Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

International Business Machines Corporation
International Business Machines Corporations
International Business Machines Corporation ibm
International Business Machines Corporation yt
International Business Machines Corporation yorktown
International Business Machines Corporation ibm Corporation
International Business Machines Corporation New Orchard Road
International Business Machines Corporation_20100114
International Business Machines Corporation_20131212
International Business Machines Corporation_20100128
International Business Machines Corporation_20100121
International Business Machines Corporation_20100107

IBM patents (2015 archive)


Recent patent applications related to IBM. IBM is listed as an Agent/Assignee. Note: IBM may have other listings under different names/spellings. We're not affiliated with IBM, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | IBM-related inventors


12/31/15 / #20150382176

Mobility detection for edge applications in wireless communication networks

Various embodiments detecting wireless communication device mobility in a wireless communication network. In one embodiment, one or more internet protocol (ip) data packets associated with a wireless communication device are analyzed. ... International Business Machines Corporation

12/31/15 / #20150382060

Sharing a configuration state of a client device that meets a threshold level of qoe

Arrangements described herein can include automatically monitoring, on a first client device receiving multimedia content, a first qoe associated with presenting the multimedia content by the first client device. The arrangements also can include automatically determining a configuration state of the first client device while presenting the multimedia content. ... International Business Machines Corporation

12/31/15 / #20150382056

Video composition by dynamic linking

A computer receives one or more media content source locations. The computer determines two or more media content items associated with the one or more received media content source locations. ... International Business Machines Corporation

12/31/15 / #20150381942

Incident data collection for public protection agencies

An approach is provided in which a public protection system sends a data collection request to user devices located within a geographical proximity of an incident in progress that instructs the user devices to capture real-time data corresponding to the incident in progress. The public protection system receives the real-time data from the user devices and determines that a set of the real-time data includes evidence data corresponding to the incident in progress.. ... International Business Machines Corporation

12/31/15 / #20150381939

Dynamic facial feature substitution for video conferencing

In an approach to determine facial feature substitution in a video conference, a computer receives one or more pre-recorded videos of an attendee of a video conference. The one or more pre-recorded videos include at least one pre-recorded video of an attendee speaking. ... International Business Machines Corporation

12/31/15 / #20150381938

Dynamic facial feature substitution for video conferencing

In an approach to determine facial feature substitution in a video conference, a computer receives one or more pre-recorded videos of an attendee of a video conference. The one or more pre-recorded videos include at least one pre-recorded video of an attendee speaking. ... International Business Machines Corporation

12/31/15 / #20150381933

Dynamic character substitution for web conferencing based on sentiment

In an approach to determine a pre-recorded video for use in place of a video feed of a user in a video conference, a computer receives one or more pre-recorded videos of a user in which the pre-recorded videos include at least one visual representation of an emotional state. The computer determines a meeting tone of at least one meeting discussion in the video conference and determines a first video of the one or more pre-recorded videos of the user that corresponds to the meeting tone. ... International Business Machines Corporation

12/31/15 / #20150381898

Directing field of vision based on personal interests

A method for directing the field of vision based on personal interests. The method includes receiving a keyword and/or an image file and processing the keyword and/or image file to generate data representing a user interest. ... International Business Machines Corporation

12/31/15 / #20150381796

Providing visual cues for a user interacting with an automated telephone system

Visual cues are provided for a user who is using a telephone for interacting with an automated telephone system. A number stream is created from the digits entered by the user with the phone keypad in response to audible prompts from the automated system. ... International Business Machines Corporation

12/31/15 / #20150381726

Maintenance of a fabric priority during synchronous copy operations

A primary storage controller receives a write command from a host, wherein fibre channel frames corresponding to the write command have a priority indicated by the host. The primary storage controller performs a synchronous copy operation to copy data written by the write command from the primary storage controller to a secondary storage controller, wherein fibre channel frames corresponding to the synchronous copy operations have an identical priority to the priority indicated by the host.. ... International Business Machines Corporation

12/31/15 / #20150381700

Data caching and resource request response

A data caching method and device, and a resource request response method and device. The data caching method comprise: receiving a resource request for group content belonging to a specific user group, the resource request being sent from a user terminal to an application server by a user; checking if a mapping between the group content and a group caching id for identifying the user group and a mapping between the user and the group caching id have been established in the caching server; and returning the group content cached in the caching server to the user terminal in responses to the mapping between the group content and the group caching id and the mapping between the user and the group caching id having been established in the caching server.. ... International Business Machines Corporation

12/31/15 / #20150381693

Sharing a configuration state of a client device that meets a threshold level of qoe

Arrangements described herein can include automatically monitoring, on a first client device receiving multimedia content, a first qoe associated with presenting the multimedia content by the first client device. The arrangements also can include automatically determining a configuration state of the first client device while presenting the multimedia content. ... International Business Machines Corporation

12/31/15 / #20150381684

Interactively updating multimedia data

A method and associated system for updating recorded multimedia data. An interactive request pertaining to a portion of recorded multimedia data is received. ... International Business Machines Corporation

12/31/15 / #20150381683

Supplementing a tuple with a derived value

A stream of tuples are processed by a plurality of processing elements, each including one or more stream operators, operating on computer processors. A method determines whether a first stream operator includes a first operation that is deterministic and whether a second stream operator includes a second operation that is equivalent to the first operation. ... International Business Machines Corporation

12/31/15 / #20150381681

Supplementing a tuple with a derived value

A stream of tuples are processed by a plurality of processing elements, each including one or more stream operators, operating on computer processors. A method determines whether a first stream operator includes a first operation that is deterministic and whether a second stream operator includes a second operation that is equivalent to the first operation. ... International Business Machines Corporation

12/31/15 / #20150381667

Incident data collection for public protection agencies

An approach is provided in which a public protection system sends a data collection request to user devices located within a geographical proximity of an incident in progress that instructs the user devices to capture real-time data corresponding to the incident in progress. The public protection system receives the real-time data from the user devices and determines that a set of the real-time data includes evidence data corresponding to the incident in progress.. ... International Business Machines Corporation

12/31/15 / #20150381660

Dynamically generating a packet inspection policy for a policy enforcement point in a centralized management environment

A mechanism is provided for generating a packet inspection policy for a policy enforcement point in a centralized management environment. Data of a network topology for the policy enforcement point corresponding to a network infrastructure is updated according to metadata of the policy enforcement point, the metadata including a capability of the policy enforcement point. ... International Business Machines Corporation

12/31/15 / #20150381635

Method and system for analysis of security events in a managed computer network

An event retrieval and analysis system compares counts of event data for a device to stored profile counts to determine if alerts should be triggered. Event data can be retrieved by a sensor. ... International Business Machines Corporation

12/31/15 / #20150381629

Crowd sourced access approvals

An approach is provided in which a crowd source access manager receives a user request from a requestor to access a resource and determines a set of candidate approvers of the resource. The crowd source access manager identifies a crowd sourced set of users corresponding to the requestor and identifies preferred approvers from the crowd sourced set of users that are also included in the set of candidate approvers. ... International Business Machines Corporation

12/31/15 / #20150381598

Queue management and load shedding for complex authentication schemes

Using a stochastic queuing model to determine adjustments to be made to authentication system operation. In light of operational parameter values and the stochastic queuing model, a determination is made that adjusting the value of a particular parameter for handling authentication requests is likely to improve some aspect of system performance, and the request handling parameter is adjusted accordingly.. ... International Business Machines Corporation

12/31/15 / #20150381593

Privileged access gateway for accessing systems and/or applications

Access to secured access systems and/or applications is provided to an authorized user through an access manager. The access manager manages access credentials for the authorized user such that the user is only authenticated by the access manager. ... International Business Machines Corporation

12/31/15 / #20150381590

Multi-tenant secure separation of data in a cloud-based application

Multi-tenant and single-tenant methodologies are blended into a single solution to provide cost savings of multi-tenancy along with data security and privacy of a single-tenant environment. The cloud infrastructure is partitioned to include a first set of servers, and a second set of servers. ... International Business Machines Corporation

12/31/15 / #20150381576

Multi-tenant secure separation of data in a cloud-based application

Multi-tenant and single-tenant methodologies are blended into a single solution to provide cost savings of multi-tenancy along with data security and privacy of a single-tenant environment. The cloud infrastructure is partitioned to include a first set of servers, and a second set of servers. ... International Business Machines Corporation

12/31/15 / #20150381564

Network address identification

In a method for determining network information, in response to a computing device connecting to a computing system, the computing device identifying network information that corresponds to the computing system, wherein the computing system is configured to pass network information to the computing device while the computing system is powered on, but not logged in. The method further includes the computing device determining at least one network address for the computing system utilizing the identified network information that corresponds to the computing system. ... International Business Machines Corporation

12/31/15 / #20150381560

Logical interface encoding

A networking system, and more particularly an interface management subsystem, offers logical interface abstraction for networking system software. The networking system generally transmits data via a hardware interface. ... International Business Machines Corporation

12/31/15 / #20150381545

Providing a guest with access to content of a social network

Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the guest's email address, and providing, based on the identity assertion, access to the content posted by the user on the social network to allow the guest to view the content, in which the identity provider is identified by a domain of the guest's email address.. . ... International Business Machines Corporation

12/31/15 / #20150381532

Managing unavailability notices

A computer-implemented method, carried out by one or more processors, for managing unavailability notices. In an embodiment, the method comprises the steps of initializing an out of office notice, wherein the out of office notice is associated with a first user of an e-mail service; receiving inputs for the out of office notice, wherein the inputs include one or more of: a duration of time selection, alternative contact information, and message content; receiving a list of one or more user to whom to send an out of office alert notice with the received inputs; and sending to the one or more users from the list the out of office alert notice with the received inputs and a reminder function, wherein the reminder function allows for each of the one or more users to receive a reminder about unavailability at another time.. ... International Business Machines Corporation

12/31/15 / #20150381530

Maintenance of a fabric priority among operations in related fibre channel exchanges

Provided are a method, a system, and a computer program that use a fibre connection (ficon) protocol, in which a first device that is coupled to a second device receives an outbound exchange from the second device, wherein one or more fibre channel frames of the outbound exchange have a priority indicated by the second device. The first device responds to the second device with an inbound exchange, wherein one or more fibre channel frames of the inbound exchange have an identical priority to the priority indicated by the second device in the outbound exchange. ... International Business Machines Corporation

12/31/15 / #20150381529

Maintenance of a fabric priority among operations within a fibre channel exchange

A first device that is coupled to a second device receives a first fibre channel frame, wherein the first fibre channel frame has a priority indicated by the second device. The first device responds to the second device with a second fibre channel frame that has an identical priority to the priority indicated by the second device.. ... International Business Machines Corporation

12/31/15 / #20150381527

Supporting flexible deployment and migration of virtual servers via unique function identifiers

A management system and method that generally allocates a virtual function to a virtual function definition of a virtual server, where the virtual function definition of the virtual server is previously assigned with a unique function identifier, and assigns the unique function identifier to the virtual function in response to the allocating of the virtual function, where the unique function identifier causes a discovery of the virtual function by the virtual server.. . ... International Business Machines Corporation

12/31/15 / #20150381526

Secure metering and accounting for cloud services

Managing a service is provided. Information is collected about use of a set of resources by the service. ... International Business Machines Corporation

12/31/15 / #20150381524

Providing a guest with access to content of a social network

Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the guest's email address, and providing, based on the identity assertion, access to the content posted by the user on the social network to allow the guest to view the content, in which the identity provider is identified by a domain of the guest's email address.. . ... International Business Machines Corporation

12/31/15 / #20150381517

System and method for generating random linked data according to an rdf dataset profile

A method, computer program product, and computer system for gathering statistics, by a computing device, for a set of resources associated with a framework. A profile is generated based upon, at least in part, the gathered statistics. ... International Business Machines Corporation

12/31/15 / #20150381510

Flow control credits for priority in lossless ethernet

In one embodiment, a system includes a hardware processor and logic integrated with and/or executable by the processor. The logic is configured to classify a traffic flow into a traffic class based on at least one criteria related to the traffic flow and request that a credit manager remap flow credits corresponding to a first traffic class to flow credits corresponding to a second traffic class. ... International Business Machines Corporation

12/31/15 / #20150381499

Load balancing traffic in a mpls network

A method and system for managing traffic in a network. Label switch paths are identified. ... International Business Machines Corporation

12/31/15 / #20150381492

Dual purpose on-chip buffer memory for low latency switching

In one embodiment, an apparatus includes a buffer memory, at least one ingress port, at least one egress port, at least one processor, and logic integrated with and/or executable by the at least one processor, the logic being configured to communicate with a software-defined network (sdn) controller, store one or more look-up tables in a first portion of the buffer memory, receive a packet using an ingress port, and determine an egress port for the packet. In another embodiment, a method for switching packets in a sdn includes storing one or more took-up tables in a first portion of a buffer memory of a sdn-capable switching device, receiving a packet using an ingress port of the switching device, and determining an egress port for the packet.. ... International Business Machines Corporation

12/31/15 / #20150381491

Packet encapsulation with redirected dma for software defined networks

A method, system, and computer program product for encapsulating a packet within a virtualized network. The method includes writing one or more first translation control entries (tces) from a tce table of a client system to a tce table of a host system, and writing one or more second tces to the tce table of the host system. ... International Business Machines Corporation

12/31/15 / #20150381487

Cloud-based anonymous routing

A system and computer-implemented method for cloud-based anonymous traffic routing is disclosed. The method may include receiving, from a client application by a router, network traffic identified for a destination. ... International Business Machines Corporation

12/31/15 / #20150381485

Overlay switch

The present invention discloses an overlay switch (osw) and a method used by the same. A received unicast packet needs to pass a waypoint chain including a number of waypoints. ... International Business Machines Corporation

12/31/15 / #20150381482

Splitting and sharing routing information among several routers acting as a single border router

Routers split and share routing information among several routers within a group of routers acting as a single border router in an internet protocol (ip) network, each router comprising a routing table. A router of the group selects routes in the routing table of the router; requests other routers of the group to replace, in their routing tables, each selected route with the router as next hop; associates parts of-non selected routes, each one with another router of the group; and removes and replaces, in the routing table, each-non selected route associated with a router of the group by the associated router as next hop.. ... International Business Machines Corporation

12/31/15 / #20150381479

Mechanism for exchange of routing data between controllers

Inter-tenant and inter-openflow island software communicate in sdn networks by: (i) providing a software defined networking (sdn) network including a plurality of openflow islands, a first tenant and a second tenant; and (ii) communicating, from the first tenant over the sdn network to the second tenant, a first communication. The first communication passes through at least two openflow islands of the plurality of openflow islands as the first communication is communicated through the sdn network from the first tenant to the second tenant.. ... International Business Machines Corporation

12/31/15 / #20150381472

Abstraction layer and distribution scope for a logical switch router architecture

A tool for forwarding plane support in a distributed system. The tool receives, by one or more computer processors, one or more messages. ... International Business Machines Corporation

12/31/15 / #20150381415

Server-side protocol configuration of accessing clients

The present invention is a method, system and apparatus for configuring a client-side communications protocol stack. In a method of the invention, a mapping can be consulted to determine a set of client-side protocol stack components which correspond to a set of protocol stack components in a server side protocol stack instance. ... International Business Machines Corporation

12/31/15 / #20150381412

Transporting multi-destination networking traffic by sending repetitive unicast

In a distributed network environment, a first virtual machine sends a first virtual machine control information to a first network system. The first network system sends a first control information to a first network control system in response to receiving the first virtual machine control information. ... International Business Machines Corporation

12/31/15 / #20150381385

Packet encapsulation with redirected dma for software defined networks

A method, system, and computer program product for encapsulating a packet within a virtualized network. The method includes writing one or more first translation control entries (tces) from a tce table of a client system to a tce table of a host system, and writing one or more second tces to the tce table of the host system. ... International Business Machines Corporation

12/31/15 / #20150381379

Collaborative arbitration of polling results in a collaborative computing environment

Embodiments of the present invention address deficiencies of the art in respect to arbitrating polling results and provide a novel and non-obvious method, system and computer program product for collaborative arbitration of polling results in a collaborative environment. In an embodiment of the invention, a method for collaborative arbitration of polling results in a collaborative environment can be provided. ... International Business Machines Corporation

12/31/15 / #20150381373

Backup and invalidation of authentication credentials

A method for a re-issuance of an attribute-based credential of an issuer of the attribute-based credential for a user may be provided. The user is holding backup values derived from a first credential previously obtained from the issuer, wherein the first credential is built using at least a first value of at least one authentication pair. ... International Business Machines Corporation

12/31/15 / #20150381339

Latency-optimized physical coding sublayer

Method and apparatus for reducing latency in a networking application comprises receiving data at a physical coding sublayer (pcs) from a media access control (mac) sublayer, wherein the mac sublayer utilizes a first clock domain operating at a first clock frequency. The method further comprises performing one or more functions in the pcs on the data in the first clock domain. ... International Business Machines Corporation

12/31/15 / #20150381338

Latency-optimized physical coding sublayer

Method and apparatus for reducing latency in a networking application comprises receiving data at a physical coding sublayer (pcs) from a media access control (mac) sublayer, wherein the mac sublayer utilizes a first clock domain operating at a first clock frequency. The method further comprises performing one or more functions in the pcs on the data in the first clock domain. ... International Business Machines Corporation

12/31/15 / #20150381316

Integrated physical coding sublayer and forward error correction in networking applications

Method and apparatus for receiving data at a physical coding sublayer (pcs) transmit structure from a media access control (mac) sublayer. The method includes performing a first forward error-correcting (fec) sub-function on the data in the pcs transmit structure. ... International Business Machines Corporation

12/31/15 / #20150381312

Integrated physical coding sublayer and forward error correction in networking applications

Method and apparatus for receiving data at a physical coding sublayer (pcs) transmit structure from a media access control (mac) sublayer. The method includes performing a first forward error-correcting (fec) sub-function on the data in the pcs transmit structure. ... International Business Machines Corporation

12/31/15 / #20150380954

Wireless communication controlled battery charging station

An electronic device sends a wireless signal to a charging station indicating that charging of a battery of the electronics device is to commence. The electronic device determines whether charging of the battery is to continue. ... International Business Machines Corporation

12/31/15 / #20150380905

Photonic circuit device with reduced losses caused by electrical contact pads

A photonic circuit device can include a light-generating structure and at least two electrical contact pads. The light-generating structure can include: an n-doped semiconductor layer; a p-doped semiconductor layer; and an active gain section. ... International Business Machines Corporation

12/31/15 / #20150380813

Wireless communication device with joined semiconductors

A joined structure which is configured such that a space between adjacent substrates is filled with a filling material. The joined structure includes a first substrate having a first conductor formed on a surface of the first substrate, a second substrate having a second conductor formed on a surface of the second substrate, arranged so that a surface of the first substrate faces a surface of the second substrate, a connecting conductor which electrically connects the first conductor and the second conductor, and a filling material between the first substrate and the second substrate. ... International Business Machines Corporation

12/31/15 / #20150380597

Field-effect localized emitter photovoltaic device

Photovoltaic structures are provided with field-effect inversion/accumulation layers as emitter layers induced by work-function differences between gate conductor layers and substrates thereof. Localized contact regions are in electrical communication with the gate conductors of such structures for repelling minority carriers. ... International Business Machines Corporation

12/31/15 / #20150380587

Solar cell with reduced absorber thickness and reduced back surface recombination

Manufacture for an improved stacked-layered thin film solar cell. Solar cell has reduced absorber thickness and an improved back contact for copper indium gallium selenide solar cells. ... International Business Machines Corporation

12/31/15 / #20150380523

Thin-film ambipolar logic

An ambipolar electronic device is disclosed. The device may include a field-effect transistor (fet), which may have a handle substrate layer, two contacts and an inorganic crystalline layer between the handle substrate layer and the contacts. ... International Business Machines Corporation

12/31/15 / #20150380517

Ambipolar synaptic devices

Device architectures based on trapping and de-trapping holes or electrons and/or recombination of both types of carriers are obtained by carrier trapping either in near-interface deep ambipolar states or in quantum wells/dots, either serving as ambipolar traps in semiconductor layers or in gate dielectric/barrier layers. In either case, the potential barrier for trapping is small and retention is provided by carrier confinement in the deep trap states and/or quantum wells/dots. ... International Business Machines Corporation

12/31/15 / #20150380514

Junction overlap control in a semiconductor device using a sacrificial spacer layer

Approaches for providing junction overlap control in a semiconductor device are provided. Specifically, at least one approach includes: providing a gate over a substrate; forming a set of junction extensions in a channel region adjacent the gate; forming a set of spacer layers along each of a set of sidewalls of the gate; removing the gate between the set of spacer layers to form an opening; removing, from within the opening, an exposed sacrificial spacer layer of the set of spacer layers, the exposed sacrificial spacer layer defining a junction extension overlap linear distance from the set of sidewalls of the gate; and forming a replacement gate electrode within the opening. ... International Business Machines Corporation

12/31/15 / #20150380489

Low resistance and defect free epitaxial semiconductor material for providing merged finfets

A gate structure is formed straddling a first portion of a plurality of semiconductor fins that extend upwards from a topmost surface of an insulator layer. A dielectric spacer is formed on sidewalls of the gate structure and straddling a second portion of the plurality of semiconductor fins. ... International Business Machines Corporation

12/31/15 / #20150380488

Junction butting structure using nonuniform trench shape

The present invention relates generally to semiconductor devices and more particularly, to a structure and method of forming a partially depleted semiconductor-on-insulator (soi) junction isolation structure using a nonuniform trench shape formed by reactive ion etching (rie) and crystallographic wet etching. The nonuniform trench shape may reduce back channel leakage by providing an effective channel directly below a gate stack having a width that is less than a width of an effective back channel directly above the isolation layer.. ... International Business Machines Corporation

12/31/15 / #20150380478

Semiconductor device with metal extrusion formation

Embodiments disclose a method of fabrication and a semiconductor structure comprising a metal-insulator-metal (mim) capacitor. The method of fabrication includes depositing a first conductive material on a semiconductor substrate. ... International Business Machines Corporation

12/31/15 / #20150380440

Thin-film ambipolar logic

An ambipolar electronic device is disclosed. The device may include a field-effect transistor (fet), which may have a handle substrate layer, two contacts and an inorganic crystalline layer between the handle substrate layer and the contacts. ... International Business Machines Corporation

12/31/15 / #20150380438

Trapping dislocations in high-mobility fins below isolation layer

The present invention relates generally to semiconductor devices and more particularly, to a structure and method of forming a high-mobility fin field effect transistor (finfet) fin in a silicon semiconductor on insulator (soi) substrate by trapping crystalline lattice dislocations that occur during epitaxial growth in a recess formed in a semiconductor layer. The crystalline lattice dislocations may remain trapped below a thin isolation layer, thereby reducing device thickness and the need for high-aspect ratio etching and fin formation.. ... International Business Machines Corporation

12/31/15 / #20150380405

Removal of semiconductor growth defects

After semiconductor material portions and gate structures are formed on a substrate, a dielectric material layer is deposited on the semiconductor material portions and the gate structures. An anisotropic etch is performed on the dielectric material layer to form gate spacers, while a mask layer protects peripheral portions of the semiconductor material portions and the gate structures to avoid unwanted physical exposure of semiconductor surfaces. ... International Business Machines Corporation

12/31/15 / #20150380326

Electromigration monitor

A structure, such as a wafer, chip, ic, design structure, etc., includes a through silicon via (tsv) and an electromigration (em) monitor. The tsv extends completely through a semiconductor chip and the em monitor includes a plurality of em wires proximately arranged about the tsv perimeter. ... International Business Machines Corporation

12/31/15 / #20150380314

Low resistance and defect free epitaxial semiconductor material for providing merged finfets

A gate structure is formed straddling a first portion of a plurality of semiconductor fins that extend upwards from a topmost surface of an insulator layer. A dielectric spacer is formed on sidewalls of the gate structure and straddling a second portion of the plurality of semiconductor fins. ... International Business Machines Corporation

12/31/15 / #20150380305

Structure and method to form liner silicide with improved contact resistance and reliablity

A contact structure with improved contact resistance and reliability is provided by forming an inner spacer between a contact liner and dielectric layers laterally surrounding the contact structure. The inner spacer severs as a barrier to prevent diffusion of metals from the contact liner into the dielectric layers.. ... International Business Machines Corporation

12/31/15 / #20150380251

Block mask litho on high aspect ratio topography with minimal semiconductor material damage

A trilayer stack that can be used as a block mask for forming patterning features in semiconductor structures with high aspect ratio topography is provided. The trilayer stack includes an organic planarization (opl) layer, a titanium-containing antireflective coating (tiarc) layer on the opl layer and a photoresist layer on the tiarc layer. ... International Business Machines Corporation

12/31/15 / #20150380087

Data encoding in solid-state storage devices

Methods and apparatus 3 are provided for encoding data for storage in multilevel memory cells 2 having q cell-levels. Input data words are encoded into respective codewords, each having n symbols with one of q symbol-values, via an encoding scheme adapted such that the q symbol-values have unequal multiplicities within at least some codewords, and the multiplicity of each of the q symbol-values in every codeword is no less than μ, where μ≧2 and more preferably ≧3. ... International Business Machines Corporation

12/31/15 / #20150380079

Low power sense amplifier for static random access memory

A low power sense amplifier for an sram is described. A first pass gate transistor is driven by bit line true and a second pass gate transistor is driven by bit line complement. ... International Business Machines Corporation

12/31/15 / #20150380065

Deep sleep wakeup of multi-bank memory

A deep sleep wakeup signal is received at a first memory bank. A first gated memory array supply voltage is increased in response to the receiving the deep sleep wakeup signal at the first memory bank. ... International Business Machines Corporation

12/31/15 / #20150380033

Usage of state information from state-space based track-follow controller

A method according to one embodiment includes generating track following controller state information based on a positional signal of a head relative to a medium. One or more portions of the state information corresponding to particular frequencies are used to determine at least one of: lateral tape movement, tape skew, vibration operation conditions, and roller performance.. ... International Business Machines Corporation

12/31/15 / #20150380028

Protecting a sensitive device from corrosion

A product according to one embodiment includes a tape having an applicator portion for applying an organic coating to a magnetic head; the organic coating on the applicator portion of the tape; and a lubricant on a data portion of the tape. The lubricant has a different composition than the organic coating. ... International Business Machines Corporation

12/31/15 / #20150379768

Estimation of object properties in 3d world

Objects within two-dimensional video data are modeled by three-dimensional models as a function of object type and motion through manually calibrating a two-dimensional image to the three spatial dimensions of a three-dimensional modeling cube. Calibrated three-dimensional locations of an object in motion in the two-dimensional image field of view of a video data input are determined and used to determine a heading direction of the object as a function of the camera calibration and determined movement between the determined three-dimensional locations. ... International Business Machines Corporation

12/31/15 / #20150379729

Automatically determining field of view overlap among multiple cameras

Field of view overlap among multiple cameras are automatically determined as a function of the temporal overlap of object tracks determined within their fields-of-view. Object tracks with the highest similarity value are assigned into pairs, and portions of the assigned object track pairs having a temporally overlapping period of time are determined. ... International Business Machines Corporation

12/31/15 / #20150379689

Lens distortion correction using a neurosynaptic system

Embodiments of the invention provide a system and circuit for image distortion correction. The system includes neurosynaptic core circuits that: receive a set of inputs comprising image dimensions and pixel distortion coefficients for one or more image frames via one or more input core circuits, map each distorted pixel to zero or more undistorted pixels by processing the set of inputs corresponding to each pixel of the one or more image frames by the one or more input core circuits, and route corresponding pixel intensity values of each distorted pixel to output undistorted pixels for each image frame via one or more output core circuits.. ... International Business Machines Corporation

12/31/15 / #20150379530

Driving business traffic by predictive analysis of social media

According to a business requirement, a set of characteristics of a market is computed. The market comprises a group of potential buyers of a product. ... International Business Machines Corporation

12/31/15 / #20150379525

Developing a customer base through social networks and other sources

Methods and arrangements for identifying a potential customer base of a concern. A contemplated method includes: identifying a prospective customer of a concern, via a social media network; identifying connections of the prospective customer within the social media network; determining a subset of the connections, wherein members of the subset comprise members of the concern; determining connections of the members of the subset; determining whether the connections of the members of the subset comprise the prospective customer; and if the connections of the members of the subset comprise the prospective customer, determining contact information of the prospective customer. ... International Business Machines Corporation

12/31/15 / #20150379520

Identifying discrepancies and responsible parties in a customer support system

A mechanism is provided for improving customer satisfaction. Natural language processing (nlp) is utilized to identify information from a customer ticket that addresses a customer issue thereby forming one or more pieces of nlp identified information. ... International Business Machines Corporation

12/31/15 / #20150379452

Spatio-temporal key performance indicators

An approach is provided for providing spatio-temporal key performance indicators (st-kpis). The approach tracks metrics, such as crowd density, pertaining to a number of locations. ... International Business Machines Corporation

12/31/15 / #20150379446

Force-based assignments

A method for assigning locations to persons of a group of persons may include determining, for each person in the group, a number of communications between the person and each other person in the group. A plurality of reservations from reserving persons of the group may be received. ... International Business Machines Corporation

12/31/15 / #20150379419

Ghost-pattern analyzer

A method and associated system for identifying and eliminating illusory “ghost” patterns that lead to inaccurate predictions of an outcome of a proposed solution, plan, or decision implemented within a particular scenario or context. A processor stores descriptions of patterns that are each be inferred from an expectation that a particular proposed solution will lead to a desired objective within the context of a particular scenario. ... International Business Machines Corporation

12/31/15 / #20150379410

Method and apparatus for generating data in a missing segment of a time data sequence

A method and an apparatus for generating data in a missing segment of a target time data sequence are disclosed. The method includes: determining whether there is a breakpoint in the missing segment; determining candidate values of the data in the missing segment; and generating values of the data in the missing segment by selectively using the candidate values of the data in the missing segment, according to whether there is the breakpoint in the missing segment. ... International Business Machines Corporation

12/31/15 / #20150379399

Natural-language processing based on dna computing

A method and associated systems for using methods of dna computing to implement an operation of a natural-language processing (nlp) system. A processor translates components of a slot grammar of the nlp system and an input filler vocabulary into listings of sequences of nucleotides. ... International Business Machines Corporation

12/31/15 / #20150379398

Scalable neural hardware for the noisy-or model of bayesian networks

Embodiments of the invention relate to a scalable neural hardware for the noisy-or model of bayesian networks. One embodiment comprises a neural core circuit including a pseudo-random number generator for generating random numbers. ... International Business Machines Corporation

12/31/15 / #20150379396

Providing transposable access to a synapse array using a recursive array layout

Embodiments of the invention relate to providing transposable access to a synapse array using a recursive array layout. One embodiment comprises maintaining synaptic weights for multiple synapses connecting multiple axons and multiple neurons, wherein the synaptic weights are maintained based on a recursive array layout. ... International Business Machines Corporation

12/31/15 / #20150379393

Multiplexing physical neurons to optimize power and area

Embodiments of the invention relate to a multiplexed neural core circuit. One embodiment comprises a core circuit including a memory device that maintains neuronal attributes for multiple neurons. ... International Business Machines Corporation

12/31/15 / #20150379367

Mobile device field of view region determination

A method and system for determining a field of view region on a mobile device display is provided. The method includes receiving by a mobile device from a user facing camera of the mobile device, an image of a user currently using the mobile device. ... International Business Machines Corporation

12/31/15 / #20150379357

Efficient retrieval of anomalous events with priority learning

Local models learned from anomaly detection are used to rank detected anomalies. The local models include image feature values extracted from an image field of video image data with respect to different predefined spatial and temporal local units, wherein anomaly results are determined by failures to fit to applied anomaly detection module local models. ... International Business Machines Corporation

12/31/15 / #20150379344

Geographical area condition determination

A method and system for mapping the conditions of locations is provided. The method includes retrieving image data associated with a plurality of locations within a specified geographical area. ... International Business Machines Corporation

12/31/15 / #20150379288

Secure access to running client application features from a browser application

A secure access is provided to a plurality of software application features associated with a plurality of software applications running on a user's device, wherein the secure access is provided from a web browser application associated with the user's device. This may include providing an open connection between a server and at least one software application within the plurality of software running on the user's device. ... International Business Machines Corporation

12/31/15 / #20150379187

Ranking combinations of mutants, test cases and random seeds in mutation testing

A method and apparatus for ranking combinations of mutants, test cases and random seeds in mutation testing, comprising obtaining, based on a signal of a test case target, logic gates related to the signal of the test case target and mutants on the related logic gates, for a compiled integrated circuit under test; calculating distances between the mutants and the signal of the test case target; performing a circuit simulation on the compiled integrated circuit under test to obtain activation cycle numbers corresponding to combinations of the mutants, test cases and random seeds; obtaining activation cycle number variances corresponding to combinations of the mutants and the test cases; and ranking the combinations of the mutants, the test cases and the random seeds based on the distances, the activation cycle numbers and the activation cycle number variances. The invention can reduce the probability that the mutation simulation selects equivalent mutants.. ... International Business Machines Corporation

12/31/15 / #20150379170

Modelling and planning population movement scenarios

In an approach to modelling population movement scenarios, one or more computer processors receive at least one credential of a user. The one or more computer processors determine, based, at least in part, on the received at least one credential, at least one context of a first population movement scenario, wherein the at least one context provides scenario-specific information for the first population movement scenario. ... International Business Machines Corporation

12/31/15 / #20150379159

System and method for generating random linked data according to an rdf dataset profile

A method, computer program product, and computer system for gathering statistics, by a computing device, for a set of resources associated with a framework. A profile is generated based upon, at least in part, the gathered statistics. ... International Business Machines Corporation

12/31/15 / #20150379156

Web pages processing

The present invention provides a method and apparatus for processing a web page. The method comprises: identifying a plurality of source data schema elements of the web page; determining an attribute similarity between one source data schema element among the plurality of source data schema elements and one target data schema element among a plurality of target data schema elements based on attributes of the data schema elements; and mapping the source data schema element to the target data schema element for generating a target web page in response to the attribute similarity being higher than a predetermined threshold. ... International Business Machines Corporation

12/31/15 / #20150379151

Managing object identifiers

A method, system, and computer program product for managing an object related to a plurality of groups of users is disclosed. The method, system, and computer program product include utilizing identifiers of objects so that a requesting user can submit an object-request for access to the object utilizing a chosen identifier of the user. ... International Business Machines Corporation

12/31/15 / #20150379149

Facilitating navigation of a webpage on a computer device

A method of webpage navigation can include a computer device loading a webpage having at least a first portion and a second portion, arranging the webpage in order to present the first portion in the display area of the computer device and to place the second portion out of the display area, and presenting a navigation map corresponding to the webpage in the display area. In response to a control command input with respect to the navigation map, the webpage can be arranged in order to present the second portion in the display area.. ... International Business Machines Corporation

12/31/15 / #20150379121

Complex service network ranking and clustering

Offline functionality-based co-ranking and clustering is carried out on a knowledge base that characterizes a heterogeneous information technology services network including a plurality of services, a plurality of providers, and a plurality of attributes. Results of the functionality-based co-ranking and clustering are stored as annotations of the services and the providers in the knowledge base, to obtain an annotated knowledge base. ... International Business Machines Corporation

12/31/15 / #20150379120

Prompting subject matter experts for additional detail based on historical answer ratings

An approach is provided for evaluating a potential post based on historical data. In the approach, historically highly rated attributes that to previously received highly rated posts are identified. ... International Business Machines Corporation

12/31/15 / #20150379119

Performing predicate evaluation on compressed character string of variable length

Methods, devices and computer program products for performing predicate evaluation on a compressed variable length character string are disclosed. Aspects include determining upper and lower boundaries of a false positive range for a predicate, the false positive range for the predicate being a range in which a result of the predicate evaluation may lead to a false positive error. ... International Business Machines Corporation

12/31/15 / #20150379106

Fast snapshots

A fast snapshot is configured to determine if a snapshot is utilized for asynchronous mirroring. The fast snapshot operation is performed by avoiding reference counts of the one or more data units associated with the snapshot from being updated at a creation time and a deletion time when the snapshot is utilized for asynchronous mirroring.. ... International Business Machines Corporation

12/31/15 / #20150379090

Mining product aspects from opinion text

A text stream having one or more sentences is received, and any number of the one or more sentences are parsed to determine corresponding subject-verb-object (svo) triples. Each sentence whose corresponding svo triple contains an identified verb is selected, based on the identified verb, or a lemma of the identified verb, matching a predefined verb. ... International Business Machines Corporation

12/31/15 / #20150379082

Supporting imperative graphic queries on a relational database

It is provided a method and system for supporting imperative graphic queries on a relational database, the method comprising: parsing an imperative graphic query into operations of execution plans; translating operations of execution plans which are supported by the relational database into common table expression queries; and executing the translated common table expression queries on the relational database.. . ... International Business Machines Corporation

12/31/15 / #20150379075

Maintaining diversity in multiple objective function solution optimization

A computer performs searching in order to optimize a plurality of input parameters. Each of the input parameters is input to a time-series trial process. ... International Business Machines Corporation

12/31/15 / #20150379069

Data subscription management system

A method includes a digital subscription management system (dsms) receiving from a source system a request to perform an edit of at least one data object, the dsms sending a request for response (rfr) to subscribing systems having a copy of the at least one data object, the dsms receiving a response from the subscribing systems, and the dsms performing the edit.. . ... International Business Machines Corporation

12/31/15 / #20150379068

Table boundary detection in data blocks for compression

Data is converted into a minimized data representation using a suffix tree by sorting data streams according to symbolic representations for building table boundary formation patterns. The converted data is fully reversible for reconstruction while retaining minimal header information. ... International Business Machines Corporation

12/31/15 / #20150379067

Maintaining a data structure with data set names and pointers to a plurality of catalogs

A plurality of catalogs are maintained, and wherein each catalog of the plurality of catalogs includes data sets and attributes of the data sets. An indication that a new data set is to be defined is received. ... International Business Machines Corporation

12/31/15 / #20150379053

Managing database object placement on multiple storage devices

A method, information processing system, and computer program storage product optimize the placement of database objects on a multiplicity of storage devices. A set of database objects are placed on a first storage device in a multiplicity of storage devices. ... International Business Machines Corporation

12/31/15 / #20150379052

Parallel matching of hierarchical records

Identifying matching transactions between two log files. First and second log files contain operation records of transactions in a transaction workload. ... International Business Machines Corporation

12/31/15 / #20150379049

Generating data format description language schema

An annotation retrieval module may be configured to retrieve annotations added to sample data, the annotations having been added according to an annotation rule. An analysis tool may be configured to create a logical schema and a configuration file from the retrieved annotations, according to the annotation rule. ... International Business Machines Corporation

12/31/15 / #20150379044

Techniques for generating a representative image and radiographic interpretation information for a case

A technique for generating a representative image representing a case and radiographic interpretation information for each case includes calculating wavelet features of a plurality of images that have been taken and stored in the past. The calculated wavelet features and extracted keywords are stored in association with the stored images. ... International Business Machines Corporation

12/31/15 / #20150379035

On-demand caching in a wan separated distributed file system or clustered file system cache

A mechanism is provided in a data processing system for on-demand caching in a wide area network (wan) separated distributed file system or clustered file system. The mechanism monitors file access by a plurality of cache sites in the wan separated distributed file system or clustered file system. ... International Business Machines Corporation

12/31/15 / #20150379034

Determining characteristics of configuration files

Determining a characteristic of a configuration file that is used to discover configuration files in a target machine, a computer identifies, using information associated with a configuration item of a machine, a candidate configuration file related to the configuration item of the machine, from among a plurality of files from the machine. The computer extracts a value of a feature of the candidate configuration file and aggregates the candidate configuration file with a second candidate configuration file related to the same configuration item identified from among a plurality of files from a second machine, based on the extracted value. ... International Business Machines Corporation

12/31/15 / #20150379033

Parallel matching of hierarchical records

Identifying matching transactions between two log files. First and second log files contain operation records of transactions in a transaction workload. ... International Business Machines Corporation

12/31/15 / #20150379032

Augmented directory hash for efficient file system operations and data management

Embodiments relate to scheduling operations to perform on objects. A method for scheduling operations to perform on objects is provided. ... International Business Machines Corporation

12/31/15 / #20150379031

Identifying content under access control

A search query is received from a first user through one or more input devices. A set of results is determined from content stored on a computer system based on the search query. ... International Business Machines Corporation

12/31/15 / #20150379025

Dynamic asset assembly using a rule based methodology

In an approach for creating an asset, a computer receives a selection of at least one asset element and determines whether one or more asset elements are associated with the selected asset element. In response to determining one or more asset elements are associated with the selected asset element, the computer determines, based, at least in part, on one or more linkage rules, whether one or more of the associated asset elements are in the asset. ... International Business Machines Corporation

12/31/15 / #20150379024

File storage processing in hdfs

A method and system for processing file storage is provided. The method includes receiving a file storage request and determining a file size of a file which is requested to be stored. ... International Business Machines Corporation

12/31/15 / #20150379010

Dynamic concept based query expansion

An approach is provided expand queries processed by a question/answer (qa) system. In the approach, concepts are extracted from documents using natural language processing to identify the concepts included in passages found in the documents. ... International Business Machines Corporation

12/31/15 / #20150379008

Maximizing the information content of system logs

In a method for maximizing information content of logs, a log message from an executing software program is received. The log message includes a timestamp, a source code location id, a session id, and a log message text. ... International Business Machines Corporation

12/31/15 / #20150378994

Self-documentation for representational state transfer (rest) application programming interface (api)

In an approach for documenting a representational state transfer (rest) resource. A processor monitors input javascript object notation (json) data and output json data of a rest resource of an application. ... International Business Machines Corporation

12/31/15 / #20150378990

Measuring linguistic markers and linguistic noise of a machine-human translation supply chain

An approach is provided in which a linguistic analyzer engine generates a leverage value of a language translation supply chain that corresponds to an amount of suggested translations that are accepted by a professional linguist. The linguistic analyzer engine generates a factor value of the language translation supply chain that indicates a productivity of the user to convert the set of accepted translation into a set of final translations. ... International Business Machines Corporation

12/31/15 / #20150378984

Augmenting semantic models based on morphological rules

A computer processor determines a root of a first element of a semantic model, in which a first relationship of the first element to a second element of the semantic model, is unknown. The computer processor generates a search token, based on applying morphological rules to the root of the first element and appending a preposition. ... International Business Machines Corporation

12/31/15 / #20150378980

Database management system based on a spreadsheet concept deployed in an object grid

A method for interacting with a database stored in an object grid is described. The database is given attributes of a spreadsheet. ... International Business Machines Corporation

12/31/15 / #20150378979

Stream-enabled spreadsheet as a circuit

Converting data transformations entered in a spreadsheet program into a circuit representation of those transformations. The circuit representation can run independently of the spreadsheet program to transform input data into output data. ... International Business Machines Corporation

12/31/15 / #20150378971

Automated document revision markup and change control

Automated comparison of darwin information typing architecture (dita) documents for revision mark-up includes reading document data from first and second dita documents into respective document object model trees of nodes, and identifying and collapsing emphasis subtree nodes in the trees into their parent nodes, the collapsing caching emphasis data from the identified subtree nodes. A traversal transforms the model trees into respective node lists and captures adjacent sibling emphasis subtree nodes as single text nodes. ... International Business Machines Corporation

12/31/15 / #20150378945

Evading floating interruption while in the transactional-execution mode

A computer implemented method and system for evading a floating interruption while a processor is in a transactional-execution (tx) mode. A floating interruption request can be detected, by a floating interrupt control mechanism, for a plurality of processors for execution by any one of the plurality of processors. ... International Business Machines Corporation

12/31/15 / #20150378943

Delaying floating interruption while in tx mode

A computer implemented method and system for delaying a floating interruption while a processor is in a transactional-execution mode. A floating interruption mechanism can detect a floating interruption request for one or more floating interruption eligible processors. ... International Business Machines Corporation

12/31/15 / #20150378942

Transactional execution enabled supervisor call interruption while in tx mode

A computer can manage an interruption while a processor is executing a transaction in a transactional-execution (tx) mode. Execution, in a program context, of the transaction is begun by a processor in tx mode. ... International Business Machines Corporation

12/31/15 / #20150378940

Transactional execution enabled supervisor call interruption while in tx mode

A computer can manage an interruption while a processor is executing a transaction in a transactional-execution (tx) mode. Execution, in a program context, of the transaction is begun by a processor in tx mode. ... International Business Machines Corporation

12/31/15 / #20150378929

Synchronous and ansynchronous discard scans based on the type of cache memory

A computational device maintains a first type of cache and a second type of cache. The computational device receives a command from the host to release space. ... International Business Machines Corporation

12/31/15 / #20150378928

Managing read tags in a transactional memory

Managing cache evictions during transactional execution of a process. Based on initiating transactional execution of a memory data accessing instruction, memory data is fetched from a memory location, the memory data to be loaded as a new line into a cache entry of the cache. ... International Business Machines Corporation

12/31/15 / #20150378927

Allowing non-cacheable loads within a transaction

A computer allows non-cacheable loads or stores in a hardware transactional memory environment. Transactional loads or stores, by a processor, are monitored in a cache for tx conflicts. ... International Business Machines Corporation

12/31/15 / #20150378926

Transactional execution in a multi-processor environment that monitors memory conflicts in a shared cache

A higher level shared cache of a hierarchical cache of a multi-processor system utilizes transaction identifiers to manage memory conflicts in corresponding transactions. The higher level cache is shared with two or more processors. ... International Business Machines Corporation

12/31/15 / #20150378924

Evicting cached stores

A tool for determining eviction of store cache entries based on store pressure. The tool determines, by one or more computer processors, a count value for one or more new store cache entry allocations. ... International Business Machines Corporation

12/31/15 / #20150378922

Collecting memory operand access characteristics during transactional execution

A transactional execution of a set of instructions in a transaction of a program may be initiated to collect memory operand access characteristics of a set of instructions of a transaction during the transactional execution. The memory operand access characteristics may be stored upon a termination of the transactional execution of the set of instructions. ... International Business Machines Corporation

12/31/15 / #20150378918

Prefetching of discontiguous storage locations as part of transactional execution

Transactional execution of a transaction beginning instruction initiates prefetching, by a cpu, of discontiguous storage locations specified by a list. The list includes entries specifying addresses and may also include corresponding metadata. ... International Business Machines Corporation

12/31/15 / #20150378917

Prefetching of discontiguous storage locations in anticipation of transactional execution

Discontiguous storage locations are prefetched by a prefetch instruction. Addresses of the discontiguous storage locations are provided by a list directly or indirectly specified by a parameter of the prefetch instruction, along with metadata and information about the list entries. ... International Business Machines Corporation

12/31/15 / #20150378916

Mitigating busy time in a high performance cache

Various embodiments mitigate busy time in a hierarchical store-through memory cache structure including a cache directory associated with a memory cache. The cache directory is divided into a plurality of portions each associated with a portion of memory cache. ... International Business Machines Corporation

12/31/15 / #20150378915

Memory performance when speculation control is enabled, and instruction therefor

Throttling execution in a transaction operating in a processor configured to execute memory instructions out-of-program-order in a pipelined processor, wherein memory instructions are instructions for accessing operands in memory. Included is executing instructions of a transaction. ... International Business Machines Corporation

12/31/15 / #20150378912

Speculation control for improving transaction success rate, and instruction therefor

Throttling instruction execution in a transaction operating in a processor configured to execute memory instructions out-of-order in a pipelined processor, wherein memory instructions are instructions for accessing operands in memory is provided. Included is executing, by the processor, instructions of a transaction comprising determining whether the transaction is in throttling mode and based on the transaction being in throttling mode, executing memory instructions in-program-order. ... International Business Machines Corporation

12/31/15 / #20150378911

Allowing non-cacheable loads within a transaction

A computer allows non-cacheable loads or stores in a hardware transactional memory environment. Transactional loads or stores, by a processor, are monitored in a cache for tx conflicts. ... International Business Machines Corporation

12/31/15 / #20150378910

Transactional execution in a multi-processor environment that monitors memory conflicts in a shared cache

A higher level shared cache of a hierarchical cache of a multi-processor system utilizes transaction identifiers to manage memory conflicts in corresponding transactions. The higher level cache is shared with two or more processors. ... International Business Machines Corporation

12/31/15 / #20150378909

Performing staging or destaging based on the number of waiting discard scans

A controller receives a request to perform staging or destaging operations with respect to an area of a cache. A determination is made as to whether more than a threshold number of discard scans are waiting to be performed. ... International Business Machines Corporation

12/31/15 / #20150378908

Allocating read blocks to a thread in a transaction using user specified logical addresses

A processor in a multi-processor configuration is configured to execute an instruction that specifies a virtual address range to be monitored to protect reads in a transaction. The processor translates the virtual address range to a series of real pages. ... International Business Machines Corporation

12/31/15 / #20150378907

Dynamic predictor for coalescing memory transactions

A transactional memory system predicts the outcome of coalescing outermost memory transactions, the coalescing causing committing of memory store data to memory for a first transaction to be done at transaction execution (tx) end of a second transaction, the method comprising. A processor of the transactional memory system determines whether a first plurality of outermost transactions from an associated program that were coalesced experienced an abort, the first plurality of outermost transactions including a first instance of a first transaction. ... International Business Machines Corporation

12/31/15 / #20150378906

Conditional inclusion of data in a transactional memory read set

Determining, by a processor having a cache, if data in the cache is to be monitored for cache coherency conflicts in a transactional memory (tm) environment. A processor executes a tm transaction, that includes the following. ... International Business Machines Corporation

12/31/15 / #20150378905

Co-processor memory accesses in a transactional memory

Monitoring, by a processor having a cache, addresses accessed by a co-processor associated with the processor during transactional execution of a transaction by the processor. The processor executes a transactional memory (tm) transaction, including receiving, by the processor, a memory address range of data that a co-processor may access to perform a co-processor operation. ... International Business Machines Corporation

12/31/15 / #20150378904

Allocating read blocks to a thread in a transaction using user specified logical addresses

A processor in a multi-processor configuration is configured to execute an instruction that specifies a virtual address range to be monitored to protect reads in a transaction. The processor translates the virtual address range to a series of real pages. ... International Business Machines Corporation

12/31/15 / #20150378903

Co-processor memory accesses in a transactional memory

Monitoring, by a processor having a cache, addresses accessed by a co-processor associated with the processor during transactional execution of a transaction by the processor. The processor executes a transactional memory (tm) transaction, including receiving, by the processor, a memory address range of data that a co-processor may access to perform a co-processor operation. ... International Business Machines Corporation

12/31/15 / #20150378902

Conditional inclusion of data in a transactional memory read set

Determining, by a processor having a cache, if data in the cache is to be monitored for cache coherency conflicts in a transactional memory (tm) environment. A processor executes a tm transaction, that includes the following. ... International Business Machines Corporation

12/31/15 / #20150378901

Co-processor memory accesses in a transactional memory

Buffering a memory operand from a co-processor associated with a processor as a speculative store in a store accumulator of the processor, the processor including a cache and the store accumulator, the store accumulator buffering memory operands for writing to a higher level cache. Executing a transactional memory transaction, including the following. ... International Business Machines Corporation

12/31/15 / #20150378900

Co-processor memory accesses in a transactional memory

Buffering a memory operand from a co-processor associated with a processor as a speculative store in a store accumulator of the processor, the processor including a cache and the store accumulator, the store accumulator buffering memory operands for writing to a higher level cache. Executing a transactional memory transaction, including the following. ... International Business Machines Corporation

12/31/15 / #20150378899

Transactional execution processor having a co-processor accelerator, both sharing a higher level cache

A higher level shared cache of a hierarchical cache of a multi-processor system utilizes transaction identifiers to manage memory conflicts in corresponding transactions. The higher level cache is shared with two or more processors. ... International Business Machines Corporation

12/31/15 / #20150378898

Transactional execution processor having a co-processor accelerator, both sharing a higher level cache

A higher level shared cache of a hierarchical cache of a multi-processor system utilizes transaction identifiers to manage memory conflicts in corresponding transactions. The higher level cache is shared with two or more processors. ... International Business Machines Corporation

12/31/15 / #20150378897

Speculation control for improving transaction success rate, and instruction therefor

Throttling instruction execution in a transaction operating in a processor configured to execute memory instructions out-of-order in a pipelined processor, wherein memory instructions are instructions for accessing operands in memory is provided. Included is executing, by the processor, instructions of a transaction comprising determining whether the transaction is in throttling mode and based on the transaction being in throttling mode, executing memory instructions in-program-order. ... International Business Machines Corporation

12/31/15 / #20150378896

Collecting memory operand access characteristics during transactional execution

A transactional execution of a set of instructions in a transaction of a program may be initiated to collect memory operand access characteristics of a set of instructions of a transaction during the transactional execution. The memory operand access characteristics may be stored upon a termination of the transactional execution of the set of instructions. ... International Business Machines Corporation

12/31/15 / #20150378895

Detecting cache conflicts by utilizing logical address comparisons in a transactional memory

A processor in a multi-processor configuration is configured perform dynamic address translation from logical addresses to real address and to detect memory conflicts for shared logical memory in transactional memory based on logical (virtual) addresses comparisons.. . ... International Business Machines Corporation

12/31/15 / #20150378891

Managing read tags in a transactional memory

Managing cache evictions during transactional execution of a process. Based on initiating transactional execution of a memory data accessing instruction, memory data is fetched from a memory location, the memory data to be loaded as a new line into a cache entry of the cache. ... International Business Machines Corporation

12/31/15 / #20150378867

Detecting the use of stale data values due to weak consistency

An apparatus and method detect the use of stale data values due to weak consistency between parallel threads on a computer system. A consistency error detection mechanism uses object code injection to build a consistency error detection table during the operation of an application. ... International Business Machines Corporation

12/31/15 / #20150378866

System and method to classify automated code inspection services defect output for defect analysis

A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive a tool error output determined by a code inspection tool and select at least one defect classification mapping profile based on the code inspection tool. ... International Business Machines Corporation

12/31/15 / #20150378854

Maintaining inactive copy relationships for secondary storages of active copy relationships having a common primary storage for use in case of a failure of the common primary storage

Provided are a computer program product, system, and method for maintaining inactive copy relationships for secondary storages of active copy relationships having a common primary storage for use in case of a failure of the common primary storage. A plurality of active copy relationships are established, each having a common primary storage and one of a plurality of secondary storages. ... International Business Machines Corporation

12/31/15 / #20150378849

Method and device for backing up, restoring a virtual machine

A method for backing up or restoring a virtual machine is provided. The backup method includes creating a virtual machine having a first and a second union file system directory. ... International Business Machines Corporation

12/31/15 / #20150378838

Data backup or restore using main memory and non-volatile storage media

The invention relates to a computer implemented method for creating a backup of data by a computer system. The creation of the backup comprises: assigning a first memory space in a main memory to data and loading the data into the first memory space; allocating a second memory space in the main memory for acting as container of one or more images of the data in the first memory space; creating the one or more images of the data in the first memory space; and storing the created one or more images in the second memory space and storing a respective copy of at least one of the one or more images in the one or more non-volatile storage media.. ... International Business Machines Corporation

12/31/15 / #20150378836

Data backup recovery

A mechanism is provided for recovering a data backup comprising a data image and a point-in-time copy of the data image. A virtual data image storage device is provide for storing a copy of the data image, and a virtual snapshot storage device is provided for storing data of the point-in-time copy. ... International Business Machines Corporation

12/31/15 / #20150378835

Managing data storage system

In one embodiment, a method for managing a data storage system includes: in response to receiving a data object, sorting data records in the data object on the basis of a first query so as to form a first backup; causing the first backup to be stored in the data storage system; and cause to be stored, in an index of the data storage system, the first query and a first address of the first backup in the data storage system.. . ... International Business Machines Corporation

12/31/15 / #20150378832

Performing a remote point-in-time copy to a source and target storages in further mirror copy relationships

Provided are a computer program product, system, and method for performing a remote point-in-time copy to a source and target storages in further mirror copy relationships. Each of a plurality of source copy relationships is from the source storage to one corresponding source copy storage. ... International Business Machines Corporation

12/31/15 / #20150378830

Use of replicated copies to improve database backup performance

A backup computing device detects an interruption while receiving a backup copy of a transaction log of a primary database and directs a secondary computing device to continue generation of the backup copy of the transaction log, based on the copy of the transaction log of the primary database. A primary computing device directs a secondary computing device to generate a backup copy of the data file and the primary computing device generates a backup copy of the transaction log, of a primary database. ... International Business Machines Corporation

12/31/15 / #20150378829

Resource pre-configuration

In an embodiment, a method of resource pre-configuration includes obtaining, at a target system, configuration information about a resource that is predicted to be used by a transaction which will be executed on the target system. The resource is configured, at the target system, based on the configuration information. ... International Business Machines Corporation

12/31/15 / #20150378819

Memory system with variable length page stripes including data protection information

Methods and apparatuses for enhanced protection of data stored in a non-volatile memory system involve a controller capable of adapting to the failure of one or more non-volatile memory devices in the memory system. The controller stores data in the form of page stripes, each page stripe composed of data pages, and each data page stored in a different non-volatile memory device. ... International Business Machines Corporation

12/31/15 / #20150378811

Detecting the use of stale data values due to weak consistency

An apparatus and method detect the use of stale data values due to weak consistency between parallel threads on a computer system. A consistency error detection mechanism uses object code injection to build a consistency error detection table during the operation of an application. ... International Business Machines Corporation

12/31/15 / #20150378807

Predicting process failures using analytics

A set of data records chronicles attributes of a component in a process over a time period. The time period includes a failure event associated with the component. ... International Business Machines Corporation

12/31/15 / #20150378793

Memory performance when speculation control is enabled, and instruction therefor

Throttling execution in a transaction operating in a processor configured to execute memory instructions out-of-program-order in a pipelined processor, wherein memory instructions are instructions for accessing operands in memory. Included is executing instructions of a transaction. ... International Business Machines Corporation

12/31/15 / #20150378792

Deferral instruction for managing transactional aborts in transactional memory computing environments

A deferral instruction associated with a transaction is executed in a transaction execution computing environment with transactional memory. Based on executing the deferral instruction, a processor sets a defer-state indicating that pending disruptive events such as interrupts or conflicting memory accesses are to be deferred. ... International Business Machines Corporation

12/31/15 / #20150378791

Detecting deadlocks involving inter-processor interrupts

Creating, maintaining and using a lock dependency graph in a way that includes the following steps: (i) acquiring a first restriction on processor access in a multi-processor computer system; (ii) modeling the first restriction as first locking primitive information; and (iii) storing data corresponding to the first locking primitive information in a lock dependency graph. The first restriction on processor access is one of the following two types: (i) disabling the interrupts on a given processor; and/or (ii) sending inter-processor interrupts with synchronous waiting from one processor to another (including itself).. ... International Business Machines Corporation

12/31/15 / #20150378784

Work flow level job input/output

Work flows consist of the following steps: (i) receiving a work flow data set that defines a work flow which includes a plurality of work items; and (ii) defining, a centralized and pattern-based work flow level job input/output (i/o) characteristic set that includes at least i/o settings for work items included in the work flow.. . ... International Business Machines Corporation

12/31/15 / #20150378781

Prefetching of discontiguous storage locations as part of transactional execution

Transactional execution of a transaction beginning instruction initiates prefetching, by a cpu, of discontiguous storage locations specified by a list. The list includes entries specifying addresses and may also include corresponding metadata. ... International Business Machines Corporation

12/31/15 / #20150378780

Prefetching of discontiguous storage locations in anticipation of transactional execution

Discontiguous storage locations are prefetched by a prefetch instruction. Addresses of the discontiguous storage locations are provided by a list directly or indirectly specified by a parameter of the prefetch instruction, along with metadata and information about the list entries. ... International Business Machines Corporation

12/31/15 / #20150378779

Collecting transactional execution characteristics during transactional execution

Execution of a transaction may be initiated by a cpu in a transactional execution (tx) environment. A set of tx performance characteristics of the transaction during the transactional execution may be collected and stored in a location specified by an instruction of the transaction when the transactional execution ends or aborts.. ... International Business Machines Corporation

12/31/15 / #20150378777

Transactional memory operations with read-only atomicity

Execution of a transaction mode setting instruction causes a computer processor to be in an atomic read-only mode ignoring conflicts to certain write-sets of a transaction during transactional execution. Read-set conflicts may still cause a transactional abort. ... International Business Machines Corporation

12/31/15 / #20150378772

Supporting flexible deployment and migration of virtual servers via unique function identifiers

A management system and method that generally allocates a virtual function to a virtual function definition of a virtual server, where the virtual function definition of the virtual server is previously assigned with a unique function identifier, and assigns the unique function identifier to the virtual function in response to the allocating of the virtual function, where the unique function identifier causes a discovery of the virtual function by the virtual server.. . ... International Business Machines Corporation

12/31/15 / #20150378770

Virtual machine backup

A virtual machine backup method includes utilizing a log to indicate updates to memory of a virtual machine when the updates are evicted from a cache of the virtual machine. A guard band is determined that indicates a threshold amount of free space for the log. ... International Business Machines Corporation

12/31/15 / #20150378757

Optimizing software code

A method of optimizing software source code, where the source code is for execution as compiled bytecode using a just-in-time compiler. The source code is compiled to generate corresponding compiled bytecode. ... International Business Machines Corporation

12/31/15 / #20150378755

Affinity of virtual processor dispatching

In an embodiment, a request is received for a first partition to execute on a first virtual processor. If the first physical processor is available at a first node, the first virtual processor is dispatched to execute at the first physical processor at the first node that is the home node of the first virtual processor. ... International Business Machines Corporation

12/31/15 / #20150378752

Correlating class loader objects across execution environments

Updating a native class pointer in persisted compiled code for use in an execution environment other than the one in which the native class pointer was created. This is done by using an identifier, stored with the persisted compiled code, of the class first loaded by the class loader that also loaded the class to which the native class pointer refers. ... International Business Machines Corporation

12/31/15 / #20150378751

Managing change in an information technology environment

In a method for managing change in an information technology (it) environment, in response to an open change ticket, identifying one or more components of the it environment that are associated with at least one change operation included in the change ticket. The method further includes identifying information associated with the identified one or more components of the it environment. ... International Business Machines Corporation

12/31/15 / #20150378746

Self-healing using an alternate boot partition

Methods, apparatus and computer program products implement embodiments of the present invention that enable a computer system comprising networked computers to self-heal from a boot failure of one of the computers. In some embodiments, upon detecting a first computer failing to successfully load a first boot image, a second computer configures the first computer to boot a second boot image. ... International Business Machines Corporation

12/31/15 / #20150378744

Booting a computer from a user trusted device with an operating system loader stored thereon

In an approach to allowing a computer to boot from a user trusted device (utd), the computer comprises a data storage device storing operating system (os) services, and a version of an os loader. The utd is connectable to the computer and stores a boot loader, detectable by a firmware executing at the computer, and an os loader, and wherein the utd prevents an unauthenticated user to modify the boot loader and the os loader stored thereon. ... International Business Machines Corporation

12/31/15 / #20150378739

Accurate tracking of transactional read and write sets with speculation

Improving the tracking of read sets and write sets associated with cache lines of a transaction in a pipelined processor executing memory instructions having the read sets and write sets associated with the cache lines is provided. Included is active read set and write set cache indicators associated with the memory operation of executing memory instructions and associated with a recovery pool based on memory instructions being not-speculative are updated when the memory instruction is not-newer in program order than an un-resolved branch instruction. ... International Business Machines Corporation

12/31/15 / #20150378738

Accurate tracking of transactional read and write sets with speculation

Improving the tracking of read sets and write sets associated with cache lines of a transaction in a pipelined processor executing memory instructions having the read sets and write sets associated with the cache lines is provided. Included is active read set and write set cache indicators associated with the memory operation of executing memory instructions and associated with a recovery pool based on memory instructions being not-speculative are updated when the memory instruction is not-newer in program order than an un-resolved branch instruction. ... International Business Machines Corporation

12/31/15 / #20150378735

Latent modification instruction for transactional execution

An instruction stream includes a transactional code region. The transactional code region includes a latent modification instruction (lmi), a next sequential instruction (nsi) following the lmi, and a set of target instructions following the nsi in program order. ... International Business Machines Corporation

12/31/15 / #20150378732

Latent modification instruction for transactional execution

An instruction stream includes a transactional code region. The transactional code region includes a latent modification instruction (lmi), a next sequential instruction (nsi) following the lmi, and a set of target instructions following the nsi in program order. ... International Business Machines Corporation

12/31/15 / #20150378729

Collecting transactional execution characteristics during transactional execution

Execution of a transaction may be initiated by a cpu in a transactional execution (tx) environment. A set of tx performance characteristics of the transaction during the transactional execution may be collected and stored in a location specified by an instruction of the transaction when the transactional execution ends or aborts.. ... International Business Machines Corporation

12/31/15 / #20150378728

Branch synthetic generation across multiple microarchitecture generations

Branch sequences for branch prediction performance test are generated by performing the following steps: (i) generating a branch node graph, by a branch node graph generator machine logic set, based, at least in part, upon a set of branch traces of a workload or benchmark code; (ii) generating a first assembly pattern file, for use with a first instruction set architecture (isa)/microarchitecture set, by an assembly pattern generator machine logic set, based, at least in part, upon the branch node graph so as to mimic the control-flow pattern of the workload or benchmark code; and (iii) running the assembly pattern file on the first isa/microarchitecture set to obtain first execution results.. . ... International Business Machines Corporation

12/31/15 / #20150378727

Conditional branch instruction compaction for regional code size reduction

In an approach for decreasing an execution time of a computer code, one or more processors receive a computer code and identify a frequently executed region of the computer code. One or more processors identify a long-form conditional branch in the frequently executed region of the computer code that is infrequently taken. ... International Business Machines Corporation

12/31/15 / #20150378709

Installation of software applications on mobile devices based on positions thereof

A solution for installing software applications on a mobile computing device is proposed. A corresponding method comprises monitoring a position of the mobile computing device, selecting one or more software applications available to be installed on the mobile computing device according to the position of the mobile computing device, and installing the selected software applications in a container of the mobile computing device providing an execution environment for the selected software applications with controlled access to one or more resources of the mobile computing device.. ... International Business Machines Corporation

12/31/15 / #20150378698

Integrated compilation modes for data flow code generation

Aspects of the present invention provide a solution for compiling data in a plurality of modes. In an embodiment, at least one optimal mode is specified for each of a set of program language constructs and each of a set of language primitives in a first language. ... International Business Machines Corporation

12/31/15 / #20150378696

Hybrid parallelization strategies for machine learning programs on top of mapreduce

Hybrid parallelization strategies for machine learning programs on top of mapreduce are provided. In one embodiment, a method of and computer program product for parallel execution of machine learning programs are provided. ... International Business Machines Corporation

12/31/15 / #20150378695

Replacing annotated program code in a networked computing environment

An approach for replacing one program code library (or method(s) thereof) with another program code library (or method(s) thereof) during execution is provided. Specifically, an annotation (e.g., comprising a runtime optimization request and associated performance/measurement criteria) within a program code file will be detected, analyzed, and used to monitor/assess the performance of a running set of methods of the program code file or the like (e.g., a set of initial/original methods). ... International Business Machines Corporation

12/31/15 / #20150378693

Compiling nested relational algebras with multiple intermediate representations

Aspects of the present invention provide a solution for compiling data. In an embodiment, an input query is received in a first language. ... International Business Machines Corporation

12/31/15 / #20150378690

Application instance staging

An application instance staging method comprises installing a runtime environment for an application program pushed to a cloud client; installing dependency of the application program; reading an environment variable of the application program to identify a functional service bound to the application program; modifying the application program based on the functional service bound to the application program; and packaging the modified application program, runtime environment, and dependency into an executable droplet.. . ... International Business Machines Corporation

12/31/15 / #20150378689

Application instance staging

The present invention discloses an application instance staging method and apparatus. The method comprising: obtaining a list of functional services bound to an application program; determining a buildpack corresponding to the bound functional service; and performing, by the determined buildpack, application instance staging of the application program. ... International Business Machines Corporation

12/31/15 / #20150378688

Developing rich internet application

The present invention includes a method and apparatus for developing a rich internet application. In one embodiment, there is provided a method for developing a rich internet application, comprising: defining a code space used for a code set, the code set being associated with a view that is to be displayed in the rich internet application; and adjusting the code space so that the adjusted code space is independent of another code space used for another code set, wherein the other code set is associated with another view that is to be displayed in the rich internet application. ... International Business Machines Corporation

12/31/15 / #20150378685

Mobilizing an existing web application

In an approach for adjusting a web application to comply with user interface capabilities of a device type, a processor receives user interface capabilities of a device type. A processor analyzes a web application for compatibility with the user interface capabilities of the device type. ... International Business Machines Corporation

12/31/15 / #20150378684

Mobilize website using representational state transfer (rest) resources

In an approach for mobilizing a web application, a processor receives a representational state transfer (rest) resource of a web application. A processor analyzes the rest resource to identify a pattern in the rest resource. ... International Business Machines Corporation

12/31/15 / #20150378680

Underflow/overflow detection prior to normalization

Methods and apparatuses for generating a condition code for a floating point number operation prior to normalization. A processor receives an intermediate result for an operation, wherein the intermediate result comprises an intermediate significand and an intermediate exponent. ... International Business Machines Corporation

12/31/15 / #20150378679

Underflow/overflow detection prior to normalization

Methods and apparatuses for generating a condition code for a floating point number operation prior to normalization. A processor receives an intermediate result for an operation, wherein the intermediate result comprises an intermediate significand and an intermediate exponent. ... International Business Machines Corporation

12/31/15 / #20150378678

Shift amount correction for multiply-add

Methods and apparatuses for performing a floating point multiply-add operation with alignment correction. A processor receives a first operand, a second operand and a third operand, wherein the first, second and third operands each represent a floating point number comprising a significand value and a biased exponent value. ... International Business Machines Corporation

12/31/15 / #20150378677

Shift amount correction for multiply-add

Methods and apparatuses for performing a floating point multiply-add operation with alignment correction. A processor receives a first operand, a second operand and a third operand, wherein the first, second and third operands each represent a floating point number comprising a significand value and a biased exponent value. ... International Business Machines Corporation

12/31/15 / #20150378675

Sorting multiple records of data using ranges of key values

A method and system for sorting data of an input file containing multiple records associated with multiple tables of a database. The multiple records include key values. ... International Business Machines Corporation

12/31/15 / #20150378646

Recommending printers and suggesting actions for tailored and efficient fulfillment of print requests

A method for recommending printers and suggesting actions for tailored and efficient fulfillment of print requests is provided. The method provides: receiving, by a printer service, a request to generate a print job. ... International Business Machines Corporation

12/31/15 / #20150378641

Extending existing storage devices in virtualized environments

A method, system and computer program product for providing a guest with access to a virtual storage on a physical storage using a peripheral component interface hub. In one embodiment, the method comprises the guest sending to the peripheral component interface hub a request to access the physical storage, the request including physical addresses of the physical storage, and the peripheral component interface hub sending specified information about the request to a hypervisor. ... International Business Machines Corporation

12/31/15 / #20150378638

High read block clustering at deduplication layer

Methods, systems, and computer program products are provided for deduplicating data. In one embodiment, a method comprises mapping a plurality of file blocks of selected data to a plurality of logical blocks, deduplicating the plurality of logical blocks to thereby associate each logical block with a corresponding physical block of a plurality of physical blocks located on a physical memory device, two or more of the corresponding physical blocks being non-contiguous with each other, and determining whether one or more of the corresponding physical blocks are one or more frequently accessed physical blocks being accessed at a frequency above a threshold frequency and being referred to by a common set of applications.. ... International Business Machines Corporation

12/31/15 / #20150378632

Transactional memory operations with write-only atomicity

Execution of a transaction mode setting instruction causes a computer processor to be in an atomic write-only mode ignoring conflicts to certain read-sets of a transaction during transactional execution. Write-set conflicts may still cause a transactional abort. ... International Business Machines Corporation

12/31/15 / #20150378631

Transactional memory operations with read-only atomicity

Execution of a transaction mode setting instruction causes a computer processor to be in an atomic read-only mode ignoring conflicts to certain write-sets of a transaction during transactional execution. Read-set conflicts may still cause a transactional abort. ... International Business Machines Corporation

12/31/15 / #20150378620

Flash copy relationship management

A method for combining storage array copy requests for a disk storage system is disclosed. The method may include receiving a bgc (background copy) request, determining that the bgc request satisfies a set of background copy (bgc) criteria, and adding, based on the determining, the bgc request to a sorted position in the wait accumulation queue (waq). ... International Business Machines Corporation

12/31/15 / #20150378617

Utilization of disk buffer for background replication processes

A method for accelerating a background replication process on storage volumes during application i/o (input/output) requests includes reading requested data from a first storage volume. The method stores the requested data in an embedded memory device, and providing the requested data to the application. ... International Business Machines Corporation

12/31/15 / #20150378612

Page compression strategy for improved page out process

A page compression strategy classifies uncompressed pages selected for compression. Similarly classified pages are compressed and bound into a single logical page. ... International Business Machines Corporation

12/31/15 / #20150378610

Facilitation of simultaneous storage initialization and data destage

Various embodiments for storage initialization and data destage in a computing storage environment are provided. At least a portion of data on a storage device is initialized using a background process, while one of simultaneously and subsequently destaging the at least the portion of the data to the storage device using a foreground process is performed. ... International Business Machines Corporation

12/31/15 / #20150378589

Utilizing key points in a progress bar to browse through content

One aspect is a method for utilizing key points in a progress bar to browse through content. The method includes displaying one or more hill-shaped flags at each of one or more key points on the progress bar such that a hill top of each of the one or more hill-shaped flags corresponds to a respective key point of the one or more key points. ... International Business Machines Corporation

12/31/15 / #20150378579

Mobilizing an existing web application

In an approach for adjusting a web application to comply with user interface capabilities of a device type, a processor receives user interface capabilities of a device type. A processor analyzes a web application for compatibility with the user interface capabilities of the device type. ... International Business Machines Corporation

12/31/15 / #20150378575

User interface element adjustment using web analytics

In an approach for adjusting presentation of user interface (ui) elements in a webpage, a processor monitors usage of a webpage by one or more users. A processor determines at least one ui element to be modified within presentation of the webpage, based on at least one predefined rule and the monitored usage of the webpage by the one or more users. ... International Business Machines Corporation

12/31/15 / #20150378572

Managing transparent windows

Methods and arrangements to manage transparent windows are described herein. Embodiments may comprise logic such as hardware and/or code to select one or more windows to make transparent and to switching the active window between source and target windows via the position of the mouse. ... International Business Machines Corporation

12/31/15 / #20150378553

Dynamic hover grace period

A hover section is displayed upon a gui following the lapse of a hover grace period interval that is dynamically adjusted. A default hover grace period interval is set and increasing if a hover display module determines manipulations of the gui indicate the hover section was displayed in error and is decreased if the hover display module receives a decrease hover grace period interval event. ... International Business Machines Corporation

12/31/15 / #20150378490

Generating device input using vibrations from surface features

A method, system, and computer program product for generating device input using vibrations from surface features are provided in the illustrative embodiments. In an electronic device (device), using a processor, a characteristic of a vibration is determined, the vibration being caused by motion of an object across the surface feature, the surface feature being a feature formed on an user-accessible surface of the device, the object makes a physical contact with the feature during the motion. ... International Business Machines Corporation

12/31/15 / #20150378403

Fan control system and method for a computer system based on a time variable rate of current

A fan control system for a computer system is provided. The computer system includes a fan and a target device. ... International Business Machines Corporation

12/31/15 / #20150378388

Stitchable global clock for 3d chips

A stitchable clock mesh, a dual operation mode method, and a master clock stratum are provided for a 3d chip stack. The stitchable clock mesh includes at least one clock mesh, on each of the two or more strata, having a plurality of sectors for providing a global clock signal. ... International Business Machines Corporation

12/31/15 / #20150378384

Reducing corrective actions in security-constrained optimal power flow via sparsity regularization

A method for determining a generation schedule with contingency constraints for controlling power output levels for a plurality of generators in an electric power system including determining a measure of a sparse, corrective model (c), security-constrained optimal power flow (scopf), which reduces a number of post-contingency rescheduling operations for each of a plurality of contingencies, and adjusting a power output level of at least one of the plurality of generators according to the measure of the sparse c-scopf upon detecting a contingency in the electric power system.. . ... International Business Machines Corporation

12/31/15 / #20150378323

Intelligent switching

An intelligent switching method and system. The method includes retrieving by a computer processor of an intelligent switching device, detection data indicating that an individual is located within a specified proximity of an apparatus. ... International Business Machines Corporation

12/31/15 / #20150378095

Efficient optical (light) coupling

A light coupling structure is provided that includes a diffractive grating coupler, a total internal reflection (tir) minor, and a polymer waveguide. The tir minor is formed within the polymer waveguide to direct light signals between the diffractive grating coupler and the polymer waveguide.. ... International Business Machines Corporation

12/31/15 / #20150377936

Distributed control of electric power grids

A method for determining power output levels of a plurality of nodes in an electric power system includes receiving, at a first node of the plurality of nodes, voltage information and multipliers of all neighboring nodes of the first node within the electric power system, determining, by the first node, a local power generation and a local voltage using the voltage information and the multipliers of the neighboring nodes and distributing the local power generation and the local voltage to the neighboring nodes, determining, by the first node, an estimated voltage of each of the neighboring nodes and distributing the estimated voltage to each of the neighboring nodes, and updating, by the first node, a local multiplier using the voltage information received from the neighboring nodes and the estimated voltage of each of the neighboring nodes determined by the node.. . ... International Business Machines Corporation

12/31/15 / #20150377830

Detection of translocation events using graphene-based nanopore assemblies

Translocation events are sensed using composite nanopore assemblies including nanopores formed in graphene sheets. Single molecule detection and characterization and multi-molecule characterization and identification are provided using such assemblies. ... International Business Machines Corporation

12/31/15 / #20150377702

Spectrometer insert for measuring temperature-dependent optical properties

In one aspect, a spectrometer insert is provided. The spectrometer insert includes: an enclosed housing; a first transparent window on a first side of the enclosed housing; a second transparent window on a second side of the enclosed housing, wherein the first side and the second side are opposing sides of the enclosed housing; and a sample mounting and heating assembly positioned within an interior cavity of the enclosed housing in between, and in line of sight of, the first transparent window and the second transparent window. ... International Business Machines Corporation

12/31/15 / #20150377643

Mapping preferred locations using multiple arrows

A method for depicting location attributes in a map environment. The method includes receiving a request for parameters about a first type of location. ... International Business Machines Corporation

12/31/15 / #20150377636

Generating a road network from location data

The present disclosure relates to a method and system for generating a road network. An embodiment of the present invention provides a method comprising: identifying a target area to be refined in a road network skeleton; and refining the target area using at least one trajectory associated with the target area to generate the road network. ... International Business Machines Corporation

12/31/15 / #20150377629

Verifying a road network of a map

The present disclosure relates to a method and system for verifying the road network of map. One embodiment of the present invention provides a method for verifying a road network of a map. ... International Business Machines Corporation

12/31/15 / #20150377628

Mapping preferred locations using multiple arrows

A method for depicting location attributes in a map environment. The method includes receiving a request for parameters about a first type of location. ... International Business Machines Corporation

12/31/15 / #20150377611

Wire-pull test location identification on a wire of a microelectronic package

A mechanism is provided for identifying a wire-pull test location on a wire of a microelectronic package. A first distance between a first terminating location of the wire on the microelectronic package and a second terminating location of the wire on the microelectronic package is determined. ... International Business Machines Corporation

12/31/15 / #20150376791

Gas cluster reactor for anisotropic film growth

A method of forming a low temperature silicide film on a substrate includes supplying a source gas to a cluster formation chamber to form a gas cluster that is subsequently moved to an ionization-acceleration chamber to form a gas cluster ion beam (gcib). The gcib is injected into a processing chamber containing the substrate. ... International Business Machines Corporation

12/31/15 / #20150376451

Soluble, processable polyhemiaminals and polyhexahydrotriazines

Polyhexahydrotriazine (pht) and polyhemiaminal (pha) materials incorporating divalent or trivalent bridging groups tend to form highly cross-linked polymers. While highly cross-linked polymers have certain advantageous with respect to stability and various physical characteristics, they are difficult to process once formed. ... International Business Machines Corporation

12/31/15 / #20150376442

Soluble, processable polyhemiaminals and polyhexahydrotriazines

Polyhexahydrotriazine (pht) and polyhemiaminal (pha) materials incorporating divalent or trivalent bridging groups tend to form highly cross-linked polymers. While highly cross-linked polymers have certain advantageous with respect to stability and various physical characteristics, they are difficult to process once formed. ... International Business Machines Corporation

12/31/15 / #20150375756

Determining vehicle collision risk

An approach is provided for determining vehicle accident risk. The approach determines a current vehicle state of the vehicle during operation of the vehicle. ... International Business Machines Corporation

12/24/15 / #20150373880

Heat spreading layer with high thermal conductivity

Embodiments of the invention comprise a homogeneous heat spreading cap element in chip packages to facilitate better heat spreading and dissipation. The heat spreading cap comprises a single high-k graphite layer supported by a copper frame for increased stability and reduced thermal warpage during handling and operation while minimizing thermal penalty by reducing the amount of material having a relatively low heat conductivity that is needed in conventional heat spreading caps.. ... International Business Machines Corporation

12/24/15 / #20150373879

Heat spreading layer with high thermal conductivity

Embodiments of the invention comprise a homogeneous heat spreading cap element in chip packages to facilitate better heat spreading and dissipation. The heat spreading cap comprises a single high-k graphite layer supported by a copper frame for increased stability and reduced thermal warpage during handling and operation while minimizing thermal penalty by reducing the amount of material having a relatively low heat conductivity that is needed in conventional heat spreading caps.. ... International Business Machines Corporation

12/24/15 / #20150373490

Determining if a target device is collocated with other devices in a users contacts list

A method to determine whether a target device is collocated with at least one other device within a plurality of devices associated with a user's contact list is provided. The method may include determining location information for each of the plurality of mobile devices associated with the user's contact list. ... International Business Machines Corporation

12/24/15 / #20150373398

Recording and sharing televised content

A method, system, and computer program product for recording and sharing televised content are provided in the illustrative embodiments. The televised content is selected at a first device associated with a first subscriber. ... International Business Machines Corporation

12/24/15 / #20150373113

Operating techniques for a storage network system

A technique for operating a storage network system includes storing, at one or more of a plurality of data collection storages arranged along a traveling path of a mobile body, data records received from the mobile body. An acknowledge (ack) record including a storage identifier (id) is transmitted, from the one or more of the plurality of data collection storages to the mobile body, in response to receiving the data records. ... International Business Machines Corporation

12/24/15 / #20150373108

Dynamic proximity based networked storage

A computer implemented method of storing data in at least one mobile node according to mobile node location may include identifying a first qualified mobile node and determining a first geographic position of the first qualified mobile node. The method may include determining a user geographic position of a user device, determining whether the first geographic position is within a first proximity relative to the user device, and causing storage of a first data portion in the first qualified mobile node in response to determining that the first geographic position is within the first proximity.. ... International Business Machines Corporation

12/24/15 / #20150373093

Selecting optimal hypervisor platforms that satisfy application workload requirements

A method, system and computer program product for selecting hypervisor platforms that are best suited to process application workloads. Attribute requirements for an application workload, such as high cpu capacity, high power and low cost, are received. ... International Business Machines Corporation

12/24/15 / #20150373078

On-demand helper operator for a streaming application

A streams manager creates one or more helper operators when a streaming application is initially deployed. As the streaming application runs, the streams manager monitors performance of the streaming application. ... International Business Machines Corporation

12/24/15 / #20150373071

On-demand helper operator for a streaming application

A streams manager creates one or more helper operators when a streaming application is initially deployed. As the streaming application runs, the streams manager monitors performance of the streaming application. ... International Business Machines Corporation

12/24/15 / #20150373064

Enabling digital asset reuse through dynamically curated shared personal collections with eminence propagation

A method and associated systems for enabling digital asset reuse. Users are each associated with a collection of digital assets and each user and each asset is assigned an eminence value. ... International Business Machines Corporation

12/24/15 / #20150373054

Automated feedback for proposed security rules

A computer determines a number of matches returned by a proposed security rule that result from application of the proposed security-rule to historical logged event data. The computer determines a predicted performance of the proposed security rule as part of a network security system based on the number of matches. ... International Business Machines Corporation

12/24/15 / #20150373042

Runtime protection of web services

Protecting a runtime web service application. A web service application is instrumented to log its operation and allow recreation of its execution trace. ... International Business Machines Corporation

12/24/15 / #20150373031

Determining email authenticity

Monitoring across multiple-channels, used by multiple devices, to determine which email messages being sent to a user are solicited by the user. A broad spectrum of network and telephony access records are analyzed to determine whether an email message is likely being sent as a result of legitimate services access by the user.. ... International Business Machines Corporation

12/24/15 / #20150373030

Mobile device storage volume encryption with geography correlated key management and mount operations

A method, system and computer-usable medium are disclosed for protecting data stored on a mobile device, based upon its location. Data stored on a mobile device is encrypted with a network-stored secret key that is unknown to the user of the mobile device. ... International Business Machines Corporation

12/24/15 / #20150372970

Address management in an overlay network environment

Embodiments of the invention relate to overlay network address management. One embodiment includes an overlay gateway including an overlay network manager associated with a physical network. ... International Business Machines Corporation

12/24/15 / #20150372961

Notification generation system for messages

A method for generating a notification about a recipient of a message. The recipient of the message is identified while the message is being composed. ... International Business Machines Corporation

12/24/15 / #20150372955

Sorting electronic mail

Emails are received and parsed for a set of dates. A set of words surrounding the set of dates are identified and contextual information is correlated with the set of dates based on the set of words. ... International Business Machines Corporation

12/24/15 / #20150372944

Provisioning legacy systems network architecture resource communications through a group of servers in a data center

Methods for managing communications between client computers and distributed resources. Distributed resources are identified that each of a set of client computers is configured to communicate with, based on configuration information stored on each of the set of client computers. ... International Business Machines Corporation

12/24/15 / #20150372917

Load balancing overlay network traffic using a teamed set of network interface cards

In one embodiment, a server includes a processor and logic integrated with and/or executable by the processor. The logic is configured to hash at least a portion of a packet according to a hashing algorithm to obtain a hash value. ... International Business Machines Corporation

12/24/15 / #20150372908

Hybrid approach for performance enhancing proxies

There are provided a transparent performance enhancing proxy, a method for operating a transparent performance enhancing proxy between a source device and a destination device, and corresponding computer program product. The method includes preserving, without translation, packet header information of a header for a packet received from the source device to be forwarded to the destination device. ... International Business Machines Corporation

12/24/15 / #20150372884

System verification of interactive screenshots and log files between client systems and server systems within a network computing environment

A computer-implemented method for system performance verification is provided. The computer-implemented method includes invoking an integrated system tool to perform system performance verification of a client system. ... International Business Machines Corporation

12/24/15 / #20150372867

Cluster reconfiguration management

Assigning a set of port names to storage access paths of virtual machines accessing storage resources via storage area networks is provided. A first computing system cluster that is associated with a set of computing system identifiers is created. ... International Business Machines Corporation

12/24/15 / #20150372858

Cluster reconfiguration management

Assigning a set of port names to storage access paths of virtual machines accessing storage resources via storage area networks is provided. A first computing system cluster that is associated with a set of computing system identifiers is created. ... International Business Machines Corporation

12/24/15 / #20150372840

Servicing packets in a virtual network and a software-defined network (sdn)

In one embodiment, an apparatus includes a processor and logic configured to designate one of a plurality of endpoint virtual network identifiers (epvnids) for each endpoint device in a network, wherein each epvnid is configured to be shared by one or more endpoint devices, designate a common waypoint virtual network identifier (wpvnid) for all transparent waypoint devices in the network which perform a same function, designate a unique wpvnid for each routed waypoint device in the network, designate a common virtual network identifier (vnid) for all virtual switches in a single virtual network, wherein a different vnid is designated for each virtual network, and create a service chain table comprising each vnid, wpvnid, and epvnid designated in the network individually correlated with at least a pair of vnids: a source vnid and a destination vnid, based on one or more policies affecting application of services to packets in the network.. . ... International Business Machines Corporation

12/24/15 / #20150372692

Generating a code alphabet of symbols to generate codewords for words used with a program

Provided are a computer program product, system, and method for generating a code alphabet for use by a deployed program to determine codewords for words. A first code alphabet has a first number of symbols that provide variable length codings of the words. ... International Business Machines Corporation

12/24/15 / #20150372660

Switchable filters and design structures

Switchable and/or tunable filters, methods of manufacture and design structures are disclosed herein. The method of forming the filters includes forming at least one piezoelectric filter structure comprising a plurality of electrodes formed to be in contact with at least one piezoelectric substrate. ... International Business Machines Corporation

12/24/15 / #20150372515

Modular battery cell architecture and control method

Embodiments of the invention relate to a multi-cell battery, with at least two cells electrically connected in a first parallel arrangement, which is connected in series to a second parallel arrangement of at least two additional cells. Each cell is locally connected to a sensor to sense and control the current of each cell in parallel or parallel-series combination in the multi-cell battery. ... International Business Machines Corporation

12/24/15 / #20150372145

High density vertical nanowire stack for field effect transistor

An alternating stack of layers of a first epitaxial semiconductor material and a second epitaxial semiconductor material is formed on a substrate. A fin stack is formed by patterning the alternating stack into a shape of a fin having a parallel pair of vertical sidewalls. ... International Business Machines Corporation

12/24/15 / #20150372141

Silicon-containing, tunneling field-effect transistor including iii-n source

Tunneling field-effect transistors including silicon, germanium or silicon germanium channels and iii-n source regions are provided for low power operations. A broken-band heterojunction is formed by the source and channel regions of the transistors. ... International Business Machines Corporation

12/24/15 / #20150372127

Method and structure for enabling high aspect ratio sacrificial gates

Sacrificial gate structures having an aspect ratio of greater than 5:1 are formed on a substrate. In some embodiments, each sacrificial gate structure straddles a portion of a semiconductor fin that is present on the substrate. ... International Business Machines Corporation

12/24/15 / #20150372113

Method and structure for enabling high aspect ratio sacrificial gates

Sacrificial gate structures having an aspect ratio of greater than 5:1 are formed on a substrate. In some embodiments, each sacrificial gate structure straddles a portion of a semiconductor fin that is present on the substrate. ... International Business Machines Corporation

12/24/15 / #20150372112

Replacement gate structure for enhancing conductivity

After formation of a gate cavity straddling at least one semiconductor material portion, a gate dielectric layer and at least one work function material layer is formed over the gate dielectric layer. The at least one work function material layer and the gate dielectric layer are patterned such that remaining portions of the at least one work function material layer are present only in proximity to the at least one semiconductor material portion. ... International Business Machines Corporation

12/24/15 / #20150372109

Replacement gate structure for enhancing conductivity

After formation of a gate cavity straddling at least one semiconductor material portion, a gate dielectric layer and at least one work function material layer is formed over the gate dielectric layer. The at least one work function material layer and the gate dielectric layer are patterned such that remaining portions of the at least one work function material layer are present only in proximity to the at least one semiconductor material portion. ... International Business Machines Corporation

12/24/15 / #20150372104

Multi-channel gate-all-around fet

A high performance gaa fet is described in which vertically stacked silicon nanowires carry substantially the same drive current as the fin in a conventional finfet transistor, but at a lower operating voltage, and with greater reliability. One problem that occurs in existing nanowire gaa fets is that, when a metal is used to form the wrap-around gate, a short circuit can develop between the source and drain regions and the metal gate portion that underlies the channel. ... International Business Machines Corporation

12/24/15 / #20150371990

Fabrication of insulating fence fins

A semiconductor structure may be formed by forming a first semiconductor fin and a second inactive semiconductor fin above a substrate; depositing a masking layer above the first semiconductor fin and the second semiconductor fin; etching a trench in the masking layer exposing the second semiconductor fin while the first semiconductor fin remains covered by the masking layer; removing the second semiconductor fin to form a fin recess beneath the trench; filling the fin recess with an insulating material to form an insulating fence fin; and removing the masking layer to expose the first semiconductor fin and the insulating fence fin. A third semiconductor fin separating the first semiconductor fin from the second semiconductor fin may also be formed prior to depositing the masking layer and covered by the masking layer. ... International Business Machines Corporation

12/24/15 / #20150371981

Film thickness metrology

Methods for determining a target thickness of a conformal film with reduced uncertainty, and an integrated circuit (ic) chip having a conformal film of the target thickness are provided. In an embodiment, a first critical dimension of a structure disposed on a wafer is measured. ... International Business Machines Corporation

12/24/15 / #20150371954

Enhancing barrier in air gap technology

A semiconductor structure including a first metal line and a second metal line in a dielectric layer, the first metal line and the second metal line are adjacent and within the same dielectric level; an air gap structure in the dielectric layer and between the first metal line and the second metal line, wherein the air gap structure includes an air gap oxide layer and an air gap; and a barrier layer between the air gap structure and the first metal line, wherein the barrier layer is an oxidized metal layer.. . ... International Business Machines Corporation

12/24/15 / #20150371952

Semiconductor contact with diffusion-controlled in situ insulator formation

A contact is created by forming a layer of dielectric material on a silicon-containing region of a semiconductor substrate. An opening is created through the layer of dielectric material, the opening having a bottom and exposing the silicon-containing region. ... International Business Machines Corporation

12/24/15 / #20150371948

Self-aligned contact structure

Embodiments of present invention provide a method of forming a semiconductor structure. The method includes forming a semiconductor structure having a first metal layer and a plurality of dielectric layers on top of the first metal layer; creating one or more openings through the plurality of dielectric layers to expose the first metal layer underneath the plurality of dielectric layers; causing the one or more openings to expand downward into the first metal layer and expand horizontally into areas underneath the plurality of dielectric layers; applying a layer of lining material in lining sidewalls of the one or more openings inside the plurality of dielectric layers; and filling the expanded one or more openings with a conductive material.. ... International Business Machines Corporation

12/24/15 / #20150371927

Combination of tsv and back side wiring in 3d integration

The embodiments of the present invention relate generally to the fabrication of integrated circuits, and more particularly to a structure and method for fabricating a 3d integration scheme for multiple semiconductor wafers using an arrangement of intra-wafer through silicon vias (tsvs) to electrically connect the front side of a first integrated circuit (ic) chip to large back side wiring on the back side of the first ic chip and inter-wafer tsvs to electrically connect the first ic chip to a second ic chip.. . ... International Business Machines Corporation

12/24/15 / #20150371922

Heat spreading layer with high thermal conductivity

Embodiments of the invention comprise a homogeneous heat spreading cap element in chip packages to facilitate better heat spreading and dissipation. The heat spreading cap comprises a single high-k graphite layer supported by a copper frame for increased stability and reduced thermal warpage during handling and operation while minimizing thermal penalty by reducing the amount of material having a relatively low heat conductivity that is needed in conventional heat spreading caps.. ... International Business Machines Corporation

12/24/15 / #20150371919

Heat spreading layer with high thermal conductivity

Embodiments of the invention comprise a homogeneous heat spreading cap element in chip packages to facilitate better heat spreading and dissipation. The heat spreading cap comprises a single high-k graphite layer supported by a copper frame for increased stability and reduced thermal warpage during handling and operation while minimizing thermal penalty by reducing the amount of material having a relatively low heat conductivity that is needed in conventional heat spreading caps.. ... International Business Machines Corporation

12/24/15 / #20150371918

Heat spreading layer with high thermal conductivity

Embodiments of the invention comprise a homogeneous heat spreading cap element in chip packages to facilitate better heat spreading and dissipation. The heat spreading cap comprises a single high-k graphite layer supported by a copper frame for increased stability and reduced thermal warpage during handling and operation while minimizing thermal penalty by reducing the amount of material having a relatively low heat conductivity that is needed in conventional heat spreading caps.. ... International Business Machines Corporation

12/24/15 / #20150371917

Heat spreading layer with high thermal conductivity

Embodiments of the invention comprise a homogeneous heat spreading cap element in chip packages to facilitate better heat spreading and dissipation. The heat spreading cap comprises a single high-k graphite layer supported by a copper frame for increased stability and reduced thermal warpage during handling and operation while minimizing thermal penalty by reducing the amount of material having a relatively low heat conductivity that is needed in conventional heat spreading caps.. ... International Business Machines Corporation

12/24/15 / #20150371904

Patterning process for fin implantation

After forming an organic planarization layer (opl) atop a substrate which includes a plurality of semiconductor fins and a gate structure thereon, the opl is recessed such that uppermost surfaces of remaining portions of the opl are located below an uppermost surface of the gate structure but above top surfaces of the semiconductor fins. The remaining portions of the opl are patterned to expose semiconductor fins in a pfinfet region for subsequent ion implantation. ... International Business Machines Corporation

12/24/15 / #20150371893

Buried signal transmission line

A buried conductive layer is formed underneath a buried insulator layer of a semiconductor-on-insulator (soi) substrate. A deep isolation trench laterally surrounding a portion of the buried conductive layer is formed, and is filled with at least a dielectric liner to form a deep capacitor trench isolation structure. ... International Business Machines Corporation

12/24/15 / #20150371892

Methods of forming a finfet semiconductor device with a unique gate configuration, and the resulting finfet device

One method disclosed includes, among other things, forming an overall fin structure having a stepped cross-sectional profile, the fin structure having an upper part and a lower part positioned under the upper part, wherein the upper part has a first width and the lower part has a second width that is less than the first width, forming a layer of insulating material in trenches adjacent the overall fin structure such that the upper part of the overall fin structure and a portion of the lower part of the overall fin structure are exposed above an upper surface of the layer of insulating material, and forming a gate structure around the exposed upper part of the overall fin structure and the exposed portion of the lower part of the overall fin structure.. . ... International Business Machines Corporation

12/24/15 / #20150371888

Universal clamping fixture to maintain laminate flatness during chip join

A clamping apparatus and method for maintaining a workpiece flatness during processing includes a base having a planar surface for receiving a first workpiece. Two sets of opposing clamping mechanisms are mounted to the base and include a clamp head at a distal end of a rod extending from a housing in removable overlapping relation to the first workpiece. ... International Business Machines Corporation

12/24/15 / #20150371887

Universal clamping fixture to maintain laminate flatness during chip join

A clamping apparatus and method for maintaining a workpiece flatness during processing includes a base having a planar surface for receiving a first workpiece. Two sets of opposing clamping mechanisms are mounted to the base and include a clamp head at a distal end of a rod extending from a housing in removable overlapping relation to the first workpiece. ... International Business Machines Corporation

12/24/15 / #20150371870

Die level chemical mechanical polishing

A method of polishing a wafer at the die level with a targeted slurry delivery system. The wafer is placed on a wafer carrier exposing the top side of the wafer, the wafer contains a die. ... International Business Machines Corporation

12/24/15 / #20150371867

Protective trench layer and gate spacer in finfet devices

Forming a field effect transistor device includes forming first and second semiconductor fins on a semiconductor substrate. The first and second semiconductor fins are separated by a trench region. ... International Business Machines Corporation

12/24/15 / #20150371863

Rework and stripping of complex patterning layers using chemical mechanical polishing

A method utilizing a chemical mechanical polishing process to remove a patterned material stack comprising at least one pattern transfer layer and a template layer during a rework process or during a post pattern transfer cleaning process is provided. The pattern in the patterned material stack is formed by pattern transfer of a directed self-assembly pattern generated from microphase separation of a self-assembly material.. ... International Business Machines Corporation

12/24/15 / #20150371764

Nested helical inductor

Some examples describe a first helical structure of an electromagnetic inductor coil. In some examples, at least a portion of the first helical structure of the electromagnetic inductor coil is inside a first substrate. ... International Business Machines Corporation

12/24/15 / #20150371763

Nested-helical transformer

Some examples describe a first helical electromagnetic coil of a transformer. In some instances, at least a portion of the first helical electromagnetic coil is inside a first semi-conductive substrate. ... International Business Machines Corporation

12/24/15 / #20150371760

High efficiency on-chip 3d transformer structure

An integrated circuit transformer structure includes at least two conductor groups stacked in parallel in different layers. A first spiral track is formed in the at least two conductor groups, the first spiral track includes first turns of a first radius within each of the at least two conductor groups, and second turns of a second radius within each of the at least two conductor groups, the first and second turns being electrically connected. ... International Business Machines Corporation

12/24/15 / #20150371759

High efficiency on-chip 3d transformer structure

A transformer structure includes a first coil having two sections of spiral, with a top section including a plurality of metal layers occupying top x metal layers and a bottom section including a plurality of metal layers occupying bottom z metal layers, where x and z represent a number of metal layers having a specific number selected to provide a particular performance of the first coil. A second coil of the transformer is disposed between the two sections of the first coil and includes a plurality of metal layers where y represents a number of vertically adjacent metal layers, with the specific number chosen to provide the particular performance, such that a sum x+y+z represents a total number of vertical metal layers for the transformer structure.. ... International Business Machines Corporation

12/24/15 / #20150371758

High efficiency on-chip 3d transformer structure

An integrated circuit transformer structure includes at least two conductor groups stacked in parallel in different layers. A first spiral track is formed in the at least two conductor groups, the first spiral track included first turns of a first radius within each of the at least two conductor groups, and second turns of a second radius within each of the at least two conductor groups, the first and second turns being electrically connected. ... International Business Machines Corporation

12/24/15 / #20150371676

Reconstructive error recovery procedure (erp) using reserved buffer

In one embodiment, a tape drive includes a reserved data buffer and logic integrated with and/or executable by a processor. The logic is configured to read a data set from a medium and store a first portion of the data set to the reserved data buffer in response to a determination that the first portion of the data set is correctable using c2 error correction code (ecc). ... International Business Machines Corporation

12/24/15 / #20150371674

Erasing recorded data by utilizing read head and write head

Techniques for reducing the time required for erasing specific data recorded on a tape medium. A specific group of records is erased without preliminarily locating the erasure end position. ... International Business Machines Corporation

12/24/15 / #20150371651

Automatic construction of a speech

A method comprising using at least one hardware processor for: identifying relations between pairs of claims of a set of claims; aggregating the claims of the set of claims into a plurality of clusters based on the identified relations; generating a plurality of arguments from the plurality of clusters, wherein each of the arguments is generated from a cluster of the plurality of clusters, and wherein each of the arguments comprises at least one claim of the set of claims, scoring each possible set of a predefined number of arguments of the plurality of arguments, based on a quality of each argument of the predefined number of arguments and on diversity between the predefined number of arguments; and generating a speech, wherein the speech comprises a top scoring possible set of the possible set of the predefined number of arguments.. . ... International Business Machines Corporation

12/24/15 / #20150371547

Providing targeted and personalized education to prevent human errors

An embodiment comprises a method associated with a computer system activity comprising one or more tasks, carried out by one or more users. The method comprises the step of furnishing a knowledge database with one or more knowledge teachings, wherein each knowledge teaching corresponds to one of the tasks. ... International Business Machines Corporation

12/24/15 / #20150371525

Power distribution unit and alarm method applied in the same

A power distribution unit including a base, at least one socket, at least one detecting unit and a management unit is provided. The socket is disposed at the base and has at least one power end and a ground end. ... International Business Machines Corporation

12/24/15 / #20150371518

Collaborative threat assessment

One or more processors determine whether a hazard that is detected by a first mobile device exists based on data received from at least one second mobile device. The second mobile device is within a proximity to the first mobile device, which is determined based on a type of the hazard. ... International Business Machines Corporation

12/24/15 / #20150371508

Managing serviceability modes

A computer-implemented method, carried out by one or more processors, for managing serviceability modes in a data center. In an embodiment, the method comprises the steps of receiving a serviceability mode selection for a component in a data center, wherein the serviceability mode correlates to information presented by one or more components in the data center; assigning a scheme for one or more leds on the component based, at least in part, on the received serviceability mode selection; and determining to activate the one or more leds on the component based at least on the assigned scheme.. ... International Business Machines Corporation

12/24/15 / #20150371442

Configuration of navigational controls in geometric environment

According to embodiments of the invention, methods, and a computer system for configuring navigational controls in a geometric environment are disclosed. The method may include obtaining a data set for geometric representation on a display, forming one or more reference surfaces, calculating a fit score and a confidence score using one or more of the reference surfaces, and configuring the navigational system to a control scheme when a computational operation on the fit score and the confidence score is outside of a threshold value. ... International Business Machines Corporation

12/24/15 / #20150371406

Controlling real-time compression detection

A detection learning module is used for enabling and/or disabling real-time compression detection by maintaining a history of real-time compression detection success for sampled data. The enabling or disabling of the real-time compression detection is based on a detection benefit function derived from a set of calculated heuristics indicating the real-time compression detection success on input streams. ... International Business Machines Corporation

12/24/15 / #20150371352

Recovery of time due to an unplanned event on a reserved route

Providing reserved routes for a plurality of vehicles, in which the at least a location is monitored and communicated from each of a plurality of vehicles having gps devices and traveling to destinations on reserved routes with guaranteed arrival times. For a traffic event along one of the reserved routes; determining if any of the plurality of vehicles are affected or will be affected by the traffic event and calculating alternate routes for those vehicles the alternate routes are sent to the gps devices in the affected or possibly affected vehicles and once the vehicle has reached the destination, comparing an actual arrival time of the vehicle at the destination to the guaranteed arrival time, and if the actual arrival time is later than the guaranteed arrival time, crediting a user of the vehicle for at least a portion of an amount paid for reserving the reserved route.. ... International Business Machines Corporation

12/24/15 / #20150371317

Smart order management

An approach is provided for smart order management. Smart utensils measure consumption of a meal by a customer. ... International Business Machines Corporation

12/24/15 / #20150371297

Creation and use of constraint templates

The new creation and use of entitlement constraint templates methods and systems can be linked to software offerings in a software catalog. Allowing software catalog experts to link contractual entitlement data with software product offerings via constraint templates on such a varying list of constraint types, establishes a highly robust software catalog knowledgebase. ... International Business Machines Corporation

12/24/15 / #20150371253

Implementing computer interaction response tests

Embodiments of the present invention provide an approach for enhancing computer interaction challenge-response tests (e.g., completely automatic public turing test to tell computers and humans apart, or captcha). Furthermore, embodiments of the present invention provide an approach for introducing advertising in such challenge-response tests, such that users are presented with opportunities to learn about or reinforce brands. ... International Business Machines Corporation

12/24/15 / #20150371195

Variable feedback for calendar reschedule operations

A method for variable feedback for calendar reschedule operations. The method includes receiving a set of information for an event where the set of information details a first time slot associated with the event. ... International Business Machines Corporation

12/24/15 / #20150371164

Optimized menu planning

A method for planning preparation of a plurality of dishes according to a plurality of corresponding recipes includes automatically identifying, by a processor, a plurality of candidate sub-recipes, wherein each candidate sub-recipe in the plurality of candidate sub-recipes comprises an intermediate component that is required by at least two of the plurality of corresponding recipes, and automatically selecting, by the processor, at least one candidate sub-recipe in the plurality of candidate sub-recipes for preparation, in accordance with at least one constraint on the preparation of the plurality of dishes.. . ... International Business Machines Corporation

12/24/15 / #20150371159

Generating business rule model

A method, apparatus and program product for generating a business rule model. In one embodiment, there is provided a method for generating a business rule model, comprising: extracting from source code of an application system a business flow executed by the source code, the business flow comprising a plurality of business procedures that are executed in an order; analyzing parts in the source code that are associated with various business procedures among the plurality of business procedures, building rule metadata describing business rules followed by various business procedures; and generating a business rule model followed by the business flow on the basis of the order and the rule metadata. ... International Business Machines Corporation

12/24/15 / #20150371150

Analysis device, analysis method, and program

An analysis device which analyzes a system that inputs input data including a plurality of input parameters and outputs output data, including an acquisition unit that acquires learning data including a plurality of sets of the input data and the output data, and a learning processing unit that learns, based on the acquired learning data, the amount of difference of output data corresponding to a difference between input parameters of two pieces of input data, an analysis method using the analysis device, and a program used in the analysis device are provided.. . ... International Business Machines Corporation

12/24/15 / #20150371137

Displaying quality of question being asked a question answering system

A mechanism is provided in a data processing system for automatically generating question and answer pairs for training a question answering system for a given domain. The mechanism receives user input of question text for a question to be submitted to a question answering system in a user interface. ... International Business Machines Corporation

12/24/15 / #20150371135

Solving vehicle routing problems using evolutionary computing techniques

According to one exemplary embodiment, a method for solving combinatorial optimization problems is provided. The method may include receiving a plurality of problem instance parameters associated with a graph. ... International Business Machines Corporation

12/24/15 / #20150371131

Event-driven universal neural network circuit

The present invention provides an event-driven universal neural network circuit. The circuit comprises a plurality of neural modules. ... International Business Machines Corporation

12/24/15 / #20150371035

Intercepting inter-process communications

Intercepting inter-process communications by determining a first computer memory location of an inter-process communications function of an instance of a virtual machine and causing an interception function at a second computer memory location to be called when a computer software application calls the inter-process communications function.. . ... International Business Machines Corporation

12/24/15 / #20150370979

Electronic medical record summary and presentation

Methods, devices, and systems (for outputting a case summary) receive an electronic medical record (emr) for the medical patient, extract medical data from the emr, provide a list of medical problems relevant to the emr, identifying relations between the medical problems and the medical data using a question-answering (qa) system, and output the clinical summary for the emr. The clinical summary comprises the list of medical problems, the medical data, and the relations.. ... International Business Machines Corporation

12/24/15 / #20150370940

Clock-gating phase algebra for clock analysis

A design tool can implement phase algebra based design evaluation to evaluate a circuit design with a compact representation of numerous waveforms without simulating the individual waveforms. The design tool can determine an input sequence of signal transition representations associated with an input net of a component in rtl circuit design, where each signal transition representation represents a nondeterministic transition from a previous signal state to possible signal state(s). ... International Business Machines Corporation

12/24/15 / #20150370939

Glitch-aware phase algebra for clock analysis

A design tool can implement phase algebra based design evaluation to evaluate a circuit design with a compact representation of numerous waveforms without simulating the individual waveforms. The design tool can determine an input sequence of signal transition representations associated with an input net of a component in a register transfer level circuit design, where each signal transition representation represents a nondeterministic transition from a previous signal state to one or more possible signal states. ... International Business Machines Corporation

12/24/15 / #20150370916

Auto-generation of migrated use cases

An existing use case is associated with a program code. The program code is executed when a portion of the existing use case is executed. ... International Business Machines Corporation

12/24/15 / #20150370890

Providing a visual and conversational experience in support of recommendations

The mapping system and method comprises receiving a query identifying a source entity, the source entity being of a first entity-type; generating a plurality of candidate entities from an analysis of an entity-relationship graph in response to the query based on the source entity; and computing feature values for each candidate entity of the plurality of candidate entities by passing the source entity and the plurality of candidate entities to a type-specific entity recommender particular to the first entity-type.. . ... International Business Machines Corporation

12/24/15 / #20150370887

Semantic merge of arguments

A method comprising using at least one hardware processor for: receiving a topic under consideration (tuc) and a set of claims referring to the tuc; identifying semantic similarity relations between claims of the set of claims; clustering the claims into a plurality of claim clusters based on the identified semantic similarity relations, wherein said claim clusters represent semantically different claims of the set of claims; and generating a list of non-redundant claims comprising said semantically different claims.. . ... International Business Machines Corporation

12/24/15 / #20150370880

Identifying items on a second website already browsed at a first website

For browsing items on the worldwide web, operations are performed, including: searching for items to browse at a first website; recording attributes of each item browsed at the first website; searching for items to browse at a second website; comparing attributes of items identified during the searching of the second website with the recorded attributes of items browsed at the first website; in the event of a match between attributes of an item identified during the searching of the second website and the recorded attributes of an item browsed at the first website, indicating that the item identified at the second website is the same as the item browsed at the first website; and displaying an indication to the user that the item identified at the second website is the same as the item browsed at the first website.. . ... International Business Machines Corporation

12/24/15 / #20150370879

Graphical user interface for modeling data

Techniques are described for modeling data in a graphical user interface. In one example, a method for modeling data includes generating for output a plurality of data item graphical representations, wherein the data item graphical representations represent data items. ... International Business Machines Corporation

12/24/15 / #20150370877

Automated analysis and visualization of complex data

A method for automated analysis and visualization of log data is provided in the illustrative embodiments. A subset of information to be visualized is selected from a set of information. ... International Business Machines Corporation

12/24/15 / #20150370871

Etl tool interface for remote mainframes

Embodiments of the present invention disclose a method for remote job submission. A computer receives a first job of a job stream. ... International Business Machines Corporation

12/24/15 / #20150370850

Addressing cross-allocated blocks in a file system

A mechanism is provided for cross-allocated block repair in a mounted file system. A set of cross-allocated blocks are identified from a plurality of blocks within an inode of the mounted file system, based on a corresponding bit associated with each cross-allocated block in a duplicated block information bitmap being in a first identified state. ... International Business Machines Corporation

12/24/15 / #20150370846

Deletion workflow that preserves data integrity of a records management system

Embodiments presented herein provide techniques for preserving data integrity of a records management deletion workflow. According to one embodiment, a records management system identifies a set of records subject to a document retention policy. ... International Business Machines Corporation

12/24/15 / #20150370845

Storage device data migration

A method for migrating files from a source server to a target server are disclosed. The method includes determining file property information for one or more data files on the source server. ... International Business Machines Corporation

12/24/15 / #20150370839

Built-in search indexing for nas systems

Methods, computing systems and computer program products implement embodiments of the present invention that include storing multiple files to a file-level storage system that includes one or more storage devices, and maintaining, by the file-level storage system, one or more searchable indexes for the multiple files, each of the indexes indexing a respective key field. In some embodiments the file-level storage system may be configured as a network attached storage system. ... International Business Machines Corporation

12/24/15 / #20150370837

Managing streams of tuples

A plurality of streams of tuples is received by processing elements operating on computer processors, the processing element having one or more stream operators. A first stream of tuples is processed at a receiving stream operator. ... International Business Machines Corporation

12/24/15 / #20150370820

Deletion workflow that preserves data integrity of a records management system

Embodiments presented herein provide techniques for preserving data integrity of a records management deletion workflow. According to one embodiment, a records management system identifies a set of records subject to a document retention policy. ... International Business Machines Corporation

12/24/15 / #20150370800

Managing streams of tuples

A plurality of streams of tuples is received by processing elements operating on computer processors, the processing element having one or more stream operators. A first stream of tuples is processed at a receiving stream operator. ... International Business Machines Corporation

12/24/15 / #20150370793

Holding specific versions of a document

Provided are techniques for holding versions of a document. In response to adding a version of an item to a hold container, another version of the item is automatically added to the hold container based on a hold version policy type associated with the hold container.. ... International Business Machines Corporation

12/24/15 / #20150370792

Holding specific versions of a document

Provided are techniques for holding versions of a document. In response to adding a version of an item to a hold container, another version of the item is automatically added to the hold container based on a hold version policy type associated with the hold container.. ... International Business Machines Corporation

12/24/15 / #20150370788

Synchronizing user states across multiple clients of a nas system

Methods, computing systems and computer program products implement embodiments of the present invention that include detecting, by a file-level storage system such as a network attached storage system, a user operating a first computer in communication with the file level storage system via a network, and maintaining, while the user is operating the first computer, multiple states for the user. In some embodiments, the user may operate the first computer by logging on to the first computer, and executing one or more applications and data files. ... International Business Machines Corporation

12/24/15 / #20150370782

Relation extraction using manifold models

According to an aspect, relation extraction using manifold models includes identifying semantic relations to be modeled in a selected domain. Data is collected from at least one unstructured data source based on the identified semantic relations. ... International Business Machines Corporation

12/24/15 / #20150370775

Persistently self-replicating cells

The present invention includes a method and system for persistently self-replicating multiple ranges of cells through a copy-paste operation, in a multi-dimensional spreadsheet. A set of ranges of cells is defined, wherein each range of cells has the same size. ... International Business Machines Corporation

12/24/15 / #20150370764

User input relating to moving data

A request is received for moving data to an application. The data at least including first data of a first data type and second data of a second data type, the first data type being different from the second data type. ... International Business Machines Corporation

12/24/15 / #20150370758

Presentation of content in a window of time

A method, for presenting a content item from a plurality of content items for a window of time, includes receiving the window of time and a user profile. The method also includes identifying a content preference and a presentation preference within the user profile. ... International Business Machines Corporation

12/24/15 / #20150370736

Shared receive queue allocation for network on a chip communication

A method for communicating data in a processing architecture comprising a plurality of interconnected ip blocks. Transmitting ip blocks may transmit messages to a shared receive queue for a first ip block. ... International Business Machines Corporation

12/24/15 / #20150370722

Establishing a point-in-time copy relationship between source logical addresses and target logical addresses

Provided are a computer program product, system, and method for establishing a point-in-time copy relationship between source logical addresses and target logical addresses. A point-in-time (pit) copy establish command specifies a source set comprising a subset of source logical addresses in at least one storage and a target set comprising a subset of target logical addresses in the at least one storage. ... International Business Machines Corporation

12/24/15 / #20150370719

Implementing selective cache injection

A method, system and memory controller for implementing memory hierarchy placement decisions in a memory system including direct routing of arriving data into a main memory system and selective injection of the data or computed results into a processor cache in a computer system. A memory controller, or a processing element in a memory system, selectively drives placement of data into other levels of the memory hierarchy. ... International Business Machines Corporation

12/24/15 / #20150370714

Linear recording executing optimum writing upon receipt of series of commands including mixed read and write commands

An apparatus according to one embodiment includes a head, a controller coupled to the head, and logic integrated with and/or executable by the controller. The logic is configured to receive a series of commands, the series of commands including mixed read, overwrite, and append write commands, cause reading of data from a specified position of a tape using the head and storing the data in a buffer in response to a read command; and cause writing of data stored in the buffer starting from an appended data end position of the tape in response to an append write command.. ... International Business Machines Corporation

12/24/15 / #20150370711

Method and apparatus for cache memory data processing

Apparatus and methods are disclosed that enable the allocation of a cache portion of a memory buffer to be utilized by an on-cache function controller (ofc) to execute processing functions on “main line” data. A particular method may include receiving, at a memory buffer, a request from a memory controller for allocation of a cache portion of the memory buffer. ... International Business Machines Corporation

12/24/15 / #20150370706

Method and apparatus for cache memory data processing

Apparatus and methods are disclosed that enable the allocation of a cache portion of a memory buffer to be utilized by an on-cache function controller (ofc) to execute processing functions on “main line” data. A particular method may include receiving, at a memory buffer, a request from a memory controller for allocation of a cache portion of the memory buffer. ... International Business Machines Corporation

12/24/15 / #20150370698

Re-aligning a compressed data array

Two-dimensional compressed data sets can be re-aligned while preserving compression of the data. A set of one or more shifts and a corresponding set of one or more first dimension indices into a two-dimensional compressed data set for re-aligning the two-dimensional compressed data set are determined. ... International Business Machines Corporation

12/24/15 / #20150370697

Memory switching protocol when switching optically-connected memory

Data is collected by an active node from passive nodes and arranges and stores the collected data on receiving nodes. A source node extracts the data format, and a remote memory blade identification (id), a remote memory blade address, and ranges of the rmma space, and composes and sends metadata to the receiving nodes and receiving racks.. ... International Business Machines Corporation

12/24/15 / #20150370695

Testing optimized binary modules

Various embodiments test an optimized binary module. In one embodiment, a region in a set of original binary code of an original binary module in which branch coverage is expected to be achieved is selected based on a set of profile information. ... International Business Machines Corporation

12/24/15 / #20150370684

Management and correlation of network identification for communication errors

Various embodiments for management and correlation of communication errors by a processor device. A log is maintained that records each assignment of a particular network identification (id) with a specific device in a computer storage network, including at least one of a date the id was assigned and a time the id was assigned, such that a trace or review may later be performed to correlate the specific device with data associated with the device at the at least one of the date and the time for troubleshooting purposes.. ... International Business Machines Corporation

12/24/15 / #20150370671

Test virtual volumes for test environments

For test virtual volume operation testing, an identification module determines if an input/output (i/o) operation for a test virtual volume is directed to volume contents data. A disposition module executes the i/o operation in response to the i/o operation being directed to the volume contents data and declines the i/o operation in response to the i/o operation not being directed to the volume contents data.. ... International Business Machines Corporation

12/24/15 / #20150370669

Implementing enhanced wear leveling in 3d flash memories

A method, system and computer program product are provided for implementing enhanced wear leveling in a stack of flash memory chips. A flash memory includes plurality of flash memory chips including a number n data chips and one or more spare chips. ... International Business Machines Corporation

12/24/15 / #20150370658

Alternative port error recovery with limited system impact

Various embodiments for troubleshooting a network device in a computing storage environment by a processor. In response to an error in a specific port, an alternative error recovery operation is initiated on the port by performing at least one of initiating a silent recovery operation by reloading a failed instruction, taking the port offline, cleaning up any active transactions associated with the port, performing a hardware reset operation port, and bringing the port online.. ... International Business Machines Corporation

12/24/15 / #20150370654

File corruption recovery in concurrent data protection

An incremental backup system that performs the following (not necessarily in the following order): (i) making a plurality of time-ordered journal entries; (ii) determining that a corruption condition exists; (iii) responsive to a corruption condition, constructing a first incremental mirror data set that reflects a backup data set and all journal entries up to a first corrupted journal entry which is the earliest in time journal entry, of the plurality of journal entries, that is a corrupted journal entry; (iv) responsive to a corruption condition, constructing a second incremental mirror data set that reflects the backup data set and all journal entries up to the first corrupted journal entry; and (v) checking for corruption in the first and second incremental mirror data sets to determine the latest uncorrupted version of the data set.. . ... International Business Machines Corporation

12/24/15 / #20150370652

Back up and recovery in virtual machine environments

Embodiments of the present invention provide efficient and cost-effective systems and methods for backing up and recovering a virtual machine and application data therein. Embodiments of the present invention can be used to satisfy near-zero rpos by providing more recovery points for backups in virtual machine environments, while also providing increased granularity for recovery (i.e., single virtual disk, single file, etc.) and maintaining central management capabilities and back up efficiencies offered by virtual machine-level backups.. ... International Business Machines Corporation

12/24/15 / #20150370651

Directed backup for massively parallel processing databases

Creating a data backup of data on a first computer system to restore to a second computer system, each of the first and second computer system including one or more nodes, each node configured to manage a subset of the data. Receiving, by the first computer system, identification of data to back up and node configuration information for the second computer system. ... International Business Machines Corporation

12/24/15 / #20150370647

Directed backup for massively parallel processing databases

Creating a data backup of data on a first computer system to restore to a second computer system, each of the first and second computer system including one or more nodes, each node configured to manage a subset of the data. Receiving, by the first computer system, identification of data to back up and node configuration information for the second computer system. ... International Business Machines Corporation

12/24/15 / #20150370643

Method and system of distributed backup for computer devices in a network

A method and a distributed backup system for data backup are provided. The distributed backup system comprises a plurality of computer devices connected by a network. ... International Business Machines Corporation

12/24/15 / #20150370642

Implementing concurrent adapter firmware update for an sriov adapter in a virtualized system

A method, system and computer program product are provided for implementing concurrent adapter firmware update of a single root input/output virtualization (sriov) adapter in a virtualized system. An adapter driver is used to update adapter firmware concurrent with normal i/o operations. ... International Business Machines Corporation

12/24/15 / #20150370639

Back up and recovery in virtual machine environments

Embodiments of the present invention provide efficient and cost-effective systems and methods for backing up and recovering a virtual machine and application data therein. Embodiments of the present invention can be used to satisfy near-zero rpos by providing more recovery points for backups in virtual machine environments, while also providing increased granularity for recovery (i.e., single virtual disk, single file, etc.) and maintaining central management capabilities and back up efficiencies offered by virtual machine-level backups.. ... International Business Machines Corporation

12/24/15 / #20150370635

Implementing enhanced wear leveling in 3d flash memories

A method, system and computer program product are provided for implementing enhanced wear leveling in a stack of flash memory chips. A flash memory includes plurality of flash memory chips including a number n data chips and one or more spare chips. ... International Business Machines Corporation

12/24/15 / #20150370622

System verification of interactive screenshots and log files between client systems and server systems within a network computing environment

A computer-implemented method for system performance verification is provided. The computer-implemented method includes invoking an integrated system tool to perform system performance verification of a client system. ... International Business Machines Corporation

12/24/15 / #20150370614

Supporting atomic accumulation with an addressable accumulator

Atomically accumulating memory updates in a computer system configured with an accumulator that is memory mapped. The accumulator includes an accumulator memory and an accumulator queue and is configured to communicatively couple to a processor. ... International Business Machines Corporation

12/24/15 / #20150370613

Memory transaction having implicit ordering effects

In at least some embodiments, a processor core executes a code segment including a memory transaction and a non-transactional memory access instructions preceding the memory transaction in program order. The memory transaction includes at least an initiating instruction, a transactional memory access instruction, and a terminating instruction. ... International Business Machines Corporation

12/24/15 / #20150370611

Flexible deployment and migration of virtual machines

Virtual machines in a computer system cluster, or cloud environment, require access to their assigned storage resources connected to the virtual machines via storage area networks (san). Such virtual machines may be independent from associated physical servers in the computer system cluster on which they are deployed. ... International Business Machines Corporation

12/24/15 / #20150370610

Flexible deployment and migration of virtual machines

Virtual machines in a computer system cluster, or cloud environment, require access to their assigned storage resources connected to the virtual machines via storage area networks (san). Such virtual machines may be independent from associated physical servers in the computer system cluster on which they are deployed. ... International Business Machines Corporation

12/24/15 / #20150370609

Thread scheduling across heterogeneous processing elements with resource mapping

A method for scheduling processes of a workload on a plurality of hardware threads configured in a plurality of processing elements of a multithreading parallel computing system for processing thereby. Process dimensions for each process are determined based on processing attributes associated with each process, and a place and route algorithm is utilized to map the processes to a processor space representative of the processing resources of the computing system based at least in part on the process dimensions to thereby distribute the processes of the workload.. ... International Business Machines Corporation

12/24/15 / #20150370603

Dynamic parallel distributed job configuration in a shared-resource environment

Dynamically adjusting the parameters of a parallel, distributed job in response to changes to the status of the job cluster. Includes beginning execution of a job in a cluster, receiving cluster status information, determining a job performance impact of the cluster status, reconfiguring job parameters based on the performance impact, and continuing execution of the job using the updated configuration. ... International Business Machines Corporation

12/24/15 / #20150370601

Optimizing runtime performance of an application workload by minimizing network input/output communications between virtual machines on different clouds in a hybrid cloud topology during cloud bursting

A method, system and computer program product for optimizing runtime performance of an application workload. Network input/output (i/o) operations between virtual machines of a pattern of virtual machines servicing the application workload in a private cloud are measured over a period of time and depicted in a histogram. ... International Business Machines Corporation

12/24/15 / #20150370598

Common system services for managing configuration and other runtime settings of applications

Managing settings of applications is provided. A request from an application to store runtime settings, currently being used by the application, is identified by a processor executing program instructions for managing settings of applications. ... International Business Machines Corporation

12/24/15 / #20150370595

Implementing dynamic virtualization of an sriov capable sas adapter

A method, system and computer program product are provided for implementing dynamic virtualization of a single root input/output virtualization (sriov) capable serial attached scsi (sas) adapter. The sriov sas adapter includes a plurality of virtual functions (vfs). ... International Business Machines Corporation

12/24/15 / #20150370594

Optimizing runtime performance of an application workload by minimizing network input/output communications between virtual machines on different clouds in a hybrid cloud topology during cloud bursting

A method, system and computer program product for optimizing runtime performance of an application workload. Network input/output (i/o) operations between virtual machines of a pattern of virtual machines servicing the application workload in a private cloud are measured over a period of time and depicted in a histogram. ... International Business Machines Corporation

12/24/15 / #20150370588

Selecting optimal hypervisor platforms that satisfy application workload requirements

A method, system and computer program product for selecting hypervisor platforms that are best suited to process application workloads. Attribute requirements for an application workload, such as high cpu capacity, high power and low cost, are received. ... International Business Machines Corporation

12/24/15 / #20150370585

Dynamic code injection

Embodiments of the present invention disclose an approach for inserting code into a running thread of execution. A computer sets a first set of bits to a first value, wherein the first value indicates that a first set of instructions should be inserted onto a stack. ... International Business Machines Corporation

12/24/15 / #20150370581

Common system services for managing configuration and other runtime settings of applications

A method for managing settings of applications. A request from an application to store runtime settings currently being used by the application is identified. ... International Business Machines Corporation

12/24/15 / #20150370573

Speculative finish of instruction execution in a processor core

In a processor core, high latency operations are tracked in entries of a data structure associated with an execution unit of the processor core. In the execution unit, execution of an instruction dependent on a high latency operation tracked by an entry of the data structure is speculatively finished prior to completion of the high latency operation. ... International Business Machines Corporation

12/24/15 / #20150370566

Instruction set architecture with opcode lookup using memory attribute

A method decodes instructions based in part on one or more decode-related attributes stored in a memory address translation data structure such as an effective to real translation (erat) or translation lookaside buffer (tlb). A memory address translation data structure may be accessed, for example, in connection with a decode of an instruction stored in a page of memory, such that one or more attributes associated with the page in the data structure may be used to control how that instruction is decoded.. ... International Business Machines Corporation

12/24/15 / #20150370559

Endian-mode-independent memory access in a bi-endian-mode processor architecture

Embodiments relate to vector processors. An aspect includes endian-mode-sensitive memory instructions for a vector processor. ... International Business Machines Corporation

12/24/15 / #20150370558

Relocation of instructions that use relative addressing

Relocation of instructions that use relative addressing. Metadata relating to an instruction that uses relative addressing to access data and is to be relocated is stored prior to relocation. ... International Business Machines Corporation

12/24/15 / #20150370557

Floating point execution unit for calculating packed sum of absolute differences

A method provides support for packed sum of absolute difference operations in a floating point execution unit, e.g., a scalar or vector floating point execution unit. Existing adders in a floating point execution unit may be utilized along with minimal additional logic in the floating point execution unit to support efficient execution of a fixed point packed sum of absolute differences instruction within the floating point execution unit, often eliminating the need for a separate vector fixed point execution unit in a processor architecture, and thereby leading to less logic and circuit area, lower power consumption and lower cost.. ... International Business Machines Corporation

12/24/15 / #20150370556

Establishing subsystem boundaries based on call flow graph topology

According to one exemplary embodiment, a method for establishing subsystem boundaries is provided. The method may include receiving an input program having a plurality of subroutines and at least one inter-subroutine call. ... International Business Machines Corporation

12/24/15 / #20150370555

Compositing deltas when merging artifacts in a version control system

Embodiments of the present invention address deficiencies of the art in respect to merging artifacts in a version control system and provide a novel and non-obvious method, system and computer program product for compositing deltas when merging artifacts in a version control system. In one embodiment, a method for compositing deltas for artifacts can be provided. ... International Business Machines Corporation

12/24/15 / #20150370553

Wrapping computer software applications

Wrapping a computer software application by unpackaging the computer software application into constituent components including a data file that includes a listing of any of the components, modifying the data file to include a reference to a library, where the library is configured to cause communications between the computer software application and a computer operating system to be intercepted and processed by instructions within the library when the computer software application is executed by a computer, and repackaging the computer software application to include the library and any of the components listed in the modified data file.. . ... International Business Machines Corporation

12/24/15 / #20150370539

Transitive relationship in model diagram with elements and relationships

Depicting a uml (unified modeling language) model by: (i) receiving data model data corresponding to a data model including: (a) a plurality of entity nodes, (b) a plurality of transitive relationship links, with each transitive relationship link directly linking two entity nodes, and (c) a plurality of non-transitive relationship links, with each non-transitive relationship link directly linking two entity nodes; and (ii) presenting a presented portion of the data model, with presented portion including at least one transitive relationship link(s) and at least one non-transitive relationship link(s). The presentation of the presented portion includes at least one of the following features: (i) transitive relationship link(s) of the presented portion are presented in a different manner than the non-transitive relationship link(s) of the presented portion; and/or (ii) at least one connection path is represented as a multiple link path.. ... International Business Machines Corporation

12/24/15 / #20150370508

Leveraging a hybrid infrastructure for dynamic memory allocation and persistent file storage

Dynamic allocation of memory in a hybrid system is provided. In particularly, a method and system is provided to leverage a hybrid infrastructure for dynamic memory allocation and persistent file storage. ... International Business Machines Corporation

12/24/15 / #20150370507

Using the transaction-begin instruction to manage transactional aborts in transactional memory computing environments

When executed, a transaction-begin instruction specifies an initial value for a transaction-count-to-completion (ctc) value for a transaction. The initial value indicates a predicted duration of the transaction. ... International Business Machines Corporation

12/24/15 / #20150370506

Hint instruction for managing transactional aborts in transactional memory computing environments

When executed, a transaction-hint instruction specifies a transaction-count-to-completion (ctc) value for a transaction. The ctc value indicates how far a transaction is from completion. ... International Business Machines Corporation

12/24/15 / #20150370503

Effectively limitless apparent free space on storage device

A primary physical storage device has effectively limitless apparent free space. Responsive to receiving a request to dynamically allocate an amount of desired free space on the primary device to store new data on the primary device, and responsive to determining that an amount of actual free space on the primary device is insufficient to permit such allocation, existing data stored on the primary device is moved to a secondary storage device. ... International Business Machines Corporation

12/24/15 / #20150370500

Memory transaction having implicit ordering effects

In at least some embodiments, a processor core executes a code segment including a memory transaction and a non-transactional memory access instructions preceding the memory transaction in program order. The memory transaction includes at least an initiating instruction, a transactional memory access instruction, and a terminating instruction. ... International Business Machines Corporation

12/24/15 / #20150370414

Touch panel information processing

An information processing device for receiving user selections inputted using a touch panel includes an acquisition unit for acquiring a touch point on the touch panel touched by the user, a placement unit for placing, in an area surrounding a display reference point on a screen, the display of a plurality of input items capable of being inputted by the user by moving the touch point, a detection unit for detecting the direction of movement by the touch point from the initial touch point of the user, a calculation unit for calculating the angle of deviation between the direction of movement of the touch point by the user and a standard direction, and a correction unit for correcting the placement of the display of the plurality of input items in accordance with the angle of deviation.. . ... International Business Machines Corporation

12/24/15 / #20150370409

Disambiguation of touch-based gestures

A system, and computer program product for disambiguation of touch-based gestures are provided in the illustrative embodiments. At an application executing using a processor in a touch-sensitive device, a detection is made that the touch-based gesture does not correspond to a perimeter defining a action, wherein the touch-based gesture is made relative to the touch-sensitive device. ... International Business Machines Corporation

12/24/15 / #20150370308

Branch prediction with power usage prediction and control

A method maintains power usage prediction information for one or more functional units in branch prediction logic for a processing unit such that the power consumption of a functional unit may be selectively reduced in association with the execution of branch instructions when it is predicted that the functional unit will be idle subsequent to the execution of such branch instructions.. . ... International Business Machines Corporation

12/24/15 / #20150370276

Integrated circuit having regulated voltage island power system

Various embodiments include an integrated circuit (ic) structure having: a chip control logic; a chip power system connected with the chip control logic; and a voltage island connected with the chip control logic and the chip power system, the voltage island including: an interface component for interfacing with the chip power system and the chip control logic; a logic island connected with the interface component; and a voltage island power system connected with the interface component and the logic island, the voltage island power system independently controlling a voltage supplied to the logic island.. . ... International Business Machines Corporation

12/24/15 / #20150369925

Ultra-sensitive radiation dosimeters

A method of forming a transistor comprises forming a conducting substrate layer, forming a dielectric layer over the conducting substrate layer, forming a channel over at least a portion of the dielectric layer and forming first and second source/drain regions contacting respective first and second portions of the channel. The channel comprises a thin-film carbon material. ... International Business Machines Corporation

12/24/15 / #20150369878

System and method to reduce human activity damage-induced power outage

A method for predicting and managing an occurrence of a power outage resulting from human activity, the method comprising the steps of: obtaining at least one short-term notification of a planned human activity event; generating a corrected human activity notification as a function of the short-term notification and data corresponding to power grid information, geographical information relating to the power grid and customers utilizing the power grid, power grid customer information, and/or historical information corresponding to prior power outages resulting from human activity events; generating an outage probability as a function of the corrected human activity notification and trained predictive modeling data; generating an optimization model as a function of the outage probability; and initiating at least one action for mitigating the occurrence of the power outage resulting from human activity as a function of the optimization model.. . ... International Business Machines Corporation

12/24/15 / #20150369862

Efficient method of retesting integrated circuits

Efficient production testing of integrated circuits. A first production test is implemented on a group of integrated circuits and failures among the test group are assessed. ... International Business Machines Corporation

12/24/15 / #20150369789

Cleanability assessment of sublimate from lithography materials

A method of testing the cleanability of polymerized sublimate outgassed from a lithography material during a thermal heating process including; placing a wafer on a wafer hotplate inside a chamber with the wafer being covered by a lithography material; placing a target, having a starting composition, above the wafer in the chamber; heating the wafer using the wafer hotplate in an attempt to outgas a sublimate, where the sublimate condenses on the target; forming a polymerized sublimate on the target; and applying organic solvents to the target to determine the cleanability of the polymerized sublimate.. . ... International Business Machines Corporation

12/24/15 / #20150369735

Chemical sensors based on plasmon resonance in graphene

Techniques for forming nanoribbon or bulk graphene-based spr sensors are provided. In one aspect, a method of forming a graphene-based spr sensor is provided which includes the steps of: depositing graphene onto a substrate, wherein the substrate comprises a dielectric layer on a conductive layer, and wherein the graphene is deposited onto the dielectric layer; and patterning the graphene into multiple, evenly spaced graphene strips, wherein each of the graphene strips has a width of from about 50 nanometers to about 5 micrometers, and ranges therebetween, and wherein the graphene strips are separated from one another by a distance of from about 5 nanometers to about 50 micrometers, and ranges therebetween. ... International Business Machines Corporation

12/24/15 / #20150369612

Providing route guide using building information modeling (bim) data

Providing a route guide to a destination using building information modeling (bim) data. A request from a user for a route guide to a destination in a building is received. ... International Business Machines Corporation

12/24/15 / #20150369597

Preventing substrate penetrating devices from damaging obscured objects

Various embodiments manage the operation of a substrate penetrating device. In one embodiment, a set of location information associated with a substrate penetrating device is received. ... International Business Machines Corporation

12/24/15 / #20150368090

Micro-electro-mechanical system (mems) structures and design structures

Micro-electro-mechanical system (mems) structures, methods of manufacture and design structures are disclosed. The method includes forming a micro-electro-mechanical system (mems) beam structure by venting both tungsten material and silicon material above and below the mems beam to form an upper cavity above the mems beam and a lower cavity structure below the mems beam.. ... International Business Machines Corporation

12/24/15 / #20150366972

Methods and materials for therapeutic delivery

Methods for preparing a supramolecular therapeutic agent delivery assembly are provided. A hydrophilic precursor, a hydrophibic precursor, and an aromatic diamine precursor may be combined to form an amphiphilic block co-polymer. ... International Business Machines Corporation

12/24/15 / #20150366202

Antimicrobial pht coatings

Methods for making antimicrobial coating materials are described. Antimicrobial materials and antimicrobial material precursors are formed from hexahydrotriazine and/or a hemiaminal material and a non-fouling material and adhesive material may be incorporated into the antimicrobial materials and antimicrobial material precursors. ... International Business Machines Corporation

12/17/15 / #a polyoctatriazacane molecule is disclosed that has a plurality of octatriazacane groups having the structure

International Business Machines Corporation

. . ... International Business Machines Corporation

12/17/15 / #20150366078

Overvoltage protection circuit

Universal serial bus (usb) protection circuits are provided. A circuit includes a plurality of first transistors connected in series between a pad and ground. ... International Business Machines Corporation

12/17/15 / #20150365658

Managing a display

A system and computer implemented method for managing a display for a software application is disclosed. The software application may have a set of portions. ... International Business Machines Corporation

12/17/15 / #20150365642

Cloaking device

A method for cloaking an object from an observer is provided in the illustrative embodiments. A hardware device is affixed to the object such that the observer observes a presentation on the device when observing the object. ... International Business Machines Corporation

12/17/15 / #20150365630

Data center raised floor monitoring

One or more aspects relates to monitoring conditions under a raised floor in a data center. A grid of raised floor tiles has regular floor tiles interspersed with sensor floor tiles. ... International Business Machines Corporation

12/17/15 / #20150365494

Optimizing network communications

A mechanism is provided for optimizing network communications. A first data transfer request is received via a first application level socket connection in an originating computing device. ... International Business Machines Corporation

12/17/15 / #20150365493

Optimizing network communications

A mechanism is provided for optimizing network communications. A first data transfer request is received via a first application level socket connection in an originating computing device. ... International Business Machines Corporation

12/17/15 / #20150365478

Cloud infrastructure backup in a shared storage environment

A technique for cloud infrastructure backup in a virtualized environment utilizing shared storage includes obtaining a workload input/output (i/o) profile to the shared storage over a time period. An attempt to locate one or more time windows in the workload i/o profile for which a cloud infrastructure backup can be staged is initiated. ... International Business Machines Corporation

12/17/15 / #20150365459

Quality of experience for communication sessions

A computer-implemented method, computer program product, and computing system is provided for managing quality of experience for communication sessions. In an implementation, a method may include determining a change in an optimum video size for a streaming video. ... International Business Machines Corporation

12/17/15 / #20150365452

Quality of experience for communication sessions

A computer-implemented method, computer program product, and computing system is provided for managing quality of experience for communication sessions. In an implementation, a method may include determining a change in an optimum video size for a streaming video. ... International Business Machines Corporation

12/17/15 / #20150365440

Shared security utility appliance for secure application and data processing

A method includes registering an application with a security information technology element (ite), the security ite comprising a secure computing device located within a protection envelope and configured to provide security services for one or more applications. The security ite provides security services to applications and a secure processing environment for hosting applications, and includes cryptographic services and hardware acceleration. ... International Business Machines Corporation

12/17/15 / #20150365437

Managing software deployment

The method includes identifying an instance of software installed. The method further includes determining a fingerprint corresponding to the instance of software installed. ... International Business Machines Corporation

12/17/15 / #20150365435

Shared security utility appliance for secure application and data processing

A security information technology element (ite) for secure application and data processing, including a physical enclosure defining a protection envelope and a secure computing device disposed within the protection envelope. The security ite provides security services to applications and a secure processing environment for hosting applications, and includes cryptographic services and hardware acceleration. ... International Business Machines Corporation

12/17/15 / #20150365434

Rotation of web site content to prevent e-mail spam/phishing attacks

Embodiments of the invention provide a method, system and computer program product for phishing attack management through web site content rotation. In an embodiment of the invention, a method for phishing attack management through web site content rotation is provided. ... International Business Machines Corporation

12/17/15 / #20150365407

Authentication of mobile applications

Embodiments of the present invention provide a system, method and computer program product for authenticating a mobile application. According to one embodiment the method comprises registering, by a computer processor of a computer system, the mobile application, wherein the registration includes receiving and storing information associated with the mobile application, receiving, by the computer processor, one or more application details associated with the mobile application from a computing device, comparing, by the computer processor, the received one or more application details associated with the mobile application with the stored information associated with the mobile application, generating, by the computer processor, a notification based on the comparison to indicate authenticity of the mobile application and sending the notification to the computing device.. ... International Business Machines Corporation

12/17/15 / #20150365401

Captcha challenge incorporating obfuscated characters

A method for determining if a user of a computer system is a human. A processor receives an indication that a computer security program is needed and acquires at least one image depicting a first string of characters including at least a first and second set of one or more characters. ... International Business Machines Corporation

12/17/15 / #20150365396

Multiple input based passwords

A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method comprises the steps of determining, by one or more processors, one or more input methods supported for a password entry, wherein the password entry verifies a user's credentials; receiving, by one or more processors, a candidate password through the one or more input methods, wherein each character of the candidate password has an associated input method; and storing, by one or more processors, the candidate password as the password entry, along with the associated input method for each character of the candidate password.. ... International Business Machines Corporation

12/17/15 / #20150365372

Systems and methods for using social network analysis to schedule communications

Systems and methods for improving the effectiveness of communications over a social network. A method for controlling network communication, comprises analyzing a social network in response to a request made by a user to send a message to a node in the social network, delaying for a period of time sending of the message based on a result of the analyzing, and sending the message to the node in the social network after the period of time has elapsed.. ... International Business Machines Corporation

12/17/15 / #20150365330

Packet i/o support for a logical switch router architecture

A tool for packet transmission and delivery in a distributed system. The tool determines one or more packets is classified as a l3 packet. ... International Business Machines Corporation

12/17/15 / #20150365327

Reducing network and appliances load through cooperative control plane decisions

Systems and methods for forwarding data packets in a communications network, the method comprising: providing information included in a first portion of a data packet to a network policy unit, in response to a forwarding device receiving a data packet to be forwarded over one or more network routes; forwarding the data packet according to a flow policy, in response to the forwarding device receiving the flow policy from the network policy unit, wherein the flow policy applied to the data packet by the forwarding device is determined by the network policy unit based on the network policy unit performing an analysis of the information included in the first portion of the data packet in view of policy information provided to the network policy unit.. . ... International Business Machines Corporation

12/17/15 / #20150365326

Controlling incoming traffic

A method and system are provided for controlling a volume of incoming traffic into a network having a plurality of ingress routers. The method includes monitoring respective loads of the plurality of ingress routers. ... International Business Machines Corporation

12/17/15 / #20150365311

Scalable software monitoring infrastructure, using parallel task queuing, to operate in elastic cloud environments

Provided are a method, a system, and a computer program product in which a plurality of cloud images that execute in a plurality of nodes are maintained by a monitoring server, in a cloud computing environment. The monitoring server maintains information on an increase and a decrease in number of the plurality of cloud images in the cloud computing environment.. ... International Business Machines Corporation

12/17/15 / #20150365308

Automatic transformation of messages between service versions

A method and system are provided for automatic transformation of messages between service versions. The method includes collecting message data of messages sent to two or more versions of a service. ... International Business Machines Corporation

12/17/15 / #20150365304

Secure metering and accounting for cloud services

Managing a service is provided. Information is collected about use of a set of resources by the service. ... International Business Machines Corporation

12/17/15 / #20150365297

Resource provisioning using predictive modeling in a networked computing environment

An approach is provided for allowing a network computing (e.g., cloud computing) infrastructure to modify its resource allocation plan (e.g., an instance count) by using a kth derivative vector plot, which may be generated using historical logs. Among other things, this approach enables an infrastructure to project an allocation forecast for a specified duration and adapt to changes in network traffic.. ... International Business Machines Corporation

12/17/15 / #20150365292

System and method for rerouting services using routing policies in a multiple resource node system

A method, system and computer program product for configuring active resource nodes in a distributed computing system controlled by an administrative control module. The method includes identifying a first configuration of active resource nodes having at least two or more active resource nodes and detecting a modification of a link representing at least one connection between the active resource nodes. ... International Business Machines Corporation

12/17/15 / #20150365291

Usage policy for resource management

A tool for a computing service using a computing usage policy. The tool receives by one or more computer processors, a configured usage policy. ... International Business Machines Corporation

12/17/15 / #20150365286

Operating a dual chipset network interface controller ('nic') that includes a high performance media access control chipset and a low performance media access control chipset

Operating a dual chipset network interface controller (‘nic’) that includes a high performance media access control chipset and a low performance media access control chipset, including: determining, by a nic control module, an amount of network traffic being processed by the nic; determining, by the nic control module, whether the amount of network traffic being processed by the nic exceeds a predetermined threshold; responsive to determining that the amount of network traffic being processed by the nic exceeds a predetermined threshold, configuring, by the nic control module, the nic to utilize the high performance media access control chipset for data communications operations; and responsive to determining that the amount of network traffic being processed by the nic does not exceed the predetermined threshold, configuring, by the nic control module, the nic to utilize the low performance media access control chipset for data communications operations.. . ... International Business Machines Corporation

12/17/15 / #20150365274

Live partition mobility with shared persistent reservations

According to one embodiment of the present invention, a method is provided. The method may include a computer registering a first instance of a logical partition on a source server with a logical unit and placing a first persistent reservation on the logical unit, wherein the first persistent reservation indicates that only the first instance of the logical partition can hold a reservation on the logical unit. ... International Business Machines Corporation

12/17/15 / #20150365270

Active ip forwarding in an event driven virtual link aggregation (vlag) system

In one embodiment, a networking switch includes an interswitch link (isl) interface configured to communicate with a second networking switch via an isl and a networking port configured to connect to an access switch in layer-2 (l2) via a virtual link aggregation (vlag) with the second networking switch. The networking switch includes a virtual router redundancy protocol (vrrp) module configured to perform active interact protocol (ip) forwarding. ... International Business Machines Corporation

12/17/15 / #20150365259

Millimeter wave phase shifters using tunable transmission lines

Tunable phase shifters and methods for using the same include a signal line; one or more grounding lines; one or more crossing lines below the signal line in proximity to the signal line and substantially perpendicular to a longitudinal direction of the signal line, where the crossing lines conform to the shape of the signal line along at least three surfaces of the signal line and where the crossing lines have a tunable capacitance; and an inductance return line below the crossing lines substantially parallel to the longitudinal direction of the signal line, where the inductance return line provides a tunable inductance.. . ... International Business Machines Corporation

12/17/15 / #20150365227

Shared security utility appliance for secure application and data processing

A security information technology element (ite) for secure application and data processing, including a physical enclosure defining a protection envelope and a secure computing device disposed within the protection envelope. The security ite provides security services to applications and a secure processing environment for hosting applications, and includes cryptographic services and hardware acceleration. ... International Business Machines Corporation

12/17/15 / #20150365225

Tracing data from an asynchronous interface

An apparatus for tracing data from a data bus in a first clock domain operating at a first clock frequency to a trace array in a second clock domain operating at a second clock frequency, wherein the first clock frequency is lower than the second clock frequency. The apparatus includes a change detector to detect a change of the data on the data bus in the first clock domain, a trigger responsive to the change detector to send a trigger pulse to the second clock domain, pulse synchronization on the second clock domain responsive to the trigger pulse to synchronize the trigger pulse to the second clock frequency of the second clock domain by a meta-stability latch, as well as a data capture in the second clock domain responsive to the pulse synchronization to capture data from the data bus and to store the captured data in the trace array.. ... International Business Machines Corporation

12/17/15 / #20150365092

Solving constraint satisfaction problems using a field programmable gate array

A method for configuring a field programmable gate array (fpga) with a constraint satisfaction problem (csp) assignment having multiple constraint expressions, the method comprising: setting each of the multiple constraint expressions as a configurable logic block (clb) in the fpga, to yield multiple clbs; setting an assignment vector in the fpga, wherein the assignment vector is a number vector configured to store a candidate solution to the csp assignment; and forming a feedback loop by connecting the assignment vector to inputs of the multiple clbs, and connecting outputs of the multiple clbs to the assignment vector. Further disclosed is a design structure for the fpga, optionally residing on a storage medium as a data format used for the exchange of layout data of integrated circuits.. ... International Business Machines Corporation

12/17/15 / #20150365076

Clock buffers with pulse drive capability for power efficiency

A clock driver and corresponding method are provided. The clock driver includes a multi-stage delay cell having logic circuitry and a plurality of serially connected delay elements. ... International Business Machines Corporation

12/17/15 / #20150364940

Dynamically configurable auto-healing battery

A method, apparatus, and computer program product for a dynamically configurable auto-healing battery are provided in the illustrative embodiments. Identification of a condition is performed within the battery. ... International Business Machines Corporation

12/17/15 / #20150364914

Structure and method for dynamic biasing to improve esd robustness of current mode logic (cml) drivers

An integrated circuit having a cml driver including a driver biasing network. A first output pad and a second output pad are connected to a voltage pad. ... International Business Machines Corporation

12/17/15 / #20150364636

Integrated photodetector waveguide structure with alignment tolerance

An encapsulated integrated photodetector waveguide structures with alignment tolerance and methods of manufacture are disclosed. The method includes forming a waveguide structure bounded by one or more shallow trench isolation (sti) structure(s). ... International Business Machines Corporation

12/17/15 / #20150364620

Integrated photodetector waveguide structure with alignment tolerance

An encapsulated integrated photodetector waveguide structures with alignment tolerance and methods of manufacture are disclosed. The method includes forming a waveguide structure bounded by one or more shallow trench isolation (sti) structure(s). ... International Business Machines Corporation

12/17/15 / #20150364619

Integrated photodetector waveguide structure with alignment tolerance

An encapsulated integrated photodetector waveguide structures with alignment tolerance and methods of manufacture are disclosed. The method includes forming a waveguide structure bounded by one or more shallow trench isolation (sti) structure(s). ... International Business Machines Corporation

12/17/15 / #20150364611

Semiconductor devices with semiconductor bodies having interleaved horizontal portions and method of forming the devices

Disclosed are semiconductor devices (e.g., diodes, such as pn junction diodes and pin junction diodes, and capacitors) that have semiconductor bodies with interleaved horizontal portions. In the case of a diode, the semiconductor bodies can have different type conductivities and, optionally, can be separated by an intrinsic semiconductor layer. ... International Business Machines Corporation

12/17/15 / #20150364603

Finfet and nanowire semiconductor devices with suspended channel regions and gate structures surrounding the suspended channel regions

A semiconductor device including at least one suspended channel structure of a silicon including material, and a gate structure present on the suspended channel structure. At least one gate dielectric layer is present surrounding the suspended channel structure, and at least one gate conductor is present on the at least one gate dielectric layer. ... International Business Machines Corporation

12/17/15 / #20150364571

Stable nickel silicide formation with fluorine incorporation and related ic structure

A method of forming a stable nickel silicide layer is provided. The method may include forming a nickel silicide layer on a substrate. ... International Business Machines Corporation

12/17/15 / #20150364555

P-fet with graded silicon-germanium channel

A method of forming a semiconductor structure includes forming a silicon-germanium layer on a semiconductor region of a substrate having a specific concentration of germanium atoms. The semiconductor region and the silicon-germanium layer are annealed to induce a non-homogenous thermal diffusion of germanium atoms from the silicon-germanium layer into the semiconductor region to form a graded silicon-germanium region. ... International Business Machines Corporation

12/17/15 / #20150364544

Silicon nanowire formation in replacement metal gate process

Techniques for a semiconductor device are provided. Techniques are directed to forming a semiconductor device by: forming a fin structure in a substrate, forming a protective layer over an upper portion of the fin structure, the protective layer having an etch selectivity with respect to a material of the fin structure, and performing an undercut etch so as to remove a lower portion of the fin structure below the protective layer, thereby defining a nanowire structure from the fin structure. ... International Business Machines Corporation

12/17/15 / #20150364543

Silicon nanowire formation in replacement metal gate process

Techniques for a semiconductor device are provided. Techniques are directed to forming a semiconductor device by: forming a fin structure in a substrate, forming a protective layer over an upper portion of the fin structure, the protective layer having an etch selectivity with respect to a material of the fin structure, and performing an undercut etch so as to remove a lower portion of the fin structure below the protective layer, thereby defining a nanowire structure from the fin structure. ... International Business Machines Corporation

12/17/15 / #20150364534

Non-planar capacitors with finely tuned capacitance values and methods of forming the non-planar capacitors

Disclosed are non-planar capacitors with finely tuned capacitances and methods of forming them. The capacitors each incorporate one or more semiconductor bodies and one or more gate stacks traversing the one or more semiconductor bodies. ... International Business Machines Corporation

12/17/15 / #20150364533

Methods of manufacturing polyresistors with selected tcr

Various embodiments provide computer program products and computer implemented methods. In some embodiments, aspects provide for a method of manufacturing a polysilicon resistor with a selected temperature coefficient of resistance (tcr), the method including selecting a sheet resistance for the polysilicon resistor, the selected sheet resistance being related to a selected film thickness of the polysilicon resistor, selecting a dose level for a grain size modulating species (gsms) for modulating an average grain size of grains of the polysilicon resistor, selecting a thermal coefficient of resistance (tcr) for the polysilicon resistor, the tcr being related to a selected average grain size of the polysilicon and forming the polysilicon resistor on a substrate, the polysilicon resistor having the selected sheet resistance, the selected gsms dose level and the selected tcr.. ... International Business Machines Corporation

12/17/15 / #20150364498

Back biased transistor and current source biasing

A semiconductor chip device may include a silicon on insulator (soi) base, a first transistor, and a voltage device. The soi base may include a semiconductor substrate having a first doped layer and a second doped layer directly on the first doped layer, a buried oxide layer directly on the second doped layer, and a first moat electrically isolating a first bias region of the second doped layer. ... International Business Machines Corporation

12/17/15 / #20150364492

Single-chip field effect transistor (fet) switch with silicon germanium (sige) power amplifier and methods of forming

Various embodiments include field effect transistors (fets) and related integrated circuit (ic) layouts. One fet includes: a silicon substrate including a set of trenches; a first oxide abutting the silicon substrate; a silicon germanium (sige) layer overlying the silicon substrate; a silicon layer overlying the sige layer; a second oxide overlying the silicon layer, wherein the silicon layer includes a plurality of salicide regions; a gate structure overlying the second oxide between adjacent salicide regions; and a first contact contacting the gate structure; a second contact contacting one of the salicide regions; a third oxide partially filling the set of trenches and extending above the silicon layer overlying the sige layer; and an air gap in each of the set of trenches, the air gap surrounded by the third oxide.. ... International Business Machines Corporation

12/17/15 / #20150364476

Semiconductor structure having buried conductive elements

Embodiments for the present invention provide a semiconductor device and methods for fabrication. In an embodiment of the present invention, a semiconductor structure comprises a first conductor horizontally formed on a semiconductor substrate. ... International Business Machines Corporation

12/17/15 / #20150364419

Formation of metal resistor and e-fuse

Embodiments of present disclosure provide methods of forming a resistor. One such method can include forming a first transistor structure and a second transistor structure on a semiconductor substrate, wherein the first transistor structure includes a dummy gate thereon; forming a mask on the first transistor structure; forming a metal gate on the second transistor structure; removing the mask, after the forming of the metal gate, to expose the first transistor structure; and siliciding a top portion of the dummy gate of the first transistor structure to yield a resistor.. ... International Business Machines Corporation

12/17/15 / #20150364416

Semiconductor structures having low resistance paths throughout a wafer

A semiconductor structure with low resistance conduction paths and methods of manufacture are disclosed. The method includes forming at least one low resistance conduction path on a wafer, and forming an electroplated seed layer in direct contact with the low resistance conduction path.. ... International Business Machines Corporation

12/17/15 / #20150364401

Double-sided segmented line architecture in 3d integration

Embodiments of the present invention relate generally to electronic components such as semiconductor wafers and more particularly, to a double-sided three-dimensional (3d) hierarchal architecture scheme for multiple semiconductor wafers using an arrangement of through silicon vias (tsvs) and backside wiring. In an embodiment a first word line architecture may be formed on a front side of an ic chip and connected to a second word line architecture formed on a back side of the ic chip through intra-wafer, tsvs, thereby relocating required wiring to the back side of the ic chip.. ... International Business Machines Corporation

12/17/15 / #20150364398

Mol resistor with metal grid heat shield

An semiconductor structure, method of fabrication therefor, and design structure therefor is provided. A thermal grid is formed over at least a portion of a substrate. ... International Business Machines Corporation

12/17/15 / #20150364382

Back biased transistor and current source biasing

A semiconductor chip device may include a silicon on insulator (soi) base, a first transistor, and a voltage device. The soi base may include a semiconductor substrate having a first doped layer and a second doped layer directly on the first doped layer, a buried oxide layer directly on the second doped layer, and a first moat electrically isolating a first bias region of the second doped layer. ... International Business Machines Corporation

12/17/15 / #20150364368

Semiconductor structures having low resistance paths throughout a wafer

A semiconductor structure with low resistance conduction paths and methods of manufacture are disclosed. The method includes forming at least one low resistance conduction path on a wafer, and forming an electroplated seed layer in direct contact with the low resistance conduction path.. ... International Business Machines Corporation

12/17/15 / #20150364367

Semiconductor structures having low resistance paths throughout a wafer

A semiconductor structure with low resistance conduction paths and methods of manufacture are disclosed. The method includes forming at least one low resistance conduction path on a wafer, and forming an electroplated seed layer in direct contact with the low resistance conduction path.. ... International Business Machines Corporation

12/17/15 / #20150364365

Enhancement of iso-via reliability

A process of making a semiconductor structure. The process includes forming a wiring line; forming a reliability enhancement material on the wiring line; forming an interlayer dielectric (ild) layer on the wiring line; forming a via opening through the ild layer and reliability enhancement material to expose a surface of the wiring line; and filling the via opening with a metal to form a metal-filled via in contact with the wiring line wherein the reliability enhancement material is in direct contact with the metal-filled via; wherein the reliability enhancement material causes a compressive stress on the metal-filled via where it contacts the wiring line. ... International Business Machines Corporation

12/17/15 / #20150364362

Wafer stress control with backside patterning

Embodiments of the present invention provide structures and methods for controlling stress in semiconductor wafers during fabrication. Features such as deep trenches (dts) used in circuit elements such as trench capacitors impart stress on a wafer that is proportional to the surface area of the dts. ... International Business Machines Corporation

12/17/15 / #20150364361

Shallow trench isolation regions made from crystalline oxides

A method of manufacturing a semiconductor device that involves etching a trench in a semiconductor substrate, epitaxially growing a crystalline structure in the trench and forming semiconductor structures on either side of the crystalline structure. Crystalline oxides may include rare earth oxides, aluminum oxides or perovskites.. ... International Business Machines Corporation

12/17/15 / #20150364343

Thermal interface material on package

A packaged assembly is disclosed, including thermal interface material dispensed on an organic package and methods of manufacturing. The method includes dispensing a thermal interface material (tim) on an electronic assembly. ... International Business Machines Corporation

12/17/15 / #20150364342

Thermal interface material on package

A packaged assembly is disclosed, including thermal interface material dispensed on an organic package and methods of manufacturing. The method includes dispensing a thermal interface material (tim) on an electronic assembly. ... International Business Machines Corporation

12/17/15 / #20150364341

Thermal interface material on package

A packaged assembly is disclosed, including thermal interface material dispensed on an organic package and methods of manufacturing. The method includes dispensing a thermal interface material (tim) on an electronic assembly. ... International Business Machines Corporation

12/17/15 / #20150364248

High-q multipath parallel stacked inductor

A parallel stacked multipath inductor includes a first layer including turns disposed about a center region, the turns on the first layer having segments that extend length-wise along the turns, the segments having positions that vary from an innermost position relative to the center region and an outermost position relative to the center region. A second layer includes turns electrically connected to the first layer along its length and disposed about the center region, the turns on the second layer having segments that extend length-wise along the turns, the segments having positions that vary from an innermost position and an outermost position relative to the center region. ... International Business Machines Corporation

12/17/15 / #20150364241

Solenoidal series stacked multipath inductor

A series stacked, solenoidally wound, multipath inductor includes a plurality of turns disposed about a center region on two layers. The turns on the two layers have corresponding geometry therebetween. ... International Business Machines Corporation

12/17/15 / #20150364195

Writing multiple levels in a phase change memory

Structures and methods for a multi-bit phase change memory are disclosed herein. A method includes establishing a write-reference voltage that incrementally ramps over a write period. ... International Business Machines Corporation

12/17/15 / #20150364194

Writing multiple levels in a phase change memory

Structures and methods for a multi-bit phase change memory are disclosed herein. A method includes establishing a write-reference voltage that incrementally ramps over a write period. ... International Business Machines Corporation

12/17/15 / #20150364189

Estimation of level-thresholds for memory cells

Methods and apparatus are provided for determining level-thresholds for q-level memory cells. A group of the memory cells are read to obtain respective read signal components. ... International Business Machines Corporation

12/17/15 / #20150364147

Filled-gap magnetic recording head and method of making

A magnetic head, according to one embodiment, includes a rowbar substrate having a tape support surface and a gap surface at a substrate edge. A closure is positioned opposite the gap surface of the rowbar substrate, the closure forming a portion of the tape support surface. ... International Business Machines Corporation

12/17/15 / #20150364039

Regional driving trend modification using autonomous vehicles

Embodiments of the present invention disclose a method, computer program product, and a computer system for modifying regional driving habits. A computer determines a first value associated with a regional driving habit for a region. ... International Business Machines Corporation

12/17/15 / #20150363909

Scaling content on touch-based systems

Methods and systems may provide for detecting a manual addition of first content to an interactive display and defining a content boundary around the first content. Additionally, a first automatic rescaling of the first content within the content boundary may be conducted in response to one or more of a manual modification of the first content or a trigger related to a characteristic of the first content. ... International Business Machines Corporation

12/17/15 / #20150363908

Scaling content on touch-based system

Methods and systems may provide for detecting a manual addition of first content to an interactive display and defining a content boundary around the first content. Additionally, a first automatic rescaling of the first content within the content boundary may be conducted in response to one or more of a manual modification of the first content or a trigger related to a characteristic of the first content. ... International Business Machines Corporation

12/17/15 / #20150363830

System and method to provide information based on predicted route of travel

A method implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine a current location of a user, predict a change of direction of the user, and provide at least one advertisement to the user based on the predicted change of direction of the user.. . ... International Business Machines Corporation

12/17/15 / #20150363798

Method, computer system and computer program for estimating purchase behavior of customer in store or across stores

A technique that can estimate purchase behavior of a customer in a store is provided. The technique includes acquiring article information on at least one article that a target customer purchases in the store, and layout information on each store and shelving allocation information on each store. ... International Business Machines Corporation

12/17/15 / #20150363744

Tracking changes in resumes to identify persons interested in acquiring a new position

A method, system, and computer program product for identifying persons who may be interested in acquiring a new position by tracking changes in their resumes. The present invention provides an efficient method to both prevent employee attrition and to signal to potential future employers that the person may become available soon. ... International Business Machines Corporation

12/17/15 / #20150363733

Project workspace prioritization

Prioritization of project workspaces is provided herein. Data items are grouped into project workspaces based on workspace identifiers with which the data items have been tagged. ... International Business Machines Corporation

12/17/15 / #20150363729

Dynamic aggregation of disparate enterprise data

Methods, systems, and computer program products for dynamically aggregating data from disparate sources. A computer implemented method involves initializing a scheduler application to create one or more intermediate tables. ... International Business Machines Corporation

12/17/15 / #20150363722

Event scheduler based on real-time analytics and business rules

Scheduling a given event, in one aspect, may include obtaining a set of one or more business rules, obtaining analytics, and obtaining an event specification. The event specification may include at least one content specification and two or more transmission modes. ... International Business Machines Corporation

12/17/15 / #20150363707

Frequency separation between qubit and chip mode to reduce purcell loss

A system, method, and chip to control purcell loss are described. The chip includes qubits formed on a first surface of a substrate. ... International Business Machines Corporation

12/17/15 / #20150363703

Automated multi-objective solution selection

A method, apparatus and product for automated multi-objective solution selection. The method comprises obtaining a set of solutions to a multi-objective problem, wherein each solution is a non-dominated solution. ... International Business Machines Corporation

12/17/15 / #20150363698

Dynamic content delivery based on high-affinity viewer points

Identify the presence of people in a particular area and determine the object of visual attention of each person. Based on this information, select and deliver content through nearby adaptive content delivery devices based on characteristics of these objects when considered collectively, such as based on the object attracting the greatest amount of attention from passers-by. ... International Business Machines Corporation

12/17/15 / #20150363691

Managing software bundling using an artificial neural network

An artificial neural network is used to manage software bundling. During a training phase, the artificial neural network is trained using previously bundled software components having known values for identification attributes and known software bundle asociations. ... International Business Machines Corporation

12/17/15 / #20150363690

Unsupervised, supervised, and reinforced learning via spiking computation

The present invention relates to unsupervised, supervised and reinforced learning via spiking computation. The neural network comprises a plurality of neural modules. ... International Business Machines Corporation

12/17/15 / #20150363687

Managing software bundling using an artificial neural network

An artificial neural network is used to manage software bundling. During a training phase, the artificial neural network is trained using previously bundled software components having known values for identification attributes and known software bundle asociations. ... International Business Machines Corporation

12/17/15 / #20150363597

Preventing re-patching by malware on a computer

Preventing re-patching by malware on a computer by detecting a request to modify a write-protection attribute of a memory location within a memory of a computer to allow the memory location to be written to, where the detecting is performed subsequent to the detection of activity identified as malware-related activity involving the memory location, and preventing modification of the write-protection attribute of the memory location.. . ... International Business Machines Corporation

12/17/15 / #20150363596

Securing a shared serial bus

A method for securing a serial bus shared by a control module and one or more subordinate electronic devices, the serial bus having a protocol specifying that messages on the serial bus have a source address and a destination address. The method comprises examining, by one or more processors of the control module, each message appearing on the serial bus that was not originated by the control module; identifying, by one or more processors of the control module, a suspect message that satisfies one or more suspect message criteria. ... International Business Machines Corporation

12/17/15 / #20150363595

Computer security monitoring with triggered reporting

A computer security method including periodically recording a screenshot of what is displayed on a display of a computer, thereby recording a plurality of screenshots, selecting, in accordance with predefined selection criteria, any of the screenshots that were recorded near detection of a security-related condition, and providing any of the selected screenshots in association with the detection of the security-related condition.. . ... International Business Machines Corporation

12/17/15 / #20150363592

Multiple input based passwords

A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method comprises the steps of determining, by one or more processors, one or more input methods supported for a password entry, wherein the password entry verifies a user's credentials; receiving, by one or more processors, a candidate password through the one or more input methods, wherein each character of the candidate password has an associated input method; and storing, by one or more processors, the candidate password as the password entry, along with the associated input method for each character of the candidate password.. ... International Business Machines Corporation

12/17/15 / #20150363554

Configuring accessibility settings following a medical change

In an approach to configuring accessibility settings on an electronic device, a first computing device receives a first electronic data including at least one medical change made to an electronic medical record corresponding to a user. The first computing device determines at least one accessibility settings recommendation for an electronic device of the user, based, at least in part, on the received first electronic data. ... International Business Machines Corporation

12/17/15 / #20150363539

Structure and method for dynamic biasing to improve esd robustness of current mode logic (cml) drivers

An integrated circuit having a cml driver including a driver biasing network. A first output pad and a second output pad are connected to a voltage pad. ... International Business Machines Corporation

12/17/15 / #20150363536

Correcting for stress induced pattern shifts in semiconductor manufacturing

Apparatus, method and computer program product for reducing overlay errors during a semiconductor photolithographic mask design process flow. The method obtains data representing density characteristics of a photo mask layout design; predicts stress induced displacements based on said obtained density characteristics data; and corrects the mask layout design data by specifying shift movement of individual photo mask design shapes to pre-compensate for predicted displacements. ... International Business Machines Corporation

12/17/15 / #20150363535

Silicon waveguide structure with arbitrary geometry on bulk silicon substrate, related systems and program products

Various embodiments include a silicon-based optical waveguide structure locally on a bulk silicon substrate, and systems and program products for forming such a structure by modifying an integrated circuit (ic) design structure. Embodiments include implementing processes of preparing manufacturing data for formation of the ic design structure in a computer-implemented ic formation system, wherein the preparing of the manufacturing data includes inserting instructions into the manufacturing data to convert an edge of the at least one shape from a <110> crystallographic direction to a <100> crystallographic direction.. ... International Business Machines Corporation

12/17/15 / #20150363531

Optimization of integrated circuit physical design

According to one embodiment of the present invention, a method for optimizing an integrated circuit design is provided. The method may include identifying one or more nets crossing a boundary between a parent block, having parent logic, and a child block, having child logic. ... International Business Machines Corporation

12/17/15 / #20150363518

Dynamic operating procedures for emergency response

An occurrence of an emergency event can be detected. Parameters corresponding to performance of a first plurality of tasks performed in accordance with an existing operating procedure in response to the emergency event can be monitored. ... International Business Machines Corporation

12/17/15 / #20150363511

Utilizing reference/id linking in xml wrapper code generation

Utilizing reference/identification (id) linking in extensible markup language (xml) wrapper code generation in a data processing system. A code generator receives a type document and reference/id constraints document and accesses the reference/id constraints document to translate between xml structures and object structures.. ... International Business Machines Corporation

12/17/15 / #20150363501

Analytics based on pipes programming model

A hypertext transfer protocol (http) request that includes embedded scripted code that specifies requested data search, search result data manipulation, and manipulated search result data visualization processing is received at a server. The received embedded scripted code that specifies the requested data search, search result data manipulation, and manipulated search result data visualization processing is executed. ... International Business Machines Corporation

12/17/15 / #20150363493

Continuous collection of web api ecosystem data

An embodiment of the invention comprises a method associated with a web api ecosystem and api users includes identifying specified events over a period of time that respectively affect the ecosystem. Events can comprise an interaction between the ecosystem and a web api user or a specified web api. ... International Business Machines Corporation

12/17/15 / #20150363492

Use of collected data for web api ecosystem analytics

An embodiment of the invention pertains to web application programming interface (api) data associated with a web api ecosystem. The embodiment comprises constructing a data structure that is selectively related to at least some of the web api data associated with the web api ecosystem. ... International Business Machines Corporation

12/17/15 / #20150363491

System and method for using biometrics to predict and select music preferences

Systems and methods for using biometrics to select music preference are provided. A system for using biometrics to select music preferences for a user in a vehicle, comprises a music selection module electrically coupled to at least one biometric sensor in the vehicle, wherein the at least one biometric sensor senses a characteristic of the user and outputs data for the sensed characteristic to the music selection module, and wherein the music selection module selects a music selection for the user based on the sensed characteristic data, and a controller module electrically coupled to the music selection module to control playing of the music selection, wherein the controller module receives an output including the music selection from the music selection module.. ... International Business Machines Corporation

12/17/15 / #20150363489

Engagement summary generation

A method and system for generating summary details is provided. The method includes retrieving event data of associated with a user. ... International Business Machines Corporation

12/17/15 / #20150363487

Extracting and mining of quote data across multiple languages

Extracting and mining of quote data across multiple languages, including: retrieving, from a plurality of quote sources, a plurality of commentary summarizations, wherein each commentary summarization is embodied as a machine-readable data structure and wherein the plurality of commentary summarizations include information in at least two or more languages; for each commentary summarization: identifying, within the commentary summarization, quote data, wherein the quote data represents a quote from a commentator; creating a quote tuple for the quote data, the quote tuple including information associated with quantifiable aspects of the quote data; and storing, in a quote tuple repository, the quote tuple; mining, for quote analysis information, the quote tuple repository; and presenting, to a user, the quote analysis information.. . ... International Business Machines Corporation

12/17/15 / #20150363483

Populating text indexes

Provided are techniques for populating a new text index. In response to determining that a limit for indexing a set of documents to the new text index has been reached, a commit is performed, a restart key is updated to identify a next document to be indexed, and the next document is indexed in a next commit cycle.. ... International Business Machines Corporation

12/17/15 / #20150363470

Index merge ordering

Method to order query results, by processing a received query at least in part using a composite key index, wherein the composite key index comprises at least two key columns, wherein the at least two key columns comprise at least one pre-ordering column and an ordering column, wherein the query specifies ordering criteria to order a result set based on values of the ordering column, wherein the processing comprises receiving, from the composite key index, an ordering column value for each unique pre-ordering column value in the composite key index, identifying a first ordering column value as being ordered first according to the ordering criteria, and returning the first ordering column value as being responsive to the query.. . ... International Business Machines Corporation

12/17/15 / #20150363468

Query handling in a columnar database

According to one embodiment of the present invention, a method for processing a query in a column database is provided. The method for analyzing test results may include a computer, associating a first set of metadata values with a set of records in a table, wherein each record has an associated state indicated by a metadata value. ... International Business Machines Corporation

12/17/15 / #20150363466

Dynamic query optimization with pilot runs

In one embodiment, a computer-implemented method includes selecting one or more sub-expressions of a query during compile time. One or more pilot runs are performed by one or more computer processors. ... International Business Machines Corporation

12/17/15 / #20150363465

Method and system for processing queries over datasets stored using hierarchical data structures

Systems and methods for processing a query are provided. A method for processing a query of a tree-based dataset, comprises receiving the query, and analyzing the query and the dataset to create an execution plan for the query, wherein creating the execution plan comprises partitioning traversals over the dataset into sequential and parallel components, and distributing the components across a plurality of processing threads that independently traverse their portion of the dataset and compute local results. ... International Business Machines Corporation

12/17/15 / #20150363457

Deduplicating storage with enhanced frequent-block detection

Detecting data duplication includes maintaining a fingerprint directory including one or more entries. Each entry includes a data fingerprint and a data location for a data chunk. ... International Business Machines Corporation

12/17/15 / #20150363456

Hierarchical database compression and query processing

Embodiments relate to hierarchical database compression. An aspect includes applying a first level of a first type of compression to a first partition of a column of a database. ... International Business Machines Corporation

12/17/15 / #20150363455

Preplaying transactions that mix hot and cold data

Methods and systems for performing database transactions include executing a first transaction request in a preplay mode that locks the requested data with a prefetch-lock and reads one or more requested data items from storage into a main memory buffer; locking the requested data items with a read/write lock after said data items are read into the main memory buffer; and performing the requested transaction on the data items in the main memory buffer using a processor.. . ... International Business Machines Corporation

12/17/15 / #20150363453

Artifact correlation between domains

An illustrative embodiment of a computer-implemented method for correlating artifacts between a versioned domain and an un-versioned domain, generates metadata having attributes of both of the versioned domain and the un-versioned domains, for an artifact in a set of artifacts; creates an instance using a specific version of a versioned artifact definition, wherein the instance comprises a first part directly created from the versioned artifact definition and a second part created from an un-versioned artifact definition; specifies linkages between a respective representation of the artifact in the versioned domain and the un-versioned domain; provides a set of facades through which a selected one of author, execute and update instances of the artifact is performed using either the versioned domain or the un-versioned domain; and correlates all versions of the artifact definition to a single un-versioned definition.. . ... International Business Machines Corporation

12/17/15 / #20150363447

Minimizing index maintenance costs for database storage regions using hybrid zone maps and indices

Elements of a database object are stored among a plurality of different storage regions, each storage region being associated with a first value range indicating upper and lower range values for element values within that storage region. An index is generated and maintained for one or more second value ranges that include range values that comprise subsets of the first value ranges. ... International Business Machines Corporation

12/17/15 / #20150363445

Generating and accessing a data table

An index shared between a plurality of tables is used to access a data sharing space (dss) storing a set of rows from a base table having a plurality of rows with stored data. First data values of the index are identified in response to a query for a table. ... International Business Machines Corporation

12/17/15 / #20150363444

Populating text indexes

Provided are techniques for populating a new text index. In response to determining that a limit for indexing a set of documents to the new text index has been reached, a commit is performed, a restart key is updated to identify a next document to be indexed, and the next document is indexed in a next commit cycle.. ... International Business Machines Corporation

12/17/15 / #20150363443

Predictive placement of columns during creation of a large database

Methods and arrangements for predictively placing columns of a large database in a multi-tier storage system. Aspects include receiving a database to be stored in the multi-tier storage system, wherein the database comprises a plurality of columns and the multi-tier storage system comprises at least two storage devices and evaluating one or more attributes of each of the plurality of columns of the database. ... International Business Machines Corporation

12/17/15 / #20150363442

Index merge ordering

System, method, and computer program product to order query results, by processing a received query at least in part using a composite key index, wherein the composite key index comprises at least two key columns, wherein the at least two key columns comprise at least one pre-ordering column and an ordering column, wherein the query specifies ordering criteria to order a result set based on values of the ordering column, wherein the processing comprises receiving, from the composite key index, an ordering column value for each unique pre-ordering column value in the composite key index, identifying a first ordering column value as being ordered first according to the ordering criteria, and returning the first ordering column value as being responsive to the query.. . ... International Business Machines Corporation

12/17/15 / #20150363441

Generating and accessing a data table

A data sharing space (dss) is generated for a base table having a set of rows with stored data. Requests are received to generate tables, each request including a query to the base table. ... International Business Machines Corporation

12/17/15 / #20150363440

Query handling in a columnar database

According to one embodiment of the present invention, a method for processing a query in a column database is provided. The method for analyzing test results may include a computer, associating a first set of metadata values with a set of records in a table, wherein each record has an associated state indicated by a metadata value. ... International Business Machines Corporation

12/17/15 / #20150363439

Dividing incoming data into multiple data streams and transforming the data for storage in a logical data object

Various embodiments for storing a logical object are provided. In one such embodiment, by way of example only, incoming data is divided corresponding to a logical data object into a plurality of independent streams, associating each data chunk of a plurality of obtained data chunks with a corresponding stream among the plurality of independent streams. ... International Business Machines Corporation

12/17/15 / #20150363436

Database schema upgrade as a service

A method for upgrading a database schema in real time, wherein the database schema is associated with a plurality of databases is provided. The method may include installing a first plugin on a database upgrade process associated with a database. ... International Business Machines Corporation

12/17/15 / #20150363434

Database schema upgrade as a service

A method for upgrading a database schema in real time, wherein the database schema is associated with a plurality of databases is provided. The method may include installing a first plugin on a database upgrade process associated with a database. ... International Business Machines Corporation

12/17/15 / #20150363432

Partial release management

A method, system, and computer program product for managing a partial release for a unit of storage space in a storage facility is disclosed. The method, system, and computer program product include establishing an invocation threshold for initiating a partial release for a unit of storage space. ... International Business Machines Corporation

12/17/15 / #20150363419

Placement of data fragments generated by an erasure code in distributed computational devices based on a deduplication factor

A file division and erasure code application executing in a controlling computational device generates data fragments and parity fragments of a file. Each of the generated data fragments and parity fragments are distributed in a different distributed computational device of a plurality of distributed computational devices, where distributing of a generated data fragment comprises determining whether any distributed computational device already stores a duplicate copy of the generated data fragment, and if any distributed computational device already stores the duplicate copy of the generated data fragment, placing the generated data fragment in the distributed computational device if no other data or parity fragment of the file has already been placed in the distributed computational device.. ... International Business Machines Corporation

12/17/15 / #20150363418

Data restructuring of deduplicated data

Various embodiments for enhancing storage of deduplicated data in a computing storage environment. Analytics are applied to at least one data storage characteristic observed in the computing storage environment to restructure the deduplicated data in a more sequential manner so as to enhance performance of the computing storage environment.. ... International Business Machines Corporation

12/17/15 / #20150363415

Generating and accessing a data table

An index shared between a plurality of tables is used to access a data sharing space (dss) storing a set of rows from a base table having a plurality of rows with stored data. First data values of the index are identified in response to a query for a table. ... International Business Machines Corporation

12/17/15 / #20150363414

Processing large xml files by splitting and hierarchical ordering

A computer processor determines a schema that enables splitting of one or more elements of an xml file. The computer processor determines an xml file as a split candidate, based on one or more attributes of the one or more elements of the xml file. ... International Business Machines Corporation

12/17/15 / #20150363413

Techniques for enabling coarse-grained volume snapshots for virtual machine backup and restore

A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. ... International Business Machines Corporation

12/17/15 / #20150363404

Minimizing index maintenance costs for database storage regions using hybrid zone maps and indices

Elements of a database object are stored among a plurality of different storage regions, each storage region being associated with a first value range indicating upper and lower range values for element values within that storage region. An index is generated and maintained for one or more second value ranges that include range values that comprise subsets of the first value ranges. ... International Business Machines Corporation

12/17/15 / #20150363399

Generating and accessing a data table

A data sharing space (dss) is generated for a base table having a set of rows with stored data. Requests are received to generate tables, each request including a query to the base table. ... International Business Machines Corporation

12/17/15 / #20150363395

Technology for importing schema changes to multiple target systems

Applying a change statement to target databases includes creating a central change identifier and associating the central change identifier and change statement to respective target databases, including creating an association identifier for each respective target database. The central change identifier, the change statement and a respective association identifier are provided for sending to each respective target database. ... International Business Machines Corporation

12/17/15 / #20150363391

Solving and answering arithmetic and algebraic problems using natural language processing

A method for solving and answering an arithmetic or algebraic problem using natural language processing (nlp) is provided. The method may include receiving an input statement associated with the arithmetic or algebraic problem. ... International Business Machines Corporation

12/17/15 / #20150363390

Solving and answering arithmetic and algebraic problems using natural language processing

A computer system for solving and answering an arithmetic or algebraic problem using natural language processing (nlp) is provided. The computer system may include receiving an input statement associated with the arithmetic or algebraic problem. ... International Business Machines Corporation

12/17/15 / #20150363382

Generating language sections from tabular data

A computer implemented method of generating a language section from tabular data in an electronic document may include identifying, in a first tabular portion of the electronic document, a set of categories used to organize tabular data. The method may include identifying a content characteristic for each category of the set of categories in the first tabular portion. ... International Business Machines Corporation

12/17/15 / #20150363378

Managing document unit references to improve collaborative document editing

An approach is provided for managing a display of document unit references. Units of an original version of a document and original references to the units are stored in nodes of a data structure. ... International Business Machines Corporation

12/17/15 / #20150363376

Webpage based form entry aid

Embodiments of the present invention disclose a method, computer program product, and system for providing an interface for data entry into a webform. In one embodiment, the method includes receiving a selection of an active data-entry field, determining an inline label associated with the active data-entry field, determining which data-entry fields are required data-entry fields, and determining a location of an active data-entry field within a webform. ... International Business Machines Corporation

12/17/15 / #20150363363

Generating language sections from tabular data

A computer implemented method of generating a language section from tabular data in an electronic document may include identifying, in a first tabular portion of the electronic document, a set of categories used to organize tabular data. The method may include identifying a content characteristic for each category of the set of categories in the first tabular portion. ... International Business Machines Corporation

12/17/15 / #20150363337

Verification of intellectual property core trusted state

Secure initialization of the state of an electronic circuit. A processor determines the trusted state of one or more architecture state registers of an intellectual property core. ... International Business Machines Corporation

12/17/15 / #20150363317

Techniques for preserving an invalid global domain indication when installing a shared cache line in a cache

A technique for operating a memory system for a node includes interrogating, by a cache, an associated cache directory to determine whether a shared cache line to be installed in the cache is associated with an invalid global state in the cache. The invalid global state specifies that a version of the shared cache line has been intervened off-node. ... International Business Machines Corporation

12/17/15 / #20150363316

Preserving an invalid global domain indication when installing a shared cache line in a cache

A technique for operating a memory system for a node includes interrogating, by a cache, an associated cache directory to determine whether a shared cache line to be installed in the cache is associated with an invalid global state in the cache. The invalid global state specifies that a version of the shared cache line has been intervened off-node. ... International Business Machines Corporation

12/17/15 / #20150363311

Memory management method

A method for managing main memory including dram and nvram in a computer depending on the operation state of the computer is provided. The method includes: (a) upon start of the computer, loading a program and the like into the dram, and loading predetermined read-only data and the like into the nvram; (b) in a state transition from a normal operation to a suspend state, moving data in the dram to the nvram; (c) in a state transition from the suspend state to the normal operation, reading data from the nvram for program execution; (d) in the case where a data write to the nvram occurs, stopping the data write, and moving data in a data area of the nvram subjected to the data write, to the dram; and (e) performing the data write to the dram to which the data has been moved.. ... International Business Machines Corporation

12/17/15 / #20150363299

Performance testing of software applications

Identifying performance issues in an application under test (aut). The aut executes on a system under test (sut) in a test environment, and uses one or more context parameters of the sut and/or the test environment. ... International Business Machines Corporation

12/17/15 / #20150363298

Automated testing of websites based on mode

Examples of techniques for testing websites are described herein. In one example, a method for testing a website includes receiving, via a processor, a website address of the website to be tested. ... International Business Machines Corporation

12/17/15 / #20150363297

Performance testing of software applications

Identifying performance issues in an application under test (aut). The aut executes on a system under test (sut) in a test environment, and uses one or more context parameters of the sut and/or the test environment. ... International Business Machines Corporation

12/17/15 / #20150363287

Bank-level fault management in a memory system

According to one aspect, bank-level fault management in a memory system is provided. The memory system includes a plurality of ranks, each rank including a plurality of memory devices each having a plurality of banks. ... International Business Machines Corporation

12/17/15 / #20150363286

Establishing copy pairs from primary volumes to secondary volumes in multiple secondary storage systems for a failover session

Provided are a computer program product, system, and method for establishing copy pairs from primary volumes to secondary volumes in multiple secondary storage systems for a failover session. For each of the copy pairs, data is mirrored from the primary storage system to the associated secondary storage system in the copy pair. ... International Business Machines Corporation

12/17/15 / #20150363277

Checkpoint triggering in a computer system

According to an aspect, a method for triggering creation of a checkpoint in a computer system includes executing a task in a processing node of the computer system and determining whether it is time to read a monitor associated with a metric of the task. The monitor is read to determine a value of the metric based on determining that it is time to read the monitor. ... International Business Machines Corporation

12/17/15 / #20150363276

Multi-site disaster recovery mechanism for distributed cloud orchestration software

Multi-site disaster recovery mechanism performed by the following steps: (i) providing a disaster recovery (dr) system that includes a plurality of sites where each site of the plurality of sites actively serves infrastructure-as-a-service to a set of tenant(s); (ii) for each site of the plurality of sites, determining the following characteristics of the site: workloads that require dr, workloads characteristics, tenants and capabilities; (iii) for each site of the plurality of sites, determining a plurality of associated sites; and (iv) on condition that a disaster occurs which impacts a first site of the plurality of sites, distributing a primary site workload of the first site across the associated sites of the first site. The determination of the plurality of associated sites associated with each site is based upon at least one of the following characteristics: capacity, workloads that require dr, workloads characteristics, tenants and/or capabilities.. ... International Business Machines Corporation

12/17/15 / #20150363275

Techniques for improving cloud infrastructure backup in a shared storage environment

A technique for cloud infrastructure backup in a virtualized environment utilizing shared storage includes obtaining a workload input/output (i/o) profile to the shared storage over a time period. An attempt to locate one or more time windows in the workload i/o profile for which a cloud infrastructure backup can be staged is initiated. ... International Business Machines Corporation

12/17/15 / #20150363271

Restoring data in a hierarchical storage management system

The present disclosure provides a hierarchical storage management system for storing data. A first controller receives a request to migrate a data item to a first storage tier. ... International Business Machines Corporation

12/17/15 / #20150363256

Admission control based on the end-to-end availability

Providing admission control for a request may comprise creating a process flow associated with the request, the process flow identifying a plurality of computer-implemented components and a flow of transactions occurring between the computer-implemented components; executing the flow of transactions on the plurality of computer-implemented components; logging the flow of transactions; monitoring the flow of transactions to detect a problem in the flow or one or more of the components, or combination thereof; responsive to not detecting a problem in the flow or one or more of the components, or combination thereof, allowing the request to proceed; and responsive to detecting a problem in the flow or one or more of the components, or combination thereof, not allowing the request to proceed.. . ... International Business Machines Corporation

12/17/15 / #20150363255

Bank-level fault management in a memory system

According to one aspect, bank-level fault management in a memory system is provided. The memory system includes a plurality of ranks, each rank including a plurality of memory devices each having a plurality of banks. ... International Business Machines Corporation

12/17/15 / #20150363246

Application service aggregation and management

A method and system for aggregating services is provided. The method includes receiving and processing a service request. ... International Business Machines Corporation

12/17/15 / #20150363243

Adaptive process for data sharing with selection of lock elision and locking

In a hardware lock elision (hle) environment, predictively determining whether a hle transaction should actually acquire a lock and execute non-transactionally, is provided. Included is, based on encountering an hle lock-acquire instruction, determining, based on an hle predictor, whether to elide the lock and proceed as an hle transaction or to acquire the lock and proceed as a non-transaction; based on the hle predictor predicting to elide, setting the address of the lock as a read-set of the transaction, and suppressing any write by the lock-acquire instruction to the lock and proceeding in hle transactional execution mode until an xrelease instruction is encountered wherein the xrelease instruction releases the lock or the hle transaction encounters a transactional conflict; and based on the hle predictor predicting not-to-elide, treating the hle lock-acquire instruction as a non-hle lock-acquire instruction, and proceeding in non-transactional mode.. ... International Business Machines Corporation

12/17/15 / #20150363237

Managing resource consumption in a computing system

Embodiments relate to managing resource consumption in a computing system. An aspect includes providing a resource policy by defining a plurality of threshold values relating to the resource consumption, wherein the resources are consumed by a plurality of user-defined functions performing tasks for a database management system, wherein the user-defined functions are executed by a plurality of processes external to the database management system. ... International Business Machines Corporation

12/17/15 / #20150363234

Resource allocation for migration within a multi-tiered system

A method and system for intelligent tiering is provided. The method includes receiving a request for enabling a tiering process with respect to data. ... International Business Machines Corporation

12/17/15 / #20150363225

Checkpointing for a hybrid computing node

According to an aspect, a method for checkpointing in a hybrid computing node includes executing a task in a processing accelerator of the hybrid computing node. A checkpoint is created in a local memory of the processing accelerator. ... International Business Machines Corporation

12/17/15 / #20150363223

Predicting the length of a transaction

In a multi-processor transaction execution environment a transaction is executed a plurality of times. Based on the executions, a duration is predicted for executing the transaction. ... International Business Machines Corporation

12/17/15 / #20150363222

System, method and computer program product for data processing and system deployment in a virtual environment

In one embodiment, a method for deploying a data processing system in a virtual environment includes deploying a data processing system call interface in a virtual machine in a virtualization environment, the system call interface being configured to trigger a locally called data processing instruction. The method also includes deploying a data processing driver in a virtual machine management platform in the virtualization environment, the data processing driver being configured to read the data processing instruction triggered by the system call interface. ... International Business Machines Corporation

12/17/15 / #20150363218

Techniques for utilizing a resource fold factor in placement of physical resources for a virtual machine

A technique for assigning physical resources of a data processing system to a virtual machine (vm) includes reading, by a hypervisor executing on the data processing system, a fold factor attribute for the vm. The fold factor attribute defines an anticipated usage of physical resources of the data processing system by the vm. ... International Business Machines Corporation

12/17/15 / #20150363217

Techniques for utilizing a resource fold factor in placement of physical resources for a virtual machine

A technique for assigning physical resources of a data processing system to a virtual machine (vm) includes reading, by a hypervisor executing on the data processing system, a fold factor attribute for the vm. The fold factor attribute defines an anticipated usage of physical resources of the data processing system by the vm. ... International Business Machines Corporation

12/17/15 / #20150363206

Implementing out of order processor instruction issue queue

A method and apparatus are provided for implementing an enhanced out of order processor instruction issue queue in a computer system. Instructions are selectively accepted into an instruction issue queue and ages are assigned to the accepted queue entry instructions using a queue counter. ... International Business Machines Corporation

12/17/15 / #20150363205

Implementing out of order processor instruction issue queue

A method and apparatus are provided for implementing an enhanced out of order processor instruction issue queue in a computer system. Instructions are selectively accepted into an instruction issue queue and ages are assigned to the accepted queue entry instructions using a queue counter. ... International Business Machines Corporation

12/17/15 / #20150363204

Branch prediction based on correlating events

Branch prediction using a correlating event, such as an unconditional branch that calls a routine including the branch, instead of the branch itself, to predict the behavior of the branch. The circumstances in which the branch is employed, and not the actual branch itself, is used to predict how strongly taken or not taken the branch is to behave. ... International Business Machines Corporation

12/17/15 / #20150363202

Branch prediction based on correlating events

Branch prediction using a correlating event, such as an unconditional branch that calls a routine including the branch, instead of the branch itself, to predict the behavior of the branch. The circumstances in which the branch is employed, and not the actual branch itself, is used to predict how strongly taken or not taken the branch is to behave. ... International Business Machines Corporation

12/17/15 / #20150363201

Predicting indirect branches using problem branch filtering and pattern cache

Predicting indirect branch instructions may comprise predicting a target address for a fetched branch instruction. Accuracy of the target address may be tracked. ... International Business Machines Corporation

12/17/15 / #20150363199

Performing a clear operation absent host intervention

Optimizations are provided for frame management operations, including a clear operation and/or a set storage key operation, requested by pageable guests. The operations are performed, absent host intervention, on frames not resident in host memory. ... International Business Machines Corporation

12/17/15 / #20150363194

Automatic software catalog content creation based on bio-inspired computing prediction

A method for automatically creating a software catalog content that includes a plurality of software components associated with a computing system is provided. The method may include creating a population comprising a plurality of potential software signatures associated with the plurality of software components. ... International Business Machines Corporation

12/17/15 / #20150363193

Automatic software catalog content creation based on bio-inspired computing prediction

A computer system for automatically creating a software catalog content that includes a plurality of software components associated with a computing system is provided. The computer system may include creating a population comprising a plurality of potential software signatures associated with the plurality of software components. ... International Business Machines Corporation

12/17/15 / #20150363185

Updating software based on utilized functions

In a method for managing updates for a software product, receiving a request to install a software product update, wherein the software product update modifies a software product on a computing device. The method further includes identifying a first set of one or more functions of the software product that are to be modified by the software product update. ... International Business Machines Corporation

12/17/15 / #20150363181

Software deployment in a distributed virtual machine environment

A computer implemented method for deploying, in a distributed virtual environment, a multi-component software product is disclosed. The method may include requesting and receiving product installation parameters, which may include virtual machine ids corresponding to subsets of the product installation parameters. ... International Business Machines Corporation

12/17/15 / #20150363180

Software deployment in a distributed virtual machine environment

A computer implemented method for deploying, in a distributed virtual environment, a multi-component software product is disclosed. The method may include requesting and receiving product installation parameters, which may include virtual machine ids corresponding to subsets of the product installation parameters. ... International Business Machines Corporation

12/17/15 / #20150363170

Calculation of a number of iterations

Performing an arithmetic operation in a data processing unit, including calculating a number of iterations for performing the arithmetic operation with a given number of bits per iteration. The number of bits per iteration is a positive natural number. ... International Business Machines Corporation

12/17/15 / #20150363167

Flash optimized columnar data layout and data access algorithms for big data query engines

A technique relates to flash-optimized data layout of a dataset for queries. Selection columns are stored in flash memory according to a selection optimized layout, where the selection optimized layout is configured to optimize predicate matching and data skipping. ... International Business Machines Corporation

12/17/15 / #20150363164

System and method for using biometrics to predict and select music preferences

Systems and methods for using biometrics to select music preference are provided. A system for using biometrics to select music preferences for a user in a vehicle, comprises a music selection module electrically coupled to at least one biometric sensor in the vehicle, wherein the at least one biometric sensor senses a characteristic of the user and outputs data for the sensed characteristic to the music selection module, and wherein the music selection module selects a music selection for the user based on the sensed characteristic data, and a controller module electrically coupled to the music selection module to control playing of the music selection, wherein the controller module receives an output including the music selection from the music selection module.. ... International Business Machines Corporation

12/17/15 / #20150363156

Media splitting and reduction in storage requirements based on common content

A method and computer program product for executing the method, where the method includes analyzing a multimedia file including audio content and video content, identifying a portion of the audio content that matches a portion of a separate audio file, removing the identified portion of the audio content from the multimedia file, and inserting a link into the multimedia file. The link points to the known audio file, specifies the portion of the separate audio file that matches the removed portion of the audio content, and identifies a point in the multimedia file where the portion of audio content was removed. ... International Business Machines Corporation

12/17/15 / #20150363133

Active control of memory for java virtual machines and other application runtime environments

A method and structure for dynamic memory re-allocation for an application runtime environment (are) includes receiving, through an interface of an application runtime environment (are), a first set of internal operational metrics of the are executing at a current setting s1 on a processor of a computer. A first performance p1 of the are is determined at the current setting s1 using the received first set of internal operation metrics. ... International Business Machines Corporation

12/17/15 / #20150363119

Method of writing file onto tape

An approach to reducing overhead to enable high-speed writing even when a large number of small-sized files are written onto a tape in a file system. The method of the present invention includes the steps of: writing multiple files consecutively onto a tape to become one combined file; writing, onto the tape, first index information including the start position and size of the combined file on the tape; and writing, onto the tape, second index information including the start position and size of each of the multiple files in the combined file on the tape.. ... International Business Machines Corporation

12/17/15 / #20150363114

Optimizing memory usage across multiple garbage collected computer environments

A method, information processing system, and computer readable storage medium, vary a maximum heap memory size for one application of a plurality of applications based on monitoring garbage collection activity levels for the plurality of applications, each application including a heap memory, and unused memory in the heap memory being reclaimed by a garbage collector.. . ... International Business Machines Corporation

12/17/15 / #20150363098

Guided video feed selection in a vehicle-to-vehicle network

In v2v or other networks in which multiple video feeds are available to a participant, the participant's ability to select a particular video feed for display can be eased through the use of guided scanning. A guided scanning strategy is built based on operator inputs and used to select a particular set of video feeds that are initially shown as a video “slideshow” on the display used by the participant. ... International Business Machines Corporation

12/17/15 / #20150363071

Managing a display

A system and computer implemented method for managing a display for a software application is disclosed. The software application may have a set of portions. ... International Business Machines Corporation

12/17/15 / #20150362971

Budgeting for power consumption in a chassis environment that includes a plurality of integrated technology elements

Methods, apparatuses, and products for budgeting for power consumption in a chassis environment that includes a plurality of integrated technology elements (‘ites’), each ite having power utilization information indicating an average power consumption of the ite, including: determining, by a chassis management module, a total power requirement value based on a sum of the average power consumption for each ite; increasing, by the chassis management module, the total power requirement value in dependence upon a predetermined power utilization delta; identifying, by the chassis management module, one or more power supplies to provide power to the ites in the chassis environment in dependence upon power delivery capabilities of the one or more power supplies and the total power requirement value; and powering on the identified one or more power supplies by the chassis management module.. . ... International Business Machines Corporation

12/17/15 / #20150362583

Scalable polarimetric phased array transceiver

A polarimetric transceiver front-end includes two receive paths configured to receive signals from an antenna, each receive path corresponding to a respective polarization. Each front-end includes a variable amplifier and a variable phase shifter; a first transmit path configured to send signals to the antenna, where the transmit path is connected to the variable phase shifter of one of the two receive paths and includes a variable amplifier; and a transmit/receive switch configured to select between the first transmit path and the two receive paths for signals, where the transmit/receive switch includes a quarter-wavelength transmission line that adds a high impedance to the transmit path when the transmit/receive switch is in a receiving state.. ... International Business Machines Corporation

12/17/15 / #20150362534

Signal monitoring of through-wafer vias using a multi-layer inductor

According to a method herein, a multi-level inductor is created around a through-silicon-via (tsv) in a semiconductor substrate. A voltage induced in the multi-level inductor by current flowing in the tsv is sensed, using a computerized device. ... International Business Machines Corporation

12/17/15 / #20150362373

Determining thermal profiles of semiconductor structures

According to embodiments of the present invention, a semiconductor substrate is formed on at least a portion of a surface of a semiconductor substrate. The emitting layer is excited for a first predetermined time period. ... International Business Machines Corporation

12/17/15 / #20150362319

Mobility route optimization

A processor-implemented method, system, and computer program product guides mobility-impaired pedestrians. A processor receives mobile tracking readings from each of multiple mobility assistance devices, and identifies pedestrian routes taken by the mobility assistance devices to a desired destination. ... International Business Machines Corporation

12/17/15 / #20150362227

Method and protection apparatus for protecting a thermal sensitive component in a thermal process

Provided is a method for protecting a thermal sensitive component mounted on a board during a thermal process. The method includes: providing the board, providing a protection apparatus which is removable and made of a thermoelectric material to protect the thermal sensitive component during the thermal process, wherein the protection apparatus cools the thermal sensitive component during the thermal process in response to applying a voltage to the protection apparatus. ... International Business Machines Corporation

12/17/15 / #20150362096

Cable securing apparatus and method of securing a cable

Method and apparatus are provided for securing a cable. The apparatus includes: a substantially cone-shaped member having an elongate opening along the axis of the cone in which a cable is placeable in use; a holding member having at least one open-sided aperture in which the cone-shaped member is houseable in use; wherein the widest diameter of the cone-shaped member is greater than the diameter of the open-sided aperture of the holding member. ... International Business Machines Corporation

12/17/15 / #20150361197

Initiation of controlled radical polymerization from lactide monomer

A lactide-functionalized polymer is synthesized by polymerizing a monomer capable of undergoing radical polymerization (e.g., styrenic, vinylic, acrylic, etc.) using a brominated lactide initiator via atom transfer radical polymerization (atrp). In some embodiments of the present invention, the brominated lactide initiator is 3-bromo-3,6-dimethyl-1,4-dioxane-2,5-dione prepared by reacting lactide with n-bromosuccinimide in the presence of benzoyl peroxide.. ... International Business Machines Corporation

12/17/15 / #20150360695

Mitigating driver fatigue

A tool for mitigating driver fatigue. The tool registers, by one or more computer processors, a profile for a driver, wherein registering the profile includes the driver in a social community. ... International Business Machines Corporation

12/17/15 / #20150360206

Methods and apparatus for controlling metals in liquids

Method for controlling metals in a liquid are described. The liquid is contacted with a hexahydrotriazine and/or a hemiaminal material, and metal is adsorbed from the liquid onto the material. ... International Business Machines Corporation

12/17/15 / #20150360205

Methods and apparatus for controlling metals in liquids

Method and apparatus for controlling metals in a liquid are described. The liquid is contacted with a hexahydrotriazine and/or a hemiaminal material, and metal is adsorbed from the liquid onto the material. ... International Business Machines Corporation

12/17/15 / #20150360173

Sulfur scavenging materials for filters and coatings

Materials which react with (“scavenge”) sulfur compounds, such as hydrogen sulfide and mercaptans, are used to limit sulfur-induced corrosion. Filters and protective coatings including these materials, described broadly as polyhexahydrotriazines (pht) and polyhemiaminals (pha), are disclosed. ... International Business Machines Corporation

12/17/15 / #20150360130

Managing a population of players of online games

A method includes determining a first target population of players in a first online game, identifying a current population of players in the first online game, and providing either (a) an incentive for at least one player in the current population to switch from the first online game to a second online game in response to determining that the current population of players is greater than the target population of players, or (b) an incentive for at least one player outside the current population to play the first online game in response to determining that the current population of players is less than the target population of players. A target population of players may be determined, for example, by correlating a parameter of player satisfaction, such as player duration in-game, with the population of players in the game.. ... International Business Machines Corporation

12/17/15 / #20150360129

Managing a population of players of online games

A computer program product includes a computer readable storage medium having program instructions embodied therewith, wherein the program instructions are executable by a processor to cause the processor to perform a method. The method includes determining a first target population of players in a first online game, identifying a current population of players in the first online game, and providing either (a) an incentive for at least one player in the current population to switch from the first online game to a second online game in response to determining that the current population of players is greater than the target population of players, or (b) an incentive for at least one player outside the current population to play the first online game in response to determining that the current population of players is less than the target population of players.. ... International Business Machines Corporation

12/17/15 / #20150359681

Non-invasive vision enhancement

A method and system are provided for enhancing vision. The method includes capturing a first image by a first camera. ... International Business Machines Corporation

12/10/15 / #20150359140

Selective clamping of electronics card to coolant-cooled structure

Cooling apparatuses and coolant-cooled electronic assemblies are provided which include a thermal transfer structure configured to couple to an electronics card which operatively inserts into an electronic system. The thermal transfer structure includes a clamping structure movable between opened and clamped positions. ... International Business Machines Corporation

12/10/15 / #20150359139

Liquid-cooling apparatus with integrated coolant filter

Cooling apparatuses, cooled electronic modules, and methods of fabrication are provided which facilitate heat transfer from an electronic component(s). The cooling apparatus includes a liquid-cooled heat sink with a thermally conductive structure having a coolant-carrying compartment including a region of reduced cross-sectional coolant flow area. ... International Business Machines Corporation

12/10/15 / #20150359137

Coolant-cooled heat sink configured for accelerating coolant flow

Cooling apparatuses, cooled electronic modules, and methods of fabrication are provided which facilitate heat transfer from one or more electronic components to a coolant. The cooling apparatus includes a coolant-cooled heat sink with a thermally conductive structure having a coolant-carrying compartment including a varying cross-sectional coolant flow area through which coolant flows in a direction substantially parallel to a main heat transfer surface of the structure coupled to the electronic component(s). ... International Business Machines Corporation

12/10/15 / #20150359132

Field-replaceable bank of immersion-cooled electronic components

A cooled electronic system and cooling method are provided, wherein a field-replaceable bank of electronic components is cooled by an apparatus which includes an enclosure at least partially surrounding and forming a compartment about the electronic components, a fluid disposed within the compartment, and a heat sink associated with the enclosure. The field-replaceable bank extends, in part, through the enclosure to facilitate operative docking of the electronic components into one or more respective receiving sockets of the electronic system. ... International Business Machines Corporation

12/10/15 / #20150359108

Thermal interface solution with reduced adhesion force

A method comprises applying an adhesive to a first substrate and a second substrate to secure the first substrate to the second substrate. The adhesive extends in a plane on one side of an interposer that also extends in the plane, and is contiguous with the adhesive. ... International Business Machines Corporation

12/10/15 / #20150358769

Securing a mobile device by binding to an itinerary

A method includes storing an itinerary in memory of an electronic device, wherein the itinerary includes a plurality of destinations and a time period associated with each destination. The method further includes monitoring the location of the electronic device, comparing the location of the electronic device to the itinerary, and restricting use of the electronic device in response to determining that the location of the electronic device at the current time does not match the destination specified in the itinerary for the time period that includes the current time.. ... International Business Machines Corporation

12/10/15 / #20150358765

Securing a mobile device by binding to an itinerary

A computer program product includes a computer readable storage medium having program instructions embodied therewith, wherein the program instructions are executable by a processor to cause the processor to perform a method. The method includes storing an itinerary in memory of an electronic device, wherein the itinerary includes a plurality of destinations and a time period associated with each destination. ... International Business Machines Corporation

12/10/15 / #20150358429

Saving and restoring a state of a web application

Embodiments of the present disclosure provide a system, method and computer program product for saving and restoring a state of a web application. According to one embodiment, the method comprises receiving an indication from at least one portlet of the web application for monitoring the state of the portlet, a type of storage mechanism supported by a client interface used for accessing the web application may be detected. ... International Business Machines Corporation

12/10/15 / #20150358422

Content sharing among mobile terminals

A method for realizing content sharing among mobile terminals comprises: receiving an index of access content sent by a requesting mobile terminal; looking up a shareable content index table for the index of the access content; and sending identification information of a mobile terminal having the index of the access content to the requesting mobile terminal if the index of the access content is found, so that the requesting mobile terminal obtains the requested access content from the mobile terminal having the index of the access content via wireless communication.. . ... International Business Machines Corporation

12/10/15 / #20150358421

Cooperative decentralized caching

Methods and arrangements for providing cooperative caching in a distributed system. A cache and a communicator are provided at a node in a distributed system. ... International Business Machines Corporation

12/10/15 / #20150358413

Saving and restoring a state of a web application

Embodiments of the present disclosure provide a system, method and computer program product for saving and restoring a state of a web application. According to one embodiment, the method comprises receiving an indication from at least one portlet of the web application for monitoring the state of the portlet, a type of storage mechanism supported by a client interface used for accessing the web application may be detected. ... International Business Machines Corporation

12/10/15 / #20150358388

Network-specific data downloading to a mobile device

A method, system, and/or computer program product downloads a blob of data onto a mobile device. A blob of data that is to be downloaded from a server to a mobile device via a particular network is identified. ... International Business Machines Corporation

12/10/15 / #20150358371

Notifying online conference participant of presenting previously identified portion of content

In a method for notifying a participant of an online conference of when a portion of content will be presented during the online conference, a computer receives at least one data item identifying the portion of content. The computer determines an estimate of a time at which the portion of content will be presented and the level of confidence in the accuracy of the estimate. ... International Business Machines Corporation

12/10/15 / #20150358349

Preventing application-level denial-of-service in a multi-tenant system

Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative saas system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for accessor classes, preferably along with actions to be taken in the event an accessor exceeds those limits. ... International Business Machines Corporation

12/10/15 / #20150358339

Detection of intrusion in a wireless network

A method and associated system for detecting intrusion of a wireless network. A determination is made that a first data stream received by the wireless network does not include n1 communication protocols included in a second data stream previously determined to be valid, n1 being a positive integer. ... International Business Machines Corporation

12/10/15 / #20150358309

Data protection backup agent management

A system correlates application information from within a virtual guest to an entity managing off-host data protection. During a data protection operation, the system exploits the virtual hierarchy to centralize the configuration and management of operating system credentials of numerous virtual guests. ... International Business Machines Corporation

12/10/15 / #20150358298

Secure sharing and collaborative editing of documents in cloud based applications

Collaboratively editing a document in a system of sharee clients includes creating a document change, generating a document token for encrypting the document change, encrypting the document change with the document token, making the encrypted document change available to the other sharee clients, and generating a plurality of copies of the sharee document token. Each sharee document token is encrypted with a respective sharee's public key. ... International Business Machines Corporation

12/10/15 / #20150358276

Method, apparatus and system for resolving domain names in network

Method, apparatus and system for resolving domain names in network. One embodiment provides a method for resolving a domain name in a network, including: receiving, at a controller associated with a switch in the network, a domain name system (dns) request for the domain name from the switch, the dns request initiated by a client, the controller controlling operations of the switch in the network; and controlling processing of the dns request based on a predefined security constraint at the controller to obtain a network address corresponding to the domain name, wherein the dns request is forwarded by the switch to the controller in response to a dns record related to the domain name being missed in first storage at the switch. ... International Business Machines Corporation

12/10/15 / #20150358266

Preventing messages from being sent using inappropriate communication accounts

A method, system and computer program product for preventing messages from being sent using inappropriate communication accounts. A message created by a user of a mobile device is analyzed to identify the topic and sentiment. ... International Business Machines Corporation

12/10/15 / #20150358265

Preventing messages from being sent using inappropriate communication accounts

A method, system and computer program product for preventing messages from being sent using inappropriate communication accounts. A message created by a user of a mobile device is analyzed to identify the topic and sentiment. ... International Business Machines Corporation

12/10/15 / #20150358246

Network-specific data downloading to a mobile device

A method, system, and/or computer program product downloads a blob of data onto a mobile device. A blob of data that is to be downloaded from a server to a mobile device via a particular network is identified. ... International Business Machines Corporation

12/10/15 / #20150358245

Unified framework for isolating multicast and broadcast frames to a traffic class separate from a traffic class used for unicast frames

Embodiments presented herein describe techniques for isolating multicast and broadcast frames to a traffic class that is separate from a traffic class used for unicast frames. According to one embodiment, a network switch receives an incoming ethernet virtual local area network (vlan)-tagged frame. ... International Business Machines Corporation

12/10/15 / #20150358241

Data traffic switching among computing devices in storage area network (san) environments

Data traffic switching among computing device in a san environment is disclosed herein. According to an aspect, a method may be implemented at an npv device that is associated with multiple computing devices positioned behind the npv device in a san. ... International Business Machines Corporation

12/10/15 / #20150358216

Dynamic and adaptive quota shares

Embodiments relate to dynamically allocating access to a shared resource based on quota shares. An aspect includes computing, by a client node, an expected size of quota shares needed by the client node based on a historical rate of resource consumption by the client node. ... International Business Machines Corporation

12/10/15 / #20150358166

Using multiple digital identification documents to control information disclosure

A first digital identification document is transmitted from an identification authority to a mobile device of an identified individual. This first digital identification document is digitally signed and includes a set of attributes about the identified individual. ... International Business Machines Corporation

12/10/15 / #20150358159

Complex format-preserving encryption scheme

Methods, computing systems and computer program products implement embodiments of the present invention that include defining multiple primitives, each primitive including ranking and unranking methods. Two or more of the multiple primitives are selected, and an operation is performed on the selected primitives, thereby defining a complex format. ... International Business Machines Corporation

12/10/15 / #20150358153

Fully homomorphic encryption

In one exemplary embodiment of the invention, a method and computer program include: receiving first and second ciphertexts having first and second data encrypted per an encryption scheme, the encryption scheme has public/secret keys and encryption, decryption, operation and refresh functions, the encryption function encrypts data, the decryption decrypts ciphertext, the operation receives ciphertexts and performs operation(s) on them, the refresh operates to prevent growth of the magnitude of noise for a ciphertext while reducing the modulus of the ciphertext without using the secret key, utilizing a modulus switching technique that involves transforming a first ciphertext c modulo q into a second ciphertext c′ modulo p while preserving correctness, the technique includes scaling by p/q and rounding, p<q; using the operation function(s), performing operation(s) on them to obtain a third ciphertext; and reducing a noise level of the third ciphertext using the refresh function.. . ... International Business Machines Corporation

12/10/15 / #20150358012

Controlling turn on fets of a hot plug device

A method for controlling the in-rush current to a hot plug device. The method includes providing a series of turn on pulses to the gates of a plurality of turn on fets on a hot plug device coupled to a direct current power source, wherein each pulse causes the plurality of fets to pass current from the direct current power source to a subsystem of the hot plug device, and wherein each pulse has a duration that ends before the impedance of the turn on fets falls below a safe operating region. ... International Business Machines Corporation

12/10/15 / #20150357977

Phase noise reduction in lc-vco

An approach for a transconductance cell for use in a voltage controlled oscillator (vco) is provided. The transconductance cell includes a first nfet stack connected in series to a first pfet stack. ... International Business Machines Corporation

12/10/15 / #20150357811

Hot plug device providing turn on fets with a softstart capability

A method of controlling the inrush current to a hot plug device. The method includes directing current from an input power rail of the hot plug device to an output power rail of the hot plug device through a high impedance auxiliary current path, wherein an electronic subsystem of the hot plug device is coupled to the output power rail. ... International Business Machines Corporation

12/10/15 / #20150357783

Microwave connector with filtering properties

A microwave connector is provided. The microwave connector includes an outer conductor, an inner conductor disposed within the outer conductor and dielectric materials interposed between the outer conductor and the inner conductor, the dielectric materials including a non-dissipative dielectric material and a dissipative dielectric material.. ... International Business Machines Corporation

12/10/15 / #20150357515

Thin light emitting diode and fabrication method

A method for fabrication a light emitting diode (led) includes forming alternating material layers on an led structure, formed on a substrate, to form a reflector on a back side opposite the substrate. A handle substrate is adhered to a stressor layer deposited on the reflector. ... International Business Machines Corporation

12/10/15 / #20150357512

Structure with a metal silicide trasparent conductive electrode and a method of forming the structure

Disclosed are embodiments of a structure with a metal silicide transparent conductive electrode, which is commercially viable, robust and safe to use and, thus, optimal for incorporation into devices, such as flat panel displays, touch panels, solar cells, light emitting diodes (leds), organic optoelectronic devices, etc. Specifically, the structure can comprise a substrate (e.g., a glass or plastic substrate) and a transparent conducting film on that substrate. ... International Business Machines Corporation

12/10/15 / #20150357471

Stress inducing contact metal in finfet cmos

A method of forming a semiconductor structure includes forming a first plurality of fins in a first region of a semiconductor substrate and a second plurality of fins in a second region of a semiconductor substrate. A gate structure is formed covering a first portion of the first and second plurality of fins. ... International Business Machines Corporation

12/10/15 / #20150357470

Finfet with oxidation-induced stress

A method for inducing stress within the channel of a semiconductor fin structure includes forming a semiconductor fin on a substrate; forming a fin hard mask layer, multiple isolation regions, and multiple spacers, on the semiconductor fin; forming a gate structure on the semiconductor fin; and oxidizing multiple outer regions of the semiconductor fin to create oxidized stressors that induce compressive stress within the channel of the semiconductor fin. A method for inducing tensile stress within the channel of a semiconductor fin by oxidizing a central region of the semiconductor fin is also provided. ... International Business Machines Corporation

12/10/15 / #20150357467

Tunable breakdown voltage rf fet devices

A tunable breakdown voltage rf mesfet and/or mosfet and methods of manufacture are disclosed. The method includes forming a first line and a second line on an underlying gate dielectric material. ... International Business Machines Corporation

12/10/15 / #20150357447

Bipolar transistor with extrinsic base region and methods of fabrication

The present disclosure relates to integrated circuit (ic) structures and methods of forming the same. An ic structure according to the present disclosure can include: a doped substrate region adjacent to an insulating region; a crystalline base structure including: an intrinsic base region located on and contacting the doped substrate region, the intrinsic base region having a first thickness; an extrinsic base region adjacent to the insulating region, wherein the extrinsic base region has a second thickness greater than the first thickness; a semiconductor layer located on the intrinsic base region of the crystalline base structure; and a doped semiconductor layer located on the semiconductor layer.. ... International Business Machines Corporation

12/10/15 / #20150357441

Method for making a semiconductor device while avoiding nodules on a gate

A method for making a semiconductor device includes forming laterally spaced-apart semiconductor fins above a substrate, and a gate overlying the semiconductor fins. The gate has a tapered outer surface. ... International Business Machines Corporation

12/10/15 / #20150357440

Method and structure for robust finfet replacement metal gate integration

A robust gate spacer that can resist a long overetch that is required to form gate spacers in fin field effect transistors (finfets) and a method of forming the same are provided. The gate spacer includes a first gate spacer adjacent sidewalls of at least one hard mask and a top portion of sacrificial gate material of a sacrificial gate structure and a second gate spacer located beneath the first gate spacer and adjacent remaining portions of sidewalls of the sacrificial gate material. ... International Business Machines Corporation

12/10/15 / #20150357439

Method for making semiconductor device with isolation pillars between adjacent semiconductor fins

A method for making a semiconductor device may include forming, above a substrate, a plurality of laterally spaced-apart semiconductor fins, and forming regions of a first dielectric material between the laterally spaced-apart semiconductor fins. The method may further include selectively removing at least one intermediate semiconductor fin from among the plurality of semiconductor fins to define at least one trench between corresponding regions of the first dielectric material, and forming a region of a second dielectric material different than the first dielectric in the at least one trench to provide at least one isolation pillar between adjacent semiconductor fins.. ... International Business Machines Corporation

12/10/15 / #20150357429

Semiconductor devices containing an epitaxial perovskite/doped strontium titanate structure

Semiconductor devices are provided such as, ferroelectric transistors and floating gate transistors, that include an epitaxial perovskite/doped strontium titanate structure formed above a surface of a semiconductor substrate. The epitaxial perovskite/doped strontium titanate structure includes a stack of, in any order, a doped strontium titanate and a perovskite type oxide.. ... International Business Machines Corporation

12/10/15 / #20150357425

Buried source-drain contact for integrated circuit transistor devices and method of making same

An integrated circuit transistor is formed on a substrate. A trench in the substrate is at least partially filed with a metal material to form a source (or drain) contact buried in the substrate. ... International Business Machines Corporation

12/10/15 / #20150357423

Flexible active matrix circuits for interfacing with biological tissue

High resolution active matrix nanowire circuits enable a flexible and stretchable platform for probing neural circuits. Fabrication of such circuits includes forming an array of transistors using a semiconductor-on-insulator substrate. ... International Business Machines Corporation

12/10/15 / #20150357417

Device isolation for iii-v substrates

Techniques for device isolation for iii-v semiconductor substrates are provided. In one aspect, a method of fabricating a iii-v semiconductor device is provided. ... International Business Machines Corporation

12/10/15 / #20150357412

Constrained epitaxial source/drain regions on semiconductor-on-insulator finfet device

A method of fabricating a semiconductor device includes forming a plurality of semiconductor fins on an insulator layer of a semiconductor substrate, and forming a plurality of gate stacks on the insulator layer. Each gate stack wraps around a respective portion of the semiconductor fins. ... International Business Machines Corporation

12/10/15 / #20150357411

P-fet with strained silicon-germanium channel

A method of forming a semiconductor structure includes forming a dummy gate above a semiconductor substrate. The dummy gate defines a source-drain region adjacent to the dummy gate and a channel region below the dummy gate. ... International Business Machines Corporation

12/10/15 / #20150357403

Dt capacitor with silicide outer electrode and/or compressive stress layer, and related methods

A deep trench capacitor is provided. The deep trench capacitor may include: a deep trench in a substrate, the deep trench including an lower portion having a width that is wider than a width of the rest of the deep trench; a compressive stress layer against the substrate in the lower portion; a metal-insulator-metal (mim) stack over the compressive stress layer, the mim stack including a node dielectric between an inner electrode and an outer electrode; and a semiconductor core within the mim stack.. ... International Business Machines Corporation

12/10/15 / #20150357402

Dt capacitor with silicide outer electrode and/or compressive stress layer, and related methods

Method of forming a deep trench capacitor are provided. The method may include forming a deep trench in a substrate; forming a metal-insulator-metal (mim) stack within a portion of the deep trench, the mim stack forming including forming an outer electrode by co-depositing a refractory metal and silicon into the deep trench; and filling a remaining portion of the deep trench with a semiconductor.. ... International Business Machines Corporation

12/10/15 / #20150357386

Hybrid bipolar junction transistor

Bipolar junction transistors including inorganic channels and organic emitter junctions are used in some applications for forming high resolution active matrix displays. Arrays of such bipolar junction transistors are electrically connected to thin film switching transistors and provide high drive currents for passive devices such as organic light emitting diodes.. ... International Business Machines Corporation

12/10/15 / #20150357331

Finfet and fin-passive devices

A method of forming a semiconductor structure within a semiconductor substrate is provided. The method may include forming, on the substrate, a first group of fins associated with a first device; a second group of fins associated with a second device; and a third group of fins located between the first group of fins and the second group of fins, whereby the third group of fins are associated with a third device. ... International Business Machines Corporation

12/10/15 / #20150357328

Sti region for small fin pitch in finfet devices

The present invention relates generally to semiconductor devices, and particularly to fabricating a shallow trench isolation (sti) region in fin field effect transistors (finfets) having a small fin pitch. A structure is disclosed. ... International Business Machines Corporation

12/10/15 / #20150357325

Embedding semiconductor devices in silicon-on-insulator wafers connected using through silicon vias

In an approach to fabricating a silicon on insulator wafer, one or more semiconductor device elements are implanted and one or more shallow trench isolations are formed on a top surface of a first semiconductor wafer. A first dielectric material layer is deposited over the top surface of the first semiconductor wafer, filling the shallow trench isolations. ... International Business Machines Corporation

12/10/15 / #20150357295

Dielectric region in a bulk silicon substrate providing a high-q passive resonator

Structures and methods of making a dielectric region in a bulk silicon (si) substrate of a mixed-signal integrated circuit (ic) provide a high-q passive resonator. Deep trenches within the bulk si substrate in <100> directions are expanded by wet etching to form contiguous cavities, which are filled by si oxide to form a dielectric region. ... International Business Machines Corporation

12/10/15 / #20150357246

Semiconductor device including merged-unmerged work function metal and variable fin pitch

A method of varying a threshold voltage of a semiconductor device includes forming plural first semiconductor fins atop a substrate and which are separated from one another according to a first fin pitch to define first fin trenches having a first width. At least one second semiconductor fin is formed atop the substrate and is separated from the plural first semiconductor fins by a second fin pitch to define second fin trenches having a second width. ... International Business Machines Corporation

12/10/15 / #20150357243

Method for making strained semiconductor device and related methods

A method for making a semiconductor device is provided. Raised source and drain regions are formed with a tensile strain-inducing material, after thermal treatment to form source drain extension regions, to thereby preserve the strain-inducing material in desired substitutional states.. ... International Business Machines Corporation

12/10/15 / #20150357236

Ultrathin multilayer metal alloy liner for nano cu interconnects

Compositions of matter, compounds, articles of manufacture and processes to reduce or substantially eliminate em and/or stress migration, and/or tddb in copper interconnects in microelectronic devices and circuits, especially a metal liner around copper interconnects comprise an ultra thin layer or layers of mn alloys containing at least one of w and/or co on the metal liner. This novel alloy provides em and/or stress migration resistance, and/or tddb resistance in these copper interconnects, comparable to thicker layers of other alloys found in substantially larger circuits and allows the miniaturization of the circuit without having to use thicker em and/or tddb resistant alloys previously used thereby enhancing the miniaturization, i.e., these novel alloy layers can be miniaturized along with the circuit and provide substantially the same em and/or tddb resistance as thicker layers of different alloy materials previously used that lose some of their em and/or tddb resistance when used as thinner layers.. ... International Business Machines Corporation

12/10/15 / #20150357207

Selective etching of silicon wafer

An apparatus that includes a solution bath of a seasoned solution, the seasoned solution containing a mixture of hydrofluoric acid, nitric acid, and acetic acid; and one or more silicon wafers being suspended in a position above the solution bath, wherein at least a portion of the mixture having been used in thinning the one or more silicon wafers.. . ... International Business Machines Corporation

12/10/15 / #20150357197

Selective etching of silicon wafer

A method of preparing an etch solution and thinning semiconductor wafers using the etch solution is proposed. The method includes steps of creating a mixture of hydrofluoric acid, nitric acid, and acetic acid in a solution container in an approximate 1:3:5 ratio; causing the mixture to react with portions of one or more silicon wafers, the portions of the one or more silicon wafers are doped with boron in a level no less than 1×1019 atoms/cm3; collecting the mixture after reacting with the boron doped portions of the one or more silicon wafers; and adding collected mixture back into the solution container to create the etch solution.. ... International Business Machines Corporation

12/10/15 / #20150357033

Accessing a resistive memory storage device

Embodiments of the present disclosure describe a device and methods of accessing the device. The device can include a plurality of memory cells, each cell including a plurality of resistive memory components each designed to store data as resistance and an access transistor configured to control access to the plurality of resistive memory components. ... International Business Machines Corporation

12/10/15 / #20150356993

Magnetic tape medium with magnetically encoded servo band bursts

A magnetic tape medium includes at least one servo band along a longitudinal extension of the tape medium which at least one servo band comprises servo patterns organized in servo frames for supporting to determine positional information. At least one of the servo frames includes a first burst comprising at least two servo stripes inclined at a first angle with respect to a direction orthogonal to the longitudinal extension of the tape medium, followed by a second burst including at least two servo stripes inclined at a second angle with respect to a direction orthogonal to the longitudinal extension of the tape medium, which second angle is different from the first angle. ... International Business Machines Corporation

12/10/15 / #20150356984

Magnetic tape medium with magnetically encoded servo band bursts

A magnetic tape medium includes at least one servo band along a longitudinal extension of the tape medium which at least one servo band comprises servo patterns organized in servo frames for supporting to determine positional information. At least one of the servo frames includes a first burst comprising at least two servo stripes inclined at a first angle with respect to a direction orthogonal to the longitudinal extension of the tape medium, followed by a second burst including at least two servo stripes inclined at a second angle with respect to a direction orthogonal to the longitudinal extension of the tape medium, which second angle is different from the first angle. ... International Business Machines Corporation

12/10/15 / #20150356967

Generating narrative audio works using differentiable text-to-speech voices

An approach is provided in which a voice management system generates multiple audio test recordings using multiple text-to-speech (tts) voices that have different acoustic properties. The voice management system determines that a comparison between a first one of the tts voices and a second one of the tts voices reaches an acoustic differentiation threshold and, as a result, assigns the first tts voice to a first character and assigns the second tts voice to a second character. ... International Business Machines Corporation

12/10/15 / #20150356797

Virtual key fob with transferable user data profile

A method for controlling various aspects of a vehicle includes registering a first mobile general-purpose processing device, such as a smart phone, with a vehicle. The method further authorizes the first mobile general-purpose processing device to be used as a key fob for controlling the vehicle. ... International Business Machines Corporation

12/10/15 / #20150356793

Managing a vehicle incident

A system and computer implemented method for managing a vehicle incident is disclosed. The method may include monitoring, in response to a triggering event, a first vehicle having a first vehicle state including a set of physical condition characteristics. ... International Business Machines Corporation

12/10/15 / #20150356792

Managing a vehicle incident

A system and computer implemented method for managing a vehicle incident is disclosed. The method may include monitoring, in response to a triggering event, a first vehicle having a first vehicle state including a set of physical condition characteristics. ... International Business Machines Corporation

12/10/15 / #20150356745

Multi-mode video event indexing

Multi-mode video event indexing includes determining a quality of object distinctiveness with respect to images from a video stream input. A high-quality analytic mode is selected from multiple modes and applied to video input images via a hardware device to determine object activity within the video input images if the determined level of detected quality of object distinctiveness meets a threshold level of quality, else a low-quality analytic mode is selected and applied to the video input images via a hardware device to determine object activity within the video input images, wherein the low-quality analytic mode is different from the high-quality analytic mode.. ... International Business Machines Corporation

12/10/15 / #20150356673

Ghost bidding and serious bidder detection in automated auctions

Potential ghost bidding and non-serious bidding in an automated auction is detected and alerted to a user by retrieving by a computer one or more historical automated auction records related to an offering party in a current automated auction; detecting by a computer the retrieved records that a same or similar item is being offered in the current automated auction that has been offered in a previous automated auction; responsive to the detecting, increasing a ghost bidding likelihood parameter by a computer; determining by a computer that a bidder in the current automated auction also bid in one or more of the historical automated auctions; responsive to the determining, increasing by a computer the ghost bidding likelihood parameter; and alerting a user of the current automated auction of the ghost bidding likelihood parameter for each determined bidder.. . ... International Business Machines Corporation

12/10/15 / #20150356640

Retrieving reviews based on user profile information

In an approach to retrieving reviews for a user based on user profile information, a computer receives user profile information for a first user. The computer receives a search term from the first user and determines review information corresponding to the search term and the user profile information. ... International Business Machines Corporation

12/10/15 / #20150356600

Electronic commerce web page management

Aspects of the present disclosure are directed toward a method, a system, and a computer program product for displaying a change event for a web page. The method includes receiving a change event location located on a web page in a pre-deployment environment. ... International Business Machines Corporation

12/10/15 / #20150356577

Listing a candidate service in a service catalog

A method for listing a service in a service catalog. Feedback is received about a candidate service that is used to determine a score for the candidate service. ... International Business Machines Corporation

12/10/15 / #20150356508

Collaboration using extensible state sharing

Collaboration using extensible state sharing, each state including information dimensions, a subsequent state based on one or more previous states and being associated to the one or more previous states by a path. Receiving, by a computer, a state and determining, by the computer, if a stored state is within a proximity threshold of the received state based on the information dimensions of the stored and received states. ... International Business Machines Corporation

12/10/15 / #20150356490

Ambient project management

A computer-implemented method of ambient ad hoc project management can include defining a project and associating a project decay function with the project, wherein the project decay function regulates a rate at which project health declines. Responsive to detecting a project event, one or more parameters of the project decay function can be determined from the project event. ... International Business Machines Corporation

12/10/15 / #20150356480

Determining group attributes and matching tasks to a group

In a method for determining group attributes and matching tasks to a group, a plurality of individual attributes for members of a first group of a plurality of groups are determined, wherein each individual attribute has a type. Parameters of a first distribution of at least one type of individual attribute across members of the first group are estimated. ... International Business Machines Corporation

12/10/15 / #20150356473

Deriving comparable planned and actual service delivery cost metrics

Aspects generate costs for a business plan from normalized cost metric values by mapping (via a processor implementing an automated process) text artifacts of a business plan to different tags that each include a cost as a function of a time period for delivery of a service that is associated with a computer service element. Aspects also generate a summary view cost estimation as a function of the time period, costs of the mapped tags and a geographic region productive factor that is assigned to a region identified as providing delivery of the service that is associated with the computer service element. ... International Business Machines Corporation

12/10/15 / #20150356464

Generating data from imbalanced training data sets

Determining a number of kernels within a model is provided. A number of kernels that include data samples of a majority data class of an imbalanced training data set is determined based on a set of generated artificial data samples for a minority data class of the imbalanced training data set. ... International Business Machines Corporation

12/10/15 / #20150356459

Labeling of data for machine learning

A computer generates labels for machine learning algorithms by retrieving, from a data storage circuit, multiple label sets that contain labels that each classify data points in a corpus of data. A graph is generated that includes a plurality of edges, each edge between two respective labels from different label sets of the multiple label sets. ... International Business Machines Corporation

12/10/15 / #20150356457

Labeling of data for machine learning

A computer generates labels for machine learning algorithms by retrieving, from a data storage circuit, multiple label sets that contain labels that each classify data points in a corpus of data. A graph is generated that includes a plurality of edges, each edge between two respective labels from different label sets of the multiple label sets. ... International Business Machines Corporation

12/10/15 / #20150356456

Real-time or frequent ingestion by running pipeline in order of effectiveness

A mechanism is provided in a data processing system for partial ingestion of content. The mechanism receives new content to be ingested into a corpus of information. ... International Business Machines Corporation

12/10/15 / #20150356445

Data loss prevention to remove false positives

A method includes a computing device receiving data traffic flow and initializing a subroutine to assess alerts for the received data traffic flow; the computer device determining a collection of rules which produce more than a threshold of false positive alerts and more than a threshold of true positive alerts for the assessed alerts; the computer device determining a logical condition and an atomic rule element to add to the collection of rules; and the computer device implementing the added logical condition and atomic rule element if the number of assessed alerts are decreased below a value.. . ... International Business Machines Corporation

12/10/15 / #20150356420

Rating difficulty of questions

A mechanism is provided in a data processing system for rating difficulty of a question. The mechanism receives an input question and generates one or more candidate answers from a corpus of knowledge using a pipeline of software engines. ... International Business Machines Corporation

12/10/15 / #20150356352

Background understanding in video data

Long-term understanding of background modeling includes determining first and second dimension gradient model derivatives of image brightness data of an image pixel along respective dimensions of two-dimensional, single channel image brightness data of a static image scene. The determined gradients are averaged with previous determined gradients of the image pixels, and with gradients of neighboring pixels as a function of their respective distances to the image pixel, the averaging generating averaged pixel gradient models for each of a plurality of pixels of the video image data of the static image scene that each have mean values and weight values. ... International Business Machines Corporation

12/10/15 / #20150356286

Continuous monitoring of fingerprint signature on a mobile touchscreen for identity management

A mobile device implements a state machine with full authentication, continuous authentication, and invalidation states. To access the device, the full authentication state requires the user to confirm his or her identity using some robust authentication technique. ... International Business Machines Corporation

12/10/15 / #20150356284

User authentication

A method and system for authenticating a user is provided. The method includes receiving keyboard entries from a user while a cursor of a computer screen is positioned in a password field of the user. ... International Business Machines Corporation

12/10/15 / #20150356270

Automated medical problem list generation from electronic medical record

Methods, systems, and devices map data of an electronic medical record to standardized medical concepts. The standardized medical concepts are defined by medical industry standards organizations. ... International Business Machines Corporation

12/10/15 / #20150356230

Optical proximity correction (opc) accounting for critical dimension (cd) variation from inter-level effects

Various embodiments include computer-implemented methods, computer program products and systems for modeling at least one feature in an integrated circuit (ic) layout for an inter-layer effect. In some cases, approaches include a computer-implemented method of modeling at least one feature in an ic layout for an inter-level effect, the method including: building a set of shape measurement regions each connected with an edge of the at least one feature; determining a set of shape parameters for each shape measurement region in the set of shape measurement regions; and creating a column vector representing each shape measurement region using the set of shape parameters, the column vector representing the inter-layer effect of the at least one feature, wherein the inter-layer effect includes a physical relationship between the at least one feature and another feature on a distinct level of the ic layout.. ... International Business Machines Corporation

12/10/15 / #20150356228

Photomask error correction

Design errors generated employing a mask rule check (mrc) program are indexed and examined one by one by an automated computer program connected to a false error pattern database that contains previously known waivered patterns, a real error pattern database that contains previously known pairs of an error-containing pattern and a corresponding error-free pattern, and optionally a mask house rule database. A waiver is applied to each design error for which a matching pattern is found in the false error pattern database. ... International Business Machines Corporation

12/10/15 / #20150356223

Techniques for generating nanowire pad data from pre-existing design data

In one aspect, a cad-based method for designing a lithographic mask for nanowire-based devices is provided which includes the steps of: create a design for the mask from existing (e.g., finfet or planar cmos) design data which includes, for each of the devices, one or more nanowire mask shapes (finfet design data) or continuous shapes (planar cmos design data); for finfet design data, merging the nanowire mask shapes into continuous shapes; expanding the continuous shapes to join all of the continuous shapes in the design together forming a single polygon shape; removing the continuous shapes from the single polygon shape resulting in landing pad shapes for anchoring the nanowire mask shapes; for cmos design data, dividing the continuous active shapes into one or more nanowire mask shapes; and merging the landing pad shapes with the nanowire mask shapes to form the lithographic mask.. . ... International Business Machines Corporation

12/10/15 / #20150356221

Simulation method using memory frame proxy architecture for synchronization and check handling

A simulation technique that handles accesses to a frame of memory via a proxy object provides improved throughput in simulation environments. The proxy object, if present, processes the access at a head of a linked list of frames. ... International Business Machines Corporation

12/10/15 / #20150356203

Determining temporal categories for a domain of content for natural language processing

Mechanisms are provided for processing sources of content in a corpus of information associated with a domain. The mechanisms ingest a plurality of sources of content in the corpus of information associated with the domain and determine at least one temporal category for the domain based on identification of frequently occurring references to at least one of temporal terms or time spans specified in the plurality of sources of content in the corpus of information associated with the domain. ... International Business Machines Corporation

12/10/15 / #20150356197

Providing interaction between a first content set and a second content set in a computer system

Interaction is provided between a first content set and a second content set, both of which are loaded into a data structure. When an event associated with loading of the second content set is detected, the second content set is parsed to identify at least one sub-set of the second content set. ... International Business Machines Corporation

12/10/15 / #20150356196

Classifying uniform resource locators

A target domain name is classified using hash strides including domain name components. The hash strides are fed into a set of bloom filters programmed to identify pre-determined domain name categories. ... International Business Machines Corporation

12/10/15 / #20150356193

In a method for sharing computer-generated search results, in an integrated development environment (ide), a first computer inserts, into a message, a portion of search results of a search of one or more files accessible via the ide. The portion of the search results includes a user-selectable file name. ... International Business Machines Corporation

12/10/15 / #20150356181

Effectively ingesting data used for answering questions in a question and answer (qa) system

A mechanism is provided, in a data processing system comprising a processor and a memory configured to implement a question and answer (qa) system, for effectively ingesting data for answering questions in the qa system. A received input question having a set of question characteristics is parsed, which are compared to question characteristics associated with a set of previous questions. ... International Business Machines Corporation

12/10/15 / #20150356172

Providing answers to questions using multiple models to score candidate answers

A method, system and computer program product for generating answers to questions. In one embodiment, the method comprises receiving an input query; conducting a search to identify candidate answers to the input query, and producing a plurality of scores for each of the candidate answers. ... International Business Machines Corporation

12/10/15 / #20150356170

Time-based optimization of answer generation in a question and answer system

Mechanisms are provided for generating an answer to an input question. The mechanisms process a received input question to identify a temporal categorization of the input question indicating an intended time context for an answer to the input question. ... International Business Machines Corporation

12/10/15 / #20150356149

Re-sizing data partitions for ensemble models in a mapreduce framework

Techniques are described for revising data partition size for use in generating predictive models. In one example, a method includes determining an initial number of base model partitions of data from a plurality of data sources; determining an initial base model partition size based at least in part on the initial number of base model partitions; and evaluating the initial base model partition size at least in part with reference to at least one base model partition size reference. ... International Business Machines Corporation

12/10/15 / #20150356148

Re-sizing data partitions for ensemble models in a mapreduce framework

Techniques are described for revising data partition size for use in generating predictive models. In one example, a method includes determining an initial number of base model partitions of data from a plurality of data sources; determining an initial base model partition size based at least in part on the initial number of base model partitions; and evaluating the initial base model partition size at least in part with reference to at least one base model partition size reference. ... International Business Machines Corporation

12/10/15 / #20150356140

Adapting a relational query to accommodate hierarchical data

A method, system and computer program product for processing hierarchical data is provided. A method for processing hierarchical data in a relational database includes receiving an input parameter in an initial query for querying an array in a hierarchical data object stored in a table of a relational database, and transforming the initial query into a transformed query configured to place all elements of the array into a different table and to apply a sub-query against the table for the input parameter. ... International Business Machines Corporation

12/10/15 / #20150356139

Adapting a relational query to accommodate hierarchical data

A method, system and computer program product for processing hierarchical data is provided. A method for processing hierarchical data in a relational database includes receiving an input parameter in an initial query for querying an array in a hierarchical data object stored in a table of a relational database, and transforming the initial query into a transformed query configured to place all elements of the array into a different table and to apply a sub-query against the table for the input parameter. ... International Business Machines Corporation

12/10/15 / #20150356124

Managing data sets of a storage system

A method, system, and computer program product for managing data sets of a storage facility is disclosed. The method, system, and computer program product include determining, by analyzing a first data set, that the first data set includes a first record having padded data. ... International Business Machines Corporation

12/10/15 / #20150356119

Searching of images based upon visual similarity

Provided are techniques for selecting an image for comparison with a plurality of images; specifying one or more visual criterion for searching the plurality of images, wherein the visual criteria are based upon a visual similarity between the image and the plurality of images; searching the plurality of images based upon the criteria to identify a subset of the plurality of images that meet a threshold with respect to the visual similarity; and displaying in a graphical user interface the subset of images.. . ... International Business Machines Corporation

12/10/15 / #20150356095

Assessing data governance based on levels of abstraction

A computer receives a request for customization of a first data domain, of an organization, to be analyzed. The computer receives selection of the first data domain and a second data domain of the organization, a first data fulfillment element, and a linkage between the first data fulfillment element and one or both of the first data domain and the second data domain. ... International Business Machines Corporation

12/10/15 / #20150356089

Weighting search criteria based on similarities to an ingested corpus in a question and answer (qa) system

A mechanism is provided, in a data processing system comprising a processor and a memory configured to implement a question and answer (qa) system, for weighting search criteria based on similarities to an ingested corpus in the qa system. A set of question characteristics found in a received input question are compared to a set of data characteristics respectively describing data in each corpus of a corpora. ... International Business Machines Corporation

12/10/15 / #20150356069

Validating an xml document

At least one xml document to be validated is parsed, and xml data in the at least one xml document is represented as data objects in at least one data object model in a memory. At least one rule document is parsed and a rule object model that includes rule objects is created in the memory. ... International Business Machines Corporation

12/10/15 / #20150356067

Method and system for easily and securely managing multiple keys used to have access to multiple computing resources

The present invention is directed to a system, method and computer program for easily and securely managing multiple keys on a computer, each key being used to access one or a plurality of computing resources. The method comprises the steps of receiving a command for selecting a key among one or plurality of keys, each key comprising one or a plurality of key fields; receiving a command for activating a computing resource corresponding to the selected key in order to have access to the computing resource; retrieving and displaying on a computer screen, the one or plurality of key fields associated with the selected key; displaying on the computer screen one or a plurality of input fields, each input field being used to enter the content of an appropriate key field associated with the key selected to access the activated computing resource; passing, in response to an action of a pointing device on a displayed key field, the content of the key field in an appropriate input field of the activated computing resource; and having access to the activated computing resource when all key fields of the selected key have been passed to the appropriate input fields.. ... International Business Machines Corporation

12/10/15 / #20150356062

Indexing and annotating a usability test recording

A method for indexing a user interface test recording includes capturing, during a session, a recording of a plurality of interactions with the user interface, capturing, during the session, an event stream including a plurality of user interface events, synchronizing, in time, the plurality of interactions and the plurality of user interface events, identifying a point of interest in the event stream, wherein the point of interest is correlated to a time in the recording by the synchronization, and annotating the recording at a time correlated to when the point of interest occurred.. . ... International Business Machines Corporation

12/10/15 / #20150356044

High-speed memory system

The disclosed embodiments relate to a flash-based memory module having high-speed serial communication. The flash-based memory module comprises, among other things, a plurality of i/o modules, each configured to communicate with an external device over one or more external communication links, a plurality of flash-based memory cards, each comprising a plurality of flash memory devices, and a plurality of crossbar switching elements, each being connected to a respective one of the flash-based memory cards and configured to allow each one of the i/o modules to communicate with the respective one of the flash-based memory cards. ... International Business Machines Corporation

12/10/15 / #20150356007

Parallel garbage collection implemented in hardware

Embodiments of the invention provide a method and system for dynamic memory management implemented in hardware. In an embodiment, the method comprises storing objects in a plurality of heaps, and operating a hardware garbage collector to free heap space. ... International Business Machines Corporation

12/10/15 / #20150356004

Memory controller for requesting memory spaces and resources

In an example, an apparatus includes a memory controller. The memory controller may be configured to communicate a request to a computer program for a resource, to initialize a memory, and to perform operations on the memory as instructed. ... International Business Machines Corporation

12/10/15 / #20150356002

Deployment pattern monitoring

A computer system can detect a request for status information relating to a particular deployment pattern; query, in response to the request, a deployment pattern registry for deployment configuration information about the particular deployment pattern; test deployment capabilities for the particular deployment pattern by: verifying installation files for the particular deployment pattern are accessible; identifying one or more candidate deployment components for a hypothetical deployment of the particular deployment pattern; installing, on the one or more candidate deployment components, a virtual machine that is configured to test computing resources of the one or more candidate deployment components; and deleting the virtual machine in response to receiving test results regarding the resources of the one or more candidate deployment components. The system can generate a notification in response to detecting a failure in the testing.. ... International Business Machines Corporation

12/10/15 / #20150356000

Remediation of known defects and vulnerabilities in cloud application packages

A method for applying remediation policy to a cloud application package having a set of components is described. The method is initiated in response to discovery of a new vulnerability. ... International Business Machines Corporation

12/10/15 / #20150355999

Test coverage analysis

A test coverage analysis method and corresponding apparatus are disclosed, wherein, by executing the program under test using one or more test cases, generating one or more heapdump files containing the call stack information of the program under test, and analyzing the call stack information in the one or more heapdump files, the coverage information of the one or more test cases in terms of functions in the program under test is obtained.. . ... International Business Machines Corporation

12/10/15 / #20150355995

Detecting merge conflicts and compilation errors in a collaborative integrated development environment

A method, and associated computer system and computer program product, of detecting source code merge conflicts and compilation errors. Uncommitted changes associated with a source code are received periodically at each time of a sequence of times. ... International Business Machines Corporation

12/10/15 / #20150355994

Detecting potential class loader problems using the class search path sequence for each class loader

A method, system and computer program product for identifying potential class loader problems prior to or during the deployment of the classes to the production environment. A set of class loaders is loaded into memory. ... International Business Machines Corporation

12/10/15 / #20150355993

Detecting potential class loader problems using the class search path sequence for each class loader

A method, system and computer program product for identifying potential class loader problems prior to or during the deployment of the classes to the production environment. A set of class loaders is loaded into memory. ... International Business Machines Corporation

12/10/15 / #20150355983

Automatic management of server failures

In embodiments of the invention lpars can be run on any server in a group of servers. Upon detecting a server has failed, each lpar then running on the failed server is identified, and servers in the group that are available for restarting the identified lpars are determined. ... International Business Machines Corporation

12/10/15 / #20150355978

Systems and methods for backing up storage volumes in a storage system

Systems and methods for backing up storage volumes are provided. One system includes a primary side, a secondary side, and a network coupling the primary and secondary sides. ... International Business Machines Corporation

12/10/15 / #20150355976

Selecting during a system shutdown procedure, a restart incident checkpoint of an incident analyzer in a distributed processing system

Methods, apparatuses, and computer program products for selecting during a system shutdown procedure, a restart incident checkpoint of an incident analyzer in a distributed processing system. Embodiments include the incident analyzer determining whether at least one incident is in a queue. ... International Business Machines Corporation

12/10/15 / #20150355972

Salvaging hardware transactions

A transactional memory system salvages a partially executed hardware transaction. A processor of the transactional memory system saves state information in a first code region of a first hardware transaction, the state information useable to determine whether the first hardware transaction is to be salvaged or to be aborted. ... International Business Machines Corporation

12/10/15 / #20150355971

Failure domain based storage system data stripe layout

A method for performing stripe placement within a storage system is disclosed. After a set of failure domains within a storage system has been identified, the failure domains are then organized to form a hierarchy of failure domains. ... International Business Machines Corporation

12/10/15 / #20150355958

Salvaging hardware transactions

A transactional memory system salvages a partially executed hardware transaction. A processor of the transactional memory system determines information about an about-to-fail handler for transactional execution of a code region of a hardware transaction. ... International Business Machines Corporation

12/10/15 / #20150355956

Method, apparatus and computer program for administering messages which a consuming application fails to process

Disclosed is a method for administering messages. In response to a determination that one or more consuming applications have failed to process the same message on a queue a predetermined number of times, the message is made unavailable to consuming applications. ... International Business Machines Corporation

12/10/15 / #20150355955

Operating system user activity profiles

A user profile and one or more activity profiles selectively operable when the user profile is active are stored in one or more data structures accessible by an operating system of a data processing system. The one or more activity profiles each specify an application set for a respective user activity supported by the data processing system. ... International Business Machines Corporation

12/10/15 / #20150355953

Low overhead contention-based switching between ticket lock and queued lock

A technique for low overhead contention-based switching between ticket locking and queued locking to access shared data may include establishing a ticket lock, establishing a queue lock, operating in ticket lock mode using the ticket lock to access the shared data during periods of relatively low data contention, and operating in queue lock mode using the queue lock to access the shared data during periods of relatively high data contention.. . ... International Business Machines Corporation

12/10/15 / #20150355950

Resource allocation for virtual machines and logical partitions

A computer determines that a utilization level of a resource has satisfied a threshold. The computer scales the allocation of the resource to the furthest of the current allocation of the resource plus a parameter and of a historical limit. ... International Business Machines Corporation

12/10/15 / #20150355949

Dynamically configurable hardware queues for dispatching jobs to a plurality of hardware acceleration engines

A computer system having a plurality of processing resources, including a sub-system for scheduling and dispatching processing jobs to a plurality of hardware accelerators, the subsystem further comprising a job requestor, for requesting jobs having bounded and varying latencies to be executed on the hardware accelerators; a queue controller to manage processing job requests directed to a plurality of hardware accelerators; and multiple hardware queues for dispatching jobs to the plurality of hardware acceleration engines, each queue having a dedicated head of queue entry, dynamically sharing a pool of queue entries, having configurable queue depth limits, and means for removing one or more jobs across all queues.. . ... International Business Machines Corporation

12/10/15 / #20150355948

Dynamically configurable hardware queues for dispatching jobs to a plurality of hardware acceleration engines

A computer system having a plurality of processing resources, including a sub-system for scheduling and dispatching processing jobs to a plurality of hardware accelerators, the subsystem further comprising a job requestor, for requesting jobs having bounded and varying latencies to be executed on the hardware accelerators; a queue controller to manage processing job requests directed to a plurality of hardware accelerators; and multiple hardware queues for dispatching jobs to the plurality of hardware acceleration engines, each queue having a dedicated head of queue entry, dynamically sharing a pool of queue entries, having configurable queue depth limits, and means for removing one or more jobs across all queues.. . ... International Business Machines Corporation

12/10/15 / #20150355945

Adaptive scheduling policy for jobs submitted to a grid

Machines, systems and methods for providing a job description for execution in a computing environment, the method comprising receiving a job description, wherein the job description defines a set of job alternatives based on an order of priority and conditions associated with execution of the job alternatives; processing the job alternatives to determine whether resources for executing at least a first job alternative are available, considering respective first conditions defined in the job description for the first job alternative; selecting a first computing element implemented in a virtualized computing environment, wherein the selected first computing element has sufficient resources to satisfy resource requirements defined in the job description for the first job alternative; and submitting the job to the first computing element for execution.. . ... International Business Machines Corporation

12/10/15 / #20150355943

Weighted stealing of resources

In a computer system with multiple job queues and limited resources, an initial allocation of resources is given to each job queue. The utilization of these initially allocated resources is monitored, and queues with excess resources may have those resources stolen and temporarily redistributed to queues with unmet resource needs.. ... International Business Machines Corporation

12/10/15 / #20150355940

Idle time accumulation in a multithreading computer system

Embodiments relate to idle time accumulation in a multithreading computer system. According to one aspect, a computer-implemented method for idle time accumulation in a computer system is provided. ... International Business Machines Corporation

12/10/15 / #20150355937

Indicating nearing the completion of a transaction

In a multi-processor transaction execution environment, a transaction executes a hint instruction indicating proximity to completion of the transaction. Pending aborts of the transaction due to memory conflicts are suppressed based on the proximity of the transaction to completion.. ... International Business Machines Corporation

12/10/15 / #20150355932

Adaptive virtual machine request approver

An adaptive request handler (arh) receives a virtual machine (vm) request from a user and determines whether to automatically approve the vm request using a tolerance that defines an allowable amount of deviation from preset resource specifications. In some embodiments, the arh adaptively varies the tolerance based on one or more monitored factors, such as an aggregate system resource utilization by and/or a billing history of the user or a group that includes the user. ... International Business Machines Corporation

12/10/15 / #20150355931

Provisioning virtual cpus using a hardware multithreading parameter in hosts with split core processors

A cloud manager monitors available resources on host computer systems, including a number of hardware threads supported by cpus on the host computer systems and whether or not the cpus have split core enabled. The cloud manager receives a request to provision a virtual machine (vm) that includes a hardware multithreading parameter that specifies whether hardware multithreading is allowed on the host computer system. ... International Business Machines Corporation

12/10/15 / #20150355930

Placement of virtual cpus using a hardware multithreading parameter

A cloud manager monitors available resources on host computer systems, including a number of hardware threads supported by cpus on the host computer systems. The cloud manager receives a request to provision a virtual machine (vm) that includes a hardware multithreading parameter that specifies whether hardware multithreading is allowed on the host computer system. ... International Business Machines Corporation

12/10/15 / #20150355929

Provisioning virtual cpus using a hardware multithreading parameter in hosts with split core processors

A cloud manager monitors available resources on host computer systems, including a number of hardware threads supported by cpus on the host computer systems and whether or not the cpus have split core enabled. The cloud manager receives a request to provision a virtual machine (vm) that includes a hardware multithreading parameter that specifies whether hardware multithreading is allowed on the host computer system. ... International Business Machines Corporation

12/10/15 / #20150355928

Placement of virtual cpus using a hardware multithreading parameter

A cloud manager monitors available resources on host computer systems, including a number of hardware threads supported by cpus on the host computer systems. The cloud manager receives a request to provision a virtual machine (vm) that includes a hardware multithreading parameter that specifies whether hardware multithreading is allowed on the host computer system. ... International Business Machines Corporation

12/10/15 / #20150355926

Selecting a host for a virtual machine using a hardware multithreading parameter

A cloud manager monitors available resources on host computer systems, including a number of hardware threads supported by cpus on the host computer systems. The cloud manager receives a request to provision a virtual machine (vm) that includes a hardware multithreading parameter that specifies the amount of hardware multithreading required on the host computer system. ... International Business Machines Corporation

12/10/15 / #20150355925

Adaptive virtual machine request approver

An adaptive request handler (arh) receives a virtual machine (vm) request from a user and determines whether to automatically approve the vm request using a tolerance that defines an allowable amount of deviation from preset resource specifications. In some embodiments, the arh adaptively varies the tolerance based on one or more monitored factors, such as an aggregate system resource utilization by and/or a billing history of the user or a group that includes the user. ... International Business Machines Corporation

12/10/15 / #20150355922

Selecting a host for a virtual machine using a hardware multithreading parameter

A cloud manager monitors available resources on host computer systems, including a number of hardware threads supported by cpus on the host computer systems. The cloud manager receives a request to provision a virtual machine (vm) that includes a hardware multithreading parameter that specifies the amount of hardware multithreading required on the host computer system. ... International Business Machines Corporation

12/10/15 / #20150355908

Address expansion and contraction in a multithreading computer system

Embodiments relate to address expansion and contraction in a multithreading computer system. According to one aspect, a computer implemented method for address adjustment in a configuration is provided. ... International Business Machines Corporation

12/10/15 / #20150355907

Reliable transactional execution using digests

Performing a transaction in a transactional memory environment for performing transactional executions, the transactional memory environment including a digest-generating transaction to generate a computed digest and a digest-checking transaction to compare computed digests is provided. Included is identifying, by a computer system, a first indicator signaling a beginning instruction of a digest-generating transaction including a plurality of instructions; suppressing committing memory store data of the digest-generating transaction to memory; generating a computed digest based on the execution of at least one of the plurality of instructions; identifying a second indicator associated with the plurality of instructions signaling an ending instruction of the digest-generating transaction, the computed digest is replicable for an error-free execution of the plurality of instructions; and saving the computed digest, as a reliability digest, based on completing the digest-generating transaction and not save the first computed digest based on an abort of the digest-generating transaction.. ... International Business Machines Corporation

12/10/15 / #20150355906

Vector memory access instructions for big-endian element ordered and little-endian element ordered computer code and data

Embodiments relate to vector memory access instructions for big-endian (be) element ordered computer code and little-endian (le) element ordered computer code. An aspect includes determining a mode of a computer system comprising one of a be mode and an le mode. ... International Business Machines Corporation

12/10/15 / #20150355905

Vector memory access instructions for big-endian element ordered and little-endian element ordered computer code and data

Embodiments relate to vector memory access instructions for big-endian (be) element ordered computer code and little-endian (le) element ordered computer code. An aspect includes determining a mode of a computer system comprising one of a be mode and an le mode. ... International Business Machines Corporation

12/10/15 / #20150355903

Visualization of code units across disparate systems

A visualization tool that provides visibility of the functionality implemented with each system used by an institution(s) at code unit granularity can be used to overcome a variety of challenges that can occur in an environment with disparate systems. The visualization tool discovers and graphically displays functions/procedures/methods (“code units”) that satisfy a set of one or more criteria, as well as attributes of the discovered code units. ... International Business Machines Corporation

12/10/15 / #20150355895

Remediation of known defects and vulnerabilities in cloud application packages

A method for applying remediation policy to a cloud application package having a set of components is described. The method is initiated in response to discovery of a new vulnerability. ... International Business Machines Corporation

12/10/15 / #20150355892

Resources provisioning based on a set of discrete configurations

Machines, systems and methods for deploying virtual machines (vms), the method comprises maintaining n message queues corresponding to n vm flavors, wherein the n vm flavors are associated with n distinguishable configuration requirements for supporting placement of at least a first vm on at least a first host with limited resources; wherein a first host from among a plurality of hosts subscribes to a first message queue from among the n message queues, in response to determining that the first host has the resources that match the respective configuration requirements for supporting the first vm placed on the first message queue; receiving a vm placement request for the first vm, wherein the vm placement request comprises information indicating a first vm flavor associated with a first message queue; communicating arrival of the vm request to one or more hosts subscribing to the first message queue.. . ... International Business Machines Corporation

12/10/15 / #20150355891

Computer-based distribution of large sets of regular expressions to a fixed number of state machine engines for products and services

A method for distributing sets of regular expressions to a fixed number of state machine engines includes combining, with a processing device, a plurality of regular expressions into a single compound regular expression, creating a single nondeterministic finite automaton (nfa) including a plurality of nfa states based on the compound regular expression, performing an interference analysis for each pair of nfa states to identify all pairs of nfa states that would potentially interfere in an equivalent deterministic finite automaton (dfa), creating an interference graph representing the regular expressions associated with potentially interfering nfa states based on the results of the interference analysis, and performing a graph coloring algorithm on the interference graph to assign a different color to each represented regular expression in the graph.. . ... International Business Machines Corporation

12/10/15 / #20150355861

Transfer size monitor, determination, and optimization engine for storage devices

A method of monitoring, optimizing, and dynamically varying transfer size in a storage device is provided, including: receiving data transfer parameters for a solid state disk (ssd) device; selecting a data transfer size from the disk characterization data associated with the ssd device, based on a ssd device identifier in the received data transfer parameters matching the ssd device identifier in the disk characterization data; searching a weight-age table for a process identifier (pid) matching the pid from the received data transfer parameters; determining a heuristic representing a statistical distribution of input/output (i/o) operations per second (iops) and transfer sizes over time; modifying the received data transfer parameters based on at least one of: the selected data transfer size from the disk characterization data; the weight-age table; and the heuristic; and completing one or more (i/o) operations with the ssd device using the modified data transfer parameters.. . ... International Business Machines Corporation

12/10/15 / #20150355860

Extent-level reserve and release for a direct access storage device (dasd) volumes

In one embodiment, a computer program product for managing a reserve command includes a computer readable storage medium having program code embodied therewith, the program code readable and/or executable by a processor to receive, by the processor, a request to access a data set on one or more volumes of at least one direct access storage device (dasd), the request including a reserve command, and each of the one or more volumes including a consecutive set of one or more tracks of the at least one dasd, and reserve one or more extents of the at least one dasd while reserving less than a volume of the at least one dasd and not allowing any other entity than an entity which requested the reserve to access the one or more extents of the at least one dasd that have been reserved.. . ... International Business Machines Corporation

12/10/15 / #20150355847

Transfer size monitor, determination, and optimization engine for storage devices

A method of monitoring, optimizing, and dynamically varying transfer size in a storage device is provided, including: receiving data transfer parameters for a solid state disk (ssd) device; selecting a data transfer size from the disk characterization data associated with the ssd device, based on a ssd device identifier in the received data transfer parameters matching the ssd device identifier in the disk characterization data; searching a weight-age table for a process identifier (pid) matching the pid from the received data transfer parameters; determining a heuristic representing a statistical distribution of input/output (i/o) operations per second (iops) and transfer sizes over time; modifying the received data transfer parameters based on at least one of: the selected data transfer size from the disk characterization data; the weight-age table; and the heuristic; and completing one or more (i/o) operations with the ssd device using the modified data transfer parameters.. . ... International Business Machines Corporation

12/10/15 / #20150355840

Volume class management

A method for setting up and managing large numbers of storage volumes is disclosed. In one embodiment, such a method enables a user to establish a volume class comprising various volume attributes. ... International Business Machines Corporation

12/10/15 / #20150355837

Block-level predictive data migration

A method for migrating data in a tiered storage architecture is disclosed. In one embodiment, such a method includes tracking the temperature of data blocks in a tiered storage architecture, where the temperature indicates the frequency the data blocks are accessed. ... International Business Machines Corporation

12/10/15 / #20150355833

Column aware scrolling

Embodiments relate to controlling display of a document, where the document comprises multiple columns. An aspect includes displaying the columns of the document in a viewport, receiving a user input defining a downwards scrolling for the document. ... International Business Machines Corporation

12/10/15 / #20150355825

Recorded history feature in operating system windowing system

Recording the video display of an application independently of the video displays of other applications and regardless of the characteristics of the video display—for example, regardless of whether the application is running in the foreground or the background or whether its display is fully visible, partially visible, or not visible at all on a monitor or other display device.. . ... International Business Machines Corporation

12/10/15 / #20150355802

Dispay for input selection on a compact information pro-cessing device

Embodiments are provided for a system, a computer program product, and/or a method that improves a display of an input selection displayed on a compact screen. To improve this display, embodiments search displayed content for input items, wherein the input items are selections inputted by a user; display different marks, each associated with each of the input items; receive a subsequent input from the user; and change a selection state of each item of the input items corresponding to a mark of the different marks in response to the subsequent input received corresponding to that mark.. ... International Business Machines Corporation

12/10/15 / #20150355801

Recorded history feature in operating system windowing system

Recording the video display of an application independently of the video displays of other applications and regardless of the characteristics of the video display—for example, regardless of whether the application is running in the foreground or the background or whether its display is fully visible, partially visible, or not visible at all on a monitor or other display device.. . ... International Business Machines Corporation

12/10/15 / #20150355772

Touch prediction for visual displays

Touch events can be predicted relative to a visual display by maintaining a database of aggregated touch event history data relative to the visual display and from a plurality of touch screen devices. The database can be queried according to a set of input parameters defining an environment for use of the visual display. ... International Business Machines Corporation

12/10/15 / #20150355716

Controlling inadvertent inputs to a mobile device

Embodiments described herein provide approaches for controlling inadvertent inputs to a mobile device. Specifically, at least one approach includes: detecting an operating mode of a mobile device by determining if a user is currently interacting with the mobile device; detecting an operating environment of the mobile device; receiving an input resulting from a physical gesture to an input area of a mobile device; comparing the input to a past history of inputs received by the mobile device; and determining whether the physical gesture is intended by the user based on the operating mode of the mobile device, the operating environment of the mobile device, and the past history of inputs (e.g., per device application). ... International Business Machines Corporation

12/10/15 / #20150355677

Wearable display device

A wearable display device comprises: a set of position sensors, wherein the position sensors provide positioning data that describe a physical three-dimensional orientation of the wearable display device in real time; an exterior display surface that comprises a continuous display with a dynamically adjusted display region; and a video display controller, wherein the video display controller displays a video content on the region directed to the user's eyes on the dynamically adjusted display region based on the physical three-dimensional orientation of the wearable display device.. . ... International Business Machines Corporation

12/10/15 / #20150355673

Methods and systems with delayed execution of multiple processors

A first first-in-first-out (fifo) memory may receive first processor input from a first processor group that includes a first processor. The first processor group is configured to execute program code based on the first processor input that includes a set of input signals, a clock signal, and corresponding data. ... International Business Machines Corporation

12/10/15 / #20150355266

Atom probe tomography sample preparation for three-dimensional (3d) semiconductor devices

A method for atom probe tomography (apt) sample preparation from a three-dimensional (3d) field effect transistor device formed within a semiconductor structure is provided. The method may include measuring a capacitance-voltage (c-v) characteristic for the 3d field effect transistor device and identifying, based on the measured capacitance-voltage (c-v) characteristic, a fin structure corresponding to the 3d field effect transistor device. ... International Business Machines Corporation

12/10/15 / #20150355156

Methods and apparatus for detecting metals in liquids

Method and apparatus for detecting metals in a liquid are described. The liquid is contacted with a hexahydrotriazine and/or a hemiaminal material, and a uv absorption spectrum of the material before and after exposure to the liquid is examined to determine whether metals are present in the liquid.. ... International Business Machines Corporation

12/10/15 / #20150355090

Methods and apparatus for detecting metals in liquids

Method for detecting metals in a liquid are described. The liquid is contacted with a hexahydrotriazine and/or a hemiaminal material, and a uv absorption spectrum of the material before and after exposure to the liquid is examined to determine whether metals are present in the liquid.. ... International Business Machines Corporation

12/10/15 / #20150353584

Sulfur scavenging materials

Materials which react with (“scavenge”) sulfur compounds, such as hydrogen sulfide and mercaptans, are useful for limiting sulfur-induced corrosion. Surface-modified particles incorporating a hexahydrotriazine moiety are disclosed and used as sulfur scavengers. ... International Business Machines Corporation

12/10/15 / #20150353008

Automotive dynamic virtual network

An apparatus includes a vehicle position module that determines a position of each proximal vehicle with respect to a user's vehicle. Each proximal vehicle is positioned in relation to the user's vehicle without another vehicle between the proximal vehicle and the user's vehicle. ... International Business Machines Corporation

12/10/15 / #20150352476

Filtering lead from photoresist stripping solution

A photoresist stripping tool includes a reservoir configured to contain photoresist stripping solution and a pb filter comprising a filter element with tin (sn) exterior surfaces. A semiconductor wafer fabrication system includes a semiconductor wafer attached to the photoresist stripping tool that strips photoresist from the semiconductor wafer. ... International Business Machines Corporation

12/10/15 / #20150352374

Fast and accurate proton therapy dose calculations

Simulating particle beam interactions includes identifying a set of n functions f1, f2, . . ... International Business Machines Corporation

12/10/15 / #20150351680

Cognitive event predictor

A method and/or computer program product identifies and/or predicts a cognitive state of a user. A buffer on a device is loaded with a predetermined set of sensor readings for a user. ... International Business Machines Corporation

12/03/15 / #20150351281

Pump-enhanced, immersion-cooling of electronic component(s)

Cooling apparatuses and methods of fabricating thereof are provided which facilitate pumped immersion-cooling of an electronic component(s). The cooling apparatus includes an enclosure having a compartment accommodating the electronic component(s), and dielectric fluid within the compartment at least partially immersing the electronic component(s). ... International Business Machines Corporation

12/03/15 / #20150351256

Assembly of printed circuit boards

A printed circuit board (pcb) assembly includes a first pcb and a second pcb disposed substantially parallel and opposite to each other, such that a second side of the first pcb is opposite to a first side of the second pcb; wherein the second pcb has a first set of side connectors on its first side and a second set of side connectors on its second side, configured for both electrical power supply to and signal communication with the second pcb; the second pcb both electrically and mechanically connected to the second side of the first pcb via a first elastomeric connector; and the second pcb electrically connected to the first pcb via its second set of side connectors and a flexible electrical connector that is electrically connected to the second set of side connectors and the first pcb.. . ... International Business Machines Corporation

12/03/15 / #20150351242

Assembly of printed circuit boards

A printed circuit board (pcb) assembly includes a first pcb and a second pcb disposed substantially parallel and opposite to each other, such that a second side of the first pcb is opposite to a first side of the second pcb; wherein the second pcb has a first set of side connectors on its first side and a second set of side connectors on its second side, configured for both electrical power supply to and signal communication with the second pcb; the second pcb both electrically and mechanically connected to the second side of the first pcb via a first elastomeric connector; and the second pcb electrically connected to the first pcb via its second set of side connectors and a flexible electrical connector that is electrically connected to the second set of side connectors and the first pcb.. . ... International Business Machines Corporation

12/03/15 / #20150351107

Interference processing in wireless communication

A method for processing interference in wireless communication at a base station, wherein at least some of a plurality of (radio frequency) rf channels in the base station operates at a current operating frequency point assigned to the base station includes detecting interference of one or more candidate frequency points by using at least one rf channel, wherein the one or more candidate frequency points are different from the current operating frequency point; reporting result of detecting interference of the one or more candidate frequency points to a resource manager; and in response to the resource manager assigning one of the one or more candidate frequency points to the base station, notifying a user to switch from the current operating frequency point to the assigned candidate frequency point.. . ... International Business Machines Corporation

12/03/15 / #20150351069

Determining location of a user of a mobile device

A method of determining location of a user of a mobile device based on call detail records (cdrs) includes determining data in cdrs related to the user; determining base stations associated with communication locations of the user and corresponding statistical data about communication frequency according to the determined data in the cdrs; and determining location of the user based on at least three determined base stations and the corresponding statistical data about communication frequency as well as physical coordinates of the three base stations.. . ... International Business Machines Corporation

12/03/15 / #20150350956

Changing a data stream characteristic based on a data usage rate

An approach is provided for adjusting a characteristic of a data stream. A rate of data usage provided by one or more data streams within a time period that has not ended is determined. ... International Business Machines Corporation

12/03/15 / #20150350891

Techniques for location information control using user profiles

A technique for anonymizing location information of a mobile device includes intercepting, by the mobile device, a request for access to actual location information of the mobile device made by an application. The mobile device redirects the request to a trusted edge server. ... International Business Machines Corporation

12/03/15 / #20150350890

Anonymizing location information of a mobile device

Anonymizing location information of a mobile device by an anonymization provider. The anonymization provider receives, from the mobile device, location information identifying the location of the mobile device and anonymity requirements. ... International Business Machines Corporation

12/03/15 / #20150350886

Customizable serviceability mechanism

An approach is provided in which a mobile device collects serviceability data from applications executing on the mobile device based upon one or more serviceability state changes provided by a server. The mobile device filters the collected serviceability data according to one or more collection filter rules provided by the server and, in turn, sends the filtered serviceability data to the server accordingly.. ... International Business Machines Corporation

12/03/15 / #20150350872

Mobility detection for edge applications in wireless communication networks

Various embodiments detect wireless communication device mobility in a wireless communication network. In one embodiment, one or more internet protocol (ip) data packets associated with a wireless communication device are analyzed. ... International Business Machines Corporation

12/03/15 / #20150350851

Determining location of a user of a mobile device

A method of determining location of a user of a mobile device based on call detail records (cdrs) includes determining data in cdrs related to the user; determining base stations associated with communication locations of the user and corresponding statistical data about communication frequency according to the determined data in the cdrs; and determining location of the user based on at least three determined base stations and the corresponding statistical data about communication frequency as well as physical coordinates of the three base stations.. . ... International Business Machines Corporation

12/03/15 / #20150350830

Wireless positioning and wireless positioning method and apparatus

An apparatus for wireless positioning includes a first delimitation unit configured to delimit an initial boundary for a predetermined space to divide the predetermined space into at least two areas, each area of the at least two areas comprising multiple zones, the multiple zones including a boundary zone adjacent to the initial boundary; a detection unit configured to detect signal feature values of respective wireless access points in the boundary zone and determine an identifier set of the detected wireless access points; and a second delimitation unit configured to re-determine the boundaries of the at least two areas for the wireless positioning based on the detection results in the boundary zone. With the method and apparatus of embodiments of the present invention, it is possible to reduce the positioning calculation time while maintaining high positioning accuracy.. ... International Business Machines Corporation

12/03/15 / #20150350829

Wireless positioning and wireless positioning method and apparatus

An apparatus for wireless positioning includes a first delimitation unit configured to delimit an initial boundary for a predetermined space to divide the predetermined space into at least two areas, each area of the at least two areas comprising multiple zones, the multiple zones including a boundary zone adjacent to the initial boundary; a detection unit configured to detect signal feature values of respective wireless access points in the boundary zone and determine an identifier set of the detected wireless access points; and a second delimitation unit configured to re-determine the boundaries of the at least two areas for the wireless positioning based on the detection results in the boundary zone. With the method and apparatus of embodiments of the present invention, it is possible to reduce the positioning calculation time while maintaining high positioning accuracy.. ... International Business Machines Corporation

12/03/15 / #20150350748

Cooperative task execution in instrumented roadway systems

A method and system for relaying a sensor communication to a central monitoring system by utilizing a crowdsourcing model. The method includes: obtaining a registered device through crowdsourcing; registering the registered device into a central monitoring system; configuring the registered device to communicate with a plurality of road management sensors and with the central monitoring system; monitoring and gathering location information of the registered device by the central monitoring system; transmitting, via the central monitoring system, a request to gather a sensor communication from a sensor to the registered device; executing the request, via the registered device, by capturing the sensor communication emitted from the sensor, wherein the sensor communication is emitted using a passive radio-frequency identification tag; and relaying at least a part of the sensor communication from the registered device to the central monitoring system.. ... International Business Machines Corporation

12/03/15 / #20150350610

Intelligent recycling container

In an embodiment, a refuse container comprises a camera in electrical communication with a computing processor that is included in one or more computer processors. A radio is in electrical communication with a computing processor that is included in the one or more computer processors having the ability to transmit and/or receive data wirelessly. ... International Business Machines Corporation

12/03/15 / #20150350603

Adaptive video streaming for communication sessions

A computer-implemented method, computer program product, and computing system is provided for managing quality of experience for video conferences. In an implementation, a method may include determining a capacity of a participant associated with a video conference. ... International Business Machines Corporation

12/03/15 / #20150350602

Adaptive video streaming for communication sessions

A computer-implemented method, computer program product, and computing system is provided for managing quality of experience for video conferences. In an implementation, a method may include determining a capacity of a participant associated with a video conference. ... International Business Machines Corporation

12/03/15 / #20150350505

Automatic camera selection based on device orientation

At least two camera lenses on a mobile may be provided. The camera lenses may be configured to face the same or substantially the same direction, at least one of the two camera lenses positioned along one edge of the mobile device and at least another one of the two camera lenses positioned along another edge. ... International Business Machines Corporation

12/03/15 / #20150350366

Scalable caching of remote file data in a cluster file system

A system facilitates access to data in a network. One implementations includes a caching layer function that is configured to integrate into a local cluster file system, to cache local file data in a cache based on fetching file data on demand from a remote cluster file system, and to operate on a multi-node cache cluster. ... International Business Machines Corporation

12/03/15 / #20150350361

Parallel processing architecture for license metrics software

In one embodiment, in accordance with the present invention, a method for parallel collection of software license metrics comprises receiving, by one or more processors at a host computer, a software asset management request; interpreting, by one or more processors at the host computer, the software asset management request to generate queries; transmitting, by one or more processors at the host computer, the generated queries to designated network endpoints; receiving, by one or more processors at the host computer, partial results transmitted to the host computer by processing units which form a subset of the network endpoints; and merging, by one or more processors at the host computer, the partial results to form a final response to the received software asset management request.. . ... International Business Machines Corporation

12/03/15 / #20150350327

Switch-based data tiering

Embodiments include a method, system, and computer program product for allocating data to storage in a network. A data item accessed by a server in the network is identified. ... International Business Machines Corporation

12/03/15 / #20150350325

Systems and methods for transformation of logical data objects for storage

Systems capable of transformation of logical data objects for storage and methods of operating thereof are provided. One method includes identifying among a plurality of requests addressed to the storage device two or more “write” requests addressed to the same logical data object, deriving data chunks corresponding to identified “write” requests and transforming the derived data chunks, grouping the transformed data chunks in accordance with the order the requests have been received and in accordance with a predefined criteria, generating a grouped “write” request to the storage device, and providing mapping in a manner facilitating one-to-one relationship between the data in the obtained data chunks and the data to be read from the transformed logical object. ... International Business Machines Corporation

12/03/15 / #20150350293

Portlet scheduling with improved loading time and loading efficiency

A data processing, and more specifically, to a method and system for portlet scheduling. The method for scheduling a plurality of portlets according to the present invention comprising: obtaining invocation time of the plurality of portlets; obtaining weights of the plurality of portlets; assembling the plurality of portlets into a plurality of threads according to the invocation time and the weights, wherein the assembled plurality of threads has similar thread invocation time. ... International Business Machines Corporation

12/03/15 / #20150350252

Computer devices and security management device communicationally-connected to the same

A mechanism is provided for performing an action on a second computer device. An information receiving unit in a first computer device receives a first message from a security management device, wherein the security management device performs a security analysis. ... International Business Machines Corporation

12/03/15 / #20150350218

Multi-factor secure appliance decommissioning

A network-based appliance includes a mechanism to erase data on the appliance's local storage. The appliance's normal system reset operation is overridden to enable a local user to place the appliance into a safe mode during which remote erasure of the storage is permitted, provided that mode is entered within a first time period following initiation of a system reset. ... International Business Machines Corporation

12/03/15 / #20150350216

Retrospective policy safety net

These and other objectives are attained with a method and system for evaluating an access policy change. The method comprises the step of providing an access control mechanism having a first policy, and an audit log having entries of accesses made under that first policy. ... International Business Machines Corporation

12/03/15 / #20150350187

Service account access

A computer system detects an external media device and determines the external media device contains authentication data for the computer system. In response, a first password is generated based on an identifier unique to the computer system. ... International Business Machines Corporation

12/03/15 / #20150350175

Multi-factor secure appliance decommissioning

A network-based appliance includes a mechanism to erase data on the appliance's local storage. The appliance's normal system reset operation is overridden to enable a local user to place the appliance into a safe mode during which remote erasure of the storage is permitted, provided that mode is entered within a first time period following initiation of a system reset. ... International Business Machines Corporation

12/03/15 / #20150350161

Network traffic analysis to enhance rule-based network security

A method of interpreting a rule and a rule-interpreting apparatus for rule-based security apparatus, and an apparatus implementing the method. The method comprises the following steps: designating a suspicious timeslot; if any packet does not present in the designated timeslot, capturing current incoming packets or capturing other incoming packets in the designated timeslot next time; automatically associating the packets in the designated timeslot to form at least one traffic flow corresponding to a connection or call; analyzing the at least one traffic flow to select at least one suspicious target traffic flow; and outputting the at least one selected suspicious target flow.. ... International Business Machines Corporation

12/03/15 / #20150350152

Managing and storing messages received by a mobile computing device

In an approach to managing messages received by a mobile computing device, a computer retrieves a plurality of settings associated with the mobile computing device, with at least one of the plurality of settings associating a characteristic of the mobile computing device with an indication to initiate message retrieval. The computer determines the characteristic of the mobile computing device and determines, based, at least in part, on the characteristic of the mobile computing device, whether the associated indication to initiate message retrieval is received. ... International Business Machines Corporation

12/03/15 / #20150350149

Method for real-time viral event prediction from social data

Filtering a set of social messages received in real time to yield a sub-set likely to relate to some first substantive content subject (such as a video available online). For each message in the sub-set, a respective social message sender, and a corresponding social influence value for each respective social message sender is determined. ... International Business Machines Corporation

12/03/15 / #20150350117

Conversation branching for more efficient resolution

A method for conversation branching may include storing a plurality of messages communicated in an online conversation and generating a fingerprint for each message. The fingerprint for each message may be stored in a lookup table. ... International Business Machines Corporation

12/03/15 / #20150350108

Adjusting cloud resource allocation

A method, system, and computer program product for adjusting cloud resource allocation using n-tier simulation are provided in the illustrative embodiments. In a multi-tiered simulation configuration, a combination of predictive models is executed such that each tier executes at least one predictive model to produce a corresponding set of predicted events. ... International Business Machines Corporation

12/03/15 / #20150350103

Managing information technology resources using metadata tags

A resource manager is tasked with monitoring and managing information technology (it) resources in a virtual environment. The it resources are assigned tags that correspond to conditions that alert the resource manager when to begin actively managing the it resource. ... International Business Machines Corporation

12/03/15 / #20150350084

Virtual network data control with network interface card

Embodiments relate to managing data flows through a virtual network. An aspect includes receiving, by a network interface card (nic) connected to a hypervisor of a source computer, flows of data packets from one or more virtual machines managed by the hypervisor. ... International Business Machines Corporation

12/03/15 / #20150350081

Virtual network data control with network interface card

Embodiments relate to managing data flows through a virtual network. An aspect includes receiving, by a network interface card (nic) connected to a hypervisor of a source computer, flows of data packets from one or more virtual machines managed by the hypervisor. ... International Business Machines Corporation

12/03/15 / #20150350079

Method of message routing for a distributed computing system

Message routing is implemented by a computer device. A global ring is connected via a network, wherein the global ring is associated with a distributed hash table (dht) and includes a plurality of nodes which are divided exclusively into groups in advance. ... International Business Machines Corporation

12/03/15 / #20150350056

Routing switch device

The present disclosure provides a method and device for use by a routing switch device. In response to a determination to switch the routing switch device to switch from a conventional mode to an openflow mode the following operations are performed. ... International Business Machines Corporation

12/03/15 / #20150350051

Quickly locating devices

A set of computing devices are networked together. Each device maintains data about the other computing devices in the set, namely, a time and location of a last successful connection between the device and one or more of the other devices. ... International Business Machines Corporation

12/03/15 / #20150350035

Managing information technology resources using metadata tags

A resource manager is tasked with monitoring and managing information technology (it) resources in a virtual environment. The it resources are assigned tags that correspond to conditions that alert the resource manager when to begin actively managing the it resource. ... International Business Machines Corporation

12/03/15 / #20150350033

Discrete, depleting chips for obtaining desired service level characteristics

The present invention provides discrete, depleting chips for allocating computational resources for obtaining desired service level characteristics, wherein discrete chips deplete from a maximum allocated amount but may, in an optional implementation, be allowed to be replenished through the purchase of additional chips. A number of chips are assigned to a requestor/party, known as a business unit (bu), which could be a department, or group providing like-functionality services. ... International Business Machines Corporation

12/03/15 / #20150349967

Encryption engine with twin cell memory array

Described are a hardware encryption engine, and secret key registration and authentication system recoverable binary bit using knowing an initial secret key stored in the master system. The secret key is overwritten in each authentication, updating it to the master and encryption engine independently. ... International Business Machines Corporation

12/03/15 / #20150349895

Interference processing in wireless communication

A method for processing interference in wireless communication at a base station, wherein at least some of a plurality of (radio frequency) rf channels in the base station operates at a current operating frequency point assigned to the base station includes detecting interference of one or more candidate frequency points by using at least one rf channel, wherein the one or more candidate frequency points are different from the current operating frequency point; reporting result of detecting interference of the one or more candidate frequency points to a resource manager; and in response to the resource manager assigning one of the one or more candidate frequency points to the base station, notifying a user to switch from the current operating frequency point to the assigned candidate frequency point.. . ... International Business Machines Corporation

12/03/15 / #20150349779

Level shifter for a time-varying input

A level shifter circuit for coupling a first circuit, that uses a first supply voltage, with a second circuit, that uses a second supply voltage, includes an input node to receive an input signal and an output node to output to a level-shifted output signal corresponding with the input signal. An idle state on the input node corresponds with a particular binary logic value that is maintained for a first time period, and which is detected by a detection sub-circuit. ... International Business Machines Corporation

12/03/15 / #20150349778

Level shifter for a time-varying input

A level shifter circuit for coupling a first circuit, that uses a first supply voltage, with a second circuit, that uses a second supply voltage, includes an input node to receive an input signal and an output node to output to a level-shifted output signal corresponding with the input signal. An idle state on the input node corresponds with a particular binary logic value that is maintained for a first time period, and which is detected by a detection sub-circuit. ... International Business Machines Corporation

12/03/15 / #20150349754

Pulse stretching circuit and method

A pulse stretching circuit having a pulse delay circuit for receiving an input pulse signal and for outputting a delay pulse signal, and a pulse adjustment circuit, connected to the pulse delay circuit, receiving the input pulse signal and the delay pulse signal and for outputting an output pulse signal having a pulse width longer than a pulse width of the input pulse signal. The pulse adjustment circuit causes a leading edge of the output pulse signal in response to a leading edge of the input pulse signal, keeps a state in which the output pulse signal is displaced with the leading edge thus caused longer than a total time of times for both pulse widths of the input pulse signal and the delay pulse signal, and causes a trailing edge of the output pulse signal in response to a trailing edge of the delay pulse signal.. ... International Business Machines Corporation

12/03/15 / #20150349565

Shielded package assemblies with integrated capacitor

Package assemblies including a die stack and related methods of use. The package assembly includes a substrate with a first surface, a second surface, and a third surface bordering a through-hole extending from the first surface to the second surface. ... International Business Machines Corporation

12/03/15 / #20150349529

Distributed phase balancing

Methods, systems, and computer program products for distributed phase balancing are provided herein. A method of use in connection with a distribution network having a phase imbalance includes determining one or more power consumption parameters associated with a given entity of the distribution network; determining one or more power supply parameters associated with the given entity of the distribution network; and computing, based on said one or more power consumption parameters and said one or more power supply parameters, at least one of (i) a level of power consumption increase and/or decrease and (ii) a level of power supply increase and/or decrease associated with one or more devices of the given entity to remedy the phase imbalance within the distribution network.. ... International Business Machines Corporation

12/03/15 / #20150349508

Protecting electronic devices from electrical supply disturbances

Embodiments of the present invention provide an approach for monitoring electrical disturbance (e.g., surges, outages, etc.) possibilities, and then automatically isolating electronic devices (also referred to herein as electronics) for the duration of the disturbance (or threat thereof). In a typical embodiment, a probability of an electrical disturbance occurring at a specified location will be determined. ... International Business Machines Corporation

12/03/15 / #20150349321

Polymer fused batteries

Polymer-fused batteries are provided. The battery includes a casing, an anode coupled to the casing, an electrical source disposed between the casing and the anode, and a fuse. ... International Business Machines Corporation

12/03/15 / #20150349123

Strained finfet by epitaxial stressor independent of gate pitch

A semiconductor device is fabricated by forming a fin and a plurality of gates upon a semiconductor substrate, forming sacrificial spacers upon opposing gate sidewalls, forming a mask upon an upper surface of the fin between neighboring gates, removing the sacrificial spacers, recessing a plurality of regions of the fin to create a dummy fin and fin segments, removing the mask, and epitaxially merging the dummy fin and fin segments. The fins may be partially recessed prior to forming the sacrificial spacers. ... International Business Machines Corporation

12/03/15 / #20150349121

Asymmetric stressor dram

A stressor structure is formed within a drain region of an access transistor in a dynamic random access memory (dram) cell in a semiconductor-on-insulator (soi) substrate without forming any stressor structure in a source region of the dram cell. The stressor structure induces a stress gradient within the body region of the access transistor, which induces a greater leakage current at the body-drain junction than at the body-source junction. ... International Business Machines Corporation

12/03/15 / #20150349093

Finfet with dielectric isolation after gate module for improved source and drain region epitaxial growth

A method forming a semiconductor device that in one embodiment includes forming a gate structure on a channel region of fin structures, and forming a flowable dielectric material on a source region portion and a drain region portion of the fin structures. The flowable dielectric material is present at least between adjacent fin structures of the plurality of fin structures filling a space between the adjacent fin structures. ... International Business Machines Corporation

12/03/15 / #20150349089

Tucked active region without dummy poly for performance boost and variation reduction

In one embodiment, a semiconductor device is provided that includes a semiconductor substrate including an active region and at least one trench isolation region at a perimeter of the active region, and a functional gate structure present on a portion of the active region of the semiconductor substrate. Embedded semiconductor regions are present in the active region of the semiconductor substrate on opposing sides of the portion of the active region that the functional gate structure is present on. ... International Business Machines Corporation

12/03/15 / #20150349085

Method for making a semiconductor device with sidewall spacers for confining epitaxial growth

A method for making a semiconductor device includes forming laterally spaced-apart semiconductor fins above a substrate. At least one dielectric layer is formed adjacent an end portion of the semiconductor fins and within the space between adjacent semiconductor fins. ... International Business Machines Corporation

12/03/15 / #20150349083

Methods of forming mis contact structures for semiconductor devices and the resulting devices

One method disclosed includes, among other things, conformably depositing a layer of contact insulating material and a conductive material layer in a contact opening, forming a reduced-thickness sacrificial material layer in the contact opening so as to expose a portion, but not all, of the conductive material layer, removing portions of the conductive material layer and the layer of contact insulating material positioned above the upper surface of the reduced-thickness sacrificial material layer, removing the reduced-thickness sacrificial material layer, and forming a conductive contact in the contact opening that contacts the recessed portions of the conductive material layer and the layer of contact insulating material.. . ... International Business Machines Corporation

12/03/15 / #20150349076

Variable length multi-channel replacement metal gate including silicon hard mask

A method of forming a semiconductor device includes forming first and second semiconductor structures on a semiconductor substrate. The first semiconductor structure includes a first gate channel region having a first gate length, and the second semiconductor structure including a second gate channel region having a second gate length that is greater than the first gate length. ... International Business Machines Corporation

12/03/15 / #20150349075

Integrated multiple gate length semiconductor device including self-aligned contacts

A multi-channel semiconductor device includes a first and second gate channels formed in a semiconductor substrate. The first gate channel has a first length and the second gate channel has a second length greater than the first length. ... International Business Machines Corporation

12/03/15 / #20150349068

Contact resistance optimization via epi growth engineering

A transistor contact structure and methods of making the same. The method includes forming a first semiconductor layer in a source/drain opening of a substrate, the first layer having a non-planar top surface; forming a second semiconductor layer directly on the first layer, the second layer having a defect density greater than the first layer; and forming a silicide region formed with the second layer, the silicide region having a non-planar interface with the first layer. ... International Business Machines Corporation

12/03/15 / #20150348995

Structure and method to reduce crystal defects in epitaxial fin merge using nitride deposition

A finfet device includes a substrate with a buried insulator, a plurality of fins over the buried insulator, and a nitride material filing spaces between the plurality of fins. At least one sidewall of each of the plurality of fins remain uncovered by the nitride material. ... International Business Machines Corporation

12/03/15 / #20150348977

Vertically integrated memory cell

A vertically integrated memory cell including a deep trench extending into a substrate, a trench capacitor located within the deep trench, and a vertical transistor at least partially embedded within the deep trench above the trench capacitor, the vertical transistor is in direct contact with and electrically coupled to the trench capacitor.. . ... International Business Machines Corporation

12/03/15 / #20150348972

Asymmetric stressor dram

A stressor structure is formed within a drain region of an access transistor in a dynamic random access memory (dram) cell in a semiconductor-on-insulator (soi) substrate without forming any stressor structure in a source region of the dram cell. The stressor structure induces a stress gradient within the body region of the access transistor, which induces a greater leakage current at the body-drain junction than at the body-source junction. ... International Business Machines Corporation

12/03/15 / #20150348960

Self-healing electrostatic discharge power clamp

Circuits and methods of fabricating circuits that provide electrostatic discharge protection, as well as methods of protecting an integrated circuit from electrostatic discharge. The protection circuit may include a power clamp device, a timing circuit including a resistor and a capacitor that is coupled with the resistor at a node, and a power clamp device coupled with the timing circuit at the node. ... International Business Machines Corporation

12/03/15 / #20150348959

Passive devices for finfet integrated circuit technologies

Device structures, design structures, and fabrication methods for passive devices that may be used as electrostatic discharge protection devices in fin-type field-effect transistor integrated circuit technologies. A portion of a device layer of a semiconductor-on-insulator substrate is patterned to form a device region. ... International Business Machines Corporation

12/03/15 / #20150348958

Electrostatic discharge devices and methods of manufacture

Electrostatic discharge (esd) devices and methods of manufacture are provided. The method includes forming a plurality of fin structures and a mesa structure from semiconductor material. ... International Business Machines Corporation

12/03/15 / #20150348947

Three-dimensional inter-chip contact through vertical displacement mems

An electrically conducting, vertically displacing microelectromechanical system (mems) is formed on a first integrated circuit chip. The first integrated circuit chip is physically connected to a three-dimensional packaging structure. ... International Business Machines Corporation

12/03/15 / #20150348919

Reconfigurable multi-stack inductor

A reconfigurable multi-stack inductor formed within a semiconductor structure may include a first inductor structure located within a first metal layer of the semiconductor structure, a first ground shielding structure located within the first metal layer that is electrically isolated from and circumferentially bounds the first inductor structure, and a second inductor structure located within a second metal layer of the semiconductor structure, whereby the second inductor structure is electrically coupled to the first inductor structure. A second ground shielding structure located within the second metal layer is electrically isolated from and circumferentially bounds the second inductor structure, whereby the first and second inductor generate a first inductance value based on the first ground shielding structure and second ground shielding structure being coupled to ground, and the first and second inductor generate a second inductance value based on the first ground shielding structure and second ground shielding structure electrically floating.. ... International Business Machines Corporation

12/03/15 / #20150348910

Selective plating without photoresist

A structure including a stack of conformal layers on top of a dielectric layer and within an opening in the dielectric layer, the stack of layers including a first layer, a second layer, a third layer, and a fourth layer, each formed successively one on top of another with the first layer being in direct contact with the dielectric layer, and a conductive feature located directly on top of the fourth layer within the opening.. . ... International Business Machines Corporation

12/03/15 / #20150348899

Physical unclonable interconnect function array

A method for fabricating an interconnect function array includes forming a first plurality of conductive lines on a substrate, forming an insulator layer over the first plurality of conductive lines and the substrate, removing portions of the insulator layer to define cavities in the insulator layer that expose portions of the substrate and the first plurality of conductive lines, wherein the removal of the portions of the insulator layer results in a substantially random arrangement of cavities exposing portions of the substrate and the first plurality of conductive lines, depositing a conductive material in the cavities, and forming a second plurality of conductive lines on portions of the conductive material in the cavities and the insulator layer.. . ... International Business Machines Corporation

12/03/15 / #20150348876

Tsv wafer with improved fracture strength

A method including forming a through-substrate via through a thickness of a substrate, the thickness of the substrate is measured from a front side of the substrate to a back side of the substrate, removing a first portion of the substrate to form an opening in the back side of the substrate such that a second portion of the substrate remains in direct contact surrounding a vertical sidewall of the through-substrate via, and filling the opening with an alternate material having a lower modulus of elasticity than the substrate.. . ... International Business Machines Corporation

12/03/15 / #20150348870

Semiconductor structures with isolated ohmic trenches and stand-alone isolation trenches and related method

A method of forming a semiconductor structure in a semiconductor-on-insulator (soi) substrate and semiconductor structure so formed are provided. The soi substrate includes a semiconductor layer; a bulk semiconductor region underlying the semiconductor layer; and an insulation layer between the two. ... International Business Machines Corporation

12/03/15 / #20150348868

Semiconductor chips with small scale structures for liquid cooling

A semiconductor assembly for use with forced liquid and gas cooling. A relatively rigid nano-structure (for example, array of elongated nanowires) extends from an interior surface of a cap toward a top surface of a semiconductor chip, but, because of the rigidness and structural integrity of the nano-structure built into the cap, and of the cap itself, the nano-structure is reliably spaced apart from the top surface of the chip, which helps allow for appropriate cooling fluid flows. ... International Business Machines Corporation

12/03/15 / #20150348844

Symmetrical bipolar junction transistor array

A method of manufacturing a bipolar junction transistor (bjt) array may include forming a substrate of doped silicon and forming a plurality of bjts on the substrate. Each of the bjts may have a first region and a second region sandwiching a base region vertically. ... International Business Machines Corporation

12/03/15 / #20150348842

Manganese oxide hard mask for etching dielectric materials

A manganese oxide layer is deposited as a hard mask layer on substrate including at least a dielectric material layer. An optional silicon oxide layer may be formed over the manganese oxide layer. ... International Business Machines Corporation

12/03/15 / #20150348832

Thin film interconnects with large grains

The present disclosure relates to integrated circuits and to methods of manufacturing interconnects of integrated circuits. For example, an integrated circuit includes a surface of the integrated circuit and an interconnect formed on the surface and comprising a metal. ... International Business Machines Corporation

12/03/15 / #20150348827

Fabrication of localized soi on localized thick box using selective epitaxy on bulk semiconductor substrates for photonics device integration

Photonic devices are created by laterally growing a semiconductor material (i.e., a localized semiconductor-on-insulator layer) over a localized buried oxide (box) created in a semiconductor by either a trench isolation process or thermal oxidation. In one embodiment, and after trench formation in a semiconductor substrate, the trench is filled with oxide to create a localized box. ... International Business Machines Corporation

12/03/15 / #20150348573

Controlling data writing of tape recording apparatus

A tape recording apparatus according to one embodiment includes a magnetic head and a controller coupled to the magnetic head. The tape recording apparatus is configured to: write data on a tape medium in a direction from a first end toward a second end of the tape medium using the magnetic head; and wrap-turn a running direction of the tape medium before reaching the second end and write a first portion of data remaining to be written when the data remaining to be written is smaller than a volume of the data to be written in one running of the tape medium so that an end of the data is written at a position close to the first end, and write a second portion of data remaining to be written toward the first end.. ... International Business Machines Corporation

12/03/15 / #20150348569

Semantic-free text analysis for identifying traits

A method, system, and/or computer program product uses speech traits of an entity to predict a future state of the entity. Units of speech are collected from a stream of speech that is generated by a first entity. ... International Business Machines Corporation

12/03/15 / #20150348553

Voice focus enabled by predetermined triggers

Provided are techniques for voice focus enabled by predetermined triggers. Voice recognition is used to identify one or more pre-determined triggers from a voice of a speaker. ... International Business Machines Corporation

12/03/15 / #20150348545

Voice focus enabled by predetermined triggers

Provided are techniques for voice focus enabled by predetermined triggers. Voice recognition is used to identify one or more pre-determined triggers from a voice of a speaker. ... International Business Machines Corporation

12/03/15 / #20150348407

Recommendation engine based on a representation of the local environment augmented by citizen sensor reports

An embodiment of the invention provides a method for using a recommendation engine that is based on a representation of the local environment augmented by citizen sensor reports. A traffic simulation is performed with a processor, the traffic simulation being based on input. ... International Business Machines Corporation

12/03/15 / #20150348177

Managing lease transactions in distributed systems

A computer-implemented method of managing lease transactions from a plurality of time-synchronized cluster nodes for a shared leased resource in a computer network, the method including accepting, during a request period, requests to lease a shared leased resource in an upcoming lease interval, the requests received from among a plurality of time-synchronized cluster nodes. The method may include selecting, during a response period which concludes prior to the beginning of the upcoming lease interval, a leaseholder for the shared leased resource in the upcoming lease interval in response to receiving at least one request during the request period, the leaseholder selected based on the at least one received request. ... International Business Machines Corporation

12/03/15 / #20150348068

Predicting waiting passenger count and evaluation

Predicting waiting passenger count and evaluation. The present invention provides to a dispatching support system in order to help bus dispatchers or operators make better instructions or decisions, by providing short-term passenger flow prediction. ... International Business Machines Corporation

12/03/15 / #20150348066

Business forecasting using predictive metadata

A business forecasting tool utilizing metadata is provided. A processor receives one or more sets of business metrics. ... International Business Machines Corporation

12/03/15 / #20150348065

Prediction-based identification of optimum service providers

Various embodiments select at least one service provider from a plurality of service providers in a computing environment to satisfy at least one service request. In one embodiment, a service request is received from a user. ... International Business Machines Corporation

12/03/15 / #20150347986

Notification to users of events

A method and system for notifying users of events. User information is received at a storage location. ... International Business Machines Corporation

12/03/15 / #20150347950

Agent ranking

A method and system for ranking agents is provided. The method includes retrieving historical assignment data describing past associations with agents and associated tickets. ... International Business Machines Corporation

12/03/15 / #20150347949

Measuring proficiency and efficiency of a security operations center

A method and associated systems for measuring proficiency and efficiency of a security operations center. A processor gathers statistical information that identifies characteristics of a security-operations centers performance of a process during a certain period of time. ... International Business Machines Corporation

12/03/15 / #20150347940

Selection of optimum service providers under uncertainty

Various embodiments select at least one service provider from a plurality of service providers in a computing environment. In one embodiment, a service request is received from a user. ... International Business Machines Corporation

12/03/15 / #20150347936

Database partition

A method for partitioning a database includes obtaining business dependency between data in a plurality of tables in the database on the basis of a business process associated with the database; generating, on the basis of the business dependency, a dependency graph describing a dependency relationship between the plurality of tables; cutting the dependency graph into at least two sub-graphs; and vertically partitioning the database into at least two parts corresponding to the at least two sub-graphs respectively.. . ... International Business Machines Corporation

12/03/15 / #20150347933

Business forecasting using predictive metadata

A business forecasting tool utilizing metadata is provided. A processor receives one or more sets of business metrics. ... International Business Machines Corporation

12/03/15 / #20150347923

Error classification in a computing system

In an approach to determining a classification of an error in a computing system, a computer receives a notification of an error during a test within a computing system. The computer then retrieves a plurality of log files created during the test from within the computing system and determines data containing one or more error categorizations. ... International Business Machines Corporation

12/03/15 / #20150347922

Multi-model blending

A method and a system to perform multi-model blending are described. The method includes obtaining one or more sets of predictions of historical conditions, the historical conditions corresponding with a time t that is historical in reference to current time, and the one or more sets of predictions of the historical conditions being output by one or more models. ... International Business Machines Corporation

12/03/15 / #20150347919

Conversation branching for more efficient resolution

A method for conversation branching may include storing a plurality of messages communicated in an online conversation and generating a fingerprint for each message. The fingerprint for each message may be stored to a lookup table. ... International Business Machines Corporation

12/03/15 / #20150347905

Modeling user attitudes toward a target from social media

Embodiments relate to user attitude modeling and behavior prediction for a social media network. One aspect includes collecting data relating to previously demonstrated sentiments, opinions, and actions attributed to network users toward a topic. ... International Business Machines Corporation

12/03/15 / #20150347901

Generating written content from knowledge management systems

The disclosure is directed to written content generation. A method for generating written content in an application in accordance with an embodiment includes: receiving a query from a user; importing data from at least one data source in response to the query; ranking the imported data based on a plurality of ranking factors to determine a relevance of the imported data; automatically generating written content using at least a portion of the imported data based on the determined relevance of the imported data; and automatically customizing the written content based on a file format of the application.. ... International Business Machines Corporation

12/03/15 / #20150347897

Structural plasticity in spiking neural networks with symmetric dual of an electronic neuron

A neural system comprises multiple neurons interconnected via synapse devices. Each neuron integrates input signals arriving on its dendrite, generates a spike in response to the integrated input signals exceeding a threshold, and sends the spike to the interconnected neurons via its axon. ... International Business Machines Corporation

12/03/15 / #20150347870

Scene understanding using a neurosynaptic system

Embodiments of the invention provide a method for scene understanding based on a sequence of image frames. The method comprises converting each pixel of each image frame to neural spikes, and extracting features from the sequence of image frames by processing neural spikes corresponding to pixels of the sequence of image frames. ... International Business Machines Corporation

12/03/15 / #20150347829

Monitoring individuals using distributed data sources

One or more processors receive data from one or more devices including an image of an individual and information that indicates the identity of the individual. One or both of the image and the information include data that indicates a location. ... International Business Machines Corporation

12/03/15 / #20150347826

Cognitive image detection and recognition

Embodiments are directed to an image processing station for associating a non-trusted data set with a trusted data set. The station includes a memory and a user interface configured to receive the trusted data set and the non-trusted data set. ... International Business Machines Corporation

12/03/15 / #20150347825

Cognitive image detection and recognition

Embodiments are directed to an image processing station for associating a non-trusted data set with a trusted data set. The station includes a memory and a user interface configured to receive the trusted data set and the non-trusted data set. ... International Business Machines Corporation

12/03/15 / #20150347787

Authentication in a flexible display computing device

Embodiments of the invention provide for device authentication in a flexible display computing device. In an embodiment of the invention, a method for device authentication in a flexible display computing device includes pre-storing in memory of a computing device, data corresponding to a pattern of folds of a flexible display of the computing device. ... International Business Machines Corporation

12/03/15 / #20150347783

Database access control for multi-tier processing

Embodiments of the disclosure can include a method, a system, and a computer program product for controlling access to a database server in a multi-tiered processing system. The method can include receiving an application request having an identification parameter to an application server at an application layer. ... International Business Machines Corporation

12/03/15 / #20150347766

Secure reservation mode for logical unit numbers and persistent reservations

A mapping system and method that enables a secure reservation mode for a plurality of logical unit numbers of a storage system, generates a plurality of secret reservation keys, and instructs a distributed client to utilize at least one of the secret reservation keys to register with the storage system and to issue secure persistent reserves to the plurality of logical unit numbers.. . ... International Business Machines Corporation

12/03/15 / #20150347761

Automatic correction of security downgraders

Systems for automatic correction of security downgraders include a security analysis module configured to perform a security analysis that disregards existing user-provided downgraders to detect flows that are vulnerable; and an enhancer module configured to locate candidate downgraders on the flows, to determine whether each of the candidate downgraders protects against all vulnerabilities associated with each downgrader's respective flow, and to transform candidate downgraders that do not protect against all of the associated vulnerabilities such that the transformed downgraders do protect against all of the associated vulnerabilities.. . ... International Business Machines Corporation

12/03/15 / #20150347742

Configuring identity federation configuration

A method and apparatus for configuring identity federation configuration. The method includes: acquiring a set of identity federation configuration properties of a first computing system and a set of identity federation configuration properties of a second computing system; identifying one or more pairs of associated properties in the first and the second sets, where the pairs of associated properties include one property from each set of identity federation configuration; displaying, properties that need to be configured manually from the each sets of identity federation configuration properties, where the properties that need to be configured manually do not include the property in any pair of associated properties for which the value can be derived from the value of another property in the pair; automatically assigning a property that can be derived from the value of another property; and providing each computing systems with each set of identity federation properties.. ... International Business Machines Corporation

12/03/15 / #20150347737

Service account access

A computer system detects an external media device and determines the external media device contains authentication data for the computer system. In response, a first password is generated based on an identifier unique to the computer system. ... International Business Machines Corporation

12/03/15 / #20150347728

Providing a user access to a computer system

A method and related electronic apparatus for providing a user access to a computer system, the method comprising: determining at least one object in contact with a surface; generating at least one pulse sequence; actuating the surface based on the at least one pulse sequence; determining an absence of the at least one object from the surface; determining at least one character of a password input based on the at least one pulse sequence.. . ... International Business Machines Corporation

12/03/15 / #20150347667

Method of checking the layout integrity

Checking the layout integrity includes the steps of receiving inputs defining a plurality of devices for a layout, generating a signature for each device in the layout, when created, from one or more parameters of the device, storing the generated signatures with the layout, receiving the stored layout and signatures, regenerating each signature for each device in the stored layout, and comparing each regenerated signature with the corresponding stored signature.. . ... International Business Machines Corporation

12/03/15 / #20150347662

Congestion aware layer promotion

Embodiments relate to managing layer promotion of interconnects in the routing phase of integrated circuit design. An aspect includes a system to manage layer promotion in a routing phase of integrated circuit design. ... International Business Machines Corporation

12/03/15 / #20150347661

Congestion aware layer promotion

Embodiments relate to managing layer promotion of interconnects in the routing phase of integrated circuit design. An aspect includes reducing the set of candidate interconnects for layer promotion based on resource availability. ... International Business Machines Corporation

12/03/15 / #20150347652

Timing analysis of asynchronous clock domain crossings

Various implementations of a method, system, and computer program product for executing timing analysis of an asynchronous clock domain crossing are disclosed. In one embodiment, a signal group and a corresponding timing specification are determined for one or more signals of an electronic design. ... International Business Machines Corporation

12/03/15 / #20150347643

Physical aware technology mapping in synthesis

A method of performing physical aware technology mapping in a logic synthesis phase of design of an integrated circuit and a system to perform physical aware technology mapping are described. The system includes a memory device to store a logic design of the integrated circuit, and a processor to subdivide a core area representing a sub-block of the integrated circuit into equal-sized grids, the core area including one or more input ports and one or more output ports, to determine a location of each latch in a logic design based on an algorithm, to determine a location of each combinational logic gate in the logic design, and to obtain the technology mapping based on the locations of the one or more latches, the locations of the one or more combinational logic gates, and associated path delays.. ... International Business Machines Corporation

12/03/15 / #20150347641

Synthesis tuning system for vlsi design optimization

In one aspect, a method for tuning input parameters to a synthesis program is provided which includes the steps of: (a) selecting a subset of parameter settings for the synthesis program based on a tuning optimization cost function; (b) individually running synthesis jobs in parallel for each of the parameter settings in the subset; (c) analyzing results from a current iteration and prior iterations, if any, using the cost function; (d) using the results from the current iteration and the prior iterations, if any, to create combinations of the parameter settings; (e) running synthesis jobs in parallel for the combinations of the parameter settings in a next iteration; and (f) repeating the steps (c)-(e) for one or more additional iterations or until an exit criteria has been met.. . ... International Business Machines Corporation

12/03/15 / #20150347640

Physical aware technology mapping in synthesis

A method of performing physical aware technology mapping in a logic synthesis phase of design of an integrated circuit and a system to perform physical aware technology mapping are described. The method includes subdividing a core area representing a sub-block of the integrated circuit into equal-sized grids. ... International Business Machines Corporation

12/03/15 / #20150347626

Adjusting ranges of directed graph ontologies across multiple dimensions

A method, system, and/or computer program product constructs and utilizes an ontological graph. A seed term and an expansion signal are received from a user. ... International Business Machines Corporation

12/03/15 / #20150347623

Xpath evaluation in an xml repository

Xpath evaluation in an xml data repository includes parsing an input xpath query using a simple path file to generate an execution tree about the xpath query, where the simple path file includes an xml file that is generated based on the hierarchical architecture of a plurality of xml files in the data repository, and the names of the nodes in the generated xml file are generated by recording the tag information of respective nodes in the plurality of xml files in the data repository. Execution of an execution tree for the data repository generates a final evaluation result.. ... International Business Machines Corporation

12/03/15 / #20150347622

Managing database

A method for managing a database, each item of data in the database being associated with a timestamp and a data point, the timestamps being used as row keys for rows of a table in the database, the method comprising: obtaining a behavior characteristic of a user based on a previous data access to the database by the user; partitioning columns in the table into column families based on the obtained behavior characteristic and system configuration of the database; and causing data in the database to be stored in respective column families at least in part based on the associated data point.. . ... International Business Machines Corporation

12/03/15 / #20150347621

Automatically generating a semantic mapping for a relational database

A method for automatically generating a semantic mapping for a relational database rdb includes obtaining a first semantic mapping from a first rdb to an ontology of linked data; obtaining a schema mapping from the first rdb to a second rdb; and generating a second semantic mapping from the second rdb to the ontology of the linked data based on the first semantic mapping and the schema mapping.. . ... International Business Machines Corporation

12/03/15 / #20150347620

Generating a mapping rule for converting relational data into rdf format data

A method for generating a mapping rule for converting relational data into rdf format data includes obtaining a first mapping rule for converting relational data in a first relational database into rdf format data, wherein a uri pattern of the first mapping rule expresses features of the relational data in the first relational database; parsing a generated rule for the uri pattern of the first mapping rule; determining that a second relational model of the second relational database and a first relational model of the first relational database conform to pattern matching; and generating a second mapping rule for converting the relational data of the second relational database into rdf format data, based on a mapping relationship between the generated rule and the pattern matching of the first relational model and the second relational model.. . ... International Business Machines Corporation

12/03/15 / #20150347609

Javascript logging for html elements

Determining interactions between scripts and elements of a markup language document includes loading a markup language document into a browser. The markup language document includes a plurality of markup language elements. ... International Business Machines Corporation

12/03/15 / #20150347602

Policy based population of genealogical archive data

An approach for managing a family tree archive is provided. The approach includes creating an electronic archive based on a family tree. ... International Business Machines Corporation

12/03/15 / #20150347592

Hierarchical in-memory sort engine

A local sorting module includes a set of storage elements storing binary vectors configured in a one-dimensional (1d) or two-dimensional (2d) array structure and separated by respective comparators configured to conditionally compare and sort the binary vectors. The comparators may perform a sort using a compare-and-flip or a compare-and-swap operation. ... International Business Machines Corporation

12/03/15 / #20150347588

Adaptive query processor for query systems with limited capabilities

A query processor determines if an initial query results in a query system having a search engine coupled to a database to identify a limited maximum number of records deliverable by the query system. This limitation is indicative of an incomplete result because records are includable in the query may not be included in the result. ... International Business Machines Corporation

12/03/15 / #20150347587

Managing documents in question answering systems

A first candidate answer to a time-sensitive question received by a question answering (qa) system is identified using a first document. A first temporal confidence subscore of the first candidate answer is then calculated using a first temporal confidence rule. ... International Business Machines Corporation

12/03/15 / #20150347575

Category-based lemmatizing of a phrase in a document

A processor receives a string of binary data that represents an initial phrase that includes multiple words and is associated with a specific category. The processor removes one or more letters from an end of a word in the initial phrase to form an initial truncated version of the phrase. ... International Business Machines Corporation

12/03/15 / #20150347569

Managing documents in question answering systems

A first candidate answer to a time-sensitive question received by a question answering (qa) system is identified using a first document. A first temporal confidence subscore of the first candidate answer is then calculated using a first temporal confidence rule. ... International Business Machines Corporation

12/03/15 / #20150347568

Processing time series

A method for processing a time series includes dividing, with a processing device, the time series into a plurality of windows by time; extracting at least one group of similar subsequences from a current window among the plurality of windows; and updating a candidate list on the basis of comparison between similar subsequences in each group of the at least one group with k characteristic subsequences in the candidate list; wherein the k characteristic subsequences are k characteristic subsequences with a greatest number of occurrences in at least processed parts of the time series.. . ... International Business Machines Corporation

12/03/15 / #20150347557

Corpus generation based upon document attributes

The present disclosure provides an approach in which a domain corpus subset generator correlates documents from a document corpus to domain discernible attributes associated with domain corpus subsets. The domain corpus subset generator analyzes correlation results from the correlation and stores the documents into domain corpus subsets accordingly. ... International Business Machines Corporation

12/03/15 / #20150347549

Database query processing using horizontal data record alignment of multi-column range summaries

Organizing data within a database is provided. In response to determining that a group of coarsified data records within a database table is not an aligned group of data records, a virtually replicated subgroup of coarsified data records that corresponds to the group of coarsified data records is generated from different groups of coarsified data records within the database table. ... International Business Machines Corporation

12/03/15 / #20150347546

Synchronizing a disaster-recovery system of a database

A method and associated systems for synchronizing a disaster-recovery system of a database. A processor identifies transactions that affect data blocks of a database and records each change in a vector form. ... International Business Machines Corporation

12/03/15 / #20150347541

System and method of consuming and integrating with rest-based cloud and enterprise services

Techniques are disclosed for consuming and integrating with representational state transfer (rest) based services. In one embodiment, a multiple-step extract, transform, load (etl) job includes one or more rest steps. ... International Business Machines Corporation

12/03/15 / #20150347539

System and method of consuming and integrating with rest-based cloud and enterprise services

Techniques are disclosed for consuming and integrating with representational state transfer (rest) based services. In one embodiment, a multiple-step extract, transform, load (etl) job includes one or more rest steps. ... International Business Machines Corporation

12/03/15 / #20150347537

Processing time series

A method for processing a time series includes dividing, with a processing device, the time series into a plurality of windows by time; extracting at least one group of similar subsequences from a current window among the plurality of windows; and updating a candidate list on the basis of comparison between similar subsequences in each group of the at least one group with k characteristic subsequences in the candidate list; wherein the k characteristic subsequences are k characteristic subsequences with a greatest number of occurrences in at least processed parts of the time series.. . ... International Business Machines Corporation

12/03/15 / #20150347524

Method and system for centralized control of database applications

According to one embodiment of the present invention, a system enables control of database applications. The system comprises a computer system including a database application to provide access to a database system, and at least one processor. ... International Business Machines Corporation

12/03/15 / #20150347517

Adaptive query processor for query systems with limited capabilities

A query processor determines if an initial query results in a query system having a search engine coupled to a database to identify a limited maximum number of records deliverable by the query system. This limitation is indicative of an incomplete result because records are includable in the query may not be included in the result. ... International Business Machines Corporation

12/03/15 / #20150347512

Distributed execution of expressions in a query

A computer-implemented method for executing a query specification can include evaluating the query specification by a first computing device to identify a candidate expression in the query specification to be executed by a second computing device hosting a source of data specified in the candidate expression. A cost estimate for executing the candidate expression at the first computing device is determined. ... International Business Machines Corporation

12/03/15 / #20150347510

Distributed execution of expressions in a query

A computer-implemented method for executing a query specification can include evaluating the query specification by a first computing device to identify a candidate expression in the query specification to be executed by a second computing device hosting a source of data specified in the candidate expression. A cost estimate for executing the candidate expression at the first computing device is determined. ... International Business Machines Corporation

12/03/15 / #20150347496

Snapshot management in hierarchical storage infrastructure

Embodiments of the present invention disclose a method, computer program product, and system for snapshot management in a storage infrastructure. A computer accesses a first snapshot captured in a first layer of the storage infrastructure. ... International Business Machines Corporation

12/03/15 / #20150347492

Representing an outlier value in a non-nullable column as null in metadata

According to embodiments of the present invention, methods, systems and computer-readable media are presented for accessing data within a database object, wherein an element of the database object is stored among a plurality of different storage regions with each storage region being associated with first and second range values indicating a value range for element values within that storage region. One or more element values within a storage region are identified residing outside a range of values of remaining elements within that storage region. ... International Business Machines Corporation

12/03/15 / #20150347491

Managing user ratings in a web services environment

Systems and methods for managing user ratings in a web services environment. A method includes storing a comment associated with a web service and storing an influence rating associated with an author of the comment. ... International Business Machines Corporation

12/03/15 / #20150347485

Generating a mapping rule for converting relational data into rdf format data

A method for generating a mapping rule for converting relational data into rdf format data includes obtaining a first mapping rule for converting relational data in a first relational database into rdf format data, wherein a uri pattern of the first mapping rule expresses features of the relational data in the first relational database; parsing a generated rule for the uri pattern of the first mapping rule; determining that a second relational model of the second relational database and a first relational model of the first relational database conform to pattern matching; and generating a second mapping rule for converting the relational data of the second relational database into rdf format data, based on a mapping relationship between the generated rule and the pattern matching of the first relational model and the second relational model.. . ... International Business Machines Corporation

12/03/15 / #20150347484

Combining row based and column based tables to form mixed-mode tables

Various ways of storing data in tabular form such that some records are stored in a row oriented manner and some data is stored in a column oriented manner. The records respectively stored in the row and column oriented manners may, or may not, overlap (in whole or in part. ... International Business Machines Corporation

12/03/15 / #20150347483

Combining row based and column based tables to form mixed-mode tables

Various ways of storing data in tabular form such that some records are stored in a row oriented manner and some data is stored in a column oriented manner. The records respectively stored in the row and column oriented manners may, or may not, overlap (in whole or in part. ... International Business Machines Corporation

12/03/15 / #20150347481

Storing and querying multidimensional data using first and second indicies

The present disclosure relates to methods and systems for storing and querying data. According to the embodiments of the present invention, two-layer indexes are created for multi-dimension data, wherein the primary index is created based on two or more dimensions to retrieve respective data units of the data, while the secondary index is created based on specific dimensions to retrieve respective data blocks in the data unit. ... International Business Machines Corporation

12/03/15 / #20150347479

Storing and querying multidimensional data using first and second indicies

The present disclosure relates to methods and systems for storing and querying data. According to the embodiments of the present invention, two-layer indexes are created for multi-dimension data, wherein the primary index is created based on two or more dimensions to retrieve respective data units of the data, while the secondary index is created based on specific dimensions to retrieve respective data blocks in the data unit. ... International Business Machines Corporation

12/03/15 / #20150347473

Database partition

A method for partitioning a database includes obtaining business dependency between data in a plurality of tables in the database on the basis of a business process associated with the database; generating, on the basis of the business dependency, a dependency graph describing a dependency relationship between the plurality of tables; cutting the dependency graph into at least two sub-graphs; and vertically partitioning the database into at least two parts corresponding to the at least two sub-graphs respectively.. . ... International Business Machines Corporation

12/03/15 / #20150347471

Automatically generating a semantic mapping for a relational database

A method for automatically generating a semantic mapping for a relational database rdb includes obtaining a first semantic mapping from a first rdb to an ontology of linked data; obtaining a schema mapping from the first rdb to a second rdb; and generating a second semantic mapping from the second rdb to the ontology of the linked data based on the first semantic mapping and the schema mapping.. . ... International Business Machines Corporation

12/03/15 / #20150347468

Grouping data in a database

According to embodiments of the present invention, two or more attributes that are included in a plurality of attributes are aggregated into a group defined by a first data definition language syntax. The first data definition language syntax defines the group as having a groupid and one or more of an attribute definition defined in a comma-separated list and a group definition. ... International Business Machines Corporation

12/03/15 / #20150347467

Dynamic creation of domain specific corpora

A model of a domain is received, wherein the model has a plurality of elements. A corpus of select documents covering the plurality of elements of the model is also received. ... International Business Machines Corporation

12/03/15 / #20150347456

Scalable and user friendly file virtualization for hierarchical storage

In one embodiment, a method includes generating a file list for an aggregation of files based on a file pattern descriptor for each file in the aggregation of files or a file name for each file in the aggregation of files. The method also includes opening a session with a storage system manager and writing data from each file in the file list to a storage tier of a storage system. ... International Business Machines Corporation

12/03/15 / #20150347445

Deduplication of file

The present invention discloses a method for deduplication of a file, a computer program product, and an apparatus thereof. In the method, the file is partitioned into at least one composite block, wherein the composite block includes a fixed-size block and a variable-size block, the variable-size block being determined based on content of the file. ... International Business Machines Corporation

12/03/15 / #20150347433

Stream based named entity recognition

Embodiments of the present invention relate to performing entity recognition on a stream while providing ongoing training or supplementation of an entity dictionary. In one embodiment, a method of and computer program product for stream based named entity recognition is provided. ... International Business Machines Corporation

12/03/15 / #20150347430

Techniques for enabling coarse-grained volume snapshots for virtual machine backup and restore

A technique of backing up a workload in a virtual environment includes identifying one or more files that are associated with the workload. One or more source volumes that include the one or more files are identified. ... International Business Machines Corporation

12/03/15 / #20150347429

Managing searches for information associated with a message

A method for managing information about a product. A processor searches documents for a location of a message of the product using a set of rules that are based on instructions for generating the message. ... International Business Machines Corporation

12/03/15 / #20150347428

Automated electronic discovery collections and preservations

A computer-implemented method, system and computer program product for collecting information from data sources by receiving a collection request at a collection tool to collect information, where the collection request includes data source information indicating a data source from which to retrieve the information. The data source information in the collection request is associated with one or more electronic data repositories in response to the data source indicated by the data source information being previously unidentified to the collection tool. ... International Business Machines Corporation

12/03/15 / #20150347426

Reordering of database records for improved compression

According to embodiments of the present invention, apparatus, systems, methods and computer program products for sorting and compressing an unordered set of data records from a structured database are provided. Fields of the unordered set of data records are prioritized based on an impact of those fields to a compression scheme for column-oriented compression. ... International Business Machines Corporation

12/03/15 / #20150347406

Corpus generation based upon document attributes

The present disclosure provides an approach in which a domain corpus subset generator correlates documents from a document corpus to domain discernible attributes associated with domain corpus subsets. The domain corpus subset generator analyzes correlation results from the correlation and stores the documents into domain corpus subsets accordingly. ... International Business Machines Corporation

12/03/15 / #20150347392

Real-time filtering of massive time series sets for social media trends

A method for determining significant words or phrases within social media data includes receiving a stream of data from at least one social media source. The stream includes one or more words or phrases along with corresponding time stamps indicating when the word/phrase was used. ... International Business Machines Corporation

12/03/15 / #20150347391

Persona management system for communications

A system to apply persona styles to written communications. The system includes a communication analyzer and a modification engine. ... International Business Machines Corporation

12/03/15 / #20150347387

Adjusting ranges of directed graph ontologies across multiple dimensions

A method, system, and/or computer program product constructs and utilizes an ontological graph. A seed term and an expansion signal are received from a user. ... International Business Machines Corporation

12/03/15 / #20150347370

Optimizing rendering of data tables

A method for determining optimal column widths used in the rendering of data tables displayed in a graphical user interface. The method includes receiving a table parameter associated with the contents of the table and determining if the table parameter has changed. ... International Business Machines Corporation

12/03/15 / #20150347359

Script logging for markup language elements

Determining interactions between scripts and elements of a markup language document includes loading a markup language document into a browser. The markup language document includes a plurality of markup language elements. ... International Business Machines Corporation

12/03/15 / #20150347347

Dynamic data collection communication between adapter functions

An approach is provided that collects data from a multi-function adapter that is used by multiple functions. In the approach, a master function is dynamically selected from the group of functions. ... International Business Machines Corporation

12/03/15 / #20150347343

Intercomponent data communication

A request to send a first message from a first component to a second component is received at an arbiter. The first component is located in a first time zone and the second component is located in a second time zone. ... International Business Machines Corporation

12/03/15 / #20150347340

Intercomponent data communication

A request to send a message from a first component, located on a first processor, to a second component, located on a second processor, is received. It is determined that the second processor can be communicated with via a first bidirectional communication path. ... International Business Machines Corporation

12/03/15 / #20150347334

Intercomponent data communication

A request to send a first message from a first component to a second component is received at an arbiter. The first component is located in a first time zone and the second component is located in a second time zone. ... International Business Machines Corporation

12/03/15 / #20150347333

Intercomponent data communication

A request to send a message from a first component, located on a first processor, to a second component, located on a second processor, is received. It is determined that the second processor can be communicated with via a first bidirectional communication path. ... International Business Machines Corporation

12/03/15 / #20150347321

Parallel block allocation for declustered logical disks

In a method for allocating space on a logical disk, a computer receives an allocation request to allocate a number of requested logical disk extents. The computer selects one of a first group having an array of logical disk extents and a second group having an array of logical disk extents. ... International Business Machines Corporation

12/03/15 / #20150347318

Thinly provisioned flash cache with shared storage pool

For data processing in a computing storage environment by a processor device, the computing storage environment incorporating at least high-speed and lower-speed caches, and managed tiered levels of storage, a solid state device (ssd) tier is variably shared between the lower-speed cache and the managed tiered levels of storage such that the managed tiered levels of storage are operational on large data segments, and the lower-speed cache is allocated with the large data segments, yet operates with data segments of a smaller size than the large data segments and within the large data segments, where if selected data segments are cached in the lower-speed cache and are determined to become uniformly hot, the selected group from the lower-speed cache are migrated to the ssd tier.. . ... International Business Machines Corporation

12/03/15 / #20150347306

Synchronizing updates of page table status indicators in a multiprocessing environment

A synchronization capability to synchronize updates to page tables by forcing updates in cached entries to be made visible in memory (i.e., in in-memory page table entries). A synchronization instruction is used that ensures after the instruction has completed that updates to the cached entries that occurred prior to the synchronization instruction are made visible in memory. ... International Business Machines Corporation

12/03/15 / #20150347304

Transactional execution diagnostics using digests

Gathering diagnostics during a transactional execution in a transactional memory environment, a transactional memory environment for performing transactional executions is provided. Included is identifying a first indicator, by a computer system, signaling a beginning instruction of a transaction comprising a plurality of instructions; generating, by the computer system, a computed digest based on the execution of at least one of the plurality of instructions; accumulating, by the computer system, a diagnostic data of the transaction based on the execution of the plurality of instructions; identifying, by the computer system, a second indicator associated with the plurality of instructions signaling an ending instruction of the transaction comprising the plurality of instructions; and based on an abort of the transaction, not saving the memory store data of the transaction to memory.. ... International Business Machines Corporation

12/03/15 / #20150347303

Adjusting allocation of storage devices

Embodiments of the present invention provide methods, computer systems, and computer program products for adjusting allocation of a storage device. In one embodiment, a first part of the storage device is allocated to tiering storage, and a second part of the storage device is allocated to cache storage. ... International Business Machines Corporation

12/03/15 / #20150347301

Synchronizing updates of page table status indicators and performing bulk operations

A synchronization capability to synchronize updates to page tables by forcing updates in cached entries to be made visible in memory (i.e., in in-memory page table entries). A synchronization instruction is used that ensures after the instruction has completed that updates to the cached entries that occurred prior to the synchronization instruction are made visible in memory. ... International Business Machines Corporation

12/03/15 / #20150347300

Synchronizing updates of page table status indicators in a multiprocessing environment

A synchronization capability to synchronize updates to page tables by forcing updates in cached entries to be made visible in memory (i.e., in in-memory page table entries). A synchronization instruction is used that ensures after the instruction has completed that updates to the cached entries that occurred prior to the synchronization instruction are made visible in memory. ... International Business Machines Corporation

12/03/15 / #20150347292

Writing an address conversion table for nonvolatile memory wear leveling

An apparatus configured to write, in a non-volatile memory, an address conversion table for wear leveling of the non-volatile memory includes a holding unit configured to hold a first address conversion table for wear leveling of a first block of the non-volatile memory, a second address conversion table for wear leveling of a second block other than the first block of the non-volatile memory, and a third address conversion table for wear leveling of a third block other than the first block of the non-volatile memory; and a writing unit configured to write, in the first block, a replication of the second address conversion table in addition to one replication of the first address conversion table and to write, in the third block, another replication of the first address conversion table in addition to a replication of the third address conversion table.. . ... International Business Machines Corporation

12/03/15 / #20150347284

Screenshot validation testing

Embodiments of the present invention disclose a method, computer program product, and system for comparing screenshots of an application interface. In one embodiment, the method includes receiving test scenario parameters, wherein the parameters include a first screenshot of an application interface, one or more page objects associated with the first screenshot, generating a second screenshot of an updated application interface, identifying one or more page objects within the second screenshot based on a scope of each of the page objects associated with the first screenshot, comparing a section of the second screenshot to a section of the first screenshot that includes one or more page objects associated with the first screenshot that correspond to one or more page objects included in the section of the second screenshot, and determining whether the section of the second screenshot matches, within a predetermined tolerance level, the section of the first screenshot.. ... International Business Machines Corporation

12/03/15 / #20150347276

Screenshot validation testing

Embodiments of the present invention disclose a method, computer program product, and system for comparing screenshots of an application interface. In one embodiment, the method includes receiving test scenario parameters, wherein the parameters include a first screenshot of an application interface, one or more page objects associated with the first screenshot, generating a second screenshot of an updated application interface, identifying one or more page objects within the second screenshot based on a scope of each of the page objects associated with the first screenshot, comparing a section of the second screenshot to a section of the first screenshot that includes one or more page objects associated with the first screenshot that correspond to one or more page objects included in the section of the second screenshot, and determining whether the section of the second screenshot matches, within a predetermined tolerance level, the section of the first screenshot.. ... International Business Machines Corporation

12/03/15 / #20150347261

Performance checking component for an etl job

Generation of a performance determination report for an extract, transform, load (etl) job includes decomposing the etl job into two or more stage instances, and identifying one or more conditions for each of the stage instances. A set of tests for each of the identified conditions are generated. ... International Business Machines Corporation

12/03/15 / #20150347256

Error injection and error counting during memory scrubbing operations

Embodiments relate to performing a memory scrubbing operation that includes injecting an error on a write operation associated with a memory address. One or more errors are detected during a two-pass scrub operation on the memory address. ... International Business Machines Corporation

12/03/15 / #20150347252

Determining an availability score based on available resources of different resource types in a storage system to determine whether to perform a failure operation for the storage system

Provided are a computer program product, system, and method for determining an availability score based on available resources of different resource types in a storage system to determine whether to perform a failure operation for the storage system. Information is maintained indicating availability of a plurality of storage system resources for a plurality of resource types. ... International Business Machines Corporation

12/03/15 / #20150347251

Recovery mechanisms across storage nodes that reduce the impact on host input and output operations

Provided are a method, a system, and a computer program product in which a storage controller determines one or more resources that are impacted by an error. A cleanup of tasks associated with the one or more resources that are impacted by the error is performed, to recover from the error, wherein host input/output (i/o) operations continue to be processed, and wherein tasks associated with other resources continue to execute.. ... International Business Machines Corporation

12/03/15 / #20150347245

Determining an availability score based on available resources of different resource types in a distributed computing environment of storage servers to determine whether to perform a failure operation for one of the storage servers

Provided are a computer program product, system, and method for a computer program product, system, and method for determining an availability score based on available resources of different resource types in a distributed computing environment of storage servers to determine whether to perform a failure operation for one of the storage servers. A health status monitor program deployed in the storage servers performs: maintaining information indicating availability of a plurality of storage server resources for a plurality of resource types; calculating an availability score as a function of a number of available resources of the resource types; and transmitting information on the availability score to a management program. ... International Business Machines Corporation

12/03/15 / #20150347243

Multi-way, zero-copy, passive transaction log collection in distributed transaction systems

In various embodiments a distributed computing node in a plurality of distributed computing nodes logs transactions in a distributed processing system. In one embodiment, a set of information associated with at least one transaction is recorded in a transaction log. ... International Business Machines Corporation

12/03/15 / #20150347221

Fractional reserve high availability using cloud command interception

An approach is provided to provide a high availability (ha) cloud environment. In the approach, an active cloud environment is established in one cloud computing environment using a primary set of resources and a passive cloud environment is established in another cloud computing environment, with the passive cloud environment using fewer resources than are used by the active cloud environment. ... International Business Machines Corporation

12/03/15 / #20150347219

Alerting service desk users of business services outages

An approach is provided in a service desk detects a current computer resource outage and identifies applications corresponding to the computer resource outage. The service desk uses historical service request entries to match the identified applications to users previously inquiring about the applications and, in turn, sends notifications to the users regarding the computer resource outage.. ... International Business Machines Corporation

12/03/15 / #20150347217

Determining an anomalous state of a system at a future point in time

A prediction technique to predict an anomalous state of a processing environment at a future point in time. One or more values of one or more metrics of the processing system are obtained. ... International Business Machines Corporation

12/03/15 / #20150347212

Error classification in a computing system

In an approach to determining a classification of an error in a computing system, a computer receives a notification of an error during a test within a computing system. The computer then retrieves a plurality of log files created during the test from within the computing system and determines data containing one or more error categorizations. ... International Business Machines Corporation

12/03/15 / #20150347211

Scalable prediction failure analysis for memory used in modern computers

One embodiment provides a method for scalable predictive failure analysis. Embodiments of the method may include gathering memory information for memory on a user computer system having at least one processor. ... International Business Machines Corporation

12/03/15 / #20150347194

Managing a virtual machine instance

The present invention relates to mechanisms for managing vm instances. More specifically, the mechanisms provide at least one vm instance in a resource pool. ... International Business Machines Corporation

12/03/15 / #20150347191

System and method for dynamic rescheduling of multiple varying resources with user social mapping

A system and method for scheduling resources includes a memory storage device having a resource data structure stored therein which is configured to store a collection of available resources, time slots for employing the resources, dependencies between the available resources and social map information. A processing system is configured to set up a communication channel between users, between a resource owner and a user or between resource owners to schedule users in the time slots for the available resources. ... International Business Machines Corporation

12/03/15 / #20150347176

Transaction digest generation during nested transactional execution

Generating a digest in a transactional memory environment for performing transactional executions, the transactional memory environment supporting transaction nesting is provided. Included is generating for a transaction, by a computer system, a computed digest based on the execution of at least one of a plurality of instructions of the transaction; based on beginning a nested transaction, executed within the transactional region of the transaction, saving a snapshot of the computed digest as a nesting level snapshot; beginning execution of the nested transaction: updating, by the computer system, the computed digest based on the execution of at least one of a plurality of instructions of the nested transaction; and based on an abort of the nested transaction, restoring the computed digest from the nesting level snapshot and restarting the nested transaction.. ... International Business Machines Corporation

12/03/15 / #20150347175

Software-defined networking (sdn) for management of traffic between virtual processors

An aspect includes receiving, at a software-defined networking (sdn) controller, an inquiry from a virtual switch executing on a host machine. The inquiry includes a request to identify a flow of a data packet received at the virtual switch from a source virtual processor. ... International Business Machines Corporation

12/03/15 / #20150347159

Generic physical location codes for virtual system and partition cloning

A cloned configuration of a source machine is created by determining a first set of physical location codes for a source machine. A map is generated based on the sorted physical location codes that maps the first set of physical location codes to a first set of generic location codes. ... International Business Machines Corporation

12/03/15 / #20150347158

Generic physical location codes for virtual system and partition cloning

A cloned configuration of a source machine is created by determining a first set of physical location codes for a source machine. A map is generated based on the sorted physical location codes that maps the first set of physical location codes to a first set of generic location codes. ... International Business Machines Corporation

12/03/15 / #20150347154

Live initialization of a boot device

Various embodiments of the present invention that include executing, by a processor, a software stack. A writeable boot device such as a storage device with a removable medium is detected, and a second software stack is saved by replacing, on the writeable boot device, a first boot image with a second boot image comprising a second software stack.. ... International Business Machines Corporation

12/03/15 / #20150347153

System management controller and method of configuration file backup and recovery

A system management controller includes a processing module and a removable storage device interface. The removable storage device interface is connectable to a removable storage device. ... International Business Machines Corporation

12/03/15 / #20150347150

Hardware counters to track utilization in a multithreading computer system

Embodiments relate tracking utilization in a multithreading (mt) computer system. According to one aspect, a computer system includes a configuration with a core configured to operate in a mt that supports multiple threads on shared resources of the core. ... International Business Machines Corporation

12/03/15 / #20150347148

Relative offset branching in a fixed-width reduced instruction set computing architecture

Embodiments relate to a method and computer program product for relative offset branching in a reduced instruction set computing (risc) architecture. One aspect is a method that includes fetching a branch instruction from an instruction stream having a fixed instruction width. ... International Business Machines Corporation

12/03/15 / #20150347147

Absolute address branching in a fixed-width reduced instruction set computing architecture

Embodiments relate to a method and computer program product for absolute address branching in a reduced instruction set computing (risc) architecture. One aspect is a method that includes fetching a branch instruction from an instruction stream having a fixed instruction width. ... International Business Machines Corporation

12/03/15 / #20150347146

Relative offset branching in a fixed-width reduced instruction set computing architecture

Embodiments relate to a system for relative offset branching in a reduced instruction set computing (risc) architecture. One aspect is a system that includes memory and a processing circuit communicatively coupled to the memory. ... International Business Machines Corporation

12/03/15 / #20150347145

Absolute address branching in a fixed-width reduced instruction set computing architecture

Embodiments relate to a system for absolute address branching in a reduced instruction set computing (risc) architecture. One aspect is a system that includes memory and a processing circuit communicatively coupled to the memory. ... International Business Machines Corporation

12/03/15 / #20150347141

Opcode counting for performance measurement

Methods, systems and computer program products are disclosed for measuring a performance of a program running on a processing unit of a processing system. In one embodiment, the method comprises informing a logic unit of each instruction in the program that is executed by the processing unit, assigning a weight to each instruction, assigning the instructions to a plurality of groups, and analyzing the plurality of groups to measure one or more metrics. ... International Business Machines Corporation

12/03/15 / #20150347137

Suppressing branch prediction on a repeated execution of an aborted transaction

Branch prediction is suppressed for branch instructions executing in a transaction of a transactional memory (tm) environment in transactions that are re-executions of previously aborted transactions.. . ... International Business Machines Corporation

12/03/15 / #20150347136

Branch predictor performing distinct non-transaction branch prediction functions and transaction branch prediction functions

A branch predictor for predicting branch instructions performs different branch prediction operations for branches executing in a transaction than those not-executing in a transaction, including suppressing branch prediction functions based on progress of a re-execution of a previously aborted transaction, the transaction buffering data and committing the buffered data to memory when the transaction completes, but discarding the buffered data when the transaction aborts.. . ... International Business Machines Corporation

12/03/15 / #20150347135

Suppressing branch prediction updates on a repeated execution of an aborted transaction

Aspects of branch prediction are suppressed for branch instructions executing in a transaction of a transactional memory (tm) environment in transactions that are re-executions of previously aborted transactions.. . ... International Business Machines Corporation

12/03/15 / #20150347134

Delaying branch prediction updates until after a transaction is completed

In a branch predictor in a processor capable of executing transactional memory transactions, the branch predictor for speculatively prediction outcome of branch instructions, such as taken/not-taken, target address and target instruction. Branch prediction information is buffered during a transaction, and is only loaded into the branch predictor when the transaction is completed, but discarded if the transaction aborts.. ... International Business Machines Corporation

12/03/15 / #20150347133

Suspending branch prediction in transactional memory instruction execution

In a computer supporting transactional memory (tm) transaction execution (tx), use of speculative branch prediction is programmably suspended during tx, and programmably resumed. The branch prediction suspension may cause the execution of the branch instruction to stall in the pipeline until branch conditions and branch target addresses are resolved.. ... International Business Machines Corporation

12/03/15 / #20150347132

Thread context preservation in a multithreading computer system

According to one aspect, a computer-implemented method for thread context preservation in a configuration including a core configurable between a single thread (st) mode and a multithreading (mt) mode is provided. The st mode addresses a primary thread, and the mt mode addresses the primary thread and one or more secondary threads on shared resources of the core. ... International Business Machines Corporation

12/03/15 / #20150347128

Synchronizing comments in source code with text documents

Various embodiments synchronize comments in a source code file with text of a source code document. In one embodiment, a source code document is compared to a corresponding source code file. ... International Business Machines Corporation

12/03/15 / #20150347113

Software installation and configuration

A method to manage an initial software installation and configuration script is provided. The method may include saving, by a plurality of collaboration tools, a new customization associated with the initial software installation and configuration script in an installation and configuration knowledgebase. ... International Business Machines Corporation

12/03/15 / #20150347110

Software installation and configuration

A method to manage an initial software installation and configuration script is provided. The method may include saving, by a plurality of collaboration tools, a new customization associated with the initial software installation and configuration script in an installation and configuration knowledgebase. ... International Business Machines Corporation

12/03/15 / #20150347101

R-language integration with a declarative machine learning language

In a method for analyzing a large data set using a statistical computing environment language operation, a processor generates code from the statistical computing environment language operation that can be understood by a software system for processing machine learning algorithms in a mapreduce environment. A processor transfers the code to the software system for processing machine learning algorithms in a mapreduce environment. ... International Business Machines Corporation

12/03/15 / #20150347099

Customized ready-to-go componentized application definitions

A request to invoke a text-list definition of a componentized application is received. The text-list definition of the componentized application identifies a collection of different listed independent application sub-components specified by a user to be executed as a set. ... International Business Machines Corporation

12/03/15 / #20150347095

Customized ready-to-go componentized application definitions

A request to invoke a text-list definition of a componentized application is received. The text-list definition of the componentized application identifies a collection of different listed independent application sub-components specified by a user to be executed as a set. ... International Business Machines Corporation

12/03/15 / #20150347087

Reordering of database records for improved compression

According to embodiments of the present invention, apparatus, systems, methods and computer program products for sorting and compressing an unordered set of data records from a structured database are provided. Fields of the unordered set of data records are prioritized based on an impact of those fields to a compression scheme for column-oriented compression. ... International Business Machines Corporation

12/03/15 / #20150347054

Memory with mixed cell array and system including the memory

A memory system, system including the memory system and method of reducing memory system power consumption. The memory system includes multiple memory units allocable to one of a number of processor units, e.g., processors or processor cores. ... International Business Machines Corporation

12/03/15 / #20150347045

Data integrity monitoring among sysplexes with a shared direct access storage device (dasd)

System and method embodiments for monitoring data integrity among multiple sysplexes that share data sets on a dasd are provided. The virtual volume record (vvr) for each data set on dasd is configured with additional access fields that provide such information as the access mode (serial or multi-access), whether multiple systems have opened the data set, the names of an original sysplex and any additional sysplexes to open the data set, the names of the opening systems in each sysplex, job name and time stamp and a usage counter for each sysplex. ... International Business Machines Corporation

12/03/15 / #20150347044

Synchronizing updates of page table status indicators and performing bulk operations

A synchronization capability to synchronize updates to page tables by forcing updates in cached entries to be made visible in memory (i.e., in in-memory page table entries). A synchronization instruction is used that ensures after the instruction has completed that updates to the cached entries that occurred prior to the synchronization instruction are made visible in memory. ... International Business Machines Corporation

12/03/15 / #20150347037

Verification of management of real storage via multi-threaded thrashers in multiple address spaces

A method, system, and computer program product to verify management of real storage via multi-threaded thrashers in multiple address spaces are described. The method includes dynamically scaling a number of units of work and a number of address spaces based on a number of available processors and dynamically scaling an amount and page size of storage pages representing virtual storage accessed by each of the number of units of work based on a total available memory. ... International Business Machines Corporation

12/03/15 / #20150347036

Dram controller for variable refresh operation timing

A method for selection of a dram refresh timing in a dram memory system is disclosed. The method may include running a workload for a first number of refresh intervals using a first dram refresh timing and making a first workload throughput measurement for the first number of refresh intervals. ... International Business Machines Corporation

12/03/15 / #20150347035

Multiple i/o request processing in a storage system

A mechanism is provided to optimize performance of a storage system. A plurality of i/o requests is received. ... International Business Machines Corporation

12/03/15 / #20150347024

Avoiding out-of-space conditions in storage controllers

Embodiments of the invention relates to avoiding out-of-space conditions in storage controllers operating with efficiency capabilities between virtual space in a data container and real space in a storage container. Both the real space and the virtual space are monitored and their respective usage is compared to provide information about occupancy of the real space to the virtual space. ... International Business Machines Corporation

12/03/15 / #20150347022

Reading and writing via file system for tape recording system

Communicating data with a medium is provided. A cache is provided for storing target data of a file identified by an access request from an application of a host. ... International Business Machines Corporation

12/03/15 / #20150347021

Verification of serialization of storage frames within an address space via multi-threaded programs

A method, system, and computer program product to verify serialization of storage frames within an address space via multi-threaded programs is described. The method includes dynamically scaling a number of units of work based on a number of available processors, each of the units of work configured to execute actions, and dynamically scaling an amount and page size of virtual storage accessed by each of the units of work based on a total available memory. ... International Business Machines Corporation

12/03/15 / #20150346966

Information processing apparatus, display processing method, program, and recording medium to display presence of off-screen objects using sub-window

Responsive to a user marking a region, identifying each object present in the region and storing an indication of the region and identified object(s), preserving a positional relationship in which the identified object(s) are displayed in the region; upon detecting that the identified each object is not displayed in the window, displaying the region as a sub-window located at the periphery, the displayed sub-window containing the identified each object in the preserved relationship; and upon detecting that the region subsequently shifts into the window, deleting the sub-window. Responsive to a user selecting a displayed object and marking a displayed region, storing an indication of the region and the object; while the object of the region is not displayed in the window, displaying a sub-window in a periphery of the window, the sub-window displaying the object in the region; and automatically closing the sub-window in response to the object being again displayed in the window.. ... International Business Machines Corporation

12/03/15 / #20150346954

Flexible control in resizing of visual displays

A computer processor circuit can be used to receive a resizing request that includes parameters for resizing a user interface containing a plurality of visual elements. In response to the request, the computer processor circuit can access a set of one or more data files specifying: links to binary image data files for the plurality of visual elements; a set of nodes forming a plurality of vector paths for at least one of the plurality of visual elements; and a set of rules defining different image resizing properties for different vector paths of the plurality of vector paths. ... International Business Machines Corporation

12/03/15 / #20150346922

Arranging components in a two-dimensional area

A system for arranging components in a two-dimensional area includes a component preparation module for providing a set of components for arrangement, determining rectangular covers for each component, and ordering components according to a predefined order preference, and a core layout module for mapping components in order to positions in the arrangement with a first width and in a first direction, including: a row module for positioning components in order in a first full row across the first direction of the first width aligning one of the top or bottom sides of the covers of adjacent components until the next component does not fit in the first width, and a sub-row module for positioning components in any available space within the height of the first full row to form one or more sub-rows in the first direction and extending a distance less than the first width.. . ... International Business Machines Corporation

12/03/15 / #20150346826

Detecting input based on multiple gestures

Detecting user input based on multiple gestures is provided. One or more interactions are received from a user via a user interface. ... International Business Machines Corporation

12/03/15 / #20150346789

Power supply system for an information handling system and power supply method thereof

A power supply system is provided to control one or more power supply units associated with an information handling system. A first power supply unit and a second power supply unit are electrically coupled to the information handling system. ... International Business Machines Corporation

12/03/15 / #20150346446

Method and spacer for assembling flexible optical waveguide ribbons, and assembled stack of such ribbons

A method and spacer for assembling flexible optical waveguide ribbons and assembled stack of such ribbons. The method includes the steps of: providing at least two optical waveguide ribbons and a spacer, which includes at least two calibrated spaces; positioning a ribbon stack in the spacer, where the ribbon stack includes the at least two optical waveguide ribbons stacked on top of each other; constraining positioned ribbon stack in one of the calibrated spaces; and fixing constrained ribbon stack in the calibrated spaces.. ... International Business Machines Corporation

12/03/15 / #20150346431

Optical waveguide structure with waveguide coupler to facilitate off-chip coupling

Aspects of the invention are directed to a method for forming an optical waveguide structure. Initially, a base film stack is received with an optical waveguide feature covered by a lower dielectric layer. ... International Business Machines Corporation

12/03/15 / #20150346428

Graphene plasmonic communication link

A signal transfer link includes a first plasmonic coupler, and a second plasmonic coupler spaced apart from the first plasmonic coupler to form a gap. An insulator layer is formed over end portions of the first and second plasmonic couplers and in and over the gap. ... International Business Machines Corporation

12/03/15 / #20150346281

Control test point for timing stability during scan capture

A scan chain of an integrated circuit is disclosed, including a plurality of scannable storage elements and a control test point having a scan latch and an integrated clock gate (icg) with clock, functional enable (fe) and scan enable (se) inputs, and a gated clock output. The icg may respond to an se input active state, in a serial scan mode allowing the gated clock output to change. ... International Business Machines Corporation

12/03/15 / #20150346280

Scan chain processing in a partially functional chip

A method for scanning a partially functional chip. The method may include applying a failed core map to the partially functional chip, bypassing at least one failed core scan chain, based on contents of the failed core map. ... International Business Machines Corporation

12/03/15 / #20150346279

Managing redundancy repair using boundary scans

An io structure, method, and apparatus are disclosed for using an ieee™ 1149.1 boundary scan latch to reroute a functional path. The method for a chip using ieee™ 1149.1 boundary scan latches may include using the ieee™ 1149.1 boundary scan latches for testing io on the chip in a test mode. ... International Business Machines Corporation

12/03/15 / #20150346256

Predicting service life of electrical equipment

The service life of electrical equipment is predicted using a thermal history sensor mounted in the electrical equipment. At least one thermal history sensor is mounted inside or on an outer wall surface of electrical equipment. ... International Business Machines Corporation

12/03/15 / #20150346128

Salt-based method to monitor and log the times a data center air goes above a predefined limit

A salt-based method to monitor and log the time periods a data center air's relative humidity goes above a predefined limit. The choice of the salt is such that its deliquescent relative humidity is equal to the desired limit, so that above the desired limit, the salt gets wet and therefore electrically conductive. ... International Business Machines Corporation

12/03/15 / #20150345960

Monitoring suggested routes for deviations

Traffic patterns are monitored for adherence of a user to a suggested route. Deviations from suggested routes are recorded for later upload and/or analysis. ... International Business Machines Corporation

12/03/15 / #20150344633

Preparation of functional polysulfones

Polysulfones and methods for forming polysulfones are disclosed herein. The polysulfones are prepared from thiols and hexahydrotriazines. ... International Business Machines Corporation

12/03/15 / #20150344629

Preparation of thioether polymers

Polythioethers and methods for forming polythioethers are disclosed herein. The polythioethers are prepared from thiols and hexahydrotriazines. ... International Business Machines Corporation

12/03/15 / #20150344628

Preparation of thioether polymers

Polythioethers and methods for forming polythioethers are disclosed herein. The polythioethers are prepared from thiols and hexahydrotriazines. ... International Business Machines Corporation

12/03/15 / #20150343421

Sulfur scavenging materials

Materials which react with (“scavenge”) sulfur compounds, such as hydrogen sulfide and mercaptans, are useful for limiting sulfur-induced corrosion. Surface-modified particles incorporating a hexahydrotriazine moiety are disclosed and used as sulfur scavengers. ... International Business Machines Corporation

12/03/15 / #20150343352

Sulfur scavenging materials for filters and coatings

Materials which react with (“scavenge”) sulfur compounds, such as hydrogen sulfide and mercaptans, are used to limit sulfur-induced corrosion. Filters and protective coatings including these materials, described broadly as polyhexahydrotriazines (pht) and polyhemiaminals (pha), are disclosed. ... International Business Machines Corporation

11/26/15 / #20150342057

Residual material detection in backdrilled stubs

A stub of a via formed in a printed circuit board is backdrilled to a predetermined depth. A capacitance probe is positioned within the via. ... International Business Machines Corporation

11/26/15 / #20150342056

Technology for temperature sensitive components in thermal processing

A method for printed circuit board design of temperature sensitive components includes a scrub tool receiving a list of part numbers for electronic components of a printed circuit board assembly (“pcba”). The scrub tool sends one or more queries for finding temperature and time limits of the electronic components to a database. ... International Business Machines Corporation

11/26/15 / #20150342007

Intelligent and coordinated lighting of a lighting device

Intelligent lighting is provided to motorists traveling down a stretch of road by sequentially turning on adjacent lighting devices in a lighting segment only when required, such as when vehicles are approaching the lighting devices, and turning off the lighting devices or decreasing a light intensity output of the lighting devices to a predefined minimum lighting intensity output level when no vehicles are present. In addition, which bulb to use in a multi-bulb lighting device is determined, as well as the optimal lighting intensity level of the selected bulb. ... International Business Machines Corporation

11/26/15 / #20150341434

Management of digital content distribution

A method for sharing a content item from an originator with one or more first-order recipients may include receiving a first grouping of one or more first-order recipients that is selected to receive the content item from the originator. The method may also include receiving one or more distribution objectives from the originator. ... International Business Machines Corporation

11/26/15 / #20150341387

Identification of web form parameters for an authorization engine

A method, system and computer-usable medium are disclosed for automating the identification of web form parameters for an authorization engine. A web page containing a set of parameters is received and then processed to identify structured portions it may contain. ... International Business Machines Corporation

11/26/15 / #20150341365

Access control list-based port mirroring techniques

Embodiments presented herein describe techniques for selecting incoming network frames to be mirrored using an access control list. According to one embodiment, an incoming frame is received. ... International Business Machines Corporation

11/26/15 / #20150341364

Atomically updating ternary content addressable memory-based access control lists

Embodiments described herein provide techniques for atomically updating a ternary content addressable memory (tcam)-based access control list (acl). According to one embodiment, a current version bit of the acl is determined. ... International Business Machines Corporation

11/26/15 / #20150341354

Network resource management system utilizing physical network identification for privileged network access

The disclosed network resource management system employs a hardware configuration management (hcm) information handling system (ihs) that may couple to a single administered ihs or to multiple administered ihss via an administrative network. An hcm tool in the hcm ihs may generate, modify and store hardware configuration information, including physical network identifications (pnet ids), in an hcm database and share the hcm database with the administered ihss. ... International Business Machines Corporation

11/26/15 / #20150341338

Serialized authentication and authorization services

Requests for user services on networked computers running on different platforms with different authentication, authorization and auditing (aaa) security systems are processed through an aaa services manager server and web services servers. The aaa services manager server communicates requests for user services to web services servers using corresponding url web addresses. ... International Business Machines Corporation

11/26/15 / #20150341335

Password-based authentication

A password authentication system includes an access control server configured to control access by a user computer to a resource dependent on authentication of user passwords associated with user ids. The system further includes a plurality of authentication servers, storing respective secret values. ... International Business Machines Corporation

11/26/15 / #20150341316

Access control list-based port mirroring techniques

Embodiments presented herein describe techniques for selecting incoming network frames to be mirrored using an access control list. According to one embodiment, an incoming frame is received. ... International Business Machines Corporation

11/26/15 / #20150341305

Maintaining conversational cadence in an online social relationship

A method for maintaining conversational cadence may include determining, by a processor, a conversational cadence associated with a user in a social network. The conversational cadence may be determined based on a plurality of messages previously transmitted by the user. ... International Business Machines Corporation

11/26/15 / #20150341299

Intelligent, dynamic e-mail signature

A computer implemented method, computer program product, and system for providing a dynamic, intelligent e-mail signature. In an embodiment, the method includes the steps of receiving an e-mail from a sender, storing the e-mail for later retrieval, assigning a url representing the e-mail signature and sending the url to the sender. ... International Business Machines Corporation

11/26/15 / #20150341287

Estimating the time until a reply email will be received using a recipient behavior model

A method is provided in an email communication system having at least a processor. The method includes generating an estimate of a receipt time of a reply email from a recipient of an initial email using a recipient behavior model that applies machine learning to the initial email and to training data from other emails. ... International Business Machines Corporation

11/26/15 / #20150341279

Transparent middlebox with graceful connection entry and exit

Methods for inserting a middlebox into a network connection include monitoring network state information in a connection between a client and a server. When the connection is idle, a connection entry is created for each device and is initialized using state information gathered by monitoring the network connection. ... International Business Machines Corporation

11/26/15 / #20150341270

Supporting access control list rules that apply to tcp segments belonging to 'established' connection

Embodiments presented herein provide a tcam-based access control list that supports disjunction operations in rules. According to one embodiment, a numeric range table is tied to the access control list. ... International Business Machines Corporation

11/26/15 / #20150341269

Supporting access control list rules that apply to tcp segments belonging to 'established' connection

Embodiments presented herein provide a tcam-based access control list that supports disjunction operations in rules. According to one embodiment, a numeric range table is tied to the access control list. ... International Business Machines Corporation

11/26/15 / #20150341268

Multicast message filtering in virtual environments

Various systems, processes, and products may be used to filter multicast messages in virtual environments. In particular implementations, a system, process, and product for filtering multicast messages in virtual environments may include the ability to determine whether a multicast message has been received, examine a local filtering store for a match for the destination address of the multicast message, and send the message to a number of virtual machines if a match for the address is found. ... International Business Machines Corporation

11/26/15 / #20150341265

Skipping and parsing internet protocol version 6 extension headers to reach upper layer headers

Embodiments presented herein describe techniques for parsing an internet protocol version 6 frame and skipping extension headers of the frame. A configurable skip list is provided that specifies extension headers for a networking device to skip when parsing the frame. ... International Business Machines Corporation

11/26/15 / #20150341261

Skipping and parsing internet protocol version 6 (ipv6) extension headers to reach upper layer headers

Embodiments presented herein describe techniques for parsing an internet protocol version 6 frame and skipping extension headers of the frame. A configurable skip list is provided that specifies extension headers for a networking device to skip when parsing the frame. ... International Business Machines Corporation

11/26/15 / #20150341215

Configuration command template creation assistant using cross-model analysis to identify common syntax and semantics

In one embodiment, a method for using a common configuration template for a set of devices includes identifying a set of devices from the plurality of devices which share a common configuration template applicable to a proposed change, wherein the common configuration template includes a collection of command variations, determining which command from the collection of command variations is applicable to each device in the set of devices, and executing the proposed change across all devices in the set of devices using the determined command for each device.. . ... International Business Machines Corporation

11/26/15 / #20150341214

Configuration command template creation assistant using cross-model analysis to identify common syntax and semantics

In one embodiment, a method for creating a configuration template for a set of devices includes determining command information for a plurality of devices, identifying a command structure from the command information which is common to a set of devices from the plurality of devices, and associating the set of devices to a common configuration template.. . ... International Business Machines Corporation

11/26/15 / #20150341173

Password-based authentication

A password authentication system includes an access control server configured to control access by a user computer to a resource dependent on authentication of user passwords associated with user ids. The system further includes a plurality of authentication servers, storing respective secret values. ... International Business Machines Corporation

11/26/15 / #20150341011

Reconfigurable rat race coupler

A reconfigurable rat race coupler and methods of designing and reconfiguring the rat race coupler are disclosed. The reconfigurable rat race coupler, includes a plurality of transmission lines. ... International Business Machines Corporation

11/26/15 / #20150341009

Reconfigurable bandstop filter

A reconfigurable bandstop filter and methods of designing and reconfiguring the bandstop filter are disclosed. The reconfigurable bandstop filter includes a plurality of transmission lines each including a phase shifter. ... International Business Machines Corporation

11/26/15 / #20150340765

Integration of area efficient antennas for phased array or wafer scale array antenna applications

Package structures are provided for integrally packaging antennas with semiconductor rfic (radio frequency integrated circuit) chips to form compact integrated radio/wireless communications systems that operate in the millimeter-wave and terahertz frequency ranges. For example, a package structure includes an rfic chip, and an antenna package bonded to the rfic chip. ... International Business Machines Corporation

11/26/15 / #20150340584

Suspended superconducting qubits

A qubit system includes a substrate layer, a qubit circuit suspended above the substrate layer and fine structure disposed between the qubit circuit and the substrate layer.. . ... International Business Machines Corporation

11/26/15 / #20150340536

Atomic layer deposition for photovoltaic devices

A photovoltaic device and method include a substrate, a conductive layer formed on the substrate and an absorber layer formed on the conductive layer from a cu—zn—sn containing chalcogenide material. An emitter layer is formed on the absorber layer and a buffer layer is formed on the emitter layer including an atomic layer deposition (ald) layer. ... International Business Machines Corporation

11/26/15 / #20150340532

Method of stabilizing hydrogenated amorphous silicon and amorphous hydrogenated silicon alloys

A method of forming a semiconductor material of a photovoltai