-epitaxy dsa process with dimension control of template pattern
10/23/14Millimeter wave phase shifters using tunable transmission lines
10/23/14Recording and playing back portions of a telephone call
10/23/14Positioning system in a wireless communication network
10/23/14Sibling lot processing
10/23/14Cooling system management
10/23/14Control system for indicating if people can reach locations that satisfy a predetermined set of conditions and requirements
10/23/14Control system for indicating if people can reach locations that satisfy a predetermined set of conditions and requirements
10/23/14Data processing system with real-time data center air flow simulator
10/23/14Power noise histogram of a computer system
10/23/14Preventing frustration in online chat communication
10/23/14Preventing frustration in online chat communication
10/23/14Estimating financial risk based on non-financial data
10/23/14Cross-channel analytics combining consumer activity on the web and in physical venues
10/23/14Predicting customer receptivity for commercial engagement
10/23/14Virtual business process
10/23/14Common conditions for past projects as evidence for success causes
10/23/14Tax code determination
10/23/14Estimating financial risk based on non-financial data
10/23/14Mobile device transaction method and system
10/23/14Predictive and descriptive analysis on relations graphs with heterogeneous entities
10/23/14Predictive and descriptive analysis on relations graphs with heterogeneous entities
10/23/14Method and system for scoring data in a database
10/23/14Ensuring access to long-term stored electronic documents
10/23/14Data de-duplication
10/23/14Indexing of significant media granulars
10/23/14Weighted transaction priority based dynamically upon phase of transaction completion
10/23/14Context aware dynamic sentiment analysis
10/23/14Context aware dynamic sentiment analysis
10/23/14Supporting acquisition of information
10/23/14Indexing of significant media granulars
10/23/14Reconfiguring an operator graph based on attribute usage
10/23/14Exiting windowing early for stream computing
10/23/14Exiting windowing early for stream computing
10/23/14Processing data loads
10/23/14Matching pattern combinations via fast array comparison
10/23/14Workload placement in a computer system
10/23/14Event determination and template-based invitation generation
10/23/14Correlating messaging text to business objects for business object integration into messaging
10/23/14Indexing a messaging session for business object integration into messaging
10/23/14Local direct storage class memory access
10/23/14Selective content delivery in a real-time streaming environment
10/23/14Identity management in a networked computing environment
10/23/14Identification of consumers based on a unique device id
10/23/14Runtime tuple attribute compression
10/23/14Compile-time tuple attribute compression
10/23/14Local direct storage class memory access
10/23/14Clustered file system caching
10/23/14Provisioning of operating systems to user terminals
10/23/14Method and apparatus for testing a storage system
10/23/14Prioritizing backups on a disk level within enterprise storage
10/23/14Apparatus and method for allocating processing requests
10/23/14Pretest setup planning
10/23/14Implementing ecc redundancy using reconfigurable logic blocks
10/23/14Displaying a document file
10/23/14Display of user comments to timed presentation
10/23/14Split transcript view for business object integration into messaging
10/23/14Automating the analysis of application lifecycle management data for software developement
10/23/14Automating the analysis of application lifecycle management data for software development
10/23/14Graphical user interface debugger with user defined interest points
10/23/14Method for optimizing binary code in language having access to binary coded decimal variable, and computer and computer program
10/23/14Ensuring access to long-term stored electronic documents
10/23/14Extending infrastructure security to services in a cloud computing environment
10/23/14Providing a domain to ip address reputation service
10/23/14Partitioning of program analyses into sub-analyses using dynamic hints
10/23/14Partitioning of program analyses into sub-analyses using dynamic hints
10/16/14Processing requests for services in a service request at a receiving controller and processing controller in a switch
10/16/14Grating edge coupler and method of forming same
10/16/14Split bezel hinge in a double dense blade server
10/16/14Air-flow sensor for adapter slots in a data processing system
10/16/14Protective insulating layer and chemical mechanical polishing for polycrystalline thin film solar cells
10/16/14Self-aligned structure for bulk finfet
10/16/14Tapered fin field effect transistor
10/16/14Self-aligned structure for bulk finfet
10/16/14Dual silicide process compatible with replacement-metal-gate
10/16/14Dual silicide process compatible with replacement-metal-gate
10/16/14Protective insulating layer and chemical mechanical polishing for polycrystalline thin film solar cells
10/16/14Reliable back-side-metal structure
10/16/14Intelligent over-current prevention
10/16/14Battery circuit fault protection in uninterruptable power sources
10/16/14Split bezel hinge in a double dense blade server
10/16/14Separable and integrated heat sinks facilitating cooling multi-compnent electronic assembly
10/16/14Integrated circuit package for heat dissipation
10/16/14Latching cam handle assembly for securing mated circuit boards
10/16/14Virtual enhanced transmission selection (vets) for lossless ethernet
10/16/14Flow control credits for priority in lossless ethernet
10/16/14Software implementation of network switch/router
10/16/14Resource sharing among multiple service providers in a wireless network cloud
10/16/14Resource sharing among multiple service providers in a wireless network cloud
10/16/14Determining images having unidentifiable license plates
10/16/14Techniques for generating a representative image and radiographic interpretation information for a case
10/16/14Automated application interaction using a virtual operator
10/16/14Grating edge coupler and method of forming same
10/16/14Micro-electro-mechanical system (mems) structures and design structures
10/16/14Self-limiting selective epitaxy process for preventing merger of semiconductor fins
10/16/14Tapered fin field effect transistor
10/16/14Replacement gate integration scheme employing multiple types of disposable gate structures
10/16/14Hydroxyl group termination for nucleation of a dielectric metallic oxide
10/16/14Analysis of pedestrian congestion
10/16/14Performing-time-series based predictions with projection thresholds using secondary time-series-based information stream
10/16/14Generating a regular expression for entity extraction
10/16/14Optimizing generation of a regular expression
10/16/14Prevention of unintended distribution of audio information
10/16/14Prevention of unintended distribution of audio information
10/16/14Using crowdsourcing for problem determination
10/16/14Methods and apparatus for project portfolio management
10/16/14Methods and apparatus for project portfolio management
10/16/14Using crowdsourcing for problem determination
10/16/14Pricing personalized packages with multiple commodities
10/16/14Pricing personalized packages with multiple commodities
10/16/14Coordinated business rules management and mixed integer programming
10/16/14Coordinated business rules management and mixed integer programming
10/16/14E-commerce system that allows for seller geographic restrictions
10/16/14Dynamic review and approval process
10/16/14Optimized and high throughput comparison and analytics of large sets of genome data
10/16/14Electronic synapses for reinforcement learning
10/16/14Out-of-order execution of strictly-ordered transactional workloads
10/16/14Executing distributed globally-ordered transactional workloads in replicated state machines
10/16/14Executing distributed globally-ordered transactional workloads in replicated state machines
10/16/14Essential metadata replication
10/16/14Out-of-order execution of strictly-ordered transactional workloads
10/16/14Management of file storage locations
10/16/14Generation of synthetic objects using bounded context objects
10/16/14Establishing communication between entities in a shared network
10/16/14Monitoring and distributing event processing within a complex event processing environment
10/16/14Image distribution for dynamic server pages
10/16/14Data analytics and security in social networks
10/16/14Directed message notification in chat sessions
10/16/14Automatically constructing protection scope in a virtual infrastructure
10/16/14Establishing communication between entities in a shared network
10/16/14Data set management
10/16/14System, method and computer program product for deduplication aware quality of service over data tiering
10/16/14Fine-grained control of data placement
10/16/14Logical region allocation with immediate availability
10/16/14Parallel destaging with replicated cache pinning
10/16/14Backup cache with immediate availability
10/16/14Provision of early data from a lower level cache memory
10/16/14Modification of prefetch depth based on high latency event
10/16/14Dynamic reservations in a unified request queue
10/16/14Managing metadata and data for a logical volume in a distributed and declustered system
10/16/14Migrating data across storages with dissimilar allocation sizes
10/16/14Method and system for managing security in a computing environment
10/16/14Identification and classification of web traffic inside encrypted network tunnels
10/16/14Intelligent over-current prevention
10/16/14Destaging cache data using a distributed freezer
10/16/14Low- level checking of context-dependent expected results
10/16/14System and method for graph based k- redundant resiliency for it cloud
10/16/14Scan compression ratio based on fault density
10/16/14Stale data detection in marked channel for scrub
10/16/14Managing a display of results of a keyword search on a web page
10/16/14Verification assistance for digital circuit designs
10/16/14System and method for automatically declaring variables
10/16/14Using stack data and source code to rank program changes
10/16/14Using application state data and additional code to resolve deadlocks
10/16/14Sequential cooperation between map and reduce phases to improve data locality
10/16/14Spooling system call data to facilitate data transformation
10/16/14Determining security factors associated with an operating environment
10/16/14User access control to a secured application
10/16/14Multiple inspection avoidance (mia) using a protection scope
10/16/14Identifying security vulnerabilities related to inter-process communications
10/16/14Determining software metrics
10/16/14Identifying security vulnerabilities related to inter-process communications
10/16/14Execution-based license discovery and optimization
10/16/14Execution-based license discovery and optimization
10/09/14Controlled translocation of macromolecules employing a funnel nanopore structure and a gel
10/09/14Controlled translocation of macromolecules employing a funnel nanopore structure and a gel
10/09/14Integrated fin and strap structure for an access transistor of a trench capacitor
10/09/14High-k metal gate device structure for human blood gas sensing
10/09/14Formation of the dielectric cap layer for a replacement gate structure
10/09/14Self-forming embedded diffusion barriers
10/09/14High-k metal gate device structure for human blood gas sensing
10/09/14System for electrical testing and manufacturing of a 3-d chip stack and method
10/09/14Programmable delay circuit
10/09/14Self-detection of lost device status using device-to-device communications with one or more expected neighboring devices
10/09/14Self-detection of lost device status using device-to-device communications with one or more expected neighboring devices
10/09/14Server cooling system without the use of vapor compression refrigeration
10/09/14Reduction of read disturb errors
10/09/14Method and device for high density data storage
10/09/14Credit-based link level flow control and credit exchange using dcbx
10/09/14Preprocessing unit for network data
10/09/14Transmission apparatus, reception apparatus, communication system, circuit apparatus, communication method, and program
10/09/14Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters
10/09/14Antimicrobial cationic polycarbonates
10/09/14Antimicrobial cationic polycarbonates
10/09/14Vitamin functionalized gel-forming block copolymers for biomedical applications
10/09/14Contact isolation scheme for thin buried oxide substrate devices
10/09/14Nanogap in-between noble metals
10/09/14Precise estimation of arrival time of switching events close in time and space
10/09/14Translating a language in a crowdsourced environment
10/09/14Adapting speech recognition acoustic models with environmental and social cues
10/09/14Prediction of an optimal medical treatment
10/09/14Prediction of an optimal medical treatment
10/09/14Extending calendar system to execute discoverable tasks prior to the meeting
10/09/14Electronically tracking inventory in a retail store
10/09/14Question-related identification of relevant social communities
10/09/14Estimating asset sensitivity using information associated with users
10/09/14Augmenting a business intelligence report with a search result
10/09/14Replicating a source storage system
10/09/14Identifying one or more relevant social networks for one or more collaboration artifacts
10/09/14Web page ranking method, apparatus and program product
10/09/14Optimized pre-fetch ordering using de-duplication information to enhance network performance
10/09/14Modularizing complex xml data for generation and extraction
10/09/14Modularizing complex xml data for generation and extraction
10/09/14Method for file handling in a hierarchical storage environment and corresponding hierarchical storage environment
10/09/14System and method to break communication threads
10/09/14Predicting the performance of a multi-stage communications network under load from multiple communicating servers
10/09/14It system infrastructure prediction based on epidemiologic algorithm
10/09/14Self-detecting storage bottleneck while handling sequential i/o operations
10/09/14Profile-configurable peripheral device and related system
10/09/14Identification of electronic devices operating within a computing system
10/09/14Continuously transferring data using a usb mass storage device
10/09/14Continuously transferring data using a usb mass storage device
10/09/14Volume extent allocation
10/09/14Flexibly storing defined presets for configuration of storage controller
10/09/14System and method for expediting virtual i/o server (vios) boot time in a virtual computing environment
10/09/14Method and apparatus for mitigating effects of memory scrub operations on idle time power savings modes
10/09/14Method for preventing over-heating of a device within a data processing system
10/09/14Fabric multipathing based on dynamic latency-based calculations
10/09/14Intelligent and efficient raid rebuild technique
10/09/14Enabling communication over cross-coupled links between independently managed compute and storage networks
10/09/14Performing automated system tests
10/09/14Primary memory module with record of usage history
10/09/14Method and apparatus for mitigating effects of memory scrub operations on idle time power savings mode
10/09/14Transient condition management utilizing a posted error detection processing protocol
10/09/14Identifying intended communication partners in electronic communications
10/09/14Identifying intended communication partners in electronic communications
10/09/14Re-factoring, rationalizing and prioritizing a service model and assessing service exposure in the service model
10/09/14Responding to a problem during software testing
10/09/14System and method for expediting virtual i/o server (vios) boot time in a virtual computing environment
10/09/14Monitoring unauthorized access point
10/09/14Convenient one-time password
10/09/14Deleting information to maintain security level
10/02/14Thermal ground plane for cooling a computer
10/02/14Wafer scale epitaxial graphene transfer
10/02/14Positioning, and encoded label generating
10/02/14Rendering payments with mobile phone assistance
10/02/14Automatic filtering of sem images
10/02/14Automatic filtering of sem images
10/02/14Thin channel mosfet with silicide local interconnect
10/02/14Asymmetric spacers
10/02/14Semiconductor structures with metal lines
10/02/14Audio positioning system
10/02/14Sampling device with buffer circuit for high-speed adcs
10/02/14Integrated touchpad and keyboard
10/02/14Clustering crowdsourced videos by line-of-sight
10/02/14Aggregating graph structures
10/02/14Determining camera height using distributions of object heights and object image heights
10/02/14Multi-directional display console for an electronic equipment cabinet
10/02/14Cooling electronic components and supplying power to the electronic components
10/02/14Identifying a digital data handling unit
10/02/14Integrated light pipe and led
10/02/14Management of sram initialization
10/02/14Signal margin centering for single-ended edram sense amplifier
10/02/14Context-aware management of applications at the edge of a network
10/02/14Interference processing for wireless communication terminal
10/02/14Asymmetrical link aggregation
10/02/14Transmitting device, receiving device, circuit device, communication method and program
10/02/14Validating a user's identity utilizing information embedded in a image file
10/02/14Automatically determining field of view overlap among multiple cameras
10/02/14Optoelectronic packaging assembly
10/02/14Clustering crowdsourced videos by line-of-sight
10/02/14Low energy collimated ion milling of semiconductor structures
10/02/14Spacer replacement for replacement metal gate semiconductor devices
10/02/14Bulk fin-field effect transistors with well defined isolation
10/02/14Angled gas cluster ion beam
10/02/14Delayed delivery with bounded interference in a cellular data network
10/02/14Peer-to-peer emergency communication using public broadcasting
10/02/14Vehicle position indexing
10/02/14Automatic calibration of a model for a complex flow system
10/02/14Forecasting production output of computing system fabrication test using dynamic predictive model
10/02/14Traffic simulation method, program, and system
10/02/14Detect and automatically hide spoiler information in a collaborative environment
10/02/14Extracting key action patterns from patient event data
10/02/14Extracting key action patterns from patient event data
10/02/14Extracting clinical care pathways correlated with outcomes
10/02/14Pruning of value driver trees
10/02/14Computing system predictive build
10/02/14Pruning of value driver trees
10/02/14End-to-end effective citizen engagement via advanced analytics and sensor-based personal assistant capability (eeceaspa)
10/02/14Computing system predictive build
10/02/14Justifying passage machine learning for question and answer systems
10/02/14Determining statistics for cost-based optimization of a workflow
10/02/14Processing spatial joins using a mapreduce framework
10/02/14Dynamically synching elements in file
10/02/14Providing efficient data replication for a transaction processing server
10/02/14Restarting a batch process from an execution point
10/02/14Database table compression
10/02/14Transactional lock elision with delayed lock checking
10/02/14Workload balancing in a distributed database
10/02/14Analytics based on pipes programming model
10/02/14System and method for categorizing a content object by geographical location of the content object
10/02/14Calculating lists of events in activity streams
10/02/14Calculating lists of events in activity streams
10/02/14Clustering based process deviation detection
10/02/14Facilitating user incident reports
10/02/14Facilitating user incident reports
10/02/14Rdf graphs made of rdf query language queries
10/02/14Rdf graphs made of rdf query language queries
10/02/14Analytics based on pipes programming model
10/02/14System and method for characterization of multimedia content signals using cores of a natural liquid architecture system
10/02/14System and method for declaring contents of mobile devices as records
10/02/14Hierarchical multi-tenancy management of system resources in resource groups
10/02/14End to end automation of application deployment
10/02/14Intelligent data routing and storage provisioning
10/02/14Profiling social trendsetters
10/02/14Following content posting entities
10/02/14Sharing application objects among multiple tenants
10/02/14Managing e-mail messages between related accounts
10/02/14Profiling social trendsetters
10/02/14Retrieving messages in order in a distributed publish/subscribe system
10/02/14Undoing sent communications
10/02/14Undoing sent communications
10/02/14Context-aware management of applications at the edge of a network
10/02/14Continuous improvement of global service delivery augmented with social network analysis
10/02/14Continuous improvement of global service delivery augmented with social network analysis
10/02/14Ensuring the quality of a service in a distributed computing environment
10/02/14Synchronizing ip information of virtual machines
10/02/14Emulating multiple universal serial bus (usb) keys so as to efficiently configure different types of hardware
10/02/14Universal serial bus (usb) key functioning as multiple usb keys so as to efficiently configure different types of hardware
10/02/14Preventing out-of-space errors for legacy option rom in a computing system
10/02/14Preventing out-of-space errors for legacy option rom in a computing system
10/02/14Primary memory module with record of usage history
10/02/14Computer assisted name-based aggregation system for identifying names of anonymized data, as well as a method and computer program thereof
10/02/14Diagnostic data set component
10/02/14Identifying and tagging breakpoint instructions for facilitation of software debug
10/02/14Identifying and tagging breakpoint instructions for facilitation of software debug
10/02/14Scan chain processing in a partially functional chip
10/02/14Scan chain latch design that improves testability of integrated circuits
10/02/14Dynamically enhancing user interface
10/02/14Adjusting information prompting in input method
10/02/14User collaboration for answer generation in question and answer system
10/02/14Graphical method and product to assign physical attributes to entities in a high level descriptive language used for vlsi chip design
10/02/14Reducing runtime and memory requirements of static timing analysis
10/02/14Design structure for stacked cmos circuits
10/02/14Clock tree construction across clock domains
10/02/14Identification of code changes using language syntax and changeset data
10/02/14Software signature discovery
10/02/14Policy-based workload performance optimization for dynamically distributed osgi application
10/02/14Computer-implemented method, program, and tracer node for obtaining trace data relating to particular virtual machine
10/02/14Optimizing the configuration of virtual machine instances in a networked computing environment
10/02/14Clustering based process deviation detection
10/02/14Transactional lock elision with delayed lock checking
10/02/14Method for activating processor cores within a computer system
10/02/14Mapping the network file system (nfs) protocol to secure web-based applications
10/02/14Authentication using three-dimensional structure
10/02/14Ocr-based single sign-on
10/02/14Evaluating security of data access statements
10/02/14System, method, apparatus and computer programs for securely using public services for private or enterprise purposes
10/02/14System, method, apparatus and computer programs for securely using public services for private or enterprise purposes
10/02/14Multi-user universal serial bus (usb) key with customizable file sharing permissions
10/02/14Multi-user universal serial bus (usb) key with customizable file sharing permissions
10/02/14Access request authorization
09/25/14Workfunction modulation-based sensor to measure pressure and temperature
09/25/14Filter replacement lifetime prediction
09/25/14Interleaved heat sink and fan assembly
09/25/14Heat spreading layer with high thermal conductivity
09/25/14Minimizing plating stub reflections in a chip package using capacitance
09/25/14High responsivity device for thermal sensing in a terahertz radiation detector
09/25/14Self-formation of high-density arrays of nanostructures
09/25/14Self-formation of high-density arrays of nanostructures
09/25/14Finfet with reduced capacitance
09/25/14Semiconductor structure with deep trench thermal conduction
09/25/14Method and structure for finfet cmos
09/25/14Self-aligned bipolar junction transistors
09/25/14Integrated passive devices for finfet technologies
09/25/14Interconnect level structures for confining stitch-induced via structures
09/25/14Interlevel dielectric stack for interconnect structures
09/25/14Through silicon via wafer, contacts and design structures
09/25/14Write avoidance areas around bad blocks on a hard disk drive platter
09/25/14Minimizing printed circuit board warpage
09/25/14Multipath effectuation within singly contiguous network fabric via switching device routing logic programming
09/25/14Monitoring and providing access to back to back scheduled conference calls
09/25/14Classifying objects displayed on a device
09/25/14Customizable and low-latency interactive computer-aided translation
09/25/14Customizable and low-latency interactive computer-aided translation
09/25/14Acclimatizing a user to a scheduling pattern change
09/25/14Cross domain integration in product lifecycle management
09/25/14Cross domain integration in product lifecycle management
09/25/14Automatically generating an ontology and axioms from a business-process model
09/25/14Information processing apparatus, information processing method and program
09/25/14Automated generation of new work products and work plans
09/25/14Managing attributes in strem processing using a cache
09/25/14Executing a file backup process
09/25/14Providing record-level sharing (rls) to local data sets
09/25/14Using content found in online discussion sources to detect problems and corresponding solutions
09/25/14Refining search results for a compound search query
09/25/14Managing attributes in stream processing
09/25/14Systems and methods for generating a media value metric
09/25/14Optimizing a clustered virtual computing environment
09/25/14Generating an ordered list of managed targets
09/25/14Managing task object state utilizing a reliable messaging model
09/25/14Lightweight primary cache replacement scheme using associated cache
09/25/14Lightweight primary cache replacement scheme using associated cache
09/25/14System for securing contents of removable memory
09/25/14Extended address volume (eav) allocation verification
09/25/14Managing task object state utilizing a reliable messaging model
09/25/14Automatic correction of application based on runtime behavior
09/25/14System, method, and computer program product for error code injection
09/25/14Dynamically altering error logging activities in a computing system
09/25/14Dynamically altering error logging activities in a computing system
09/25/14Manipulating of labelled data for data entry in management applications
09/25/14Information browsing on an electronic device
09/25/14Dynamic code switching in debugging process
09/25/14Monitoring software execution
09/25/14Parallel program installation and configuration
09/25/14Pseudo program use during program installation
09/25/14Updating progression of performing computer system maintenance
09/25/14Durable subscriptions in publish/subscribe messaging
09/25/14Transaction capable queuing
09/25/14Network-level access control management for the cloud
09/25/14Dynamic adjustment of authentication mechanism
09/25/14Antivirus scan during a data scrub operation
09/18/14Flexible rework device
09/18/14Wafer-to-wafer oxide fusion bonding
09/18/14Method of forming asymmetric spacers and methods of fabricating semiconductor device using asymmetric spacers
09/18/14Forming constant diameter spherical metal balls
09/18/14Thermally reversible thermal interface materials with improved moisture resistance
09/18/14Under ball metallurgy (ubm) for improved electromigration
09/18/14Metal plating system including gas bubble removal unit
09/18/14Passive compressed gas storage container temperature stabilizer
09/18/14Dynamic peak tracking in x-ray photoelectron spectroscopy measurement tool
09/18/14Non-replacement gate nanomesh field effect transistor with pad regions
09/18/14Faceted semiconductor nanowire
09/18/14Frequency separation between qubit and chip mode to reduce purcell loss
09/18/14Multiple-qubit wave-activated controlled gate
09/18/14Suspended superconducting qubits
09/18/14Removal of spurious microwave modes via flip-chip crossover
09/18/14Bipolar junction transistors with reduced epitaxial base facets effect for low parasitic collector-base capacitance
09/18/14Fin field effect transistors having a nitride containing spacer to reduce lateral growth of epitaxially deposited semiconductor materials
09/18/14Stress-enhancing selective epitaxial deposition of embedded source and drain regions
09/18/14Iii-v finfets on silicon substrate
09/18/14Carbon-doped cap for a raised active semiconductor region
09/18/14Replacement gate electrode with a self-aligned dielectric spacer
09/18/14Stress enhanced finfet devices
09/18/14Self-aligned approach for drain diffusion in field effect transistors
09/18/14Memory array with self-aligned epitaxially grown memory elements and annular fet
09/18/14Spin hall effect assisted spin transfer torque magnetic random access memory
09/18/14Structure and fabrication of memory array with epitaxially grown memory elements and line-space patterns
09/18/14Spin hall effect assisted spin transfer torque magnetic random access memory
09/18/14Semiconductor structures with deep trench capacitor and methods of manufacture
09/18/14Faceted intrinsic epitaxial buffer layer for reducing short channel effects while maximizing channel stress levels
09/18/14Method and structure for dielectric isolation in a fin field effect transistor
09/18/14Formation of bulk sige fin with dielectric isolation by anodization
09/18/14Forming strained and relaxed silicon and silicon germanium fins on the same wafer
09/18/14Partially isolated fin-shaped field effect transistors
09/18/14Formation of bulk sige fin with dielectric isolation by anodization
09/18/14Strained silicon nfet and silicon germanium pfet on same wafer
09/18/14Forming strained and relaxed silicon and silicon germanium fins on the same wafer
09/18/14Partially isolated fin-shaped field effect transistors
09/18/14Hybrid etsoi structure to minimize noise coupling from tsv
09/18/14Iii-v finfets on silicon substrate
09/18/14Growth of epitaxial semiconductor regions with curved top surfaces
09/18/14Gate stack of boron semiconductor alloy, polysilicon and high-k gate dielectric for low voltage applications
09/18/14Parallel shunt paths in thermally assisted magnetic memory cells
09/18/14Cell design for embedded thermally-assisted mram
09/18/14Cell design for embedded thermally-assisted mram
09/18/14Forming magnetic microelectromechanical inductive components
09/18/14Folded conical inductor
09/18/14Capacitor using barrier layer metallurgy
09/18/14Self aligned capacitor fabrication
09/18/14Dual three-dimensional (3d) resistor and methods of forming
09/18/14Strained silicon nfet and silicon germanium pfet on same wafer
09/18/14Stacked integrated circuit
09/18/14Differential excitation of ports to control chip-mode mediated crosstalk
09/18/14Sputter etch processing for heavy metal patterning in integrated circuits
09/18/14Copper interconnect structures and methods of making same
09/18/14Semiconductor device channels
09/18/14Semiconductor device channels
09/18/14Multiple-patterned semiconductor device channels
09/18/14Wafer-to-wafer fusion bonding chuck
09/18/14Distributed charging of electrical assets
09/18/14Screening methodology to eliminate wire sweep in bond and assembly module packaging
09/18/14Techniques for quantifying fin-thickness variation in finfet technology
09/18/14Non-contact conductivity measurement
09/18/14Semiconductor test wafer and methods for use thereof
09/18/14Frequency quadruplers at millimeter-wave frequencies
09/18/14Frequency quadruplers at millimeter-wave frequencies
09/18/14Distributing multiplexing logic to remove multiplexor latency on the output path for variable clock cycle, delayed signals
09/18/14Controlling the conductivity of an oxide by applying voltage pulses to an ionic liquid
09/18/14Symmetric placement of components on a chip to reduce crosstalk induced by chip modes
09/18/14Microwave connector with filtering properties
09/18/14Coaxial transmission line slot filter with absorptive matrix
09/18/14Automatic adjustment of metric alert trigger thresholds
09/18/14Compactly storing geodetic points
09/18/14Visualizing data transfers in distributed file system
09/18/14Pre-defined streaming media buffer points
09/18/14Visual monitoring of queues using auxillary devices
09/18/14Real-time sharing of information captured from different vantage points in a venue
09/18/14System and method for monitoring video performance
09/18/14Source, target and mask optimization by incorporating countour based assessments and integration over process variations
09/18/14Single-fiber noncritical-alignment wafer-scale optical testing
09/18/14Single-fiber noncritical-alignment wafer-scale optical testing
09/18/14Spectrometry employing extinction coefficient modulation
09/18/14Reading order search method and program for recording groups on tape
09/18/14Tape friction measurement
09/18/14Determining a skew error signal (ses) offset used to determine an ses to adjust heads in a drive unit
09/18/14Overvoltage protection circuit
09/18/14Implementing heat sink loading having multipoint loading with actuation outboard of heatsink footprint
09/18/14Area array device connection structures with complimentary warp characteristics
09/18/14276-pin buffered memory card with enhanced memory system interconnect
09/18/14Racetrack memory with electric-field assisted domain wall injection for low-power write operation
09/18/14Racetrack memory with electric-field assisted domain wall injection for low-power write operation
09/18/14Read only memory bitline load-balancing
09/18/14Thermally-assisted mram with ferromagnetic layers with temperature dependent magnetization
09/18/14Thermally-assisted mram with ferromagnetic layers with temperature dependent magnetization
09/18/14Metrics and forwarding actions on logical switch partitions in a distributed network switch
09/18/14Credit-based flow control in lossless ethernet networks
09/18/14Dynamic maximum transmission unit size adaption
09/18/14Dynamic reconfiguration of network devices for outage prediction
09/18/14Software defined network-based load balancing for physical and virtual networks
09/18/14Network per-flow rate limiting
09/18/14Scalable flow and cogestion control with openflow
09/18/14Quantized congestion notification in a virtual networking system
09/18/14Bypassing congestion points in a converged enhanced ethernet fabric
09/18/14Coherent load monitoring of physical and virtual networks with synchronous status acquisition
09/18/14Credit-based flow control for multicast packets in lossless ethernet networks
09/18/14Virtual link aggregation extension (vlag+) enabled in a trill-based fabric network
09/18/14Synchronization of openflow controller devices via openflow switching devices
09/18/14System guided surrogating control in broadcast and multicast
09/18/14Directed route load/store packets for distributed switch initialization
09/18/14Directed route load/store packets for distributed switch initialization
09/18/14Directed route load/store packets for distributed switch initialization
09/18/14Heterogeneous overlay network translation for domain unification
09/18/14Virtual gateways and implicit routing in distributed overlay virtual environments
09/18/14Tagging virtual overlay packets in a virtual networking system
09/18/14Reliable link layer for control links between network controllers and switches
09/18/14System guided surrogating control in broadcast and multicast
09/18/14Port membership table partitioning
09/18/14Voice print tagging of interactive voice response sessions
09/18/14Voice print tagging of interactive voice response sessions
09/18/14Controlling mute function on telephone
09/18/14Instruction for performing a pseudorandom number generate operation
09/18/14Forensics in multi-channel media content
09/18/14Using rnai imaging data for gene interaction network construction
09/18/14Material structures for front-end of the line integration of optical polarization splitters and rotators
09/18/14Material structures for front-end of the line integration of optical polarization splitters and rotators
09/18/14Fiber pigtail with integrated lid
09/18/14Dust cover design for optical transceiver
09/18/14Control plane for integrated switch wavelength division multiplexing
09/18/14Matrix-incorporated fluorescent porous and non-porous silica particles for medical imaging
09/18/14Matrix-incorporated fluorescent porous silica particles for drug delivery
09/18/14Oxidation of porous, carbon-containing materials using fuel and oxidizing agent
09/18/14Extreme ultraviolet (euv) multilayer defect compensation and euv masks
09/18/14Reward based ranker array for question answer system
09/18/14Learning model for dynamic component utilization in a question answering system
09/18/14Combining different type coercion components for deferred type evaluation
09/18/14Results of question and answer systems
09/18/14Parallel shunt paths in thermally assisted magnetic memory cells
09/18/14Forming magnetic microelectromechanical inductive components
09/18/14Thermally assisted mram with multilayer strap and top contact for low thermal conductivity
09/18/14Memory array with self-aligned epitaxially grown memory elements and annular fet
09/18/14Structure and fabrication of memory array with epitaxially grown memory elements and line-space patterns
09/18/14Techniques for quantifying fin-thickness variation in finfet technology
09/18/14Faceted semiconductor nanowire
09/18/14Method and structure for pfet junction profile with sige channel
09/18/14Back-gated substrate and semiconductor device, and related method of fabrication
09/18/14Cyclical physical vapor deposition of dielectric layers
09/18/14Subtractive plasma etching of a blanket layer of metal or metal alloy
09/18/14Semiconductor device channels
09/18/14Semiconductor device channels
09/18/14Multiple-patterned semiconductor device channels
09/18/14Magnetic trap for cylindrical diamagnetic materials
09/18/14Magnetic trap for cylindrical diamagnetic materials
09/18/14Methods of reducing defects in directed self-assembled structures
09/18/14Wet strip process for an antireflective coating layer
09/18/14Electrical connectors with encapsulated corrosion inhibitor
09/18/14Chip mode isolation and cross-talk reduction through buried metal layers and through-vias
09/18/14Interactive energy device for environmental stewardship
09/18/14Interactive energy device for environmental stewardship
09/18/14Managing hot water storage and delivery
09/18/14Determining an optimal vehicular transportation route
09/18/14Combining rnai imaging data with genomic data for gene interaction network construction
09/18/14Using rnai imaging data for gene interaction network construction
09/18/14Efficient method of retesting integrated circuits
09/18/14Real-time spatial path comparison
09/18/14Remote electromigration monitoring of electronic chips
09/18/14Selectively tuning frequency modes of a structure
09/18/14Numerical method to determine a system anomaly using as an example: a gas kick detection system.
09/18/14Selectively tuning frequency modes of a structure
09/18/14Selective importance sampling
09/18/14Selective importance sampling
09/18/14Method to verify correctness of computer system software and hardware components and corresponding test environment
09/18/14Stream input reduction through capture and simulation
09/18/14Selecting an operator graph configuration for a stream-based computing application
09/18/14Stream input reduction through capture and simulation
09/18/14Detecting and executing data re-ingestion to improve accuracy in a nlp system
09/18/14Identifying a stale data source to improve nlp accuracy
09/18/14Smart posting with data analytics
09/18/14Adapting tabular data for narration
09/18/14Presenting key differences between related content from different mediums
09/18/14Entity recognition in natural language processing systems
09/18/14Enhanced answers in deepqa system according to user preferences
09/18/14Automatic note taking within a virtual meeting
09/18/14Classifier-based system combination for spoken term detection
09/18/14Automatic note taking within a virtual meeting
09/18/14Updating a voice template
09/18/14Identifying additional variables for appraisal tables
09/18/14Adjudication platform compliance management
09/18/14Group travel opportunity recommendations and reservations based on shared interests
09/18/14Group travel opportunity recommendations and reservations based on shared interests
09/18/14Presenting a filtered list of work items
09/18/14Negotiated meeting scheduling with one or more required attendees
09/18/14Enhanced time-management and recommendation system
09/18/14Accommodating schedule variances in work allocation for shared service delivery
09/18/14Accommodating schedule variances in work allocation for shared service delivery
09/18/14System, apparatus, and method for facilitating provisioning in a mixed environment of locales
09/18/14Estimating required time for process granularization
09/18/14Enhanced time-management and recommendation system
09/18/14Estimating required time for process granularization
09/18/14Customer community analytics
09/18/14Generating economic model based on business transaction messages
09/18/14Recommendation engine
09/18/14Gifting enabled by integration of commerce and social networks
09/18/14Managing workflow approval
09/18/14Rights management for content aggregators
09/18/14Ontology-driven construction of semantic business intelligence models
09/18/14Process model generated using biased process mining
09/18/14Scalable online hierarchical meta-learning
09/18/14Early generation of individuals to accelerate genetic algorithms
09/18/14Process model generated using biased process mining
09/18/14Decision tree insight discovery
09/18/14Evaluation of predictions in the absence of a known ground truth
09/18/14Evaluation of predictions in the absence of a known ground truth
09/18/14Interactive method to reduce the amount of tradeoff information required from decision makers in multi-attribute decision making under uncertainty
09/18/14Floating time dimension design
09/18/14Control data driven modifications and generation of new schema during runtime operations
09/18/14Data integration using automated data processing based on target metadata
09/18/14Self-analyzing data processing job to determine data quality issues
09/18/14Differentiated secondary index maintenance in log structured nosql data stores
09/18/14Index record-level locking for file systems using a b+tree structure
09/18/14Managing, importing, and exporting teamspace templates and teamspaces in content repositories
09/18/14Differentiated secondary index maintenance in log structured nosql data stores
09/18/14Data replication for a virtual networking system
09/18/14Metadata-driven version management service in pervasive environment
09/18/14Replication group partitioning
09/18/14Using average replication latency to influence routing query transactions
09/18/14Metadata-driven version management service in pervasive environment
09/18/14Reducing reading of database logs by persisting long-running transaction data
09/18/14Client object replication between a first backup server and a second backup server
09/18/14Data migration in a database management system
09/18/14Scalable graph modeling of metadata for deduplicated storage systems
09/18/14Self-analyzing data processing job to determine data quality issues
09/18/14Matching transactions in multi-level records
09/18/14Master data governance process driven by source data accuracy metric
09/18/14Digest retrieval based on similarity search in data deduplication
09/18/14Efficient calculation of similarity search values and digest block boundaries for data deduplication
09/18/14Reducing digest storage consumption in a data deduplication system
09/18/14Reducing digest storage consumption by tracking similarity elements in a data deduplication system
09/18/14Compressing tuples in a streaming application
09/18/14Data compression using compression blocks and partitions
09/18/14Compressing tuples in a streaming application
09/18/14Compactly storing geodetic points
09/18/14Versioning for configurations of reusable artifacts
09/18/14Managing versions of artifacts stored across disparate tools
09/18/14Managing versions of artifacts stored across disparate tools
09/18/14Providing record-level alternate-index upgrade locking
09/18/14Extending platform trust during program updates
09/18/14Managing text in documents based on a log of research corresponding to the text
09/18/14Axiomatic approach for entity attribution in unstructured data
09/18/14Flow-directed collaborative communication
09/18/14Delivering a filtered search result
09/18/14Personalized search result summary
09/18/14Gesture-based image shape filtering
09/18/14Results of question and answer systems
09/18/14Prioritizing items based on user activity
09/18/14Ending tuple processing in a stream-based computing application
09/18/14Self provisioning and applying role-based security to teamspaces in content repositories
09/18/14Scalable data transfer in and out of analytics clusters
09/18/14Crowdsourcing and consolidating user notes taken in a virtual meeting
09/18/14Identifying a stale data source to improve nlp accuracy
09/18/14Document provenance scoring based on changes between document versions
09/18/14Semantic mapping of topic map meta-models identifying assets and events to include weights
09/18/14Row-based data filtering at a database level
09/18/14Detecting and executing data re-ingestion to improve accuracy in a nlp system
09/18/14Media content substitution
09/18/14Minimizing result set size when converting from asymmetric to symmetric requests
09/18/14Estimating error propagation for database optimizers
09/18/14Pivot facets for text mining and search
09/18/14Flexible column selection in relational databases
09/18/14Output driven generation of a combined schema from a plurality of input data schemas
09/18/14Electronic content curating mechanisms
09/18/14Partitioning data for parallel processing
09/18/14Alert management
09/18/14Enabling ntelligent media naming and icon generation utilizing semantic metadata
09/18/14Visualizing data transfers in distributed file system
09/18/14Instruction for performing a pseudorandom number seed operation
09/18/14Computing polychoric and polyserial correlations between random variables using norta
09/18/14Information retrieval using sparse matrix sketching
09/18/14Information retrieval using sparse matrix sketching
09/18/14Responding to a timeout of a message in a parallel computer
09/18/14Scalable data transfer in and out of analytics clusters
09/18/14Data integration on retargetable engines in a networked environment
09/18/14Scalable data transfer in and out of analytics clusters
09/18/14Flow-directed collaborative communication
09/18/14Migration of network connection under mobility
09/18/14File change notifications in a scale-out nas system
09/18/14Dynamic social networking content
09/18/14Method and process for collaboratively built content filtering
09/18/14Dynamically managing social networking groups
09/18/14Dynamically managing social networking groups
09/18/14Virtual machine mobility using openflow
09/18/14Multi-tenancy support for enterprise social business computing
09/18/14Collective operation management in a parallel computer
09/18/14Updating an e-mail recipient list
09/18/14Systems and methods for using social network analysis to schedule communications
09/18/14Identification of users for initiating information spreading in a social network
09/18/14Digest filtering system and method
09/18/14Email as a transport mechanism for acvity stream posting
09/18/14Dynamic alert recognition system
09/18/14Systems and methods for grouping electronic messages
09/18/14Systems and methods for using social network analysis to schedule communications
09/18/14Displaying message content differential in popup window
09/18/14Email as a transport mechanism for activity stream posting
09/18/14Digest filtering system and method
09/18/14Generating and/or providing access to a message based on portions of the message indicated by a sending user
09/18/14Cell fabric hardware acceleration
09/18/14Remote direct memory access acceleration via hardware context in non-native applciations
09/18/14Scalable data transfer in and out of analytics clusters
09/18/14Data transmission for transaction processing in a networked environment
09/18/14File change notifications in a scale-out nas system
09/18/14Transforming application cached template using personalized content
09/18/14Data transmission for transaction processing in a networked environment
09/18/14Transforming application cached template using personalized content
09/18/14Auditable distribution of a data file
09/18/14Dynamic port type detection
09/18/14Dynamic reconfiguration of network devices for outage prediction
09/18/14Enhanced remote presence
09/18/14Systems for selectively enabling and disabling hardware features
09/18/14Collective operation management in a parallel computer
09/18/14Efficient centralized stream initiation and retry control
09/18/14Identifying network flows under network address translation
09/18/14Port membership table partitioning
09/18/14Scalable distributed control plane for network switching systems
09/18/14Identifying network flows under network address translation
09/18/14Scalable distributed control plane for network switching systems
09/18/14Methods for selectively enabling and disabling hardware features
09/18/14Enforcing context model based service-oriented architecture policies and policy engine
09/18/14Dynamically launching inter-dependent applications based on user behavior
09/18/14Secure url update for http redirects
09/18/14Evaluating a stream-based computing application
09/18/14Session-based server transaction storm controls
09/18/14Multi-tenancy support for enterprise social business computing
09/18/14Load balancing for a virtual networking system
09/18/14Software product instance placement
09/18/14Software product instance placement
09/18/14Source-driven switch probing with feedback request
09/18/14Adaptive setting of the quantized congestion notification equilibrium setpoint in converged enhanced eithernet networks
09/18/14Facilitating transport mode data transfer between a channel subsystem and input/output devices
09/18/14First-in-first-out queue-based command spreading
09/18/14Local bypass for in memory computing
09/18/14Servicing a globally broadcast interrupt signal in a multi-threaded computer
09/18/14Servicing a globally broadcast interrupt signal in a multi-threaded computer
09/18/14Local bypass for in memory computing
09/18/14Memory page de-duplication in a computer system that includes a plurality of virtual machines
09/18/14Memory page de-duplication in a computer system that includes a plurality of virtual machines
09/18/14Adaptive reference tuning for endurance enhancement of non-volatile memories
09/18/14Address mapping including generic bits
09/18/14Tagging in memory control unit (mcu)
09/18/14Method and a system to verify shared memory integrity
09/18/14Dram controller for variable refresh operation timing
09/18/14Hardware-based pre-page walk virtual address transformation
09/18/14Systems and methods for accessing cache memory
09/18/14Virtual unified instruction and data caches
09/18/14Dynamically removing entries from an executing queue
09/18/14Caching backed-up data locally until successful replication
09/18/14Dynamic caching module selection for optimized data deduplication
09/18/14Enabling hardware transactional memory to work more efficiently with readers that can tolerate stale data
09/18/14Enabling hardware transactional memory to work more efficiently with readers that can tolerate stale data
09/18/14Managing cpu resources for high availability micro-partitions
09/18/14Dynamic definition of error information in a programmable device
09/18/14Adaptive reference tuning for endurance enhancement of non-volatile memories
09/18/14Expediting rcu grace periods under user mode control
09/18/14Transforming a shared virtualized space to an enclosed space
09/18/14Transforming a shared virtualized space to an enclosed space
09/18/14Efficiently searching and modifying a variable length queue
09/18/14Synchronization and order detection in a memory system
09/18/14Dual asynchronous and synchronous memory system
09/18/14Apparatus and method for resource alerts
09/18/14Migrating and retrieving queued data in byte-addressable storage
09/18/14Managing cpu resources for high availability micro-partitions
09/18/14Hardware-based pre-page walk virtual address transformation
09/18/14Identifying logical planes formed of compute nodes of a subcommunicator in a parallel computer
09/18/14Run-time instrumentation handling in a superscalar processor
09/18/14Identifying logical planes formed of compute nodes of a subcommunicator in a parallel computer
09/18/14Three-dimensional computer processor systems having multiple local power and cooling layers and a global interconnection structure
09/18/14Chaining between exposed vector pipelines
09/18/14Processor with hybrid pipeline capable of operating in out-of-order and in-order modes
09/18/14Chaining between exposed vector pipelines
09/18/14Execution of condition-based instructions
09/18/14System management and instruction counting
09/18/14Encrypted warranty verification and diagnostic tool
09/18/14Live initialization of a boot device
09/18/14Recovering from a defective boot image
09/18/14Self-healing using an alternate boot partition
09/18/14Self-healing using a virtual boot device
09/18/14Fast hot boot of a computer system
09/18/14Live initialization of a boot device
09/18/14Recovering from a defective boot image
09/18/14Self-healing using an alternate boot partition
09/18/14Self-healing using a virtual boot device
09/18/14Fast hot boot of a computer system
09/18/14Secure user authentication in a dynamic network
09/18/14Authorizing use of a test key signed build
09/18/14Generalized certificate use in policy-based secure messaging environments
09/18/14Generalized certificate use in policy-based secure messaging environments
09/18/14Protecting visible data during computerized process usage
09/18/14Power management for a computer system
09/18/14Power management for a computer system
09/18/14Reestablishing synchronization in a memory system
09/18/14Automated patch generation
09/18/14Openflow controller master-slave initialization protocol
09/18/14Enhanced failover mechanism in a network virtualized environment
09/18/14Error correction for memory systems
09/18/14Avoiding restart on error in data integration
09/18/14Generating fault tolerant connectivity api
09/18/14Generating fault tolerant connectivity api
09/18/14Managed runtime enabling condition percolation
09/18/14Multi-stage failure analysis and prediction
09/18/14Explaining excluding a test from a test suite
09/18/14Algorithm selection for collective operations in a parallel computer
09/18/14Detection of memory cells that are stuck in a physical state
09/18/14Analysis of a system for matching data records
09/18/14Managed runtime enabling condition percolation
09/18/14Tracking errors in a computing system
09/18/14Query rewrites for data-intensive applications in presence of run-time errors
09/18/14Early data delivery prior to error detection completion
09/18/14On-site visualization of component status
09/18/14Identify failed components during data collection
09/18/14Tracking errors in a computing system
09/18/14On-site visualization of component status
09/18/14Replay suspension in a memory system
09/18/14Data encoding and decoding
09/18/14Determining linkage metadata of content of a target document to source documents
09/18/14Enhanced mobilization of existing web sites
09/18/14Enhanced mobilization of existing web sites
09/18/14Mobile enablement of webpages
09/18/14Mobile enablement of existing web sites
09/18/14Mobilizing a web application to take advantage of a native device capability
09/18/14System and method for web content presentation management
09/18/14Mobile enablement of existing web sites
09/18/14Mobilizing a web application to take advantage of a native device capability
09/18/14Mobile enablement of webpages
09/18/14System and method for web content presentation management
09/18/14Adapting tabular data for narration
09/18/14Help for reading an e-book
09/18/14Adjusting content playback to correlate with travel time
09/18/14Presenting key differences between related content from different mediums
09/18/14Synchronizing progress between related content from different mediums
09/18/14Object and connection organization in a diagram
09/18/14Object and connection organization in a diagram
09/18/14Data sharing software program utilizing a drag-and-drop operation and spring-loaded portal
09/18/14Displaying message content differential in popup window
09/18/14Analysis of multi-modal parallel communication timeboxes in electronic meeting for automated opportunity qualification and response
09/18/14Techniques to facilitate collaborative social coding
09/18/14Dynamic social networking content
09/18/14Graphical interface data fragment operations for data visualization
09/18/14Generating an insight view while maintaining report context
09/18/14Chaining applications
09/18/14Source-mask optimization for a lithography process
09/18/14Analyzing timing requirements of a hierarchical integrated circuit design
09/18/14Automated design rule checking (drc) test case generation
09/18/14Mesh planes with alternating spaces for multi-layered ceramic packages
09/18/14Automated team assembly system and method
09/18/14Automated team assembly system and method
09/18/14Automated software composition
09/18/14Method and apparatus for enabling agile development of services in cloud computing and traditional environments
09/18/14Techniques for providing environmental impact information associated with code
09/18/14Capture and display of historical run-time execution traces in a code editor
09/18/14Capture and display of historical run-time execution traces in a code editor
09/18/14System for generating readable and meaningful descriptions of stream processing source code
09/18/14Probationary software tests
09/18/14Systems and methods for synchronizing software execution across data processing systems and platforms
09/18/14Probationary software tests
09/18/14Embedding and executing trace functions in code to gather trace data
09/18/14Algorithm selection for collective operations in a parallel computer
09/18/14Testing functional correctness and idempotence of software automation scripts
09/18/14Testing functional correctness and idempotence of software automation scripts
09/18/14Testing a software interface for a streaming hardware device
09/18/14Automated patch generation
09/18/14Concurrent patching of shared libraries
09/18/14Dynamic library replacement
09/18/14Concurrent patching of shared libraries
09/18/14Automatic quality assurance for software installers
09/18/14Systems and methods to offload hardware support using a hypervisor subpartition
09/18/14Encapsulating a virtual server in a hypervisor subpartition
09/18/14Encapsulation of an application for virtualization
09/18/14Refreshing memory topology in virtual machine operating systems
09/18/14Providing execution access to files not installed in a virtualized space
09/18/14Applying and removing appropriate file overlays during live application mobility
09/18/14Scalable policy management in an edge virtual bridging (evb) environment
09/18/14Scalable policy assignment in an edge virtual bridging (evb) environment
09/18/14Applying or removing appropriate file overlays during live application mobility
09/18/14Refreshing memory topology in virtual machine operating systems
09/18/14Scalable policy management in an edge virtual bridging (evb) environment
09/18/14Scalable policy assignment in an edge virtual bridging (evb) environment
09/18/14Virtual machine image disk usage
09/18/14Software interface for a specialized hardward device
09/18/14Meta-application management in a multitasking environment
09/18/14Responding to a timeout of a message in a parallel computer
09/18/14Serializing wrapping trace buffer via a compare-and-swap instruction
09/18/14Deploying parallel data integration applications to distributed computing environments
09/18/14Dynamic library replacement
09/18/14Managing workflow approval
09/18/14Resolving deployment conflicts in heterogeneous environments
09/18/14Detecting deployment conflicts in heterogenous environments
09/18/14Achieving continuous availability for planned workload and site switches with no data loss
09/18/14Collectively loading programs in a multiple program multiple data environment
09/18/14Qualified checkpointing of data flows in a processing environment
09/18/14Qualified checkpointing of data flows in a processing environment
09/18/14Meta-application management in a multitasking environment
09/18/14System management and instruction counting
09/18/14Distributed and scaled-out network switch and packet processing
09/18/14Acknowledging incoming messages
09/18/14Acknowledging incoming messages
09/18/14Bidirectional counting of dual outcome events
09/18/14Bidirectional counting of dual outcome events
09/18/14Pre-defined streaming media buffer points
09/18/14Classifying files on a mobile computer device
09/18/14Implementing security in a social application
09/18/14Managing co-editing sessions
09/18/14Implementing security in a social application
09/18/14Alias-based social media identity verification
09/18/14Approval of content updates
09/18/14Delivering author specific content
09/18/14Social media based identity verification
09/18/14Increasing chosen password strength
09/18/14Controlled password modification method
09/18/14Controlled password modification method and apparatus
09/18/14Prevention of password leakage with single sign on in conjunction with command line interfaces
09/18/14Common location of user managed authorization
09/18/14Identifying stored vulnerabilities in a web service
09/18/14Anonymizing sensitive identifying information based on relational context across a group
09/18/14Spatial security for stored data
09/18/14Rights management for content aggregators
09/18/14Method and system for monitoring access attempts of shared memory of databases
09/18/14Delivering author specific content
09/18/14Computing application security and data settings overrides
09/11/14System and method for managing traceability suspicion with suspect profiles
09/11/14System for inserting and removing cables
09/11/14Cleaning mechanism for a computer using cooling fan airflow output
09/11/14Method for improving surface quality of spalled substrates
09/11/14Irrigation system
09/11/14Irrigation system
09/11/14Irrigation system and method
09/11/14Irrigation system and method
09/11/14Controllable emitter
09/11/14Controllable emitter
09/11/14Phase change memory cell with heat shield
09/11/14Silicon-germanium fins and silicon fins on a bulk substrate
09/11/14Electrical coupling of memory cell access devices to a word line
09/11/14Self-aligned contacts for replacement metal gate transistors
09/11/14Extremely thin semiconductor on insulator (etsoi) logic and memory hybrid chip
09/11/14Extremely thin semiconductor on insulator (etsoi) logic and memory hybrid chip
09/11/14Semiconductor fin isolation by a well trapping fin portion
09/11/14Gate stack including a high-k gate dielectric that is optimized for low voltage applications
09/11/14Gate stack including a high-k gate dielectric that is optimized for low voltage applications
09/11/14Sacrificial replacement extension layer to obtain abrupt doping profile
09/11/14Sacrificial replacement extension layer to obtain abrupt doping profile
09/11/14Multilayer dielectric structures for semiconductor nano-devices
09/11/14Multi-plasma nitridation process for a gate dielectric
09/11/14Structure and method of fabricating a czts photovoltaic device by electrodeposition
09/11/14Electronic fuse with resistive heater
09/11/14Planar polysilicon regions for precision resistors and electrical fuses and method of fabrication
09/11/14Single-mask spacer technique for semiconductor device features
09/11/14Self-aligned pitch split for unidirectional metal wiring
09/11/14Self-aligned pitch split for unidirectional metal wiring
09/11/14Server rack for improved data center management
09/11/14Burst noise in line test
09/11/14Electronic fuse cell and array
09/11/14Generating negative impedance compensation
09/11/14Identification display
09/11/14Colony desktop hive display: creating an extended desktop display from multiple mobile devices using near-field or other networking
09/11/14Wireless keyboard
09/11/14Systems and methods for displaying images
09/11/14Guiding a desired outcome for an electronically hosted conference
09/11/14Frame to frame persistent shadow reduction within an image
09/11/14Topology determination for non-overlapping camera network
09/11/14Frame to frame persistent shadow reduction within an image
09/11/14Accurate radius and velocity measurement of tape transports
09/11/14Multi-component electronic module with integral coolant-cooling
09/11/14Memory state sensing based on cell capacitance
09/11/14Writing data to a thermally sensitive memory device
09/11/14Writing data to a thermally sensitive memory device
09/11/14Local evaluation circuit for static random-access memory
09/11/14Memory state sensing based on cell capacitance
09/11/14Interoperability for distributed overlay virtual environments
09/11/14Centralized control and management planes for different independent switching domains
09/11/14Adaptable receiver detection
09/11/14Smarter telephony & e-mail protocols
09/11/14Graphene plasmonic communication link
09/11/14Automatically determining and tagging intent of skipped streaming and media content for collaborative reuse
09/11/14Digital video recorder conflict handling employing rebroadcast requests
09/11/14Optical cable testing and management
09/11/14Graphene plasmonic communication link
09/11/14Selective area heating for 3d chip stack
09/11/14Electrical coupling of memory cell access devices to a word line
09/11/14Prevention of fin erosion for semiconductor devices
09/11/14Front side wafer id processing
09/11/14Post metal chemical-mechanical planarization cleaning process
09/11/14Self-aligned trench over fin
09/11/14Dsa grapho-epitaxy process with etch stop material
09/11/14Multilayer dielectric structures for semiconductor nano-devices
09/11/14Interlevel dielectric stack for interconnect structures
09/11/14On-screen notification privacy and confidentiality in personal devices
09/11/14Cellular device security apparatus and method
09/11/14Hierarchical exploration of longitudinal medical events
09/11/14Leveraging information for use in a traffic prediction scenario
09/11/14Wireless network of low power sensing and actuating motes
09/11/14Implementing automated memory address recording in constrained random test generation for verification of processor hardware designs
09/11/14Matched filter testing of data transmission cables
09/11/14Implementing random content of program loops in random test generation for processor verification
09/11/14Real-time modeling of heat distributions
09/11/14Wireless network of low power sensing and actuating motes
09/11/14Identifying potential audit targets in fraud and abuse investigations
09/11/14Identifying potential audit targets in fraud and abuse investigations
09/11/14Hierarchical exploration of longitudinal medical events
09/11/14Routing preferred traffic within a reservation system
09/11/14Automatic preference-based waitlist and clearance for accommodations
09/11/14Social project collaboration through self-organizing teams
09/11/14Social project collaboration through self-organizing teams
09/11/14Mapping
09/11/14Estimating project cost
09/11/14Estimating project cost
09/11/14Automating a governance process of optimizing a portfolio of services in a governed soa
09/11/14Consumer representation rendering with selected merchandise
09/11/14Resolving an unlicensed computer installation of a type of software
09/11/14Predicting user activity in social media applications
09/11/14System and method for using graph transduction techniques to make relational classifications on a single connected network
09/11/14Structural descriptions for neurosynaptic networks
09/11/14Inner passage relevancy layer for large intake cases in a deep question answering system
09/11/14Method and program structure for machine learning
09/11/14Autonomic collaborative workspace creation
09/11/14Management of updates in a database system
09/11/14Management of searches in a database system
09/11/14Nomadic data collection and management method including pessimistic locking of data
09/11/14Management of updates in a database system
09/11/14Summarizing a stream of multidimensional, axis-aligned rectangles
09/11/14Management of searches in a database system
09/11/14Persisting and retrieving arbitrary slices of nested structures using a column-oriented data store
09/11/14System and method for providing answers to questions
09/11/14Processing control in a streaming application
09/11/14Processing control in a streaming application
09/11/14Insight determination and explanation in multi-dimensional data sets
09/11/14Insight determination and explanation in multi-dimensional data sets
09/11/14Caching of deep structures for efficient parsing
09/11/14Fast distributed database frequency summarization
09/11/14Fast distributed database frequency summarization
09/11/14Interaction detection for generalized linear models
09/11/14Universal architecture for client management extensions on monitoring, control, and configuration
09/11/14Synchronization of a server side deduplication cache with a client side deduplication cache
09/11/14Guiding a desired outcome for an electronically hosted conference
09/11/14Sharing topics in social networking
09/11/14Collective operation management in a parallel computer
09/11/14Intelligent categorization of bookmarks
09/11/14Minimizing workload migrations during cloud maintenance operations
09/11/14Storage area network multi-pathing
09/11/14Tracking contacts across multiple communications services
09/11/14Tracking contacts across multiple communications services
09/11/14Collective operation management in a parallel computer
09/11/14Minimizing workload migrations during cloud maintenance operations
09/11/14Switching media streams in a client system based on environmental changes
09/11/14Facilitating processing of out-of-order data transfers
09/11/14Implementing configuration preserving relocation of sriov adapter
09/11/14Random number generation
09/11/14Random number generation
09/11/14Non-data inclusive coherent (nic) directory for cache
09/11/14Specific prefetch algorithm for a chip having a parent core and a scout core
09/11/14Prefetching for multiple parent cores in a multi-core chip
09/11/14Allocating enclosure cache in a computing system
09/11/14Sharing cache in a computing system
09/11/14Sharing cache in a computing system
09/11/14Allocating enclosure cache in a computing system
09/11/14Prefetching for a parent core in a multi-core chip
09/11/14Dynamic prioritization of cache access
09/11/14Reducing data loss in a computing storage environment
09/11/14Protection of former primary volumes in a synchronous replication relationship
09/11/14Anticipated prefetching for a parent core in a multi-core chip
09/11/14Thread transition management
09/11/14Session attribute propagation through secure database server tiers
09/11/14Secure password generation
09/11/14Collective operation management in a parallel computer
09/11/14Collective operation management in a parallel computer
09/11/14Software testing using statistical error injection
09/11/14Identifying a storage location for a storage address requested during debugging
09/11/14Communication failure source isolation in a distributed computing system
09/11/14Communication failure source isolation in a distributed computing system
09/11/14Built-in-self-test (bist) test time reduction
09/11/14Context-based visualization generation
09/11/14Intelligent categorization of bookmarks
09/11/14Systems and methods for customizing electronic documents based on use patterns
09/11/14Systems and methods for customizing electronic documents based on use patterns
09/11/14Theme engine
09/11/14Autonomic collaborative workspace creation
09/11/14Interactor for a graphical object
09/11/14Graphical user interface control for scrolling content
09/11/14Method for conversion of commercial microprocessor to radiation-hardened processor and resulting processor
09/11/14Continuous updating of technical debt status
09/11/14Continuous updating of technical debt status
09/11/14Method and system for selecting software components based on a degree of coherence
09/11/14System and method for tracking suspicion across application boundaries
09/11/14System for selecting software components based on a degree of coherence
09/11/14System and method for managing traceability suspicion with suspect profiles
09/11/14System and method for tracking suspicion across application boundaries
09/11/14Trace coverage analysis
09/11/14Scalable and precise string analysis using index-sensitive static string abstractions
09/11/14Performing unattended software installation
09/11/14Performing unattended software installation
09/11/14Virtualization across physical partitions of a multi-core processor (mcp)
09/11/14Job scheduling in a system of multi-level computers
09/11/14Security-aware admission control of requests in a distributed system
09/11/14Security-aware admission control of requests in a distributed system
09/11/14Arrangements for identifying users in a multi-touch surface environment
09/11/14Scalable and precise string analysis using index-sensitive static string abstractions
09/04/14Propagating pin corrections through physically mating devices
09/04/14Thermal transfer structure with in-plane tube lengths and out-of-plane tube bend(s)
09/04/14Planar qubits having increased coherence times
09/04/14Bipolar device having a monocrystalline semiconductor intrinsic base to extrinsic base link-up region
09/04/14Work function adjustment by carbon implant in semiconductor devices including gate structure
09/04/14Segmented guard ring structures with electrically insulated gap structures and design structures thereof
09/04/14Thermally-optimized metal fill for stacked chip systems
09/04/14Doping of copper wiring structures in back end of line processing
09/04/14Controlled metal extrusion opening in semiconductor structure and method of forming
09/04/14Modifying key size on a touch screen based on fingertip location
09/04/14Tape drive buffer utilization
09/04/14Selective clamping of electronics card to coolant-cooled structure
09/04/14Magnetic shift register memory device
09/04/14Human activity determination from video
09/04/14Air pressure measurement based cooling
09/04/14Providing network access
09/04/14Dynamic power prediction with pin attribute data model
09/04/14Detecting cases with conflicting rules
09/04/14Structural plasticity in spiking neural networks with symmetric dual of an electronic neuron
09/04/14Unsupervised, supervised and reinforced learning via spiking computation
09/04/14Authoring system for bayesian networks automatically extracted from text
09/04/14Authoring system for bayesian networks automatically extracted from text
09/04/14Synchronized data changes
09/04/14System and method for optimizing data remanence over hybrid disk clusters using various storage technologies
09/04/14Obtaining partial results from a database query
09/04/14Geographic relevance within a soft copy document or media object
09/04/14Information retrieval system, method, and program
09/04/14Managing ownership of redundant data
09/04/14Method and system of adapting a data model to a user interface component
09/04/14Identifying element relationships in a document
09/04/14Colony application
09/04/14Synchronized data changes
09/04/14Selective zone control session termination
09/04/14Aggregation of sensor appliances using device registers and wiring brokers
09/04/14Selection of post-request action based on combined response and input from the request source
09/04/14Balanced distributed backup scheduling
09/04/14Reducing decryption latency for encryption processing
09/04/14System level architecture verification for transaction execution in a multi-processing environment
09/04/14System level architecture verification of a transactional execution
09/04/14Log file reduction according to problem-space network topology
09/04/14Log file reduction according to problem-space network topology
09/04/14Enhanced dump data collection from hardware fail modes
09/04/14Self monitoring and self repairing ecc
09/04/14User influenced asynchronous module definition loader
09/04/14Persisting the state of visual control elements in uniform resource locator (url)-generated web pages
09/04/14User influenced asynchronous module definition loader
09/04/14Code analysis for simulation efficiency improvement
09/04/14Code analysis for simulation efficiency improvement
09/04/14Pre-emptive content caching in mobile networks
09/04/14Techniques for policy aware service composition
09/04/14Management of digital information
08/28/14Adsorption heat exchanger devices
08/28/14Design of a mold for forming complex 3d mems components
08/28/14Thermal transfer structure(s) and attachment mechanism(s) facilitating cooling of electronics card(s)
08/28/14Barcode scanning for communication
08/28/14Automatically converting a sign and method for automatically reading a sign
08/28/14Generation of multiple diameter nanowire field effect transistors
08/28/14Tfet with nanowire source
08/28/14Bi-directional silicon controlled rectifier structure
08/28/14U-shaped semiconductor structure
08/28/14U-shaped semiconductor structure
08/28/14Silicon nitride gate encapsulation by implantation
08/28/14Stress memorization in rmg finfets
08/28/14Silicon nitride gate encapsulation by implantation
08/28/14Electrical fuses and methods of making electrical fuses
08/28/14Electroless plated material formed directly on metal
08/28/14Interdigitated capacitors with a zero quadratic voltage coefficient of capacitance or zero linear temperature coefficient of capacitance
08/28/14Thermal via for 3d integrated circuits structures
08/28/14Bonded structure with enhanced adhesion strength
08/28/14Information encoding using wirebonds
08/28/14Silicided trench contact to buried conductive layer
08/28/14Universal clamping fixture to maintain laminate flatness during chip join
08/28/14Controlling wind turbine
08/28/14Setting switch size and transition pattern in a resonant clock distribution system
08/28/14Cache allocation in a computerized system
08/28/14Personal visualization of health conditions
08/28/14Dynamically controlling magnetoresitive bias
08/28/14Adjustment of tape writing mechanism, based on tape dimensional stability and positional error signal distribution
08/28/14High performance cartridge format
08/28/14Targeted cooling to specific overheating rack-mounted servers
08/28/14System for mounting and cooling a computer component
08/28/14Thermal transfer and coolant-cooled structures facilitating cooling of electronics card(s)
08/28/14Phase change memory management
08/28/14Reducing fragmentation of packets in a networking environment
08/28/14Collection of subscriber information for data breakout in a mobile data network
08/28/14Collection of subscriber information for data breakout in a mobile data network
08/28/14Source routing with fabric switches in an ethernet fabric network
08/28/14Two mask process for electroplating metal employing a negative electrophoretic photoresist
08/28/14Positive tone organic solvent developed chemically amplified resist
08/28/14Electrode formation for heterojunction solar cells
08/28/14Semiconductor fabrication method using stop layer
08/28/14Method for facilitating crack initiation during controlled substrate spalling
08/28/14Connector with mechanical connect-assist and retention
08/28/14Forecasting output power of wind turbine in wind farm
08/28/14Characterization of interface resistance in a multi-layer conductive structure
08/28/14Monitoring aging of silicon in an integrated circuit device
08/28/14Architecture optimization
08/28/14Chinese name transliteration
08/28/14Native-script and cross-script chinese name matching
08/28/14Context based document analysis
08/28/14Conversion of non-back-off language models for efficient speech decoding
08/28/14Method and apparatus for processing medical data
08/28/14Protecting against data loss in a networked computing environment
08/28/14Rapidly optimizing staffing levels in a ticketing system using simulation
08/28/14Smart analytics for forecasting parts returns for reutilization
08/28/14Smart analytics for forecasting parts returns for reutilization
08/28/14Using media information for improving direct marketing response rate
08/28/14Publication of information regarding the quality of a virtual meeting
08/28/14Network computing environment collection and notification of point of sale information
08/28/14Business process management, configuration and execution
08/28/14Business process management, configuration and execution
08/28/14Non-deterministic finite state machine module for use in a regular expression matching system
08/28/14Adaptive warehouse data validation tool
08/28/14Enabling dynamic polymorphic asset creation and reuse
08/28/14Method for synchronization and management fo system activities with locally installed applications
08/28/14Hybrid data backup in a networked computing environment
08/28/14Flexibly managing record retention via a records management software program
08/28/14Context-aware tagging for augmented reality environments
08/28/14Context-aware tagging for augmented reality environments
08/28/14Integrity checking and selective deduplication based on network parameters
08/28/14Multi-level memory compression
08/28/14Content validation for documentation topics using provider information
08/28/14Keyword refinement in temporally evolving online media
08/28/14Inline graphic scoper integrated with a search navigator
08/28/14Surprisal data reduction of genetic data for transmission, storage, and analysis
08/28/14Processing webpage data
08/28/14Data migration
08/28/14Optimizing user selection for performing tasks in social networks
08/28/14Discovering title information for structured data in a document
08/28/14Dynamic generation of demonstrative aids for a meeting
08/28/14Optimization of join queries for related data
08/28/14Fused multiply add pipeline
08/28/14Method for synchronizing, monitoring and capturing of system host activities occurring at locally installed applications
08/28/14Adjusting individuals in a group corresponding to relevancy
08/28/14Disk mirroring for personal storage
08/28/14Method for synchronization and management of system activities with locally installed applications
08/28/14Installation of an asset from a cloud marketplace to a cloud server in a private network
08/28/14Recommending server management actions for information processing systems
08/28/14Resource management with conditioned policies
08/28/14Method and apparatus for chunk-level sharing-based open virtualization format (ovf) package distribution through dependency analysis
08/28/14Preventing duplicate sources from clients served by a network address port translator
08/28/14Data processing lock signal transmission
08/28/14Affinity group access to global data
08/28/14Affinity group access to global data
08/28/14Affinity group access to global data
08/28/14Affinity group access to global data
08/28/14Asynchronous data mirroring in memory controller
08/28/14Identifying and accessing reference data in an in-memory data grid
08/28/14Identifying and accessing reference data in an in-memory data grid
08/28/14Managing and storing electronic messages during recipient unavailability
08/28/14Multi-level memory compression
08/28/14Array of processor core circuits with reversible tiers
08/28/14Background collective operation management in a parallel computer
08/28/14Intelligent context management
08/28/14Preventing unrecoverable errors during a disk regeneration in a disk array
08/28/14Using linked data to determine package quality
08/28/14Using linked data to determine package quality
08/28/14Managing software performance tests based on a distributed virtual machine system
08/28/14Automated execution of functional test scripts on a remote system within a unit testing framework
08/28/14System, method, and computer program product for physical drive failure identification, prevention, and minimization of firmware revisions
08/28/14Managing error logs in a distributed network fabric
08/28/14Testing of run-time instrumentation
08/28/14Collecting and attaching a bug trace to a problem information technology ticket
08/28/14Implementing client based throttled error logging
08/28/14Managing error logs in a distributed network fabric
08/28/14Latency reduced error correction scheme with error indication function for burst error correction codes
08/28/14Providing targeted messages via a social media system while concealing ties to the message source
08/28/14Duplicating graphical widgets
08/28/14Duplicating graphical widgets
08/28/14Controlling display object on display screen
08/28/14Method and apparatus for improved text entry
08/28/14Displaying data sets across a plurality of views of a user interface
08/28/14Readable structural text-based representation of activity flows
08/28/14Setting switch size and transition pattern in a resonant clock distribution system
08/28/14Setting switch size and transition pattern in a resonant clock distribution system
08/28/14System and method for transplanting source code
08/28/14Identifying test cases based on changed test code
08/28/14Determining a method to inline using an actual footprint calculation
08/28/14Automated application reconfiguration
08/28/14Managing allocation of hardware resources in a virtualized environment
08/28/14Synchronizing multicast groups
08/28/14Application and situation-aware community sensing
08/28/14Background collective operation management in a parallel computer
08/28/14Data processing work allocation
08/28/14Generating timing sequence for activating resources linked through time dependency relationships
08/28/14All-to-all message exchange in parallel computing systems
08/28/14Link optimization for callout request messages
08/28/14Data processing lock signal transmission
08/28/14Trust-based computing resource authorization in a networked computing environment
08/28/14Visually representing and managing access control of resources
08/28/14Gui-based authentication for a computing system
08/28/14Password authentication
08/28/14Preventing propagation of hardware viruses in a computing system
08/21/14Electrohydrodynamic airflow across a heat sink using a non-planar ion emitter array
08/21/14Methods and apparatus for detection of gaseous corrosive contaminants
08/21/14Apparatus and method for adjusting coolant flow resistance through liquid-cooled electronics rack(s)
08/21/14Micro-electro-mechanical system (mems) capacitive ohmic switch and design structures
08/21/14Methodology for fabricating isotropically recessed source regions of cmos transistors
08/21/14Collector-up bipolar junction transistors in bicmos technology
08/21/14Collector-up bipolar junction transistors in bicmos technology
08/21/14Mim capacitor in finfet structure
08/21/14Mim capacitor in finfet structure
08/21/14Trilayer sit process with transfer layer for finfet patterning
08/21/14Trilayer sit process with transfer layer for finfet patterning
08/21/14Finfets and fin isolation structures
08/21/14Integrated circuits with improved gate uniformity and methods for fabricating same
08/21/14Micro-electro-mechanical system (mems) and related actuator bumps, methods of manufacture and design structures
08/21/14Millimeter wave wafer level chip scale packaging (wlcsp) device and related method
08/21/14Rfid tag with environmental sensor
08/21/14Smart spacing allocation
08/21/14Transparent display field of view region determination
08/21/14Capturing diacritics on multi-touch devices
08/21/14Mobile device field of view region determination
08/21/14Reducing switch state size in flow-based networks
08/21/14Service awareness and seamless switchover between client based wifi access and mobile data network access
08/21/14Transmitting data to and from nodes of a clustered multi-hop network with a tdma scheme
08/21/14Directed route load/store packets for distributed switch initialization
08/21/14Directed route load/store packets for distributed switch initialization
08/21/14Directed route load/store packets for distributed switch initialization
08/21/14Verifying vendor identification and organization affiliation of an individual arriving at a threshold location
08/21/14Test pad structure for reuse of interconnect level masks
08/21/14Methodology and apparatus for tuning driving current of semiconductor transistors
08/21/14Junction field effect transistor structure with p-type silicon germanium or silicon germanium carbide gate(s) and method of forming the structure
08/21/14Silicon carrier space transformer and temporary chip attach burn-in vehicle for high density connections
08/21/14Externally serviceable it memory dimms for server/tower enclosures
08/21/14Service awareness and seamless switchover between client based wifi access and mobile data network access
08/21/14System of edge byte caching for cellular networks
08/21/14Multi-tunable superconducting circuits
08/21/14Dynamic identification of the biomarkers leveraging the dynamics of the biomarker
08/21/14Dynamic identification of the biomarkers leveraging the dynamics of the biomarker
08/21/14Efficient validation of coherency between processor cores and accelerators in computer systems
08/21/14Coverage model and measurements for partial instrumentation
08/21/14Disambiguation of dependent referring expression in natural language processing
08/21/14Automatic semantic rating and abstraction of literature
08/21/14Biomedical feedback
08/21/14Infrastructure asset management
08/21/14Incorporating user insights into predicting, diagnosing and remediating problems that threaten on-time delivery of software and systems
08/21/14Associating a meeting room with a meeting
08/21/14Gui support for diagnosing and remediating problems that threaten on-time delivery of software and systems
08/21/14Estimating, learning, and enhancing project risk
08/21/14Estimating, learning, and enhancing project risk
08/21/14Nutritional monitoring and feedback
08/21/14Associating a meeting room with a meeting
08/21/14Publishing activity tasks in a collaborative environment
08/21/14Data distribution system, method and program product
08/21/14Snapshot management in hierarchical storage infrastructure
08/21/14Streaming delay patterns in a streaming environment
08/21/14Integrated automatic user support and assistance
08/21/14Match window size for matching multi-level transactions between log files
08/21/14Mapping epigenetic surprisal data througth hadoop type distributed file systems
08/21/14Using vacation automatic replies to enhance bulk marketing campaigns
08/21/14Using vacation automatic replies to enhance bulk marketing campaigns
08/21/14Mapping surprisal data througth hadoop type distributed file systems
08/21/14Managing global cache coherency in a distributed shared caching for clustered file systems
08/21/14Building an ontology by transforming complex triples
08/21/14Intelligently detecting the leader of a co-browsing session
08/21/14Social network pruning
08/21/14Enhanced notification for relevant communications
08/21/14Social network pruning
08/21/14Streaming delay patterns in a streaming environment
08/21/14Dual-buffer serialization and consumption of variable-length data records produced by multiple parallel threads
08/21/14Sending a next request to a resource before a completion interrupt for a previous request
08/21/14Determining a virtual interrupt source number from a physical interrupt source number
08/21/14Managing the translation look-aside buffer (tlb) of an emulated machine
08/21/14Filtering snoop traffic in a multiprocessor computing system
08/21/14Efficient validation of coherency between processor cores and accelerators in computer systems
08/21/14Apparatus and method for handling page protection faults in a computing system
08/21/14Vectorization in an optimizing compiler
08/21/14Mapping a glyph to character code in obfuscated data
08/21/14Scalable precomputation system for host-opaque processing of encrypted databases
08/21/14Secure memory system with fast wipe feature
08/21/14Estimating power usage in a computing environment
08/21/14Estimating power usage in a computing environment
08/21/14Characterization and functional test in a processor or system utilizing critical path monitor to dynamically manage operational timing margin
08/21/14Dynamic loading of tabular data
08/21/14Method and system for optimizing rendering of data tables
08/21/14Markup language parser
08/21/14Disambiguation of dependent referring expression in natural language processing
08/21/14Role-based display of document renditions for web conferencing
08/21/14Integrated circuit pad modeling
08/21/14System and method for an object instance acquirer
08/21/14Bi-directional linking of product build information
08/21/14System and method for an object instance acquirer
08/21/14Test data generation utilizing analytics
08/21/14Automated debug trace specification
08/21/14Vectorization in an optimizing compiler
08/21/14Virtual machine-to-image affinity on a physical server
08/21/14Virtualization of storage buffers used by asynchronous processes
08/21/14Virtual machine-to-image affinity on a physical server
08/21/14Generalized application message generation service
08/21/14Personalized augmented a/v stream creation
08/21/14Input prediction in a database access control system
08/21/14Collaborative computing community role mapping system and method
08/21/14Method and system for managing and controlling direct access of an administrator to a computer system
08/21/14Reducing the spread of viruses and errors in social networks and affinity groups
08/21/14Automatic correction of security downgraders
08/21/14Rule matching in the presence of languages with no types or as an adjunct to current analyses for security vulnerability analysis
08/21/14Rule matching in the presence of languages with no types or as an adjunct to current analyses for security vulnerability analysis
08/21/14Automatic correction of security downgraders
08/14/14Temperature stabilization in semiconductors using the magnetocaloric effect
08/14/14Water-assisted air cooling for a row of cabinets
08/14/14Interdigitated back contact heterojunction photovoltaic device with a floating junction front surface field
08/14/14Interdigitated back contact heterojunction photovoltaic device
08/14/14Fill head interface with combination vacuum pressure chamber
08/14/14Multi chip smart card
08/14/14Interconnect wiring switches and integrated circuits including the same
08/14/14Biological and chemical sensors
08/14/14Lateral extended drain metal oxide semiconductor field effect transistor (ledmosfet) with tapered airgap field plates
08/14/14Carbon nanostructure device fabrication utilizing protect layers
08/14/14Changing effective work function using ion implantation during dual work function metal gate integration
08/14/14Modulating bow of thin wafers
08/14/14Implementing dynamic regulator output current limiting
08/14/14High bandwidth signal probe tip
08/14/14Compensating for process variation in integrated circuit fabrication
08/14/14Setting a display position of a pointer
08/14/14Variable stopwrite threshold
08/14/14Adaptive soft-output detector for magnetic tape read channels
08/14/14Adaptive soft-output detector for magnetic tape read channels
08/14/14Adaptive soft-output detector for magnetic tape read channels
08/14/14Methods for formatting and using linear recording media having a reduced servo band width
08/14/14Linear recording device for executing optimum writing upon receipt of series of commands including mixed read and write commands and method and program thereof
08/14/14Targeted cooling to specific overheating rack-mounted servers
08/14/14Input buffered switching device including bypass logic
08/14/14Reduced wiring requirements with signal slope manipulation
08/14/14Deconvolution of digital images
08/14/14Silicon-containing antireflective coatings including non-polymeric silsesquioxanes
08/14/14Interdigitated back contact heterojunction photovoltaic device with a floating junction front surface field
08/14/14Interdigitated back contact heterojunction photovoltaic device
08/14/14Method of forming a through-silicon via utilizing a metal contact pad in a back-end-of-line wiring level to fill the through-silicon via
08/14/14Elongated via structures
08/14/14Determining fluid leakage volume in pipelines
08/14/14Latent semantic analysis for application in a question answer system
08/14/14Latent semantic analysis for application in a question answer system
08/14/14Meeting notifications for offline invitees
08/14/14Scheduling based on customer tracking
08/14/14Determining the progress of adoption and alignment of information technology capabilities and on-demand capabilities by an organization
08/14/14Electronic map
08/14/14Congestion free shopping
08/14/14Using both social media and non-social media information to identify anomalous behavior
08/14/14Work-item notification classifier
08/14/14Database management delete efficiency
08/14/14Management of database allocation during reorganization
08/14/14Database management delete efficiency
08/14/14Management of database allocation during reorganization
08/14/14Asynchronous pausing of the formation of consistency groups
08/14/14Method of synchronizing data between databases, and computer system and computer program for the same
08/14/14Validating content from an original communication included in a new communication
08/14/14Data placement optimization
08/14/14Data quality assessment
08/14/14Web testing tools system and method
08/14/14Ranking of meeting topics
08/14/14Prioritizing work and personal items from various data sources using a user profile
08/14/14Document search system which reflects the situation of using documents in the search results
08/14/14Supporting big data in enterprise content management systems
08/14/14Validating content from an original communication included in a new communication
08/14/14Mail server-based dynamic workflow management
08/14/14Productivity system with event-driven communications manager, method and program product therefor
08/14/14Systems and methods for assisting users with contact, access, and distribution lists
08/14/14Systems and methods for backing up storage volumes in a storage system
08/14/14Prioritizing work and personal items from various data sources using a user profile
08/14/14Configuration of servers for backup
08/14/14Configuration of servers for backup
08/14/14Differentiating image files in a networked computing environment
08/14/14Dynamic generation of policy enforcement rules and actions from policy attachment semantics
08/14/14Applying policy attachment service level management (slm) semantics within a peered policy enforcement deployment
08/14/14Policy assertion linking to processing rule contexts for policy enforcement
08/14/14Dynamic generation of policy enforcement rules and actions from policy attachment semantics
08/14/14Behavior based client selection for disparate treatment
08/14/14Management of node membership in a distributed system
08/14/14Validation of service management requests of a mobile device in a geographically bounded space
08/14/14Service failover and failback using enterprise service bus
08/14/14Optimising data transmission in a hypercube network
08/14/14Cache prefetching based on non-sequential lagging cache affinity
08/14/14Coherent attached processor proxy supporting coherence state update in presence of dispatched master
08/14/14Coherent attached processor proxy supporting coherence state update in presence of dispatched master
08/14/14Instruction set architecture with secure clear instructions for protecting processing unit architected state information
08/14/14Volume initialization for asynchronous mirroring
08/14/14Systems, methods and computer program products for selective copying of track data through peer-to-peer remote copy
08/14/14Asynchronous pausing of the formation of consistency groups
08/14/14Determining a metric considering unallocated virtual storage space and remaining physical storage space to use to determine whether to generate a low space alert
08/14/14Dynamic thread status retrieval using inter-thread communication
08/14/14Extensible execution unit interface architecture
08/14/14Dynamic thread status retrieval using inter-thread communication
08/14/14Local instruction loop buffer utilizing execution unit register file
08/14/14Indirect instruction predication
08/14/14Indirect instruction predication
08/14/14Extensible execution unit interface architecture
08/14/14Local instruction loop buffer utilizing execution unit register file
08/14/14Branch prediction with power usage prediction and control
08/14/14Method and system for discovery, validation and delivery of power through a universal power center
08/14/14Method, system and program product for deploying and allocating an autonomic sensor network ecosystem
08/14/14Dynamic hard error detection
08/14/14Dynamic hard error detection
08/14/14System and method for providing content using dynamic action templates
08/14/14System and method for providing content using dynamic action templates
08/14/14Visualization of runtime resource policy attachments and applied policy details
08/14/14Visualization of runtime resource policy attachments and applied policy details
08/14/14Enabling gesture driven content sharing between proximate computing devices
08/14/14Semantic mapping of objects in a user interface automation framework
08/14/14Selective voltage binning within a three-dimensional integrated chip stack
08/14/14System and method for transplanting source code
08/14/14Parallel development of a software system
08/14/14Parallel development of a software system
08/14/14Debugger with previous version feature
08/14/14Debugger with previous version feature
08/14/14Generating input values for a test dataset from a datastore based on semantic annotations
08/14/14Commit sensitive tests
08/14/14Resource allocation based on revalidation and invalidation rates
08/14/14System and method for determining when cloud virtual machines need to be updated
08/14/14Instrumentation and monitoring of service level agreement (sla) and service policy enforcement
08/14/14Validation of service management requests of a mobile device in a geographically bounded space
08/14/14Secure electronic device application connection to an application server
08/14/14Instruction set architecture with secure clear instructions for protecting processing unit architected state information
08/07/14Microcapsules adapted to rupture in a magnetic field
08/07/14Processing system for combined metal deposition and reflow anneal for forming interconnect structures
08/07/14Buffer layer for high performing and low light degraded solar cells
08/07/14Laminating magnetic cores for on-chip magnetic devices
08/07/14Laminating magnetic cores for on-chip magnetic devices
08/07/14Composite filtration membranes and methods of preparation thereof
08/07/14Thin film wafer transfer and structure for electronic devices
08/07/14Diode structure and method for wire-last nanomesh technologies
08/07/14Planar semiconductor growth on iii-v material
08/07/14Partial sacrificial dummy gate with cmos device with high-k metal gate
08/07/14Stress engineered multi-layers for integration of cmos and si nanophotonics
08/07/14Diode structure and method for wire-last nanomesh technologies
08/07/14Finfet structure and method to adjust threshold voltage in a finfet structure
08/07/14Diode structure and method for finfet technologies
08/07/14Diode structure and method for gate all around silicon nanowire technologies
08/07/14Diode structure and method for finfet technologies
08/07/14Diode structure and method for gate all around silicon nanowire technologies
08/07/14Electrostatically controlled magnetic logic device
08/07/14Trench isolation for bipolar junction transistors in bicmos technology
08/07/14Composites comprised of aligned carbon fibers in chain-aligned polymer binder
08/07/14Interconnect structure and method of making same
08/07/14Electronic fuse having a damaged region
08/07/14Wide bandwidth resonant global clock distribution
08/07/14Systems and methods for managing computing systems utilizing augmented reality
08/07/14Systems and methods for managing computing systems utilizing augmented reality
08/07/14Sensor for imaging inside equipment
08/07/14Assessing response routes in a network
08/07/14Multi-role distributed line card
08/07/14Virtual switching based flow control
08/07/14Time-based sentiment analysis for product and service features
08/07/14Cationic polymers for antimicrobial applications and delivery of bioactive materials
08/07/14Resist performance for the negative tone develop organic development process
08/07/14Usage of quantitative information measure to support decisions in sequential clinical risk assessment examinations
08/07/14Thin film wafer transfer and structure for electronic devices
08/07/14Planar semiconductor growth on iii-v material
08/07/14Processing system for combined metal deposition and reflow anneal for forming interconnect structures
08/07/14Microcapsules adapted to rupture in a magnetic field
08/07/14Microcapsules adapted to rupture in a magnetic field
08/07/14Condition-based management of power transformers
08/07/14Automatically identifying a capacity of a resource
08/07/14Device-independent attendance prompting tool for electronically-scheduled events
08/07/14Exploring the impact of changing project parameters on the likely delivery date of a project
08/07/14Quantifying the quality of trend lines
08/07/14Quantifying the quality of trend lines
08/07/14Identifying direct and indirect cost of a disruption of a resource
08/07/14Determining cost and risk associated with assets of an information technology environment
08/07/14Detecting patterns that increase the risk of late delivery of a software project
08/07/14System and method for segmenting items in a shopping cart by carbon footprint
08/07/14Consolidating multiple neurosynaptic cores into one memory
08/07/14Natural language question expansion and extraction
08/07/14Dynamic model-based analysis of data centers
08/07/14Construction of tree-shaped baysian network
08/07/14Simplified query generation from prior query results
08/07/14Generating and displaying an image tour in response to a user search query
08/07/14Authority based content filtering
08/07/14Feedback analysis for content improvement tasks
08/07/14Content revision using question and answer generation
08/07/14Sorting multiple records of data using ranges of key values
08/07/14Identity propagation through application layers using contextual mapping and planted values
08/07/14Managing the storage of media content
08/07/14Managing the storage of media content
08/07/14Method, computer system, and physical computer storage medium for organizing data into data structures
08/07/14File system extended attribute support in an operating system with restricted extended attributes
08/07/14Collaborative negotiation of system resources among virtual servers running in a network computing environment
08/07/14Boosting remote direct memory access performance using cryptographic hash based approach
08/07/14Reliable and scalable image transfer for data centers with low connectivity using redundancy detection
08/07/14System and method for active transcoding of content in a distributed system
08/07/14Analysis of variance in network page access
08/07/14Sentry for information technology system blueprints
08/07/14Storage system based host computer monitoring
08/07/14Transparently tracking provenance information in distributed data systems
08/07/14Transparently tracking provenance information in distributed data systems
08/07/14Sentry for information technology system blueprints
08/07/14Cluster-aware resource provisioning in a networked computing environment
08/07/14Memory module status indication
08/07/14Non-authorized transaction processing in a multiprocessing environment
08/07/14Hardware prefetch management for partitioned environments
08/07/14Hardware prefetch management for partitioned environments
08/07/14Managing out-of-order memory command execution from multiple queues while maintaining data coherency
08/07/14Managing out-of-order memory command execution from multiple queues while maintaining data coherency
08/07/14Securing the contents of a memory drive
08/07/14In-kernel srcu implementation with reduced os jitter
08/07/14Securing the contents of a memory device
08/07/14Point in time copy operations from source volumes to space efficient target volumes in two stages via a non-volatile storage
08/07/14Managing virtual machine placement in a virtualized computing environment
08/07/14Storage system based host computer monitoring
08/07/14Key-based data security management
08/07/14Allocating additional requested storage space for a data set in a first managed space in a second managed space
08/07/14Allocating additional requested storage space for a data set in a first managed space in a second managed space
08/07/14Storing a system-absolute address (saa) in a first level translation look-aside buffer (tlb)
08/07/14Load latency speculation in an out-of-order computer processor
08/07/14Load latency speculation in an out-of-order computer processor
08/07/14Method of entropy randomization on a parallel computer
08/07/14Method of entropy randomization on a parallel computer
08/07/14Kernel execution for hybrid systems
08/07/14Configuring operating system administration capabilities using an embedded workflow engine
08/07/14Testing a configuration change
08/07/14Tunable sector buffer for wide bandwidth resonant global clock distribution
08/07/14Intelligently responding to hardware failures so as to optimize system performance
08/07/14Multi-core re-initialization failure control system
08/07/14Multi-core re-initialization failure control system
08/07/14Selective monitoring of archive and backup storage
08/07/14Intelligently responding to hardware failures so as to optimize system performance
08/07/14Motivating lazy rcu callbacks under out-of-memory conditions
08/07/14Methods, systems and computer program products for facilitating visualization of interrelationships in a spreadsheet
08/07/14Apparatus and methods for co-located social integration and interactions
08/07/14Apparatus and methods for co-located social integration and interactions
08/07/14Controlling computer-based instances
08/07/14Automatic generation of wire tag lists for a metal stack
08/07/14System and method for documenting application executions
08/07/14Application runtime expert for deployment of an application on multiple computer systems
08/07/14Managing virtual clustering environments according to requirements
08/07/14Determining a relative priority for a job using context and environmental considerations
08/07/14Display tag cloud viewer interactive interface for enabling a viewer to quickly and effectively access a desired television program for viewing
08/07/14Dynamically constructed capability for enforcing object access order
08/07/14Allowing access to underlying hardware consoles to correct problems experiencing by user
08/07/14Method and device for integrating multiple threat security services
08/07/14Malware detection via network information flow theories
08/07/14Transceiver locking assembly
08/07/14Transceiver locking assembly
07/31/14Electro-optical assembly fabrication
07/31/14Mems switches and fabrication methods
07/31/143d assembly for interposer bow
07/31/14Nanowire capacitor for bidirectional operation
07/31/14Nanowire capacitor for bidirectional operation
07/31/14Flattened substrate surface for substrate bonding
07/31/14Germanium photodetector schottky contact for integration with cmos and si nanophotonics
07/31/14Photoconductor-on-active pixel device
07/31/14Self-adjusting gate hard mask
07/31/14Self-adjusting gate hard mask
07/31/14Dual silicide process
07/31/14Near-infrared absorbing film compositions
07/31/14Method of fabricating isolated capacitors and structure thereof
07/31/14Electronic fuse line with modified cap
07/31/14Electronic fuse having an insulation layer
07/31/14Method for implementing deep trench enabled high current capable bipolar transistor for current switching and output driver applications
07/31/14Organic module emi shielding structures and methods
07/31/14Horizontally aligned graphite nanofibers in etched silicon wafer troughs for enhanced thermal performance
07/31/14Copper interconnect structure and its formation
07/31/14Binding bisphenol a in a polycarbonate container
07/31/14Multi-branch current/voltage sensor array
07/31/14Dynamic current source for zero-crossing amplifier units for use in high-speed communication circuits
07/31/14Entry technology for building automation
07/31/14Emulating pressure sensitivity on multi-touch devices
07/31/14Variable stopwrite threshold with variable smoothing factor
07/31/14Esd protection device for sst transmitter
07/31/14Method and apparatus for read measurement of a plurality of resistive memory cells
07/31/14Read measurement of a plurality of resistive memory cells
07/31/14Read circuit for memory
07/31/14Level-estimation in multi-level cell memory
07/31/14Process variation skew in an sram column architecture
07/31/14High density hybrid storage system
07/31/14Active ip forwarding in an event driven virtual link aggregation (vlag) system
07/31/14Spanning tree protocol (stp) implementation on an event driven virtual link aggregation (vlag) system
07/31/14Active ip forwarding in an event driven virtual link aggregation (vlag) system
07/31/14Sliced routing table management with replication
07/31/14Information technology asset location using visual detectors
07/31/14Information technology asset location using visual detectors
07/31/14Summarizing salient events in unmanned aerial videos
07/31/14Attribute-based alert ranking for alert adjudication
07/31/14Efficient verification or disambiguation of character recognition results
07/31/14Tracking changes among similar documents
07/31/14Pre-gate, source/drain strain layer formation
07/31/14Forming structures on resistive substrates
07/31/14Semiconductor device including substrate contact and related method
07/31/14Primary circuit board non-conductive void having different planar dimensions through board thickness to secure non-conducting locking member of holder
07/31/14Direction coupling discrimination of networked exchanges
07/31/14Direction coupling discrimination of networked exchanges
07/31/14Estimating condition of battery, related system and vehicle
07/31/14Interpolation techniques used for time alignment of multiple simulation models
07/31/14Interpolation techniques used for time alignment of multiple simulation models
07/31/14Composite simulation modeling and analysis
07/31/14Composite simulation modeling and analysis
07/31/14Specification properties creation for a visual model of a system
07/31/14System and method for improving voice communication over a network
07/31/14Sentiment analysis based on demographic analysis
07/31/14Technology for combating mobile phone criminal activity
07/31/14System and method for improving voice communication over a network
07/31/14System and method for ensuring timing study quality in a service delivery environment
07/31/14System and method for ensuring timing study quality in a service delivery environment
07/31/14Data distribution system, method and program product
07/31/14Method and system for online recommendation
07/31/14System advisor for requirements gathering and analysis in web solutions
07/31/14System advisor for requirements gathering and analysis in web...
07/31/14Inconsistency detection between structured and non-structured data
07/31/14Cortical simulator
07/31/14Synchronization of time between different simulation models
07/31/14Synchronization of time between different simulation models
07/31/14System and method for managing content
07/31/14Data de-duplication for disk image files
07/31/14System, method, and computer readable media for identifying a user-initiated log file record in a log file
07/31/14Ordering search-engine results
07/31/14Join operation partitioning
07/31/14Dynamically determining join order
07/31/14Efficient join with one or more large dimension tables
07/31/14Technique for factoring uncertainty into cost-based query optimization
07/31/14Adjusting search results based on user skill and category information
07/31/14Data caveats for database tables
07/31/14Data caveats for database tables
07/31/14Integrating smart social question and answers enabled for use with social networking tools
07/31/14Information gathering via crowd-sensing
07/31/14Automatically analyzing operation sequences
07/31/14Reducing collisions within a hash table
07/31/14Measuring and displaying facets in context-based conformed dimensional data gravity wells
07/31/14Finding time-dependent associations between comparative effectiveness variables
07/31/14Generation of synthetic context frameworks for dimensionally constrained hierarchical synthetic context-based objects
07/31/14Identifying missing content using searcher skill ratings
07/31/14Segmenting documents within a full text index
07/31/14Managing and improving question and answer resources and channels
07/31/14Supporting flexible types in a database
07/31/14Performing batches of selective assignments in a vector friendly manner
07/31/14Managing content across different device types
07/31/14Method and apparatus for managing sessions of different websites
07/31/14Broker facilitated peer-to-peer publisher collaboration in a publish-subscription environment
07/31/14Managing electronic mail for an end-user that is unavailable
07/31/14Establishing an automatic communications delay based on social or business network factors
07/31/14Establishing an automatic communications delay based on prevailing activity factors
07/31/14Method and device for data transmissions using rdma
07/31/14System and method for managing content
07/31/14Enabling access to user-chosen and/or preferred content via remote trusted third-party systems
07/31/14Enabling access to user-chosen and/or preferred content via remote trusted third-party systems
07/31/14Provision of management information and requests among management servers within a computing network
07/31/14Computing optimized virtual machine allocations using equivalence combinations
07/31/14Spanning tree protocol (stp) implementation on an event driven virtual link aggregation (vlag) system
07/31/14Apparatus, method and program product for determining the data recall order
07/31/14Limiting the execution of background management operations in a drive array
07/31/14Limiting the execution of background management operations in a drive array
07/31/14Managing concurrent accesses to a cache
07/31/14Processing read and write requests in a storage controller
07/31/14Memory management in a streaming application
07/31/14Resource management in mapreduce architecture and architectural system
07/31/14Memory management in a streaming application
07/31/14Cluster management in a shared nothing cluster
07/31/14Rebuilding a storage array
07/31/14Statistical design with importance sampling reuse
07/31/14Selective restoration of data from non-volatile storage to volatile memory
07/31/14High-speed memory system
07/31/14Creating tag clouds based on user specified arbitrary shape tags
07/31/14Creating tag clouds based on user specified arbitrary shape tags
07/31/14Utilizing classification and text analytics for annotating documents to allow quick scanning
07/31/14Information processing apparatus, information processing method, and information processing program
07/31/14Assistive overlay for report generation
07/31/14Automatic extraction, modeling, and code mapping of application user interface display screens and components
07/31/14Automatic extraction, modeling, and code mapping of application user interface display screens and components
07/31/14Controlling which users from an organization are to be part of a community space in an easy and error-free manner
07/31/14Indicating organization of visitor on user interface of user engaged in collaborative activity with visitor
07/31/14Display of invitee-posted update information regarding meeting within calendaring-oriented computer program
07/31/14Controlling which users from an organization are to be part of a community space in an easy and error-free manner
07/31/14Smart interactive bookmarks
07/31/14Connections identification
07/31/14Touch-based multiple selection
07/31/14Assistive overlay for report generation
07/31/14Adjusting values of a plurality of conditions
07/31/14Near-neighbor trimming of dummy fill shapes with built-in optical proximity corrections for semiconductor applications
07/31/14Power/performance optimization through continuously variable temperature-based voltage control
07/31/14Method and apparatus for enabling layered property definition in traditional and cloud computing environments
07/31/14Static analysis of computer software applications having a model-view-controller architecture
07/31/14Automatic untangling cyclic dependencies in software systems
07/31/14Managing change-set delivery
07/31/14Tool-independent automated testing of software
07/31/14Dominant-state-based coverage metric
07/31/14Service node, network, and method for pre-fetching for remote program installation
07/31/14Optimization of virtual machine sizing and consolidation
07/31/14Optimization of virtual machine sizing and consolidation
07/31/14Realizing graph processing based on the mapreduce architecture
07/31/14Task scheduling based on thermal conditions of locations of processors
07/31/14Managing model building components of data analysis applications
07/31/14Transferring a broadcast transmission to a remote device
07/31/14Authentication within openflow network
07/31/14Establishment of a trust index to enable connections from unknown devices
07/31/14Indicating organization of visitor on user interface of user engaged in collaborative activity with visitor
07/31/14Establishment of a trust index to enable connections from unknown devices
07/31/14Automated role adjustment in a computer system
07/31/14Automated role adjustment in a computer system
07/31/14Attack resistant computer system
07/31/14Method and system for analysis of security events in a managed computer network
07/31/14Security filter for context-based data gravity wells
07/24/14Assembly of electronic and optical devices
07/24/14Silicon solar cell manufacture
07/24/14Implementing pre-treatment of water cooling hoses to increase reliability
07/24/14Multi-level redundant cooling system for continuous cooling of an electronic system(s)
07/24/14Wire-last integration method and structure for iii-v nanowire devices
07/24/14Wire-last integration method and structure for iii-v nanowire devices
07/24/14Self-aligned biosensors with enhanced sensitivity
07/24/14Adhesion layer and multiphase ultra-low k dielectric material
07/24/14Ferroelectric random access memory with optimized hardmask
07/24/14Butted soi junction isolation structures and devices and method of fabrication
07/24/14Reducing contact resistance by direct self-assembling
07/24/14Extremely thin semiconductor-on-insulator field-effect transistor with an epitaxial source and drain having a low external resistance
07/24/14Extremely thin semiconductor-on-insulator field-effect transistor with an epitaxial source and drain having a low external resistance
07/24/14Finfet device formation
07/24/14Low alpha particle emission electrically-conductive coating
07/24/14Chip stack with electrically insulating walls
07/24/14In-situ thermoelectric cooling
07/24/14Selective local metal cap layer formation for improved electromigration behavior
07/24/14Selective local metal cap layer formation for improved electromigration behavior
07/24/14Metal lines having etch-bias independent height
07/24/14Random coded integrated circuit structures and methods of making random coded integrated circuit structures
07/24/14Air-dielectric for subtractive etch line and via metallization
07/24/14Method of forming graphene nanomesh
07/24/14Current detector to sense current without being in series with conductor
07/24/14Marchand balun structure and design method
07/24/14Notch filter structure with open stubs in semiconductor substrate and design structure
07/24/14Validation of mechanical connections
07/24/14Method and system for automatic residual consumption
07/24/14High frequency phase shifter array testing
07/24/14Dimensional data chart matrixes with drill operations
07/24/14Servo control
07/24/14Pcb stackup having high- and low-frequency conductive layers and having insulating layers of different material types
07/24/14Racetrack memory cells with a vertical nanowire storage element
07/24/14Racetrack memory cells with a vertical nanowire storage element
07/24/14Complementary metal-oxide-semiconductor (cmos) dynamic random access memory (dram) cell with sense amplifier
07/24/14System and method of quantum computing using three-state representation of a qubit
07/24/14Multicast traffic forwarding on pruned interface
07/24/14Deadlock-free routing using edge-disjoint sub-networks
07/24/14Arbitration of multiple-thousands of flows for convergence enhanced ethernet
07/24/14Networking device port multiplexing
07/24/14Multicast route entry synchronization
07/24/14Preprocessing unit for network data
07/24/14System, method and program for setting wage for call center personnel
07/24/14Techniques for ground-level photo geolocation using digital elevation
07/24/14Techniques for ground-level photo geolocation using digital elevation
07/24/14Implementing embedded hybrid electrical-optical pcb construct
07/24/14Cable assembly
07/24/14Low alpha particle emission electrically-conductive coating
07/24/14Method of forming graphene nanomesh
07/24/14Visualizing the mood of a group of individuals
07/24/14Contact resistance test structure and method suitable for three-dimensional integrated circuits
07/24/14Chip stack with electrically insulating walls
07/24/14Three dimensional fet devices having different device widths
07/24/14Silicide formation in high-aspect ratio structures
07/24/14Land grid array (lga) socket cartridge and method of forming
07/24/14Stack connector component in which high-speed signal pins are routed to different side than low-speed signal pins, and circuit board therefor
07/24/14System and method of creating and providing sms http tagging
07/24/14Energy production from fluid
07/24/14Energy grid device commissioning
07/24/14Lane determination based on spatial data from local sources
07/24/14Integrated time dependent dielectric breakdown reliability testing
07/24/14Feature selection for efficient epistasis modeling for phenotype prediction
07/24/14Feature selection for efficient epistasis modeling for phenotype prediction
07/24/14Real-time customizable media content filter
07/24/14Skill mapping analysis
07/24/14System and method of calculating task efforts and applying the results for resource planning
07/24/14Methods and apparatus for procurement
07/24/14Methods and apparatus for procurement
07/24/14System, method and computer program for identifying value aggregation points from a set of service value maps
07/24/14Skills amelioration system
07/24/14Web-based technique for dynamic competitive pricing
07/24/14Environmentally responsive shipping selection
07/24/14Transductive lasso for high-dimensional data regression problems
07/24/14Transductive feature selection with maximum-relevancy and minimum-redundancy criteria
07/24/14Transductive feature selection with maximum-relevancy and minimum-redundancy criteria
07/24/14Transductive lasso for high-dimensional data regression problems
07/24/14Structural plasticity in spiking neural networks with symmetric dual of an electronic neuron
07/24/14Computing regression models
07/24/14Rapid provisioning of information for business analytics
07/24/14Recovery for long running multithreaded processes
07/24/14Reconstruction of system definitional and state information
07/24/14Merging compressed data arrays
07/24/14Data compression algorithm selection and tiering
07/24/14Gathering index statistics using sampling
07/24/14Using temporary performance objects for enhanced query performance
07/24/14Using metaphors to present concepts across different intellectual domains
07/24/14Dynamic feature selection with max-relevancy and minimum redundancy criteria
07/24/14Dynamic feature selection with max-relevancy and minimum redundancy criteria
07/24/14Search engine optimization using a find operation
07/24/14System and method for identifying groups of entities
07/24/14Computer-implemented information reuse
07/24/14On the fly data binning
07/24/14Managing tag clouds
07/24/14Mapping and boosting of terms in a format independent data retrieval query
07/24/14Hill-climbing feature selection with max-relevancy and minimum redundancy criteria
07/24/14Hill-climbing feature selection with max-relevancy and minimum redundancy criteria
07/24/14Video data filtering
07/24/14Searching alternative data sources
07/24/14Simulating accesses for archived content
07/24/14System and method for preferred services in nomadic environments
07/24/14Simulating accesses for archived content
07/24/14Using metaphors to present concepts across different intellectual domains
07/24/14Automatically granting access to content in a microblog
07/24/14Generating xml schema from json data
07/24/14Decomposing xml schema documents into subsets
07/24/14Decomposing xml schema documents into subsets
07/24/14Client-side aggregation of nested resource dependencies
07/24/14Client-side aggregation of nested resource dependencies
07/24/14User interface with recipient status indication
07/24/14User interface with recipient status indication
07/24/14Synchronous conferencing with aggregation of messages
07/24/14Communication management
07/24/14Systems, methods and algorithms for logical movement of data objects
07/24/14Automatic configuration of host networking device networking interface without user interaction
07/24/14Independent network interfaces for virtual network environments
07/24/14Independent network interfaces for virtual network environments
07/24/14Signal overload management in major events and disasters
07/24/14Server restart management via stability time
07/24/14Network element diagnostic evaluation
07/24/14Systems, methods and algorithms for logical movement of data objects
07/24/14Storage managment in a multi-tiered storage architecture
07/24/14Storage managment in a multi-tiered storage architecture
07/24/14Address management in an overlay network environment
07/24/14System and method for accessing information
07/24/14Cached phy register data access
07/24/14Multiprocessor system with multiple concurrent modes of execution
07/24/14Use of differing granularity heat maps for caching and migration
07/24/14Performing staging or destaging based on the number of waiting discard scans
07/24/14Sub-lun input/output profiling for ssd devices
07/24/14Sub-lun input/output profiling for ssd devices
07/24/14Thinly provisioned flash cache with shared storage pool
07/24/14Tiered caching and migration in differing granularities
07/24/14Use of differing granularity heat maps for caching and migration
07/24/14Thinly provisioned flash cache with shared storage pool
07/24/14Extender storage pool system
07/24/14Use of flash cache to improve tiered migration performance
07/24/14Use of flash cache to improve tiered migration performance
07/24/14Performing staging or destaging based on the number of waiting discard scans
07/24/14Expiring virtual content from a chache in a virtual universe
07/24/14Sectored cache replacement algorithm for reducing memory writebacks
07/24/14Creating a program product or system for executing an instruction for pre-fetching data and releasing cache lines
07/24/14Method and system for cascaded flashcopy zoning and algorithm and/or computer program code and method implementing the same
07/24/14Re-aligning a compressed data array
07/24/14Out-of-memory avoidance in dynamic virtual machine memory adjustment
07/24/14Polymorph table with shared columns
07/24/14Vector generate mask instruction
07/24/14Vector element rotate and insert under mask instruction
07/24/14Vector floating point test data class immediate instruction
07/24/14Vector checksum instruction
07/24/14Vector galois field multiply sum and accumulate instruction
07/24/14Vector exception code
07/24/14Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
07/24/14Cross communication of common problem determination and resolution
07/24/14Monitoring and capturing early diagnostic data
07/24/14Error protection for integrated circuits
07/24/14Representation of an element in a page via an identifier
07/24/14Representation of an element in a page via an identifier
07/24/14Method and apparatus for intelligent capture of document object model events
07/24/14Image obfuscation in web content
07/24/14Synchronization of contextual templates in a customized web conference presentation
07/24/14Managing sensitive information
07/24/14Updating assets rendered in a virtual world environment based on detected user interactions in another world
07/24/14Turning pages of an electronic document by means of a single snap gesture
07/24/14Search engine optimization utilizing scrolling fixation
07/24/14Pressure navigation on a touch sensitive user interface
07/24/14Real-time display of electronic device design changes between schematic and/or physical representation and simplified physical representation of design
07/24/14Generating application model build artifacts
07/24/14Validation of revised computer programs
07/24/14Program subset execution and debug
07/24/14Communication stack for software-hardware co-execution on heterogeneous computing systems with processors and reconfigurable logic (fpgas)
07/24/14Function calling computer programs
07/24/14Automatically identifying criticality of software fixes specific to a client deployment and usage of software product
07/24/14Automatically propagating updates in a data center
07/24/14Live virtual machine migration quality of service
07/24/14Creating a virtual resource package
07/24/14Rate of operation progress reporting
07/24/14Live virtual machine migration quality of service
07/24/14Firewall event reduction for rule use counting
07/24/14User authentication
07/24/14Mitigating security risks via code movement
07/24/14System and method for temporary obfuscation during collaborative communications
07/24/14System and method for temporary obfuscation during collaborative communications
07/17/14Multi-junction iii-v solar cell
07/17/14Multi-junction iii-v solar cell
07/17/14Photovoltaic devices with an interfacial band-gap modifying structure and methods for forming the same
07/17/14Fixture to constrain laminate and method of assembly
07/17/14Apparel shopping method
07/17/14Overlap capacitance nanowire
07/17/14Overlap capacitance nanowire
07/17/14Buried waveguide photodetector
07/17/14Hybrid conductor through-silicon-via for power distribution and signal transmission
07/17/14Placement of storage cells on an integrated circuit
07/17/14On-chip randomness generation
07/17/14Determining alternative visualizations for data based on an initial data visualization
07/17/14Method and system for preserving a graphics file
07/17/14Method and system for preserving a graphics file
07/17/14Realtime photo retouching of live video
07/17/14Preemptive preloading of television program data
07/17/14Hierarchical control of tiered error recovery for storage devices
07/17/14Head with supplemental module for backward and/or cross-platform compatibility
07/17/14Solder assembly temperature monitoring process
07/17/14Disassemblable electronic assembly with leak-inhibiting coolant capillaries
07/17/14Multiple read port memory system with a single port memory cell
07/17/14Low-latency lossless switch fabric for use in a data center
07/17/14Link aggregation (lag) information exchange protocol
07/17/14Extended link aggregation (lag) for use in multiple switches
07/17/14Avoiding network address translaton in a mobile data network
07/17/14Data link layer switch frame forwarding analysis
07/17/14Dynamically determining packet sampling rates
07/17/14Management of distributed network switching cluster
07/17/14Avoiding network address translaton in a mobile data network
07/17/14Data link layer analysis with packet trace replay
07/17/14Duplicate check image resolution
07/17/14Lift mechanism
07/17/14Method for applying material to a surface
07/17/14Method and apparatus to apply material to a surface
07/17/14Method to print contact holes at high resolution
07/17/14Lithographic material stack including a metal-compound hard mask
07/17/14Scaled equivalent oxide thickness for field effect transistor devices
07/17/14Titanium oxynitride hard mask for lithographic patterning
07/17/14Hybrid conductor through-silicon-via for power distribution and signal transmission
07/17/14Asset failure prediction with location uncertainty
07/17/14Railway track geometry defect modeling for predicting deterioration, derailment risk, and optimal repair
07/17/14Large-scale multi-detector predictive modeling
07/17/14Large-scale multi-detector predictive modeling
07/17/14Online learning using information fusion for equipment predictive maintenance in railway operations
07/17/14Online learning using information fusion for equipment predictive maintenance in railway operations
07/17/14Prescription based shopping assistance
07/17/14Integration into mobile applications designed to encourage medication adherence of a healthcare survey that compensates users for participation
07/17/14Consolidation process command center
07/17/14Electronic calendar scheduling
07/17/14Dynamically ordering tasks in a task list based on indications of importance to the user
07/17/14Dynamically ordering tasks in a task list based on indications of importance to the user
07/17/14Scalable rule logicalization for asset health prediction
07/17/14Scalable rule logicalization for asset health prediction
07/17/14Personalized customer shopping experience
07/17/14Personalized customer shopping experience
07/17/14Entity resolution without using personally identifiable information
07/17/14Determining a payment policy
07/17/14Determining a payment policy
07/17/14Fraud detection employing personalized fraud detection rules
07/17/14Automatic genre determination of web content
07/17/14Optimally configuring an information landscape
07/17/14System and method for assigning data to columnar storage in an online transactional system
07/17/14Storing a key value to a deleted row based on key range density
07/17/14Rewriting relational expressions for different type systems
07/17/14Rewriting relational expressions for different type systems
07/17/14Enabling business intelligence applications to query semantic models
07/17/14Automatically providing relevant search results based on user behavior
07/17/14Indicating level of confidence in digital content
07/17/14Find regular expression instruction on substring of larger string
07/17/14Scoping searches within websites
07/17/14Gathering search queries from external devices for collaborative searching
07/17/14Role based authorization based on product content space
07/17/14Embedding a software content space for run-time implementation
07/17/14Using crowdsourcing to improve sentiment analytics
07/17/14Mobile itinerant software agent carrying itinerary and data within
07/17/14Personalizing a social networking profile page
07/17/14Adjusting the display of social media updates to varying degrees of richness based on environmental conditions and importance of the update
07/17/14System, methods, and computer program products for contextual collaborative updates for recurring meetings
07/17/14Personalizing a social networking profile page
07/17/14Determining states of a threaded communication
07/17/14Message subscription based on message aggregate characteristics
07/17/14Method, apparatus and computer programs providing cluster-wide page management
07/17/14Caching of look-up rules based on flow heuristics to enable high speed look-up
07/17/14Mirroring high performance and high availablity applications across server computers
07/17/14Configuration of network entities using firmware
07/17/14User-friendly storage network zoning
07/17/14Managing user privileges for computer resources in a networked computing environment
07/17/14Applying a client policy to a group of channels
07/17/14Virtual appliance chaining and management
07/17/14Applying a client policy to a group of channels
07/17/14Selective logging of network requests based on subsets of the program that were executed
07/17/14Real-time data analysis for resource provisioning among systems in a networked computing environment
07/17/14Implementing a private network isolated from a user network for virtual machine deployment and migration and for monitoring and managing the cloud environment
07/17/14Executing virtual functions using memory-based data in a pci express sr-iov and mr-iov environment
07/17/14Management of partial data segments in dual cache systems
07/17/14Method, apparatus and computer programs providing cluster-wide page management
07/17/14Optimized caching based on historical production patterns for catalogs
07/17/14Data recovery for coherent attached processor proxy
07/17/14Epoch-based recovery for coherent attached processor proxy
07/17/14Epoch-based recovery for coherent attached processor proxy
07/17/14Accelerated recovery for snooped addresses in a coherent attached processor proxy
07/17/14Event-based execution buffer management
07/17/14De-duplication aware secure delete
07/17/14Data recovery scheme based on data backup status
07/17/14Selecting first data sets in a first storage group to swap with second data sets in a second storage group
07/17/14Event-based execution buffer management
07/17/14Efficient allocation and reclamation of thin-provisioned storage
07/17/14Efficient allocation and reclamation of thin-provisioned storage
07/17/14Optimizing large page processing
07/17/14Reserving fixed areas in real storage increments
07/17/14Dynamic accessing of execution elements through modification of issue rules
07/17/14Confidence threshold-based opposing branch path execution for branch prediction
07/17/14Method and system for the supply of data, transactions and electronic voting
07/17/14Authorizing removable medium access
07/17/14Monitoring the temperature of a high powered computing component
07/17/14Monitoring the temperature of a high powered computing component
07/17/14Clock skew analysis and optimization
07/17/14Automatic computer storage medium diagnostics
07/17/14Disaster recovery in a networked computing environment
07/17/14Provisioning virtual environments based on policies for troubleshooting purposes
07/17/14Defect analysis system for error impact reduction
07/17/14Multi-core processor comparison encoding
07/17/14Methods and circuits for disrupting integrated circuit function
07/17/14Shared error protection for register banks
07/17/14Error protection for integrated circuits in an insensitive direction
07/17/14Error protection for a data bus
07/17/14Converting text content to a set of graphical icons
07/17/14Client-side personalization of websites and corresponding network environment
07/17/14Dynamically selecting and ordering facets and facet values in a user interface based on user preference
07/17/14Dynamically selecting and ordering facets and facet values in a user interface based on user preference
07/17/14Displaying hotspots in response to movement of icons
07/17/14Adjusting the display of social media updates to varying degrees of richness based on environmental conditions and importance of the update
07/17/14Method and system for providing a twisty user interface element
07/17/14Method and system for providing a twisty user interface element
07/17/14Identifying and highlighting critical popups in a multi-window environment
07/17/14Graphical user interface streamlining implementing a content space
07/17/14Automating integrated circuit device library generation in model based metrology
07/17/14Power grid design for integrated circuits
07/17/14Determining overall optimal yield point for a semiconductor wafer
07/17/14Methods for modeling of finfet width quantization
07/17/14Apparatus for modeling of finfet width quantization
07/17/14Content space environment representation
07/17/14Automatic identification of affected product assets with work items
07/17/14Automatic identification of affected product assets with work items
07/17/14Integration and user story generation and requirements management
07/17/14Creating pluggable analysis viewpoints for an optimization system model
07/17/14Software product licensing based on a content space
07/17/14Logging and profiling content space data and coverage metric self-reporting
07/17/14Integration of a software content space with test planning and test case generation
07/17/14Automated data collection, computation and reporting of content space coverage metrics for software products
07/17/14Testing internationalized software using test resource file and test font
07/17/14Analyzing concurrent debugging sessions
07/17/14Analyzing concurrent debugging sessions
07/17/14Framework and repository for analysis of software products
07/17/14Identification of performance bottlenecks
07/17/14Updating firmware compatibility data
07/17/14Updating firmware compatibility data
07/17/14Scalable network overlay virtualization using conventional virtual switches
07/17/14Computing regression models
07/17/14Using crowdsourcing to improve sentiment analytics
07/17/14Processor provisioning by a middleware processing system
07/17/14Scheduling mapreduce jobs in a cluster of dynamically available servers
07/17/14Adaptive resource usage limits for workload management
07/17/14Processor provisioning by a middleware processing system for a plurality of logical processor partitions
07/17/14Preemptive preloading of television program data
07/17/14Managing sensitive content
07/17/14Enhancing directory service authentication and authorization using contextual information
07/17/14Enhancing directory service authentication and authorization using contextual information
07/17/14Id usage tracker
07/17/14Identifying stored security vulnerabilities in computer software applications
07/17/14Identifying stored security vulnerabilities in computer software applications
07/17/14Secure cloud implementation
07/17/14Secure cloud implementation
07/10/14Inductor with laminated yoke
07/10/14Heterojunction iii-v solar cell performance
07/10/14Energy efficiency based control for a cooling system
07/10/14Self-formed nanometer channel at wafer scale
07/10/14Dual mandrel sidewall image transfer processes
07/10/14Controlling electromagnetic radiation in a data center
07/10/14Measuring current and resistance using combined diodes/resistor structure to monitor integrated circuit manufacturing process variations
07/10/14Crystalline thin-film transistor
07/10/14Group iii nitrides on nanopatterned substrates
07/10/14Group iii nitrides on nanopatterned substrates
07/10/14Compressive strained iii-v complementary metal oxide semiconductor (cmos) device
07/10/14Compressive strained iii-v complementary metal oxide semiconductor (cmos) device
07/10/14Dummy gate interconnect for semiconductor device
07/10/14Self-aligned dielectric isolation for finfet devices
07/10/14Photonics device and cmos device having a common gate
07/10/14Finfet compatible diode for esd protection
07/10/14Crystalline thin-film transistor
07/10/14Finfet with dielectric isolation by silicon-on-nothing and method of fabrication
07/10/14Silicon-on-insulator heat sink
07/10/14Method of forming finfet of variable channel width
07/10/14Fin-shaped field effect transistor (finfet) structures having multiple threshold voltages (vt) and method of forming
07/10/14Photonics device and cmos device having a common gate
07/10/14Finfet and method of fabrication
07/10/14Semiconductor-on-oxide structure and method of forming
07/10/14Electroless plating of cobalt alloys for on chip inductors
07/10/14Electroless plating of cobalt alloys for on chip inductors
07/10/14High-k and metal filled trench-type edram capacitor with electrode depth and dimension control
07/10/14Catalytic etch with magnetic direction control
07/10/14Film thickness metrology
07/10/14Backside metal ground plane with improved metal adhesion and design structures
07/10/14Metal to metal bonding for stacked (3d) integrated circuits
07/10/14Hierarchic macroscopic incentivization for electric utility load balancing
07/10/14Redox method of forming a coaxial probe structure of elongated electrical conductors projecting from a support structure
07/10/14On chip electrostatic discharge (esd) event monitoring
07/10/14Design structure for an inductor-capacitor voltage-controlled oscillator
07/10/14Conformal coating to scavenge elemental sulfur
07/10/14Fixture planarity evaluation method
07/10/14Cooling apparatus with a resilient heat conducting member
07/10/14Thermal dissipative retractable flex assembly
07/10/14Two phase search content addressable memory with power-gated main-search
07/10/14Defective memory column replacement with load isolation
07/10/14Loop avoidance for event-driven virtual link aggregation
07/10/14Start-up delay for event-driven virtual link aggregation
07/10/14Start-up delay for event-driven virtual link aggregation
07/10/14Token-based flow control of messages in a parallel computer
07/10/14Network and user behavior based time-shifted mobile data transmission
07/10/14Inferred discovery of a data communications device
07/10/14Real time analytics driven decisioning of edge devices in a wireless sensor network
07/10/14Virtual link aggregation using state machine
07/10/14Intelligent 911 service
07/10/14Optimized call handling for recycled telephone numbers
07/10/14Surface contamination determination system
07/10/14Duplicate check image resolution
07/10/14Amplification method for photoresist exposure in semiconductor chip manufacturing
07/10/14Isolated wire structures with reduced stress, methods of manufacturing and design structures
07/10/14Alternate notification selection
07/10/14Alternate notification selection
07/10/14Access control of user based photograph bundles
07/10/14Flame retardant cellulose acetate
07/10/14Flame retardant cellulose
07/10/14Foundry production planning
07/10/14Dynamic power allocation for attaining an objective
07/10/14Intelligent road signs
07/10/14Determining the location of an incident affecting traffic
07/10/14Preventative traffic congestion social networking improvement system within a community
07/10/14Measuring dielectric breakdown in a dynamic mode
07/10/14Estimating component power usage from aggregate power usage
07/10/14Chip performance monitoring system and method
07/10/14Estimating probability of spreading information by users on micro-weblogs
07/10/14Automatic driver modeling for integration of human-controlled vehicles into an autonomous vehicle network
07/10/14Automatic driver modeling for integration of human-controlled vehicles into an autonomous vehicle network
07/10/14Assessing practitioner value in multi-practitioner settings
07/10/14Project plan generation from an information architecture model
07/10/14Workflow system and method with skip function
07/10/14Analysis of usage patterns and upgrade recommendations
07/10/14Enterprise decision management
07/10/14Analyzing the capabilities of a business enterprise
07/10/14Systems and methods for locating one or more items in a shopping store
07/10/14Systems and methods for managing inventory in a shopping store
07/10/14Managing inventory in a shopping store
07/10/14Customization of an e-commerce display for a social network platform
07/10/14System and method for compliance risk mitigation
07/10/14Technology prediction
07/10/14Production rule engine
07/10/14Detecting data omissions for an intermittently-connected application
07/10/14Detecting data omissions for an intermittently-connected application
07/10/14Copy of replication status for synchronization
07/10/14Request de-duplication for enterprise service bus
07/10/14Intelligent selection of replication node for file data blocks in gpfs-snc
07/10/14Packing deduplicated data in a self-contained deduplicated repository
07/10/14Packing deduplicated data in a self-contained deduplicated repository
07/10/14Real-time identification of data candidates for classification based compression
07/10/14Real-time reduction of cpu overhead for data compression
07/10/14Real-time classification of data into data compression domains
07/10/14Real-time identification of data candidates for classification based compression
07/10/14Sampling transactions from multi-level log file records
07/10/14Partitioning a search space for distributed crawling
07/10/14System and method for reflective searching of previous search results
07/10/14System and method for reflective searching of previous search results
07/10/14Gui for viewing and manipulating connected tag clouds
07/10/14Collecting digital assets to form a searchable repository
07/10/14Object naming
07/10/14Creating dimension/topic term subgraphs
07/10/14Creating dimension/topic term subgraphs
07/10/14System and method for case activity monitoring and case data recovery using audit logs in e-discovery
07/10/14Data file handling in a network environment and independent file server
07/10/14Web services
07/10/14System and method for unfiltering filtered status messages
07/10/14Cloud based data migration and replication
07/10/14Managing cloud services
07/10/14Computer system identification
07/10/14Detecting patterns of events in information systems
07/10/14Facilitating access to references in communications
07/10/14Predicting resource provisioning times in a computing environment
07/10/14Token-based flow control of messages in a parallel computer
07/10/14Loop avoidance for event-driven virtual link aggregation
07/10/14Non-disruptive configuration of a virtualization cotroller in a data storage system
07/10/14Determining when to throttle interrupts to limit interrupt processing to an interrupt processing time period
07/10/14Instantaneous save/restore of virtual machines with persistent memory
07/10/14Instantaneous save/restore of virtual machines with persistent memory
07/10/14I/o write request handling in a storage system
07/10/14On-chip traffic prioritization in memory
07/10/14On-chip traffic prioritization in memory
07/10/14Data storage mechanism using storage system determined write locations
07/10/14Setting copy permissions for target data in a copy relationship
07/10/14Managing virtual hard disk snapshots
07/10/14Setting copy permissions for target data in a copy relationship
07/10/14Increasing efficiency of block-level processes using data relocation awareness
07/10/14Implementing user mode foreign device attachment to memory channel
07/10/14Expanding memory size
07/10/14Anticipatorily loading a page of memory
07/10/14Variable depth instruction fifos to implement simd architecture
07/10/14Formal verification of a logic design
07/10/14Transparent encryption/decryption gateway for cloud storage services
07/10/14Secure communication method
07/10/14Fault isolation with abstracted objects
07/10/14Memory testing of three dimensional (3d) stacked memory
07/10/14Framework for a software error inject tool
07/10/14Automated testing of hot swap scenarios of field replaceable units in a storage system
07/10/14Memory testing with selective use of an error correction code decoder
07/10/14System and method for improved error response in data mirroring
07/10/14System and method for automatically detecting and interactively displaying information about entities, activities, and events from multiple-modality natural language sources
07/10/14Tagging autofill field entries
07/10/14In-line editing of webpages
07/10/14In-line editing of webpages
07/10/14Conversion of a presentation to darwin information typing architecture (dita)
07/10/14Collaborative presentation of extracted information
07/10/14System and method for dynamic multi-content cards
07/10/14Managing display on a computing system
07/10/14Managing display on a computer system
07/10/14Management of resources for tasks with virtual composite service agents
07/10/14Management of resources for tasks with virtual composite service agents
07/10/14Gui for viewing and manipulating connected tag clouds
07/10/14Data visualization
07/10/14Systems and methods for single cell product path delay analysis
07/10/14Adaptive workload based optimizations coupled with a heterogeneous current-aware baseline design to mitigate current delivery limitations in integrated circuits
07/10/14Automatic generation of wire tag lists for a metal stack
07/10/14Automatic regression testing based on cyclomatic complexity
07/10/14System and method for compiler assisted parallelization of a stream processing operator
07/10/14Compiler optimization based on collectivity analysis
07/10/14Low-risk server consolidation
07/10/14Hierarchical thresholds-based virtual machine configuration
07/10/14Preprovisioning using mutated templates
07/10/14Using preprovisioned mutated templates
07/10/14System and method for improving memory usage in virtual machines
07/10/14Computing job management based on priority and quota
07/10/14System and method for improving memory usage in virtual machines
07/10/14Ensuring performance of a computing system
07/10/14Managing job execution
07/10/14Generating role-based access control policies based on discovered risk-averse roles
07/10/14Security policy enforcement
07/10/14Hierarchical rule development and binding for web application server firewall
07/10/14Methods and systems for preventing security breaches
07/10/14Capturing and manipulating content using biometric data
07/03/14Securing electronic devices within a sub-chassis for connection to a chassis midplane
07/03/14Renewable self-healing capsule system
07/03/14Hybrid screening nozzle
07/03/14Heat transfer device for wave soldering
07/03/14Multiple-layered electromagnetic shielding
07/03/14Deposition of pure metals in 3d structures
07/03/14Heat transfer device for wave soldering
07/03/14Signal path and method of manufacturing a multiple-patterned semiconductor device
07/03/14Structure for self-aligned silicide contacts to an upside-down fet by epitaxial source and drain
07/03/14Gateless finfet
07/03/14Signal path and method of manufacturing a multiple-patterned semiconductor device
07/03/14Nanopore sensor device
07/03/14Nanopore sensor device
07/03/14Autonomous integrated circuits
07/03/14Integrated circuit having back gating, improved isolation and reduced well resistance and method to fabricate same
07/03/14Modified via bottom for beol via efuse
07/03/14Phase changing on-chip thermal heat sink
07/03/14Compartmentalized heat spreader for electromagnetic mitigation
07/03/14Stacked multi-chip package and method of making same
07/03/14Dual damascene structure with liner
07/03/14Fabricating polysilicon mos devices and passive esd devices
07/03/14Semiconductor device including passivation layer encapsulant
07/03/14In-line transistor bandwidth measurement
07/03/14High power radio frequency (rf) in-line wafer testing
07/03/14Low-voltage ic test for defect screening
07/03/14Compensated impedance calibration circuit
07/03/14System, a method and a computer program product for electronic sub-integer frequency division
07/03/14Controlled resonant power transfer
07/03/14Signal path of a multiple-patterned semiconductor device
07/03/14Signal path of a multiple-patterned semiconductor device
07/03/14Optimal electric vehicle battery recommendation system
07/03/14Scalable polarimetric phased array transceiver
07/03/14Populating nodes in a data model with objects from context-based conformed dimensional data gravity wells
07/03/14Depth of field visualization
07/03/14Spatiotemporal visualization of sensor data
07/03/14Spatiotemporal visualization of sensor data
07/03/14Proportional pointer transition between multiple display devices
07/03/14Detecting relative crowd density via client devices
07/03/14Selecting image or video files for cloud storage
07/03/14Print job distribution within a printing system
07/03/14Network printer selection based on printer status and profiles
07/03/14Print job distribution within a printing system
07/03/14Utilization of disk buffer for background replication processes
07/03/14Humidity and temperature controlled tape drive cleaning
07/03/14Latch to position and bias a module within a chassis
07/03/14Antiferromagnetic storage device
07/03/14Hybrid latch and fuse scheme for memory repair
07/03/14Hybrid latch and fuse scheme for memory repair
07/03/14Energy management for communication network elements
07/03/14Collaborative volume management
07/03/14Image selection and masking using imported depth information
07/03/14Boosting object detection performance in videos
07/03/14Semantic parsing of objects in video
07/03/14Influence-based social media interventions in healthcare
07/03/14Silicon photonics photodetector integration
07/03/14Streaming media buffer points reflecting user behavior and interests
07/03/14Method and apparatus for testing an optical network
07/03/14Testing an optical network
07/03/14Configurable ergonomic keyboard for computing devices
07/03/14Acid-strippable silicon-containing antireflective coating
07/03/14Mosfet including asymmetric source and drain regions
07/03/14Concurrently forming nfet and pfet gate dielectric layers
07/03/14Integrated circuit chip with pyramid or cone-shaped conductive pads for flexible c4 connections and a method of forming the integrated circuit chip
07/03/14Authentication of phone caller identity
07/03/14Controlling delivery of notifications in real-time communications based on communication channel state
07/03/14Gps control in a mobile device
07/03/14Systems and methods for semiconductor line scribe centering
07/03/14Multiple manufacturing line qualification
07/03/14Optimal electric vehicle battery recommendation system
07/03/14Managing inter-vehicular battery charging transactions
07/03/14Determining seismic response characteristics of structures
07/03/14Predicting a time of failure of a device
07/03/14Detecting tsv defects in 3d packaging
07/03/14Estimating time to model a data processing environment
07/03/14Emulation of a dynamic address translation with change record override on a machine of another architecture
07/03/14Real-time sentiment analysis for synchronous communication
07/03/14Interactive dashboard based on real-time sentiment analysis for synchronous communication
07/03/14Audio expression of text characteristics
07/03/14Lifestyle progression models for use in preventative care
07/03/14Skill update based work assignment
07/03/14Skill update based work assignment
07/03/14Delivering electronic meeting content
07/03/14Customer demographic data change detection based on monitored utility consumption
07/03/14Customer demographic data change detection based on monitored utility consumption
07/03/14Automated generation of new work products and work plans
07/03/14User photograph based advertisement in a social networking site
07/03/14Statistical marketing attribution correlation
07/03/14Statistical marketing attribution correlation
07/03/14Integration between brick-and-mortar establishments and web based establishments
07/03/14Advertisement generation based upon social media posting
07/03/14Managing inter-vehicular battery charging transactions
07/03/14Correctable pre-payment for database services
07/03/14Sampling transactions from multi-level log file records
07/03/14Multi-modal journey planner
07/03/14Providing high availability in an active/active appliance cluster
07/03/14Using access count of the remote site to optimize file transfer order for asynchronous replication
07/03/14Intelligent cloning of a business object graph
07/03/14Intelligent cloning of a business object graph
07/03/14Interaction-based management of contact entries
07/03/14Interaction-based management of contact entries
07/03/14Optimizing a partition in data deduplication
07/03/14Reducing fragmentation in compressed journal storage
07/03/14Reducing fragmentation in compressed journal storage
07/03/14Controlling segment size distribution in hash-based deduplication
07/03/14Displaying changes to versioned files
07/03/14Context-based data gravity wells
07/03/14Assigning shared catalogs to cache structures in a cluster computing system
07/03/14Discovering relationships between data processing environment components
07/03/14Radix sort with read-only key
07/03/14Radix sort with read-only key
07/03/14Conformed dimensional and context-based data gravity wells
07/03/14Identifying confidential data in a data item by comparing the data item to similar data items from alternative sources
07/03/14Spatiotemporal encounters detection in historical movement datasets
07/03/14Conformed dimensional data gravity wells
07/03/14Executing perform floating point operation instructions
07/03/14Extended out of office message processing
07/03/14Minimizing the effects of email attachments on communication networks
07/03/14Extended out of office message processing
07/03/14Apparatus, method, and program for exchanging message or making voice call via network
07/03/14Preemptive caching of data
07/03/14Configuration of computer systems via simple object access protocol connections
07/03/14Modifying an assigment of nodes to roles in a computing environment
07/03/14Automated shutdown methodology for a tiered system
07/03/14Detecting relative crowd density via client devices
07/03/14Autonomic optimization of presence server performance
07/03/14Predictive scaling for clusters
07/03/14Dynamically selecting an identity provider for a single sign-on request
07/03/14Extending organizational boundaries throughout a cloud architecture
07/03/14Querying and managing computing resources in a networked computing environment
07/03/14Predictive scaling for clusters
07/03/14Modifying an assigment of nodes to roles in a computing environment
07/03/14Energy management for communication network elements
07/03/14Memory bus attached input/output ('i/o') subsystem management in a computing system
07/03/14Optimization of native buffer accesses in java applications on hybrid systems
07/03/14Network efficiency and power savings
07/03/14High speed overlay of idle i2c bus bandwidth
07/03/14Memory bus attached input/output ('i/o') subsystem management in a computing system
07/03/14Determining weight values for storage devices in a storage tier to use to select one of the storage devices to use as a target storage to which data from a source storage is migrated
07/03/14False power failure alert impact mitigation
07/03/14False power failure alert impact mitigation
07/03/14Method for optimizing cleaning of maps in flashcopy cascades containing incremental maps
07/03/14Optimization of native buffer accesses in java applications on hybrid systems
07/03/14High read block clustering at deduplication layer
07/03/14Providing versioning in a storage device
07/03/14Providing a web page to a client
07/03/14Decrypting files for data leakage protection in an enterprise network
07/03/14Controlling partner partitions in a clustered storage system
07/03/14Automated shutdown methodology for a tiered system
07/03/14Peer assisted mobile device battery extension system
07/03/14Peer assisted mobile device battery extension system
07/03/14Expander to control multipaths in a storage network
07/03/14Predicting a time of failure of a device
07/03/14Decreasing power supply demand during bist initializations
07/03/14Reconstructive error recovery procedure (erp) for multiple data sets using reserved buffer
07/03/14Unequal error protection scheme for headerized sub data sets
07/03/14Dynamic webpage change animation
07/03/14Configuring a page for drag and drop arrangement of content artifacts in a page development tool
07/03/14Online documentation review
07/03/14Changing log file content generation
07/03/14Delivering electronic meeting content
07/03/14Determining content rendering capabilities for web browser optimization
07/03/14Control for rapidly exploring relationships in densely connected networks
07/03/14Control for rapidly exploring relationships in densely connected networks
07/03/14Method and system for unlocking a touchscreen of an electronic device
07/03/14Test coverage of integrated circuits with masking pattern selection
07/03/14Signal path and method of manufacturing a multiple-patterned semiconductor device
07/03/14Soft pin insertion during physical design
07/03/14Migration between model elements of different types in a modeling environment
07/03/14Generating a service component architecture (sca) module with service oriented architecture (soa) model elements
07/03/14Native language ide code assistance
07/03/14Native language ide code assistance
07/03/14Identification of performance bottlenecks
07/03/14Flow analysis in program execution
07/03/14Enhanced string analysis that improves accuracy of static analysis
07/03/14Enhanced string analysis that improves accuracy of static analysis
07/03/14Processing proposed program code libraries in a networked computing environment
07/03/14Dynamic timeout determination for microcontroller management of firmware updates
07/03/14Effective migration and upgrade of virtual machines in cloud environments
07/03/14Automatically managing the storage of a virtual machine
07/03/14Streaming media buffer points reflecting user behavior and interests
07/03/14Policy-based development and runtime control of mobile applications
07/03/14Social and proximity based access control for mobile applications
07/03/14Social and proximity based access control for mobile applications
07/03/14Selecting image or video files for cloud storage
07/03/14Method and apparatus for server-side authentication and authorization for mobile clients without client-side application modification
07/03/14Safe auto-login links in notification emails
07/03/14Multi-component signature generation
07/03/14Inferring security decisions from trusted users
07/03/14Inferring security decisions from trusted users
07/03/14Security management in a networked computing environment
07/03/14Hybrid analysis of vulnerable information flows
07/03/14Hybrid analysis of vulnerable information flows
06/26/14Apparatus and method for removing a cmp pad from a platen
06/26/14Base-by-base ratcheting of dna/rna in a y-shaped nanochannel
06/26/14Base-by-base ratcheting of dna/rna in a y-shaped nanochannel
06/26/14Field effect transistor-based bio sensor
06/26/14Finfet device
06/26/14Device structures compatible with fin-type field-effect transistor technologies
06/26/14Finfet device
06/26/14Packaging structure
06/26/14Use of graphene to limit copper surface oxidation, diffusion and electromigration in interconnect structures
06/26/14Minimum-spacing circuit design and layout for pica
06/26/14Calibration schemes for charge-recycling stacked voltage domains
06/26/14Programmable delay generator and cascaded interpolator
06/26/14Smart device to media device coupling to create virtual control environment
06/26/14Smart device to media device coupling to create virtual control environment
06/26/14Screen output system
06/26/14Prioritized rendering of objects in a virtual universe
06/26/14Three dimensional image projector
06/26/14Servicing a print request from a client system
06/26/14Customizing a range of acceptable tape dimensional stability write conditions
06/26/14Semiconductor photonic package
06/26/14System involving electrically reprogrammable fuses
06/26/14Method and apparatus to monitor and analyze end to end flow control in an ethernet/enhanced ethernet environment
06/26/14Determining the availability of participants on an electronic call
06/26/14Power distribution system utilizing digital communications to determine the configuration thereof
06/26/14Determining the configuration of a power distribution sytem
06/26/14Provision to an application of a random number not generated by an operating system
06/26/14Optimizing use of hardware security modules
06/26/14Visual summarization of video for quick understanding
06/26/14Cathode material for lithium-oxygen battery
06/26/14Virtual lesson plan integration
06/26/14Semiconductor photonic package
06/26/14Transparent conductive electrode stack containing carbon-containing material
06/26/14Field effect transistor-based bio-sensor
06/26/14Packaging structure
06/26/14Advanced low k cap film formation process for nano electronic devices
06/26/14Location-based vehicle powertrain regulation system
06/26/14Location-based vehicle powertrain regulation system
06/26/14Method of simulating the absorption of plane waves using fem software tools
06/26/14Natural language processing
06/26/14System and method for asset assignment in a service delivery environment when assets have unique skills and/or capabilities
06/26/14System and method for asset assignment in a service delivery environment when assets have unique skills and/or capabilities
06/26/14Interface to select application based on state transition models of work
06/26/14Interface to select application based on state transition models of work
06/26/14Evaluating the reliability of activity forecasts
06/26/14Automated incentive computation in crowdsourcing systems
06/26/14Automated incentive computation in crowdsourcing systems
06/26/14Deploying multiple e-commerce systems in a single computing platform
06/26/14Assisting in bill split payment
06/26/14Iterative active feature extraction
06/26/14Information identification method, program product, and system
06/26/14Time-division multiplexed neurosynaptic module with implicit memory addressing for implementing a universal substrate of adaptation
06/26/14Mapping neural dynamics of a neural model on to a coarsely grained look-up table
06/26/14Hardware architecture for simulating a neural network of neurons
06/26/14Recommending electronic content based upon user availability
06/26/14Iterative active feature extraction
06/26/14Method and apparatus for providing software problem solutions
06/26/14Recommending electronic content based upon user availablity
06/26/14Extract-transform-load processor controller
06/26/14Consistent replication of transactional updates
06/26/14Consistent replication of transactional updates
06/26/14Transparent data service suitable for modifying data storage capabilities in applications
06/26/14Transparent data service suitable for modifying data storage capabilities in applications
06/26/14Apparatus for authentication of solution topology
06/26/14Geographical area correlated websites
06/26/14Management of intended future conversations
06/26/14Management of intended future conversations
06/26/14User management of electronic documents
06/26/14Modifying a user profile
06/26/14Estimating risk of building a computing system
06/26/14Estimating risk of building a computing system
06/26/14Managing global cache coherency in a distributed shared caching for clustered file systems
06/26/14Geospatial visualization performance improvement for contiguous polylines with similar dynamic characteristics
06/26/14Access and control of mainframe-based data in non-mainframe format
06/26/14Method and apparatus for managing a plurality of sessions in a multi-path routing based network
06/26/14Detection of abnormal operation caused by interrupt processing
06/26/14Creating a dynamic address translation with translation exception qualifier
06/26/14Reliability scheme using hybrid ssd/hdd replication with log structured management
06/26/14Flexible utilization of block storage in a computing system
06/26/14Managing global cache coherency in a distributed shared caching for clustered file systems
06/26/14Managing global cache coherency in a distributed shared caching for clustered file systems
06/26/14Method for divisionally managing files on a user basis, and a storage system and computer program product thereof
06/26/14Facilitation of simultaneous storage initialization and data destage
06/26/14Dynamic address translation with translation table entry format control for identifying format of the translation table entry
06/26/14Increased in-line deduplication efficiency
06/26/14Detection of potential need to use a larger data format in performing floating point operations
06/26/14Branch prediction table install source tracking
06/26/14Encrypted flash-based data storage system with confidentiality mode
06/26/14Secure object having protected region, integrity tree, and unprotected region
06/26/14Method for preventing over-heating of a device within a data processing system
06/26/14Determining redundancy in a power distribution system
06/26/14Provide an appliance like test vehicle for it disaster recovery
06/26/14Correlation of source code with system dump information
06/26/14Intelligently monitoring and dispatching information technology service alerts
06/26/14Synchronising screenshots in documentation with product functionality
06/26/14Automated screen captures
06/26/14Detection and repositioning of pop-up dialogs
06/26/14Detection and repositioning of pop-up dialogs
06/26/14Previewing prominent features of remote documents
06/26/14Visual summarization of video for quick understanding
06/26/14Modifying a user profile
06/26/14Controlling delivery of notifications in real-time communications based on communication channel state
06/26/14Arranging a conversation among a plurality of participants
06/26/14Automated screen captures
06/26/14Manipulation of user interface controls
06/26/14Outputting management information based on state of managed object
06/26/14Scroll speed adjustment
06/26/14Methods and devices for object selection in a computer
06/26/14Determining high quality initial candidate sink locations for robust clock network design
06/26/14Generating debugging extension source code utilizing debugging information
06/26/14Reducing merge conflicts in a development environment
06/26/14Software engineering system and method for self-adaptive dynamic software components
06/26/14Software development work item management system
06/26/14Capturing multi-component trace for unit of work
06/26/14Processor provisioning by a middleware processing system
06/26/14Resource allocation for a plurality of resources for a dual activity system
06/26/14Processor provisioning by a middleware system for a plurality of logical processor partitions
06/26/14Hybrid dependency analysis using dynamic and static analyses
06/26/14Hybrid dependency analysis using dynamic and static analyses
06/26/14Providing input from input device to corresponding application program
06/26/14Quantifying risk based on relationships and applying protections based on business rules
06/26/14Quantifying risk based on relationships and applying protections based on business rules
06/26/14Performance optimization in a secured computing environment
06/26/14System and method for protection from buffer overflow vulnerability due to placement new constructs in c++
06/26/14System and method for protection from buffer overflow vulnerability due to placement new constructs in c++
06/26/14Method and apparatus for authentication of solution topology
06/19/14Electronic component retainers
06/19/14Controlling a solar tracking system
06/19/14Thermal receiver for high power solar concentrators and method of assembly
06/19/14Thermal receiver for high power solar concentrators and method of assembly
06/19/14Monolithic integration of heterojunction solar cells
06/19/14Field-effect inter-digitated back contact photovoltaic device
06/19/14System and method to route airflow through dynamically changing ducts
06/19/14Three-dimensional inter-chip contact through vertical displacement mems
06/19/14Planar cavity mems and related structures, methods of manufacture and design structures
06/19/14Method and apparatus to tag metal
06/19/14Method and apparatus to tag metal
06/19/14Phase change memory cell with large electrode contact area
06/19/14Small footprint phase change memory cell
06/19/14Accurate control of distance between suspended semiconductor nanowires and substrate surface
06/19/14Accurate control of distance between suspended semiconductor nanowires and substrate surface
06/19/14Continuous metal semiconductor alloy via for interconnects
06/19/14Finfet with merge-free fins
06/19/14Multi-fin finfets with epitaxially-grown merged source/drains
06/19/14Device structure with increased contact area and reduced gate capacitance
06/19/14Local interconnects compatible with replacement gate structures
06/19/14Electrostatic discharge resistant diodes
06/19/14Electrostatic discharge resistant diodes
06/19/14Moat construction to reduce noise coupling to a quiet supply
06/19/14Thick on-chip high-performance wiring structures
06/19/14Graphene and metal interconnects
06/19/14Stacked via structure for metal fuse applications
06/19/14Rigid probe with compliant characteristics
06/19/14Rigid probe with compliant characteristics
06/19/14Interconnect solder bumps for die testing
06/19/14Quantum circuit within waveguide-beyond-cutoff
06/19/14Changing resonant clock modes
06/19/14Quantum circuit within waveguide-beyond-cutoff
06/19/14Plating stub resonance shift with filter stub design methodology
06/19/14Haptic accessory and methods for using same
06/19/14Haptic accessory and methods for using same
06/19/14System and method of dynamically generating a frequency pattern to realize the sense of touch in a computing device
06/19/14System and method of dynamically generating a frequency pattern to realize the sense of touch in a computing device
06/19/14Morphing a data center in a virtual world
06/19/14Photographic exposure via real time broadcast of lighting parameters
06/19/14Digital imaging exposure metering system
06/19/14Cooling of a memory device
06/19/14Light pipe with electromagnetic interference shielding
06/19/14Power management sram write bit line drive circuit
06/19/14Piezoelectronic memory
06/19/14Thermal spin torqure transfer magnetoresistive random access memory
06/19/14Thermal spin torqure transfer magnetoresistive random access memory
06/19/14Unified system networking with cee-pcie tunneling
06/19/14Unified system networking with cee-pcie tunneling
06/19/14Unified system networking with pcie-cee tunneling
06/19/14Unified system networking with pcie-cee tunneling
06/19/14Tracking a relative arrival order of events being stored in multiple queues using a counter
06/19/14Unified communications using called party location
06/19/14Personalized compliance feedback via model-driven sensor data assessment
06/19/14Personalized compliance feedback via model-driven sensor data assessment
06/19/14Providing a user-specific effort value associated with digital textual content
06/19/14Providing a user-specific effort value associated with digital textual content
06/19/14Monolithic integration of heterojunction solar cells
06/19/14Copper post solder bumps on substrates
06/19/14Finfet with merge-free fins
06/19/14Lateral bipolar transistor and cmos hybrid technology
06/19/14Phase change memory cell with large electrode contact area
06/19/14Structure and method of tinv scaling for high k metal gate technology
06/19/14Self-aligned devices and methods of manufacture
06/19/14Dimm extraction tool
06/19/14Receptacle with heat management for electronic and optical systems
06/19/14Unified communications using called party location
06/19/14Question classification and feature mapping in a deep question answering system
06/19/14Stable genes in comparative transcriptomics
06/19/14Stable genes in comparative transcriptomics
06/19/14Evaluating distributed application performance in a new environment
06/19/14Evaluating distributed application performance in a new environment
06/19/14Short phrase language identification
06/19/14System support for evaluation consistency
06/19/14System support for evaluation consistency
06/19/14Method for processing speech of particular speaker, electronic system for the same, and program for electronic system
06/19/14Visualization for health education to facilitate planning for intervention, adaptation and adherence
06/19/14Visualization for health education to facilitate planning for intervention, adaptation and adherence
06/19/14On-demand cloud service management
06/19/14Efficiently generating test cases
06/19/14Semi-supervised data integration model for named entity classification
06/19/14Multi-dimensional feature merging for supporting evidence in a question and answering system
06/19/14Question classification and feature mapping in a deep question answering system
06/19/14Scanning data streams in real-time against large pattern collections
06/19/14Determining a replacement document owner
06/19/14Determining a replacement document owner
06/19/14Systems, methods and tools for facilitating group collaborations
06/19/14Migration of data from a legacy system
06/19/14Using temporary performance objects for enhanced query performance
06/19/14Search engine optimization using a find operation
06/19/14On the fly data binning
06/19/14Indexing of large scale patient set
06/19/14Indexing of large scale patient set
06/19/14Intelligent evidence classification and notification in a deep question answering system
06/19/14Multi-dimensional feature merging for supporting evidence in a question and answering system
06/19/14Intelligent evidence classification and notification in a deep question answering system
06/19/14Partial and parallel pipeline processing in a deep question answering system
06/19/14Partial and parallel pipeline processing in a deep question answering system
06/19/14Searching a vertex in a path
06/19/14Device, method, and program for processing data with tree structure
06/19/14Corpus search improvements using term normalization
06/19/14Performing a function on rows of data determined from transitive relationships between columns
06/19/14Corpus search improvements using term normalization
06/19/14Performing a function on rows of data determined from transitive relationships between columns
06/19/14Method for generating simple object access protocol messages and process engine
06/19/14Method & aparatus for asynchroinzed de-serialization of e-r model in a huge data trunk
06/19/14Selected alert delivery in a distributed processing system
06/19/14Suppressing content of a social network
06/19/14Low latency messaging chat server
06/19/14Low latency messaging chat server
06/19/14Communication protocol placement into switch memory
06/19/14Performance isolation for storage clouds
06/19/14Efficient name management for named data networking in datacenter networks
06/19/14Efficient name management for named data networking in datacenter networks
06/19/14Prioritizing data packets associated with applications running in a networked computing environment
06/19/14Quality of service (qos) based planning in web services aggregation
06/19/14Network management system
06/19/14Presenting enclosure cache as local cache in an enclosure attached server
06/19/14Command process load balancing system
06/19/14Flow distribution algorithm for aggregated links in an ethernet switch
06/19/14Flow distribution algorithm for aggregated links in an ethernet switch
06/19/14Detecting firmware version for an input/output adapter
06/19/14Cable adapter correlation in a cluster
06/19/14Write performance in solid state storage by recognizing copy source to target operations and only storing updates instead of entire block
06/19/14Write performance in fault-tolerant clustered storage systems
06/19/14Enhancing analytics performance using distributed multi-tiering
06/19/14Acquiring remote shared variable directory information in a parallel computer
06/19/14Analyzing update conditions for shared variable directory information in a parallel computer
06/19/14Analyzing update conditions for shared variable directory information in a parallel computer
06/19/14Presenting enclosure cache as local cache in an enclosure attached server
06/19/14Acquiring remote shared variable directory information in a parallel computer
06/19/14Lightweight observable values for multiple grids
06/19/14Validating cache coherency protocol within a processor
06/19/14Sequential location accesses in an active memory device
06/19/14Method and apparatus for automated migration of data among storage centers
06/19/14Method and apparatus for automated migration of data among storage centers
06/19/14Selection of a primary microprocessor for initialization of a multiprocessor system
06/19/14Selection of a primary microprocessor for initialization of a multiprocessor system
06/19/14Requesting shared variable directory (svd) information from a plurality of threads in a parallel computer
06/19/14Computer processor with instruction for execution based on available instruction sets
06/19/14Computer processor with instruction for execution based on available instruction sets
06/19/14Computer processor with instruction for execution based on available instruction sets
06/19/14Securely identifying host systems
06/19/14Chip level power reduction using encoded communications
06/19/14Chip level power reduction using encoded communications
06/19/14Write performance in fault-tolerant clustered storage systems
06/19/14Correcting a failure associated with a current firmware image
06/19/14Correcting a failure associated with a current firmware image
06/19/14Cascading failover of blade servers in a data center
06/19/14Cascading failover of blade servers in a data center
06/19/14Cascading failover of blade servers in a data center
06/19/14Communication channel failover in a high performance computing (hpc) network
06/19/14Enhanced recovery of highly available computing systems
06/19/14Firmware generated register file for use in hardware validation
06/19/14Firmware generated register file for use in hardware validation
06/19/14Method and apparatus for determining relevance of assignments in combinatorial models
06/19/14Using environmental signatures for test scheduling
06/19/14Software installation method, apparatus and program product
06/19/14Performing diagnostic tracing of an executing application to identify suspicious pointer values
06/19/14Performing diagnostic tracing of an executing application to identify suspicious pointer values
06/19/14System and method to inject a bit error on a bus lane
06/19/14Table manipulation
06/19/14Table manipulation
06/19/14Search engine optimization utilizing scrolling fixation
06/19/14Selectable flattening hierarchical file browser
06/19/14Analysis of chip-mean variation and independent intra-die variation for chip yield determination
06/19/14Parasitic extraction in an integrated circuit with multi-patterning requirements
06/19/14Analysis of chip-mean variation and independent intra-die variation for chip yield determination
06/19/14Model augmentation in a model-driven application development environment
06/19/14Dynamically updating code without requiring processes to restart
06/19/14Managing window focus while debugging a graphical user interface program
06/19/14Debugging a graphical user interface code script with non-intrusive overlays
06/19/14Managing window focus while debugging a graphical user interface program
06/19/14Debugging a graphical user interface code script with non-intrusive overlays
06/19/14Constraint derivation in context following for use with object code insertion
06/19/14Compilation dependency resolution from a diverse group of candidate resources
06/19/14Dynamically updating code without requiring processes to restart
06/19/14Software installer with built-in hypervisor
06/19/14Hybrid virtual machine configuration management
06/19/14Hybrid virtual machine configuration management
06/19/14Virtual machine migration
06/19/14Sending tasks between virtual machines based on expiration times
06/19/14Conditionally updating shared variable directory (svd) information in a parallel computer
06/19/14Managing resource pools for deadlock avoidance
06/19/14Managing resource pools for deadlock avoidance
06/19/14Sending tasks between virtual machines based on expiration times
06/19/14Conditionally updating shared variable directory (svd) information in a parallel computer
06/19/14Adaptive resource usage limits for workload management
06/19/14Dynamic task completion scaling of system resources for a battery operated device
06/19/14Broadcasting shared variable directory (svd) information in a parallel computer
06/19/14Requesting shared variable directory (svd) information from a plurality of threads in a parallel computer
06/19/14Broadcasting shared variable directory (svd) information in a parallel computer
06/19/14Tracking a relative arrival order of events being stored in multiple queues using a counter
06/19/14Multi-dimensional channel directories
06/19/14Multi-dimensional channel directories
06/19/14Controlling modification of electronic device cabling
06/19/14Providing a real-time indication of platform trust
06/19/14Web conference overstay protection
06/19/14Web conference overstay protection
06/19/14Tuning of data loss prevention signature effectiveness
06/19/14Tuning of data loss prevention signature effectiveness
06/12/14Selective emitter photovoltaic device
06/12/14Thermostat-controlled coolant flow within a heat sink
06/12/14Thermostat-controlled coolant flow within a heat sink
06/12/14Printed circuit board edge connector
06/12/14Printed circuit board edge connector
06/12/14Carbon based biosensors and processes of manufacturing the same
06/12/14Phase change memory cells with surfactant layers
06/12/14Authentication using graphene based devices as physical unclonable functions
06/12/14Etch resistant raised isolation for semiconductor devices
06/12/14Epitaxial grown extremely shallow extension region
06/12/14Measurement of cmos device channel strain by x-ray diffraction
06/12/14Bulk finfet with super steep retrograde well
06/12/14Bulk finfet with super steep retrograde well
06/12/14Preventing fin erosion and limiting epi overburden in finfet structures by composite hardmask
06/12/14Preventing fin erosion and limiting epi overburden in finfet structures by composite hardmask
06/12/14Patterning transition metals in integrated circuits
06/12/14Patterning transition metals in integrated circuits
06/12/14Systems and methods to test and/or recover magnetic sensors with esd or other damage
06/12/14Clock phase shift detector
06/12/14Semiconductor chip repair by stacking of a base semiconductor chip and a repair semiconductor chip
06/12/14Remote control of powering of electrical appliances
06/12/14Abbreviated keyboards for mobile password entry
06/12/14Dimensional data chart matrixes with drill operations
06/12/14Dynamic augmented reality media creation
06/12/14Dynamic augmented reality media creation
06/12/14Tracking participation in a shared media session
06/12/14Application management of printing requests through induced analytics
06/12/14Application management of printing requests through induced analytics
06/12/14Secondary optic for concentrating photovoltaic device
06/12/14Method and apparatus for controlled application of oersted field to magnetic memory structure
06/12/14Three-dimensional memory array and operation scheme
06/12/14Three-dimensional memory array and operation scheme
06/12/14Detecting and isolating dropped or out-of-order packets in communication networks
06/12/14Host ethernet adapter frame forwarding
06/12/14Packet buffering system and method
06/12/14Techniques for spatial semantic attribute matching for location identification
06/12/14Techniques for spatial semantic attribute matching for location identification
06/12/14Carbon based biosensors and processes of manufacturing the same
06/12/14Pattern improvement in multiprocess patterning
06/12/14Carbon based biosensors and processes of manufacturing the same
06/12/14Selective emitter photovoltaic device
06/12/14Interconnect structure with an electromigration and stress migration enhancement liner
06/12/14Borderless contacts for semiconductor transistors
06/12/14Authentication using graphene based devices as physical unclonable functions
06/12/14Collaborative sharing of contextually similar cache data to reduce network usage
06/12/14Apparatus and method to store information
06/12/14Configuring building energy management systems using knowledge encoded in building management system points lists
06/12/14Configuring building energy management systems using knowledge encoded in building management system points lists
06/12/14Solving large-scale security-constrained economic dispatch problem in real-time
06/12/14Effectiveness-weighted control of cooling system components
06/12/14System performance using cooling configuration information
06/12/14Effectiveness-weighted control of cooling system components
06/12/14Managing and directing mass transit system passengers
06/12/14Real time numerical computation of corrosion rates from corrosion sensors
06/12/14Techniques for iterative reduction of uncertainty in water distribution networks
06/12/14System and method for maintenance planning and failure prediction for equipment subject to periodic failure risk
06/12/14System and method for maintenance planning and failure prediction for equipment subject to periodic failure risk
06/12/14System and method for determining optimal asset configurations while minimizing disruption to existing business operations in a service delivery environment
06/12/14Memory frame proxy architecture for synchronization and check handling in a simulator
06/12/14Memory frame architecture for instruction fetches in simulation
06/12/14Memory frame architecture for instruction fetches in simulation
06/12/14Approximate named-entity extraction
06/12/14Deep analysis of natural language questions for question answering system
06/12/14Approximate named-entity extraction
06/12/14Verifying the terms of use for access to a service
06/12/14Cladistics data analyzer for business data
06/12/14Cladistics data analyzer for business data
06/12/14System and method for determining optimal asset configurations while minimizing disruption to existing business operations in a service delivery environment
06/12/14Generating global optimized strategies for information requests, proposals, and statements of work within a time period across hierarchical entity boundaries
06/12/14Providing information technology resiliency in a cloud-based services marketplace
06/12/14Personal service assistance in a virtual universe
06/12/14Providing information technology resiliency in a cloud-based services marketplace
06/12/14Approving group purchase requests
06/12/14Method of answering questions and scoring answers using structured knowledge mined from a corpus of data
06/12/14Method of answering questions and scoring answers using structured knowledge mined from a corpus of data
06/12/14Pathway management using model analysis and forcasting
06/12/14Computing prioritzed general arbitration rules for conflicting rules
06/12/14Proactive data object replication in named data networks
06/12/14Utilization of data structures to synchronize copies of a resource
06/12/14Proactive data object replication in named data networks
06/12/14Database in-memory protection system
06/12/14Data set connection manager having a plurality of data sets to represent one data set
06/12/14Content generation
06/12/14Determining characteristic parameters for web pages
06/12/14Optimized query ordering for file path indexing in a content repository
06/12/14Tuple routing in a streaming application
06/12/14Tuple routing in a streaming application
06/12/14Searchable peer-to-peer system through instant messaging based topic indexes
06/12/14Resolution of contact names
06/12/14Streaming data pattern recognition and processing
06/12/14Source record management for master data
06/12/14Intelligent software installation
06/12/14Mining trajectory for spatial temporal analytics
06/12/14Mining trajectory for spatial temporal analytics
06/12/14Efficient sorting of large dimensional data
06/12/14Inferring valid values for objects in a glossary using reference data
06/12/14Efficient sorting of large dimensional data
06/12/14Electronic document source ingestion for natural language processing systems
06/12/14Electronic document source ingestion for natural language processing systems
06/12/14Guiding a user to identified content in a document
06/12/14Pre-assimilation values and post-assimilation values in hardware instance identifiers
06/12/14Query evaluation using ancestor information
06/12/14Streaming data pattern recognition and processing
06/12/14Sharing electronic file metadata in a networked computing environment
06/12/14Residue-based error detection for a processor execution unit that supports vector operations
06/12/14Exponent flow checking
06/12/14Vector execution unit with prenormalization of denormal values
06/12/14Vector execution unit with prenormalization of denormal values
06/12/14Collaborative sharing of contextually similar cache data to reduce network usage
06/12/14Activity-based block management of a clustered file system
06/12/14Tracking participation in a shared media session
06/12/14Rescheduling unfinished meeting agenda topics
06/12/14Automated enabling of instant messaging communications in a client system
06/12/14Searchable peer-to-peer system through instant messaging based topic indexes
06/12/14Expert availability identification
06/12/14Focused real time collaboration
06/12/14Expert availability identification
06/12/14Managing direct attached cache and remote shared cache
06/12/14Managing direct attached cache and remote shared cache
06/12/14Host ethernet adapter frame forwarding
06/12/14Determining a system configuration for performing a collective operation on a parallel computer
06/12/14Intelligent placement of virtual servers within a virtualized computing environment
06/12/14Firewall event reduction for rule use counting
06/12/14Determining a system configuration for performing a collective operation on a parallel computer
06/12/14Management of stream operators with dynamic connections
06/12/14Dependency mapping among a system of servers, analytics and visualization thereof
06/12/14Connection model-based control of concurrent connection count and properties
06/12/14Management of stream operators with dynamic connections
06/12/14Connection model-based control of concurrent connection count and properties
06/12/14Aliasing of named data objects and named graphs for named data networks
06/12/14Aliasing of named data objects and named graphs for named data networks
06/12/14Energy management system for a data center network
06/12/14Device presence detection using a single channel of a bus
06/12/14Managing errors in a dram by weak cell encoding
06/12/14Method of writing a file to a plurality of media and a storage system thereof
06/12/14Cache swizzle with inline transposition
06/12/14Cache swizzle with inline transposition
06/12/14Mitigating conflicts for shared cache lines
06/12/14Virtual machine failover
06/12/14Virtual machines failover
06/12/14Cloud management of device memory based on geographical location
06/12/14Cloud management of device memory based on geographical location
06/12/14Translation management instructions for updating address translation data structures in remote processing nodes
06/12/14Translation management instructions for updating address translation data structures in remote processing nodes
06/12/14Concurrent multiple instruction issue of non-pipelined instructions using non-pipelined operation resources in another processing core
06/12/14Modify and execute next sequential instruction facility and instructions therefore
06/12/14Branch-free condition evaluation
06/12/14Modify and execute next sequential instruction facility and instructions therefore
06/12/14Tracking multiple conditions in a general purpose register and instruction therefor
06/12/14Tracking multiple conditions in a general purpose register and instruction therefor
06/12/14Branch-free condition evaluation
06/12/14Secure access using location-based encrypted authorization
06/12/14Communication between key manager and storage subsystem kernel via management console
06/12/14Sequential power up of devices in a computing cluster based on relative commonality
06/12/14System and methods for dimm-targeted power saving for hypervisor systems
06/12/14System and methods for dimm-targeted power saving for hypervisor systems
06/12/14Sequential power up of devices in a computing cluster based on device function
06/12/14Sequential power up of devices in a computing cluster based on device function
06/12/14Sequential power up of devices in a computing cluster based on relative commonality
06/12/14Identification of power source electrical connectivity
06/12/14Disaster recover internet protocol address failover
06/12/14Automatic failover of nodes of a middle-tier layer
06/12/14Memory operation of paired memory devices
06/12/14Managing errors in a dram by weak cell encoding
06/12/14Consistency of data in persistent memory
06/12/14Recovery for long running multithreaded processes
06/12/14Role-oriented testbed environments for use in test automation
06/12/14Role-oriented testbed environments for use in test automation
06/12/14Avoiding processing flaws in a computer processor triggered by a predetermined sequence of hardware events
06/12/14Memory operation of paired memory devices
06/12/14Testing disk drives shared by multiple processors in a supercomputer complex
06/12/14Dram error detection, evaluation, and correction
06/12/14Dram error detection, evaluation, and correction
06/12/14Context awareness in auditory browsing
06/12/14Utilizing classification and text analytics for annotating documents to allow quick scanning
06/12/14Client-side aggregation of web content
06/12/14Collaborative arbitration of polling results in a collaborative computing environment
06/12/14Vectorization of bit-level netlists
06/12/14Guiding correction of semantic errors in code using collaboration records
06/12/14Replacing annotated program code in a networked computing environment
06/12/14Program code library consolidation in an integrated development environment
06/12/14Program code library searching and selection in a networked computing environment
06/12/14Program code library selection in an integrated development environment
06/12/14Methods and apparatus for authentication of configuration items via configuration item change analysis
06/12/14Crash notification between debuggers
06/12/14Crash notification between debuggers
06/12/14Testing program code created in a development system
06/12/14License management system
06/12/14Shared resource segmentation
06/12/14Virtual machine failover
06/12/14Hardware contiguous memory region tracking
06/12/14Scheduling event streams depending on content information data
06/12/14Soft co-processors to provide a software service function off-load architecture in a multi-core architecture
06/12/14Executing a collective operation algorithm in a parallel computer
06/12/14Executing a collective operation algorithm in a parallel computer
06/12/14Controlling presentation flow based on content element feedback
06/12/14Crowd sourced, content aware smarter television systems
06/12/14Automated security policy enforcement and auditing
06/12/14Uniformly transforming the characteristics of a production environment
06/12/14Uniformly transforming the characteristics of a production environment
06/12/14Self-authenticating chip
06/12/14System and method of performing electronic transactions
06/12/14Using data analytics and crowdsourcing to determine roles for a computer system
06/12/14Using data analytics and crowdsourcing to determine roles for a computer system
06/12/14Directing audited data traffic to specific repositories
06/12/14Detecting anomalous process behavior
06/12/14Attack protection against xml encryption vulnerability
06/05/14Identifying software responsible for a change in system stability
06/05/14System for preventing undue bending of cables
06/05/14System for preventing undue bending of cables
06/05/14Method and structure to improve the conductivity of narrow copper filled vias
06/05/14Field effect based nanosensor for biopolymer manipulation and detection
06/05/14Field effect based nanosensor for biopolymer manipulation and detection
06/05/14Self-aligned wire for spintronic device
06/05/14Hybrid nanomesh structures
06/05/14Nanomesh complementary metal-oxide-semiconductor field effect transistors
06/05/14Self-aligned double-gate graphene transistor
06/05/143d rfics with ultra-thin semiconductor materials
06/05/143d rfics with ultra-thin semiconductor materials
06/05/14Self-aligned double-gate graphene transistor
06/05/14Heterojunction tunneling field effect transistors, and methods for fabricating the same
06/05/14Heterojunction bipolar transistor
06/05/14Fin field effect transistors including complimentarily stressed channels
06/05/14Substrate-templated epitaxial source/drain contact structures
06/05/14Gate-all-around carbon nanotube transistor with selectively doped spacers
06/05/14Thin film deposition and logic device
06/05/14Thin film deposition and logic device
06/05/14Uniform finfet gate height
06/05/14Finfet edram strap connection structure
06/05/14Non-volatile graphene nanomechanical switch
06/05/14Uniform finfet gate height
06/05/14Semiconductor device having ssoi substrate
06/05/14Inducing channel stress in semiconductor-on-insulator devices by base substrate oxidation
06/05/14Semiconductor device having ssoi substrate
06/05/14Bulk finfet esd device
06/05/14Self-aligned wire for spintronic device
06/05/14Spin-torque magnetoresistive structures
06/05/14Area-efficient capacitor using carbon nanotubes
06/05/14Electronic components on trenched substrates and method of forming same
06/05/14Plated structures
06/05/14Tapered via and mim capacitor
06/05/14Bipolar junction transistors with reduced base-collector junction capacitance
06/05/14Stress-resilient chip structure and dicing process
06/05/14Far back end of the line stack encapsulation
06/05/14Implementing enhanced power supply distribution and decoupling utilizing tsv exclusion zone
06/05/14Far back end of the line stack encapsulation
06/05/14Dual-damascene process to fabricate thick wire structure
06/05/14Integrated carbon nanotube field effect transistor and nanochannel for sequencing
06/05/14Integrated carbon nanotube field effect transistor and nanochannel for sequencing
06/05/14Structure and method for in-line defect non-contact tests
06/05/14Reconfigurable switched-capacitor voltage converter circuit, integrated circuit (ic) chip including the circuit and method of switching voltage on chip
06/05/14Reconfigurable switched-capacitor voltage converter circuit, integrated circuit (ic) chip including the circuit and method of switching voltage on chip
06/05/14Early detection of environmental conditions that will lead to creep corrosion on printed circuit boards in data centers
06/05/14Vehicle-induced roadway debris monitoring
06/05/14User access control based on handheld device orientation
06/05/14Optimistic placement of user interface elements on a touch screen
06/05/14Optical touch panel having smt components as optical gates
06/05/14Automatic presentational level compositions of data visualizations
06/05/14Memory module socket with terminating apparatus
06/05/14Complementary soi lateral bipolar for sram in a cmos platform
06/05/14Per-address spanning tree networks
06/05/14Calibrating thermal behavior of electronics
06/05/14Digital phase detector with zero phase offset
06/05/14Object segmentation at a self-checkout
06/05/14Inspection tool and methodology for three dimensional voltage contrast inspection
06/05/14Complementary soi lateral bipolar for sram in a cmos platform
06/05/14Semiconductor device with raised source/drain and replacement metal gate
06/05/14Method of forming substrate contact for semiconductor on insulator (soi) substrate
06/05/14Non-volatile graphene nanomechanical switch
06/05/14Inducing channel strain via encapsulated silicide formation
06/05/14Area-efficient capacitor using carbon nanotubes
06/05/14Uniform critical dimension size pore for pcram application
06/05/14Shallow trench isolation structures
06/05/14Dislocation engineering using a scanned laser
06/05/14Dislocation engineering using a scanned laser
06/05/14Delayed data delivery options
06/05/14Dynamic negotiation and authorization system to record rights-managed content
06/05/14Data center power conversion efficiency management
06/05/14Automatically managing the environment of a physical zone
06/05/14Managing vehicles on a road network
06/05/14Managing vehicles on a road network
06/05/14Personalized map routes
06/05/14Personalized map routes
06/05/14Methods, systems and computer program storage devices for generating a response to flooding
06/05/14Methods, systems and computer program storage devices for generating a flooding forecast
06/05/14Modeling multiple interactions between multiple loci
06/05/14Modeling multiple interactions between multiple loci
06/05/14Hybrid platform-dependent simulation interface
06/05/14Functional built-in self test for a chip
06/05/14Determining similarity of unfielded names using feature assignments
06/05/14Data management mechanism for wide-area distributed medical information network
06/05/14Selective automated transformation of tasks in crowdsourcing systems
06/05/14Selective automated transformation of tasks in crowdsourcing systems
06/05/14Setting constraints in project portfolio optimization
06/05/14Business systems management mobile administration
06/05/14Processing requests to buy items or services
06/05/14Targeted advertisement calendar incentives and updates
06/05/14Platform-as-a-service billing
06/05/14Platform-as-a-service billing
06/05/14Automatic identification of information useful for generation-based functional verification
06/05/14Inference of anomalous behavior of members of cohorts and associate actors related to the anomalous behavior based on divergent movement from the cohort context centroid
06/05/14Updating a conference invitation responsive to user location
06/05/14Replication control using eventually consistent meta-data
06/05/14Replication control using eventually consistent meta-data
06/05/14File cloning across different filesets
06/05/14Efficiency of compression of data pages
06/05/14Database table compression
06/05/14Efficiency of compression of data pages
06/05/14Scalable multi-query optimization for sparql
06/05/14Optimizing an order of execution of multiple join operations
06/05/14Enabling business intelligence applications to query semantic models
06/05/14Measuring and altering topic influence on edited and unedited media
06/05/14Filmstrip-based query suggestions
06/05/14Hybrid file systems
06/05/14Hybrid file systems
06/05/14Operating system control of directory events with dynamic program execution
06/05/14Operating system control of directory events with dynamic program execution
06/05/14Splitting of processing logics associated with commands of pages in a distributed application
06/05/14Method and apparatus for spam message detection
06/05/14Tracking messages in a mentoring environment
06/05/14Object oriented networks
06/05/14Object oriented networks
06/05/14Parallel top-k simple shortest paths discovery
06/05/14Correlating computing network events
06/05/14Method and system for generic application liveliness monitoring for business resiliency
06/05/14Correlating computing network events
06/05/14Binding multiple addresses to a socket in a network system
06/05/14Binding multiple addresses to a socket in a network system
06/05/14Clustering support across geographical boundaries
06/05/14Clustering support across geographical boundaries
06/05/14Systems and methods for managing destage conflicts
06/05/14Systems and methods for background destaging storage tracks
06/05/14Methodology for fast detection of false sharing in threaded scientific codes
06/05/14Multi-stage translation of prefetch requests
06/05/14Common contiguous memory region optimized virtual machine migration within a workgroup
06/05/14Concurrent array-based queue
06/05/14Common contiguous memory region optimized virtual machine migration within a workgroup
06/05/14Verification of a vector execution unit design
06/05/14Performance in predicting branches
06/05/14Medical emergency-response data management mechanism on wide-area distributed medical information network
06/05/14Method and system for the supply of data, transactions and electronic voting
06/05/14Data center power conversion efficiency management
06/05/14Reducing power grid noise in a processor while minimizing performance loss
06/05/14Identifying software responsible for changes in system stability
06/05/14Using separate processes to handle short-lived and long-lived jobs to reduce failure of processes
06/05/14Identifying software responsible for changes in system stability
06/05/14Implementing dram failure scenarios mitigation by using buffer techniques delaying usage of ras features in computer systems
06/05/14Techniques for dynamically tracking logical units moving between input/output ports of a storage area network target
06/05/14Recovery control in mirrored disks
06/05/14Identifying software responsible for a change in system stability
06/05/14Evaluating service degradation risk for a service provided by data processing resources
06/05/14Evaluating service degradation risk for a service provided by data processing resources
06/05/14Evaluating reliability of a software module using development life cycle
06/05/14Self evaluation of system on a chip with multiple cores
06/05/14Self evaluation of system on a chip with multiple cores
06/05/14Selecting video thumbnail based on surrounding context
06/05/14Selecting video thumbnail based on surrounding context
06/05/14Dynamic building of a web page from widgets and resources specified in a uniform resource locator (url)
06/05/14Conditional workarea user interface refresh that balances performance and stability of web applications
06/05/14Web operation playback
06/05/14Preventing malicious observance of private information
06/05/14Collaborative overlay of user interface elements rendered on the display of a computing device
06/05/14Collaborative overlay of user interface elements rendered on the display of a computing device
06/05/14Event visualization and control
06/05/14Copy and paste experience
06/05/14Event visualization and control
06/05/14Method, apparatus, and computer program for scrolling a document on a touch panel
06/05/14Control of user notification window display
06/05/14Graphical user interface (gui) to associate information with an object
06/05/14Techniques for routing signal wires in an integrated circuit design
06/05/14Estimating power supply of a 3d ic
06/05/14Multi-context remote development
06/05/14Streamlining hardware initialization code
06/05/14Streamlining hardware initialization code
06/05/14Modifying a middleware
06/05/14Overriding system attributes and function returns in a software subsystem
06/05/14Evaluating reliability of a software module using development life cycle
06/05/14Overriding system attributes and function returns in a software subsystem
06/05/14Software version management
06/05/14User datagram protocol (udp) packet migration in a virtual machine (vm) migration
06/05/14Hardware contiguous memory region tracking
06/05/14Common contiguous memory region optimized long distance virtual machine migration
06/05/14Virtual machine image migration
06/05/14Restoring a previous version of a virtual machine image
06/05/14Data flow affinity for heterogenous virtual machines
06/05/14Restoring a previous version of a virtual machine image
06/05/14Data flow affinity for heterogenous virtual machines
06/05/14Common contiguous memory region optimized long distance virtual machine migration
06/05/14Virtual machine management
06/05/14User datagram protocol (udp) packet migration in a virtual machine (vm) migration
06/05/14Method, data processing program, and computer program product to compensate for coupling overhead in a distributed computing system, and corresponding overhead calculator for a distributed computing system and corresponding computer system
06/05/14Distributed transaction routing
06/05/14Reducing power grid noise in a processor while minimizing performance loss
06/05/14Thread folding tool
06/05/14Hybrid platform-dependent simulation interface
06/05/14Automatic transmission content selection
06/05/14Mobile device security policy based on authorized scopes
06/05/14User access control based on handheld device orientation
06/05/14Application testing system and method
06/05/14Application testing system and method
06/05/14Detecting security vulnerabilities on computing devices
06/05/14Discovery of application vulnerabilities involving multiple execution flows
06/05/14Discovery of application vulnerabilities involving multiple execution flows
06/05/14Detecting security vulnerabilities on computing devices
06/05/14Preventing malicious observance of private information
06/05/14Dynamic negotiation and authorization system to record rights-managed content
05/29/14Use of snapshots to reduce risk in migration to a standard virtualized environment
05/29/14Atomic layer deposition for photovoltaic devices
05/29/14Photovoltaic device with solution-processed chalcogenide absorber layer
05/29/14Carbon nanotubes with fluorescent surfactant
05/29/14Voltage contrast inspection of deep trench isolation
05/29/14Junction field effect transistor with an epitaxially grown gate structure
05/29/14Fin isolation in multi-gate field effect transistors
05/29/14Dummy fin formation by gas cluster ion beam
05/29/14Locally isolated protected bulk finfet semiconductor device
05/29/14Integrated circuit with a thin body field effect transistor and capacitor
05/29/14Finfet semiconductor device having increased gate height control
05/29/14Methods of forming wiring to transistor and related transistor
05/29/14Strain relaxation with self-aligned notch
05/29/14Strain relaxation with self-aligned notch
05/29/14Electrostatic control of magnetic devices
05/29/14Double density semiconductor fins and method of fabrication
05/29/14Configurable interposer
05/29/14Light activated test connections
05/29/14Circuits for self-reconfiguration or intrinsic functional changes of chips before vs. after stacking
05/29/14Method for monitoring and communicating biomedical electromagnetic fields
05/29/14Millimeter-wave radio frequency integrated circuit packages with integrated antennas
05/29/14Package structures to improve on-chip antenna performance
05/29/14Augmented display of internal system components
05/29/14Generating alternative descriptions for images
05/29/14Identifying relationships between entities
05/29/14Automatic tuning of value-series analysis tasks based on visual feedback
05/29/14Method and apparatus for tagging media with identity of creator or scene
05/29/14Method and apparatus for tagging media with identity of creator or scene
05/29/14Manufacturing a physical medium configured to store data
05/29/14Portable device capture
05/29/14Immersion-cooled and conduction-cooled electronic system
05/29/14Immersion-cooled and conduction-cooled method for electronic system
05/29/14Electromagnetic interference mode stirrer
05/29/14Dynamic network traffic management in response to non-network conditions input
05/29/14Estimating available bandwith in cellular networks
05/29/14Virtual switching ports on high-bandwidth links
05/29/14Management of routing tables shared by logical switch partitions in a distributed network switch
05/29/14Management of routing tables shared by logical switch partitions in a distributed network switch
05/29/14Thermally determining flow and/or heat load distribution in parallel paths
05/29/14Image color correction
05/29/14Detecting broken lamps in a public lighting system via analyzation of satellite images
05/29/14Base recognition based on the conformation change of a motor molecule
05/29/14Base recognition based on the conformation change of a motor molecule
05/29/14Atomic layer deposition for photovoltaic devices
05/29/14Improved photovoltaic device with solution-processed chalcogenide absorber layer
05/29/14Photovoltaic device with solution-processed chalcogenide absorber layer
05/29/14Wafer debonding using long-wavelength infrared radiation ablation
05/29/14Fixed curvature force loading of mechanically spalled films
05/29/14Replacement metal gate transistors using bi-layer hardmask
05/29/14Tone inversion of self-assembled self-aligned structures
05/29/14Wiper control mechanism
05/29/14Adjustable air inlet duct for rack systems
05/29/14Input device with switchable frequency channel
05/29/14Dynamic power distribution
05/29/14Configuring, optimizing and managing micro-grids
05/29/14Dynamic power distribution
05/29/14Analytics for optimizing usage of cooling subsystems
05/29/14Wiper control mechanism
05/29/14Routing service requests based on lowest actual cost within a federated virtual service cloud
05/29/14Financial risk analytics for service contracts
05/29/14Financial risk analytics for service contracts
05/29/14Knowledge management for solution design during sales and pre-sales
05/29/14Managing a retail offer
05/29/14Promotional item deliveries based on planned/future traveling
05/29/14Consumer centric online product research
05/29/14Effecting payments via mobile phones
05/29/14Personalized budgets for financial services
05/29/14Consistent price optimization in transportation networks
05/29/14Electronic revenue managment for transportation networks
05/29/14Protecting contents in a content management system by automatically determining the content security level
05/29/14Remote replication in a storage system
05/29/14High availability for cloud servers
05/29/14High availability for cloud servers
05/29/14Technology for web site crawling
05/29/14Database row access control
05/29/14Database row access control
05/29/14Method and system for estimating the size of a joined table
05/29/14System and method for refining search results
05/29/14Automatically providing relevant search results based on user behavior
05/29/14Automated generation of networks based on text analytics and semantic analytics
05/29/14Data mining shape based data
05/29/14Building, reusing and managing authored content for incident management
05/29/14Managing a classification system and associated selection mechanism
05/29/14Dynamically quantifying the demand of each software component of each software stack deployed in the cloud environment
05/29/14Auto suggestion tool
05/29/14Accelerating time series data base queries using dictionary based representations
05/29/14Searching alternative data sources
05/29/14Data mining shape based data
05/29/14Tree traversal in a memory device
05/29/14Decimal multi-precision overflow and tininess detection
05/29/14Data readiness using initiator region last commit selection
05/29/14Data readiness using initiator region last commit selection
05/29/14Adjustment to managed-infrastructure-as-a-service cloud standard
05/29/14Management infrastructure analysis for cloud migration
05/29/14Dynamic granular messaging persistence
05/29/14Using extensions to route communications in a virtual environment
05/29/14In-band management of a network attached storage environment
05/29/14Non-chronological buffering of segments of a media file
05/29/14Non-chronological buffering of segments of a media file
05/29/14Software asset management using a browser plug-in
05/29/14Migration to managed clouds
05/29/14Switching a locking mode of an object in a multi-thread program
05/29/14Increasing coverage of delays through arbitration logic
05/29/14Systems and methods for signal detection
05/29/14Systems and methods for signal detection
05/29/14Workload migration between virtualization softwares
05/29/14Identifying redundant data for disk image streaming
05/29/14Identifying redundant data for disk image streaming
05/29/14Selective release-behind of pages based on repaging history in an information handling system
05/29/14Low latency data exchange
05/29/14Selective release-behind of pages based on repaging history in an information handling system
05/29/14Low latency data exchange
05/29/14Coherent proxy for attached processor
05/29/14Programmable coherent proxy for attached processor
05/29/14Programmable coherent proxy for attached processor
05/29/14Coherent attached processor proxy supporting master parking
05/29/14Coherent attached processor proxy supporting master parking
05/29/14Identifying modified chunks in a data set for storage
05/29/14Managing write operations to an extent of tracks migrated between storage devices
05/29/14Use of test protection instruction in computing environments that support pageable guests
05/29/14Floating point execution unit for calculating packed sum of absolute differences
05/29/14Dynamic evaluation and adaption of hardware hash functions
05/29/14System and method for initializing processor cores in a multiprocessor system
05/29/14Data driven hardware chips initialization via hardware procedure framework
05/29/14Computing system voltage control
05/29/14Scalable data collection for system management
05/29/14Associating energy consumption with a virtual machine
05/29/14Decoupled power and performance allocation in a multiprocessing system
05/29/14Distributed power budgeting
05/29/14Distributed power budgeting
05/29/14Decoupled power and performance allocation in a multiprocessing system
05/29/14Computing system voltage control
05/29/14Computing system frequency target monitor
05/29/14Associating energy consumption with a virtual machine
05/29/14Remote data protection in a networked storage computing environment
05/29/14Dynamic concolic execution of an application
05/29/14Dynamic concolic execution of an application
05/29/14Creating an operating system dump
05/29/14System and method of reducing test time via address aware bist circuitry
05/29/14Isolating failing latches using a logic built-in self-test
05/29/14Diagnostic testing for a double-pumped memory array
05/29/14Diagnostic testing for a double-pumped memory array
05/29/14Web browser adapted to invoker
05/29/14Method, apparatus and computer program to designate content retrieval on an interactive display
05/29/14Method, apparatus and computer program to designate content retrieval on an interactive display
05/29/14Method for displaying operation states of modules included in computer system
05/29/14Apparatus and methods for displaying a physical view of a device
05/29/14Logged event frequency visualization
05/29/14Selective sharing of displayed content in a view presented on a touchscreen of a processing system
05/29/14Selective sharing of displayed content in a view presented on a touchscreen of a processing system
05/29/14Corner specific normalization of static timing analysis
05/29/14Structured placement of latches/flip-flops to minimize clock power in high-performance designs
05/29/14Optimising a compilation parser for parsing computer program code in arbitrary applications
05/29/14Dynamic compiler program, dynamic compiling method and dynamic compiling device
05/29/14Optimized installation of received patches for application programs already running on computer systems
05/29/14Migration package for updating multiple software products
05/29/14Assigning a virtual processor architecture for the lifetime of a software application
05/29/14Replacing virtual machine disks
05/29/14Batch jobs using positional scheduling policies of mobile devices
05/29/14Scheduling threads
05/29/14Client based resource isolation with domains
05/29/14Social authentication of users
05/29/14Social authentication of users
05/29/14User authentication based on a user's operation on a displayed three-dimensional model
05/29/14Prevention of accidental password disclosure in application windows
05/29/14Relevance-based information processing
05/22/14Photovoltaic device with solution-processed chalcogenide absorber layer
05/22/14Microfluidic surface processing systems with self-regulated distance-to surface control
05/22/14Magnetic domain wall shift register memory device readout
05/22/14Transistors from vertical stacking of carbon nanotube thin films
05/22/14Vertical stacking of graphene in a field-effect transistor
05/22/14Transistors from vertical stacking of carbon nanotube thin films
05/22/14Vertical stacking of graphene in a field-effect transistor
05/22/14Metal gate structures for cmos transistor devices having reduced parasitic capacitance
05/22/14Local tailoring of fingers in multi-finger fin field effect transistors
05/22/14Dense finfet sram
05/22/14Dielectric equivalent thickness and capacitance scaling for semiconductor devices
05/22/14Dense finfet sram
05/22/14Sandwiched diffusion barrier and metal liner for an interconnect structure
05/22/14Continuous via for power grid
05/22/14Patterned backside metal ground plane for improved metal adhesion
05/22/14Methods of forming nanoparticles using semiconductor manufacturing infrastructure
05/22/14Measuring metal line spacing in semiconductor devices
05/22/14Bipolar transistor frequency doublers at millimeter-wave frequencies
05/22/14Low power voltage controlled oscillator
05/22/14Camera resolution modification based on intended printing location
05/22/14Camera resolution modification based on intended printing location
05/22/14Variable thickness emi shield with variable cooling channel size
05/22/14Heat sink structure with radio frequency absorption
05/22/14Complementary metal-oxide-semiconductor (cmos) min/max voltage circuit for switching between multiple voltages
05/22/14Reducing run time in seismic imaging computing
05/22/14Sea failover mechanism with minimized packet losses
05/22/14Resilient routing based on a multi-channel model for emergency management
05/22/14Resilient routing based on a multi-channel model for emergency management
05/22/14Network and user behavior based time-shifted mobile data transmission
05/22/14Power-scalable skew compensation in source-synchronous parallel interfaces
05/22/14Bipolar transistor frequency doublers at millimeter-wave frequencies
05/22/14Reliable physical unclonable function for device authentication
05/22/14Reliable physical unclonable function for device authentication
05/22/14Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus
05/22/14Management system with acoustical measurement for monitoring noise levels
05/22/14Efficient movement of storage media in a storage media library
05/22/14Multi-dimensional feature merging for open domain question answering
05/22/14Multi-dimensional feature merging for open domain question answering
05/22/14Graphene transistor gated by charges through a nanopore for bio-molecular sensing and dna sequencing
05/22/14Magnetic domain wall shift register memory device readout
05/22/14Integrated circuit with a thin body field effect transistor and capacitor
05/22/14Local tailoring of fingers in multi-finger fin field effect transistors
05/22/14Transistor with improved sigma-shaped embedded stressor and method of formation
05/22/14Continuous via for power grid
05/22/14Processing for overcoming extreme topography
05/22/14System and method to manage qos in a bandwidth-constrained network (cellular) by sending tower-initiated policy changes to individual phones
05/22/14Efficient movement of storage media in a storage media library
05/22/14Efficient distribution and selection of storage media in a storage medium library
05/22/14Efficient distribution and selection of storage media in a storage medium library
05/22/14Data storage drive with target of opportunity recognition
05/22/14Efficient wavefield compression in seismic imaging
05/22/14Efficient wavefield compression in seismic imaging
05/22/14Method and apparatus of estimating wave velocity of negative pressure wave in a fluid transportation pipeline
05/22/14Vibration monitoring system
05/22/14Implementing frequency spectrum analysis using causality hilbert transform results of vna-generated s-parameter model information
05/22/14Automating weather model configurations
05/22/14Method and apparatus for utilizing structural information in semi-structured documents to generate candidates for question answering systems
05/22/14Text prediction using environment hints
05/22/14Text prediction using environment hints
05/22/14Interleaving voice commands for electronic meetings
05/22/14Interleaving voice commands for electronic meetings
05/22/14Generation of medical information using text analytics
05/22/14Generation of medical information using text analytics
05/22/14Managing assets
05/22/14Risk reward estimation for company-country pairs
05/22/14Aligning analytical metrics with strategic objectives
05/22/14Methods and apparatus for complementing user entries associated with events of interest through context
05/22/14Dynamic content file synchronization
05/22/14Managing replicated data
05/22/14Maintaining access control lists in non-identity-preserving replicated data repositories
05/22/14Managing and reconciling information technology assets in a configuration database
05/22/14Maintaining access control lists in non-identity-preserving replicated data repositories
05/22/14Contextual search history in collaborative archives
05/22/14Contextual search history in collabrative archives
05/22/14Automated semantic enrichment of data
05/22/14Scalable summarization of data graphs
05/22/14Scalable summarization of data graphs
05/22/14Managing assets
05/22/14Discovering signature of electronic social networks
05/22/14Discovering signature of electronic social networks
05/22/14Identifying and classifying travelers via social media messages
05/22/14Dynamic routing of instant message
05/22/14Rdma-optimized high-performance distributed cache
05/22/14Deployment of software images with run-time reconnection
05/22/14Saving bandwidth in transmission of compressed data
05/22/14Configure storage class memory command
05/22/14Determining a mapping mode for a dma data transfer
05/22/14Determining a mapping mode for a dma data transfer
05/22/14Offloading input/output (i/o) completion operations
05/22/14Offloading input/output (i/o) completion operations
05/22/14Techniques for managing pinned memory
05/22/14Accessing additional memory space with multiple processors
05/22/14Accessing additional memory space with multiple processors
05/22/14Out-of-memory avoidance in dynamic virtual machine memory adjustment
05/22/14Store operation with conditional push
05/22/14Instruction swap for patching problematic instructions in a microprocessor
05/22/14Speculative finish of instruction execution in a processor core
05/22/14Configuration of componentized software applications
05/22/14Authenticated file handles for network file systems
05/22/14Distributed chip level power system
05/22/14Distributed chip level managed power system
05/22/14Thread consolidation in processor cores
05/22/14Processor noise mitigation using differential crictical path monitoring
05/22/14Progressive validation check disabling based upon validation results
05/22/14Selective posted data error detection based on request type
05/22/14Selective posted data error detection based on history
05/22/14Selective posted data error detection based on request type
05/22/14Selective posted data error detection based on history
05/22/14Flash interface error injector
05/22/14Flash interface error injector
05/22/14Memory test with in-line error correction code logic
05/22/14Memory system with variable length page stripes including data protection information
05/22/14Dynamic file retrieving for web page loading
05/22/14Building and maintaining information extraction rules
05/22/14Keyword-based user interface in electronic device
05/22/14Polygon recovery for vlsi mask correction
05/22/14Polygon recovery for vlsi mask correction
05/22/14Techniques for segmenting of hardware trace and verification of individual trace segments
05/22/14Direct current circuit analysis based clock network design
05/22/14Semiconductor timing improvement
05/22/14Affinity recommendation in software lifecycle management
05/22/14Policy to source code conversion
05/22/14Affinity recommendation in software lifecycle management
05/22/14Orphan token management during in-flight process system migration
05/22/14Enterprise wide software version recommendation
05/22/14Monitoring updates on multiple computing platforms
05/22/14Enterprise wide software version recommendation
05/22/14Method and system for running a virtual appliance
05/22/14Thread consolidation in processor cores
05/22/14Management of copy services relationships via policies specified on resource groups
05/22/14Security capability reference model for goal-based gap analysis
05/22/14Security capability reference model for goal-based gap analysis
05/22/14Global variable security analysis
05/22/14Implementing conductive microcapsule rupture to generate a tamper event for data theft prevention
05/22/14Context-based security screening for accessing data
05/22/14Photovoltaic device with solution-processed chalcogenide absorber layer
05/22/14Microfluidic surface processing systems with self-regulated distance-to surface control
05/22/14Magnetic domain wall shift register memory device readout
05/22/14Transistors from vertical stacking of carbon nanotube thin films
05/22/14Vertical stacking of graphene in a field-effect transistor
05/22/14Transistors from vertical stacking of carbon nanotube thin films
05/22/14Vertical stacking of graphene in a field-effect transistor
05/22/14Metal gate structures for cmos transistor devices having reduced parasitic capacitance
05/22/14Local tailoring of fingers in multi-finger fin field effect transistors
05/22/14Dense finfet sram
05/22/14Dielectric equivalent thickness and capacitance scaling for semiconductor devices
05/22/14Dense finfet sram
05/22/14Sandwiched diffusion barrier and metal liner for an interconnect structure
05/22/14Continuous via for power grid
05/22/14Patterned backside metal ground plane for improved metal adhesion
05/22/14Methods of forming nanoparticles using semiconductor manufacturing infrastructure
05/22/14Measuring metal line spacing in semiconductor devices
05/22/14Bipolar transistor frequency doublers at millimeter-wave frequencies
05/22/14Low power voltage controlled oscillator
05/22/14Camera resolution modification based on intended printing location
05/22/14Camera resolution modification based on intended printing location
05/22/14Variable thickness emi shield with variable cooling channel size
05/22/14Heat sink structure with radio frequency absorption
05/22/14Complementary metal-oxide-semiconductor (cmos) min/max voltage circuit for switching between multiple voltages
05/22/14Reducing run time in seismic imaging computing
05/22/14Sea failover mechanism with minimized packet losses
05/22/14Resilient routing based on a multi-channel model for emergency management
05/22/14Resilient routing based on a multi-channel model for emergency management
05/22/14Network and user behavior based time-shifted mobile data transmission
05/22/14Power-scalable skew compensation in source-synchronous parallel interfaces
05/22/14Bipolar transistor frequency doublers at millimeter-wave frequencies
05/22/14Reliable physical unclonable function for device authentication
05/22/14Reliable physical unclonable function for device authentication
05/22/14Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus
05/22/14Management system with acoustical measurement for monitoring noise levels
05/22/14Efficient movement of storage media in a storage media library
05/22/14Multi-dimensional feature merging for open domain question answering
05/22/14Multi-dimensional feature merging for open domain question answering
05/22/14Graphene transistor gated by charges through a nanopore for bio-molecular sensing and dna sequencing
05/22/14Magnetic domain wall shift register memory device readout
05/22/14Integrated circuit with a thin body field effect transistor and capacitor
05/22/14Local tailoring of fingers in multi-finger fin field effect transistors
05/22/14Transistor with improved sigma-shaped embedded stressor and method of formation
05/22/14Continuous via for power grid
05/22/14Processing for overcoming extreme topography
05/22/14System and method to manage qos in a bandwidth-constrained network (cellular) by sending tower-initiated policy changes to individual phones
05/22/14Efficient movement of storage media in a storage media library
05/22/14Efficient distribution and selection of storage media in a storage medium library
05/22/14Efficient distribution and selection of storage media in a storage medium library
05/22/14Data storage drive with target of opportunity recognition
05/22/14Efficient wavefield compression in seismic imaging
05/22/14Efficient wavefield compression in seismic imaging
05/22/14Method and apparatus of estimating wave velocity of negative pressure wave in a fluid transportation pipeline
05/22/14Vibration monitoring system
05/22/14Implementing frequency spectrum analysis using causality hilbert transform results of vna-generated s-parameter model information
05/22/14Automating weather model configurations
05/22/14Method and apparatus for utilizing structural information in semi-structured documents to generate candidates for question answering systems
05/22/14Text prediction using environment hints
05/22/14Text prediction using environment hints
05/22/14Interleaving voice commands for electronic meetings
05/22/14Interleaving voice commands for electronic meetings
05/22/14Generation of medical information using text analytics
05/22/14Generation of medical information using text analytics
05/22/14Managing assets
05/22/14Risk reward estimation for company-country pairs
05/22/14Aligning analytical metrics with strategic objectives
05/22/14Methods and apparatus for complementing user entries associated with events of interest through context
05/22/14Dynamic content file synchronization
05/22/14Managing replicated data
05/22/14Maintaining access control lists in non-identity-preserving replicated data repositories
05/22/14Managing and reconciling information technology assets in a configuration database
05/22/14Maintaining access control lists in non-identity-preserving replicated data repositories
05/22/14Contextual search history in collaborative archives
05/22/14Contextual search history in collabrative archives
05/22/14Automated semantic enrichment of data
05/22/14Scalable summarization of data graphs
05/22/14Scalable summarization of data graphs
05/22/14Managing assets
05/22/14Discovering signature of electronic social networks
05/22/14Discovering signature of electronic social networks
05/22/14Identifying and classifying travelers via social media messages
05/22/14Dynamic routing of instant message
05/22/14Rdma-optimized high-performance distributed cache
05/22/14Deployment of software images with run-time reconnection
05/22/14Saving bandwidth in transmission of compressed data
05/22/14Configure storage class memory command
05/22/14Determining a mapping mode for a dma data transfer
05/22/14Determining a mapping mode for a dma data transfer
05/22/14Offloading input/output (i/o) completion operations
05/22/14Offloading input/output (i/o) completion operations
05/22/14Techniques for managing pinned memory
05/22/14Accessing additional memory space with multiple processors
05/22/14Accessing additional memory space with multiple processors
05/22/14Out-of-memory avoidance in dynamic virtual machine memory adjustment
05/22/14Store operation with conditional push
05/22/14Instruction swap for patching problematic instructions in a microprocessor
05/22/14Speculative finish of instruction execution in a processor core
05/22/14Configuration of componentized software applications
05/22/14Authenticated file handles for network file systems
05/22/14Distributed chip level power system
05/22/14Distributed chip level managed power system
05/22/14Thread consolidation in processor cores
05/22/14Processor noise mitigation using differential crictical path monitoring
05/22/14Progressive validation check disabling based upon validation results
05/22/14Selective posted data error detection based on request type
05/22/14Selective posted data error detection based on history
05/22/14Selective posted data error detection based on request type
05/22/14Selective posted data error detection based on history
05/22/14Flash interface error injector
05/22/14Flash interface error injector
05/22/14Memory test with in-line error correction code logic
05/22/14Memory system with variable length page stripes including data protection information
05/22/14Dynamic file retrieving for web page loading
05/22/14Building and maintaining information extraction rules
05/22/14Keyword-based user interface in electronic device
05/22/14Polygon recovery for vlsi mask correction
05/22/14Polygon recovery for vlsi mask correction
05/22/14Techniques for segmenting of hardware trace and verification of individual trace segments
05/22/14Direct current circuit analysis based clock network design
05/22/14Semiconductor timing improvement
05/22/14Affinity recommendation in software lifecycle management
05/22/14Policy to source code conversion
05/22/14Affinity recommendation in software lifecycle management
05/22/14Orphan token management during in-flight process system migration
05/22/14Enterprise wide software version recommendation
05/22/14Monitoring updates on multiple computing platforms
05/22/14Enterprise wide software version recommendation
05/22/14Method and system for running a virtual appliance
05/22/14Thread consolidation in processor cores
05/22/14Management of copy services relationships via policies specified on resource groups
05/22/14Security capability reference model for goal-based gap analysis
05/22/14Security capability reference model for goal-based gap analysis
05/22/14Global variable security analysis
05/22/14Implementing conductive microcapsule rupture to generate a tamper event for data theft prevention
05/22/14Context-based security screening for accessing data
05/15/14Inlet-air-cooling door assembly for an electronics rack
05/15/14Device for electrical characterization of molecules using cnt-nanoparticle-molecule-nanoparticle-cnt structure
05/15/14Integrated nanopore and paul trap mechanism for dna capture and motion control
05/15/14Integrated nanopore and paul trap mechanism for dna capture and motion control
05/15/14Large-scale electricity-less disinfection of fluent water
05/15/14Electricity-less water disinfection
05/15/14Device for electrical characterization of molecules using cnt-nanoparticle-molecule-nanoparticle-cnt structure
05/15/14Robust fault diagnosis for electronic devices
05/15/14Managing hot water delivery
05/15/14Electricity-less water disinfection
05/15/14Graphene field effect transistor
05/15/14Semiconductor device including an asymmetric feature, and method of making the same
05/15/14Dual phase gallium nitride material formation on (100) silicon
05/15/14Selective gallium nitride regrowth on (100) silicon
05/15/14Co-integration of elemental semiconductor devices and compound semiconductor devices
05/15/14Self-aligned emitter-base in advanced bicmos technology
05/15/14Semiconductor device having diffusion barrier to reduce back channel leakage
05/15/14Field effect transistor devices with dopant free channels and back gates
05/15/14Compensation for a charge in a silicon substrate
05/15/14Finfet spacer formation by oriented implantation
05/15/14Structure and method to form passive devices in etsoi process flow
05/15/14On-chip diode with fully depleted semiconductor devices
05/15/14Replacement metal gate structure for cmos device
05/15/14Replacement metal gate structure for cmos device
05/15/14Gap-fill keyhole repair using printable dielectric material
05/15/14Thermocompression for semiconductor chip assembly
05/15/14Semiconductor devices with enhanced electromigration performance
05/15/14Methods for fabrication of an air gap-containing interconnect structure
05/15/14Methods for selective reverse mask planarization and interconnect structures formed thereby
05/15/14Dynamic impedance matching for improved transient performance in a direct current-to-direct current ('dc/dc') converter for delivering a load to an electrical component
05/15/14Dynamic impedance matching for improved transient performance in a direct current-to-direct current ('dc/dc') converter for delivering a load to an electrical component
05/15/14Determination of isoelectric points of biomolecules using capacitive sensors
05/15/14Determination of isoelectric points of biomolecules using capacitive sensors
05/15/14Flexible performance screen ring oscillator within a scan chain
05/15/14Implementing compact current mode logic (cml) inductor capacitor (lc) voltage controlled oscillator (vco) for high-speed data communications
05/15/14Managing vehicle detection
05/15/14Phased-array transceiver for millimeter-wave frequencies
05/15/14Automatic tuning of value-series analysis tasks based on visual feedback
05/15/14Distributed control of a heterogeneous video surveillance network
05/15/14Providing emergency access to surveillance video
05/15/14Automated authorization to access surveillance video based on pre-specified events
05/15/14Automated authorization to access surveillance video based on pre-specified events
05/15/14Universal magnetic recording head chip
05/15/14Cooling system for electronics
05/15/14Air-cooling and vapor-condensing door assembly
05/15/14Inlet-air-cooling door assembly for an electronics rack
05/15/14Air-cooling and vapor-condensing door assembly
05/15/14Electronic component assembly
05/15/14Memory architectures having wiring structures that enable different access patterns in multiple dimensions
05/15/14Memory architectures having wiring structures that enable different access patterns in multiple dimensions
05/15/14Performing value and context aware communications networking
05/15/14Coupling system for data receivers
05/15/14Secure communication method
05/15/14Background understanding in video data
05/15/14Collectively aggregating digital recordings
05/15/14Intelligent recording
05/15/14Providing emergency access to surveillance video
05/15/14Germanium photodetector
05/15/14Germanium photodetector
05/15/14Co-integration of elemental semiconductor devices and compound semiconductor devices
05/15/14Field effect transistor devices with dopant free channels and back gates
05/15/14Selective gallium nitride regrowth on (100) silicon
05/15/14Dielectric cap layer for replacement gate with self-aligned contact
05/15/14Proximity based reminders
05/15/14Use of a support device
05/15/14Dynamic temperature control for a room containing a group of people
05/15/14In-vehicle drive pattern optimization for reduced road wear
05/15/14Solar cell characteristics determination
05/15/14Solar cell characteristics determination
05/15/14Determining system performance
05/15/14Analyzing hardware designs based on component re-use
05/15/14Analyzing hardware designs based on component re-use
05/15/14Method to assess the impact of existing fractures and faults for reservoir management
05/15/14Quantitative models of multi-allelic multi-loci interactions
05/15/14Precise simulation of progeny derived from recombining parents
05/15/14Method to couple fluid-flow and geomechanical models for integrated petroleum systems using known triggering events
05/15/14Precise simulation of progeny derived from recombining parents
05/15/14Quantitative models of multi-allelic multi-loci interactions
05/15/14Identifying and routing poison tuples in a streaming application
05/15/14Identifying and routing poison tuples in a streaming application
05/15/14Page mapped spatially aware emulation of computer instruction set
05/15/14Translation decomposition and execution
05/15/14Sentiment analysis based on demographic analysis
05/15/14Correcting text with voice processing
05/15/14Determining whether to use crowdsourcing for a specified task
05/15/14Determining whether to use crowdsourcing for a specified task
05/15/14System and method for operational quality aware staffing requirements in service systems
05/15/14Selecting collaborators for projects
05/15/14System and method to determine defect risks in software solutions
05/15/14Using geographical location to determine element and area information to provide to a computing device
05/15/14Social network-assisted electronic payments
05/15/14Selecting collaborators for projects
05/15/14Statistical estimation of origin and destination points of trip using plurality of types of data sources
05/15/14Predicting change-points in continuous time-series data
05/15/14Multi objective design selection
05/15/14Mode determination for multivariate time series data
05/15/14System, method and program product for automatically supplying missing parameters for matching new members of a population with analogous members
05/15/14Mode determination for multivariate time series data
05/15/14Rapid provisioning of information for business analytics
05/15/14Transactional service pipeline
05/15/14Automatically addressing performance issues in a distributed database
05/15/14Mobile application cache based on extreme scale technology
05/15/14Content management targeted rollback
05/15/14Intelligent resoluton of codes in a classification system
05/15/14Mobile application cache based on extreme scale technology
05/15/14Database usage trends based on database lock requests
05/15/14Personalized search result re-rank based on relationship bond strength alteration among different keywords
05/15/14Personalized search result re-rank based on relationship bond strength alteration among different keywords
05/15/14Hybrid table implementation by using buffer pool as permanent in-memory storage for memory-resident data
05/15/14Relative performance prediction of a replacement database management system (dbms)
05/15/14Multi-tier indexing methodology for scalable mobile device data collection
05/15/14Determining potential enterprise partnerships
05/15/14Appliance for accelerating graph database management and analytics systems
05/15/14Appliance for accelerating graph database management and analytics systems
05/15/14Intelligent resoluton of codes in a classification system
05/15/14Accelerating time series data base queries using dictionary based representations
05/15/14Destruction of sensitive information
05/15/14Tag authentication and location verification service
05/15/14Tag authentication and location verification service
05/15/14Timeout value adaptation
05/15/14Efficient network bandwidth utilization in a distributed processing system
05/15/14Enterprise application session control and monitoring in a large distributed environment
05/15/14Automatically addressing performance issues in a distributed database
05/15/14Efficient network bandwidth utilization in a distributed processing system
05/15/14Secure metering and accounting for cloud services
05/15/14Diagnosing distributed applications using application logs and request processing paths
05/15/14Distributed control of a heterogeneous video surveillance network
05/15/14Real-time automated virtual private network (vpn) access management
05/15/14Secure metering and accounting for cloud services
05/15/14Migration of logical partitions between two devices
05/15/14Configuring cloud resources
05/15/14Streaming data on data processes
05/15/14Streams optional execution paths depending upon data rates
05/15/14Streams optional execution paths depending upon data rates
05/15/14Streaming data on data processes
05/15/14Low latency data transfer between clock domains operated in various synchronization modes
05/15/14Solid-state storage management
05/15/14Low latency and persistent data storage
05/15/14Creating a single library image from multiple independent tape libraries
05/15/14Enhanced cache coordination in a multi-level cache
05/15/14Enhanced cache coordination in a multilevel cache
05/15/14Asynchronous persistent stores for transactions
05/15/14Systems and methods for destaging storage tracks from cache
05/15/14Dynamically improving memory affinity of logical partitions
05/15/14Dynamically improving memory affinity of logical partitions
05/15/14Accessing data in a storage system
05/15/14Managing backup relationships in a data storage system
05/15/14Active memory device gather, scatter, and filter
05/15/14Verification of a vector execution unit design
05/15/14Portable lightweight ldap directory server and database
05/15/14Biometric-based wireless device association
05/15/14Power-constrained compiler code generation and scheduling of work in a heterogeneous processing system
05/15/14Power-constrained compiler code generation and scheduling of work in a heterogeneous processing system
05/15/14Management to reduce power consumption in virtual memory provided by plurality of different types of memory devices
05/15/14Cooperatively managing enforcement of energy related policies between virtual machine and application runtime
05/15/14Generation and distribution of a synchronized time source
05/15/14Disk array having mirror configuration and rebuilding method therefor
05/15/14Core file limiter for abnormally terminating processes
05/15/14Core file limiter for abnormally terminating processes
05/15/14Exposed-pipeline processing element with rollback
05/15/14Exposed-pipeline processing element with rollback
05/15/14Diagnosing distributed applications using application logs and request processing paths
05/15/14Proactive risk analysis and governance of upgrade process
05/15/14Error rate threshold for storage of data
05/15/14Reconstructive error recovery procedure (erp) using reserved buffer
05/15/14Reconstructive error recovery procedure (erp) for multiple data sets using reserved buffer
05/15/14User function feedback
05/15/14Focused personal identifying information redaction
05/15/14Automatically rendering web or hybrid applications natively
05/15/14Generating website analytics
05/15/14Automatically rendering web or hybrid applications natively
05/15/14Range adjustment for text editing
05/15/14Associating electronic conference session content with an electronic calendar
05/15/14Test validation planning
05/15/14Advanced array local clock buffer base block circuit
05/15/14Identifying software code experts
05/15/14Identifying software code experts
05/15/14Indicating hierarchy diversion in a class diagram
05/15/14Indicating hierarchy diversion in a class diagram
05/15/14Security analysis using relational abstraction of data structures
05/15/14Execution control during program code conversion
05/15/14Rapid configuration of software
05/15/14Virtual memory management to reduce power consumption in the memory
05/15/14Runtime based application security and regulatory compliance in cloud environment
05/15/14Cooperatively managing enforcement of energy related policies between virtual machine and application runtime
05/15/14Automatic virtual machine termination in a cloud
05/15/14Virtual machine template creation based on data feeds
05/15/14Virtual machine template creation based on data feeds
05/15/14Method and apparatus for efficient execution of concurrent processes on a multithreaded message passing system
05/15/14Method and apparatus for efficient execution of concurrent processes on a multithreaded message passing system
05/15/14Framework for java based application memory management
05/15/14Protection of user data in hosted application environments
05/15/14Protection of user data in hosted application environments
05/15/14Enterprise application session control and monitoring in a large distributed environment
05/15/14Automatically generating challenge questions inferred from user history data for user authentication
05/15/14Password-free, token-based wireless access
05/15/14Automatically generating challenge questions inferred from user history data for user authentication
05/15/14Image meta data driven device authentication
05/15/14Providing notification of spam avatars
05/15/14Application-level anomaly detection
05/15/14Runtime based application security and regulatory compliance in cloud environment
05/15/14Application-level anomaly detection
05/15/14Limiting information leakage and piracy due to virtual machine cloning
05/15/14Security analysis using relational abstraction of data structures
05/15/14Image vulnerability repair in a networked computing environment
05/15/14Methods and apparatus for software license management
05/15/14Methods and apparatus for software license management
05/15/14Limiting information leakage and piracy due to virtual machine cloning
05/15/14Inlet-air-cooling door assembly for an electronics rack
05/15/14Device for electrical characterization of molecules using cnt-nanoparticle-molecule-nanoparticle-cnt structure
05/15/14Integrated nanopore and paul trap mechanism for dna capture and motion control
05/15/14Integrated nanopore and paul trap mechanism for dna capture and motion control
05/15/14Large-scale electricity-less disinfection of fluent water
05/15/14Electricity-less water disinfection
05/15/14Device for electrical characterization of molecules using cnt-nanoparticle-molecule-nanoparticle-cnt structure
05/15/14Robust fault diagnosis for electronic devices
05/15/14Managing hot water delivery
05/15/14Electricity-less water disinfection
05/15/14Graphene field effect transistor
05/15/14Semiconductor device including an asymmetric feature, and method of making the same
05/15/14Dual phase gallium nitride material formation on (100) silicon
05/15/14Selective gallium nitride regrowth on (100) silicon
05/15/14Co-integration of elemental semiconductor devices and compound semiconductor devices
05/15/14Self-aligned emitter-base in advanced bicmos technology
05/15/14Semiconductor device having diffusion barrier to reduce back channel leakage
05/15/14Field effect transistor devices with dopant free channels and back gates
05/15/14Compensation for a charge in a silicon substrate
05/15/14Finfet spacer formation by oriented implantation
05/15/14Structure and method to form passive devices in etsoi process flow
05/15/14On-chip diode with fully depleted semiconductor devices
05/15/14Replacement metal gate structure for cmos device
05/15/14Replacement metal gate structure for cmos device
05/15/14Gap-fill keyhole repair using printable dielectric material
05/15/14Thermocompression for semiconductor chip assembly
05/15/14Semiconductor devices with enhanced electromigration performance
05/15/14Methods for fabrication of an air gap-containing interconnect structure
05/15/14Methods for selective reverse mask planarization and interconnect structures formed thereby
05/15/14Dynamic impedance matching for improved transient performance in a direct current-to-direct current ('dc/dc') converter for delivering a load to an electrical component
05/15/14Dynamic impedance matching for improved transient performance in a direct current-to-direct current ('dc/dc') converter for delivering a load to an electrical component
05/15/14Determination of isoelectric points of biomolecules using capacitive sensors
05/15/14Determination of isoelectric points of biomolecules using capacitive sensors
05/15/14Flexible performance screen ring oscillator within a scan chain
05/15/14Implementing compact current mode logic (cml) inductor capacitor (lc) voltage controlled oscillator (vco) for high-speed data communications
05/15/14Managing vehicle detection
05/15/14Phased-array transceiver for millimeter-wave frequencies
05/15/14Automatic tuning of value-series analysis tasks based on visual feedback
05/15/14Distributed control of a heterogeneous video surveillance network
05/15/14Providing emergency access to surveillance video
05/15/14Automated authorization to access surveillance video based on pre-specified events
05/15/14Automated authorization to access surveillance video based on pre-specified events
05/15/14Universal magnetic recording head chip
05/15/14Cooling system for electronics
05/15/14Air-cooling and vapor-condensing door assembly
05/15/14Inlet-air-cooling door assembly for an electronics rack
05/15/14Air-cooling and vapor-condensing door assembly
05/15/14Electronic component assembly
05/15/14Memory architectures having wiring structures that enable different access patterns in multiple dimensions
05/15/14Memory architectures having wiring structures that enable different access patterns in multiple dimensions
05/15/14Performing value and context aware communications networking
05/15/14Coupling system for data receivers
05/15/14Secure communication method
05/15/14Background understanding in video data
05/15/14Collectively aggregating digital recordings
05/15/14Intelligent recording
05/15/14Providing emergency access to surveillance video
05/15/14Germanium photodetector
05/15/14Germanium photodetector
05/15/14Co-integration of elemental semiconductor devices and compound semiconductor devices
05/15/14Field effect transistor devices with dopant free channels and back gates
05/15/14Selective gallium nitride regrowth on (100) silicon
05/15/14Dielectric cap layer for replacement gate with self-aligned contact
05/15/14Proximity based reminders
05/15/14Use of a support device
05/15/14Dynamic temperature control for a room containing a group of people
05/15/14In-vehicle drive pattern optimization for reduced road wear
05/15/14Solar cell characteristics determination
05/15/14Solar cell characteristics determination
05/15/14Determining system performance
05/15/14Analyzing hardware designs based on component re-use
05/15/14Analyzing hardware designs based on component re-use
05/15/14Method to assess the impact of existing fractures and faults for reservoir management
05/15/14Quantitative models of multi-allelic multi-loci interactions
05/15/14Precise simulation of progeny derived from recombining parents
05/15/14Method to couple fluid-flow and geomechanical models for integrated petroleum systems using known triggering events
05/15/14Precise simulation of progeny derived from recombining parents
05/15/14Quantitative models of multi-allelic multi-loci interactions
05/15/14Identifying and routing poison tuples in a streaming application
05/15/14Identifying and routing poison tuples in a streaming application
05/15/14Page mapped spatially aware emulation of computer instruction set
05/15/14Translation decomposition and execution
05/15/14Sentiment analysis based on demographic analysis
05/15/14Correcting text with voice processing
05/15/14Determining whether to use crowdsourcing for a specified task
05/15/14Determining whether to use crowdsourcing for a specified task
05/15/14System and method for operational quality aware staffing requirements in service systems
05/15/14Selecting collaborators for projects
05/15/14System and method to determine defect risks in software solutions
05/15/14Using geographical location to determine element and area information to provide to a computing device
05/15/14Social network-assisted electronic payments
05/15/14Selecting collaborators for projects
05/15/14Statistical estimation of origin and destination points of trip using plurality of types of data sources
05/15/14Predicting change-points in continuous time-series data
05/15/14Multi objective design selection
05/15/14Mode determination for multivariate time series data
05/15/14System, method and program product for automatically supplying missing parameters for matching new members of a population with analogous members
05/15/14Mode determination for multivariate time series data
05/15/14Rapid provisioning of information for business analytics
05/15/14Transactional service pipeline
05/15/14Automatically addressing performance issues in a distributed database
05/15/14Mobile application cache based on extreme scale technology
05/15/14Content management targeted rollback
05/15/14Intelligent resoluton of codes in a classification system
05/15/14Mobile application cache based on extreme scale technology
05/15/14Database usage trends based on database lock requests
05/15/14Personalized search result re-rank based on relationship bond strength alteration among different keywords
05/15/14Personalized search result re-rank based on relationship bond strength alteration among different keywords
05/15/14Hybrid table implementation by using buffer pool as permanent in-memory storage for memory-resident data
05/15/14Relative performance prediction of a replacement database management system (dbms)
05/15/14Multi-tier indexing methodology for scalable mobile device data collection
05/15/14Determining potential enterprise partnerships
05/15/14Appliance for accelerating graph database management and analytics systems
05/15/14Appliance for accelerating graph database management and analytics systems
05/15/14Intelligent resoluton of codes in a classification system
05/15/14Accelerating time series data base queries using dictionary based representations
05/15/14Destruction of sensitive information
05/15/14Tag authentication and location verification service
05/15/14Tag authentication and location verification service
05/15/14Timeout value adaptation
05/15/14Efficient network bandwidth utilization in a distributed processing system
05/15/14Enterprise application session control and monitoring in a large distributed environment
05/15/14Automatically addressing performance issues in a distributed database
05/15/14Efficient network bandwidth utilization in a distributed processing system
05/15/14Secure metering and accounting for cloud services
05/15/14Diagnosing distributed applications using application logs and request processing paths
05/15/14Distributed control of a heterogeneous video surveillance network
05/15/14Real-time automated virtual private network (vpn) access management
05/15/14Secure metering and accounting for cloud services
05/15/14Migration of logical partitions between two devices
05/15/14Configuring cloud resources
05/15/14Streaming data on data processes
05/15/14Streams optional execution paths depending upon data rates
05/15/14Streams optional execution paths depending upon data rates
05/15/14Streaming data on data processes
05/15/14Low latency data transfer between clock domains operated in various synchronization modes
05/15/14Solid-state storage management
05/15/14Low latency and persistent data storage
05/15/14Creating a single library image from multiple independent tape libraries
05/15/14Enhanced cache coordination in a multi-level cache
05/15/14Enhanced cache coordination in a multilevel cache
05/15/14Asynchronous persistent stores for transactions
05/15/14Systems and methods for destaging storage tracks from cache
05/15/14Dynamically improving memory affinity of logical partitions
05/15/14Dynamically improving memory affinity of logical partitions
05/15/14Accessing data in a storage system
05/15/14Managing backup relationships in a data storage system
05/15/14Active memory device gather, scatter, and filter
05/15/14Verification of a vector execution unit design
05/15/14Portable lightweight ldap directory server and database
05/15/14Biometric-based wireless device association
05/15/14Power-constra