Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

International Business Machines Corporation
International Business Machines Corporations
International Business Machines Corporation ibm
International Business Machines Corporation yt
International Business Machines Corporation yorktown
International Business Machines Corporation ibm Corporation
International Business Machines Corporation New Orchard Road
International Business Machines Corporation_20100114
International Business Machines Corporation_20131212
International Business Machines Corporation_20100128
International Business Machines Corporation_20100121
International Business Machines Corporation_20100107

IBM patents (2017 archive)


Recent patent applications related to IBM. IBM is listed as an Agent/Assignee. Note: IBM may have other listings under different names/spellings. We're not affiliated with IBM, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | IBM-related inventors


Thermal interface material structures

In an example, a thermal interface material (tim) structure is disclosed. The tim structure includes a first thermal interface material layer and a second thermal interface material layer. ... International Business Machines Corporation

System, method and apparatus for sensor virtualization in mobile devices

A method and system for virtualizing mobile device sensors includes requesting from a first mobile device a virtual connection with a mobile device having a specific type of sensor, receiving a response from a second mobile device having the sensor, establishing a trusted temporary communication connection between the first and second mobile devices, sending a control signal from an application program on the first mobile device to the second mobile for operating the sensor on the second mobile device and receiving device sensor data from the sensor on the second mobile device. The operating system of the first mobile device is coupled with the application program by a virtual machine monitor running on the first mobile device such that the first mobile device is a host machine and the second mobile device is a guest machine.. ... International Business Machines Corporation

Methods and systems for improving accuracy of indoor positioning

A computerized method of improving position measurement of an indoor positioning system (ips), comprising: gathering a plurality of position samples of a mobile device measured by an indoor wireless device, each of the position samples is indicative of a measured position and a measurement time; receiving a current position sample of the mobile device; for each of the plurality of position samples and the current position sample, determining a time weight, the time weight is higher for samples measured at a later time; for each of the plurality of position samples and the current position sample, determining a signal weight, the signal weight is higher for measured with stronger signal; and estimating a current position of the mobile device by weighting at least some of the position samples with the respective weights.. . ... International Business Machines Corporation

Collision avoidance signaling from mobile devices

A location of a target associated with a first system is determined at the first system at a first time. A signal is constructed at the first system where the data of the signal includes a unique identifier, an identifier indicative of a collision avoidance nature of the signal, and the location of the target. ... International Business Machines Corporation

Performing device communications based on relative positioning

A method, system, and computer program product for initiating actions among devices are described. A relative position of at least one device to at least one other device is determined, and one or more rules specifying at least one action to initiate based at least in part on the relative position of the at least one device to the at least one other device are obtained. ... International Business Machines Corporation

Locating a lost device

An embodiment of the invention may include a method, computer program product and computer system for detecting a device. The embodiment may include a computing device that determines a universally unique identifier (uuid) of a beacon of a second device. ... International Business Machines Corporation

Determining a transmission number for a device

A set of rules for assigning a transmission number to one or more computing devices is received. An indication from a first computing device is received. ... International Business Machines Corporation

Transmitting notifications using a transmission number

A first indications from a first beacon of one or more beacons at a first time is received. A transmission number is requested from a server device. ... International Business Machines Corporation

Intelligent audio control

Embodiments for manipulating an audio environment by a processor. A noncalibrative stimulus is detected in the audio environment. ... International Business Machines Corporation

Consumer-configurable alternative advertising reception with incentives

An original advertisement is transformed at a first content viewing device into a transferrable incentivized deferred advertisement that itself includes as added encoded data elements a configured incentive, a configured incentive time period within which to obtain the configured incentive, and a reporting instruction that causes an alternative content viewing device to report advertisement viewing back to the first content viewing device. The transferrable incentivized deferred advertisement, that includes the added encoded data elements, is transferred to the alternative content viewing device.. ... International Business Machines Corporation

System, method, and recording medium for a closed-loop immersive viewing technology coupled to drones

A viewing technology method, system, and non-transitory computer readable medium including a display device associated with a user and at least two drones having an image capturing device, include a drone control circuit configured to control a flight path of the at least two drones such that the drones are separated by the inter-drone distance, a vergence angle determining circuit configured to determine a vergence angle of the pupils of the user relative to the image displayed on the display device, and a image control circuit configured to control a display of the image on the display device according to the vergence angle to cause the image to create a just-noticeable-difference in the image.. . ... International Business Machines Corporation

Methods and systems to obtain desired self-pictures with an image capture device

Aspects relate to computer implemented methods and system to obtain self-pictures with an image capture device. The methods include receiving, by a processor, an input regarding a selected picture type to be captured, receiving, by an image sensor, a live image capture, identifying a subject in the live image capture, comparing the live image capture of the subject with a reference set based on the selected picture type, determining, based on the comparison, if the live image capture matches with the reference set, and providing feedback instructions regarding an adjustment to be made to improve matching between the live image capture and the reference set.. ... International Business Machines Corporation

Controlling a camera using a voice command and image recognition

A method, a computer program product, and a computer system for controlling a camera using a voice command and image recognition. One or more processors on the camera captures the voice command that is from a user of the camera and declares a subject of interest. ... International Business Machines Corporation

Controlling a camera using a voice command and image recognition

A method, a computer program product, and a computer system for controlling a camera using a voice command and image recognition. One or more processors on the camera captures the voice command that is from a user of the camera and declares a subject of interest. ... International Business Machines Corporation

12/28/17 / #20170374148

Efficient updates within a dispersed storage network

A method includes determining that a dispersed data source is to be updated. The method further includes determining whether the update to the dispersed data source can be delayed. ... International Business Machines Corporation

12/28/17 / #20170374146

Updating data objects on a system

A computer system includes a first server including a first data management module and a second server including a second data management module, and a first and second storage controller. The first and second storage controllers are interconnected by a network configured for reliable data multicasting. ... International Business Machines Corporation

12/28/17 / #20170374129

Sending and requesting feed

A server or other computing device can receive a request for a feed (e.g., really simple syndication, atom, or other extensible markup language format feed) from a client. Content of the requested feed and a type of the client can be determined. ... International Business Machines Corporation

12/28/17 / #20170374077

Virtual machine access control

A system is provided and includes a broadcasting device configured to emit a beacon signal over a predefined range and a mobile computing device. The mobile computing device is configured to run a host operating system at any location. ... International Business Machines Corporation

12/28/17 / #20170374060

Attribute-based access control

A received security token includes first access control attributes and a signature of a first identity provider of a first security domain. Additional access control attributes provided by a second identity provider of a second security domain are added into the received security token. ... International Business Machines Corporation

12/28/17 / #20170374033

Authentication via revocable signatures

Methods, systems and computer program products are provided for authenticating a message via a revocable signature. The method includes, at a signing computer, generating first auxiliary data and second auxiliary data respectively dependent on a public key and a private key of a public-private key pair for the message. ... International Business Machines Corporation

12/28/17 / #20170374020

Using dynamic host configuration protocol to protect data

Two or more nodes in a cluster are determined. The cluster manages one or more resources found on a device. ... International Business Machines Corporation

12/28/17 / #20170374011

Message processing

A method includes receiving a set of messages corresponding to a user, identifying a non-terminal message from the received set of messages, wherein a non-terminal message is a message containing content that indicates further action is required, determining if an age of the identified non-terminal message is greater than a selected threshold, wherein the age of the identified non-terminal message corresponds to an amount of time elapsed since the message was received, identifying actionable content corresponding to the non-terminal message, wherein actionable content corresponds to message content that requests or indicates a need for further action, determining one or more next actions according to the identified actionable contents, and executing the determined one or more actions. A computer program product and computer system corresponding to the method are also disclosed.. ... International Business Machines Corporation

12/28/17 / #20170374009

Method and a system for email address validation

A device identifies an email address of a recipient listed in an email. The device determines whether the email address is erroneous and based on determining that the email address is erroneous, the device displays a recommended email address to a user.. ... International Business Machines Corporation

12/28/17 / #20170374008

Method and a system for email address validation

A device identifies an email address of a recipient listed in an email. The device determines whether the email address is erroneous and based on determining that the email address is erroneous, the device displays a recommended email address to a user.. ... International Business Machines Corporation

12/28/17 / #20170374005

Recommend viewing of an object to friends within a social network

A computer-implemented method for recommending viewing of an image includes obtaining, using a processor system, a visual image of an object relating to a particular subject matter. The method also includes determining the location of the object. ... International Business Machines Corporation

12/28/17 / #20170373999

Familiarity-based involvement on an online group conversation

A method for providing suggested modifications to user messages is provided. The method may include receiving user messages associated with a communication application. ... International Business Machines Corporation

12/28/17 / #20170373997

Reducing already viewed content in social networks

An approach for reducing already viewed content in a social network, the approach including receiving a first content in a social network service and creating an identifier corresponding to the first content. The approach includes retrieving one or more identifiers associated with content previously viewed by a user and determining whether the user has previously viewed the first content. ... International Business Machines Corporation

12/28/17 / #20170373967

Initiating an action based on a determined navigation path data structure

A current sharing, in a system by a first user, of first content with at least one other user can be detected. A navigation path data structure indicating at least one navigation path from a second content to the first content within a network environment can be automatically determined. ... International Business Machines Corporation

12/28/17 / #20170373946

Topology graph of a network infrastructure and selected services status on selected hubs and nodes

A computer-implemented method for identifying a source of a failure in a network is provided. The method includes receiving hardware infrastructure information of the network, wherein the network includes a plurality of hardware infrastructure units, and receiving software services information of the network. ... International Business Machines Corporation

12/28/17 / #20170373925

Analyzing contention data and following resource blockers to find root causes of computer problems

Present disclosure relates to methods, processing systems and computer program products of analyzing contention data and following resource blockers to find root causes of computer problems. The method may include: detecting one or more resource waiters in a computer system, iteratively determining whether the resource blockers are a resource waiter, until a final resource blocker not waiting for another resource is found, determining, whether final resource blocker is caused by a resource blocker in a different computer system, iteratively executing, the method on the different computer system to find the final resource blocker not waiting for another resource is found, determining, whether the final resource blocker has more than one symptom that may or may not be a contention problem, selecting a symptom that has the highest priority as the root cause of the computer problems, and generating, using the processor, a report of root causes of the computer problems.. ... International Business Machines Corporation

12/28/17 / #20170373865

Updating data objects on a system

A computer system includes a first server including a first data management module and a second server including a second data management module, and a first and second storage controller. The first and second storage controllers are interconnected by a network configured for reliable data multicasting. ... International Business Machines Corporation

12/28/17 / #20170373846

Password-based generation and management of secret cryptographic keys

A user computer generates a secret cryptographic key through communication with a server. A secret user value is provided at the user computer. ... International Business Machines Corporation

12/28/17 / #20170373695

Digital phase locked loop for low jitter applications

A phase locked loop circuit is disclosed. The phase locked loop circuit includes a ring oscillator. ... International Business Machines Corporation

12/28/17 / #20170373493

Esd protection circuit

An electrostatic discharge (esd) protection circuit for providing esd protection to an esd protected circuit. The protection circuit comprises a signal pad and a crossover network for separating wanted electrical data signals and esd signals according to their frequency. ... International Business Machines Corporation

12/28/17 / #20170373369

Driving the common-mode of a josephson parametric converter using a short-circuited coplanar stripline

Techniques relate to an on-chip josephson parametric converter. A josephson ring modulator includes four nodes. ... International Business Machines Corporation

12/28/17 / #20170373335

Oxygen-separating device utilizing ionic oxygen motion

An apparatus for separating oxygen from a gas mixture includes an oxide layer having ion transport channels therein, which facilitate the migration of oxygen ions from a first side to a second side of the layer. Molecular oxygen is decomposed into oxygen ions at the first side, whereas oxygen ions recombine into molecular oxygen at the second side. ... International Business Machines Corporation

12/28/17 / #20170373213

Photovoltaic devices with improved n-type partner and methods for making the same

A photovoltaic device with an improved n-type partner and a method for making the same. The device includes: a transparent substrate; a transparent conductive electrode layer disposed on the transparent substrate; an n-type layer of zn1-xmgxo, wherein 0<x≦1, disposed on the transparent conductive electrode layer; a chalcogen absorber layer disposed on the n-type layer; and a conductive layer disposed on the chalcogen absorber layer. ... International Business Machines Corporation

12/28/17 / #20170373188

Fabrication of a vertical fin field effect transistor with an asymmetric gate structure

A method of forming a vertical fin field effect transistor (vertical finfet) with two concentric gate structures, including forming one or more tubular vertical fins on a substrate, forming a first gate structure around an outer wall of at least one of the one or more tubular vertical fins, and forming a second gate structure within an inner wall of at least one of the one or more tubular vertical fins having the first gate structure around the outer wall.. . ... International Business Machines Corporation

12/28/17 / #20170373170

Silicidation of bottom source/drain sheet using pinch-off sacrificial spacer process

A vertical fin field-effect-transistor and a method for fabricating the same. The vertical fin field-effect-transistor includes at least a substrate, a first source/drain layer, and a plurality of fins each disposed on and in contact with the first source/drain layer. ... International Business Machines Corporation

12/28/17 / #20170373167

Vertical transport field effect transistor with precise gate length definition

Techniques relate to a gate stack for a semiconductor device. A vertical fin is formed on a substrate. ... International Business Machines Corporation

12/28/17 / #20170373166

Vertical transport field effect transistor with precise gate length definition

Techniques relate to a gate stack for a semiconductor device. A vertical fin is formed on a substrate. ... International Business Machines Corporation

12/28/17 / #20170373162

Fabrication of a vertical fin field effect transistor with a reduced contact resistance

A method of forming a vertical fin field effect transistor (vertical finfet) with an increased surface area between a source/drain contact and a doped region, including forming a doped region on a substrate, forming one or more interfacial features on the doped region, and forming a source/drain contact on at least a portion of the doped region, wherein the one or more interfacial features increases the surface area of the interface between the source/drain contact and the doped region compared to a flat source/drain contact-doped region interface.. . ... International Business Machines Corporation

12/28/17 / #20170373160

Sidewall protective layer for contact formation

A method for forming a semiconductor device comprises forming a sacrificial gate stack on a substrate, spacers adjacent to the sacrificial gate stack, and a source/drain region on the substrate. A first insulator layer is formed on the source/drain region. ... International Business Machines Corporation

12/28/17 / #20170373159

Fabrication of a vertical fin field effect transistor with a reduced contact resistance

A method of forming a vertical fin field effect transistor (vertical finfet) with an increased surface area between a source/drain contact and a doped region, including forming a doped region on a substrate, forming one or more interfacial features on the doped region, and forming a source/drain contact on at least a portion of the doped region, wherein the one or more interfacial features increases the surface area of the interface between the source/drain contact and the doped region compared to a flat source/drain contact-doped region interface.. . ... International Business Machines Corporation

12/28/17 / #20170373150

Strained semiconductor device

A semiconductor device comprises a first semiconductor fin having a first width, the first semiconductor fin is arranged on a first portion of the strain relaxation buffer layer, where the first portion of the strain relaxation buffer layer has a second width and a second semiconductor fin having a width substantially similar to the first width, the second semiconductor fin is arranged on a second portion of the strain relaxation buffer layer, where the second portion of the strain relaxation buffer layer has a third width. A gate stack is arranged over a channel region of the first fin and a channel region of the second fin.. ... International Business Machines Corporation

12/28/17 / #20170373149

Iii-v extension by high temperature plasma doping

A method for forming an overlap transistor includes forming a gate structure over a iii-v material, wet cleaning the iii-v material on side regions adjacent to the gate structure and plasma cleaning the iii-v material on the side regions adjacent to the gate structure. The iii-v material is plasma doped on the side regions adjacent to the gate structure to form plasma doped extension regions that partially extend below the gate structure.. ... International Business Machines Corporation

12/28/17 / #20170373148

Asymmetric fet

After forming a first-side epitaxial semiconductor region and a second-side epitaxial semiconductor region on recessed surfaces of a semiconductor portion that are not covered by a gate structure, at least one dielectric layer is formed to cover the first-side and the second-side epitaxial semiconductor regions and the gate structure. A second-side contact opening is formed within the at least one dielectric layer to expose an entirety of the second-side epitaxial semiconductor region. ... International Business Machines Corporation

12/28/17 / #20170373070

Mirror contact capacitor

A semiconductor structure and a method for fabricating the same. The semiconductor structure includes a substrate and a bonding layer in contact with a top surface of the substrate. ... International Business Machines Corporation

12/28/17 / #20170373063

Formation of a semiconductor device with selective nitride grown on conductor

A method of forming a fin-type field effect transistor (finfet) according to one or more embodiments comprise etching a gate spacer of a complementary pair of transistors. An oxide is deposited over the source and drain of the transistors. ... International Business Machines Corporation

12/28/17 / #20170373061

Simultaneously fabricating a high voltage transistor and a finfet

Forming a semiconductor layer on a semiconductor substrate, a top surface of the semiconductor layer above a fin in a second region is higher than a top surface of the semiconductor layer in a first region, etching the semiconductor layer and a mask in the first region to expose a top surface of the semiconductor substrate to form a first stack, and etching the semiconductor layer and the mask in the second region to expose a top surface of the fin to form a second stack, epitaxially growing a semiconductor material on a top surface of the fin not covered by the second stack, recessing the first and second stack to expose a top surface of the semiconductor layer, a portion of the mask remains above the semiconductor layer in the first stack, top surfaces of each of the first and second stacks each are substantially flush with one another.. . ... International Business Machines Corporation

12/28/17 / #20170373023

Prevention of reverse engineering of security chips

A semiconductor chip includes a chip substrate; a self-destructive layer arranged on the chip substrate, the self-destructive layer including a pyrophoric reactant; and a sealant layer arranged on a surface of the self-destructive layer, on sidewalls of the self-destructive layer, and on the chip substrate such that the sealant layer forms a package seal on the semiconductor chip; wherein the pyrophoric reactant ignites spontaneously upon exposure to air.. . ... International Business Machines Corporation

12/28/17 / #20170373013

Surface treatment for semiconductor structure

A method includes forming a dielectric layer and forming a metallic conductor at least partially in the dielectric layer. Formation of the metallic conductor at least partially in the dielectric layer includes performing a planarization process. ... International Business Machines Corporation

12/28/17 / #20170373006

Biconvex low resistance metal wire

At least one opening having a biconvex shape is formed into a dielectric material layer. A void-free metallization region (interconnect metallic region and/or metallic contact region) is provided to each of the openings. ... International Business Machines Corporation

12/28/17 / #20170372973

Sidewall image transfer structures

A semiconductor device comprises a source/drain region arranged on a substrate and a first gate stack having a first length arranged on a first channel region of the substrate. A second gate stack having a second length is arranged on a second channel region of the substrate. ... International Business Machines Corporation

12/28/17 / #20170372970

Forming insulator fin structure in isolation region to support gate structures

A method for forming the semiconductor device that includes forming a plurality of composite fin structures across a semiconductor substrate including an active device region and an isolation region. The composite fin structures may include a semiconductor portion over the active device region and a dielectric portion over the isolation region. ... International Business Machines Corporation

12/28/17 / #20170372968

Fin pitch scaling for high voltage devices and low voltage devices on the same wafer

A semiconductor device is provided that includes a first plurality of fin structures having a first width in a first region of a substrate, and a second plurality of fin structures having a second width in a second region of the substrate, the second width being less than the first width. A first gate structure is formed on the first plurality of fin structures including a first high-k gate dielectric that is in direct contact with a channel region of the first plurality of fin structures and a first gate conductor. ... International Business Machines Corporation

12/28/17 / #20170372957

Self-aligned contact

A method for fabricating self-aligned contacts includes forming a liner over a gate structure having a gate conductor and one sidewall spacer and etching an exposed gate conductor to form a recess extending less than a width of the gate conductor. A dielectric layer is conformally deposited to fill the recess between the liner and the one sidewall spacer to form a partial dielectric cap formed on the gate conductor. ... International Business Machines Corporation

12/28/17 / #20170372956

Self-aligned contact

A semiconductor device includes a gate structure having a gate conductor and a sidewall spacer. A partial dielectric cap is formed on the gate conductor and extends less than a width of the gate conductor. ... International Business Machines Corporation

12/28/17 / #20170372954

Reflow enhancement layer for metallization structures

A reflow enhancement layer is formed in an opening prior to forming and reflowing a contact metal or metal alloy. The reflow enhancement layer facilitates the movement (i.e., flow) of the contact metal or metal alloy during a reflow anneal process such that a void-free metallization structure of the contact metal or metal alloy is provided.. ... International Business Machines Corporation

12/28/17 / #20170372909

Single or mutli block mask management for spacer height and defect reduction for beol

Aspects of the disclosure include method of making semiconductor structures. Aspects include providing a semiconductor structure including a plurality of spacer, an organic planarization layer, and a siarc layer. ... International Business Machines Corporation

12/28/17 / #20170372814

Bio-based conformal coating for sulfur sequestration using polyhydroxyalkanoates

Embodiments described herein provide methods of processing an electronic component, comprising mixing a bio-based polymer having sulfur-reactive substituents with a sulfurization catalyst and a solvent to form a coating material; applying the coating material to an electronic component; and removing the solvent to form a sulfur-reactive polymer coating that is resistant to sulfur penetration. The bio-based polymer may be made by bacterial fermentation of unsaturated fatty acids.. ... International Business Machines Corporation

12/28/17 / #20170372735

Magnetic recording head having longitudinally spaced offset arrays

An apparatus according to one embodiment includes a head having at least two modules, each having an array of transducers. Axes of the arrays are about parallel and are spaced from one another in an intended direction of tape travel thereacross. ... International Business Machines Corporation

12/28/17 / #20170372731

Tunnel valve read sensor with crystalline alumina tunnel barrier deposited using room temperature techniques

In one general embodiment, a method includes forming a first magnetic layer, forming a tunnel barrier layer above the first magnetic layer, and forming a second magnetic layer above the tunnel barrier layer. The tunnel barrier layer includes crystalline alumina. ... International Business Machines Corporation

12/28/17 / #20170372590

Locating a lost device

An embodiment of the invention may include a method, computer program product and computer system for detecting a device. The embodiment may include a computing device that determines a universally unique identifier (uuid) of a beacon of a second device. ... International Business Machines Corporation

12/28/17 / #20170372588

Automatic adjustment of metric alert trigger thresholds

Arrangements relate to the automatic adjustment of an alert trigger threshold associated with a metric. In response to a determination that a predetermined alert trigger threshold associated with a metric is met, an alert notification can be sent to a plurality of users associated with the metric. ... International Business Machines Corporation

12/28/17 / #20170372584

Providing an alert to a person in a distressed situation

A system for providing an alert to a user which includes a sensor for sensing user data pertaining to a user's condition; and a non-transitory storage medium that stores instructions. Also included is a processor that executes the instructions to: monitor the user data from the sensor for predefined conditions, at least one predefined condition pertaining to a mental state of the user; autonomously evaluate the user data for the predefined conditions; autonomously identify the predefined condition that matches the user's condition; autonomously determine a predefined alert corresponding to the predefined condition and to the user's condition to interact with the user to calm the user; and autonomously administer the predefined alert to the user.. ... International Business Machines Corporation

12/28/17 / #20170372570

Tamper-respondent assembly with nonlinearity monitoring

Tamper-respondent assemblies and methods of fabrication are provided which include at least one tamper-respondent sensor and a detector. The at least one tamper-respondent sensor includes conductive lines which form, at least in part, at least one tamper-detect network of the tamper-respondent sensor(s). ... International Business Machines Corporation

12/28/17 / #20170372551

Selective seating controller

A method, system, and/or computer program product improve a function of a computer used to make a seat in a venue available to a user. One or more processors received a request for a seat at a venue from a user. ... International Business Machines Corporation

12/28/17 / #20170372545

Associating external credentials with mobile devices

A computer-implemented method includes monitoring one or more mobile devices within a venue. The computer-implemented method further includes receiving a scan event indication denoting a scan of a ticket by a scanning device. ... International Business Machines Corporation

12/28/17 / #20170372378

Assessing probability of winning an in-flight deal for different price points

One embodiment provides a method for assessing probability of winning an in-flight deal. The method comprises receiving information for the in-flight deal. ... International Business Machines Corporation

12/28/17 / #20170372373

Display control system, method, recording medium and display apparatus network

A display control method, system, and non-transitory computer readable medium for a digital billboard display, include an attribute identification circuit configured to identify attributes of each user of a group of users viewing the digital billboard display, a content determining circuit configured to determine a content type to be displayed on the digital billboard based on an aggregation of all of the attributes of the group of users identified by the attribute identification circuit, and a display augmenting circuit configured to deliver the content type to the digital billboard display.. . ... International Business Machines Corporation

12/28/17 / #20170372371

Machine learning to manage contact with an inactive customer to increase activity of the customer

An approach is provided for managing a contact with an inactive customer. After grouping customers into active and inactive customers, the active customers are grouped according to activity segments corresponding to a level and style of activity. ... International Business Machines Corporation

12/28/17 / #20170372370

Modifying a push notification in response to an event

Embodiments of the present invention provide methods and systems for modification and/or removal of a push notification from a mobile device upon an event such as exit from an area. A positioning system tracks the location of a mobile device through an area. ... International Business Machines Corporation

12/28/17 / #20170372363

System, method, and recording medium for fuel deal advertisements

A fuel deal advertisement method, system, and non-transitory computer readable medium, include a navigation route and fuel availability determining circuit configured to determine a plurality of navigation route maps, each navigation route map including at least one fuel refill center for each of the plurality of navigation routes, an advertisement generating circuit configured to generate an advertisement for each of the at least one fuel refill center included on the plurality of navigation route maps, an advertisement playing circuit configured to play the advertisement for each of the at least one fuel refill center according to a predetermined rank of the advertisements, and a route selecting circuit configured to query a user of a vehicle to select a route of the plurality of navigation route maps including a preferred fuel refill center that the user wants to visit based on the advertisement.. . ... International Business Machines Corporation

12/28/17 / #20170372349

Augmenting missing values in historical or market data for deals

One embodiment provides a method for augmenting missing values in historical or market data for deals. The method comprises receiving information relating to a set of deals. ... International Business Machines Corporation

12/28/17 / #20170372347

Sequence-based marketing attribution model for customer journeys

Methods and a system are provided. A method includes extracting subsequences from a sequence of a customer journey that includes customer interactions on different channels at different times on different topics. ... International Business Machines Corporation

12/28/17 / #20170372341

Top-down pricing of a complex service deal

One embodiment provides a method for top-down pricing of an in-flight deal. The method comprises receiving a first set of information relating to the in-flight deal. ... International Business Machines Corporation

12/28/17 / #20170372338

Trend-factored rfm scores to improve campaign performance

A computer determines an rfm score for each of a plurality of contacts, each rfm value comprising a recency value, a frequency value and a monetary value respectively based on assigning recency values, frequency values, and monetary values of the plurality of contacts to a bin of a group of bins. The computer generates trend factors, based on patterns of sequences of transaction information and timestamps of each transaction for each contact of the plurality of contacts. ... International Business Machines Corporation

12/28/17 / #20170372335

System, method, and recording medium for restaurant management

A restaurant management method, system, and non-transitory computer readable medium, include receiving a state of a user from user data, determining a confidence value that a restaurant change results in an improvement of the state of the user, and deploying the restaurant change when the confidence value is greater than a predetermined threshold value. . ... International Business Machines Corporation

12/28/17 / #20170372252

Virtually assisted task generation

A method and system for automatically generating a virtual assisted task is provided. The method includes establishing secure connections between a hardware device and databases external to the hardware device. ... International Business Machines Corporation

12/28/17 / #20170372249

Calculating an expertise score from aggregated employee data

Systems and methods of the present invention provide for one or more server computers communicatively coupled to a network and configured to: receive, from a user interface on a client, a request for a listing of subject matter experts and keywords identifying the subject matter; query a database, in response to receiving the transmission, to select employee score data records including the subject matter keywords and automatically generated in response to the server receiving an employee calendar event data or employee communication data related to the calendar event data; automatically generate: a total score by adding the employee score from each score data record including an employee identifier; and the listing of subject matter experts; and transmit the listing to the client for display.. . ... International Business Machines Corporation

12/28/17 / #20170372240

Monitoring system for food consumption

A system, method, and computer program product for monitoring food in a restaurant system. Consumption data is received by a computer system from a sensor system generated while a number of pieces of tableware is with a number of customers in which the consumption data describes the food consumed by the number of customers. ... International Business Machines Corporation

12/28/17 / #20170372239

Food monitoring system

A system, method, and computer program product for monitoring food in a restaurant system. The method receives, by a computer system, first data from a sensor system associated with a number of pieces of tableware. ... International Business Machines Corporation

12/28/17 / #20170372238

Accountable care organization provider network design - a systematic data-driven approach

A systematic data-driven approach for building an accountable care organization (aco) is provided. In one aspect, a method for forming an aco includes: determining groups of healthcare providers that have x number of patients in common; detecting communities in the groups using a recursive community detection process; ranking contractual organizations of the healthcare providers based on how well the contractual organizations represent the communities; and making recommendations for the contractual organizations to include in the aco based on the ranking. ... International Business Machines Corporation

12/28/17 / #20170372235

Dynamic transportation pooling

Methods, systems, and computer program products for dynamic transportation pooling are provided herein. A computer-implemented method includes determining vehicle-sharing user preferences attributed to each of multiple users; identifying vehicle-sharing opportunities involving two or more of the users riding in two or more vehicles, wherein each of the identified vehicle-sharing opportunities comprises (i) a location wherein at least one of the users exits a first of the vehicles and enters a second of the vehicles, wherein the location comprises a vehicle demand that exceeds a pre-determined threshold, and (ii) a temporal range until the vehicles will reach the location, and wherein said identifying is based on the vehicle-sharing user preferences attributed to each of the users, the current location of each of the vehicles, the destination of each of the vehicles, and traffic information; and outputting each of the vehicle-sharing opportunities to a mobile device of each of the users.. ... International Business Machines Corporation

12/28/17 / #20170372234

Predicting a consumer selection preference based on estimated preference and environmental dependence

An information processing apparatus includes a history acquisition section configured to acquire history data including a history indicating that a plurality of selection subjects have selected selection objects; a learning processing section configured to allow a choice model to learn a preference of each selection subject for a feature and an environmental dependence of selection of each selection object in each selection environment using the history data, where the choice model uses a feature value possessed by each selection object, the preference of each selection subject for the feature, and the environmental dependence indicative of ease of selection of each selection object in each of a plurality of selection environments to calculate a selectability with which each of the plurality of selection subjects selects each selection object; and an output section configured to output results of learning by the learning processing section.. . ... International Business Machines Corporation

12/28/17 / #20170372221

Cognitive machine learning classifier generation

A computer-implemented method includes creating a classifier by: training a machine learning model using two or more tasks, wherein the tasks lie in two or more domains; including in the machine learning model at least one attribute common to at least two of said two or more domains; including in the machine learning model at least one latent feature that affects at least two of the two or more tasks that fall within one of the at least two domains; and constructing the classifier based on said machine learning model. The computer-implemented method further includes applying the classifier to at least one operational task.. ... International Business Machines Corporation

12/28/17 / #20170372220

Cognitive machine learning classifier generation

A computer-implemented method includes creating a classifier by: training a machine learning model using two or more tasks, wherein the tasks lie in two or more domains; including in the machine learning model at least one attribute common to at least two of said two or more domains; including in the machine learning model at least one latent feature that affects at least two of the two or more tasks that fall within one of the at least two domains; and constructing the classifier based on said machine learning model. The computer-implemented method further includes applying the classifier to at least one operational task.. ... International Business Machines Corporation

12/28/17 / #20170372219

System, method, and recording medium for geolocation data discovery in streaming texts

A geolocation data discovery method, system, and non-transitory computer readable medium, include a secure text mining circuit configured to mine a textual alert message of an event from secure source data for a geolocational indicator, a temporal indicator, and a type of alert, a geolocation and temporal embedding circuit configured to embed a geolocational tag location and a temporal tag time to the event based on the geolocational indicator and the temporal indicator mined from the textual alert message by the secure text mining circuit, and an event mapping circuit configured to map the event with an icon related to the type of alert at the geolocational tag location on a navigational map at a time associated with the temporal tag time of the event.. . ... International Business Machines Corporation

12/28/17 / #20170372217

Optimized testing of a partially symmetric quantum-logic circuit

A method and associated systems for using wreath products and invariance groups to test a partially symmetric quantum-logic circuits. A test system receives information that describes the architecture of a quantum-logic circuit to be tested. ... International Business Machines Corporation

12/28/17 / #20170372205

Sensor based system state prediction

A method and system for predicting system states is provided. The method includes receiving a first reference model associated with a first operational attribute of a system from a first integrated circuit internally comprising a first processing circuit and a first sensor measuring a first parameter of the system. ... International Business Machines Corporation

12/28/17 / #20170372203

Automated filtering of story content based on emotions

Machine logic based automated story writing technology that: respectively represents content data sources for potential use in an automated story as nodes in a graph; includes emotion metadata in each given node of the graph, with the emotion metadata relating to “emotions” (“sentiments”) that are likely to be caused in story consumers and/or story characters if the content corresponding to the given node is used in an automated story; use the emotion metadata to help select a sub-set of nodes whose respectively associated content is to be used in an automated story; and use the emotion metadata to help select the order of the use of the content nodes in an automated story. The selection of the nodes based on emotion metadata and/or the ordering of the nodes based on emotion metadata may be further based on seed information (for example, story seed information supplied by a human co-author).. ... International Business Machines Corporation

12/28/17 / #20170372198

Smart logic device

A cognitive learning device includes inputs with each including an input path having a transistor device having a storage capacity. A circuit is responsive to the inputs and selects an input set in accordance with a current task, wherein the input set selected modifies a characteristic of the transistor device of one or more corresponding input paths to bias the input set for selection for subsequent accesses.. ... International Business Machines Corporation

12/28/17 / #20170372197

Customized cooking utilizing deep learning neuromorphic computing of hyperspectral input

One or more processors receive hyperspectral band input, biometric input, and cognitive input as response input, from a user sampling a plurality of base foods, each base food prepared with a subset of ingredients and preparation techniques. The response input is transformed to a numeric representation of the respective input. ... International Business Machines Corporation

12/28/17 / #20170372194

Neuromorphic architecture with multiple coupled neurons using internal state neuron information

This invention relates to an apparatus, system, and method for computing with neuromorphic circuit architectures that have neurons with interconnected internal state information. The interconnected internal state information allows the neurons to enable or strengthen the input to other neurons. ... International Business Machines Corporation

12/28/17 / #20170372190

Lat based answer generation using anchor entities and proximity

Mechanisms are provided for implementing a proximity based candidate answer pre-processor engine that outputs a sub-set of candidate answers to a question and answer (qa) system. The mechanisms receive a lexical answer type (lat) and an entity specified in an input natural language question as well as an ontology data structure representing a corpus of natural language content. ... International Business Machines Corporation

12/28/17 / #20170372173

Management of container host clusters

A method, executed by a computer, includes receiving, for a cluster, a request to create a new container host, wherein the cluster comprises a plurality of container hosts having a corresponding plurality of local repositories, creating the new container host, selecting an image for the new container host according to one or more host preferences, wherein the image is stored in an image location, and copying the image from the image location to the local repository of the new container host. A computer system and computer program product corresponding to the above method are also disclosed herein.. ... International Business Machines Corporation

12/28/17 / #20170372171

On demand testing as a service for base text direction verification testing

Methods and systems for testing base text direction (btd) include receiving one or more images captured by an end-user system. Each of the one or more images displays respective text test case information. ... International Business Machines Corporation

12/28/17 / #20170372130

Facial recognition encode analysis

A method for facial recognition encode analysis comprises providing a training set of gabor encoded arrays of face images from a database; and, for each encode array in the training set, evaluating the gabor data to determine the accuracy of the fiducial points on which the encode array is based. The method also comprises training an outlier detection algorithm based on the evaluation of the encode arrays to obtain a decision function for a strength of accuracy of fiducial points in the encode arrays; and outputting the decision function for application to an encode array to be tested.. ... International Business Machines Corporation

12/28/17 / #20170372095

Privacy detection of a mobile application program

Privacy violation detection of a mobile application program is disclosed. Regular histories of the mobile application are mined. ... International Business Machines Corporation

12/28/17 / #20170372080

Dynamically provisioning virtual machines

Embodiments of the present invention disclose methods and systems which receive a user credential corresponding to a user, a task to be performed by the user, a security policy including a user role, and sensitive information. These methods and systems dynamically provision virtual machines including un-redacted information from received sensitive information. ... International Business Machines Corporation

12/28/17 / #20170372079

Selective data encryption

As disclosed herein a computer-implemented method includes receiving a request to perform selective data encryption on captured content corresponding to a computing device. The method further includes determining whether the captured content includes encoded printable characters, and responsive to determining that the captured content includes the encoded printable characters, encrypting the encoded printable characters within the captured content to provide encrypted captured content. ... International Business Machines Corporation

12/28/17 / #20170372077

Selective data encryption

As disclosed herein a computer-implemented method includes receiving a request to perform selective data encryption on captured content corresponding to a computing device. The method further includes determining whether the captured content includes encoded printable characters, and responsive to determining that the captured content includes the encoded printable characters, encrypting the encoded printable characters within the captured content to provide encrypted captured content. ... International Business Machines Corporation

12/28/17 / #20170372072

Detecting vulnerable applications

A method and system of determining a vulnerability of software. Libraries are downloaded and stored in a database. ... International Business Machines Corporation

12/28/17 / #20170372066

Detecting harmful applications prior to installation on a user device

Examples of techniques for detecting harmful applications prior to installation on a user device are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes: analyzing, by a processing device, a plurality of reviews for each version of a plurality of versions of an application to determine, based on each of the plurality of reviews, whether each version of the plurality of versions is harmful; and responsive to determining that a particular version of the plurality of versions is harmful, preventing a user from installing the particular version.. ... International Business Machines Corporation

12/28/17 / #20170372060

System, method and apparatus for extracting usage-based fine grained permissions

A fine grained permission method and system that parameterizes permissions based on an objective criterion. The method includes accessing libraries of application programs requiring a permission, automatically extracting types of the parameters and respective corresponding fields read by the libraries requiring the permission, filtering the extracted types of parameters and fields based on a usage criteria to determine a filtered type of parameter and field for the permission and storing the filtered type parameter and field for the permission in a database. ... International Business Machines Corporation

12/28/17 / #20170372033

Patient-level analytics with sequential pattern mining

Examples of techniques for patient-level analytics with sequential pattern mining are provided. In one example implementation according to aspects of the present description, a computer-implemented method includes: constructing a patient record; transforming, by a processing system, the patient record into a bitmap representation; and analyzing, by the processing system, the bitmap to identify a sequential pattern within the patient record on a per patient basis.. ... International Business Machines Corporation

12/28/17 / #20170372010

Using sensors and location to trigger events and share data

Embodiments include a system for providing access to secured data; the system includes a processor configured to perform a method. The method includes receiving physiological data from one or more sensors on a wearable device; obtaining environmental data from the one or more sensors; storing the physiological data and the environmental data from the one or more sensors onto a secured storage device; receiving, by a transceiver, a request to access the physiological data; accessing, by a processor, a security profile for the physiological data, wherein the security profile defines a normal range for the physiological data and defines environmental data compliance; and providing access to the physiological data based upon a determination that the physiological data is outside the normal range for the physiological data and based upon a determination that the environmental data is in compliance with the security profile.. ... International Business Machines Corporation

12/28/17 / #20170371999

Method and recording medium of reducing chemoepitaxy directed self-assembled defects

A method, system, and non-transitory computer readable medium for reducing chemo-epitaxy directed-self assembly (dsa) defects of a guiding pattern layout, include inserting an internal dummy between a first portion of the guiding pattern and a second portion of the guiding pattern if a vertical spacing is equal to or greater than a first predetermined distance, inserting a first external dummy along an external edge of the guiding pattern in a vertical direction if the vertical spacing is greater than a second predetermined distance, and inserting an anti-taper structure on the first external dummy if a second distance from the external edge of the guiding pattern to the edge of the first external dummy is greater than a first distance.. . ... International Business Machines Corporation

12/28/17 / #20170371998

Detecting dispensable inverter chains in a circuit design

Automated analyzing of an endpoint report for a design of an electronic circuit is provided, which includes: identifying, by a processing device, that one or more test points of a selected path of the endpoint report are associated with one or more inverter devices of an inverter chain of the design of the electronic circuit; establishing, by the processing device, a chain criticality value for the inverter chain; and determining, by the processing device, whether to identify the inverter chain as a dispensable inverter chain, the determining using, at least in part, the chain criticality value for the inverter chain. The establishing may include updating the chain criticality value for each inverter device of the inverter chain, where the chain criticality value is a summed value obtained from criticality values for the one or more inverter devices of the inverter chain.. ... International Business Machines Corporation

12/28/17 / #20170371997

Sharing global route topologies in detailed routing

According to an aspect, a method includes accessing an initial layout of global wires and a congestion related metric for each net in a gate level design description of an integrated circuit. A second layout is accessed that specifies, for each net, detailed routing information that includes connections between specific wires in the regions of the integrated circuit. ... International Business Machines Corporation

12/28/17 / #20170371996

Sharing global route topologies in detailed routing

According to an aspect, a method includes accessing an initial layout of global wires and a congestion related metric for each net in a gate level design description of an integrated circuit. A second layout is accessed that specifies, for each net, detailed routing information that includes connections between specific wires in the regions of the integrated circuit. ... International Business Machines Corporation

12/28/17 / #20170371983

Optimizing the layout of circuits based on multiple design constraints

Disclosed is a system, computer program product, and method for performing logic, physical synthesis, and post-route optimization. The method begins with identifying a plurality of groups of paths in a circuit by a unique criteria. ... International Business Machines Corporation

12/28/17 / #20170371977

Unbounded list processing

A computer-implemented method includes receiving, from a first network application, a first unbounded list of objects of a first type and a second unbounded list of objects of a second type, wherein the second type is distinct from the first type, and producing a third unbounded list of objects of a third type, wherein the third type is distinct from both the first type and the second type. The computer-implemented method further includes providing the third unbounded list to a second network application. ... International Business Machines Corporation

12/28/17 / #20170371976

Generating a representative view for a multipage compilation of information

A method according to one embodiment includes outputting one page of a multipage compilation of information. The method also includes receiving a request to show portions of multiple pages of the multipage compilation of information, the request originating from a user input device and including an indication of which portions of the multiple pages of the multipage compilation to select. ... International Business Machines Corporation

12/28/17 / #20170371975

Accessibility tagger for non-accessibility enabled webpages

Methods and systems for improving content accessibility include retrieving an accessibility tag for a piece of content. The piece of content is modified with the accessibility tag to enable one or more accessibility features for the piece of content. ... International Business Machines Corporation

12/28/17 / #20170371973

Page filtering via compression dictionary filtering

Page filtering in a database using a compression dictionary. A page of a database table is compressed, creating a compression dictionary. ... International Business Machines Corporation

12/28/17 / #20170371972

Page filtering via compression dictionary filtering

Page filtering in a database using a compression dictionary. A page of a database table is compressed, creating a compression dictionary. ... International Business Machines Corporation

12/28/17 / #20170371970

Automated storyline content selection and qualitative linking based on context

A huge volume of unstructured content is available on the internet. Social media websites, news outlets, subject matter expert sites, forums, government organization sites, non-government organization sites, etc., collectively provide a rich source of raw material for any kind of story writing, for example, for movies, novels, television, etc. ... International Business Machines Corporation

12/28/17 / #20170371969

Identifying equivalent links on a page

A computer-implemented process for identifying equivalent links on a page responsive to a determination that the crawler has not visited all required universal resource locators, locates a next url to be crawled to form a current url and processes the current url to identify equivalent urls. Responsive to a determination that the crawler has not visited the current url, determine whether necessary to crawl all identified equivalent urls and responsive to a determination that it is necessary to crawl all identified equivalent urls, adding all equivalent urls to a list of urls to be crawled.. ... International Business Machines Corporation

12/28/17 / #20170371956

System and method for precise domain question and answer generation for use as ground truth

Embodiments provide a system and method for question and answer (qa) generation. Using a cognitive system having natural language processing capabilities, the qa generation system can analyze a corpus of documents, which can each have one or more headings, sub-headings, and fact statements. ... International Business Machines Corporation

12/28/17 / #20170371955

System and method for precise domain question and answer generation for use as ground truth

Embodiments provide a system and method for question and answer (qa) generation. Using a cognitive system having natural language processing capabilities, the qa generation system can analyze a corpus of documents, which can each have one or more headings, sub-headings, and fact statements. ... International Business Machines Corporation

12/28/17 / #20170371954

Recommending documents sets based on a similar set of correlated features

A method for recommending a plurality of alternate search keywords is provided. The method may include executing a first search query using a plurality of user-entered search text. ... International Business Machines Corporation

12/28/17 / #20170371941

System, method, and recording medium for dynamically changing search result delivery format

A result format modifying method, system, and non-transitory computer readable medium, include an extracting circuit configured to extract a plurality of format types of a search result conducted by a user, a determining circuit configured to determine user activity based on user data, and a deciding circuit configured to decide a format of the plurality of format types to deliver to the user based on a time interval between a current time and a start time of the user's next activity as determined by the determining circuit.. . ... International Business Machines Corporation

12/28/17 / #20170371940

Shipping of data through etl stages

Performing an extract, transform, and load (etl) process. Column data is received by a stage of the etl process. ... International Business Machines Corporation

12/28/17 / #20170371939

Shipping of data through etl stages

Performing an extract, transform, and load (etl) process. Column data is received by a stage of the etl process. ... International Business Machines Corporation

12/28/17 / #20170371928

Data arrangement management in a distributed data cluster environment of a shared pool of configurable computing resources

Disclosed aspects relate to data arrangement management in a distributed data cluster environment of a shared pool of configurable computing resources. In the distributed data cluster environment, a set of data is monitored for a data redistribution candidate trigger. ... International Business Machines Corporation

12/28/17 / #20170371914

Automatically restoring data replication consistency without service interruption during parallel apply

A data replication method can begin with the detection of an inconsistency between records of a target table and corresponding records of a source table of a relational database management system (rdbms) performing a parallel apply replication by an improved data replication manager. The target table can be a copy of the source table, both of which include multiple unique constraints and indexes. ... International Business Machines Corporation

12/28/17 / #20170371911

Temporal logical transactions

In supporting temporal logical transactions, a database management system (dbms) determines that a temporal logical transaction time (t) is set for a temporal logical transaction. The dbms receives a change request for a current row in a current table. ... International Business Machines Corporation

12/28/17 / #20170371908

Automatic updating of operational tables

One or more processors receive operational data. The operational data includes two or more fields that contain an identical type of data as two or more fields within a master table. ... International Business Machines Corporation

12/28/17 / #20170371907

Automatic updating of operational tables

One or more processors receive operational data. The operational data includes two or more fields that contain an identical type of data as two or more fields within a master table. ... International Business Machines Corporation

12/28/17 / #20170371905

Multiple versions of triggers in a database system

In managing multiple versions of triggers, a database system creates a first version of a trigger to apply a first set of actions in response to a first triggering event, which includes: creating a first package for the first version of the trigger to include the first set of actions; linking the first package to the database object; and setting the first package as a current version of the trigger. The database system creates a second version of the trigger to apply a second set of actions to the database object in response to a second triggering event, which includes: creating a second package for the second version of the trigger to include the second set of actions; and linking the second package to the database object. ... International Business Machines Corporation

12/28/17 / #20170371904

Data deduplication within distributed computing components

Embodiments for, in an object storage environment, deduplicating data within and between distributed computing components by a processor. A deduplication operation is paired with metadata associated with a data object to determine data necessitating deduplication before the data object is transferred and written to a local node.. ... International Business Machines Corporation

12/28/17 / #20170371887

Managing storage system metadata during data migration

Data is migrated from a source storage device to a destination storage device using tape media. Both the source storage device and the destination storage device utilize disk drives to store data. ... International Business Machines Corporation

12/28/17 / #20170371873

Identifying unvisited portions of visited information

Identifying unvisited portions of visited information to visit includes receiving information to crawl, wherein the information is representative of one of web based information and non-web based information, computing a locality sensitive hash (lsh) value for the received information, and identifying a most similar information visited thus far. Identifying unvisited portions of visited information further includes determining whether the lsh of the received information is equivalent to most similar information visited thus far and, responsive to a determination that the lsh of the received information is not equivalent to most similar information visited thus far, identifying a visited portion of the received information using information for most similar information visited thus far and crawling only unvisited portions of the received information.. ... International Business Machines Corporation

12/28/17 / #20170371862

Hybrid approach for short form detection and expansion to long forms

Embodiments provide a system and method for short form and long form detection. Using a language-independent process, the detection system can ingest a corpus of documents, pre-process those documents by tokenizing the documents and performing a part-of-speech analysis, and can filter one or more candidate short forms using one or more filters that select for semantic criteria. ... International Business Machines Corporation

12/28/17 / #20170371860

Latent ambiguity handling in natural language processing

Mechanisms are provided for latent ambiguity handling in natural language processing. The method may include: providing an annotated semantic graph based on a knowledge base in which nodes representing semantic concepts are linked by semantic relationships, wherein one or more nodes are annotated to indicate a latent ambiguity of the semantic concept; processing a natural language input by activation of the annotated semantic graph; during processing when encountering an annotated node indicating a latent ambiguity of the semantic concept, applying a pre-defined latent ambiguity process to the node; and replacing any annotated nodes indicating a latent ambiguity of the concept remaining in an output of the processing of the natural language input with an alternative node from the semantic graph.. ... International Business Machines Corporation

12/28/17 / #20170371859

Dynamic portmanteau word semantic identification

An approach is provided to discover new portmanteau, such as when ingesting documents into a question answering (qa) system. The approach works by analyzing a words included in electronic documents and identifies words as being possible portmanteaus. ... International Business Machines Corporation

12/28/17 / #20170371858

Creating rules and dictionaries in a cyclical pattern matching process

In an approach to rule and dictionary creation based on an improvement cycle, a computing device receives a corpus, wherein the corpus comprises textual data. The computing device stores, in a rule database, a rule based on a user input. ... International Business Machines Corporation

12/28/17 / #20170371857

Hybrid approach for short form detection and expansion to long forms

Embodiments provide a system and method for short form and long form detection. Given candidate short forms, the system can generate one or more n-gram combinations, resulting in one or more candidate short form and n-gram combination pairs. ... International Business Machines Corporation

12/28/17 / #20170371842

Suppressing previously consumed content items of a website

A browser renders web site views dynamically, based on previously consumed content items. When the browser loads a new web site which contains, among other object, content items, those content items which are duplicative of previously consumed content items are suppressed when the web site view is rendered in the browser. ... International Business Machines Corporation

12/28/17 / #20170371828

Synchronous input / output hardware acknowledgement of write completions

A computer-implemented method for computer-implemented method for communicating completion of synchronous input/output (i/o) commands between a processor executing an operating system and a recipient control unit is described. The method may include issuing, by a processor, a synchronous i/o command to the recipient control unit; receiving, with the processor, a dma read request from the recipient control unit; converting, with the processor, the dma read response to write a data record into memory of the recipient control unit; issuing the dma read request to the recipient control unit, wherein the dma read request comprises an echo read portion comprising at least one byte of information at the end of the data record written; receiving, by the processor, a dma write confirmation comprising the echo read portion of the record; and writing the echo read portion to a status area.. ... International Business Machines Corporation

12/28/17 / #20170371816

Input/output computer system including hardware assisted autopurge of cache entries associated with pci address translations

A computing system includes a processor and a memory unit that stores program instructions. The system purges an entry from an address translation cache in response to the processor executing the program instructions to perform issuing, via an operating system running on the computing system, a command indicating a request to perform an i/o transaction requiring a translation entry. ... International Business Machines Corporation

12/28/17 / #20170371813

Synchronous input/output (i/o) cache line padding

A computer-implemented method for synchronous input/output (i/o) cache line padding is described. The cache line padding occurs between a server having a processor executing an operating system and a recipient control unit. ... International Business Machines Corporation

12/28/17 / #20170371798

System, method, and recording medium for common memory programming

A parallel execution method, system, and non-transitory computer readable medium not maintaining a cache coherence, include creating a continuum, the continuum being a construct that holds data structures, giving a view to the continuum, the view being a descriptor that provides access rights and properties for the continuum, and performing a task associated with an execution sequence, the task holding the view to the continuum that the execution sequence is accessing.. . ... International Business Machines Corporation

12/28/17 / #20170371789

Techniques for maintaining consistency between address translations in a data processing system

A technique for operating a memory management unit (mmu) of a processor includes the mmu detecting that one or more address translation invalidation requests are indicated for an accelerator unit (au). In response to detecting that the invalidation requests are indicated, the mmu issues a raise barrier request for the au. ... International Business Machines Corporation

12/28/17 / #20170371788

Processing commands in a directory-based computer memory management system

A method for processing commands in a directory-based computer memory management system includes receiving a command to perform an operation on data stored in a set of one or more computer memory locations associated with an entry in a directory of a computer memory, the entry is associated with an indicator for indicating whether the set of one or more computer memory locations is busy, a head tag, and a tail tag. The command is associated with a command tag and a predecessor tag, and checking the indicator to determine whether the set of one or more computer memory locations is busy.. ... International Business Machines Corporation

12/28/17 / #20170371774

Recording, replaying and modifying an unstructured information management architecture (uima) pipeline

The technique herein substantially improves productivity of annotator developers by providing methods and systems to develop and test annotators without having to run a full pipeline every time changes are made to a particular annotator. To this end, preferably a running pipeline is instrumented to enable automated recording of static configuration and dynamically-generated event data as the pipeline is executed. ... International Business Machines Corporation

12/28/17 / #20170371773

Optimizing execution order of system interval dependent test cases

Systems, methods, and computer-readable media for optimizing the execution order of a set of test programs that includes at least one system interval dependent test program are disclosed. The optimized execution order may be determined by identifying each non-system interval dependent test program that can be executed during each instance of a system interval without impacting execution of system interval dependent test programs. ... International Business Machines Corporation

12/28/17 / #20170371771

Adaptive testing using dynamically determined system resources of a computer system

Embodiments include methods, and adaptive testing systems, and computer program products for performing adaptive testing using one or more system resources of a computer system dynamically determined from a platform on which a test program is executing. Aspects include: test program sending a resource query based on certain criteria to a resource query module to inquire one or more available system resources of computer system, the resource query module using certain operating system commands of computer system to determine appropriate system resources available for use on the computer system, the computer system returning the appropriate system resources determined on the computer system to the resource query module of the test program, the test program deciding one or more system resources that best meet a need of the test program, and the test program performing the adaptive testing on the computer system based on the one or more system resources decided.. ... International Business Machines Corporation

12/28/17 / #20170371770

Automatically establishing significance of static analysis results

A static analysis tool configured to determine a significance of static analysis results. The static analysis tool includes computer program code to perform a static analysis of a computer program and generate the static analysis results in response to the performance of the static analysis of the computer program. ... International Business Machines Corporation

12/28/17 / #20170371768

System and method for detecting and alerting unexpected behavior of software applications

A method finding the root cause of errors and/or unexpected behavior of a monitored software application, the method comprising: providing a decision tree corresponding to an error and/or unexpected behavior of a software application, wherein the decision tree comprising multiple nodes, wherein the decision tree further comprising one or more leaf nodes, wherein the leaf nodes indicates at least one reason and one or more possible solutions for the error and/or unexpected behavior; scanning one or more log-files of a software application; determining, based on the decision tree and the scanned log files which step has been not performed by the software application, wherein the non-performed step being indicative for an error and/or unexpected behavior of the software application; determining a leaf node based on the determined non-performed step; extracting information from the leaf node; and providing a reason and/or a solution of the error and/or unexpected behavior.. . ... International Business Machines Corporation

12/28/17 / #20170371767

Debugging optimized code using fat binary

Embodiments of the present invention provide a method, computer program product, and system for debugging optimized code. The system includes a fat binary, wherein the fat binary comprises a non-optimized native code and an internal representation of a program's source code. ... International Business Machines Corporation

12/28/17 / #20170371764

Framework for automated globalization enablement on development operations

Techniques provide a framework for dynamic globalization enablement for an application during software development. A globalization development operation information system (gdois) retrieves source code for the application, which is assigned to support specified globalization features. ... International Business Machines Corporation

12/28/17 / #20170371763

Automated globalization enablement on development operations

Techniques are disclosed for providing dynamic globalization enablement for developing an application during software development. A globalization development operation information system (gdois) retrieves source code for the application, which is assigned to support specified globalization features. ... International Business Machines Corporation

12/28/17 / #20170371762

Framework for automated globalization enablement on development operations

Techniques provide a framework for dynamic globalization enablement for an application during software development. A globalization development operation information system (gdois) retrieves source code for the application, which is assigned to support specified globalization features. ... International Business Machines Corporation

12/28/17 / #20170371751

Relational database recovery

A database recovery and index rebuilding method involves reading data pages for a database to be recovered as recovery bases; retrieving all log records from stored post-backup updates and sorting the retrieved log records; as the data pages to be recovered are read, applying the sorted log records to their respective data pages; as the applying completes for individual data pages, extracting and sorting index keys from the individual data pages for which the applying is complete, until all index keys have been extracted from all individual data pages and sorted; on an individual recovered page basis, writing the recovered individual data pages into the database; and when all index keys have been extracted and sorted from all of the recovered individual data pages, rebuilding indexes of the database using the sorted index keys and writing the rebuilt indexes to the non-transitory storage.. . ... International Business Machines Corporation

12/28/17 / #20170371747

Scaling quorum based replication systems

A computer determines whether it has received user input or a node within a replica set has reached a capacity threshold. Based on receiving user input or determining that a node within a replica set has reached a capacity threshold, creating a snapshot of the data stored in the replica set and partitioning the data based on the created snapshot. ... International Business Machines Corporation

12/28/17 / #20170371732

Method for debugging static memory corruption

An indication is received. The indication is of an address in a first page in virtual memory used by an application with a static memory corruption. ... International Business Machines Corporation

12/28/17 / #20170371730

Action recommendation to reduce server management errors

An actuator to execute on a server may be automatically selected based on risk of failure and damage to the server. Requirement specification and environment parameters may be received. ... International Business Machines Corporation

12/28/17 / #20170371725

Hardware multi-threading co-scheduling for parallel processing systems

A method, information processing system, and computer program product are provided for managing operating system interference on applications in a parallel processing system. A mapping of hardware multi-threading threads to at least one processing core is determined, and first and second sets of logical processors of the at least one processing core are determined. ... International Business Machines Corporation

12/28/17 / #20170371718

Content-based distribution and execution of analytics applications on distributed datasets

Methods are provided. A method includes announcing to a network meta information describing each of a plurality of distributed data sources. ... International Business Machines Corporation

12/28/17 / #20170371715

Predictive optimization of next task through asset reuse

A first category is determined of a first task being performed at a given time. A first asset that is configured for use with the first category is identified. ... International Business Machines Corporation

12/28/17 / #20170371712

Hierarchical process group management

Management of hierarchical process groups is provided. Aspects include creating a group identifier having an associated set of resource limits for shared resources of a processing system. ... International Business Machines Corporation

12/28/17 / #20170371711

Eliminating execution of jobs-based operational costs of related reports

Optimizing operational costs in a computing environment includes identifying high-cost jobs that are executed to generate one or more reports in the computing environment, identifying one or more reports the generation of which is dependent on the execution of the high-cost jobs, and culling at least a first job from among the high-cost jobs, in response to determining that a benefit achieved from the reports that depend on the first job does not justify costs associated with generating the reports.. . ... International Business Machines Corporation

12/28/17 / #20170371710

Detecting and enforcing control-loss restrictions within an application programming interface

The disclosed herein provides a method, system, and/or computer program product for determining control of a processing resource. To determine control of the processing resource, the method, system, and/or computer program can set a control-loss flag indicating whether a process has control of the processing resource and check the control-loss flag to determine whether the process lost control of the processing resource.. ... International Business Machines Corporation

12/28/17 / #20170371709

Optimizing simultaneous startup or modification of inter-dependent machines with specified priorities

Identify individual machines of a multi-machine computing system. Construct a graph of dependencies among the machines. ... International Business Machines Corporation

12/28/17 / #20170371687

Automated globalization enablement on development operations

Techniques are disclosed for providing dynamic globalization enablement for developing an application during software development. A globalization development operation information system (gdois) retrieves source code for the application, which is assigned to support specified globalization features. ... International Business Machines Corporation

12/28/17 / #20170371680

Identification of bootable devices

A method for managing an initiation of a computing system. In an embodiment, the method includes a computer processor detecting that a first computing system receives a request to initiate a second computing system. ... International Business Machines Corporation

12/28/17 / #20170371679

Identification of bootable devices

A method for managing an initiation of a computing system. In an embodiment, the method includes a computer processor detecting that a first computing system receives a request to initiate a second computing system. ... International Business Machines Corporation

12/28/17 / #20170371672

Stream based branch prediction index accelerator for multiple stream exits

A computer-implemented method for predicting a taken branch that ends an instruction stream in a pipelined high frequency microprocessor includes receiving, by a processor, a first instruction within a first instruction stream, the first instruction comprising a first instruction address; searching, by the processor, an index accelerator predictor one time for the stream; determining, by the processor, a prediction for a taken branch ending the branch stream; influencing, by the processor, a metadata prediction engine based on the prediction; observing a plurality of taken branches from the exit accelerator predictor; maintaining frequency information based on the observed taken branches; determining, based on the frequency information, an updated prediction of the observed plurality of taken branches; and updating, by the processor, the index accelerator predictor with the the updated prediction.. . ... International Business Machines Corporation

12/28/17 / #20170371671

Stream based branch prediction index accelerator with power prediction

A computer-implemented method for predicting a taken branch that ends an instruction stream in a pipelined high frequency microprocessor includes receiving, by a processor, a first instruction within a first instruction stream, the first instruction including a first instruction address. The computer-implemented method further includes searching, by the processor, a stream-based index accelerator predictor one time for the stream; determining, by the processor, a prediction for a branch ending the branch stream; influencing, by the processor, a metadata prediction engine based on the prediction; and updating, by the processor, a stream-based index accelerator predictor with information indicative of the prediction.. ... International Business Machines Corporation

12/28/17 / #20170371670

Stream based branch prediction index accelerator for multiple stream exits

A computer-implemented method for predicting a taken branch that ends an instruction stream in a pipelined high frequency microprocessor includes receiving, by a processor, a first instruction within a first instruction stream, the first instruction comprising a first instruction address; searching, by the processor, an index accelerator predictor one time for the stream; determining, by the processor, a prediction for a taken branch ending the branch stream; influencing, by the processor, a metadata prediction engine based on the prediction; observing a plurality of taken branches from the exit accelerator predictor; maintaining frequency information based on the observed taken branches; determining, based on the frequency information, an updated prediction of the observed plurality of taken branches; and updating, by the processor, the index accelerator predictor with the the updated prediction.. . ... International Business Machines Corporation

12/28/17 / #20170371668

Variable branch target buffer (btb) line size for compression

Embodiments include method, systems and computer program products for variable branch target buffer line size for compression. In some embodiments, a branch target buffer (btb) congruence class for a line of a first parent array of a btb may be determined. ... International Business Machines Corporation

12/28/17 / #20170371666

Effectiveness and prioritization of prefeteches

A method, system, and computer program product are provided for prioritizing prefetch instructions. The method includes a processor issuing a prefetch instruction and fetching elements from a cache that can include a memory or a higher level cache. ... International Business Machines Corporation

12/28/17 / #20170371658

Managing a divided load reorder queue

Managing a divided load reorder queue including storing load instruction data for a load instruction in an expanded lrq entry in the lrq; launching the load instruction from the expanded lrq entry; determining that the load instruction is in a finished state; moving a subset of the load instruction data from the expanded lrq entry to a compact lrq entry in the lrq, wherein the compact lrq entry is smaller than the expanded lrq entry; and removing the load instruction data from the expanded lrq entry.. . ... International Business Machines Corporation

12/28/17 / #20170371652

Automated generation and identification of screenshots for translation reference

Software translation quality and efficiency are improved by providing user interface (ui) context for translators. Unicode symbols are used to uniquely tag user-visible strings from the source code and into resource files. ... International Business Machines Corporation

12/28/17 / #20170371651

Automatically establishing significance of static analysis results

A static analysis tool configured to determine a significance of static analysis results. The static analysis tool can perform operations that include performing a static analysis of a computer program and generating the static analysis results in response to the performing the static analysis of the computer program. ... International Business Machines Corporation

12/28/17 / #20170371648

Monitoring rules declaration and automatic configuration of the monitoring rules

During development of an application storing monitoring tools within the source code of the application. During deployment, extracting all monitoring rules from the source code of the application; obtaining information to complete the monitoring rules and customize the monitoring rules to the application which is to be monitored; discarding duplicate monitoring rules; and sending the monitoring rules to a target monitoring tool for configuration of monitoring rules within the application.. ... International Business Machines Corporation

12/28/17 / #20170371646

Customizing a software application based on a user's familiarity with the software program

A software program is executed, the software program requiring one or more physical interactions with a user through an input/output (i/o) device, wherein each of the one or more physical interactions includes respective predefined dimensions indicating a proficiency in performing one of the one or more physical interactions. The one or more physical interactions are tracked. ... International Business Machines Corporation

12/28/17 / #20170371644

Collaborative maintenance of software programs

Maintaining a plurality of software instances of a software program in a computing environment. An updating request is received for an updating process of the software instances from an old level to a new level. ... International Business Machines Corporation

12/28/17 / #20170371643

Collaborative maintenance of software programs

Maintaining a plurality of software instances of a software program in a computing environment. An updating request is received for an updating process of the software instances from an old level to a new level. ... International Business Machines Corporation

12/28/17 / #20170371638

Redundant software stack

The method includes identifying, by one or more computer processors, a first container with first software stack and a valid multipath configuration, wherein the first software stack is a first path of the valid multipath configuration. The method further includes creating, by one or more computer processors, a second container, wherein the second container has the same rules as the first container. ... International Business Machines Corporation

12/28/17 / #20170371632

Managing reuse of assets in a workflow management system

A category is determined of a task being planned at a given time. A collection of assets is identified, the collection having been used in a similar task at a past time. ... International Business Machines Corporation

12/28/17 / #20170371631

Globalization template manager for automated globalization enablement on development operations

Techniques are disclosed for automatically updating source code templates used to provide globalization enablement features to an application in a software development environment. A globalization template manager sends a request for updates to one or more source code templates to a template sources. ... International Business Machines Corporation

12/28/17 / #20170371630

Globalization template manager for automated globalization enablement on development operations

Techniques are disclosed for automatically updating source code templates used to provide globalization enablement features to an application in a software development environment. A globalization template manager sends a request for updates to one or more source code templates to a template sources. ... International Business Machines Corporation

12/28/17 / #20170371627

Object-oriented container class callbacks

A computer-implemented method includes associating callback code with an instance of a container class. The callback code includes a callback operation to be performed automatically responsive to a container action. ... International Business Machines Corporation

12/28/17 / #20170371626

Contextualized software component selection and repository generation

Contextualized selection of components in one aspect may include generating a developer profile associated with a team member, for example, for all team members designated to work on a computer-implemented development project, and generating a component profile associated with a software component, for example, for all software components identified based on received requirement specification associated with the project. Applicability of a software component to the team members may be computed based on developer profiles and a component profile associated with the software component. ... International Business Machines Corporation

12/28/17 / #20170371592

Data unit classification for selective data processing

Provided are a computer program product, system, and method for data unit classification in accordance with one embodiment of the present description, in which in response to a data processing command, a storage controller classifies data units of a storage unit as either allocated to a data set or as unallocated to any data set. If allocated to a data set, the storage controller can further classify data set-allocated data units as either containing client data or metadata or as empty. ... International Business Machines Corporation

12/28/17 / #20170371583

Relocating storage unit data in response to detecting hotspots in a dispersed storage network

A method for execution by a dispersed storage and task (dst) processing unit that includes a processor includes generating storage unit heat data based on a plurality of temperature readings received from each of a plurality of storage units, where the storage unit heat data indicates a first hot storage unit. A pair of storage units is selected from the plurality of storage units based on the storage unit heat data, where the pair of storage units includes the first hot storage unit and a second storage unit. ... International Business Machines Corporation

12/28/17 / #20170371581

Opportunistic handling of freed data in data de-duplication

A mechanism is provided for opportunistic handling of freed data in data de-duplication. Responsive to receiving a request to store a file in a storage device, the file is mapped to a set of virtual blocks. ... International Business Machines Corporation

12/28/17 / #20170371579

Partial volume reorganization to increase data availability

A method for partially reorganizing a volume is disclosed. In one embodiment, such a method includes logically dividing a volume into multiple regions. ... International Business Machines Corporation

12/28/17 / #20170371569

Dynamically changing copy policy

An approach for dynamically changing a copy policy associated with a cluster grid for tape storage virtualization which involves monitoring one or more statuses of a plurality of clusters associated with the cluster grid, wherein the one or more of the plurality of clusters are assigned one of a plurality of copy modes, detecting that at least one of the plurality of clusters, having a highest priority copy mode associated with the cluster grid, is unavailable, selecting an available second cluster of the plurality of clusters and changing the copy policy wherein the available second cluster is assigned the highest priority copy mode.. . ... International Business Machines Corporation

12/28/17 / #20170371566

Dynamic granularity for storage optimization

A computer-implemented method, computer program product and system for dynamic granularity of a data storage by identifying tiers of data including units of data with a unit heat index, corresponding to an activity level metric and identifying a tier heat index for each of the tiers of data corresponding to an average of the unit heat index for the units of data within the tiers of data. Furthermore determining a granularity index based on a size of the units of data; calculating a pairing index by comparing the unit heat indexes from the corresponding tiers of data and calculating an efficiency index by comparing the unit heat indexes indicating a percentage of the of units of data within a first tier of data with a higher unit heat index than all of the units of data within a another tier of data with a lower tier heat index.. ... International Business Machines Corporation

12/28/17 / #20170371563

Method for retrieving data from a tape drive

An input to read two or more data records stored to a tape medium on a tape drive is received. A starting point is determined. ... International Business Machines Corporation

12/28/17 / #20170371562

Updating storage migration rates

A computer-implemented method includes identifying a storage migration. The storage migration is associated with a storage area network. ... International Business Machines Corporation

12/28/17 / #20170371552

Scenario based logging

This disclosure provides a computer implemented method comprising: determining whether an input to a program matches a predetermined scenario; and recording, at least partially in response to the determination that the input matches the predetermined scenario, execution information of execution of at least part of the program, the execution of the at least part of the program being in response to the input.. . ... International Business Machines Corporation

12/28/17 / #20170371550

Frame choosing during storage constraint condition

A method for frame choosing in a computing system during a storage constraint condition is provided. The method includes calculating, with a processor, a use-grouped-threshold, comparing a number of available grouped frames to the calculated use-grouped-threshold, returning a decision to use a grouped frame in an event that the number of the available grouped frames exceeds the calculated use-grouped-threshold and returning a decision to use an above-the-bar frame in an event that the number of the available grouped frames is less than or equal to the calculated use-grouped-threshold.. ... International Business Machines Corporation

12/28/17 / #20170371549

Servicing multiple counters based on a single access check

A system and method for implementing a servicing instruction for a plurality of counters that includes determining a counter set based on the servicing instruction, whether access is authorized to the counter set, and a block of storage in a memory based on the service instruction. In response to the determining that the access is authorized, the system and method extracts the plurality of counters within the counter set in response to the determining that the access is authorized and storing the plurality of counters in the block of storage.. ... International Business Machines Corporation

12/28/17 / #20170371547

File level access to block level incremental backups of a virtual disk

For accessing files from block-level backups of a virtual disk, an apparatus is disclosed. The apparatus includes a changed block module that obtains a list of changed blocks between a previous and a current backup of a virtual disk. ... International Business Machines Corporation

12/28/17 / #20170371542

Method and system for reducing memory device input/output operations

A storage unit having interface, memory, in-memory table, and processing module, receives a first encoded data slice (eds) having the first slice name and stores the first eds in a first location in the memory and also receives a second eds having the first slice name and stores the second eds in a second location in the memory. The storage unit then updates the in-memory table to include a first pointer that specifies the first location in the memory and updates the in-memory table to include a second pointer that specifies the second location in the memory. ... International Business Machines Corporation

12/28/17 / #20170371541

Method and system for achieving consensus using alternate voting strategies (avs) with incomplete information

A computing device having interface, memory, and processing module, transmits write requests for a set of encoded data slices to storage units (sus) of a dispersed storage network (dsn) based on a write request process and to receive proposal records for a subset of the set of encoded data slices from at least some of the sus. The computing device interprets the proposal records to determine whether it or any another computing device has a threshold number of its respective write requests in a first priority position in the ordered list of pending write requests. ... International Business Machines Corporation

12/28/17 / #20170371540

Fileset-based data locality enablement in distributed file systems

An approach, for fileset based data locality management in distributed file systems. A data locality manager receives fileset identifiers and associated block allocation information, for storing in data block locality tables. ... International Business Machines Corporation

12/28/17 / #20170371502

Gaze detection to prevent inadvertent key grabbing

A first input of a user is received in a first window. The first window is active. ... International Business Machines Corporation

12/28/17 / #20170371498

Displaying ui components

An apparatus includes: a component controller displaying a balloon component in a display area, the balloon component corresponding to a window component displayed in the display area, the balloon component and the window component being to be selected by a user; and a dynamic controller changing a behavior of the balloon component on the basis of an environmental attribute. A corresponding computer-implemented method and computer program product are also disclosed.. ... International Business Machines Corporation

12/28/17 / #20170371497

Method to facilitate investigation of chemical constituents in chemical analysis data

A method includes generating a graphical display based on chemical analysis data. The method also includes receiving input selecting a graphical component of the graphical display. ... International Business Machines Corporation

12/28/17 / #20170371459

Desktop icon management and grouping using desktop containers

A set of desktop icons on a graphical user interface (gui) desktop can be selected, which marks the icons as being associated with a desktop container. In the gui, a visual depiction that the selected desktop icons are associated with the desktop container can occur. ... International Business Machines Corporation

12/28/17 / #20170371427

Device selection in three-dimensional environments

A computer-implemented method includes comprises identifying a pointer device associated with a pointer position identifier and a pointer direction identifier. The computer-implemented method further includes identifying a target device associated with a target position indicator and determining whether, within a tolerance margin, the pointer devices points at the target device. ... International Business Machines Corporation

12/28/17 / #20170371413

System, method, and recording medium for detecting and leveraging brain waves present in a user's state of flow to control digital and physical notifications

A notification control method, system, and non-transitory computer readable medium, include a state of flow detecting circuit configured to detect a state of flow of brain waves of a user from user data, a notification priority setting circuit configured to set a notification priority setting by ranking a type of a notification to be delivered to a user device according to an importance of a message associated with the notification, and a notification control circuit configured to control the notification to be output on the user device at an allowable time based on a rank of the notification priority setting being higher than a rank of the state of flow of the user.. . ... International Business Machines Corporation

12/28/17 / #20170371410

Dynamic virtual object interactions by variable strength ties

Embodiments of the present invention provide a method, computer program product, and a computer system for utilizing variable strength ties to dynamically interact with objects in an environment. According to one embodiment, in an environment containing one or more controllable objects and a wearable device with at least one sensor and a variable strength tie projector, a first predetermined gesture is received from a user. ... International Business Machines Corporation

12/28/17 / #20170371365

Voltage regulator

A voltage regulator comprising an error amplifier, a pass transistor and a buffer circuit arranged between the error amplifier and the pass transistor. The buffer circuit comprises a load detector configured to detect a load current of the regulator by monitoring an output signal of the error amplifier. ... International Business Machines Corporation

12/28/17 / #20170371308

Real-time forecasting of electricity demand in a streams-based architecture with applications

A streams platform is used. Multiple streams of electricity usage data are received, each from an electrical meter providing periodic updates to electrical usage for devices connected to the electrical meter. ... International Business Machines Corporation

12/28/17 / #20170370990

Customer-transparent logic redundancy for improved yield

Systems and methods are provided for implementing customer-transparent logic redundancy in scan chains for improved yield of integrated circuits. More specifically, an integrated circuit structure is provided for that includes a plurality of combined latch structures. ... International Business Machines Corporation

12/28/17 / #20170370989

Using direct sums and invariance groups to test partially symmetric quantum-logic circuits

A method and associated systems for using direct sums and invariance groups to optimize the testing of partially symmetric quantum-logic circuits is disclosed. A test system receives information that describes the architecture of a quantum-logic circuit to be tested. ... International Business Machines Corporation

12/28/17 / #20170370988

Burn-in testing of individually personalized semiconductor device configuration

Examples of techniques for burn-in testing of an individually personalized device configuration are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: retrieving the individually personalized device configuration; enabling a device to receive the individually personalized device configuration, wherein the device is one of a plurality of devices; and loading the individually personalized device configuration to the device that is enabled, wherein other devices of the plurality of devices are disabled from receiving the individually personalized device configuration.. ... International Business Machines Corporation

12/28/17 / #20170370986

Diagnostics in tmr sensors

A computer-implemented method includes, by one or more processors in electronic communication with a tunneling magnetoresistive sensor, wherein the tunneling magnetoresistive sensor is a component of a magnetic storage drive configured to read magnetic data from a magnetic storage medium, detecting a short across the tunneling magnetoresistive sensor, measuring a change in resistance of the tunneling magnetoresistive sensor, measuring a change in voltage amplitude for the tunneling magnetoresistive sensor, and dividing said change in voltage amplitude by said change in resistance to yield a ratio. The computer-implemented method further includes, responsive to the ratio being greater than a predetermined ratio threshold, determining that the short is caused by a magnetic shunt. ... International Business Machines Corporation

12/28/17 / #20170370984

Diagnostics in tmr sensors

A computer-implemented method includes, by one or more processors in electronic communication with a tunneling magnetoresistive sensor, wherein the tunneling magnetoresistive sensor is a component of a magnetic storage drive configured to read magnetic data from a magnetic storage medium, detecting a short across the tunneling magnetoresistive sensor, measuring a change in resistance of the tunneling magnetoresistive sensor, measuring a change in voltage amplitude for the tunneling magnetoresistive sensor, and dividing said change in voltage amplitude by said change in resistance to yield a ratio. The computer-implemented method further includes, responsive to the ratio being greater than a predetermined ratio threshold, determining that the short is caused by a magnetic shunt. ... International Business Machines Corporation

12/28/17 / #20170370978

On-demand detection of electromagnetic disturbances using mobile devices

A subset of mobile devices is selected from a set of mobile devices located in a local area. From a mobile device in the subset, a magnetic measurement value obtained by performing a magnetic measurement is received. ... International Business Machines Corporation

12/28/17 / #20170370879

Dissolved-oxygen sensor utilizing ionic oxygen motion

An apparatus includes an oxide layer having ion transport channels that facilitate the migration of oxygen ions from a first side to a second side of the layer. Specifically, molecular oxygen is decomposed into oxygen ions at the first side, and oxygen ions recombine into molecular oxygen at the second side. ... International Business Machines Corporation

12/28/17 / #20170370876

Techniques for fabricating horizontally aligned nanochannels for microfluidics and biosensors

Techniques for fabricating horizontally aligned nanochannels are provided. In one aspect, a method of forming a device having nanochannels is provided. ... International Business Machines Corporation

12/28/17 / #20170370739

Profile based navigation

A computer generates a navigation profile corresponding to a user by identifying one or more user preferences within an associated social media network. The computer receives a user input identifying a starting location and a destination, from which the computer identifies one or more potential routes between the starting location and destination. ... International Business Machines Corporation

12/28/17 / #20170370733

Technology for giving users cognitive mapping capability

A method of geospatial guidance for sight impaired users includes receiving, by a computer system, a user selection of a geospatial area. The computer system further receives a user selection of a point of interest criteria. ... International Business Machines Corporation

12/28/17 / #20170370732

Personalized travel routes to reduce stress

One or more processors identify an occupant of a passenger vehicle, and then receive biometric sensor readings from a biometric sensor that is monitoring the occupant in real time, where the biometric sensor readings indicate a real-time emotional state of the occupant. The processor(s) generate a personal profile for the occupant of the passenger vehicle based on the biometric sensor readings. ... International Business Machines Corporation

12/28/17 / #20170370604

Dynamic climate control adjustment system

A device detects that a first wearable device has connected to a network. The device receives user preferences from the first wearable device. ... International Business Machines Corporation

12/28/17 / #20170370602

Dynamic climate control adjustment system

A device detects that a first wearable device has connected to a network. The device receives user preferences from the first wearable device. ... International Business Machines Corporation

12/28/17 / #20170370142

Smart opening system and a method of operating a smart opening system

A smart opening system is provided. The smart opening system includes a vehicle defining an aperture, a door coupled to the vehicle to assume a first position at which the aperture is closed and multiple second positions at which the aperture is open and to move between the first and second positions, a sensor disposed to sense obstructions surrounding the vehicle and a processing element coupled to the sensor and configured to determine whether any of the obstructions are within a range of motion of the door.. ... International Business Machines Corporation

12/28/17 / #20170369225

Package insert for cushioning an object during transport and a method for using the package insert

A package insert for cushioning an object during transport includes a plurality of support pins disposed in parallel with respect to each other, and a perforated sheet having a plurality of perforation holes disposed therein. Each of the plurality of supporting pins is disposed within a corresponding perforation hole of the plurality of perforation holes. ... International Business Machines Corporation

12/28/17 / #20170369168

Unmanned aerial vehicle for scent analysis and distribution

An unmanned aerial vehicle for scent analysis. The unmanned aerial vehicle includes a sensor array to sample ambient air in a location to detect an odor, a pattern recognition unit coupled to a database to identify the odor, wherein the odor is compared to identification information stored in the database, and a mapping unit to estimate an assessment value associated with the odor and to generate an instruction to one or more components of the unmanned aerial vehicle to perform a function when the assessment value exceeds a predetermined threshold value, wherein the function includes activating one or more feedback outputs on the unmanned aerial vehicle.. ... International Business Machines Corporation

12/28/17 / #20170368992

Smartwatch blackbox

Techniques are provided for alerting drivers of hazardous driving conditions using the sensing capabilities of wearable mobile technology. In one aspect, a method for alerting drivers of hazardous driving conditions includes the steps of: collecting real-time data from a driver of a vehicle, wherein the data is collected via a mobile device worn by the driver; determining whether the real-time data indicates that a hazardous driving condition exists; providing feedback to the driver if the real-time data indicates that a hazardous driving condition exists, and continuing to collect data from the driver in real-time if the real-time data indicates that a hazardous driving condition does not exist. ... International Business Machines Corporation

12/28/17 / #20170368991

Smartwatch blackbox

Techniques are provided for alerting drivers of hazardous driving conditions using the sensing capabilities of wearable mobile technology. In one aspect, a method for alerting drivers of hazardous driving conditions includes the steps of: collecting real-time data from a driver of a vehicle, wherein the data is collected via a mobile device worn by the driver; determining whether the real-time data indicates that a hazardous driving condition exists; providing feedback to the driver if the real-time data indicates that a hazardous driving condition exists, and continuing to collect data from the driver in real-time if the real-time data indicates that a hazardous driving condition does not exist. ... International Business Machines Corporation

12/28/17 / #20170368937

Avoiding vehicle collision using signals from mobile devices

A broadcast of a signal is received at a first system from a second system at a first time. From the signal, a location of a target associated with the second system and a velocity of the target are determined relative to a location of the first system and a velocity of the first system. ... International Business Machines Corporation

12/21/17 / #20170367209

Top-down/bottom-up enclosure cabling

Mechanisms are provided for cabling a set of enclosures. Using a set of cables that comprises eight physical layers (phys), the set of enclosures are coupled together such that: for a first enclosure and each intermediate enclosure in the set of enclosures, at least four phys of the eight phys terminate within a serial attached small computer system interface (scsi) (sas) expander of the first enclosure and a sas expander of each intermediate enclosure white passing through a remaining four phys of the eight phys without connecting to the respective sas expander; and, for a last enclosure in the set of enclosures, all of the eight phys terminate in the sas expander of the last enclosure.. ... International Business Machines Corporation

12/21/17 / #20170367176

Vertically embedded discrete component

Embodiments are directed to a method of embedding a discrete component in a substrate. The method includes forming a cavity in the substrate. ... International Business Machines Corporation

12/21/17 / #20170367086

System, method and apparatus for ad-hoc utilization of available resources across mobile devices

A method of collaboratively executing a task using first to n-th mobile devices in an ad-hoc network includes determining collaborative mobile devices out of the second to n-th mobile devices, receiving information corresponding to the collaborative mobile devices, dividing the task into first to m-th sub tasks, assigning each of the first to m-th sub tasks to at least one of the collaborative mobile devices, requesting executions of the first to m-th sub tasks to the collaborative mobile devices, and receiving execution results of the first to m-th sub tasks from the collaborative mobile devices. M and n are integers greater than one.. ... International Business Machines Corporation

12/21/17 / #20170367042

Context-based coordinated data retrieval for mobile devices

Context-based coordinated data retrieval for mobile devices is provided. An interface between application code of a mobile device and an operating system of the mobile device receives a declarative language based data-retrieval request made by the application code for data from an i/o device of the mobile device. ... International Business Machines Corporation

12/21/17 / #20170367013

Controlling a delivery of voice communications over a cellular data network or a wireless network based on user's profile

A method, system and computer program product for controlling the delivery of voice communications. A profile is created for the user of a mobile device that specifies the thresholds for switching between a cellular network and a wireless network to conduct voice communications as well as stores a list of contacts and associated security levels. ... International Business Machines Corporation

12/21/17 / #20170366946

Vehicle occupant position determination

A method and system for determining a driver is provided. The method includes receiving and analyzing gps data identifying locations of gps enabled devices of a plurality of users. ... International Business Machines Corporation

12/21/17 / #20170366942

Automatically navigating a mobile device to a particular electronic page based on a user's location within a venue

A location of a user within a venue can be determined by determining a location of a mobile device of the user within the venue. A user interaction with the mobile device while the user is located within the venue can be detected. ... International Business Machines Corporation

12/21/17 / #20170366934

System and method for defining zones for location-based services

Embodiments of the present invention provide a system and method for defining zones used in location-based services. A mobile device with administrative privileges is moved in a path within a venue. ... International Business Machines Corporation

12/21/17 / #20170366872

Consumer-configurable alternative advertising reception with incentives

An original advertisement is transformed at a first content viewing device into a transferrable incentivized deferred advertisement that itself includes as added encoded data elements a configured incentive, a configured incentive time period within which to obtain the configured incentive, and a reporting instruction that causes an alternative content viewing device to report advertisement viewing back to the first content viewing device. The transferrable incentivized deferred advertisement, that includes the added encoded data elements, is transferred to the alternative content viewing device.. ... International Business Machines Corporation

12/21/17 / #20170366853

Providing interactive multimedia services

A method for presenting interactive multimedia programs includes selecting a multimedia program having a plurality of segments, classifying the multimedia program and the plurality of segments according to content, and generating a plurality of additional content items based on the classification, each of which being associated with at least one of the plurality of segments. The method further includes generating a plurality of pre-defined queries for each of the plurality of segments based on a content of the segment and at least one speech recognition grammar based on the plurality of pre-defined queries. ... International Business Machines Corporation

12/21/17 / #20170366835

Streaming video queue management system

Methods, systems and computer program products for managing a video streaming queue during a planned trip are provided. Aspects include receiving a list of content items from a user for viewing during the planned trip and receiving information regarding the planned trip. ... International Business Machines Corporation

12/21/17 / #20170366784

Displaying concurrently presented versions in web conferences

A method of providing a number of versions of a presentation in a web conference may comprise streaming at least two different versions of a presentation associated with a web conference over a network to at least one client device, and providing an option to the client device to view an alternative one of the versions. An associated computing system and computer program product are also described. ... International Business Machines Corporation

12/21/17 / #20170366665

Scheduling telephone calls

A computer-implemented method includes identifying a mobile phone. The method includes identifying one or more input devices. ... International Business Machines Corporation

12/21/17 / #20170366637

Multi-tier dynamic data caching

A dynamic cache engine designed to perform advanced, dynamic, application-specific data caching, based on multiple application and user parameters included in client requests that are sent to a server.. . ... International Business Machines Corporation

12/21/17 / #20170366632

Apparatus and method for processing information and program for the same

In a first aspect of the present invention, provided are an information processing apparatus including a behavior-history acquisition unit configured to acquire behavior histories of first users identified by first-user identification information, a transmission-history acquisition unit configured to acquire information transmission histories of second users identified by second-user identification information, and a determination unit configured to determine identity between the first users and the second users on the basis of behavior details included in the behavior histories and transmission details included in the transmission histories; a method for processing information with the information processing apparatus; and a program using the information processing apparatus.. . ... International Business Machines Corporation

12/21/17 / #20170366631

Apparatus and method for processing information and program for the same

In a first aspect of the present invention, provided are an information processing apparatus including a behavior-history acquisition unit configured to acquire behavior histories of first users identified by first-user identification information, a transmission-history acquisition unit configured to acquire information transmission histories of second users identified by second-user identification information, and a determination unit configured to determine identity between the first users and the second users on the basis of behavior details included in the behavior histories and transmission details included in the transmission histories; a method for processing information with the information processing apparatus; and a program using the information processing apparatus.. . ... International Business Machines Corporation

12/21/17 / #20170366627

System for executing action feedback and an action feedback method

A system for executing action feedback is provided. The system includes a wearable device that includes a sensor for monitoring a user and generation of user data based on the monitoring, a first networked device coupled to a network and controllable by the user for taking an action and a second networked device coupled to the network. ... International Business Machines Corporation

12/21/17 / #20170366613

Storing data in a dispersed storage network

A computing device includes a processing module operable to generate a set of write requests regarding a set of encoded data slices. The processing module is further operable to send the set of write requests to a set of storage units, where each of at least some of the storage units of the set of storage units generates a write response. ... International Business Machines Corporation

12/21/17 / #20170366595

Software defined content delivery network for flexible, real-time management of large-scale data transfers

A method and an associated sdcdn device for delivering data content in a communication network. A software defined content delivery network (sdcdn) monitors one or more performance indicators regarding an exchange of the data content between a first content delivery network (cdn) and at least one client device using a communication channel. ... International Business Machines Corporation

12/21/17 / #20170366582

Incident response plan based on indicators of compromise

A system and method for responding to incidents in an enterprise network is disclosed. The system tracks incidents by creating, in an incident manager, incident objects for each incident. ... International Business Machines Corporation

12/21/17 / #20170366574

Service level agreement risk analysis with exogenous architecture

A set of internal information technology (it) architecture is received and the internal it architecture is controlled by a service provider. A set of exogenous it architecture is received and the exogenous it architecture is not controlled by the service provider. ... International Business Machines Corporation

12/21/17 / #20170366554

Peer-to-peer augmented reality handlers

A method and system are provided for generating peer-to-peer augmented reality handlers. The method includes receiving, from a user wearing a pair of augmented reality glasses, an indication that the user intends to place an augmented reality handler at a location where the user is currently looking. ... International Business Machines Corporation

12/21/17 / #20170366549

Threat-aware provisioning and governance

A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing system. The management component utilizes device compliance attributes to form a device risk vector associated with an end-user device. ... International Business Machines Corporation

12/21/17 / #20170366548

Threat-aware provisioning and governance

A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing system. The management component utilizes device compliance attributes to form a device risk vector associated with an end-user device. ... International Business Machines Corporation

12/21/17 / #20170366524

Synchronizing secure session keys

A first client encryption initiation is intercepted from a client. The first client encryption initiation is intended for a server. ... International Business Machines Corporation

12/21/17 / #20170366523

Management of encryption within processing elements

A streaming environment includes at least a first processing element of a first compute node and a second processing element of a second compute node. A tuple encryption operation is determined of the first processing element and the second processing element. ... International Business Machines Corporation

12/21/17 / #20170366522

Management of encryption within processing elements

A streaming environment includes at least a first processing element of a first compute node and a second processing element of a second compute node. A tuple encryption operation is determined of the first processing element and the second processing element. ... International Business Machines Corporation

12/21/17 / #20170366511

Method and system for the supply of data, transactions and electronic voting

A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. ... International Business Machines Corporation

12/21/17 / #20170366510

Cognitive confidentiality guardian

Protecting secure information in computer communications may include detecting by a computer process running on a server an initiation of an action if executed transmits data to a destination domain. Whether the destination domain is a permissible destination for sending the secure information may be determined. ... International Business Machines Corporation

12/21/17 / #20170366491

Similar content alert

Receiving, by a computer, a message from a sender to transmit to one or more recipients, comparing, by a computer, the message to a previous message transmitted to the one or more recipients, wherein the previous message is stored in a memory, determining, by the computer, that the message has a content similarity above a predetermined threshold to the previous message transmitted to one of the one or more recipients, providing, by the computer, the sender an option to prevent the message from being transmitted to one of the one or more recipients, and cancelling, by the computer, the message transmission, as a result of both the determination that the message has content similarity above the predetermined threshold, and as a result of the sender providing confirmation to prevent the message from being transmitted, and notifying, by the computer, the sender that the message transmission has been cancelled.. . ... International Business Machines Corporation

12/21/17 / #20170366417

Cloud network assessment based on scoring virtual network performance relative to underlying network performance

One aspect includes a method to assess virtual network performance, comprising: selecting at least a given pair of endpoints; determining at least one virtual path between the given pair of endpoints; determining at least one underlying network path between the given pair of endpoints; generating one or more flows between the given pair of endpoints over both the virtual path and the underlying network path; collecting one or more measurements for the virtual path and for the underlying network path; and determining at least one score for the given pair of endpoints at least in part by computing at least one ratio between at least one of the one or measurements for the virtual path and at least one of the one or more measurements for the underlying network path.. . ... International Business Machines Corporation

12/21/17 / #20170366392

Selective service redirecton for telecom service migration

A method, system, and/or computer program product improves an operation of an enterprise network. One or more processors receive an electronic request for delivery of a legacy component to an enterprise network of an enterprise. ... International Business Machines Corporation

12/21/17 / #20170366358

Authentication via group signatures

Methods and systems are provided for authenticating a message μ, at a user computer of a group signature scheme, to a verifier computer. The method includes, at the user computer, storing a user id m for the user computer and a user signing key which comprises a signature on the user id m under a secret key of a selectively-secure signature scheme. ... International Business Machines Corporation

12/21/17 / #20170366349

Proofs of plaintext knowledge and group signatures incorporating same

Systems and methods are provided for proving plaintext knowledge of a message m, encrypted in a ciphertext, to a verifier computer. The method includes, at a user computer, encrypting the message m via a predetermined encryption scheme to produce a ciphertext u, and generating a plurality l of challenges ci, i=1 to l, dependent on the ciphertext u. ... International Business Machines Corporation

12/21/17 / #20170366341

Method for efficient and practical key distribution in network coding systems

An encoder including a computer readable storage medium storing program instructions, and a processor executing the program instructions, the processor configured to generate a k-bit key, where k is a positive integer, estimate an upper bound of a number of eavesdropped links, encode each bit of the k-bit key using a random matrix of a selected rank, and transmit the encoded k-bit key through a network that performs linear operations on packets.. . ... International Business Machines Corporation

12/21/17 / #20170366335

Codeword synchronization for fiber channel protocol

Efficient codeword synchronization methods and systems for fiber channel protocol are disclosed. The method includes identifying a codeword boundary by detecting 100-bit known patterns in a bit codeword in a transmission.. ... International Business Machines Corporation

12/21/17 / #20170366202

Using storlet in erasure code object storage architecture for image processing

Embodiments of the present invention provide methods, systems, and computer program products for using a storlet erasure code object storage architecture for image processing. In one embodiment, an object is received, the object being represented as erasure coded bits. ... International Business Machines Corporation

12/21/17 / #20170366172

Contactless readable programmable transponder to monitor chip join

A contactless readable programmable transponder to monitor chip join and method of use are disclosed. The method includes reading a frequency of an oscillator associated with a chip module. ... International Business Machines Corporation

12/21/17 / #20170366154

Switchable filters and design structures

Switchable and/or tunable filters, methods of manufacture and design structures are disclosed herein. The method of forming the filters includes forming at least one piezoelectric filter structure comprising a plurality of electrodes formed to be in contact with at least one piezoelectric substrate. ... International Business Machines Corporation

12/21/17 / #20170366153

Switchable filters and design structures

Switchable and/or tunable filters, methods of manufacture and design structures are disclosed herein. The method of forming the filters includes forming at least one piezoelectric filter structure comprising a plurality of electrodes formed to be in contact with at least one piezoelectric substrate. ... International Business Machines Corporation

12/21/17 / #20170366010

Monitoring and evaluating performance and aging of solar photovoltaic generation systems and power inverters

Techniques for detailed monitoring and evaluation of individual subsystems within solar photovoltaic power generation systems are provided. In one aspect, a method for monitoring a photovoltaic system having at least one array of photovoltaic panels and at least one inverter system configured to convert output from the panels from dc to ac includes the steps of: obtaining sensor data from the photovoltaic system; computing an efficiency of the panels and an efficiency of the inverter system using the sensor data; computing an aging parameter for the panels using the efficiency of the panels; computing an aging parameter for the inverter system using the efficiency of the inverter system; determining whether the aging parameter for the panels or for the inverter system exceeds a predetermined threshold level; and taking action if either the aging parameter for the array or for the inverter system exceeds the predetermined threshold level.. ... International Business Machines Corporation

12/21/17 / #20170365735

Reducing dark current in germanium photodiodes by electrical over-stress

Methods and systems for reducing dark current in a photodiode include heating a photodiode above room temperature. A reverse bias voltage is applied to the heated photodiode to reduce a dark current generated by the photodiode.. ... International Business Machines Corporation

12/21/17 / #20170365717

Silicon-containing, tunneling field-effect transistor including iii-n source

Tunneling field-effect transistors including silicon, germanium or silicon germanium channels and iii-n source regions are provided for low power operations. A broken-band heterojunction is formed by the source and channel regions of the transistors. ... International Business Machines Corporation

12/21/17 / #20170365714

Precise junction placement in vertical semiconductor devices using etch stop layers

A semiconductor device is provided that includes a first of a source region and a drain region comprised of a first semiconductor material, wherein an etch stop layer of a second semiconductor material present within the first of the source region and the drain region. A channel semiconductor material is present atop the first of the source region and the drain region. ... International Business Machines Corporation

12/21/17 / #20170365713

Vertical transistor having uniform bottom spacers

A method of forming a spacer for a vertical transistor is provided. The method includes forming a fin structure that includes a fin on a semiconductor substrate, forming a source junction or a drain junction at an upper surface of the semiconductor substrate and at a base of the fin and epitaxially growing a rare earth oxide (reo) spacer to have a substantially uniform thickness along respective upper surfaces of the source or drain junction and on opposite sides of the fin structure.. ... International Business Machines Corporation

12/21/17 / #20170365712

Precise junction placement in vertical semiconductor devices using etch stop layers

A semiconductor device is provided that includes a first of a source region and a drain region comprised of a first semiconductor material, wherein an etch stop layer of a second semiconductor material present within the first of the source region and the drain region. A channel semiconductor material is present atop the first of the source region and the drain region. ... International Business Machines Corporation

12/21/17 / #20170365706

Field effect transistors with self-aligned extension portions of epitaxial active regions

A gate structure is formed across a single crystalline semiconductor fin. An amorphizing ion implantation is performed employing the gate structure as an implantation mask to amorphize surface portions of the semiconductor fin into inverted u-shaped amorphous semiconductor portions. ... International Business Machines Corporation

12/21/17 / #20170365692

Aspect ratio trapping in channel last process

A method of forming the fin structure that includes forming a replacement gate structure on a channel region of the at least one replacement fin structure; and forming an encapsulating dielectric encapsulating the replacement fin structure leaving a portion of the replacement gate structure exposed. The exposed portion of the replacement gate structure is etched to provide an opening through the encapsulating dielectric to the replacement fin structure. ... International Business Machines Corporation

12/21/17 / #20170365673

Uniform vertical field effect transistor spacers

Aspects of the disclosure include a semiconductor structure that includes a vertical fin structure having a top portion, a bottom portion, vertical side walls, a source area in contact with the vertical fin structure, a drain area in contact with the vertical fin structure, a plurality of spacers comprising a first oxide layer in contact with the source area, and a second oxide layer in contact with the drain area. The first oxide layer can have a thickness that is equal to a thickness of the second oxide layer.. ... International Business Machines Corporation

12/21/17 / #20170365662

Vertical single electron transistor formed by condensation

A method for forming a vertical single electron transistor includes forming a heterostructured nanowire having a sige region centrally disposed between an upper portion and a lower portion in the nanowire. An oxide is deposited to cover the sige region, and a condensation process is performed to convert the sige to oxide and condense ge to form an island between the upper portion and the lower portion of the nanowire. ... International Business Machines Corporation

12/21/17 / #20170365661

Structures and methods for long-channel devices in nanosheet technology

Techniques for providing supporting structures for suspended nanosheets/wires in long-channel devices are provided. In one aspect, a method of forming a device structure includes: forming a series of alternating active and sacrificial layers as a stack on a substrate; patterning at least one feature through each of the active and sacrificial layers in the stack; filling the feature with a fill material that is resistant to etching performed on the sacrificial layers; and etching the sacrificial layers to selectively remove at least a portion of each of the sacrificial layers from the stack thereby suspending the active layers, wherein following the etching the fill material remains as a structure supporting the suspended active layers. ... International Business Machines Corporation

12/21/17 / #20170365660

Method for manufacturing a semiconductor structure, semiconductor structure, and electronic device

A method for manufacturing a semiconductor structure comprises the steps of: providing a substrate including a first semiconductor material; forming a dielectric layer on a surface of the substrate; forming an opening in the dielectric layer having a bottom reaching the substrate; providing a second semiconductor material in the opening and on the substrate, the second semiconductor material being en-capsulated by a further dielectric material thereby forming a filled cavity; melting the second semiconductor material in the cavity; recrystallizing the second semi-conductor material in the cavity; laterally removing the second semiconductor material at least partially for forming a lateral surface at the second semiconductor material; and forming a third semiconductor material on the lateral surface of the second semiconductor material, wherein the third semiconductor material is different from the second semiconductor material.. . ... International Business Machines Corporation

12/21/17 / #20170365659

Finfet with reduced parasitic capacitance

A semiconductor device including at least one fin extending upward from a substrate and a gate on the substrate, wherein the gate includes outer sidewalls, wherein the fin extend through a width of the gate. A spacer material can be adjacent to the outer sidewalls of the gate, wherein a top surface of the spacer material is below the top surface of the gate and above the top surface of the fin. ... International Business Machines Corporation

12/21/17 / #20170365658

Finfet with reduced parasitic capacitance

A semiconductor device including at least one fin extending upward from a substrate and a gate on the substrate, wherein the gate includes outer sidewalls, wherein the fin extend through a width of the gate. A spacer material can be adjacent to the outer sidewalls of the gate, wherein a top surface of the spacer material is below the top surface of the gate and above the top surface of the fin. ... International Business Machines Corporation

12/21/17 / #20170365606

Structure and method to prevent epi short between trenches in finfet edram

After forming a laterally contacting pair of a semiconductor fin and a conductive strap structure having a base portion vertically contacting a deep trench capacitor embedded in a substrate and a fin portion laterally contacting the semiconductor fin, conducting spikes that are formed on the sidewalls of the deep trench are removed or pushed deeper into the deep trench. Subsequently, a dielectric cap that inhibits epitaxial growth of a semiconductor material thereon is formed over at least a portion of the base portion of the conductive strap structure. ... International Business Machines Corporation

12/21/17 / #20170365601

Semiconductor device with different fin pitches

A method for forming a semiconductor device includes forming a first fin and a second fin on a substrate, the first fin arranged in parallel with the second fin, the first fin arranged a first distance from the second fin, the first fin and the second fin extending from a first source/drain region through a channel region and into a second source/drain region on the substrate. The method further includes forming a third fin on the substrate, the third fin arranged in parallel with the first fin and between the first fin and the second fin, the third fin arranged a second distance from the first fin, the second distance is less than the first distance, the third fin having two distal ends arranged in the first source/drain region. ... International Business Machines Corporation

12/21/17 / #20170365596

Method and structure for forming buried esd with finfets

A semiconductor structure is provided that includes an electrostatic discharge (esd) device integrated on the same semiconductor substrate as semiconductor fin field effect transistors (finfets). The esd device includes a three-dimension (3d) wrap-around pn diode connected to the semiconductor substrate. ... International Business Machines Corporation

12/21/17 / #20170365574

Microwave connectors for semiconductor wafers

Embodiments are directed to a coupler system including a semiconductor wafer, an interconnect layer formed over the semiconductor wafer and a connector that is physically secured and electronically coupled to the interconnect layer. In one or more embodiments, the connector is physically secured and electronically coupled to the interconnect layer by a structure comprising an bond layer and an electrically conductive layer. ... International Business Machines Corporation

12/21/17 / #20170365550

Copper interconnect structures

Semiconductor devices include a patterned dielectric layer overlaying a semiconductor substrate; a metal layer comprising copper disposed in the patterned dielectric layer; and a barrier layer formed at an interface between the dielectric layer and the metal layer, wherein the barrier layer is aloxny. The patterned dielectric may define a trench and via interconnect structure or first and second trenches for a capacitor structure. ... International Business Machines Corporation

12/21/17 / #20170365529

Laterally diffused metal oxide semiconductor device integrated with vertical field effect transistor

An electrical device that in some embodiments includes a substrate including a lateral device region and a vertical device region. A lateral diffusion metal oxide semiconductor (ldmos) device may be present in the lateral device region, wherein a drift region of the ldmos device has a length that is parallel to an upper surface of the substrate in which the ldmos device is formed. ... International Business Machines Corporation

12/21/17 / #20170365525

Method and structure to enable dual channel fin critical dimension control

A method for manufacturing a semiconductor device includes forming a first semiconductor layer on a substrate having a {100} crystallographic surface orientation, forming a second semiconductor layer on the substrate, patterning the first semiconductor layer and the second semiconductor layer into a first plurality of fins and a second plurality of fins, respectively, wherein the first and second plurality of fins extend vertically with respect to the substrate, covering the first plurality of fins and a portion of the substrate corresponding to the first plurality of fins, and epitaxially growing semiconductor layers on exposed portions of the second plurality of fins and on exposed portions of the substrate, wherein the epitaxially grown semiconductor layers on the exposed portions of the second plurality of fins increase a critical dimension of each of the second plurality of fins.. . ... International Business Machines Corporation

12/21/17 / #20170365511

Articles including ultra low dielectric layers

An article may include a structure including a patterned metal on a surface of a substrate, the patterned metal including metal features separated by gaps of an average dimension of less than about 1000 nm. A porous low dielectric constant material having a dielectric value of less than about 2.7 substantially occupies all gaps. ... International Business Machines Corporation

12/21/17 / #20170365441

Automatic alignment for high throughput electron channeling contrast imaging

An automatic method is provided to align a semiconductor crystalline substrate for electron channeling contrast imaging (ecci) in regions where an electron channeling pattern cannot be reliably obtained but crystalline defects need to be imaged. The automatic semiconductor crystalline substrate alignment method is more reproducible and faster than the current operator intensive process for ecci alignment routines. ... International Business Machines Corporation

12/21/17 / #20170365362

Delayed equivalence identification

A method includes configuring an integrated circuit comprising one or more registers to provide a free running clock in the integrated circuit, simulating n clock cycles in the circuit to provide performance results for one or more registers in the circuit, wherein n is a selected number of staging levels, selecting one of the one or more registers, comparing the performance results for the selected register to performance results for each of the remaining registers to provide one or more equivalent delay candidate registers, and verifying each of the one or more equivalent delay candidate registers to provide one or more confirmed equivalent delay registers. A corresponding computer program product and computer system are also disclosed.. ... International Business Machines Corporation

12/21/17 / #20170365291

Skiving block for mitigating protruding defects from magnetic tape recording media

An apparatus according to one embodiment includes a first block, a second block, and a drive mechanism configured to cause a magnetic recording tape to move over the blocks. Each of the blocks has a skiving edge along a tape bearing surface thereof. ... International Business Machines Corporation

12/21/17 / #20170365283

Magnetic read head having a cpp mr sensor electrically isolated from a top shield

An apparatus according to one embodiment includes an array of transducer structures arranged along a tape bearing surface of a common module. Each transducer structure includes a lower shield, an upper shield above the lower shield, a current-perpendicular-to-plane sensor between the upper and lower shields, at least one lead, and an insulating layer between the at least one lead and the shield closest thereto. ... International Business Machines Corporation

12/21/17 / #20170365108

On-road vehicle service handling method

A computerized, on-road, vehicle service handling system involves, a motor vehicle having therewithin a global positioning system (gps) navigation system, an on-board diagnostic (obd) system, a display within the vehicle, non-transitory storage having stored therein payment information, and at least one processor. While a user is driving a vehicle between first and second locations, upon receiving a fault condition signal from the obd system, the processor will; automatically identify, and transmit information, to multiple vehicle service locations within a limited distance radius of the path towards the second location, receive service responses, receive a selection by the user of at least two of the vehicle service locations and an order of preference thereof; send a service request with payment information to the first selected vehicle service location; and receive a communication from the first vehicle service location either accepting or rejecting the request.. ... International Business Machines Corporation

12/21/17 / #20170365048

Health monitoring

Technical solutions are described for monitoring health of a user by a healthcare system. An example computer-implemented method includes accessing a current image of the user. ... International Business Machines Corporation

12/21/17 / #20170365035

Accelerated frame rate advertising-prioritized video frame alignment

In response to detection of a selection of an accelerated frame rate during decoding of video content, encoded accelerated frame rate decoding priority data values assigned to individual prioritized video frames of the video content are identified. A prioritized video frame subset of the individual prioritized video frames of the video content to decode that yields a maximized cumulative set of the assigned encoded accelerated frame rate decoding priority data values is determined based upon differences among the assigned encoded accelerated frame rate decoding priority data values and the selected accelerated frame rate.. ... International Business Machines Corporation

12/21/17 / #20170365009

Application service aggregation and management

A method and system for aggregating services is provided. The method includes receiving and processing a service request. ... International Business Machines Corporation

12/21/17 / #20170364972

Renting a pipe to a storage system

A computing device that includes an interface, a memory, and a processing module receives a data access request from a requesting computing device and processes them to produce a set of distributed storage (ds) access requests. The computing device then transmits the set of ds access requests to a set of storage units (sus) via a dsn connection that is between the computing device and the set of sus and monitors the dsn connection to generate utilization information. ... International Business Machines Corporation

12/21/17 / #20170364959

Fashion display system, method, recording medium and display apparatus

A fashion display method, system, and non-transitory computer readable medium, include a customer identification circuit configured to identify a fashion style of a customer viewing a fashion display, a customer assessing circuit configured to determine an assessed trait of the customer by assessing the fashion style of the customer, and a display augmenting circuit configured to augment the fashion display to display a new fashion display customized to the customer based on the assessed trait.. . ... International Business Machines Corporation

12/21/17 / #20170364942

Discovering and interacting with proximate automobiles

As disclosed herein a computer-implemented method includes identifying, by a first automobile, a proximate automobile, and determining a trust score corresponding to the proximate automobile. The method further includes conducting an affinity group qualification process responsive to the trust score exceeding a selected threshold value, and inviting the proximate automobile into the affinity group responsive to the proximate automobile passing the affinity group qualification process. ... International Business Machines Corporation

12/21/17 / #20170364939

Technology for user engagement

A method for engaging a message recipient includes receiving, by a computer system for a recipient, a message having a collectible associated with at least one predetermined area of the message, wherein the at least one predetermined area has been selected by a sender. The method further includes detecting, by the computer system, that the recipient has viewed the at least one predetermined area of the message and awarding the collectible to the recipient by the computer system, so that the recipient can use the collectible in a transaction, wherein the awarding is responsive to the detecting of the viewing of the at least one predetermined area of the message.. ... International Business Machines Corporation

12/21/17 / #20170364926

System, method, and recording medium for vehicle weight detection

A vehicle weight detection method, system, and non-transitory computer readable medium, include calculating a first difference between a first expected weight of a vehicle and a first current weight of the vehicle based on on-board dash (obd) input data, calculating a second difference between a second expected weight of the vehicle and a second current weight of the vehicle based on a spring-mass-damper mechanical algorithm using vehicle data received from a user device, a comparing circuit configured to compare each of the first difference and the second difference to a predetermined weight difference threshold value, and a location checking circuit configured to checks if a location of the vehicle matches a location in a list of verified weight change locations of a database if the comparing circuit detects at least one of the first difference and the second difference is greater than the predetermined weight difference threshold value.. . ... International Business Machines Corporation

12/21/17 / #20170364856

Decomposition of multisite heterogeneous workforce scheduling problems

A computer-implemented method, computerized apparatus and computer program product for decomposing multisite heterogeneous workforce scheduling problems. An instance of a multisite heterogeneous workforce scheduling problem comprising a set of work items and a set of technicians is obtained. ... International Business Machines Corporation

12/21/17 / #20170364840

Ticket event modification for a problem tracking system ticket

Examples of techniques for ticket event modification for a ticket for a problem tracking system are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method may include: generating the ticket, the ticket comprising a ticket event; presenting the ticket comprising the ticket event to a user on a display; responsive to receiving a request from the user to modify the ticket event, modifying the ticket event while preserving an unmodified ticket event; and presenting the ticket comprising the modified ticket event to the user.. ... International Business Machines Corporation

12/21/17 / #20170364824

Contextual evaluation of process model for generation and extraction of project management artifacts

A computer-implemented method includes a processor extracting data and metadata from a process model, where the process is comprised of activities and the metadata is associated with each activity. The processor generates at least one user story for at least one activity, where the at least one user story includes an estimate attribute reflecting a predicted timeframe for completion of at least a portion of the at least one activity. ... International Business Machines Corporation

12/21/17 / #20170364820

System, method, and recording medium for distributed probabilistic eidetic querying, rollback, and replay

A provenance method, system, and non-transitory computer readable medium for a plurality of eidetic systems having logs, include a log-segment clustering circuit configured to crawl the logs of each of the eidetic systems to cluster segments across the logs of temporally correlated events into clustered segments, a probabilistic interleaving circuit configured to analyze the correlated segments to interleave an order of processes in the logs and assign a probability to the order of the processes occurring, and a probabilistic linearization circuit configured to create a probability tree which includes a total probability that a process in the clustered segments causes a next process in the clustered segments until an end of the temporal event of the clustered segments for each of the interleaved order of processes interleaved by the probabilistic interleaving circuit.. . ... International Business Machines Corporation

12/21/17 / #20170364811

Detecting and predicting bottlenecks in complex systems

A method for detecting a bottleneck in a system includes receiving a graph, wherein a node represents a software module and an edge represents a communication channel between software modules, monitoring selected resources for each software module in comparison to available resources, monitoring a ratio of a bandwidth consumed on a communication channel versus available bandwidth, traversing the graph for identifying a source software module whose produced amount of output is below the amount of output needed by the software module that is in idle mode, and analyzing a resource consumption of the identified source software module to identify a lacking amount of resource for the identified source software module. A computer system and computer program product corresponding to the above method are also disclosed herein.. ... International Business Machines Corporation

12/21/17 / #20170364806

Cognitive question answering pipeline blending

An answer to a question may selected from answers from a set of answering pipelines. Question answer data can be generated for a question, using a first answering pipeline. ... International Business Machines Corporation

12/21/17 / #20170364805

Cognitive question answering pipeline calibrating

A first and second blending profile may be created for a set of question answering pipelines. A set of test answer data may be generated for a first answering pipeline. ... International Business Machines Corporation

12/21/17 / #20170364804

Answer scoring based on a combination of specificity and informativity metrics

A mechanism is provided in a computing device configured with instructions executing on a processor of the computing device to implement a question answering system, for answer scoring based on a combined informativity and specificity score. The question answering system, executing on the processor of the computing device and configured with a question answering machine learning model, generates a set of candidate answers for a user-generated input question. ... International Business Machines Corporation

12/21/17 / #20170364803

Time series forecasting to determine relative causal impact

A method and system are provided to calculate a future behavioral data and identify a relative causal impact of external factors affecting the data. Behavioral data and data for one or more external factors are harvested for a first time period. ... International Business Machines Corporation

12/21/17 / #20170364802

System, method, and recording medium for expert recommendation while composing messages

An expert recommendation method, system, and non-transitory computer readable medium, include a topic extraction circuit configured to extract a topic of a user input message in real-time, an expert recommending circuit configured to recommend a list including a plurality of experts based on the extracted topic, and an expert ranking circuit configured to order the experts on the list of experts based on an expert rank factor.. . ... International Business Machines Corporation

12/21/17 / #20170364801

Neuromorphic memory circuit

A neuromorphic memory circuit including a programmable resistive memory element, an axon lif pulse generator to generate an axon lif pulse, a back propagation pulse generator to generate a back propagation pulse, a postsynaptic capacitor configured to build up a forward propagation lif charge over time, and a presynaptic capacitor configured to build up a back propagation lif charge over time. A first transistor activates a first discharge path from the postsynaptic capacitor through the programmable resistive memory element when the axon lif pulse generator generates the axon lif pulse. ... International Business Machines Corporation

12/21/17 / #20170364793

System to duplicate neuromorphic core functionality

A neuromorphic memory circuit including a memory cell with a programmable resistive memory element. A postsynaptic capacitor builds up a leaky integrate and fire (lif) charge. ... International Business Machines Corporation

12/21/17 / #20170364790

Neural network using floating gate transistor

A neural network device includes a crossbar grid including first metal lines running in a first direction and second metal lines running transversely to the first metal lines and being electrically isolated from the first metal lines. An array of cross-over elements is included. ... International Business Machines Corporation

12/21/17 / #20170364753

Analyzing and interpreting a referee's actions using gaze data

Systems, methods, and computer-readable media are disclosed for capturing gaze data for a referee over the course of a sports match, identifying a key performance indicator (kpi) corresponding to a sports domain with which the sports match is associated, and generating kpi data corresponding to the kpi. The kpi data may be analyzed to assess a likelihood that an officiating decision made by the referee during the sports match is accurate as well as to assess the likelihood that referee bias contributed to the officiating decision. ... International Business Machines Corporation

12/21/17 / #20170364749

Automatic digital image correlation and distribution

Embodiments of the present invention provide systems and methods for image correlation and distribution. The method includes receiving an image depicting at least one person, metadata for the image, contact data, facial recognition data, and location data. ... International Business Machines Corporation

12/21/17 / #20170364748

Shipping container compliance check and associated search with a personal imaging system

Determining positions of parcels within a container to create a visualization of the position of the parcels relative to and within the container. The visualization includes whether the packaging of the parcels within the container violates a defined packing policy.. ... International Business Machines Corporation

12/21/17 / #20170364747

Augemented video analytics for testing internet of things (iot) devices

An approach is provided for testing an internet of things device. First data captured on video and indicating visual device output and second data indicating non-visual device output are received during testing of the device. ... International Business Machines Corporation

12/21/17 / #20170364740

Signal processing

A computer-implemented method is provided for classifying an input signal against a set of pre-classified signals. A computer system may calculate, for each of one or more signals of the set of pre-classified signals, a parallelism value indicating a level of the parallelism between that signal and the input signal. ... International Business Machines Corporation

12/21/17 / #20170364673

Device security via swipe pattern recognition

One embodiment provides a method for ensuring device security via swipe pattern recognition, the method comprising: utilizing at least one processor to execute computer code that performs the steps of: receiving, using a touch device, at least one swipe input of a user; determining, using the at least one processor, if the at least one swipe input matches a known swipe pattern of the user, the match requiring exceeding a match confidence level; and responsive to said determining, executing an action associated with the touch device. Other aspects are described and claimed.. ... International Business Machines Corporation

12/21/17 / #20170364661

Health monitoring

Technical solutions are described for monitoring health of a user by a healthcare system. An example computer-implemented method includes accessing a current image of the user. ... International Business Machines Corporation

12/21/17 / #20170364650

Managing a therapeutic state based on cognitive, contextual, and location-based action recognition

Disclosed is a novel system, computer program product, and method for managing a therapeutic state of a subject of interest. A combination of location-based information, contextual-based information, and cognitive-based information is accessed for the subject of interest. ... International Business Machines Corporation

12/21/17 / #20170364623

Design/technology co-optimization platform for high-mobility channels cmos technology

Embodiments of the present invention may provide the capability to design sram cells may be designed that is compatible with the requirements of ingaas integration by selective epitaxy in sio2 cavities without sacrificing density and area scaling. In an embodiment of the present invention, a computer-implemented method for designing a hybrid integrated circuit may comprise receiving data representing a layout of a static random-access memory cell array, identifying areas between active channel regions that do not overlap with transistor gates of static random-access memory cells of the static random-access memory cell array, selecting from among the identified areas at least one area, expanding the selected areas to determine whether the expanded area intersects with a p-doped active si semiconductor or p-channel semiconductor area, and marking as si seed locations the identified expanded areas that do not intersect on both sides with a channel active transistor region.. ... International Business Machines Corporation

12/21/17 / #20170364620

Verification of untimed nets

Integrated circuits (ics) rely on static timing analysis during their design to ensure that they will operate at desired frequencies. Delays between sequential elements (e.g., latches and flip-flops) are constrained to meet target clock periods. ... International Business Machines Corporation

12/21/17 / #20170364614

Adaptive forecasting of time-series

For a time-series, a baseline error value is reduced to compute a target forecast error value by maximizing a net benefit value of a forecasted value of the time-series. For each forecasting model in a set of models, a corresponding model error value related to the time-series is computed. ... International Business Machines Corporation

12/21/17 / #20170364613

Automatic decomposition of simulation model

Method, system and product for decomposing a simulation model. The method comprising automatically decomposing the simulation model into a predetermined number of co-simulation components, wherein each co-simulation component is allocated to a different simulation platform, wherein said automatically decomposing comprises: defining a target optimization function, wherein the target optimization function computes an estimated run time of the simulation model, wherein the target optimization function is based on a communication time within each co-simulation component and a communication time between each pair of co-simulation components; and determining a decomposition of the simulation model that optimizes a value of the target optimization function. ... International Business Machines Corporation

12/21/17 / #20170364612

Simulation of internet of things environment

A method, system, and product for simulation of internet of things (iot) environment. The method performed by a simulation node in the iot environment, which comprises the simulation node and a cloud server connected by a computerized network. ... International Business Machines Corporation

12/21/17 / #20170364595

System, method, and recording medium for data mining between private and public domains

A data mining method, system, and non-transitory computer readable medium, include defining a set of filter constraints as a filter function for clustering users' private records of data of a private domain, obtaining a set of data from a public domain by applying the filter function to users' public records of data of the public domain, selecting a subset of the users' public records of data that is common with the users' private records of data, and performing data mining on the selected subset of the users' public records of data in combination with the users' private records of data to match a user of the private domain to public records of the user of the private domain.. . ... International Business Machines Corporation

12/21/17 / #20170364594

Holistic document search

A set of documents is parsed. Members of the set of documents include a set of text elements and a set of visual elements. ... International Business Machines Corporation

12/21/17 / #20170364588

Presenting collaboration summaries of artifacts to improve engagement of user in collaboration activities

A method, system and computer program product for improving the engagement of the user in collaboration activities. A collaboration mechanism detects a request to select an artifact (community, file) by a user in a communication system. ... International Business Machines Corporation

12/21/17 / #20170364587

System and method for automatic, unsupervised contextualized content summarization of single and multiple documents

A method, system and computer-usable medium are disclosed for generating a context-sensitive summarization of a corpus of content. Natural language processing (nlp) operations are performed on text within an input corpus to extract phrases, which are then used to generate a grammatical analysis. ... International Business Machines Corporation

12/21/17 / #20170364586

Contextual content graph for automatic, unsupervised summarization of content

A method, system and computer-usable medium are disclosed for using a contextual graph to summarize a corpus of content. Natural language processing (nlp) preprocessing operations are performed on text within an input corpus to form a grammatical analysis. ... International Business Machines Corporation

12/21/17 / #20170364567

Social network content analysis

A method includes receiving one or more updates in a social networking system corresponding to one or more topics, determining one or more constraints corresponding to the received one or more updates, updating a threshold value associated with each of the one or more determined user constraints, calculating a constraint score corresponding to each constraint of the one or more constraints, determining whether each constraint score meets a selected threshold value, and presenting the update responsive to determining that each constraint score meets a selected threshold value. A computer program product and computer system corresponding to the method are also disclosed.. ... International Business Machines Corporation

12/21/17 / #20170364566

Search journaling for operations analysis

A session initiation with an information system is detected, the session including a search for a data item in the information system. In an application executing using a processor and a memory, a node is constructed in a search tree, the node representing a search-related step occurring in the session. ... International Business Machines Corporation

12/21/17 / #20170364565

Log management utilizing time context indexing

A method for displaying log records includes providing a plurality of log records wherein a respective log record has a time stamp identifying the time of an occurrence of a computer system event. A display index correlates a respective time threshold between consecutive log records with respective display line spacing. ... International Business Machines Corporation

12/21/17 / #20170364559

Cardinality estimation of a join predicate

In one embodiment, a method for improving cardinality estimation of a join predicate between a fact table and an overloaded dimension table is provided. The method includes receiving a dimension table and a fact table in a join predicate of one or more sql statements. ... International Business Machines Corporation

12/21/17 / #20170364556

Cardinality estimation of a join predicate

In one embodiment, a method for improving cardinality estimation of a join predicate between a fact table and an overloaded dimension table is provided. The method includes receiving a dimension table and a fact table in a join predicate of one or more sql statements. ... International Business Machines Corporation

12/21/17 / #20170364542

Sensor module registration and configuration

In an approach for providing a framework to register a sensor module and manifest the capability the sensor module supports, a processor receives a first module registration request, wherein the first module registration request includes a sensor module and metadata. A processor determines that the first module registration request is compatible with a second module registration request by comparing data stored in a module database associated with the second module registration request to data within the first module registration request. ... International Business Machines Corporation

12/21/17 / #20170364528

System, method, and recording medium for recycle bin management based on cognitive factors

A recycle bin management method, system, and non-transitory computer readable medium, include a cognitive detection circuit configured to detect a cognitive state and a cognitive characteristic of a user at a time when the user is performing a first deletion of a file to a recycle bin and a file tagging circuit configured to tag the file with a cognitive indicator based on the cognitive state and cognitive characteristic of the user, the cognitive indicator altering a visual display of the file in the recycle bin to indicate the cognitive state and the cognitive characteristic of the user before the user performs a second deletion to delete the file from the recycle bin.. . ... International Business Machines Corporation

12/21/17 / #20170364525

Efficient snapshot management in a large capacity disk environment

A method, computer program product and/or system saves an original logical block in a file system and generates a first heatmap reflecting access operations on the original logical block. After taking of a file system snapshot, and receiving information that the original logical block is going to be revised, a second heatmap is generated, reflecting predicted access operations on the revised logical block. ... International Business Machines Corporation

12/21/17 / #20170364519

Automated answer scoring based on combination of informativity and specificity metrics

A mechanism is provided in a computing device configured with instructions executing on a processor of the computing device to implement a question answering system for answer scoring based on a specificity score. The question answering system, executing on the processor of the computing device and configured with a question answering machine learning model, generates a set of candidate answers for a user-generated input question. ... International Business Machines Corporation

12/21/17 / #20170364508

Culturally-aware cognitive system for human interactions

A mapping is constructed between a node of a cultural hierarchy and a node of an organizational hierarchy. The cultural hierarchy is a data structure representing an arrangement of characteristics of different social levels relative to one another in a culture. ... International Business Machines Corporation

12/21/17 / #20170364507

Extracting veiled meaning in natural language content

Mechanisms for identifying hidden meaning in a portion of natural language content are provided. A primary portion of natural language content is received and a secondary portion of natural language content is identified that references the natural language content. ... International Business Machines Corporation

12/21/17 / #20170364500

Forms processing method

A forms processing method involves accessing an individual scanned form, analyzing the individual form, based upon the analysis, selecting a proper forms-scanning template, loading multiple field-specific dictionaries linked to individual fields in the selected forms-scanning template, analyzing, text content, on a field by field basis using the field-specific dictionary linked to each respective field, for misspellings or improper entries, or for missing content, attempting to identify whether a closest fit between the particular content and contents of the field-specific dictionary linked to that field exists and, if the closest fit exists, automatically replacing the particular content with an entry from the field-specific dictionary linked to that field corresponding to the closest fit, or if there is no closest fit or the particular content is absent, providing an indication of an error to an operator, and storing, a correction as a new entry within the field-specific dictionary linked to that field.. . ... International Business Machines Corporation

12/21/17 / #20170364499

Concealment of content in a shared document

A first set of concealment attributes is received from a first user. The first set of user concealment attributes are associated with a document. ... International Business Machines Corporation

12/21/17 / #20170364448

Selective space reclamation of data storage memory employing heat and relocation metrics

Space of a data storage memory of a data storage memory system is reclaimed by determining heat metrics of data stored in the data storage memory; determining relocation metrics related to relocation of the data within the data storage memory; determining utility metrics of the data relating the heat metrics to the relocation metrics for the data; and making the data whose utility metric fails a utility metric threshold, available for space reclamation.. . ... International Business Machines Corporation

12/21/17 / #20170364443

Sizing a write cache buffer based on emergency data save parameters

Embodiments relate to saving data upon loss of power. An aspect includes sizing a write cache buffer based on parameters related to carrying out this emergency data save procedure. ... International Business Machines Corporation

12/21/17 / #20170364437

Retention management for phase change memory lifetime improvement through application and hardware profile matching

Methods and systems for managing memory and stress to memory systems. A method for managing memory includes receiving from a software application memory retention requirements for application data. ... International Business Machines Corporation

12/21/17 / #20170364435

Analytically selecting which tests are to be executed in a continuous delivery process

A method, system and computer program product for analytically selecting which tests are to be executed in a continuous delivery process. An analytics processing system constructs a code dependency tree to analyze the tests that are affected by changes in code after a new build is generated. ... International Business Machines Corporation

12/21/17 / #20170364434

Splitting and merging microservices

A method, executed by a computer, includes receiving test data corresponding to a first microservice and a second microservice, determining, using the test data, whether the first microservice can be split, determining, using the test data, whether the first and second microservices can be merged, responsive to determining that the first microservice can be split, issuing a recommendation to split the first microservice, and responsive to determining that the first and second microservices can be merged, issuing a recommendation to merge the first microservice and the second microservice. A computer system and computer program product corresponding to the above method are also disclosed herein.. ... International Business Machines Corporation

12/21/17 / #20170364431

Efficiently debugging software code

A mechanism is provided for efficiently debugging software code. A set of modified log files associated with the software code is presented to a software debugging user. ... International Business Machines Corporation

12/21/17 / #20170364429

Assessment of processor performance metrics by monitoring probes constructed using instruction sequences

Systems, methods and computer program products assess processor performance metrics by monitoring probes constructed using instruction sequences. A first probe value can be determined from execution of a broad spectrum probe in an execution environment. ... International Business Machines Corporation

12/21/17 / #20170364427

After swapping from a first storage to a second storage, mirroring data from the second storage to the first storage for data in the first storage that experienced data errors

Provided are a computer program product, system, and method for after swapping from a first storage to a second storage, mirroring data from the second storage to the first storage for data in the first storage that experienced data errors. A swap operation redirects host input/output (i/o) requests to data from the first server to the second server in response to a health condition at the first server. ... International Business Machines Corporation

12/21/17 / #20170364426

Managing health conditions to determine when to restart replication after a swap triggered by a storage health event

Provided are a computer program product, system, and method for managing health conditions to determine when to restart replication after a swap triggered by a storage health event. A determination is made of a health condition with respect to access to a first storage that triggers a swap operation. ... International Business Machines Corporation

12/21/17 / #20170364421

Core pairing in multicore systems

A method, executed by a computer, includes pairing a first core with a second core to form a first core group, wherein each core of the group has a plurality of functional units, transferring instructions received by the first core to the second core for execution via a first inter-core communication bus, and executing the instructions on the second core. A computer system and computer program product corresponding to the above method are also disclosed herein.. ... International Business Machines Corporation

12/21/17 / #20170364415

Optimizing data backup schedules

Backup schedule optimization is provided. Backup environment data is identified. ... International Business Machines Corporation

12/21/17 / #20170364403

Enabling symptom verification

Systems, products and methods for enabling symptom verification. Verifying a symptom may include eliminating repeated symptom definitions or eliminating symptoms having low accuracy. ... International Business Machines Corporation

12/21/17 / #20170364402

Probabilistic prediction of software failure

A log entry identifies an error in the computer or other system. Another log entry identifies a symptom associated with the system error. ... International Business Machines Corporation

12/21/17 / #20170364400

Method for debugging static memory corruption

An indication is received. The indication is of an address in a first page in virtual memory used by an application with a static memory corruption. ... International Business Machines Corporation

12/21/17 / #20170364390

Automating enablement state inputs to workflows in z/osmf

Methods, computer program products, and systems are presented. The methods include, for instance: automatically discovering enablement state variables respectively corresponding to products present in a computer system; processing the enablement state variables and associated values and making a separate file for disabled products; and make available the file for disabled products as inputs to subsequent system administration jobs.. ... International Business Machines Corporation

12/21/17 / #20170364387

Guided virtual machine migration

In an approach to guided virtual machine migration, one or more computer processors determine a target host computer available for a migration of a virtual machine from a source host computer. The one or more computer processors identify one or more resources of the target host computer with one or more predictive errors. ... International Business Machines Corporation

12/21/17 / #20170364383

Predictively provisioning cloud computing resources for virtual machines

Methods, computer program products, and systems are presented. The methods include, for instance: predictively provisioning, by one or more processor, cloud computing resources of a cloud computing environment for at least one virtual machine; and initializing, by the one or more processor, the at least one virtual machine with the provisioned cloud computing resources of the cloud computing environment. ... International Business Machines Corporation

12/21/17 / #20170364377

Specialized micro-hypervisors for unikernels

Application code is obtained at a compiler toolchain, which accesses a package manager that tracks dependencies for a set of software components including application-level components represented as application-level packages, hypervisor interface-level components represented as hypervisor interface-level packages, and hypervisor-level components represented as hypervisor-level packages. A dependency solver is employed to select a sub-set of the set of packages that satisfy the dependencies. ... International Business Machines Corporation

12/21/17 / #20170364372

Online video playback analysis and assistance

In an approach for providing assistance to a user viewing an online video, the computer receives an online video. The computer determines that an uncommon action occurs with the online video. ... International Business Machines Corporation

12/21/17 / #20170364358

Operation of a multi-slice processor implementing dependency accumulation instruction sequencing

Operation of a multi-slice processor that includes a plurality of execution slices. Operation of such a multi-slice processor includes: receiving a first instruction indicating a first target register; receiving a second instruction indicating the first target register as a source operand; responsive to the second instruction indicating the first target register as a source operand, updating a dependent count corresponding to the first instruction; and issuing, in dependence upon the dependent count for the first instruction being greater than a dependent count for another instruction, the first instruction to an execution slice of the plurality of execution slices.. ... International Business Machines Corporation

12/21/17 / #20170364356

Techniques for implementing store instructions in a multi-slice processor architecture

A technique for operating a processor includes receiving, at an issue queue, a store instruction that has an associated address generation (agn) operation and an associated data operation. The agn operation is issued to agn logic associated with a pipeline slice in response to all source operands for the agn operation being ready. ... International Business Machines Corporation

12/21/17 / #20170364352

Release cycle optimization based on significant features values simulation

Embodiments include a system for release cycle optimization; the system includes a processor configured to perform a method. The method includes accessing, by a processor, historical data relating to a plurality of software version each having a plurality of attributes; selecting a subset of attributes from the plurality of attributes; receiving a set of data values for each of the subset of attributes from the plurality of attributes; performing one or more simulations of a software development cycle utilizing the set of data values; and obtaining a set of results from the one or more simulations comprising a plurality of predicted field defects values corresponding to each of the set of data values.. ... International Business Machines Corporation

12/21/17 / #20170364351

Optimized installation of received patches for application programs already running on computer systems

A data patch for a program already installed in an interactive display computer system is received over a network and stored. There is also received a first set of parameters for controlling the installation of the patch. ... International Business Machines Corporation

12/21/17 / #20170364343

Tracking an application installation state

An apparatus, method, and system for receiving a request for a transaction using a computer system. An absence of a first identification of an application on a first user device is determined, when a beacon of the computer system does not detect the first identification within a defined geographical area. ... International Business Machines Corporation

12/21/17 / #20170364331

Method to support multiple versions of apis and to control run-time execution of an api

In an approach to api versioning, annotations are provided to differentiate among two or more versions of an api. Statistics associated with the two or more versions of the api are collected. ... International Business Machines Corporation

12/21/17 / #20170364328

Checksum adder

Embodiments relate to a hardware circuit that is operable as a fixed point adder and a checksum adder. An aspect includes a driving of a multifunction compression tree disposed on a circuit path based on a control bit to execute one of first and second schemes of vector input addition and a driving of a multifunction adder disposed on the circuit path based on the control bit to perform the one of the first and second schemes of vector input addition.. ... International Business Machines Corporation

12/21/17 / #20170364302

Technology for governance of data retention and transfer

For storing data in computer readable storage devices, a policy table is provided that is configured to define respective retention period policies for respective items of the data according to geolocation origins of the respective items of the data. First data is received from a first computer system and is stored by a computer system hosting a first computer readable storage device. ... International Business Machines Corporation

12/21/17 / #20170364297

Multivolume group management

A multivolume management method, executed by a computer, includes storing a dataset over a plurality of media storage devices, wherein the plurality of media storage devices has a corresponding plurality of physical identifiers, generating a conversion table that assigns the plurality of physical identifiers to a corresponding plurality of sequentially ordered virtual identifiers, wherein each physical identifier is uniquely assigned to one virtual identifier, receiving a request for the dataset, wherein the request references the plurality of sequentially ordered virtual identifiers, in response to receiving the request, generating a response comprising an ordered list of physical identifiers using the conversion table, and responding to the request with the response. A computer system and computer program product corresponding to the above method are also disclosed herein.. ... International Business Machines Corporation

12/21/17 / #20170364284

Higher and lower availability prioritization of storage cells in an automated library

A computer-implemented method, according to one embodiment, includes: designating a first set of drives as higher availability drives, designating a second set of drives as lower availability drives, and correlating a first cartridge with at least one of the higher availability drives and a second cartridge with at least one of the lower availability drives. Each of the drives is configured to receive and store cartridges via one or more accessors. ... International Business Machines Corporation

12/21/17 / #20170364278

Page compression strategy for improved page out process

A page compression strategy classifies uncompressed pages selected for compression. Similarly classified pages are compressed and bound into a single logical page. ... International Business Machines Corporation

12/21/17 / #20170364264

Reducing concurrency of garbage collection operations

Methods, computing systems and computer program products implement embodiments of the present invention that include identifying, in a storage system including multiple storage devices having respective sets of storage regions, respective default low storage region thresholds that are used for garbage collection. For each given storage region, a time threshold and an alternative low storage region threshold greater than the default low storage region threshold for the given storage device are defined. ... International Business Machines Corporation

12/21/17 / #20170364242

Web content layout engine instance sharing across mobile devices

Web content layout engine instance sharing is provided by configuring a shared instance of a web browser layout engine shared between a first mobile device and a second mobile device; dynamically partitioning requested web content for display across the first mobile device and the second mobile device using the shared instance of the web browser layout engine, where the dynamically partitioning selects first interface element(s) of the web content for display by the first mobile device and selects second interface element(s) of the web content for display by the second mobile device, and where at least one second interface element of the second interface element(s) includes an action interface element, interaction with which is configured to advance a workflow of which the web content is a part; determining, based at least in part on user input, whether to advance the workflow; and performing processing based on the determining.. . ... International Business Machines Corporation

12/21/17 / #20170364229

Display interaction based upon a distance of input

One embodiment provides a method including utilizing at least one processor to execute computer code that performs the steps of: receiving, at a transmission device communicating with a display device, a first user input, wherein the first user input activates a mode, of the display device, allowing a user to control a graphical user interface on the display device; thereafter, detecting, at the transmission device, a second user input, wherein the second user input comprises instructions for a control action for manipulating the graphical user interface; identifying the distance between an input object providing the second user input and a surface of the transmission device; modifying, based upon the distance, an attribute of the control action; and providing instructions to the display device to perform the control action having the modified attribute. Other aspects are described and claimed.. ... International Business Machines Corporation

12/21/17 / #20170364126

276-pin buffered memory card with enhanced memory system interconnect

An embodiment is a memory card including a rectangular printed circuit card having a first side and a second side, a first length of between 151.35 and 161.5 millimeters, and first and second ends having a second length smaller than the first length. The memory card also includes a first plurality of pins on the first side extending along a first edge of the rectangular printed circuit card that extends along a length of the card, a second plurality of pins on the second side extending on the first edge of the rectangular printed circuit card, and a positioning key having its center positioned on the first edge of the rectangular printed circuit card and located between 94.0 and 95.5 millimeters from the first end of the rectangular printed circuit card. ... International Business Machines Corporation

12/21/17 / #20170364050

System, method, and recording medium for power tool accident prevention

A power tool accident prevention method, system, and non-transitory computer readable medium receiving images from a static camera of a setup or operation of a power tool, include a danger identification circuit configured to: analyze the images to identify inherent dangers in the setup or the operation of the power tool, and identify at least one potential cause of an accident based on the identified inherent dangers, and a power tool disabling circuit configured to activate an emergency safety measure of the power tool to avoid the at least one potential cause of the accident.. . ... International Business Machines Corporation

12/21/17 / #20170363685

Implementing prioritized compressed failure defects for efficient scan diagnostics

A method and circuits are provided for implementing enhanced scan data testing using an xor network to prioritize faults to be simulated during diagnostic isolation, and reducing the number of faults requiring re-simulation. A test is run, scan data are applied to scan channels using the xor network and the output scan data are unloaded. ... International Business Machines Corporation

12/21/17 / #20170363684

Bitwise rotating scan section for microelectronic chip testing and diagnostics

According to an embodiment of the present invention, a computer-implemented method for testing a microelectronic chip is described. The method may include dividing, via a processor running a scanning engine, a plurality of sections of the microelectronic chip. ... International Business Machines Corporation

12/21/17 / #20170363683

Portion isolation architecture for chip isolation test

Embodiments include methods, and processing system, and computer program products providing portion isolation design to a chip design to facilitate partial-good portion isolation test of the chip. Aspects include: retrieving a chip design file of a chip, the chip design file having pin related information from a chip design database, generating, via a pin group utility module, a pin group file according to the pin related information retrieved, combining, via a portion wrapper insertion utility module, the pin group file with one or more portion netlists to form one or more localized portion wrapper segments, stitching, via the portion wrapper insertion utility module, the one or more localized portion wrapper segments to form a portion boundary wrapper chain, and inserting, via the portion wrapper insertion utility module, the portion boundary wrapper chain into the chip design file to facilitate partial-good portion isolation test.. ... International Business Machines Corporation

12/21/17 / #20170363671

Noise spectrum analysis for electronic device

A method for analyzing noise spectrum of an electronic device includes storing a waveform data including a plurality of data points, the waveform data is obtained by measuring a target signal from the electronic device, removing data points corresponding to a background noise fluctuation based on a smooth curve of the waveform data, data points considered candidates for peaks are extracted from the waveform data, classifying the extracted data points based on a distance between adjacent data points in order to discriminate a cluster of distant data points from data points closely positioned to dominant peaks, determining the dominant peaks based on the cluster of distant data points such that the data points closely positioned to the dominant peaks are ignored, each dominant peak corresponds to the characteristic of the electronic device, and outputting the dominant peaks as an analysis result for the electronic device.. . ... International Business Machines Corporation

12/21/17 / #20170363670

Noise spectrum analysis for electronic device

A method for analyzing noise spectrum of an electronic device includes storing a waveform data including a plurality of data points, the waveform data is obtained by measuring a target signal from the electronic device, removing data points corresponding to a background noise fluctuation based on a smooth curve of the waveform data, data points considered candidates for peaks are extracted from the waveform data, classifying the extracted data points based on a distance between adjacent data points in order to discriminate a cluster of distant data points from data points closely positioned to dominant peaks, determining the dominant peaks based on the cluster of distant data points such that the data points closely positioned to the dominant peaks are ignored, each dominant peak corresponds to the characteristic of the electronic device, and outputting the dominant peaks as an analysis result for the electronic device.. . ... International Business Machines Corporation

12/21/17 / #20170363659

Integrated self-coining probe

A probe head that contains a coining surface and a plurality of probe tips integrated on a same side of the probe head is provided. The probe head has a first portion and a laterally adjacent second portion, wherein the first portion of the probe head contains the coining surface, and the second portion of the probe head contains the plurality of the probe tips. ... International Business Machines Corporation

12/21/17 / #20170362447

Paint compositions with color change characteristics

A paint composition includes a fluid and a coloring agent in the fluid. The fluid maintains the coloring agent in a first protonation state. ... International Business Machines Corporation

12/21/17 / #20170362383

Porous/nanoporous pht

Methods of forming nanoporous materials are described herein that include forming a polymer network with a chemically removable portion. The chemically removable portion may be polycarbonate polymer that is removable on application of heat or exposure to a base, or a polyhexahydrotriazine (pht) or polyhemiaminal (pha) polymer that is removable on exposure to an acid. ... International Business Machines Corporation

12/21/17 / #20170362033

Luggage retrieval and distribution

A computer-implemented method, system, and computer program product for distributing luggage among a plurality of outlet ports of a luggage distribution unit is provided. The method includes associating, using a processor system, a passenger key and a luggage identification (id) device of a luggage unit, and assigning, using the processor system, the luggage id device to a dispensing unit based at least in part on a determination of a desired distribution of luggage units among the plurality of outlet ports. ... International Business Machines Corporation

12/21/17 / #20170361942

Delivering selected products with aerial drones

A computer-implemented method, system, and/or computer program product optimizes an operation of an aerial drone to transport a product to a customer. Processor(s) receive an order for a product from a customer. ... International Business Machines Corporation

12/21/17 / #20170361769

Traffic safety alert system

An apparatus for providing traffic alerts includes a distance module, analysis module, transmission module, and signaling module. The distance module measures the distance between a vehicle and an object in front of the vehicle. ... International Business Machines Corporation

12/21/17 / #20170361463

Recognizing a location of a robot shared in multiple data centers

A method for recognizing a location of a robotic device includes collecting first environmental data corresponding to a first current location of the robotic device, generating a first location signature based on the first environmental data, driving the robotic device to enter a standby mode at a first time, driving the robotic device to wake up from the standby mode after a predetermined time elapses at a second time after the driving the robotic device to enter the standby mode, collecting second environmental data corresponding to a second current location of the robotic device, generating the second location signature generated based on the second environmental data, comparing the first and second location signatures, and determining whether a location of the robotic device has been changed between the first and second times based on a comparison result between the first and second location signatures.. . ... International Business Machines Corporation

12/21/17 / #20170361460

Wearable device testing

Embodiments of the present invention provide methods and systems to analyze wearable technology. A robot with snake assembly works in conjunction with a server in order to simulate the locomotive actions of appendages and to concomitantly determine the response of wearable technology devices, which are attached to the snake robot assembly, to the simulated locomotive actions.. ... International Business Machines Corporation

12/21/17 / #20170361281

Filtration membranes with functionalized star polymers

A thin film composite membrane (tfc) includes an active layer on a support. The active layer includes at least 8 barrier layers of star-polymers each having at least three linear polymers attached at a central core. ... International Business Machines Corporation

12/21/17 / #20170361201

Dynamic rigidity mechanism

Embodiments are directed to a support apparatus. The support apparatus might comprise a body configured to support an entity. ... International Business Machines Corporation

12/21/17 / #20170361158

Analyzing team game play interactions using gaze data

Systems, methods, and computer-readable media are disclosed for capturing, over the course of a sports match, gaze data for each participant on a team, identifying a team-level key performance indicator (kpi) associated with a sports domain to which the sports match corresponds, and generating kpi data corresponding to the kpi. A graph may then be constructed based at least in part on the kpi data, where each node in the graph may represent a player on the team or an object of interest, and each edge connecting adjacent nodes may be weighted to indicate a degree of interaction between the nodes connected by the edge. ... International Business Machines Corporation

12/21/17 / #20170361157

Determining player performance statistics using gaze data

Systems, methods, and computer-readable media are disclosed for capturing gaze data for a sports participant over the course of a sports match, identifying a key performance indicator (kpi) corresponding to a sports domain with which the sports match is associated, and generating kpi data corresponding to the kpi. Report data indicative of the kpi data may be generated and presented to the sports participant in-match or post-match. ... International Business Machines Corporation

12/14/17 / #20170359898

Power decoupling attachment

An embodiment of the invention may include a method, and resulting structure, of forming a semiconductor structure. The method may include forming a component hole from a first surface to a second surface of a base layer. ... International Business Machines Corporation

12/14/17 / #20170359667

Three dimensional audio speaker array

Systems and methods for audio control are disclosed. A computer-implemented method includes: determining, by a computing device, an x-y-z location of a sound associated with an image object projected on a screen; determining, by a computing device, a front speaker of a front speaker array based on an x-y coordinate of the x-y-z location; determining, by a computing device, at least one side speaker of a left speaker array and a right speaker array based on a z coordinate of the x-y-z location, wherein the left speaker array and the right speaker array are on a side of the screen opposite the front speaker array; and causing, by a computing device, the front speaker and the at least one side speaker to emit the sound.. ... International Business Machines Corporation

12/14/17 / #20170359438

Determining how to service requests based on several indicators

A method for execution by a dispersed storage (dst) processing module includes receiving a data request. An estimated performance level is determined for each of a set of data access approaches, and one data access approach is selected. ... International Business Machines Corporation

12/14/17 / #20170359424

Dynamic generation of network routing configuration with service requirements

Automated generation and implementation of a network routing configuration with service requirements are provided by automatically establishing a network routing configuration for use in network routing a client request to an appropriate service of a plurality of services of a computing environment. The network routing configuration includes one or more respective instructions to be implemented by the network routing for the appropriate service. ... International Business Machines Corporation

12/14/17 / #20170359411

Concurrency reduction service

Reducing concurrency in a system comprising a plurality of services sending a plurality of concurrent requests to a back-end service through a concurrency reduction service. The concurrency reduction service maps each concurrent incoming request to a key; and determines if the key to which the concurrent incoming request is mapped matches a key mapped from another concurrent incoming request from the plurality of concurrent requests. ... International Business Machines Corporation

12/14/17 / #20170359406

Adaptive query targeting in a dynamic distributed environment

Techniques for adaptive query targeting in a dynamic distributed computing environment are provided. In one aspect, a method for adaptive query targeting in a distributed computing system having two or more cooperating nodes is provided. ... International Business Machines Corporation

12/14/17 / #20170359395

Dynamic stream operator fission and fusion with platform management hints

Methods for data stream processing in a runtime data processing environment. A stream processing graph that includes several connected operators is received. ... International Business Machines Corporation

12/14/17 / #20170359330

Enforce data security based on a mobile device, positioning, augmented reality

Systems and methods are provided for securing data using a mobile device. The method may include determining securing global positioning data values of the mobile device; measuring a securing direction of the mobile device relative to a magnetic north direction; capturing a securing password by the mobile device; and securing the data against unauthorized access using the determined global positioning data values, the securing password, and the securing direction as a combined password.. ... International Business Machines Corporation

12/14/17 / #20170359304

Address management in an overlay network environment

Embodiments of the invention relate to overlay network address management. One embodiment includes an overlay gateway including an overlay network manager associated with a physical network. ... International Business Machines Corporation

12/14/17 / #20170359299

Email quota management system

A computer receives an out of office status a user has indicated on an email application, the email application using a communications network and determines a quota status of the user based on a previous quota usage pattern and a current quota usage pattern, wherein the quota includes an amount of storage spaced allotted to the user. The computer receives a new email to be delivered to the user and assigns a quota status to the new email. ... International Business Machines Corporation

12/14/17 / #20170359297

Email quota management system

A computer receives an out of office status a user has indicated on an email application, the email application using a communications network and determines a quota status of the user based on a previous quota usage pattern and a current quota usage pattern, wherein the quota includes an amount of storage spaced allotted to the user. The computer receives a new email to be delivered to the user and assigns a quota status to the new email. ... International Business Machines Corporation

12/14/17 / #20170359289

Establishing social network connections

A request initiated by a first user in a social network to add at least a second user of the social network as a contact of the first user in the social network can be received. A security policy for the second user can be accessed and, based on the security policy, whether the first user is authorized to add the second user as the contact of the first user in the social network without the second user being prompted to approve the request can be determined. ... International Business Machines Corporation

12/14/17 / #20170359276

Transmitting multi-destination packets in overlay networks

In an embodiment, a network adapter receives a request from a first virtual switch of an overlay network to transmit a multi-destination packet to each of one or more virtual switches of the overlay network identified in a list stored in the network adapter. For each of the one or more virtual switches identified in the list, the network adapter creates a head-end replication of the multi-destination packet, obtains tunneling endpoint information for the identified virtual switch, encapsulates the created head-end replication of the multi-destination packet with a header specific to a tunneling protocol identified in the obtained tunneling endpoint information, and transmits the encapsulated packet to a receiver hosted on the identified virtual switch.. ... International Business Machines Corporation

12/14/17 / #20170359266

Turbolink: method and apparatus for controlling lnput/output signaling speed

Embodiments of the present invention may provide improved handling of communication characteristics, such as burstiness, latency-sensitive applications, bandwidth-sensitive applications, etc., to improve peak performance while not compromising other characteristics, such as thermal design power of the input/output chip packages. In an embodiment, in a control circuit that may be connected to and control a data transmitter, a method of transmitting data in a network may comprise receiving at least one feed-forward signal from the data transmitter, receiving at least one feedback signal from at least a first node of the network, comparing the at least one feed-forward signal with at least one threshold or condition, comparing the at least one feedback signal with at least one threshold or condition, and generating a signal indicating that a burst transmission should be started or stopped.. ... International Business Machines Corporation

12/14/17 / #20170359264

Persistent flow identifiers enabling disparate applications

Embodiments provide a system and method for network tracking. By using packet capture applications having a flow identifier and a time stamper, one or more raw packets from one or more packet flows intercepted from a network can be tagged with a unique identifier and timestamp that can later be used to aggregate packet flows that have been analyzed by one or more capture applications. ... International Business Machines Corporation

12/14/17 / #20170359244

Method and system for monitoring networks with variable, virtual service rates

Embodiments of the invention are directed to a computer-implemented method for monitoring a computerized network comprising several nodes that are, each, configured for receiving and/or sending data packets via one or more communication channels, such that physical queues of data packets arriving at and/or departing from each of the nodes may form in said one or more communication channels. According to this method, virtual queues are maintained, wherein each of said virtual queues simulates a queue of data packets in a virtual channel associated to one of said one or more communication channels, wherein the service rate of said virtual channel can be varied. ... International Business Machines Corporation

12/14/17 / #20170359243

Compute node cluster management

Disclosed aspects relate to managing a cluster of compute nodes in a shared pool of configurable computing resources using a set of small computer system interface persistent reservation (scsi-pr) commands. The set of scsi-pr commands may be used to monitor the cluster of compute nodes for an error event. ... International Business Machines Corporation

12/14/17 / #20170359233

Monitoring resource consumption based on fixed cost for threshold use and additional cost for use above the threshold

A method includes establishing a cost for consumption of a given resource by a given resource consumer for a designated period of time, the cost comprising a fixed cost for consumption of the given resource up to a threshold consumption level for the designated time period and an additional cost associated with consumption of the given resource exceeding the threshold consumption level for the designated period of time, monitoring consumption of the given resource by the given resource consumer, determining whether resource consumption by the given resource consumer is projected to exceed the threshold consumption level over the designated time period, generating an alert responsive to determining that resource consumption by the given resource consumer is projected to exceed the threshold consumption level over the designated time period, and providing the alert for presentation via a user interface of a user device associated with the given resource consumer.. . ... International Business Machines Corporation

12/14/17 / #20170359211

4-level pulse amplitude modulation transmitter architectures utilizing quadrature clock phases

A four-level pulse amplitude modulation transmitter and corresponding method are provided. The transmitter includes a most significant bit processing section and a least significant bit processing section. ... International Business Machines Corporation

12/14/17 / #20170359184

Credential-based authorization

Methods and systems are provided for demonstrating authorization to access a resource to a verifier computer controlling access to the resource. The method comprises, at a user computer, storing an attribute credential certifying a set of attributes; and communicating with a revocation authority computer to obtain an auxiliary credential, bound to the attribute credential, certifying a validity status for each attribute in the attribute credential. ... International Business Machines Corporation

12/14/17 / #20170359181

Preventing monoculture in application distribution

Portions of code in an original application are randomized to generate a randomized version of the original application, wherein the randomizing does not modify expected behavior of the original application. Digital signature(s) are generated that attest to integrity of the randomized version. ... International Business Machines Corporation

12/14/17 / #20170359100

Generating high resolution inferences in electrical networks

Methods, systems, and computer program products for generating high resolution inferences in electrical networks are provided herein. A computer-implemented method includes collecting multiple items of data from one or more data sources arising from a power distribution network, wherein the multiple items of data comprise (i) one or more levels of temporal resolution and (ii) one or more levels of spatial resolution; determining a network topology of the power distribution network based on identification of one or more connections between each of multiple components within the power distribution network; and generating a power flow estimate for one or more nodes within the power distribution network at a pre-determined level of spatio-temporal resolution, wherein said generating comprises applying a model to (i) the multiple items of collected data, (ii) the determined network topology, and (iii) one or more relations constraining the power flow estimate at the pre-determined level of spatio-temporal resolution.. ... International Business Machines Corporation

12/14/17 / #20170358749

Ladder tetrazine polymers

A ladder tetrazine polymer is disclosed.. . ... International Business Machines Corporation

12/14/17 / #20170358748

Ladder tetrazine polymers

A ladder tetrazine polymer is disclosed.. . ... International Business Machines Corporation

12/14/17 / #20170358689

Vertical transistor fabrication and devices

A method of fabricating a vertical field effect transistor including forming a first recess in a substrate; epitaxially growing a first drain from the first bottom surface of the first recess; epitaxially growing a second drain from the second bottom surface of a second recess formed in the substrate; growing a channel material epitaxially on the first drain and the second drain; forming troughs in the channel material to form one or more fin channels on the first drain and one or more fin channels on the second drain, wherein the troughs over the first drain extend to the surface of the first drain, and the troughs over the second drain extend to the surface of the second drain; forming a gate structure on each of the one or more fin channels; and growing sources on each of the fin channels associated with the first and second drains.. . ... International Business Machines Corporation

12/14/17 / #20170358679

Iii-v compound semiconductor channel post replacement gate

After forming a sacrificial gate structure straddling a stacking of a semiconductor mandrel structure and a dielectric mandrel cap and spacers present on sidewalls of the stack, portions of the spacers located on opposite sides of the sacrificial gate structure are removed. Epitaxial source/drain regions are formed on exposed sidewalls of portions of the semiconductor mandrel structure located on opposite sides of the sacrificial gate structure. ... International Business Machines Corporation

12/14/17 / #20170358677

Strained silicon complementary metal oxide semiconductor including a silicon containing tensile n-type fin field effect transistor and silicon containing compressive p-type fin field effect transistor formed using a dual relaxed substrate

A method of forming a semiconductor device that includes forming a strain relaxed buffer (srb) layer atop a supporting substrate, and epitaxially forming a tensile semiconductor material atop a first portion of the strain relaxed buffer layer (srb) layer. A second portion of the srb layer is then removed, and a semiconductor material including a base material of silicon and phosphorus is formed atop a surface of the supporting substrate exposed by removing the second portion of the srb layer. ... International Business Machines Corporation

12/14/17 / #20170358675

Precise control of vertical transistor gate length

Transistor and methods of forming the same include forming a channel fin on a bottom source/drain region. A dielectric fill is formed around the channel fin with a gap in an area directly above the channel fin that has a width greater than a width of the channel fin. ... International Business Machines Corporation

12/14/17 / #20170358673

Airgap spacers

Semiconductor devices with airgap spacers and methods of forming the same include forming a lower spacer that defines a gate region. A sacrificial upper spacer is formed directly above the lower spacer. ... International Business Machines Corporation

12/14/17 / #20170358672

Self-aligned shallow trench isolation and doping for vertical fin transistors

A method of forming a vertical fin field effect transistor (vertical finfet) with a self-aligned shallow trench isolation region, including forming a pinch-off layer on one or more vertical fin segments, wherein the pinch-off layer has a thickness on the sidewalls of the one or more vertical fin segments, forming a trench mask layer on predetermined portions of the pinch-off layer, removing portions of the pinch-off layer not covered by the trench mask layer, where the removed portions of the pinch-off layer exposes underlying portions of the substrate, and removing at least a portion of the substrate to form one or more isolation region trenches, where the distance of the sidewall of one of the one or more isolation region trenches to an adjacent vertical fin segment is determined by the thickness of the pinch-off layer.. . ... International Business Machines Corporation

12/14/17 / #20170358664

Selectively formed gate sidewall spacer

A method for forming a semiconductor device comprises forming a fin on a substrate and forming a sacrificial gate over a channel region of the fin. A hydrogen terminated surface is formed on sidewalls of the sacrificial gate, and a spacer is deposited on the hydrogen terminated surface of the sacrificial gate. ... International Business Machines Corporation

12/14/17 / #20170358660

Fabrication of a vertical fin field effect transistor (vertical finfet) with a self-aligned gate and fin edges

A method of forming a vertical fin field effect transistor with a self-aligned gate structure, comprising forming a plurality of vertical fins on a substrate, forming gate dielectric layers on opposite sidewalls of each vertical fin, forming a gate fill layer between the vertical fins, forming a fin-cut mask layer on the gate fill layer, forming one or more fin-cut mask trench(es) in the fin-cut mask layer, and removing portions of the gate fill layer and vertical fins not covered by the fin-cut mask layer to form one or more fin trench(es), and two or more vertical fin segments from each of the plurality of vertical fins, having a separation distance, d1, between two vertical fin segments.. . ... International Business Machines Corporation

12/14/17 / #20170358656

Fin cut without residual fin defects

A method of forming semiconductor fins is provided. Sacrificial fins are provided on a surface of substrate. ... International Business Machines Corporation

12/14/17 / #20170358655

Shared metal gate stack with tunable work function

Semiconductor devices and methods of forming the same include forming a work function stack over semiconductor fins in a first region and a second region, the work function stack having a bottom layer, a middle layer, and a top layer. The work function stack is etched to remove the top layer and to decrease a thickness of the middle layer in the second region, leaving a portion of the middle layer and the bottom layer intact. ... International Business Machines Corporation

12/14/17 / #20170358643

Method and structure for improving finfet with epitaxy source/drain

Isolation structures are formed to laterally surround a gate material block such that each sidewall of the gate material block abuts a corresponding sidewall of the isolation structures. Sidewalls of the gate material bock define ends of gate structures to be subsequently formed. ... International Business Machines Corporation

12/14/17 / #20170358607

Methods for forming hybrid vertical transistors

A method for forming a hybrid semiconductor device includes growing a stack of layers on a semiconductor substrate. The stack of layers includes a bottom layer in contact with the substrate, a middle layer on the bottom layer and a top layer on the middle layer. ... International Business Machines Corporation

12/14/17 / #20170358588

Multi time programmable memories using local implantation in high-k/ metal gate technologies

A metal oxide semiconductor field effect transistors (mosfet) memory array, including a complementary metal oxide semiconductor (cmos) cell including an n-type mosfet having a modified gate dielectric; and an n-type or p-type mosfet having an unmodified gate dielectric layer, where the modified gate dielectric layer incorporates an oxygen scavenging species.. . ... International Business Machines Corporation

12/14/17 / #20170358587

Multi time programmable memories using local implantation in high-k/ metal gate technologies

A metal oxide semiconductor field effect transistors (mosfet) memory array, including a complementary metal oxide semiconductor (cmos) cell including an n-type mosfet having a modified gate dielectric; and an n-type or p-type mosfet having an unmodified gate dielectric layer, where the modified gate dielectric layer incorporates an oxygen scavenging species.. . ... International Business Machines Corporation

12/14/17 / #20170358579

High-k gate dielectric and metal gate conductor stack for fin-type field effect transistors formed on type iii-v semiconductor material and silicon germanium semiconductor material

An electrical device that includes at least one n-type field effect transistor including a channel region in a type iii-v semiconductor device, and at least one p-type field effect transistor including a channel region in a germanium containing semiconductor material. Each of the n-type and p-type semiconductor devices may include gate structures composed of material layers including work function adjusting materials selections, such as metal and doped dielectric layers. ... International Business Machines Corporation

12/14/17 / #20170358576

Self-aligned shallow trench isolation and doping for vertical fin transistors

A method of forming a vertical fin field effect transistor (vertical finfet) with a self-aligned shallow trench isolation region, including forming a pinch-off layer on one or more vertical fin segments, wherein the pinch-off layer has a thickness on the sidewalls of the one or more vertical fin segments, forming a trench mask layer on predetermined portions of the pinch-off layer, removing portions of the pinch-off layer not covered by the trench mask layer, where the removed portions of the pinch-off layer exposes underlying portions of the substrate, and removing at least a portion of the substrate to form one or more isolation region trenches, where the distance of the sidewall of one of the one or more isolation region trenches to an adjacent vertical fin segment is determined by the thickness of the pinch-off layer.. . ... International Business Machines Corporation

12/14/17 / #20170358575

Forming insulator fin structure in isolation region to support gate structures

A method for forming the semiconductor device that includes forming a plurality of composite fin structures across a semiconductor substrate including an active device region and an isolation region. The composite fin structures may include a semiconductor portion over the active device region and a dielectric portion over the isolation region. ... International Business Machines Corporation

12/14/17 / #20170358554

Wafer stacking for integrated circuit manufacturing

A method of manufacturing integrated devices, and a stacked integrated device are disclosed. In an embodiment, the method comprises providing a substrate; mounting at least a first electronic component on the substrate; positioning a handle wafer above the first electronic component; attaching the first electronic component to the substrate via electrical connectors between the first electronic component and the substrate; and while attaching the first electronic component to the substrate, using the handle wafer to apply pressure, toward the substrate, to the first electronic component, to manage planarity of the first electronic component during the attaching. ... International Business Machines Corporation

12/14/17 / #20170358552

Silicon interposer sandwich structure for esd, emc, and emc shielding and protection

A interposer sandwich structure comprises a top interposer and a bottom interposer enclosing an integrated circuit electronic device that includes means for attaching the device to the bottom interposer, and an interconnection structure connecting the top interposer to the bottom interposer. The top interposer may also be directly connected to a chip carrier in addition to the bottom interposer. ... International Business Machines Corporation

12/14/17 / #20170358533

Low-temperature diffusion doping of copper interconnects independent of seed layer composition

Low-temperature techniques for doping of cu interconnects based on interfacially-assisted thermal diffusion are provided. In one aspect, a method of forming doped copper interconnects includes the steps of: patterning at least one trench in a dielectric material; forming a barrier layer lining the trench; forming a metal liner on the barrier layer; depositing a seed layer on the metal liner; plating a cu fill into the trench to form cu interconnects; removing a portion of a cu overburden to access an interface between the metal liner and the cu fill; depositing a dopant layer; and diffusing a dopant(s) from the dopant layer along the interface to form a cu interconnect doping layer between the metal liner and the cu fill. ... International Business Machines Corporation

12/14/17 / #20170358529

Forming a stacked capacitor

Stacked capacitor structures using tsvs are provided. In one aspect, a stacked capacitor structure includes: a first substrate having at least one first capacitor formed in a tsv in the first substrate; and a second substrate, bonded to the first substrate, having at least one second capacitor formed in a tsv in the second substrate, wherein the first capacitor and the second capacitor each comprises a first electrode and a dielectric that both surround a second electrode that is at a core of the tsv, wherein the dielectric separates the first electrode from the second electrode, and wherein the second substrate is bonded to the first substrate such that the first capacitor is stacked on the second capacitor. ... International Business Machines Corporation

12/14/17 / #20170358507

Fabrication of sacrificial interposer test structure

A sacrificial interposer test structure including a release layer, a dummy layer on the release layer, one or more conductive pads embedded in the dummy layer, wherein each of the one or more conductive pads has an exposed surface, and a tie layer on the dummy layer and on each exposed surface of the one or more conductive pads.. . ... International Business Machines Corporation

12/14/17 / #20170358498

Forming insulator fin structure in isolation region to support gate structures

A method for forming the semiconductor device that includes forming a plurality of composite fin structures across a semiconductor substrate including an active device region and an isolation region. The composite fin structures may include a semiconductor portion over the active device region and a dielectric portion over the isolation region. ... International Business Machines Corporation

12/14/17 / #20170358497

Fabrication of a vertical transistor with self-aligned bottom source/drain

A method of forming a vertical fin field effect transistor (vertical finfet) with a self-aligned bottom source/drain, including forming a doped layer on a substrate, forming one or more vertical fins on the doped layer, forming a protective layer on the one or more vertical fins, wherein the protective layer has a thickness, and forming at least one isolation trench by removing at least a portion of the protective layer on the doped layer, wherein the isolation trench is laterally offset from at least one of the one or more vertical fins by the thickness of the protective layer.. . ... International Business Machines Corporation

12/14/17 / #20170358496

Stress memorization technique for strain coupling enhancement in bulk finfet device

A method for forming strained fins includes etching trenches in a bulk substrate to form fins, filling the trenches with a dielectric fill and recessing the dielectric fill into the trenches to form shallow trench isolation regions. The fins are etched above the shallow trench isolation regions to form a staircase fin structure with narrow top portions of the fins. ... International Business Machines Corporation

12/14/17 / #20170358492

Self aligned conductive lines

A method for forming conductive lines on a wafer comprises forming a first sacrificial mandrel and a second sacrificial mandrel. Spacers are formed adjacent to the first and second sacrificial mandrels. ... International Business Machines Corporation

12/14/17 / #20170358487

Self aligned conductive lines

A method for forming conductive lines on a wafer comprises forming a first hardmask, a planarizing layer, a second hardmask, a layer of sacrificial mandrel material on the second hardmask, and patterning a mask on the layer of sacrificial material. A first sacrificial mandrel and a second sacrificial mandrel and a gap are formed. ... International Business Machines Corporation

12/14/17 / #20170358453

Material removal process for self-aligned contacts

A method is disclosed of removing a first material disposed over a second material adjacent to a field effect transistor gate having a gate sidewall layer that comprises an etch-resistant material on a gate sidewall. The method includes subjecting the first material to a gas cluster ion beam etch process to remove first material adjacent to the gate, and detecting exposure of the second material during the gas cluster ion beam (gcib) etch process.. ... International Business Machines Corporation

12/14/17 / #20170358369

Reference voltage calibration in memory during runtime

Embodiments herein describe a memory system that includes a dram module with a plurality of individual dram chips. In one embodiment, the dram chips are per dram addressable (pda) so that each dram chip can use a respective reference voltage (vref) value to decode received data signals (e.g., dq or ca signals). ... International Business Machines Corporation

12/14/17 / #20170358319

Detection of sensor-damaging magnetic tape recording media

A computer-implemented method for detecting sensor-damaging tape media, according to one embodiment, includes acquiring a metric for at least one sensor of a tape drive after performing an operation on a magnetic recording tape, and comparing the metric for the at least one sensor after performing the operation to a metric for the at least one sensor acquired before performing the operation. An action is taken in response to a result of the comparing indicating that a difference between the metrics is in a predetermined range. ... International Business Machines Corporation

12/14/17 / #20170358285

Composing music using foresight and planning

An approach is provided in which an information handling system configures a reinforcement learning model based inspiration selections received from a user. The information handling system performs training iterations using the configured reinforcement learning model, which generates multiple actions and multiple rewards corresponding to multiple actions. ... International Business Machines Corporation

12/14/17 / #20170358252

Dynamic display adjustment on a transparent flexible display

Embodiments of the present invention provide a method, computer program product, and a computer system for recommending one or more bend locations on a flexible display. According to one embodiment, the display is flexible and transparent, and the display includes at least one sensor. ... International Business Machines Corporation

12/14/17 / #20170358233

Teaching plan optimization

A method for teaching plan optimization includes initially loading a teaching plan into memory of a computer and then comparing the loaded teaching plan to a set of existing teaching plans disposed in fixed storage of the computer to identify an alternate teaching plan utilizing a presentation format that differs from a presentation format of the loaded teaching plan. Thereafter, the computer monitors a class response to the loaded teaching plan in order to determine an effectiveness of the loaded teaching plan. ... International Business Machines Corporation

12/14/17 / #20170358157

Using embedded electromagnetic signatures to monitor and authorize collection of printed material

Monitoring and authorizing collection of printed media. A print task is received. ... International Business Machines Corporation

12/14/17 / #20170358156

Using embedded electromagnetic signatures to monitor and authorize collection of printed material

Monitoring and authorizing collection of printed media. A print task is received. ... International Business Machines Corporation

12/14/17 / #20170358124

Kernel convolution for stencil computation optimization

Data processing techniques are provided to increase a computational speed of iterative computations that are performed over a domain of data points, such as stencil computations. For example, a method includes loading a set of domain data points into a cache memory; obtaining an iteration count t, and a base stencil operator having a first set of coefficients; generating a convolved stencil operator having a second set of coefficients, wherein the convolved stencil operator is generated by convolving the base stencil operator with itself at least one time; and iteratively processing the set of domain data points in the cache memory using the convolved stencil operator no more than t/2 iterations to obtain final processing results. ... International Business Machines Corporation

12/14/17 / #20170358096

Object tracking with a holographic projection

Approaches presented herein enable tracking a physical object with a holographic projection, and, more specifically, enhancing a view of an object by tracking the object with a 3-d holographic projection. A holographic object tracking projection system receives, from a sensor, a feed of an area containing a physical object and locates a position of the physical object in the area based on the feed. ... International Business Machines Corporation

12/14/17 / #20170358088

Detection of obstructions

A system and method for detecting obstructions. The system includes a camera coupled to a vehicle and configured to capture image data from a vehicle, and a computing device that includes a processor configured to: detect an edge of a roadway on which the vehicle is traveling; detect objects located proximate an edge of the roadway, based on the captured image data; determine a location of each detected object, based on the captured image data; calculate a distance between each detected object and the edge of the roadway; determine that at least one object of the detected objects is an obstruction, based on at least the calculated distance between each object of the at least one object and the edge of the roadway being below a threshold; and transmit a message to an external device, said message indicating the location of each detected object determined to be an obstruction.. ... International Business Machines Corporation

12/14/17 / #20170358075

Sequential learning technique for medical image segmentation

Sequential learning techniques, such as auto-context, that apply the output of an intermediate classifier as contextual features for its subsequent classifier have shown impressive performance for semantic segmentation. It is shown that these methods can be interpreted as an approximation technique derived from a bayesian formulation. ... International Business Machines Corporation

12/14/17 / #20170358038

Ensuring fairness in the operation of thermal grids

Methods, systems, and computer program products for ensuring fairness in the operation of thermal grids are provided herein. A computer-implemented method includes generating one or more models derived from information pertaining to a heating and cooling network, wherein the heating and cooling network comprises multiple consumers; categorizing each of the multiple consumers into one of two groups based on (i) one or more objectives of the heating and cooling network, (ii) the one or more generated models, and (iii) one or more constraints; generating a signal to be sent to each of the consumers categorized within a first of the two groups, wherein the signal comprises a temperature set-point adjustment proposal; and outputting the signals to the consumers categorized within the first of the two groups.. ... International Business Machines Corporation

12/14/17 / #20170358020

Informed food selection in a particular eating environment

A first unit of data associated with one or more sensor devices may be received. The first unit of data may identify food information about one or more food items. ... International Business Machines Corporation

12/14/17 / #20170358008

System, method and recording medium for updating and distributing advertisement

A method, system, and non-transitory computer readable medium for an advertisement distribution system, include an eye-reaction tracking circuit configured to track eye-reaction of a user for each of a plurality of advertisements of at least a first advertisement group on a web page displayed on a display device, a scoring circuit configured to calculate a score for each of the plurality of advertisements of the first advertisement group based on the tracked eye-reaction of the user, an auctioning circuit configured to conduct an auction to determine winning advertisements based on advertiser parameters received from a database and the score of each of the plurality of advisements during a same viewing session of the web page, and a distribution circuit configured to populate an empty advertisement group having a plurality of empty advertisement slots with the winning advertisements.. . ... International Business Machines Corporation

12/14/17 / #20170358004

System, method, and recording medium for location-based advertisement

A location-based advertisement method, system, and non-transitory computer readable medium, include a location-based advertisement system, including a gaze tracking circuit configured to track a gaze of a user relative to a plurality of advertisements displayed on content-serving devices to determine a focus level of the user with respect to each of the plurality of advertisements, a location detecting circuit configured to detect when a user is within a predetermined proximity of a location of a business having products related to the plurality of advertisements displayed on the content-serving devices, and an advertisement sending circuit configured to send a notification to the user based on the user being within the predetermined proximity of the location of the business and the plurality of ranked lists ranking the focus level of the user.. . ... International Business Machines Corporation

12/14/17 / #20170358002

System, method, and recording medium for advertisement remarketing

An advertisement remarketing method, system, and non-transitory computer readable medium, include a gaze tracking circuit configured to track a gaze of a user relative to a plurality of advertisements displayed on content-serving devices to determine a focus level of the user with respect to each of the plurality of advertisements, a list creating circuit configured to create a plurality of ranked lists ranking the focus level of the user for each of the plurality of advertisements, each of the plurality of ranked lists corresponding to a different content-serving device of the content-serving devices, and a remarketing circuit configured to remarket advertisements to the user on a user device based on the plurality of ranked lists.. . ... International Business Machines Corporation

12/14/17 / #20170358001

Revenue management using dynamic customer selection

Systems, methods, and computer-readable media for controlling the timing of customer interactions (e.g., targeted product or service offerings to customers) in order to determine optimally efficient usage of a seller's available inventory are disclosed. A customer selection problem (csp) may be formulated and solved to implement a customer selection policy for controlling the timing with which customers from a customer pool will be targeted with offerings. ... International Business Machines Corporation

12/14/17 / #20170357951

Authorizing cancelled meeting room action

An approach for authorizing a cancelled meeting room action includes receiving a notification of an unavailable meeting room for a scheduled meeting and determining a meeting context for the scheduled meeting based, on at least one of a meeting subject, a meeting agenda, a plurality of meeting minutes, or one or more meeting action items using at least one of natural language processing or semantic analysis. The approach includes determining whether an elapse time for a meeting room action is past for the scheduled meeting. ... International Business Machines Corporation

12/14/17 / #20170357949

Authorizing cancelled meeting room action

An approach for authorizing a cancelled meeting room action includes receiving a notification of an unavailable meeting room for a scheduled meeting. The approach includes determining whether a meeting room action is performed for the scheduled meeting and responsive to determining the meeting room action is not performed for the scheduled meeting, determining a first invitee on a prioritized list of a plurality of meeting invitees to provide with a temporary meeting room action authorization. ... International Business Machines Corporation

12/14/17 / #20170357935

Self-organizing software scan scheduling based on neural network cognitive classification

An approach for updating of a repetition frequency of a system scan operation. The approach calculates values of asset management factors based on results of the asset management factors from a current and a previously performed system scan operation. ... International Business Machines Corporation

12/14/17 / #20170357931

Smart calendaring - event proximity conflict identification

An approach, for calendaring event proximity conflict identification. An event conflict identifier receives an instruction to add a second calendar event to a user calendar. ... International Business Machines Corporation

12/14/17 / #20170357922

Personalized behavior-driven dynamic risk management with constrained service capacity

A method is provided for personalized behavioral-driven event management. The method includes determining, by a processor, derivative behaviors from user behavioral data for one or more users. ... International Business Machines Corporation

12/14/17 / #20170357906

Processing un-typed triple store data

A method, executed by a computer, includes determining within a collection of triples, triples that have a common first entity type and a common predicate to produce similar triples, determining similar triples that have a particular second entity type to produce matching triples, counting the similar triples and the matching triples to produce a similar triple count and a matching triple count, computing probability information based on the matching triple count and the similar triple count, and processing data based on the probability information. A computer system and computer program product corresponding to the method are also disclosed herein.. ... International Business Machines Corporation

12/14/17 / #20170357875

Detecting usage of copyrighted video content using object recognition

Techniques detecting usage of copyrighted video content using object recognition are provided. In one example, a computer-implemented method comprises determining, by a system operatively coupled to a processor, digest information for a video, wherein the digest information comprises objects appearing in the video and respective times at which the objects appear in the video. ... International Business Machines Corporation

12/14/17 / #20170357862

Methods and systems for moving traffic obstacle detection

The disclosure provides systems and methods for detecting, characterizing, and predicting moving traffic obstacles. The systems and methods are suitable for densely populated areas in resource-constrained regions. ... International Business Machines Corporation

12/14/17 / #20170357852

Non-sequential comparison of documents

Embodiments of the present disclosure relate to non-sequential document comparison. A first plurality of segments in a first document and a second plurality of segments in a second document are obtained. ... International Business Machines Corporation

12/14/17 / #20170357846

System, method, and recording medium for workforce performance management

A break recommendation method, system, and non-transitory computer readable medium, include a cognitive state tracking circuit configured to track a cognitive state of a user viewing a document, a document identification and difficulty measuring circuit configured to identify a document type, a deviation detecting circuit configured to detect a deviation between a current cognitive state of the user and a past cognitive state of the user during a predetermined amount of time for the document type; and a recommending circuit configured to recommend that the user stop viewing the document for a predetermined amount of time based on the deviation being greater than a predetermined threshold value.. . ... International Business Machines Corporation

12/14/17 / #20170357781

File origin determination

A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. ... International Business Machines Corporation

12/14/17 / #20170357780

File origin determination

A file validation method and system is provided. The method includes retrieving from an authoritative source system, an artifact file. ... International Business Machines Corporation

12/14/17 / #20170357747

Dynamic microprocessor gate design tool for area/timing margin control

A computer-implemented method for optimizing microprocessor gates in a microprocessor includes receiving, via a processor, a dataset comprising a model of a plurality of gates of a microprocessor; determining, via the processor, whether a transmission line in the model, if implemented in a physical circuit, would result a signal transmission time less than a predetermined threshold time; applying to the model, via the processor, a proposed gate change to one or more of the plurality of gates; evaluating, via the processor and an area degradation based on the proposed gate change; determining, via the processor, a margin value based on the signal transmission time and an area degradation value; and making, via the processor, a gate change decision based on the margin value.. . ... International Business Machines Corporation

12/14/17 / #20170357744

Global routing framework of integrated circuit based on localized routing optimization

The present disclosure relates to methods, processing systems and computer program products of global routing of integrated circuits based on localized routing optimization. In certain embodiments, the method may include one or more of: defining one or more regions, one or more netgroups, and combinations thereof of an integrated circuit, associating at least one optimization objective with each region and/or each netgroup defined, generating one or more constraints for each region and/or each netgroup based on the associated optimization objectives, and performing global routing of the integrated circuit according to the one or more constraints.. ... International Business Machines Corporation

12/14/17 / #20170357730

Managing structuring of large sets of unstructured data

Embodiments include method, systems and computer program products for managing structuring of large sets of unstructured data. In some embodiments, a search query may be received from a user via a graphical user interface (gui). ... International Business Machines Corporation

12/14/17 / #20170357724

Model independent and network structure driven ranking of nodes for limiting the spread of misinformation through location based social networks

A method of limiting misinformation spread through a social network structure using a ranking of nodes of a targeted portion of a social network. Limiting the misinformation spread may be accomplished by: generating a set of permutations of the nodes of the targeted social network; computing a contribution to the spread of influence of each node within the set of randomly generated permutations; determining the average contribution of each of the nodes towards a spread of information within the network; constructing a list of ranked nodes by sorting the nodes in a non-increasing order based on contribution values; and disconnecting at least some of the nodes in order of rank in the list.. ... International Business Machines Corporation

12/14/17 / #20170357695

Securing physical environments through combinatorial analytics

For securing a physical environment, an intersection determination is performed using a first record of a first person and a second record of a second person, to determine whether a travel plan of the first person and a travel plan of the second person intersect at a location and a time. When the intersection determination is affirmative, an analysis is performed whether a first object associated with the first person and a second object associated with the second person are combinable to form a combined object having a combined property. ... International Business Machines Corporation

12/14/17 / #20170357691

Managing data obsolescence in relational databases

Data obsolescence is managed using a bitmap or bit array index which is associated with a table during an obsolescence control period. A table is selected to undergo obsolescence control for a period of time. ... International Business Machines Corporation

12/14/17 / #20170357690

Processing un-typed triple store data

A method, executed by a computer, includes receiving a triple comprising a predicate, a first entity and an un-typed second entity, scanning a collection of triples for triples that match the predicate of the triple to produce similar triples, determining frequency information for second entity types referenced by the similar triples, and processing the un-typed second entity using the frequency information. A computer system and computer program product corresponding to the method are also disclosed herein.. ... International Business Machines Corporation

12/14/17 / #20170357677

Querying and projecting values within sets in a table dataset

Embodiments of the present invention provide systems and methods for visualizing and querying data. Data subsets within an original table are examined. ... International Business Machines Corporation

12/14/17 / #20170357666

Implementing queues (fifo) and stacks (filo) on top dispersed storage

A computing device includes an interface to communicate with a dispersed storage network (dsn), a memory, and a processing module. The computing device receives, from another computing device, a write queue entry request to facilitate storage of one or more queue entries of a queue in a set of storage units (sus). ... International Business Machines Corporation

12/14/17 / #20170357653

Unsupervised method for enriching rdf data sources from denormalized data

A method for unsupervised transformation of denormalized data into rdf data includes summarizing an existing resource description framework (rdf) file wherein a data summary file is produced, wherein said rdf file includes a plurality of nodes, property labels, and literals and is represented as a directed graph, and said data summary file is a graph that includes a single instance of each node-property-literal triple in the rdf file; analyzing a plurality of denormalized records wherein a record summary is produced, wherein said record summary is represented as a directed graph with a root node corresponding to each record connected to a node for each field in the record; determining one or more transformation patterns that match elements of the record summary to elements of the data summary; and transforming the plurality of denormalized records into a new rdf file by executing one of the one or more transformation patterns.. . ... International Business Machines Corporation

12/14/17 / #20170357624

Generating a document object model (dom) differential

Generating a document object model (dom) differential is provided. In response to receiving a webpage, a snapshot is generated of a base dom corresponding to the webpage. ... International Business Machines Corporation

12/14/17 / #20170357614

Virtualizing tcp/ip services with shared memory transport

A method for testing a client service locally using a shared memory transport is presented. The method may include recording a plurality of interactions between the client service located in a local host and a real server. ... International Business Machines Corporation

12/14/17 / #20170357613

Virtualizing tcp/ip services with shared memory transport

A method for testing a client service locally using a shared memory transport is presented. The method may include recording a plurality of interactions between the client service located in a local host and a real server. ... International Business Machines Corporation

12/14/17 / #20170357555

Managing the execution of software applications running on devices having device functions

A computer-implemented method includes running a software unit in an isolation container located on a software platform. The computer-implemented method further includes allocating an instance of a device function instantiated by the software platform to the software unit. ... International Business Machines Corporation

12/14/17 / #20170357550

Creating a full backup image from incremental backups

A full backup copy of a storage volume can be created from only incremental backups of the storage volume. A bitmap can be created that includes a set of depopulated indicator locations configured to contain a set of indicators, where each indicator location represents a corresponding portion of the storage volume. ... International Business Machines Corporation

12/14/17 / #20170357548

Multiple wireless communication systems stream slices based on geography

A computing device includes an interface to communicate with a dispersed storage network (dsn), a memory, and a processing module. The computing device receives less than a decode threshold number of encoded data slices (edss) of a set of edss corresponding to a data object. ... International Business Machines Corporation

12/14/17 / #20170357546

Slice location identification

A method for execution by a dispersed storage and task (dst) client module includes obtaining a data identifier for slice location identification. A source name corresponding to the data identifier is identified. ... International Business Machines Corporation

12/14/17 / #20170357542

Method and apparatus for failure detection in storage system

The present disclosure relates to a method and an apparatus for failure detection in a storage system. One embodiment provides a method for failure detection in a storage system. ... International Business Machines Corporation

12/14/17 / #20170357526

Techniques for hybrid computer thread creation and management

A technique for operating a computer system to support an application, a first application server environment, and a second application server environment includes intercepting a work request relating to the application issued to the first application server environment prior to execution of the work request. A thread adapted for execution in the first application server environment is created. ... International Business Machines Corporation

12/14/17 / #20170357518

Modifying an appearance of a gui to improve gui usability

A method, system, and/or computer program product modifies an appearance of a graphical user interface (gui) for a user. One or more processors determine a user context and a cognitive state of a user and identify a preferred focal point for the user. ... International Business Machines Corporation

12/14/17 / #20170357513

Transmitting data between execution slices of a multi-slice processor

Methods and apparatus for transmitting data between execution slices of a multi-slice processor including receiving, by an execution slice, a broadcast message comprising an instruction tag (itag) for a producer instruction, a latency, and a source identifier; determining that an issue queue in the execution slice comprises an itag for a consumer instruction, wherein the consumer instruction depends on result data from the producer instruction; calculating a cycle countdown using the latency and the source identifier; determining that the cycle countdown has expired; and in response to determining that the cycle countdown has expired, reading the result data from the producer instruction.. . ... International Business Machines Corporation

12/14/17 / #20170357508

Operation of a multi-slice processor implementing simultaneous two-target loads and stores

Operation of a multi-slice processor that includes a plurality of execution slices and a load/store superslice, where the load/store superslice includes a set predict array, a first load/store slice, and a second load/store slice. Operation of such a multi-slice processor includes: receiving a two-target load instruction directed to the first load/store slice and a store instruction directed to the second load/store slice; determining a first subset of ports of the set predict array as inputs for an effective address for the two-target load instruction; determining a second subset of ports of the set predict array as inputs for an effective address for the store instruction; and generating, in dependence upon logic corresponding to the set predict array that is less than logic implementing an entire load/store slice, output for performing the two-target load instruction in parallel with generating output for performing the store instruction.. ... International Business Machines Corporation

12/14/17 / #20170357507

Operation of a multi-slice processor implementing simultaneous two-target loads and stores

Operation of a multi-slice processor that includes a plurality of execution slices and a load/store superslice, where the load/store superslice includes a set predict array, a first load/store slice, and a second load/store slice. Operation of such a multi-slice processor includes: receiving a two-target load instruction directed to the first load/store slice and a store instruction directed to the second load/store slice; determining a first subset of ports of the set predict array as inputs for an effective address for the two-target load instruction; determining a second subset of ports of the set predict array as inputs for an effective address for the store instruction; and generating, in dependence upon logic corresponding to the set predict array that is less than logic implementing an entire load/store slice, output for performing the two-target load instruction in parallel with generating output for performing the store instruction.. ... International Business Machines Corporation

12/14/17 / #20170357494

Code-level module verification

A method for verifying that software modules have a consistent code level is disclosed. In one embodiment, such a method includes updating a software product comprising a plurality of software modules. ... International Business Machines Corporation

12/14/17 / #20170357486

Enhancing a crowdsourced integrated development environment application

A method and associated systems for enhancing a crowdsourced integrated development environment (ide). A computerized component of the ide receives a block of annotated source code from a user who seeks to solve a software problem embodied by the source code. ... International Business Machines Corporation

12/14/17 / #20170357485

Optimizing a build process by scaling build agents based on system need

A method and system for optimizing a software-project build process are disclosed. A build-optimization system identifies build-dependency relationships between modules of a software project. ... International Business Machines Corporation

12/14/17 / #20170357451

Responding to recall operations based on file migration time

Embodiments of the present invention provide methods, systems, and computer program products for responding to recall operations based on a file migration time. In one embodiment, it is determined whether the number of recall requests (r) is equal to the number of storage drives in an idle state, and if the number of recall requests (r) is equal to the number of storage drives in an idle state, the storage drive(s) that are in the idle state are assigned as having the shortest time to complete a requested recall operation. ... International Business Machines Corporation

12/14/17 / #20170357445

Flexible optimized data handling in systems with multiple memories

Methods and systems for optimizing an application for a computing system having multiple distinct memory locations that are interconnected by one or more communication channels include determining one or more data handling properties for a data region in an application. One or more data handling policies for the data region are determined based on the one or more data handling properties. ... International Business Machines Corporation

12/14/17 / #20170357444

Efficient temporary dynamic anchor points within and between application document(s)

Navigating within a document to a specific cursor location within an open document which a user has marked with a temporary anchor point by receiving a retrieval keystroke within the document from the user; verifying the retrieval keystroke relates to a temporary anchor point; and based on the verified retrieval keystroke, a computer moving a cursor to the location within the document at which the temporary anchor point associated with the verified retrieval keystroke is located, without additional user interaction with the open document.. . ... International Business Machines Corporation

12/14/17 / #20170357410

Text extraction on graphs

Techniques are described for text extraction on graphs. In one example, techniques include receiving a graphical representation of data, the graphical representation of data being a format other than a spreadsheet or table; and receiving user input selecting a portion of the graphical representation of data; and generating one or more text analytics rules based on the selected portion. ... International Business Machines Corporation

12/14/17 / #20170357408

Location-based home screen customization

Systems, methods, and computer program products to perform an operation comprising identifying at least one rule for a home screen of a mobile device, wherein the at least one rule is determined based on a current location of a mobile device, identifying a modification for a first object displayed on the home screen of the mobile device, wherein the modification is associated with the at least one rule and the current location of the mobile device, applying the modification to the first object, and outputting the home screen on the mobile device, wherein the outputted home screen includes the modified first object.. . ... International Business Machines Corporation

12/14/17 / #20170357326

Wearable device positioning based control

A method and system for positioning based device control. The method includes receiving device control instructions associated with function control of a device based on a positioning of a wearable hardware device of a user. ... International Business Machines Corporation

12/14/17 / #20170357297

Cooling device with nested chambers for computer hardware

The present invention is notably directed to a cooling device, e.g., for computer hardware. The device comprises a deformable, outer chamber, having at least one thermally conducting section, the latter suited for thermally contacting a heat source of a computer hardware. ... International Business Machines Corporation

12/14/17 / #20170357274

Garment optimization

A garment being worn by a user is optimized by altering a feature of a garment including texture, shape and size, while the garment is still being worn by the user.. . ... International Business Machines Corporation

12/14/17 / #20170357230

Automated irrigation control system

An automated irrigation control comprising crop sensor physically attached to a crop and a light sensitive sensor having a photo-detector for monitoring light intensity of a crop, an irrigation conduit extending along the span of the irrigation zone and adapted to carry fluid, with one or more controllable valves and sensors, growth sensors placed in close proximity of the crop sensors, a computer control system, an irrigation controller, and a communications link between the computer control system, the one or more crop sensor, the three or more growth sensors, and the irrigation controller.. . ... International Business Machines Corporation

12/14/17 / #20170357001

Surveying physical environments and monitoring physical events

A computer-implemented method includes receiving surveying data from a proximity barrier survey device. The proximity barrier survey device is mounted to a package. ... International Business Machines Corporation

12/14/17 / #20170356959

Implementing decreased scan data interdependence for compressed patterns in on product multiple input signature register (opmisr) through scan skewing

A method and circuit for implementing enhanced scan data testing with decreased scan data interdependence for compressed patterns in on product multiple input signature register (opmisr) testing through scan skewing, and a design structure on which the subject circuit resides are provided. The circuit is divided into multiple chiplets. ... International Business Machines Corporation

12/14/17 / #20170356933

Probe card assembly

A probe card assembly for nondestructive integrated circuit testing is disclosed. The probe card assembly includes an outer gimbal bearing with a tapered bearing surface being mounted on a top surface of a printed circuit board. ... International Business Machines Corporation

12/14/17 / #20170356851

Patch clamp technique with complementary raman spectroscopy

Surface enhanced raman spectroscopy is employed to obtain chemical data with respect to cells while electrophysiological data relating to cell membranes is obtained using the patch clamp technique. A sers-facilitating assembly is coupled to a micropipette and is used in conjunction with a monochromatic light source for generating scattered light. ... International Business Machines Corporation

12/14/17 / #20170356811

Approach to measuring strain effects using ring oscillators

A ring oscillator system for characterizing substrate strain including, a substrate including a through-substrate-via, at least two ring oscillators, wherein a first ring oscillator is closer to the through-substrate-via than a second ring oscillator, and a logic difference circuit that is configured to receive an input from at least the first ring oscillator and the second ring oscillator, and detect a difference between the signal frequency of the first ring oscillator and the signal frequency of the second ring oscillator.. . ... International Business Machines Corporation

12/14/17 / #20170355800

Flame-retardant impact modifier

In an example, a material includes a cellulosic nanomaterial and multiple polymer chains chemically bonded to the cellulosic nanomaterial. Each polymer chain includes a styrene-butadiene copolymer.. ... International Business Machines Corporation

12/14/17 / #20170355459

Unmanned aerial vehicle coupling apparatus for drone coupling with vehicles

An unmanned aerial vehicle coupling apparatus for drone coupling. The unmanned aerial vehicle coupling apparatus includes a processor-based monitoring device to monitor values for each of a plurality of functions provided by a unmanned aerial vehicle and to detect when a value exceeds a predetermined threshold value, a vehicle selector to receive travel routes from each of a plurality of secondary vehicles and to select a secondary vehicle based on a travel route of the secondary vehicle when the value exceeds the predetermined threshold value, and a coupling mechanism to fasten and unfasten the unmanned aerial vehicle to the secondary vehicle.. ... International Business Machines Corporation

12/14/17 / #20170354140

Lateral silicon nanospikes fabricated using metal-assisted chemical etching

The present disclosure relates to methods for forming an antimicrobial nanostructure and antimicrobial articles. The methods may include: providing a master template of a layout of the antimicrobial nanostructure on a silicon substrate, depositing a silicon nitride layer on a top surface of the silicon substrate, forming a patterned lithographic resist mask layer on a top surface of the silicon nitride layer, generating certain silicon pillars according to the patterned lithographic resist mask using a resist and reactive ion etching, forming certain lateral silicon nanospikes on the silicon pillars by performing metal assisted chemical etching (macetch), and removing the silicon nitride layer and bonding a top cover glass on the silicon pillars to form the antimicrobial nanostructure having lateral silicon nanospikes. ... International Business Machines Corporation

12/07/17 / #a polymeric material comprising a polyethylenimine-based material including the following moiety:

International Business Machines Corporation

. . ... International Business Machines Corporation

12/07/17 / #20170354072

Module installation alignment device

A module installation assembly for installing a module into a socket of a land grid array includes a tool having a mounting bracket for connecting the tool to an adjacent fixture, an alignment member connected to the mounting bracket, and cavity defined at least partially by the alignment member. The cavity is substantially aligned with a socket of the land grid array such that the module is configured to pass through the cavity when being connected to the socket.. ... International Business Machines Corporation

12/07/17 / #20170354058

Server cooling system without the use of vapor compression refrigeration

A system, method, and computer product for cooling a server center without the use of vapor compression refrigeration. An example embodiment involves using outdoor ambient air to cool first server components directly and to cool heat exchanges containing liquid used to cool second server components.. ... International Business Machines Corporation

12/07/17 / #20170354043

Heating of printed circuit board core during laminate cure

A multi-layer printed circuit board (pcb) includes a laminate between a pcb heating core and a pcb signal core. The pcb heating core includes an electrically conductive resistive heating element upon a first core substrate. ... International Business Machines Corporation

12/07/17 / #20170353966

Wireless cross-connect switch

A wireless packet switch and methods for controlling the same include a multiple port controllers, each in communication with a respective wireless transceiver, configured to analyze data streams to and from the respective wireless transceiver; a cross-connect switch in communication with all of the port controllers, configured to provide connections between respective port controllers; an arbiter, in communication with all of the port controllers and with the cross-connect switch, configured to control the cross-connect switch, such that the cross-connect switch connects data streams of the port controllers in accordance with packet destination information and scheduling information from the port controllers.. . ... International Business Machines Corporation

12/07/17 / #20170353886

Virtual switch-based congestion control for multiple tcp flows

At an application executing in conjunction with a vswitch a determination is made that a first flow from a first vm is experiencing congestion. The first flow is selected for throttling. ... International Business Machines Corporation

12/07/17 / #20170353840

Cognitive scheduling of text message availability

A first message is received at a device at a first time. A textual content of the first message is analyzed to determine a language structure of the textual content. ... International Business Machines Corporation

12/07/17 / #20170353814

Automatic system and method for conversion of smart phone applications to basic phone applications

A system and method is disclosed for converting smart cell phone applications to applications that operate on basic cell phones. The invention has a classifying process that classifies one or more functions of a cell phone application into those functions capable being performing by a basic cell phone and those functions, missing functions, that can not be performed by a basic cell phone. ... International Business Machines Corporation

12/07/17 / #20170353602

Populating contact information on an electronic communication device

Approaches presented herein enable automatically populating contact information of a previously unknown caller/sender in a contact list of an electronic communication device based on a communication (e.g., incoming call or communication message(s)) from the caller/sender. Specifically, a recipient communication device receives a communication (i.e., incoming call or communication message) from a user (i.e., caller or sender) using a sender communication device. ... International Business Machines Corporation

12/07/17 / #20170353601

Caller relationship and risk assessment

The method includes identifying, by one or more computer processors, incoming data related to a source. The method further includes identifying, by one or more computer processors, data related to a recipient of incoming data from the source. ... International Business Machines Corporation

12/07/17 / #20170353580

Routing vault access requests in a dispersed storage network

A method for execution by a dispersed storage and task (dst) execution unit that includes a processor includes receiving a vault access request indicating a first one of a plurality of vaults. Processing unit options data that indicates a set of dst processing units is generated based on an access cache that includes a plurality of access entries, where each dst processing unit in the set of dst processing units is indicated in a first one of the plurality of access entries, and where the first one of the plurality of access entries further indicates the first one of the plurality of vaults. ... International Business Machines Corporation

12/07/17 / #20170353575

Caching for unique combination reads in a dispersed storage network

A method includes receiving a first access request that indicates a first data object stored as encoded slices in a plurality of storage units. A first desired slice set is selected, based on the requesting module, that includes a first subset of encoded slices of the first data object. ... International Business Machines Corporation

12/07/17 / #20170353569

Generating push notifications

A computer-implemented method includes identifying two or more user devices. Each of the two or more user devices are configured to receive push notifications. ... International Business Machines Corporation

12/07/17 / #20170353568

Generating push notifications

A computer-implemented method includes identifying two or more user devices. Each of the two or more user devices are configured to receive push notifications. ... International Business Machines Corporation

12/07/17 / #20170353553

Indicating multiple encoding schemes in a dispersed storage network

A method includes transmitting a first write request that includes a first encoded data slice of a first data object encoded under a first encoding scheme, and a first slice identifier corresponding to the first encoded data slice assigned to a first memory location of a distributed storage network (dsn) based on the first slice identifier. A second write request that includes a second encoded data slice of the first data object encoded under a second encoding scheme, and a second slice identifier corresponding to the second encoded data slice, is transmitted, and the second encoded data slice is assigned to a second memory location of the dsn based on the second slice identifier. ... International Business Machines Corporation

12/07/17 / #20170353552

Selecting storage units in one or more dispersed storage networks

A method includes identifying a data access issue between a computing device and a first set of storage units regarding a data object. The method further includes determining whether the computing device will have a lessened data access issue with a second set of storage units. ... International Business Machines Corporation

12/07/17 / #20170353551

Distributed server election with imperfect clock synchronization

Embodiments of the invention provide a method, system, and computer program product for selecting a server as a selected server for performing a specified function in a distributed computing system. In one embodiment, the method comprises identifying a group of servers in the system; and choosing as the selected server the server that has been in the system the longest. ... International Business Machines Corporation

12/07/17 / #20170353547

Efficient maintenance of a distributed system membership view

A method, system and computer program product are disclosed for maintaining a membership view of a distributed computing system comprising a multitude of members, wherein each of said members sends out a message indicating that said each of the members is available in the system. In one embodiment, the method comprises maintaining a first list of at least some of the members in the distributed system; and over a period of time, when one of the members sends out the message indicating that said one of the members is available in the distributed system, adding said one of the members to a second list. ... International Business Machines Corporation

12/07/17 / #20170353543

Autonomous and adaptive monitoring of workloads

As disclosed herein a computer-implemented method includes determining an initial workload configuration corresponding to a workload and requesting a new custom monitoring agent and a new custom monitoring profile corresponding to the initial workload configuration, and determining updated monitor tuning information corresponding to the workload. The method further includes updating one or more monitoring thresholds according to updated monitor tuning information responsive to determining the workload configuration has changed, requesting a new monitoring agent that includes a monitor corresponding to a changed workload configuration, and installing the new monitoring agent in the workload. ... International Business Machines Corporation

12/07/17 / #20170353538

Load balancing of distributed services

Various embodiments load balance service requests across one or more servers. In one embodiment, a service requestor directly accesses a shared metrics array stored in at least one server of a plurality of servers in a service cluster. ... International Business Machines Corporation

12/07/17 / #20170353529

Preferred contact decision service

In an approach for determining a preferred communication channel, the computer receives a query that includes a unique client identifier. The computer retrieves one or more communication channels from an entry within a data repository, wherein the entry is associated with the received query. ... International Business Machines Corporation

12/07/17 / #20170353527

Migration of data storage

An operable mechanism implements a stub utility to facilitate the migration of stub files, where the stub utility is integrated with a data storage product and a data storage technique of an existing storage site containing the stub files. The stub utility identifies the stub files and uses virtualization to migrate the stub files to a new storage site without concomitantly recalling or accessing source files linked to the stub files.. ... International Business Machines Corporation

12/07/17 / #20170353526

Migration of data storage

An operable mechanism implements a stub utility to facilitate the migration of stub files, where the stub utility is integrated with a data storage product and a data storage technique of an existing storage site containing the stub files. The stub utility identifies the stub files and uses virtualization to migrate the stub files to a new storage site without concomitantly recalling or accessing source files linked to the stub files.. ... International Business Machines Corporation

12/07/17 / #20170353495

System, method, and recording medium for moving target defense

A network management method, system, and non-transitory computer readable medium, include a data center gateway including a set of rules for moving target defense and communicates with a service provider and a cloud gateway including the set of rules to communicate with the data center gateway by satisfying the moving target defense such that a client receives a service from the service provider when the cloud gateway requests the service from the data center gateway.. . ... International Business Machines Corporation

12/07/17 / #20170353480

Network security apparatus and method of detecting malicious behavior in computer networks via cost-sensitive and connectivity constrained classification

A network security apparatus includes a packet detector detecting transmission of data packets between a plurality of hosts and a plurality of domains and defining a plurality of links therefrom. A model builder circuit receives the plurality of links from the packet detector, receives ground truth information labeling one or more of the plurality of hosts or one or more of the plurality of domains as benign or malicious, generates predictive models from the received links and ground truth information, and stores generated predictive models in a predictive model database. ... International Business Machines Corporation

12/07/17 / #20170353465

Handling potential service load interruptions by presenting action items for service requester to complete to increase time to address potential service load interruption

A method, system and computer program product for handling potential service load interruptions. The utilization of resources, such as servers in a service infrastructure of a saas provider, are monitored. ... International Business Machines Corporation

12/07/17 / #20170353456

Controlling access to a vault server in a multitenant environment

A computer-implemented method includes: receiving, by a computing device, a vault access request for vault credentials stored by a vault server; verifying, by the computing device, whether a source of the vault access request originated from a multitenant application server; preventing, by the computing device, access to the vault server and the vault credentials when the source of the vault access request has not been verified as originating from the multitenant application server; obtaining, by the computing device, vault credentials from a vault server based on verifying that the source of the vault access request originated from the multitenant application server; and executing, by the computing device, a multitenant application task using the vault credentials.. . ... International Business Machines Corporation

12/07/17 / #20170353450

Protection and verification of user authentication credentials against server compromise

Authenticating a user is provided. A decryption key corresponding to an authentication account of the user of a client device and authentication credential data obtained from the user of the client device is received during authentication. ... International Business Machines Corporation

12/07/17 / #20170353447

Sso functionality by means of a temporary password and out-of-band communications

A system and method for using a single-use password to add sso functionality to a service of a service provider belonging to an f-sso federation that does not support f-sso functionality for the service. In response to receiving notification from an identity provider that a user has requested access to the service, the service provider uses information provided by the identity provider to identify and authenticate the user, and then uses standard api calls to create and send a temporary password to the user. ... International Business Machines Corporation

12/07/17 / #20170353396

Grouping of tasks for distribution among processing entities

A plurality of processing entities are maintained. A plurality of task control block (tcb) groups are generated, wherein each of the plurality of tcb groups are restricted to one or more different processing entities of the plurality of processing entities. ... International Business Machines Corporation

12/07/17 / #20170353373

Middlebox tracing in software defined networks

At an sdn controller executing using a processor and a memory, a tracing packet is configured with a default value in a tag field. The tracing packet is inserted from the sdn controller into the sdn at a switch in the sdn. ... International Business Machines Corporation

12/07/17 / #20170353348

Application resiliency using apis

An approach is provided for managing resiliency of an application. Based on information specifying services provided by service providers (sps) which is stored in a configuration management database, a topology mapping a first service provided by a first sp to a second service provided by a second sp is generated. ... International Business Machines Corporation

12/07/17 / #20170353333

Nested feed-forward optical equalization using an electro-optic modulator with a multi-segment electrode

A method and system of optical communication are provided. An optical modulator device includes a first and a second waveguide segment, and is configured to modulate an incident optical signal. ... International Business Machines Corporation

12/07/17 / #20170353313

Controlling execution of software by combining secure boot and trusted boot features

Controlling execution of software is provided. In response to receiving an input to execute a software module on a data processing system, a set of measurements are performed on the software module performing a process to prepare the software module for execution on the data processing system. ... International Business Machines Corporation

12/07/17 / #20170353307

Using everyday objects as cryptographic keys

This disclosure involves the notion of using physical objects to generate public key-based authenticators and, in particular, to use “everyday” physical objects to create a generator seed for a key generator that will use that seed to generate a key pair comprising a public key, and its associated private key. In a preferred approach, the physical object is used to create a digital representation (of the physical object) that, together with some uniqueness associated to the user, gives rise to a key generator seed value. ... International Business Machines Corporation

12/07/17 / #20170353059

Power transmitting device, power receiving device, power supply system, and power supply method

Provided are a power transmitting device, a power receiving device, a power supply system, and a power supply method able to supply electric power by emitting electromagnetic waves. A power transmitting device comprises: a calculating unit for calculating the maximum value for the emitted output of electromagnetic waves meeting exposure standards on the basis of a response delay time measured by the communication link between the power transmitting device and a power receiving device; a power transmitting unit for transmitting power via a power supply link with the power receiving device at an output not exceeding the maximum value; an anomaly detecting unit for detecting an anomaly in the power supply link on the basis of communication with the power receiving device via the communication link; and an output control unit for controlling the output on the basis of the detection of an anomaly in the power supply link.. ... International Business Machines Corporation

12/07/17 / #20170353058

Power transmitting device, power receiving device, power supply system, and power supply method

Provided are a power transmitting device, a power receiving device, a power supply system, and a power supply method able to supply electric power by emitting electromagnetic waves. A power transmitting device comprises: a calculating unit for calculating the maximum value for the emitted output of electromagnetic waves meeting exposure standards on the basis of a response delay time measured by the communication link between the power transmitting device and a power receiving device; a power transmitting unit for transmitting power via a power supply link with the power receiving device at an output not exceeding the maximum value; an anomaly detecting unit for detecting an anomaly in the power supply link on the basis of communication with the power receiving device via the communication link; and an output control unit for controlling the output on the basis of the detection of an anomaly in the power supply link.. ... International Business Machines Corporation

12/07/17 / #20170353057

Power transmitting device, power receiving device, power supply system, and power supply method

Provided are a power transmitting device, a power receiving device, a power supply system, and a power supply method able to supply electric power by emitting electromagnetic waves. A power transmitting device comprises: a calculating unit for calculating the maximum value for the emitted output of electromagnetic waves meeting exposure standards on the basis of a response delay time measured by the communication link between the power transmitting device and a power receiving device; a power transmitting unit for transmitting power via a power supply link with the power receiving device at an output not exceeding the maximum value; an anomaly detecting unit for detecting an anomaly in the power supply link on the basis of communication with the power receiving device via the communication link; and an output control unit for controlling the output on the basis of the detection of an anomaly in the power supply link.. ... International Business Machines Corporation

12/07/17 / #20170352803

Double spin filter tunnel junction

A memory device that includes a first magnetic insulating tunnel barrier reference layer present on a first non-magnetic metal electrode, and a free magnetic metal layer present on the first magnetic insulating tunnel barrier reference layer. A second magnetic insulating tunnel barrier reference layer may be present on the free magnetic metal layer, and a second non-magnetic metal electrode may be present on the second magnetic insulating tunnel barrier. ... International Business Machines Corporation

12/07/17 / #20170352770

Photovoltaic devices with increased efficiency and methods for making the same

A photovoltaic device with increased efficiency and a method for making the same. The present invention provides a photovoltaic device including: a transparent substrate; a transparent conductive electrode layer disposed on the transparent substrate; an n-type layer disposed on the transparent conductive electrode layer; a chalcogen absorber layer disposed on the n-type layer; a p-type molybdenum trioxide (moo3) interlayer disposed on the chalcogen absorber layer; and a conductive layer disposed on the interlayer. ... International Business Machines Corporation

12/07/17 / #20170352751

Single-electron transistor with self-aligned coulomb blockade

Semiconductor devices and methods of making the same include forming a gate structure on a thin semiconductor layer. Additional semiconductor material is formed on the thin semiconductor layer. ... International Business Machines Corporation

12/07/17 / #20170352744

Fin field effect transistor fabrication and devices having inverted t-shaped gate

A method of forming a fin field effect transistor (finfet), including forming a temporary gate structure having a sacrificial gate layer and a dummy gate layer on the sacrificial gate layer, forming a gate spacer layer on each sidewall of the temporary gate structure, forming a source/drain spacer layer on the outward-facing sidewall of each gate spacer layer, removing the dummy gate layer to expose the sacrificial gate layer, removing the sacrificial gate layer to form a plurality of recessed cavities, and forming a gate structure, where the gate structure occupies at least a portion of the plurality of recessed cavities.. . ... International Business Machines Corporation

12/07/17 / #20170352743

Vertical field effect transistors with bottom source/drain epitaxy

A vertical fin field-effect-transistor and a method for fabricating the same. The vertical fin field-effect-transistor includes a substrate, a first source/drain layer including a plurality of pillar structures, and a plurality of fins disposed on and in contact with the plurality of pillar structures. ... International Business Machines Corporation

12/07/17 / #20170352742

Vertical field effect transistors with bottom source/drain epitaxy

A vertical fin field-effect-transistor and a method for fabricating the same. The vertical fin field-effect-transistor includes a substrate, a first source/drain layer including a plurality of pillar structures, and a plurality of fins disposed on and in contact with the plurality of pillar structures. ... International Business Machines Corporation

12/07/17 / #20170352738

Contact formation on germanium-containing substrates using hydrogenated silicon

A method and structure is provided in which germanium or a germanium tin alloy can be used as a channel material in either planar or non-planar architectures, with a functional gate structure formed utilizing either a gate first or gate last process. After formation of the functional gate structure, and contact openings within a middle-of-the-line (mol) dielectric material, a hydrogenated silicon layer is formed that includes hydrogenated crystalline silicon regions disposed over the germanium or a germanium tin alloy, and hydrogenated amorphous silicon regions disposed over dielectric material. ... International Business Machines Corporation

12/07/17 / #20170352734

Spatially decoupled floating gate semiconductor device

A method includes forming a tunneling dielectric layer on a semiconductor substrate, a first portion of the tunneling dielectric layer is directly above a channel region in the semiconductor substrate and a second portion of the tunneling dielectric layer is directly above source-drain regions located on opposing sides of the channel region, the second portion of the tunneling dielectric layer is thicker than the first portion of the tunneling dielectric layer, forming a floating gate directly above the first portion of the tunneling dielectric layer and the second portion of the tunneling dielectric layer, and forming a control dielectric layer directly above the floating gate.. . ... International Business Machines Corporation

12/07/17 / #20170352729

Semiconductor structure with a silicon germanium alloy fin and silicon germanium alloy pad structure

A semiconductor structure is provided that includes a silicon germanium alloy fin having a second germanium content located on a first portion of a substrate. The structure further includes a laterally graded silicon germanium alloy material portion located on a second portion of the substrate. ... International Business Machines Corporation

12/07/17 / #20170352727

Techniques for forming finfet transistors with same fin pitch and different source/drain epitaxy configurations

In one aspect, a method of forming a finfet device includes: partially forming fins in first/second regions of a substrate; selectively forming spacers on opposite sides of only the fins in a second region; completing formation of the fins such that, based on the spacers, the fins in the second region have a wider base; depositing an insulator between the fins; recessing the insulator to expose a top portion of the fins; forming at least one gate over the fins; further recessing the insulator in the source and drain regions to expose a bottom portion of the fins; and growing an epitaxial material in the source and drain regions that is un-merged in the first region yet is merged in the second region due to the base of the fins in the second region having a wider base. A finfet device is also provided.. ... International Business Machines Corporation

12/07/17 / #20170352659

Fin field effect transistor fabrication and devices having inverted t-shaped gate

A method of forming a fin field effect transistor (finfet), including forming a temporary gate structure having a sacrificial gate layer and a dummy gate layer on the sacrificial gate layer, forming a gate spacer layer on each sidewall of the temporary gate structure, forming a source/drain spacer layer on the outward-facing sidewall of each gate spacer layer, removing the dummy gate layer to expose the sacrificial gate layer, removing the sacrificial gate layer to form a plurality of recessed cavities, and forming a gate structure, where the gate structure occupies at least a portion of the plurality of recessed cavities.. . ... International Business Machines Corporation

12/07/17 / #20170352657

Air gap spacer for metal gates

A method of forming a semiconductor device that includes forming a trench adjacent to a gate structure to expose a contact surface of one of a source region and a drain region. A sacrificial spacer may be formed on a sidewall of the trench and on a sidewall of the gate structure. ... International Business Machines Corporation

12/07/17 / #20170352625

Self-aligned vertical transistor with local interconnect

A metallization scheme for vertical field effect transistors (fets) is provided. By forming lower-level local interconnects connecting source regions located at bottom portions of semiconductor fins, and upper-level interconnects connecting adjacent metal gates located along sidewalls of channel regions of the semiconductor fins, electrical connections to the source regions and the metal gates can be provided through the lower-level local interconnects and the upper-level local interconnects, respectively. ... International Business Machines Corporation

12/07/17 / #20170352624

Interconnect structures with enhanced electromigration resistance

Interconnect structures are provided that include an intermetallic compound as either a cap or liner material. The intermetallic compound is a thermal reaction product of a metal or metal alloy of an interconnect metallic region with a metal of either a metal cap or a metal layer. ... International Business Machines Corporation

12/07/17 / #20170352621

Avoiding gate metal via shorting to source or drain contacts

Techniques relate to forming a gate metal via. A gate contact has a bottom part in a first layer. ... International Business Machines Corporation

12/07/17 / #20170352597

Low resistance dual liner contacts for fin field-effect transistors (finfets)

A semiconductor device includes first and second gate structures on a substrate respectively corresponding to an n-type and a p-type transistor, a first source/drain on the substrate corresponding to the n-type transistor, a second source/drain on the substrate corresponding to the p-type transistor, a first contact trench over the first source/drain and adjacent the first gate structure, a second contact trench over the second source/drain and adjacent the second gate structure, a first liner layer in the first trench positioned at a bottom part of the first trench, a second liner layer in the second trench and on the first liner layer in the first trench, a metallization layer in the first and second trenches on the second liner layer, and a first silicide contact between the first liner layer and the first source/drain and a second silicide contact between the second liner layer and the second source/drain.. . ... International Business Machines Corporation

12/07/17 / #20170352590

Interconnect structures with enhanced electromigration resistance

Interconnect structures are provided that include an intermetallic compound as either a cap or liner material. The intermetallic compound is a thermal reaction product of a metal or metal alloy of an interconnect metallic region with a metal of either a metal cap or a metal layer. ... International Business Machines Corporation

12/07/17 / #20170352589

Interconnect structures with enhanced electromigration resistance

Interconnect structures are provided that include an intermetallic compound as either a cap or liner material. The intermetallic compound is a thermal reaction product of a metal or metal alloy of an interconnect metallic region with a metal of either a metal cap or a metal layer. ... International Business Machines Corporation

12/07/17 / #20170352585

Self-aligned quadruple patterning (saqp) for routing layouts including multi-track jogs

An interconnect structure having a pitch of less than 40 nanometers and a self-aligned quadruple patterning process for forming the interconnect structure includes three types of lines: a β line defined by a patterned bottom mandrel formed in the self-aligned quadruple patterning process; a γ line defined by location underneath a top mandrel formed in the self-aligned quadruple patterning process; and an α line defined by elimination located underneath neither the top mandrel or the bottom mandrel formed in the self-aligned quadruple patterning process. The interconnect structure further includes multi-track jogs selected from a group consisting of a βγβ jog; a βαβ jog; an αβγ jog; a γβα jog, and combinations thereof. ... International Business Machines Corporation

12/07/17 / #20170352369

Tape head with electrically conducting surface to reduce triboelectric charging

A tape head including a body exhibiting a tape-bearing area is provided. The body includes at least one transducer that is a read element or a write element, configured in the tape head so as for the tape head to read from or write to a magnetic tape, in operation. ... International Business Machines Corporation

12/07/17 / #20170352345

Detecting customers with low speech recognition accuracy by investigating consistency of conversation in call-center

Methods and a system are provided for estimating automatic speech recognition (asr) accuracy. A method includes obtaining transcriptions of utterances in a conversation over two channels. ... International Business Machines Corporation

12/07/17 / #20170352282

Image-based feedback for assembly instructions

A set of images of a product are obtained from a camera. The set of images are of a plurality of parts of the product being assembled. ... International Business Machines Corporation

12/07/17 / #20170352247

Close range monitoring

A wearable device may connect to a wearable device over a short-range wireless connection. The user device may receive sensor data from the wearable device, where the wearable device has sensors. ... International Business Machines Corporation

12/07/17 / #20170352218

Establishing distributed consensus via alternate voting strategies in a dispersed storage network

A method includes generating a first lock requests, each for transmission to a storage unit, where each first lock request indicates a first encoded data slice. First ballots are received, each of the first ballots corresponds to a storage unit, each of the first ballots indicates a first ranking of first requesting entities that includes the dst processing unit. ... International Business Machines Corporation

12/07/17 / #20170352179

Method to adjust avatar attributes using fitness metrics

A method is disclosed including receiving from a user a request to associate an avatar in a computer-implemented virtual world with a wearable device, creating an association between the avatar and the wearable device in response to the request, and receiving from the wearable device activity metric data for the user generated by a sensor of the wearable device. The activity metric data is generated by the wearable device in response to the wearable device sensing the user performing an activity. ... International Business Machines Corporation

12/07/17 / #20170352159

Distributed processing for producing three-dimensional reconstructions

A method includes obtaining two-dimensional measurements of a given scene from sensors, the given scene comprising a plurality of scene points, distributing the given scene into bundles each associated with at least one sensor and at least one scene point, establishing constraints associated with the sensors and the plurality of scene points that are associated with two different bundles, estimating, individually for each of the bundles, a set of parameters for the at least one sensor and the at least one scene point associated with that bundle utilizing at least one of the two-dimensional measurements, generating a consensus parameter set for the one or more sensors and the plurality of scene points based on the estimated parameter sets, the established constraints being utilized to reconcile differences in parameter values in the estimated parameter sets, and producing a three-dimensional representation of the given scene utilizing the consensus parameter set.. . ... International Business Machines Corporation

12/07/17 / #20170352113

Personal life disruption indicator

An approach to generating a disruption indicator for an employee. The approach parses communication feeds into a collection of verbs and subjects. ... International Business Machines Corporation

12/07/17 / #20170352087

Estimating merchandise uniqueness

Estimating a degree of uniqueness of a set of merchandise based on merchandise owned by others in a social network. An analysis is performed on a social network of a user and a degree of uniqueness for a set of merchandise is determined.. ... International Business Machines Corporation

12/07/17 / #20170352072

Estimating merchandise uniqueness

Estimating a degree of uniqueness of a set of merchandise based on merchandise owned by others in a social network. An analysis is performed on a social network of a user and a degree of uniqueness for a set of merchandise is determined.. ... International Business Machines Corporation

12/07/17 / #20170352071

Smart cost analysis of household appliances

Usage data can be received by a computer system from a sensor-enabled appliance. A new appliance profile can be accessed from an external data source; the new appliance profile can contain price and energy consumption data about the new appliance. ... International Business Machines Corporation

12/07/17 / #20170352070

Mapping social media sentiments

A computer-implemented method includes accessing social media data, wherein the social media data is associated with one or more profiles and corresponds to a venue. The computer-implemented method further includes determining sentiment information corresponding to each of the one or more profiles based on the social media data. ... International Business Machines Corporation

12/07/17 / #20170352069

Mapping social media sentiments

A computer-implemented method includes accessing social media data, wherein the social media data is associated with one or more profiles and corresponds to a venue. The computer-implemented method further includes determining sentiment information corresponding to each of the one or more profiles based on the social media data. ... International Business Machines Corporation

12/07/17 / #20170352058

System and method for dynamic advertising

Systems and methods for displaying an image on an image-enabled clothing article are disclosed. A method that can be used with the systems include determining, by a computing device, that at least a first advertisement and a second advertisement are acceptable for a participant. ... International Business Machines Corporation

12/07/17 / #20170352057

Targeted marketing based on a user interest and location

In an approach to determining targeted marketing for a user, a computer determines a user interest in at least one product, and determines a location of the user. The computer then determines at least one merchant within a first distance of the user, and whether the at least one merchant has the at least one product available. ... International Business Machines Corporation

12/07/17 / #20170352009

Method for assigning time windows for vehicle routing problem

A computer-implemented method, apparatus and computer program product, the method performed by a processor operatively connected to a memory, the method comprising: obtaining a schedule for handling service requests, the schedule planned offline in accordance with expected service requests for a service, the schedule comprising a number of service trips per time slot and per geographic location; receiving a service request, comprising a location in which the service is to be provided; automatically suggesting, during handling the service request, a time slot for providing the service from time slots available in the schedule for providing the service in the location; and upon acceptance of the time slot for providing the service, updating the schedule with the service being provided at the time slot.. . ... International Business Machines Corporation

12/07/17 / #20170352008

Task reminder generator

Systems and methods are provided for generating task reminders. The method includes identifying, using a processor, a task description by parsing digital text from a message in an application. ... International Business Machines Corporation

12/07/17 / #20170352000

Managing delivery of environmentally sensitive products

A tool, executed by one or more computer processors, including identifying at least one product in a shipment for delivery, wherein the at least one product is identified in a shipping manifest and extracting from the shipping manifest, the required amount of storage space for the product and the one or more environmental conditions required for storage of the product at the receiving location. The tool includes determining a storage space location for delivery of the product at the receiving location, wherein the storage space location provides the one or more environmental conditions required for the product. ... International Business Machines Corporation

12/07/17 / #20170351998

Managing delivery of environmentally sensitive products

A method, executed by one or more processors, includes identifying at least one product for delivery and create a shipping manifest for the at least one product. The method includes extracting from the shipping manifest, a required amount of storage space for the at least one product and one or more environmental conditions required for storage of the at least one product at the receiving location. ... International Business Machines Corporation

12/07/17 / #20170351991

Detecting potential root causes of data quality issues using data lineage graphs

An example system includes a processor that can generate a first lineage graph based on a first set of monitored assets and processes used to produce a data asset. The processor can detect a data quality issue at the data asset. ... International Business Machines Corporation

12/07/17 / #20170351983

Ontology for development-time soa service repository having services implemented using varying technologies

Providing an ontology for a service-oriented architecture deployment in a computing environment, the ontology providing organization and identification of services in a development-time service repository of the service-oriented architecture. The services in the development-time service repository are implemented using varying service implementation technologies and the ontology supports inquiries about services implemented using the varying service implementation technologies. ... International Business Machines Corporation

12/07/17 / #20170351971

Method and apparatus for informative training repository building in sentiment analysis model learning and customaization

The methods, systems, and computer program products described herein provide ways to generate an informative training corpus of samples for use in machine training a high-quality sentiment analysis computer model. In some aspects, a method is disclosed including receiving a plurality of training samples, extracting semantic and sentiment elements of one or more of the training samples, generalizing the semantic and sentiment elements of the one or more of the training samples, generating an informative ranking score for one or more of the training samples based on the generalized semantic and sentiment elements, selecting informative training samples from the plurality of training samples based at least in part on the generated informative ranking scores, and adding the selected informative training samples to an informative training corpus.. ... International Business Machines Corporation

12/07/17 / #20170351970

Solar irradiation modeling and forecasting using community based terrestrial sky imaging

Solar irradiation may be predicted based on input terrestrial sky images comprising cloud images, the terrestrial sky images taken from a plurality of geographic locations by a plurality of devices; for example, wherein the terrestrial sky images are crowd sourced from the plurality of devices. A model may be generated that predicts solar irradiation in a geographic area based on the input terrestrial sky images and the geographic locations from where the terrestrial sky images were taken. ... International Business Machines Corporation

12/07/17 / #20170351968

Machine learning for determining confidence for reclamation of storage volumes

A method, system and computer product for performing storage maintenance is described. A training set for storage volume reclamation is received. ... International Business Machines Corporation

12/07/17 / #20170351962

Predicting user question in question and answer system

A question database storing questions and a conditional probability of one question to be asked given that a previous question was asked is searched to predict a future question based on the conditional probability stored in the question database given an input question as the previous question. The future question is suggested to a user. ... International Business Machines Corporation

12/07/17 / #20170351961

Information appropriateness assessment tool

An electronic appropriateness assessment tool (“tool”) can be configured to select information in response to an electronic request for the information. In one example, the request may be by a device associated with a user. ... International Business Machines Corporation

12/07/17 / #20170351957

Automated creation of semantically-enriched diagnosis models

A system, method and a computer program product may be provided for automatically creating and parameterizing a semantically-enriched diagnosis model for an entity. The system receives a list of data points, from sensors or a database, to be used to create a diagnosis model. ... International Business Machines Corporation

12/07/17 / #20170351950

Reservoir computing device using external-feedback laser system

Various reservoir computing systems and a method performed by a reservoir computing system are provided. A reservoir computing system includes a laser for emitting light. ... International Business Machines Corporation

12/07/17 / #20170351930

Real-time system for determining current video scale

Embodiments of the present invention may provide the capability to identify a specific object being interacted with that may be cheaply and easily included in mass-produced objects. In an embodiment, a computer-implemented method for object identification may comprise receiving a signal produced by a physical interaction with an object to be identified, the signal produced by an identification structure coupled to the object during physical interaction with the object, processing the signal to form digital data representing the signal, and accessing a database using the digital data to retrieve information identifying the object.. ... International Business Machines Corporation

12/07/17 / #20170351882

Physical-interactive ids (p2d)

Embodiments of the present invention may provide the capability to identify a specific object being interacted with that may be cheaply and easily included in mass-produced objects. In an embodiment, a computer-implemented method for object identification may comprise receiving a signal produced by a physical interaction with an object to be identified, the signal produced by an identification structure coupled to the object during physical interaction with the object, processing the signal to form digital data identifying the object, and accessing a database using the digital data to retrieve additional information identifying or describing properties of the object identified.. ... International Business Machines Corporation

12/07/17 / #20170351857

Data scanning within distributed computing components

Embodiments for scanning data within and between distributed computing components by a processor. Data scanning functionality is allocated through an object storlet located at a local node of the distributed computing components. ... International Business Machines Corporation

12/07/17 / #20170351855

Identifying sensitive information in a communication based on network communications history

A method for identifying sensitive information in a communication may include analyzing a plurality of communications associated with a user in a social networking system for concept and entity sharing to create a relationship graph of concept and entity sharing history. The method may also include analyzing a current communication from the user to extract one or more elements from the current communication. ... International Business Machines Corporation

12/07/17 / #20170351834

Personal travel health vulnerability navigator

Individual health vulnerability is assessed by obtaining health risk prevalence level data containing health risk prevalence levels for one or more health risks over a given geographical area. The health risk prevalence level data to generate for each health risk a prevalence level forecast as a function of time and location. ... International Business Machines Corporation

12/07/17 / #20170351833

Personal travel health vulnerability navigator

Individual health vulnerability is assessed by obtaining health risk prevalence level data containing health risk prevalence levels for one or more health risks over a given geographical area. The health risk prevalence level data to generate for each health risk a prevalence level forecast as a function of time and location. ... International Business Machines Corporation

12/07/17 / #20170351832

Personal travel health vulnerability navigator

Individual health vulnerability is assessed by obtaining health risk prevalence level data containing health risk prevalence levels for one or more health risks over a given geographical area. The health risk prevalence level data to generate for each health risk a prevalence level forecast as a function of time and location. ... International Business Machines Corporation

12/07/17 / #20170351831

Personal travel health vulnerability navigator

Individual health vulnerability is assessed by obtaining health risk prevalence level data containing health risk prevalence levels for one or more health risks over a given geographical area. The health risk prevalence level data to generate for each health risk a prevalence level forecast as a function of time and location. ... International Business Machines Corporation

12/07/17 / #20170351816

Identifying potential patient candidates for clinical trials

A computer system gleans data from patient records and clinical trial descriptions using nlp techniques. Nlp annotation data is used to generate clinical trial feature vectors and patient feature vectors. ... International Business Machines Corporation

12/07/17 / #20170351814

Identifying potential patient candidates for clinical trials

A computer system gleans data from patient records and clinical trial descriptions using nlp techniques. Nlp annotation data is used to generate clinical trial feature vectors and patient feature vectors. ... International Business Machines Corporation

12/07/17 / #20170351801

Use of net-based target congestion ratios in global routing

According to an aspect, a plurality of nets are grouped into a plurality of buckets based on timing criticalities associated with the nets, and different tcrs are assigned to each of the buckets. For each of the nets, a tcr for the net is determined based on the tcr assigned to the bucket containing the net. ... International Business Machines Corporation

12/07/17 / #20170351800

Use of net-based target congestion ratios in global routing

According to an aspect, a plurality of nets are grouped into a plurality of buckets based on timing criticalities associated with the nets, and different tcrs are assigned to each of the buckets. For each of the nets, a tcr for the net is determined based on the tcr assigned to the bucket containing the net. ... International Business Machines Corporation

12/07/17 / #20170351798

Area sharing between multiple large block synthesis (lbs) blocks

Respective large block synthesis (lbs) blocks of an integrated circuit (ic) are overlapped along a corner of each respective lbs block to form an overlap area having an area less than respective areas of respective lbs blocks that are overlapped. A first portion of the overlap area is allocated to a first lbs block and configured to be used by the first lbs block, and a second portion of the overlap area is allocated to a second lbs block and configured to be used by the second lbs block.. ... International Business Machines Corporation

12/07/17 / #20170351788

Automated checker generation

The invention relates to a method for verifying a design of an electronic circuit. The electronic circuit comprises at least one register including one or more parts. ... International Business Machines Corporation

12/07/17 / #20170351785

Early analysis and mitigation of self-heating in design flows

A system and method for enabling the estimation and mitigation of self-heating in chip designs at a much earlier stage in a design flow. The system and method provides unique characterization of each standard cell in a library for its effective thermal resistance based on the topology and layout of the cell, and brings this per standard cell instance based delta-t to be available for the timing closure tools when completing a synthesized design. ... International Business Machines Corporation

12/07/17 / #20170351783

Laminate substrate thermal warpage prediction for designing a laminate substrate

Method of designing a laminate substrate having upper laminate layers and an equal plurality of lower laminate layers including: dividing the laminate substrate into regions having corresponding laminate layer pairs consisting of an upper laminate layer and a lower laminate layer; calculating a net stretching value for each corresponding laminate layer pair in each region to result in net stretching values in each region; summing the net stretching values in each region to result in a net stretching value for each region proportional to a curvature of each local region; calculating a relative out-of-plane displacement for the laminate substrate from the curvature of each local region; calculating a predicted thermal warpage for the laminate substrate; and finalizing a design of the laminate substrate when the predicted thermal warpage is within a predetermined acceptable range.. . ... International Business Machines Corporation

12/07/17 / #20170351763

Keyword based data crawling

One embodiment provides a method, including utilizing at least one processor to execute computer code that performs the steps of: receiving, from a user, one or more keywords, wherein the one or more keywords identify, within a social media data set, a subset of social media data; determining, based on social media statistical information, an estimated volume of the subset of the social media data; determining, based on the social media statistical information, an estimated relevance of the subset of social media data to the user; and updating the one or more keywords, to improve the estimated volume and estimated relevance. Other aspects are described and claimed.. ... International Business Machines Corporation

12/07/17 / #20170351761

Optimizing web crawling through web page pruning

Crawling computer-based documents by performing static analysis on a computer-based document to identify within the computer-based document one or more execution vectors, where each execution vector includes a computer program segment including a call to an entity that is external to the computer-based document, and one or more additional computer program segments whose execution precedes and leads ultimately to execution of the computer program segment that includes the call to the entity, and causing any of the computer program segments in any of the execution vectors to be executed during a crawling of the computer-based document, and any computer program segment within the computer-based document that is excluded from the execution vectors to be excluded from execution during the crawling of the computer-based document.. . ... International Business Machines Corporation

12/07/17 / #20170351758

Implementation of data protection policies in etl landscapes

Embodiments of the present invention provide systems, methods, and computer program products for processing data in an extract, transform, and load system. Embodiments of the present invention provide protective enhancements to be applied to data during extract-transform-load operations, including protections that can prevent unauthorized access and/or modifications to data stored on an intermediate computer system. ... International Business Machines Corporation

12/07/17 / #20170351755

Dita relationship table based on contextual taxonomy density

A computer scans a dita library to identify dita topic files. The computer then determines whether the identified dita file has a concept, task, or reference scheme. ... International Business Machines Corporation

12/07/17 / #20170351754

Automated timeline completion using event progression knowledge base

A mechanism is provided in a computing device configured with instructions executing on a processor of the computing device to implement a timeline generation system, for automated timeline completion. The timeline generation system executing on the processor of the computing device identifies a plurality of events in documents in a corpus of information. ... International Business Machines Corporation

12/07/17 / #20170351748

Visualization of graphical representations of log files

A computer-implemented method includes receiving one or more log files. Each of the one or more log files includes one or more logs. ... International Business Machines Corporation

12/07/17 / #20170351746

Test data management

As disclosed herein, a method includes receiving a plurality of datasets from a database, wherein each dataset comprises one or more data fields represented in a single data format, and wherein the data fields from at least two of the datasets are represented in different data formats, combining the plurality of datasets to provide a created data column corresponding to all of the data fields from the plurality of datasets, organizing the data column into data clusters, wherein each data cluster includes data fields represented in a single data format, and wherein each data field belongs to a data cluster, providing a key-value map referencing data fields with respect to their corresponding data formats, and verifying the database with respect to the created column. A corresponding computer program product and computer system are also disclosed.. ... International Business Machines Corporation

12/07/17 / #20170351740

Determining stalwart nodes in signed social networks

Determination of the nodes in a signed social network that have the greatest “aggregate assignation value” (or “stalwartness”). The “aggregate assignation value” of a node of a signed social network is a value corresponding to any sort of aggregation of the signs of the connections involving that connection. ... International Business Machines Corporation

12/07/17 / #20170351736

Streamlining tuple processing by delivering tuple attributes to associated operators

Streamlining a stream computing environment by distributing tuple attributes to associated operators in the environment involves receiving a stream of tuples for processing by one or more stream operators. A tuple in the stream of tuples is analyzed to identify one or more data attributes required by the one or more stream operators during processing. ... International Business Machines Corporation

12/07/17 / #20170351730

Automatically correcting invalid scripts in web applications

According to an aspect, a method for correcting an invalid script in a web application includes determining an invalid reference in an invalid script. A storage location is determined in a database corresponding to the invalid reference based on a data relationship mapping, wherein the data relationship mapping indicates the correspondence between the reference and a storage location in the database. ... International Business Machines Corporation

12/07/17 / #20170351728

Detecting potential root causes of data quality issues using data lineage graphs

An example system includes a processor that can generate a first lineage graph based on a first set of monitored assets and processes used to produce a data asset. The processor can detect a data quality issue at the data asset. ... International Business Machines Corporation

12/07/17 / #20170351719

Preserving high value entries in an event log

A first entry is received at an event log interface. The event log interface is configured to store received entries in an event log. ... International Business Machines Corporation

12/07/17 / #20170351717

Column weight calculation for data deduplication

A computer system with the capability to identify potentially duplicative records in a data set is provided. A computer may collect a data profile for the data set that provides descriptive information with regard to attributes of the data set. ... International Business Machines Corporation

12/07/17 / #20170351698

Techniques for improving deduplication efficiency in a storage system with multiple storage nodes

Techniques for selecting a storage node of a storage system to store data include applying a first function to at least some data chunks of an extent to provide respective first values for each of the at least some data chunks. A storage node, included within multiple storage nodes of a storage system, is selected to store the extent based on a majority vote derived from the respective first values.. ... International Business Machines Corporation

12/07/17 / #20170351696

Contextual tagging of a multimedia item

Approaches presented herein enable automatically removing a potential tag of a subject depicted in a multimedia item based on a context of the multimedia item and one or more preferences of the subject being tagged. Specifically, a request to tag a subject in the multimedia item is received, and the multimedia item is analyzed to determine a context. ... International Business Machines Corporation

12/07/17 / #20170351688

Generation of classification data used for classifying documents

Systems and methods are provided for generating classification data which is used for classifying documents. The method includes reading documents in a form of a spreadsheet; collecting cell values in each of the documents; finding one or more common cell values among the collected values; counting, for each of the common cell values, a number of the documents having the common cell value; storing, if the number of the documents is equal to or larger than a predetermined number, the common cell value as a candidate header label in a memory; calculating a distance between cell locations of the candidate header labels in each of the documents; choosing, according to the calculated distance, two or more candidate header labels among the candidate header labels for each of the documents; and storing one or more combinations of the chosen two or more candidate header labels as the classification data.. ... International Business Machines Corporation

12/07/17 / #20170351684

Syntactical transformation of database interaction statements

A computer-implemented method includes identifying a primary database interaction statement and determining one or more intermediate database interaction statements based on the primary database interaction statement. The computer-implemented further includes determining, for each of the one or more intermediate database interaction statements, an intermediate statement transformation indicator. ... International Business Machines Corporation

12/07/17 / #20170351681

Label propagation in graphs

Each node in a subset of graph nodes has an associated label value indicating a characteristic of the corresponding item. Matrix data and graph label data are stored. ... International Business Machines Corporation

12/07/17 / #20170351677

Generating answer variants based on tables of a corpus

Mechanisms are provided for implementing a candidate answer variant engine. The mechanisms receive an indication of a structured portion of content in a corpus, generate a plurality of groupings of elements of the structured portion of content, and generate, for each grouping of elements in the plurality of groupings of elements, and for each element in the grouping of elements, a corresponding grouping vector representation, corresponding to the element. ... International Business Machines Corporation

12/07/17 / #20170351676

Sentiment normalization using personality characteristics

Sentiment scores for a first set of text can be normalized based on a statistical measure of sentiment of a corpus of text authored by a set of authors having respective personality profiles similar to a personality profile of an author of the first set of text. The set of authors can be grouped in a first cluster based on a range of at least one metric of a personality profile. ... International Business Machines Corporation

12/07/17 / #20170351662

Extraction of a keyword in a claim

Extracting one or more keywords in a claim, including: decomposing an independent claim into a plurality of elements, wherein each element in the plurality of elements has at least one term; constructing a dependency structure from the plurality of elements, wherein each element in the plurality of elements has a depth in the dependency structure; calculating a score using the depth of the element corresponding to the at least one term in the independent claim; and extracting at least one keyword from the at least one term having a score equal to or larger than a predetermined threshold.. . ... International Business Machines Corporation

12/07/17 / #20170351619

Demote scan processing to demote tracks from cache

Provided are a computer program product, system, and method demote scan processing to demote tracks from cache. Tracks in the storage stored in the cache are indicated in a cache list. ... International Business Machines Corporation

12/07/17 / #20170351618

Invoking demote threads on processors to demote tracks indicated in demote ready lists from a cache when a number of free cache segments in the cache is below a free cache segment threshold

Provided are a computer program product, system, and method for invoking demote threads on processors to demote tracks from a cache. A plurality of demote ready lists indicate tracks eligible to demote from the cache. ... International Business Machines Corporation

12/07/17 / #20170351615

Cache management

It is determined that a cache operation relating to the transfer of data between a cache memory and a data storage system is required. A state of a utilization model is received, the utilization model including requirements for utilization of resources of the data storage system over a time period, and the state indicating a cost of resource utilization associated with cache operations in the current time period. ... International Business Machines Corporation

12/07/17 / #20170351614

Non-volatile memory controller cache architecture with support for separation of data streams

A system, according to one embodiment, includes: non-volatile memory; a non-volatile memory controller having a cache; and logic integrated with and/or executable by the non-volatile memory controller, the logic being configured to: retrieve a physical block address corresponding to a logic block address; extract information from the physical block address; perform a lookup operation in cache using the extracted information; perform a range check of the physical block address in response to the lookup operation succeeding; and read data from the cache in response to the range check succeeding. An architecture of the cache supports separation of data streams, in addition to supporting parallel writes to different non-volatile memory channels. ... International Business Machines Corporation

12/07/17 / #20170351613

Preservation of modified cache data in local non-volatile storage following a failover

A dual-server based storage system maintains a first cache and a first non-volatile storage (nvs) in a first server, and a second cache and a second nvs in a second server, where data in the first cache is also written in the second nvs and data in the second cache is also written in the first nvs. In response to a failure of the first server, a determination is made as to whether space exists in the second nvs to accommodate the data stored in the second cache. ... International Business Machines Corporation

12/07/17 / #20170351611

Invoking input/output (i/o) threads and demote threads on processors to demote tracks from a cache

Provided are a computer program product, system, and method for invoking input/output (i/o) threads and demote threads on processors to demote tracks from a cache. An input/output (i/o) thread, executed by a processor, processes i/o requests directed to tracks from the storage stored in the cache. ... International Business Machines Corporation

12/07/17 / #20170351609

Storage drive dependent track removal in a cache for storage

In one embodiment, storage drive dependent track removal processing logic performs destage tasks for tracks cached in a cache as a function of whether the storage drive is classified as a fast class or as slow class of storage drives, for example. In one embodiment, a destage task configured for a slow class storage drive, transfers an entry for a track selected for destaging from a main cache list to a wait cache list to await destaging to the slow class drive. ... International Business Machines Corporation

12/07/17 / #20170351607

Multi-section garbage collection

The embodiments relate to a method for managing a garbage collection process. The method includes executing a garbage collection process on a memory block of user address space. ... International Business Machines Corporation

12/07/17 / #20170351597

Identifying and isolating library code in software applications

A computer system, method, and computer readable product are provided for identifying and isolating library code that has been obfuscated in software applications. A call graph is created for the execution of at least one module of preexisting library code within a bundle of software modules through either static analysis of the software code or dynamic analysis of the executing code, and then one or more anchor points are devised based upon the call graph that are indicative of the preexisting library code. ... International Business Machines Corporation

12/07/17 / #20170351595

Debugging for sql statement

This disclosure provides a computer-implemented method for debugging a program including a sql statement. The method comprises indicating one or more first positions of source code of the program. ... International Business Machines Corporation

12/07/17 / #20170351594

Debugging for sql statement

This disclosure provides a computer-implemented method for debugging a program including a sql statement. The method comprises indicating one or more first positions of source code of the program. ... International Business Machines Corporation

12/07/17 / #20170351591

Optimized recovery in data replication environments

A method for optimizing recovery in a data replication environment is disclosed. In one embodiment, such a method includes directing i/o from a primary site to a secondary site in response to a failure at the primary site. ... International Business Machines Corporation

12/07/17 / #20170351588

Cluster file system support for extended network service addresses

A computer program product is provided for extending network services addresses, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, where the program instructions are executable by a processor to cause the processor to identify, by the processor, a network event affecting a node of a network, wherein the node provides external access to the network using an internet protocol (ip) address, in response to identifying the network event, identify, by the processor, an attribute associated with the ip address, and based on the attribute associated with the ip address, determine, by the processor, whether to move the ip address to another node of the network.. . ... International Business Machines Corporation

12/07/17 / #20170351585

Transaction consistency query support for replicated data from recovery log to external data stores

Provided are techniques for transaction consistency query support for replicated data from recovery log to external data stores. An external data store is populated with records using entries of a change data table. ... International Business Machines Corporation

12/07/17 / #20170351584

Managing a redundant computerized database using a replicated database cache

Data in a database cache in memory of an operating database server is copied to memory of a standby database server, without requiring synchronization between the operating server and the standby server. If the operating server fails, the database is recovered to a consistent state in the standby server using a sequential database log and the copied data in the cache of the standby server. ... International Business Machines Corporation

12/07/17 / #20170351583

Operation of a multi-slice processor implementing adaptive failure state capture

Operation of a multi-slice processor that includes a plurality of execution slices and a plurality of load/store slices, where the load/store slices are coupled to the execution slices via a results bus. Operation of such a multi-slice processor includes: capturing first state information corresponding to a first set of control signals; monitoring state information of a plurality of logical components of the multi-slice processor; selecting, in dependence upon one or more selection criteria and upon the monitored state information, a second set of control signals; and capturing second state information corresponding to the second set of control signals, wherein the first set of control signals is different than the second set of control signals.. ... International Business Machines Corporation

12/07/17 / #20170351576

Parallel data collection and recovery for failing virtual computer processing system

Techniques for parallel data collection and recovery for a failing virtual processing system are disclosed. According to aspects of the present disclosure, an example method includes: detecting that the virtual processing system experiences an irreparable error; saving, by each of a plurality of processors of the physical processing system, a corresponding context and data stored in an allocated portion of a memory of the physical processing system to a data store; selecting one of the plurality of processors as a recovery processor; initializing, by the recovery processor, a pre-determined reserved portion of the memory; initiating, by the recovery processor, a new instance of the virtual processing system on the reserved portion of the memory while each remaining processor of the plurality of processors continues the saving; and dynamically adding each remaining processor of the plurality of processors to the new instance of the virtual processing system.. ... International Business Machines Corporation

12/07/17 / #20170351574

Multiple writes using inter-site storage unit relationship

A method includes utilizing, by a first computing device, a first writing pattern to write a set of encoded data slices to a sharing group of sites. The first writing pattern includes writing a write threshold number of encoded data slices to storage units of a first site and writing a remaining number of encoded data slices to another storage unit(s) in another site(s). ... International Business Machines Corporation

12/07/17 / #20170351568

Ecc scrubbing in a multi-slice microprocessor

Techniques for error correction in a processor include detecting an error in first data stored in a register. The method also includes generating an instruction to read the first data stored in the register, where the register is both a source register and a destination register of the instruction. ... International Business Machines Corporation

12/07/17 / #20170351567

Resilient analytical model in a data streaming application

An approach for restoring an analytical model in a data streaming application which involves creating a plurality of data buffers for holding data submitted to the data streaming application, wherein the data streaming application comprises a first analytical model, persisting one or more parameters and/or internal state variables associated with the first analytical model, persisting the plurality of data buffers, retrieving a plurality of persisted data buffers and the one or more parameters and/or internal state variables responsive to a failure of the data streaming application, creating a second analytical model associated with the data streaming application and initializing the second analytical model with the one or more parameters and/or more internal state variables, and submitting data, associated with the plurality of persisted data buffers, to the data streaming application for training the second analytical model to be a close approximation of the first analytical model.. . ... International Business Machines Corporation

12/07/17 / #20170351566

Correcting a data storage error caused by a broken conductor using bit inversion

A method, system, and/or computer program product corrects a data error that has been caused by a break in a conductor link in a memory. A memory controller detects a line malfunction in a data bit transmission line between a first bit node and a second bit node in a memory, and then identifies a constant voltage state at the second bit node that is caused by the line malfunction. ... International Business Machines Corporation

12/07/17 / #20170351559

Policy based dynamic data collection for problem analysis

A computer-implemented method includes receiving, from a first log agent, a first log collection. The computer-implemented method further includes receiving a first policy, wherein the first policy includes a definition of a first pattern and a definition of a procedure. ... International Business Machines Corporation

12/07/17 / #20170351549

Task queuing and dispatching mechanisms in a computational device

A plurality of ordered lists of dispatch queues corresponding to a plurality of processing entities are maintained, wherein each dispatch queue includes one or more task control blocks or is empty. A determination is made as to whether a primary dispatch queue of a processing entity is empty in an ordered list of dispatch queues for the processing entity. ... International Business Machines Corporation

12/07/17 / #20170351548

Smart memory analog dram

A system of processing a task based on information of frequently used algorithms learned through a memory unit includes a first memory, a second memory, a processor, and a reading unit. The processor processes a first type of task using a first algorithm, and writes to a first memory cell of the second memory. ... International Business Machines Corporation

12/07/17 / #20170351545

Balancing categorized task queues in a plurality of processing entities of a computational device

A plurality of processing entities are maintained. An indication is made of a primary processing entities group for a task control block (tcb). ... International Business Machines Corporation

12/07/17 / #20170351530

Approximate synchronization for parallel deep learning

Techniques facilitating synchronization of processing engines for parallel deep learning are provided. In one example, a first processing component associated with a processor and processing components can: generate first output data based on input data associated with a machine learning process, wherein the processing components are communicatively coupled with an assignment component via a network; transmit the first output data to a second processing component of the processing components, wherein the first processing component and the second processing component comprise a first group of the processing components and the first group of the processing components is determined by the assignment component based on a first defined criterion; receive communication data generated by the second processing component; and generate second output data based on the communication data, wherein the second output data is an updated version of the first output data stored in the memory of the first processing component.. ... International Business Machines Corporation

12/07/17 / #20170351524

Operation of a multi-slice processor implementing datapath steering

Operation of a multi-slice processor implementing datapath steering, where the multi-slice processor includes a plurality of execution slices. Operation of such a multi-slice processor includes: identifying, from a set of instructions, a second instruction that is dependent upon a first instruction in the set of instructions; and responsive to the second instruction being dependent upon the first instruction in the set of instructions, issuing each of the instructions in the set of instructions to a particular set of execution slices configured with bypass logic between execution slices that reduces execution latencies between dependent instructions.. ... International Business Machines Corporation

12/07/17 / #20170351523

Operation of a multi-slice processor implementing datapath steering

Operation of a multi-slice processor implementing datapath steering, where the multi-slice processor includes a plurality of execution slices. Operation of such a multi-slice processor includes: identifying, from a set of instructions, a second instruction that is dependent upon a first instruction in the set of instructions; and responsive to the second instruction being dependent upon the first instruction in the set of instructions, issuing each of the instructions in the set of instructions to a particular set of execution slices configured with bypass logic between execution slices that reduces execution latencies between dependent instructions.. ... International Business Machines Corporation

12/07/17 / #20170351522

Operation of a multi-slice processor implementing load-hit-store handling

Operation of a multi-slice processor that includes a plurality of execution slices and an instruction sequencing unit. Operation of such a multi-slice processor includes: receiving, at the instruction sequencing unit, a load instruction indicating load address data and a load data length; determining a previous store instruction in an issue queue such that store address data for the previous store instruction corresponds to the load address data, wherein the previous store instruction corresponds to a store data length; and generating, in dependence upon the store data length matching the load data length, an indication in the issue queue that indicates a dependency between the load instruction and the previous store instruction.. ... International Business Machines Corporation

12/07/17 / #20170351521

Fetched data in an ultra-short piped load store unit

Techniques are disclosed for receiving an instruction for processing data that includes a plurality of sectors. A method includes decoding the instruction to determine which of the plurality of sectors are needed to process the instruction and fetching at least one of the plurality of sectors from memory. ... International Business Machines Corporation

12/07/17 / #20170351514

Generating and managing applications using any number of different platforms

At least one application is received from a user. The at least one application is stored on a communication platform. ... International Business Machines Corporation

12/07/17 / #20170351513

Generating and managing applications using any number of different platforms

At least one application is received from a user. The at least one application is stored on a communication platform. ... International Business Machines Corporation

12/07/17 / #20170351501

Unaligned instruction relocation

In one embodiment, a computer-implemented method includes receiving source code to be compiled into an executable file for an unaligned instruction set architecture (isa). Aligned assembled code is generated, by a computer processor. ... International Business Machines Corporation

12/07/17 / #20170351499

Generating executable files through compiler optimization

Embodiments of the present invention may track a user's interaction trajectory associated with a problem occurred on a website. According to an embodiment of the present invention, a first symbol of a first definition associated with a first object file is obtained. ... International Business Machines Corporation

12/07/17 / #20170351498

Performing register promotion optimizations in a computer program in regions where memory aliasing may occur and executing the computer program on processor hardware that detects memory aliasing

Processor hardware detects when memory aliasing occurs, and assures proper operation of the code even in the presence of memory aliasing. Because the hardware can detect and correct for memory aliasing, this allows a compiler to make optimizations such as register promotion even in regions of the code where memory aliasing can occur. ... International Business Machines Corporation

12/07/17 / #20170351497

Compiler that performs register promotion optimizations in regions of code where memory aliasing may occur

Processor hardware detects when memory aliasing occurs, and assures proper operation of the code even in the presence of memory aliasing. Because the hardware can detect and correct for memory aliasing, this allows a compiler to make optimizations such as register promotion even in regions of the code where memory aliasing can occur. ... International Business Machines Corporation

12/07/17 / #20170351496

Processor that includes a special store instruction used in regions of a computer program where memory aliasing may occur

Processor hardware detects when memory aliasing occurs, and assures proper operation of the code even in the presence of memory aliasing. The processor defines a special store instruction that is different from a regular store instruction. ... International Business Machines Corporation

12/07/17 / #20170351495

Processor that detects memory aliasing in hardware and assures correct operation when memory aliasing occurs

Processor hardware detects when memory aliasing occurs, and assures proper operation of the code even in the presence of memory aliasing. Because the hardware can detect and correct for memory aliasing, this allows a compiler to make optimizations such as register promotion even in regions of the code where memory aliasing can occur. ... International Business Machines Corporation

12/07/17 / #20170351491

Undo/redo in javascript object notation

The method includes modifying a javascript object notation structure to include a tag on at least one object and a tag on at least one array containing a first version of the javascript object notation structure. The method includes in response to identifying a changed second version of the javascript object notation structure, adjusting the tag on the at least one object and the tag on the at least one array to include the second version of the javascript object notation structure. ... International Business Machines Corporation

12/07/17 / #20170351489

Parallel generation of random numbers

Parallelized generation of random numbers. A vector, in a memory component, is allocated that is configured to store a sequence of random numbers. ... International Business Machines Corporation

12/07/17 / #20170351454

Multi-level stage locality selection on a large system

A method for execution by a computing device of a dispersed storage network (dsn). The method begins with obtaining a plurality of write requests. ... International Business Machines Corporation

12/07/17 / #20170351444

Sharing alias addresses among logical devices

Provided are a computer program product, system, and method for sharing alias addresses among logical devices by a host accessing logical devices provisioned with a capacity from physical devices managed by a control unit. The host establishes with the control unit an association of logical devices and alias addresses assigned to the logical devices, wherein the alias addresses are associated with an alias management group. ... International Business Machines Corporation

12/07/17 / #20170351443

Sharing alias addresses among logical devices

Provided are a computer program product, system, and method for sharing alias addresses among logical devices for a control unit managing access by hosts to logical devices configured with capacity from attached physical devices. An alias management group of logical devices and alias addresses assigned to the logical devices is configured. ... International Business Machines Corporation

12/07/17 / #20170351440

Data loss recovery in a secondary storage controller from a primary storage controller

A secondary storage controller determines one or more tracks of one or more volumes in which data loss has occurred in the secondary storage controller. The secondary storage controller suspends a peer to peer remote copy operation between the secondary storage controller and a primary storage controller. ... International Business Machines Corporation

12/07/17 / #20170351432

Invoking input/output (i/o) threads on processors to demote tracks from a cache

Provided are a computer program product, system, and method for invoking input/output (i/o) threads on processors to demote tracks from a cache. An input/output (i/o) thread, executed by a processor, processes i/o requests directed to tracks in the storage by accessing the tracks in the cache. ... International Business Machines Corporation

12/07/17 / #20170351426

Dynamic optimization of raid read operations

A storage subsystem records a copy of a data object on a plurality of storage devices. The storage subsystem receives a read request to read a data object. ... International Business Machines Corporation

12/07/17 / #20170351344

Dynamic device sensitivity control

A method, a computer program product, and an information handling system is provided for controlling a device sensitivity based on a change of movement of the device. A device movement with a device sensitivity controlled by a user movement is monitored for a change in rate of movement or direction. ... International Business Machines Corporation

12/07/17 / #20170351343

Dynamic device sensitivity control

A method, a computer program product, and an information handling system is provided for controlling a device sensitivity based on a change of movement of the device. A device movement with a device sensitivity controlled by a user movement is monitored for a change in rate of movement or direction. ... International Business Machines Corporation

12/07/17 / #20170351277

Energy efficient hot water distribution

A method and system of providing hot water efficiently. A cost of heating a volume of water to a predetermined temperature in a first water heater is determined. ... International Business Machines Corporation

12/07/17 / #20170351268

Cargo-based vehicle control

A method, system, and/or computer program product controls operations of a vehicle based on a condition of cargo being transported. One or more processors receive output from cargo sensors and cameras on a first cargo vehicle. ... International Business Machines Corporation

12/07/17 / #20170351258

Mobile audio input device controller

A method, system, and/or computer program product controls operations of a mobile audio input device. One or more processors detect a first location of a mobile audio input device. ... International Business Machines Corporation

12/07/17 / #20170351255

Controller profile based control of a cargo vehicle

A method, system, and/or computer program product determines an alternate route for a cargo vehicle based on driving profiles of vehicle controllers and sensor readings from another cargo vehicle. One or more processors receive output from a cargo sensor and a camera, on a first cargo vehicle that is controlled by a first controller. ... International Business Machines Corporation

12/07/17 / #20170351122

Feed-forward optical equalization using an electro-optic modulator with a multi-segment electrode and distributed drivers

A device and method of optical equalization using an optical modulator is provided. An electrical modulation signal is split into a first modulation signal and a second modulation signal. ... International Business Machines Corporation

12/07/17 / #20170351042

Optical waveguides in circuit board substrates

A circuit board substrate includes a reinforcing element embedded in a resin material. The reinforcing element includes an optical waveguide. ... International Business Machines Corporation

12/07/17 / #20170351032

Single-mode polymer waveguide connector

Waveguide connectors include a ferrule having first alignment features. A waveguide has one or more a topclad portions, each with a waveguide core, second alignment features fastened to the first alignment features, and underclad portion that is thicker than the one or more topclad portions.. ... International Business Machines Corporation

12/07/17 / #20170351015

Polymer with blue light absorbing units chemically bonded to a polymeric backbone of the polymer

A process of forming a polymer with a blue light absorber chemically bonded to a polymeric backbone of the polymer includes mixing one or more olefin monomers with one or more functionalizedp-vinylstyrylanthracene monomers to form a mixture of reactants. The mixture includes less than 10 percent by weight of the one or more functionalizedp-vinylstyrylanthracene monomers. ... International Business Machines Corporation

12/07/17 / #20170351006

Cloud coverage estimation by dynamic scheduling of a distributed set of cameras

Methods, systems, and computer program products for cloud coverage estimation by dynamic scheduling of a distributed set of cameras are provided herein. A computer-implemented method includes transmitting one or more instructions to each of multiple spatially-distributed cameras in a pre-determined geographic area, wherein the one or more instructions cause each of the spatially-distributed cameras to change a context from (i) a pre-determined task to (ii) capturing one or more spatio-temporal measurements of cloud coverage; tracking the one or more spatio-temporal measurements of cloud coverage captured by the multiple spatially-distributed cameras; obtaining one or more meteorological measurements from one or more non-camera sources; and generating a cloud coverage forecast for the pre-determined geographic area based on (i) the one or more spatio-temporal measurements of cloud coverage captured by the multiple spatially-distributed cameras and (ii) the one or more meteorological measurements from the one or more non-camera sources.. ... International Business Machines Corporation

12/07/17 / #20170350940

Partition-able storage of test results using inactive storage elements

Aspects of present disclosure relate to an integrated circuit chip (chip), a method and a computer program product of testing the chip. The method of testing the chip may include: partitioning the chip into various partitions, loading built-in self-test (bist) test instructions into bist engine and initializing a current partition counter, performing bist test on current partition, transmitting test results of the current partition of the chip to an external test data storage, checking whether current partition is the last partition, incrementing current partition counter, and returning to performing bist on a next partition when current partition is not the last partition, and exiting bist test when current partition is the last partition. ... International Business Machines Corporation

12/07/17 / #20170350928

Duty cycle measurement

Methods and systems for measuring a duty cycle of a signal include applying a first branch of an input signal directly to a latch. A delay of a second branch of the input signal is incrementally increased, with the second branch being applied to the latch, until the latch changes its output. ... International Business Machines Corporation

12/07/17 / #20170350855

Biosensor for electrical detection of a nucleotide sequence

The present invention relates generally to the field of microelectronics, and more particularly to a structure and method of forming a biosensor having a nucleotide attracting surface formed to reduce false detection of nucleotides and enabling electrical detection of nucleotides. The biosensor may include an analyte-affinity layer on an upper surface of a substrate. ... International Business Machines Corporation

12/07/17 / #20170350821

Diagnostic test device with patterned material spots

A test device is configured for diagnostic testing and includes an optical readable medium, in turn including a pattern of spots of material arranged on a surface of the device. Several patterns may be provided. ... International Business Machines Corporation

12/07/17 / #20170350820

Biosensor for optical detection of nucleotide sequence

The present invention relates generally to the field of microelectronics, and more particularly to a structure and method of forming a biosensor having a nucleotide attracting surface tailored to reduce false detection of nucleotides and enabling optical detection of nucleotides. The biosensor may include an analyte-affinity layer on an upper surface of a dielectric layer. ... International Business Machines Corporation

12/07/17 / #20170350754

Sunscreen effectiveness monitoring

In an approach to monitoring sunscreen effectiveness, a computer receives input from a user. The computer receives data corresponding to ultraviolet radiation exposure from a first ultraviolet radiation sensor and a second ultraviolet radiation sensor. ... International Business Machines Corporation

12/07/17 / #20170350714

Route planning based on connectivity of nodes

According to embodiments of the present disclosure, a method, a device and a computer program product for route planning based on connectivity of nodes are provided. The method comprises determining a first plurality of nodes from an origin to a destination. ... International Business Machines Corporation

12/07/17 / #20170350702

Wearable device for tracking real-time ambient health conditions and method for destination selection based on tracked real-time ambient health conditions

A system for providing destination guidance based on tracked real-time ambient health conditions includes one or more location tracking devices carried by one or more participants. The one or more location tracking devices track the locations of the one or more participants and providing the tracked locations to a central server when it is determined that the one or more participants are infected by a communicable ailment. ... International Business Machines Corporation

12/07/17 / #20170350676

System and method for dynamic camouflaging

Systems and methods for dynamic camouflaging are disclosed. A computer-implemented method can be used with the system including determining, by a computing device, if current environment image data is available for a location of one or more users, and instructing, by the computing device, at least one image-enabled clothing system of the one or more users to display a camouflage image based on the determining. ... International Business Machines Corporation

12/07/17 / #20170349941

Reduction of surface nucleotide hybridization by optimizing a biosensor sensing surface area

A method, computer program product, and system for identifying a surface area size of a biosensing structure, for use in a biosensor device, based on a plurality of nucleotides structures under test. A first set of properties are determined comprising: reaction coordinate values, and potential of mean force (pmf) values, for the plurality of nucleotide structures based on a first set of testing conditions comprising a first surface area material, a first surface area pattern, and a first surface area size. ... International Business Machines Corporation

12/07/17 / #20170349694

Degradable polyurethanes containing thioaminal groups

Embodiments of the disclosure generally provide compositions and methods related to oligomeric and polymeric urethane materials that contain hydrolyzable polythioaminal groups for use in biomedical applications.. . ... International Business Machines Corporation

12/07/17 / #20170349166

Cargo vehicle loading control

A method, system, and/or computer program product controls positioning of cargo being loaded onto a cargo vehicle based on sensor readings from another cargo vehicle. One or more processors receive output from a cargo sensor and a camera, on a first cargo vehicle, that describe an amount of movement of first cargo being transported by the first cargo vehicle. ... International Business Machines Corporation

12/07/17 / #20170348785

Solder paste misprint cleaning

A processor receives solder paste information, where the solder paste information describes a solder paste used in assembly of a printed circuit board. A processor determines a minimum magnetic force required for removing the solder paste from the printed circuit board based on the solder paste information. ... International Business Machines Corporation

12/07/17 / #20170348784

Solder paste misprint cleaning

A processor receives solder paste information, where the solder paste information describes a solder paste used in assembly of a printed circuit board. A processor determines a minimum magnetic force required for removing the solder paste from the printed circuit board based on the solder paste information. ... International Business Machines Corporation

12/07/17 / #20170347928

Wearable device for monitoring bodily fluids

A wearable monitoring system includes a first flexible substrate encapsulating a current ramping system to provide a current to an electrode in direct contact with a predetermined location of skin of a user to promote bodily fluid secretion, and a second flexible substrate placed over the predetermined location, the second flexible substrate having an integrated electrochemical sensor to determine bodily fluid concentration levels secreted through the skin.. . ... International Business Machines Corporation

11/30/17 / #20170347482

Cable connection system

A cable connection system and a method of using the cable connection system. The cable connection system includes a base and a tube enveloping electrical cabling. ... International Business Machines Corporation

11/30/17 / #20170347275

Visual representation of signal strength using machine learning models

Information about a signal device is received at a first location in a first physical environment. The signal device broadcasts a signal to a computing device. ... International Business Machines Corporation

11/30/17 / #20170347253

Coordinating the use of independent radio receivers associated with multiple different transmitters

A computer-implemented method includes discovering, by a client device, an available host computing device implementing a radio receiver, wherein the host computing device is discovered from a decentralized shared database and the radio receiver receives radio signals from multiple different transmitters; establishing, by the client device, a relationship with the host computing device based on discovering the host computing device from the decentralized shared database; receiving, by the client device, application data from the host computing device based on establishing the relationship, wherein the application data is associated with radio signals received by the radio receiver from the multiple different transmitters; and storing, outputting, or displaying, by the client device, the application data.. . ... International Business Machines Corporation

11/30/17 / #20170347241

Beacon placement suggestion based on target region

One embodiment provides a system for suggesting placement of beacons within a venue. The system performs operations including receiving a floor plan for a venue, receiving user-specified input identifying a defined area within the floor plan to target, and determining an arrangement of beacons for providing beacon coverage for the defined area. ... International Business Machines Corporation

11/30/17 / #20170346938

Sent text correction feature

Provided are techniques for a user interface (ui) enabling a user to identity and modify previously transmitted electronic message from a first device to a second device; and, responsive to a modification of the previously transmitted outgoing message from the first device, generating a modification message, transmitting the modification message to the second device and, responsive to receiving the modification message on the second device, correlating the modification message to a previously received incoming message on the second device and modifying the previously received incoming message in accordance with information transmitted in conjunction with the modification message to generate a modified message.. . ... International Business Machines Corporation

11/30/17 / #20170346937

Confidentiality-smart voice delivery of text-based incoming messages

Methods, computer program products, and systems are presented. The methods include, for instance: a voice delivery application, running on a mobile device of a user, receives a text message from a user; by use of sensor inputs of the mobile device, the mobile device stores data regarding environment of the mobile device including external audio equipment, speed of the user, and bystanders within a hearing range of the environment; various data describing a sender of the text message and the bystanders are analyzed for respective relationships with the user and with each other to determine a confidentiality group dictating whether or not the text message may be heard by the bystander; the text message may be scanned for content screening, then according to configuration of the voice delivery application, the text message is securely delivered to the user by voice.. ... International Business Machines Corporation

11/30/17 / #20170346926

State synchronized interactive software demonstration

Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” when paused, the participants are able to interact with the demonstrated software program. ... International Business Machines Corporation

11/30/17 / #20170346907

Coordinating the use of independent radio receivers associated with a single transmitter

A computer-implemented method comprises discovering, by a client device, an available host computing device implementing a radio receiver, wherein the host computing device is identified from a decentralized shared database; establishing, by the client device, a relationship with the host computing device based on discovering the host computing device from the decentralized shared database; receiving, by the client device, application data from the host computing device based on establishing the relationship, wherein the application data is associated with radio signals received by the radio receiver from a single transmitter; and storing, outputting, or displaying, by the client device, the application data.. . ... International Business Machines Corporation

11/30/17 / #20170346901

Distributed rebuilding of data in a dispersed storage network

A technique of rebuilding encoded data slices in a dispersed storage network when detecting a plurality of encoded data slices that require rebuilding, as may occur upon failure of a memory device storing the encoded data slices. A plurality of rebuilding resources capable for use to rebuild the plurality of data slices are determined and, based on one or more attributes associated with the determination, a rebuilding task is apportioned. ... International Business Machines Corporation

11/30/17 / #20170346900

Consistency level driven data storage in a dispersed storage network

A method begins by a processing module of a computing device, in response to sending a set of write requests regarding a set of encoded data slices sent to a set of storage units, receiving write response ballots from some storage units. The method continues with the processing module interpreting the write response ballots to determine whether the write requests have a consensus number of highest rankings. ... International Business Machines Corporation

11/30/17 / #20170346898

Enhancing performance of data storage in a dispersed storage network

A method includes determining a level of confidence regarding a revision level for a set of encoded data slices. The method further includes, when the level of confidence is equal to or above a confidence threshold, sending write and commit requests, wherein a write and commit request includes an encoded data slice, a current revision value, and a new revision value. ... International Business Machines Corporation

11/30/17 / #20170346892

Mechanism for overlay virtual networking

A method and system for virtual networking is provided. The method includes receiving logical service chain data describing a source virtual network id (vnid) for a source virtual network, a destination vnid for a destination virtual network, and a group of intermediate waypoints. ... International Business Machines Corporation

11/30/17 / #20170346887

Cooperative download among low-end devices under resource constrained environment

The disclosure provides systems and methods for efficient arrangement, use, and management of networked electronic devices. The networked electronic devices are configured to form a peer-to-peer network, and to allocate management, download, and aggregation responsibilities among themselves to improve efficiency. ... International Business Machines Corporation

11/30/17 / #20170346815

Multifactor authentication processing using two or more devices

A first user request may be received to access a particular resource. A first authentication credential from a first client device may be received based on a first authentication challenge being issued to a user of the first client device. ... International Business Machines Corporation

11/30/17 / #20170346785

Optimising data transmission in a hypercube network

A method of operating a hypercube network of processing devices includes determining that a plurality of the processing devices are storing data to be processed at a single processing device, obtaining the addresses of the plurality of processing devices storing the data to be processed, determining the most common number for each digit of the addresses of the plurality of processing devices storing the data to be processed, generating a new address comprising the determined most common number for each digit, and transferring the data to be processed to the processing device with the generated new address.. . ... International Business Machines Corporation

11/30/17 / #20170346782

Monitoring of subscriber message processing in a publish/subscribe messaging environment

A message is sent by a message tracking device to at least one device that is configured to report status of internal processing of content within the message. The reported status of the internal processing of the content within the message by the at least one device is monitored.. ... International Business Machines Corporation

11/30/17 / #20170346779

Co-references for messages to avoid confusion in social networking systems

Clarifying communications includes receiving, using a processor, a first message from a sending device directed to a user device, determining, using the processor, a second message correlated with the first message, generating, using the processor, a co-reference from the second message, and providing, using the processor, the first message in association with the co-reference to the user device.. . ... International Business Machines Corporation

11/30/17 / #20170346778

Dynamic granular messaging persistence

Embodiments of the present invention provide a method, system and computer program product for dynamic, granular messaging persistence in a messaging system. In an embodiment of the invention, a method for dynamic, granular messaging persistence in a messaging system is provided. ... International Business Machines Corporation

11/30/17 / #20170346774

Social network users' interactions by splitting posts in a thread into a new thread

A method, system and computer program product for improving social network users' interactions. The content of posts in a thread is analyzed so as to group the posts by topic. ... International Business Machines Corporation

11/30/17 / #20170346772

Dynamically integrating contact profile pictures into messages

Systems and methods for insertion of contact profile images into messages are disclosed. The images can be received from a public profile of a social media website, or from locally stored content. ... International Business Machines Corporation

11/30/17 / #20170346751

Managing data traffic according to data stream analysis

Data migrations are not able to be identified or traced through a switched network to their originating hub, because the corresponding tcp/ip data stream goes through a plurality of optimized differential switches and the originating ip in the packet header gets replaced at each switch. The present invention provides a mechanism to introduce a lag or a jitter into the ip to label the migrated data. ... International Business Machines Corporation

11/30/17 / #20170346700

Overlay network movement operations

A method includes associating overlay network attributes (onas) with virtual networks. A movement operation is performed that includes re-assigning the virtual networks to servers of overlay networks based on management of the onas.. ... International Business Machines Corporation

11/30/17 / #20170346694

Providing backup and restore services to network attached appliances in a network

Provided are a computer program product, system, and method for providing backup and restore services to network attached appliances in a network. Configuration settings comprising configuration settings used in a network attached appliance are gathered and a unique identifier for the network attached appliance is determined. ... International Business Machines Corporation

11/30/17 / #20170346502

Generating a code alphabet of symbols to generate codewords for words used with a program

Provided are a computer program product, system, and method for generating a code alphabet for use by a deployed program to determine codewords for words. A first code alphabet has a first number of symbols that provide variable length codings of the words. ... International Business Machines Corporation

11/30/17 / #20170346492

Test circuit to isolate hci degradation

Embodiments are directed to a system for synchronizing switching events. The system includes a controller, a clock generator communicatively coupled to the controller and a delay chain communicatively coupled to the controller. ... International Business Machines Corporation

11/30/17 / #20170346246

Cable connection system

A cable connection system and a method of forming the cable connection system. The cable connection system includes a base and a coupling mechanism. ... International Business Machines Corporation

11/30/17 / #20170346196

Multi-frequency, multi-radiation angle, multi-polarization and multi-pattern communication antenna

An antenna is provided and includes a base antenna component, a loop antenna component, a first coupling by which the loop antenna component is pivotally attached to and selectively electrically communicative with the base antenna component, a whip antenna component, a second coupling by which the whip antenna component is pivotally attached to and selectively electrically communicative with the loop antenna component; and a transmission/reception (t/r) module. The t/r module is disposable in signal communication with at least one or more of the base, loop and whip antenna components.. ... International Business Machines Corporation

11/30/17 / #20170346097

Microbattery with through-silicon via electrodes

Batteries and methods of forming the same include an anode structure, a cathode structure, and a conductive overcoat. The anode structure includes an anode substrate, an anode formed on the anode substrate, and an anode conductive liner that is in contact with the anode. ... International Business Machines Corporation

11/30/17 / #20170345829

High density programmable e-fuse co-integrated with vertical fets

A method for integrating vertical transistors and electric fuses includes forming fins through a dielectric layer and a dummy gate stack on a substrate; thinning top portions of the fins by an etch process; epitaxially growing top source/drain regions on thinned portions of the fins in a transistor region and top cathode/anode regions on the thinned portions of the fins in a fuse region; and removing the dummy gate layer and exposing sidewalls of the fins. The fuse region is blocked to form a gate structure in the transistor region. ... International Business Machines Corporation

11/30/17 / #20170345757

Antifuse having comb-like top electrode

Antifuse structures are provided for use in applications such as field programmable gate arrays and programmable read-only memories. High aspect ratio channels within an antifuse dielectric layer are used to form antifuse electrode projections. ... International Business Machines Corporation

11/30/17 / #20170345739

Advanced through substrate via metallization in three dimensional semiconductor integration

An advanced through silicon via structure for is described. The device includes a substrate including integrated circuit devices. ... International Business Machines Corporation

11/30/17 / #20170345738

Advanced through substrate via metallization in three dimensional semiconductor integration

A method providing a high aspect ratio through substrate via in a substrate is described. The through substrate via has vertical sidewalls and a horizontal bottom. ... International Business Machines Corporation

11/30/17 / #20170345737

Advanced through substrate via metallization in three dimensional semiconductor integration

A method providing a high aspect ratio through substrate via in a substrate is described. The through substrate via has vertical sidewalls and a horizontal bottom. ... International Business Machines Corporation

11/30/17 / #20170345659

Material removal process for self-aligned contacts

A method is disclosed of removing a first material disposed over a second material adjacent to a field effect transistor gate having a gate sidewall layer that comprises an etch-resistant material on a gate sidewall. The method includes subjecting the first material to a gas cluster ion beam etch process to remove first material adjacent to the gate, and detecting exposure of the second material during the gas cluster ion beam (gcib) etch process.. ... International Business Machines Corporation

11/30/17 / #20170345656

Fabrication of semiconductor fin structures

A semiconductor substrate is a provided and an insulating layer is formed thereon. A cavity structure is formed above the insulating layer, including a lateral growth channel and a fin seed structure arranged in the lateral growth channel. ... International Business Machines Corporation

11/30/17 / #20170345654

Fabrication of compound semiconductor structures

A semiconductor substrate, comprising a first semiconductor material, is provided and an insulating layer is formed thereon; an opening is formed in the insulating layer. Thereby, a seed surface of the substrate is exposed. ... International Business Machines Corporation

11/30/17 / #20170345429

System, method, and recording medium for controlling dialogue interruptions by a speech output device

A computer speech output control method, system, and non-transitory computer readable medium, include a computer speech output control system, including a computer speech output unit configured to output a computer speech, a human speech monitoring circuit configured to determine whether a human conversation is occurring, an interruption priority setting circuit configured to set a priority setting for when the human conversation can be interrupted by the computer speech, and an interruption determining circuit configured to determine whether to cause the computer speech output unit to output the computer speech based on the priority setting and a status of the human conversation.. . ... International Business Machines Corporation

11/30/17 / #20170345415

Method for improving acoustic model, computer for improving acoustic model and computer program thereof

Embodiments include methods and systems for improving an acoustic model. Aspects include acquiring a first standard deviation value by calculating standard deviation of a feature from first training data and acquiring a second standard deviation value by calculating standard deviation of a feature from second training data acquired in a different environment from an environment of the first training data. ... International Business Machines Corporation

11/30/17 / #20170345414

Method for improving acoustic model, computer for improving acoustic model and computer program thereof

Embodiments include methods and systems for improving an acoustic model. Aspects include acquiring a first standard deviation value by calculating standard deviation of a feature from first training data and acquiring a second standard deviation value by calculating standard deviation of a feature from second training data acquired in a different environment from an environment of the first training data. ... International Business Machines Corporation

11/30/17 / #20170345309

Dynamic cross-lane travel path determination by self-driving vehicles

A method, system, and/or computer program product creates an unimpeded pathway on a roadway for a first self-driving vehicle (sdv). One or more processor(s) determine a first vehicle priority level of the first sdv. ... International Business Machines Corporation

11/30/17 / #20170345307

Fine grained location-based services

Systems, methods, and computer program products to perform an operation comprising receiving, by a first communications interface of a mobile device associated with a first vehicle, location information from a peer device associated with a second vehicle, determining, by the mobile device, an estimated location of the second vehicle relative to the first vehicle based on the location information received from the peer device, and determining, by the mobile device, that the first vehicle is located in a first lane of a road based on the estimated location of the second vehicle relative to the first vehicle.. . ... International Business Machines Corporation

11/30/17 / #20170345279

Smart garment that communicates at least one parameter to a receiver

Sensor data generated by a plurality of sensors integrated into the smart garment can be received by a processor integrated into a smart garment. Based on the sensor data, the processor can generate at least one parameter indicating a manner in which the smart garment is worn. ... International Business Machines Corporation

11/30/17 / #20170345211

Creating three dimensional models with acceleration data

Obtaining physical model data for cad model generation with a process that includes: receiving a first acceleration-based path data set including acceleration data for an accelerometer device as it was traced over a first path along the surface of a physical object, converting the first acceleration-based path data set to a first position-based data set including position data for the accelerometer as it was traced over the first path along the surface of the physical object, and generating a three dimensional object model data set based, at least in part on the position data of the first position-based data set.. . ... International Business Machines Corporation

11/30/17 / #20170345185

Predicting a chromatic identity of an existing recipe and modifying the existing recipe to meet a desired set of colors by replacing existing elements of the recipe

A mechanism is provided for modifying an existing recipe to meet a set of desired colors for a final food dish. Responsive to receiving a request to modify the existing recipe to meet the set of desired colors, at least one of the set of existing colors to be changed to meet the desired set of colors is identified. ... International Business Machines Corporation

11/30/17 / #20170345143

Surface reflectance reduction in images

Embodiments include method, systems and computer program products for reducing surface reflectance, for example in a photograph. Aspects include receiving an image set containing a plurality of images of an object. ... International Business Machines Corporation

11/30/17 / #20170345085

Item location management using distributed sensors

Disclosed aspects relate to locating a particular commercial-off-the-shelf (cots) item using distributed sensors. A set of in-store mobile user online searches which have both a set of in-store location data and a set of cots item identifiers may be monitored. ... International Business Machines Corporation

11/30/17 / #20170345084

Directing movement of a self-driving vehicle based on activity at a point of sale device

A method, system, and/or computer program product controls a self-driving vehicle based on a purchase transaction at a point of sale (pos) device. One or more processors detect a purchase transaction at the pos device. ... International Business Machines Corporation

11/30/17 / #20170345014

Question and answer enhancement

A system for generating a set of questions about an upcoming product characterized by a number of product characteristics. The system identifies similar products having one or more of the same product characteristics. ... International Business Machines Corporation

11/30/17 / #20170345013

Registration of a product having an electronic lock

One embodiment provides a method, including: utilizing at least one processor to execute computer code that performs the steps of: obtaining at least one image corresponding to packaging of a product having a warranty, wherein the packaging comprises a digital lock; transmitting the at least one image to a verification entity for packaging tamper detection; receiving an electronic key for unlocking the digital lock after the verification entity determines that the packaging has not been tampered; and providing registration information for the product to a warranty registration database, wherein the registration information comprises a date of registration, product information, and information associated with the electronic key. Other aspects are described and claimed.. ... International Business Machines Corporation

11/30/17 / #20170344993

Context-aware deterrent and response system for financial transaction device security

The disclosure provides systems and methods for increasing the security of financial transaction devices and other places of value. Increased security is provided by analysis of a plurality of sensor and other inputs, and formulation of context-sensitive response plan involving the most probably effective response agents.. ... International Business Machines Corporation

11/30/17 / #20170344959

Electronic waste recycling

A method and system for recycling electronic waste is provided. The method includes detecting electronic devices at a location of a user of a mobile device. ... International Business Machines Corporation

11/30/17 / #20170344943

Incentivized adjustment of optimal delivery route

Methods, computer program products, and systems are presented. The methods include, for instance: adjusting a delivery route by use of incentives. ... International Business Machines Corporation

11/30/17 / #20170344926

System impact based logging with resource finding remediation

Embodiments include method, systems and computer program products for system impact-based event logging. Aspects include receiving one or more log events, wherein each of the one or more log event include an error code and a device identifier; performing a data-mining operation on a defect repository based upon the one or more log events and based upon at least one of the device identifier and the error code; deriving one or more enhanced event contexts for the one or more log events based upon the data-mining operation; displaying the one or more log events and the one or more enhanced event contexts; deriving a workflow based upon the enhanced event context for each of the one or more log events; and displaying the workflow, wherein the workflow comprises corrective action items and a time period for completion of each of the corrective action items.. ... International Business Machines Corporation

11/30/17 / #20170344916

Supporting analysis based on workflow

A computer-implemented method for supporting analysis based on a workflow, includes: obtaining a non-timeline-based workflow including a first process and a second process to that is executed after the first process; and outputting a timeline-based workflow including the first process arranged at a first position corresponding to a first time and the second process arranged at a second position corresponding to a second time after the first time.. . ... International Business Machines Corporation

11/30/17 / #20170344915

Colaboration tracking system

Computing systems, methods and collaboration tracking tools for predicting, tracking, and reporting the occurrence of unscheduled collaborations between two or more contributors to a project using computer systems equipped capabilities to transmit and/or receive location information of each individual contributor. An analytics module receiving the location information may use the location data to identify when two or more contributors to a project are in the same location together, and further predict whether the proximity of location and timing of the contributors crossing paths will predictably lead to an undocumented project-related collaboration determined as a function of location information, historical data and input collected. ... International Business Machines Corporation

11/30/17 / #20170344905

Coordinated version control system, method, and recording medium for parameter sensitive applications

Version vector-based rules are used to facilitate asynchronous execution of machine learning algorithms. The method uses version vector based rule to generate aggregated parameters and determine when to return the parameters. ... International Business Machines Corporation

11/30/17 / #20170344904

Coordinated version control system, method, and recording medium for parameter sensitive applications

Version vector-based rules are used to facilitate asynchronous execution of machine learning algorithms. The method uses version vector based rule to generate aggregated parameters and determine when to return the parameters. ... International Business Machines Corporation

11/30/17 / #20170344903

Parallel ensemble of support vector machines

Systems, methods, and computer-readable media for building ensemble members of a support vector machine (svm) ensemble in parallel and executing processing in parallel on data allocated to each ensemble member are disclosed. The parallel construction and processing of data of each ensemble member allows a single large svm calculation to be replaced with many smaller svm calculations performed in parallel, and thus, may reduce the computational resources required to classify datasets.. ... International Business Machines Corporation

11/30/17 / #20170344899

Automatic generation of training sets using subject matter experts on social media

A method, apparatus and computer program product for automatically generating training sets for machine learning. A set of topics to train a machine learning system is provided. ... International Business Machines Corporation

11/30/17 / #20170344893

Method for complex events detection using hidden markov models

Embodiments of the present invention may provide the capability to detect complex events while providing improved detection and performance. In an embodiment of the present invention, a method for detecting an event may comprise receiving data representing measurement or detection of physical parameters, conditions, or actions, quantizing the received data and selecting a number of samples from the quantized data, generating a hidden markov model representing events to be detected using initial model values based on ideal conditions, wherein a desired output is defined as a sequence of states, and wherein a number of states of the hidden markov model is less than or equal to the number of samples of the quantized data, adjusting the quantized data and the initial model values to improve accuracy of the model, determining a state sequence of the hidden markov model, and outputting an indication of a detected event.. ... International Business Machines Corporation

11/30/17 / #20170344892

Predicting a chromatic identity of an existing recipe and modifying the existing recipe to meet a desired set of colors by adding new elements to the recipe

A mechanism is provided for modifying an existing recipe to meet a set of desired colors for a final food dish. Responsive to receiving a request to modify the existing recipe to meet the set of desired colors, at least one of the set of existing colors to be changed to meet the desired set of colors is identified. ... International Business Machines Corporation

11/30/17 / #20170344887

Heuristically programmed artificial intelligence for mainframe operating systems

Disclosed herein is a heuristically programmable system comprising a web-socket; a backend component that is in operative communication with the web-socket to act as a heuristically programmed algorithm framework that is operative to interact with a user in natural language and in a human-like manner; a main frame computer; a web server that is in operative communication with an internet; where the main frame computer and the web server are in operative communication with the web socket; and a cognitive computing system; where the web socket comprises a computer system configured to provide a voice, motion and/or a graphical interface to a user; and where the web socket is operative to communicate with the cognitive computing system; where the cognitive computing system is operative to convert speech to text and to send this text to the web socket.. . ... International Business Machines Corporation

11/30/17 / #20170344885

Timing sequence for digital stdp synapse and lif neuron-based neuromorphic system

Methods and systems are provided for operating a neuromorphic system for generating neuron and synapse activities. The method includes: preparing at least one digital timer in the neuromorphic system, each of the at least one digital timers including multi-bit digital values; generating time signals using the at least one digital timer; emulating an analog waveform of a neuron spike; updating parameters of the neuromorphic system using the time signals and the current values of the parameters; presetting, using a processor, the digital values of the at least one digital timer to initial values when the spike input is provided to the node; and updating, using the processor, the digital values of the at least one digital timer with a specified amount when there is an absence of a spike input to the node.. ... International Business Machines Corporation

11/30/17 / #20170344828

Pavement marking determination

In an approach to determining pavement markings, a computer determines a location of a first computing device based on data received from one or more location devices associated with the first computing device. The computer then retrieves pavement marking data for one or more pavement markings for the location and determines whether one or more existing pavement markings are present at the location. ... International Business Machines Corporation

11/30/17 / #20170344827

Pavement marking determination

In an approach to determining pavement markings, a computer determines a location of a first computing device based on data received from one or more location devices associated with the first computing device. The computer then retrieves pavement marking data for one or more pavement markings for the location and determines whether one or more existing pavement markings are present at the location. ... International Business Machines Corporation

11/30/17 / #20170344769

Object identification through electromagnetic tag signature

In an approach for identifying an object using an electromagnetic tag, an electromagnetic signal is received by a sensor, wherein the electromagnetic signal originates from an electromagnetic tag affixed to an object, and wherein the electromagnetic signal passes through a physical propagation channel. A processor searches a database for an electromagnetic signature corresponding to the electromagnetic signal, wherein the database comprises, at least, object information associated with the electromagnetic signature. ... International Business Machines Corporation

11/30/17 / #20170344757

Cpu obfuscation for cloud applications

A cloud deployment system is used for obfuscating cpu operation codes in a set of machines operating in a distributed computing environment. A reprogrammable microcode replaces a hardware instruction set, the microcode layer containing a set of original operation codes. ... International Business Machines Corporation

11/30/17 / #20170344753

Inter-process access control

A kernel receives a request to execute a first process instance from an agent. The first process instance is an instance of a first program. ... International Business Machines Corporation

11/30/17 / #20170344752

Inter-process access control

A kernel receives a request to execute a first process instance from an agent. The first process instance is an instance of a first program. ... International Business Machines Corporation

11/30/17 / #20170344750

Managing mobile application security

One embodiment provides a method, the method including: utilizing at least one processor to execute computer code that performs the steps of: identifying one or more access permissions of an application associated with an electronic device; identifying, based on the access permissions, information accessible to the application; analyzing user information within with the accessible information; determining, based on the analyzing, at least one personal exposure risk; and providing to a user, based on the at least one information exposure risk, at least one proposed solution. Other aspects are described and claimed.. ... International Business Machines Corporation

11/30/17 / #20170344746

Utilizing likely invariants for runtime protection of web services

An exemplary method for use with an application includes: testing the application with a set of security payloads to produce a set of execution traces, wherein testing the application with a given one of the set of security payloads produces a corresponding one of the set of execution traces; determining a set of candidate points comprising at least one candidate point for each of the set of security payloads, wherein a candidate point for the given one of the set of security payloads is determined based on the corresponding one of the set of execution traces; inferring a set of trust boundaries based on the determined set of candidate points; computing one or more possible transition points across the inferred set of trust boundaries; and instrumenting the application with a security defense at each of the computed possible transition points across the inferred set of trust boundaries.. . ... International Business Machines Corporation

11/30/17 / #20170344730

Managing data to diminish cross-context analysis

A mechanism is provided for managing user accounts used on the data processing system. A first user account and second user account are initialized. ... International Business Machines Corporation

11/30/17 / #20170344722

System, method and recording medium for cognitive health management

A cognitive health management method, system, and non-transitory computer readable medium, include analyzing user input data of a first user by comparing the user input data of the first user to medical data in the database, and providing both of: a recommendation to the first user based on the comparison of the user input data of the first user to the medical data of the database, and a result feedback including a conclusion of the analyzing to a result feedback section of the database.. . ... International Business Machines Corporation

11/30/17 / #20170344710

Identifying personalized time-varying predictive patterns of risk factors

Aspects of the present invention include a method, system and computer program product. The method includes identifying, by a processor, a set of global risk factors for a target event using training patients, and providing, by the processor, a disease progression timeline with defined time stamps by aligning longitudinal data of the training patients based on the defined time stamp of risk targets. ... International Business Machines Corporation

11/30/17 / #20170344709

Medical patient billing session using a temporary identity

One embodiment provides a method including: utilizing at least one processor to execute computer code that performs the steps of: obtaining biometric information from a plurality of patients, wherein the biometric information comprises an image of each of the plurality of patients; obtaining at least one medical document associated with each of the plurality of patients; assigning a temporary identity to each of the plurality of patients; creating a billing session for each of the temporary identities, wherein the billing session comprises at least a subset of the medical document and the biometric information for the respective patient; storing, in a database, the billing sessions and a timestamp for each of the billing sessions; obtaining new biometric information from a particular patient, wherein the new biometric information comprises an image of the particular patient; identifying the temporary identity assigned to the particular patient by identifying, from the database, the temporary identity having biometric information that matches the new biometric information; and retrieving, from the database, the billing session of the particular patient. Other aspects are described and claimed.. ... International Business Machines Corporation

11/30/17 / #20170344694

Method and recording medium of reducing chemoepitaxy directed self-assembled defects

A method, system, and non-transitory computer readable medium for reducing chemo-epitaxy directed-self assembly (dsa) defects of a layout of a guiding pattern, include inserting an internal dummy between a first portion of the guiding pattern and a second portion of the guiding pattern if a vertical spacing is equal to or greater than a first predetermined distance, inserting a first external dummy along an external edge of the guiding pattern in a vertical direction if the vertical spacing is greater than a second predetermined distance, and inserting an anti-taper structure on the first external dummy if a second distance from the external edge of the guiding pattern to the edge of the first external dummy is greater than a first distance.. . ... International Business Machines Corporation

11/30/17 / #20170344693

Programmable clock division methodology with in-context frequency checking

A method, system, and compute program product use a generalized macro or a generalized macro timing abstract for a timing analysis in a specific timing context. The method includes setting up a timer, and determining a divide ratio of each external clock divider of one or more external clock dividers associated with the generalized macro or the generalized macro timing abstract programmatically as a function of another value. ... International Business Machines Corporation

11/30/17 / #20170344691

Pattern decomposition method for wiring patterns with chemoepitaxy based directed self assembly

A chemical pattern layer including an orientation control material and a prepattern material is formed over a substrate. The chemical pattern layer includes alignment-conferring features and additional masking features. ... International Business Machines Corporation

11/30/17 / #20170344684

System and method for generation of an integrated circuit design

A method for verification of a design of an electronic circuit is provided. The method includes executing test runs of the design. ... International Business Machines Corporation

11/30/17 / #20170344679

System and method for generation of an integrated circuit design

A method for verification of a design of an electronic circuit is provided. The method includes executing test runs of the design. ... International Business Machines Corporation

11/30/17 / #20170344678

Formal verification driven power modeling and design verification

A computer-implemented method includes receiving a unit, wherein each unit includes one or more blocks. The computer-implemented method further includes selecting one or more input pins for each of said one or more blocks. ... International Business Machines Corporation

11/30/17 / #20170344661

Dynamic window adjustments in a streaming environment

A first stream operator can receive a first tuple including a first set of attributes to be stored in a first window and a second tuple including a second set of attributes to be stored in a second window. The first window and the second window can each have an eviction policy. ... International Business Machines Corporation

11/30/17 / #20170344660

Dynamic window adjustments in a streaming environment

A first stream operator can receive a first tuple including a first set of attributes to be stored in a first window and a second tuple including a second set of attributes to be stored in a second window. The first window and the second window can each have an eviction policy. ... International Business Machines Corporation

11/30/17 / #20170344653

Searching and aggregating web pages

A method, according to one embodiment, includes, at a server in communication with a database and a network, receiving from a user a link to an internet webpage, via the network, analyzing, by the server, a rich site summary (rss) feed of the internet webpage and text in the internet webpage, categorizing, by the server, the internet webpage into a predetermined category based on the rss feed of the internet webpage and the text in the internet webpage, creating, by the server, a summary of the internet webpage, utilizing the rss feed of the internet webpage and the text in the internet webpage, identifying, by the server, an image from the internet webpage, resizing, by the server, the image from the internet webpage to create a resized image, including, by the server, the resized image in the summary of the internet webpage, upon determining that the resized image has a minimum size, meets predetermined aspect ratio limits, and is not repeated within the predetermined category, and in a webpage associated with the predetermined category, displaying, by the server, the summary of the internet webpage with summaries of other internet webpages categorized into the predetermined category.. . ... International Business Machines Corporation

11/30/17 / #20170344645

Dynamic cognitive user interface

A system, method and program product for a query-based interface in a cognitive computing platform. A system is provided that includes a query processor that inputs a query for an identified user and determines a set of results for inclusion in a cognitive response based on a set of information sources; a modality selection system that selects an interface modality for the cognitive response based on user profile data and at least one external input; and a response formatting system that determines a response format for the set of results in the cognitive response, wherein the response format is determined based on confidence levels determined from social networking information associated with the identified user.. ... International Business Machines Corporation

11/30/17 / #20170344639

Heuristically programmed artificial intelligence for mainframe operating systems

Disclosed herein is a heuristically programmable system comprising a web-socket; a backend component that is in operative communication with the web-socket to act as a heuristically programmed algorithm framework that is operative to interact with a user in natural language and in a human-like manner; a main frame computer; a web server that is in operative communication with an internet; where the main frame computer and the web server are in operative communication with the web socket; and a cognitive computing system; where the web socket comprises a computer system configured to provide a voice, motion and/or a graphical interface to a user; and where the web socket is operative to communicate with the cognitive computing system; where the cognitive computing system is operative to convert speech to text and to send this text to the web socket.. . ... International Business Machines Corporation

11/30/17 / #20170344637

Dynamically tagging webpages based on critical words

A webpage is received. A request to tag a webpage is received. ... International Business Machines Corporation

11/30/17 / #20170344636

Determining web-page keyword relevance based on social media

A method for determining keyword relevance based on social media includes receiving initial keywords associated with a particular web page. The method queries one or more social media platforms using the initial keywords. ... International Business Machines Corporation

11/30/17 / #20170344625

Obtaining of candidates for a relationship type and its label

The present invention may be a method, a computer system, and/or a computer program product. An embodiment of the present invention provides a computer-implemented method for obtaining one or more candidates for a relationship type and its label. ... International Business Machines Corporation

11/30/17 / #20170344624

Modifying a presentation of socially shared items based on locating a user in real-time

An embodiment for adjusting a displayed organization of a representative collection of items. The method includes a computer processor identify a first user within a first location that includes determining a first set of location information associated with the first user within the first location and information associated with the first location. ... International Business Machines Corporation

11/30/17 / #20170344621

Efficient aggregation in a parallel system

A method, a system, and a computer program product are provided. A filter is created for each portion of a data set. ... International Business Machines Corporation

11/30/17 / #20170344611

Question answer system using physical distance data

A question relating to an individual is received and context from the question is extracted. Subject matter criteria can be identified from the context of the question. ... International Business Machines Corporation

11/30/17 / #20170344608

Sorting tables in analytical databases

A method for sorting a data table is provided. The method may include providing a plurality of attribute value information for each data block of the data table. ... International Business Machines Corporation

11/30/17 / #20170344604

Source code search engine

A source code search comprises a two-pass search. The first pass comprises a topological measure of similarity. ... International Business Machines Corporation

11/30/17 / #20170344603

Managing a data set

A method of and system for managing a data set of a storage facility is disclosed. The data set may be a sequential-access data set. ... International Business Machines Corporation

11/30/17 / #20170344600

Managing a modification to a consistent region of a stream computing environment

Disclosed aspects relate to managing a stream computing environment. The stream computing environment may have a consistent region that includes a set of stream operators for processing a stream of tuples. ... International Business Machines Corporation

11/30/17 / #20170344598

De-duplication optimized platform for object grouping

Embodiments are provided for enhancing storage efficiency in a de-duplication enabled storage system. Using one or more de-duplication metadata repositories local to respective nodes of a storage system, objects are pre-processed in each node. ... International Business Machines Corporation

11/30/17 / #20170344586

De-duplication optimized platform for object grouping

Embodiments are provided for enhancing storage efficiency in a de-duplication enabled storage system. Metadata of a shared-nothing clustered file system is scanned, and a first state of the storage system is determined. ... International Business Machines Corporation

11/30/17 / #20170344578

Compressed data layout for optimizing data transactions

The embodiments described herein relate to managing compressed data to optimize file compression for efficient random access to the data. A first partition of a first data block of a compression group is compressed. ... International Business Machines Corporation

11/30/17 / #20170344570

Linear tape file system selective file and directory tape mounting

An approach for optimized selective file and directory tape mounting based on a linear tape file system (ltfs). A selective ltfs mount receives ltfs index metadata and search inputs for searching for files and directories. ... International Business Machines Corporation

11/30/17 / #20170344569

Mapping non-generic markup language elements to generic object-oriented programming language objects

A system extends functionality of java architecture for xml binding, (jaxb). Represents non-generic elements of a markup language (for example, xml) document in an object oriented programming language (for example, java). ... International Business Machines Corporation

11/30/17 / #20170344562

Deleting files written on tape

A method for writing a file from an application of a host onto a tape includes sequentially receiving records forming the file from the application, adding a predetermined number of segments of dummy data (dummy records) subsequently to the plurality of records forming the file such that the records of the file and records of a subsequent file are not included in the same data set, interposing the dummy records between a final record of the file and a head record of the subsequent (next) file, to thereby construct at least one data set that is adjacent to one data set and does not include the records of the file, and writing a data set including the records of the file, a data set (dummy data set) including the final record of the file and the dummy records, and a data set including the subsequent file, onto the tape.. . ... International Business Machines Corporation

11/30/17 / #20170344561

Deleting files written on tape

A method for writing a file from an application of a host onto a tape includes sequentially receiving records forming the file from the application, adding a predetermined number of segments of dummy data (dummy records) subsequently to the plurality of records forming the file such that the records of the file and records of a subsequent file are not included in the same data set, interposing the dummy records between a final record of the file and a head record of the subsequent (next) file, to thereby construct at least one data set that is adjacent to one data set and does not include the records of the file, and writing a data set including the records of the file, a data set (dummy data set) including the final record of the file and the dummy records, and a data set including the subsequent file, onto the tape.. . ... International Business Machines Corporation

11/30/17 / #20170344558

Graph method for system sensitivity analyses

A computer-implemented method, computer program product, and system for determination of critical parts and component correlations in a circuit using a correlation graph and centrality analysis including; receiving a circuit layout portion of a larger circuit layout, converting the circuit layout portion into a correlation graph representing components as nodes and connecting wires as edges, determining, using ground truth and naïve bayes to determine correlation weighting, scaling the correlation graph to represent the larger circuit, and presenting the larger correlation graph on a graphical user interface (gui).. . ... International Business Machines Corporation

11/30/17 / #20170344550

Cognitive computer assisted attribute acquisition through iterative disclosure

A method, system, and computer program product are provided for displaying query items (e.g., patient attributes) and answers (e.g., treatment recommendations) by performing a ranking analysis of query items by running a cognitive analysis comparison of each marginal answer confidence improvement metric for each unspecified query item in the first plurality of query items to rank the query items in sorted order from largest to smallest marginal answer confidence improvement metric.. . ... International Business Machines Corporation

11/30/17 / #20170344549

Enhanced database query processing

A method includes receiving, from a client device, an enhanced database query for a union operation of a first query and at least a second query, parsing the enhanced database query to identify two or more parameters controlling handling of duplicate rows in the first query and the second query, evaluating the enhanced database query utilizing the parameters to generate a result table, and providing the result table to the client device. . ... International Business Machines Corporation

11/30/17 / #20170344529

Method and system to convert document source data to xml via annotation

Techniques are provided for performing automated operations to construct xml, documents from source data based on user annotations of source data. A document received from a user includes source data and one or more annotations by the user regarding at least one subset of the source data. ... International Business Machines Corporation

11/30/17 / #20170344516

Real-time text layout conversion control and management on a mobile electronic device

Various embodiments for real-time text layout conversion control on a mobile electronic device, by a processor device, are provided. On a mobile electronic device having a touch-screen display, a set of text layout conversion control patterns are defined and associated with at least one text layout input control signal, for text layout conversion management. ... International Business Machines Corporation

11/30/17 / #20170344495

Consistent utility-preserving masking of a dataset in a distributed enviornment

Distributed, consistent utility-preserving data masking is provided by retrieving an original value from a data table; initiating a communication with a mapping service to ascertain whether or not a masking table of the mapping service includes a fictionalized value associated with the original value; when the masking table does not include a fictionalized value associated with the original value, producing a fictionalized value for the original value wherein the fictionalized value preserves at least one utility function of the original value, updating the mapping service to include the fictionalized value in the masking table, and applying a first masking operation by replacing the retrieved original value with the fictionalized value.. . ... International Business Machines Corporation

11/30/17 / #20170344493

Using an access increment number to control a duration during which tracks remain in cache

Provided are a computer program product, system, and method for using an access increment number to control a duration during which tracks remain in cache. Tracks in a storage in the cache are indicated in a cache list. ... International Business Machines Corporation

11/30/17 / #20170344489

Embedded page size hint for page fault resolution

A page size hint may be encoded into an unused and reserved field in an effective or virtual address for use by a software page fault handler when handling a page fault associated with the effective or virtual address to enable an application to communicate to an operating system or other software-based translation functionality page size preferences for the allocation of pages of memory and/or to accelerate the search for page table entries in a hardware page table.. . ... International Business Machines Corporation

11/30/17 / #20170344485

Heterogeneous runahead core for data analytics

Techniques that facilitate heterogeneous runahead processing for a processor core are provided. In one example, a first core performs a first execution of a first sequence of instructions, where the first core is communicatively coupled to a first cache memory. ... International Business Machines Corporation

11/30/17 / #20170344469

Managing an effective address table in a multi-slice processor

Methods and apparatus for managing an effective address table (eat) in a multi-slice processor including receiving, from an instruction sequence unit, a next-to-complete instruction tag (itag); obtaining, from the eat, a first itag from a tail-plus-one eat row, wherein the eat comprises a tail eat row that precedes the tail-plus-one eat row; determining, based on a comparison of the next-to-complete itag and the first itag, that the tail eat row has completed; and retiring the tail eat row based on the determination.. . ... International Business Machines Corporation

11/30/17 / #20170344466

Synchronization of hardware agents in a computer system

A system and method synchronizes heterogeneous agents in a computer system with a software synchronization mechanism. Agents of the computer system connected to a common memory, including agents lacking a hardware synchronization system, can be synchronized with the software synchronization mechanism. ... International Business Machines Corporation

11/30/17 / #20170344463

System and method for bypassing evasion tests with applications in analysis and monitoring of mobile applications

A given program is said to be evasive when it performs different behaviors under different running conditions. In general, the aim of evasion is to make the analysis, monitoring or reverse engineering of the given software system harder for an analyzer. ... International Business Machines Corporation

11/30/17 / #20170344459

System, method and apparatus for deriving root cause for software test failure

For a program of interest represented as a sequence of states comprising variables and flags wherein controls transition the program from state to state, and wherein the program includes tests at prescribed locations in the program that are applied upon specific states and generate observables, a method includes inserting at different points in the program hooks that capture program runtime behaviors constituting classification features. The method further includes flattening the program states, commands and tests along a program run-time timeline, and identifying a root cause of a program failure by backtrack analyzing a stream of input states and commands and output consequent states, commands and test results to detect causal correlations between variables, states and commands. ... International Business Machines Corporation

11/30/17 / #20170344458

System and method for determining relevance of application software maintenance

A method, computer program product, and computer system for compiling, by a computing device, a list of hosting software classes included in the hosting software fix pack when a fix is available. An execution path of each application hosted on a hosting software may be recorded. ... International Business Machines Corporation

11/30/17 / #20170344455

Event rate change based hardware performance data collection

An approach for writing performance data to memory based on a hardware event rate change involving receiving a hardware event count associated with a computer processor, comparing the hardware event count to a previous hardware event count, computing the hardware event rate change associated with a change between the hardware event count and the previous hardware event count and, responsive to the hardware event rate change not equaling a threshold rate, writing the hardware event count to memory.. . ... International Business Machines Corporation

11/30/17 / #20170344454

Determining dynamic statistics based on key value patterns

A method for dynamically updating database statistics and a plurality of access paths associated with at least one database table is provided. The method may include identifying at least one dynamically changing column associated with the at least one database table. ... International Business Machines Corporation

11/30/17 / #20170344453

Determining dynamic statistics based on key value patterns

A method for dynamically updating database statistics and a plurality of access paths associated with at least one database table is provided. The method may include identifying at least one dynamically changing column associated with the at least one database table. ... International Business Machines Corporation

11/30/17 / #20170344452

Comprehensive testing of computer hardware configurations

A program operating to test a computer has a limit to the number of certain components that it can utilize, less than the number of those components included in the computer. A resource allocator program receives a signal to modify allocation of resources to the programs executing in the computer. ... International Business Machines Corporation

11/30/17 / #20170344448

Comprehensive testing of computer hardware configurations

A program operating to test a computer has a limit to the number of certain components that it can utilize, less than the number of those components included in the computer. A resource allocator program receives a signal to modify allocation of resources to the programs executing in the computer. ... International Business Machines Corporation

11/30/17 / #20170344446

Data recovery in multi-target data storage networks

A computer-implemented method, according to one embodiment, includes: using a supplemental data storage volume at a secondary location to track a first set of data updates to a primary data storage volume at a primary location in response to a failure event at the primary location; retrieving a second set of tracked data updates to the primary data storage volume stored in a secondary data storage volume at the secondary location; merging the second set of tracked data updates into the first set of tracked data updates in the supplemental data storage volume; and transitioning the merged data updates from the supplemental data storage volume at the secondary location to the primary data storage volume at the primary location. Other systems, methods, and computer program products are described in additional embodiments.. ... International Business Machines Corporation

11/30/17 / #20170344436

Back-up of information stored in mobile computing devices

A method, and associated computer program product and mobile computing device, for backing-up information stored in the mobile computing device. The mobile computing device detects one or more support computing devices located within a corresponding communication range and being available to support the mobile computing device for backing-up the information stored in the mobile computing device. ... International Business Machines Corporation

11/30/17 / #20170344428

Selecting data for storage in a dispersed storage network

A method includes receiving a first write request that includes a first encoded data slice, a slice name, a new revision level associated with the slice name, and a previous revision level associated with the slice name. The method further includes determining whether another write request from another requesting device is pending. ... International Business Machines Corporation

11/30/17 / #20170344427

Concatenating data objects for storage in a dispersed storage network

A method includes identifying an independent data object of a plurality of independent data objects for retrieval from dispersed storage network (dsn) memory. The method further includes determining a mapping of the plurality of independent data objects into a data matrix, wherein the mapping is in accordance with the dispersed storage error encoding function. ... International Business Machines Corporation

11/30/17 / #20170344416

Data lifecycle management

A method and technique for data lifecycle management includes identifying a fault from a monitored system. One or more metrics that are related to the fault are identified and stored in a memory. ... International Business Machines Corporation

11/30/17 / #20170344413

System impact based logging with enhanced event context

Embodiments include method, systems and computer program products for system impact-based event logging. Aspects include receiving, by a processor, one or more log event, wherein each of the one or more log events include an error code and a device identifier; performing a data-mining operation on at least one defect repository based upon the one or more log events and based upon at least one of the device identifier and the error code; deriving one or more enhanced event contexts for at least one of the one or more log events based upon the data-mining operation; and displaying, by a log aggregation tool, the one or more log events and the one or more enhanced event contexts.. ... International Business Machines Corporation

11/30/17 / #20170344411

Equipment failure risk detection and prediction in industrial process

Detecting equipment failure risk in industrial process may include distributing equipment operations data to a cluster of servers based on a range of time and operation specified in maintenance data associated with the equipment. From a record entry in the maintenance data, an operation and installation and maintenance time may be determined. ... International Business Machines Corporation

11/30/17 / #20170344410

Identifying defunct nodes in data processing systems

A computer system may generate a lineage graph for a data processing system. The lineage graph may contain one or more nodes, and it may identify the flow of data through the data processing system. ... International Business Machines Corporation

11/30/17 / #20170344409

Identifying defunct nodes in data processing systems

A computer system may generate a lineage graph for a data processing system. The lineage graph may contain one or more nodes, and it may identify the flow of data through the data processing system. ... International Business Machines Corporation

11/30/17 / #20170344400

Method and system for performance ticket reduction

A computer-implemented method for preventing the occurrence of performance tickets in a computing system comprising a plurality of virtual machines hosted by a host computing system. The method comprising the steps of: monitoring a resource usage parameter associated with the workload of a virtual machine in order to obtain historic resource usage information; determining information regarding certain dependencies within the historic resource usage information; selecting partial information from the historic resource usage information based on said determined information regarding certain dependencies; estimating the future workload of the virtual machines based on said selected partial information; and resizing the computational resources of one or more virtual machines based on the estimated future workload such that a usage threshold of a computational resource is below a given threshold in order to avoid the generation of a performance ticket.. ... International Business Machines Corporation

11/30/17 / #20170344397

Distributing work in a streaming application to computer systems according to system resources

An apparatus and method determine at runtime how to distribute work from a streaming application to multiple available computer systems based on system resources on the available computer systems, such as cpu capacity, memory capacity, storage capacity, etc. The computer systems running a streaming application can be continuously monitored, and when system resources change, portions of the streaming application can be reallocated among the computer systems according to the monitored changes in system resources.. ... International Business Machines Corporation

11/30/17 / #20170344391

Extending trusted hypervisor functions with existing device drivers

Systems, methods, and computer program products to perform an operation comprising executing a device driver in a private logical partition on a compute host, wherein the device driver is configured to execute in an environment different than an environment of a hypervisor of the compute host, establishing a communication channel between the private logical partition and an adjunct partition executing on the compute host, and configuring, responsive to a command sent by the adjunct partition to the device driver via the communication channel, a physical function of a single root i/o virtualization (sr-iov) device of the host system.. . ... International Business Machines Corporation

11/30/17 / #20170344387

Managing a set of compute nodes which have different configurations in a stream computing environment

Disclosed aspects relate to managing a set of compute nodes for processing a stream of tuples using a set of processing elements. The set of compute nodes is structured to include both a first compute node having a first configuration and a second compute node having a second configuration. ... International Business Machines Corporation

11/30/17 / #20170344386

State synchronized interactive software demonstration

Embodiments of the present invention provide systems and methods for interactive software demonstrations. While a presenter demonstrates software to the participants, the demonstration may be “paused” and “resumed.” when paused, the participants are able to interact with the demonstrated software program. ... International Business Machines Corporation

11/30/17 / #20170344382

Stream computing application shutdown and restart without data loss

In a stream computing application shutdown, a shutdown message is received by a source operator of the stream computing application. In response, the source operator stops acquiring data from external sources, sends any cached data to an output queue of the source operator, sends the shutdown message to the output queue of the source operator, and sends the cached data and shutdown message to an input queue of another operator in the stream computing application. ... International Business Machines Corporation

11/30/17 / #20170344381

Register comparison for operand store compare (osc) prediction

Embodiments relate to register comparison for register comparison for operand store compare (osc) prediction. An aspect includes, for each instruction in an instruction group of a processor pipeline: determining a base register value of the instruction; determining an index register value of the instruction; and determining a displacement of the instruction. ... International Business Machines Corporation

11/30/17 / #20170344380

Direct register restore mechanism for distributed history buffers

Techniques are disclosed for restoring register data in a processor. In one embodiment, a method includes receiving an instruction to flush one or more general purpose registers (gprs) in a processor. ... International Business Machines Corporation

11/30/17 / #20170344379

Generating a mask vector for determining a processor instruction address using an instruction tag in a multi-slice processor

Methods and apparatus for generating a mask vector for determining a processor instruction address using an instruction tag (itag) in a multi-slice processor including receiving a first itag value and an interrupt itag value; generating the mask vector divided into mask sections comprising a plurality of elements with unset flags; for each mask section: if the mask section comprises the first itag value, setting a flag of an element in the mask section corresponding to the first itag value; if the mask section comprises the interrupt itag value, setting a flag of an element in the mask section corresponding to the interrupt itag value; setting each flag of each element in the mask vector between the element in the mask vector corresponding to the first itag value and the element in the mask vector corresponding to the interrupt itag value; and providing the mask vector to an instruction fetch unit.. . ... International Business Machines Corporation

11/30/17 / #20170344378

Managing an effective address table in a multi-slice processor

Methods and apparatus for managing an effective address table (eat) in a multi-slice processor including receiving, from an instruction sequence unit, a next-to-complete instruction tag (itag); obtaining, from the eat, a first itag from a tail-plus-one eat row, wherein the eat comprises a tail eat row that precedes the tail-plus-one eat row; determining, based on a comparison of the next-to-complete itag and the first itag, that the tail eat row has completed; and retiring the tail eat row based on the determination.. . ... International Business Machines Corporation

11/30/17 / #20170344377

Power management of branch predictors in a computer processor

A computer processor includes a branch prediction unit that includes a local branch predictor and a global branch predictor. Managing power consumption in such a computer processor includes, for each of a plurality of branch instructions: performing, by the local branch predictor, a local branch prediction; performing, by each of the global branch predictors, a global branch prediction; determining to utilize the local branch prediction over the global branch predictions as a branch prediction for the branch instruction; incrementing a value of a counter; determining whether the value of the counter exceeds a predetermined threshold; and if the value of the counter exceeds the predetermined threshold, powering down at least one of the global branch predictors and configuring the branch prediction unit to bypass the powered down global branch predictor for branch predictions of subsequent branch instructions.. ... International Business Machines Corporation

11/30/17 / #20170344373

Distance-based branch prediction and detection

Examples of techniques for distance-based branch prediction are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes: determining, by a processing system, a potential return instruction address (ia) by determining whether a relationship is satisfied between a first target ia and a first branch ia; storing a second branch ia as a return when a target ia of a second branch matches a potential return ia for the second branch; and applying the potential return ia for the second branch as a predicted target ia of a predicted branch ia stored as a return. ... International Business Machines Corporation

11/30/17 / #20170344372

Power management of branch predictors in a computer processor

A computer processor includes a branch prediction unit that includes a local branch predictor and a global branch predictor. Managing power consumption in such a computer processor includes, for each of a plurality of branch instructions: performing, by the local branch predictor, a local branch prediction; performing, by each of the global branch predictors, a global branch prediction; determining to utilize the local branch prediction over the global branch predictions as a branch prediction for the branch instruction; incrementing a value of a counter; determining whether the value of the counter exceeds a predetermined threshold; and if the value of the counter exceeds the predetermined threshold, powering down at least one of the global branch predictors and configuring the branch prediction unit to bypass the powered down global branch predictor for branch predictions of subsequent branch instructions.. ... International Business Machines Corporation

11/30/17 / #20170344371

Distance-based branch prediction and detection

Examples of techniques for distance-based branch prediction are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes: determining, by a processing system, a potential return instruction address (ia) by determining whether a relationship is satisfied between a first target ia and a first branch ia; storing a second branch ia as a return when a target ia of a second branch matches a potential return ia for the second branch; and applying the potential return ia for the second branch as a predicted target ia of a predicted branch ia stored as a return.. ... International Business Machines Corporation

11/30/17 / #20170344370

Operation of a multi-slice processor implementing tagged geometric history length branch prediction

Operation of a multi-slice processor implementing a tagged geometric history length prediction unit and an effective address table aligned with an update table, where the multi-slice processor includes a plurality of execution slices. Operation of such a multi-slice processor includes: receiving, at an effective address table and at a tage update table, information for a branch instruction dispatched to an execution slice, wherein the effective address table and the tage update table are in alignment; responsive to the branch instruction being taken, updating the effective address table and the tage update table to indicate the branch instruction being taken; and updating, in dependence upon the alignment between the effective address table and the tage update table, the tage branch prediction unit with update information from both the effective address table and the tage update table.. ... International Business Machines Corporation

11/30/17 / #20170344368

Identifying an effective address (ea) using an interrupt instruction tag (itag) in a multi-slice processor

Methods and apparatus for identifying an effective address (ea) using an interrupt instruction tag (itag) in a multi-slice processor including receiving, by an instruction fetch unit of the processor, the interrupt itag; retrieving an effective address table (eat) row from an eat, wherein the eat row comprises a range of eas and a first itag of a range of itags; accessing a processor instruction vector comprising a plurality of elements, each element corresponding to one of a plurality of itags; applying a mask to the processor instruction vector to obtain a portion of the processor instruction vector that begins with an element corresponding to the first itag and is defined by an element corresponding to the interrupt itag; calculating an ea offset; and identifying the ea for the interrupt itag using the ea offset and the range of eas in the retrieved eat row.. . ... International Business Machines Corporation

11/30/17 / #20170344345

Versioning of build environment information

A method includes collecting information corresponding to a build environment in which a build result of a source code is generated, the collected information including one or more predefined build environment factors, and storing, in a repository, the collected information as a version of the build environment.. . ... International Business Machines Corporation

11/30/17 / #20170344338

Identifying user preferences and changing settings of a device based on natural language processing

A method, a computer program product, and a computer system for identifying user preferences and changing settings of a device based on natural language processing. One or more programs running in background on the device capture an input of natural language from a user of the device, match the input of the natural language to a user frustration, map the user frustration to one or more solutions that make one or more changes of settings on the device, apply the one or more changes of settings to set user preference settings on the device, and store the user preference settings in a common store for the user.. ... International Business Machines Corporation

11/30/17 / #20170344335

Updating media files for increased resolution with optimized usage of storage

A device of updating a media file for an increased resolution includes an i/o interface, a processor, and a storage device. The i/o interfaces acquires a first media file having first data samples and a second media file having second data samples. ... International Business Machines Corporation

11/30/17 / #20170344293

Volume integrity in a shared-resource environment

A computer-implemented method includes receiving, by a storage controller from a first system, a fencing command that includes a parameter identifying a scope of an operation performed on a shared volume, utilizing a processor, setting, by the storage controller, a fencing indicator for at least a second system that is connected to the shared volume, utilizing the processor, where the fencing indicator limits access to the shared volume by the second system, sending, by the storage controller, a notification to the second system, utilizing the processor, where the notification includes the parameter and informs the second system that the access to the shared volume is limited, receiving, by the storage controller, an unfencing command from the second system, utilizing the processor, and resetting or removing the fencing indicator for the second system, utilizing the processor.. . ... International Business Machines Corporation

11/30/17 / #20170344280

Targeted secure data overwrite

Provided are a computer program product, system, and method in accordance with one embodiment of the present description, in which selected memory resources targeted for secure data cleaning. For example, memory resources which may be targeted for secure data cleaning may include a specific volume (or portion of a volume) of data storage which has been selected for secure erasure of any residual data which may remain on the targeted storage volume before the volume is released for use by others. ... International Business Machines Corporation

11/30/17 / #20170344273

Write procedure using estimated best setting in first run

A computer program product for implementing write procedures using an estimated best setting in a first run, the computer program product comprising a computer readable storage medium having program instructions executable by a tape drive to cause the tape drive to perform a method comprising: receiving, at the tape drive, a request for a write operation to be performed in the tape drive; determining, by the tape drive, a capacity margin ratio of the tape drive; determining an optimum a write procedure based at least in part on the capacity margin ratio; and invoking the optimum write procedure in response to determining the optimum write procedure. The optimum write procedure is selected from the group consisting of: a backhitch write procedure, a same wrap backhitchless flush (swbf) write procedure, and a recursively accumulating backhitchless flush (rabf) write procedure.. ... International Business Machines Corporation

11/30/17 / #20170344272

Write procedure using estimated best setting in first run

A computer program product includes a computer readable storage medium having program instructions executable by a tape drive to cause the tape drive to perform a method comprising: receiving, at the tape drive, a request for a write operation to be performed in the tape drive; determining, by the tape drive, an expected transaction size of a next write operation; comparing, by the tape drive, the expected transaction size of the next write operation to each of a first transaction size threshold and a second transaction size threshold in response to receiving the request; determining, by the tape drive, an optimum a write procedure based at least in part on the comparison; and invoking, by the tape drive, the optimum write procedure in response to determining the optimum write procedure.. . ... International Business Machines Corporation

11/30/17 / #20170344271

Writing data spanning plurality of tape cartridges

A method includes, in a tape apparatus system, receiving a request to write a file from a host, and, in response to the request, dividing sequentially received data of the file into two or more segments. Each of the two or more segments have a predetermined size. ... International Business Machines Corporation

11/30/17 / #20170344268

Scalable and efficient access to and management of data and resources in a tiered data storage system

A system according to one embodiment includes a processor and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to store hierarchically-organized global configuration information for each node and each tape library resource in a storage cluster to at least one memory accessible by each node of the storage cluster. ... International Business Machines Corporation

11/30/17 / #20170344265

Selecting resources to make available in local queues for processors to use

Provided are a computer program product, system, and method for selecting resources to make available in local queues for processors to use. Each processor of a plurality of processors maintains a queue of resources for the processor to use when needed for processor operations. ... International Business Machines Corporation

11/30/17 / #20170344264

Initializing a pseudo-dynamic data compression system with predetermined history data typical of actual data

In at least one embodiment, a history data structure of a lempel-ziv compressor is preloaded with fixed predetermined history data typical of actual data of a workload of the lempel-ziv compressor. The lempel-ziv compressor then compresses each of multiple data pages in a sequence of data pages by reference to the fixed predetermined history data.. ... International Business Machines Corporation

11/30/17 / #20170344225

Social sharing path user interface insights

A method for generating a sentiment map user interface is presented. The method may include collecting a plurality of content data, whereby the plurality of content data includes an original message and at least one response. ... International Business Machines Corporation

11/30/17 / #20170344217

Pointer-based gui for mobile devices

In an approach to pointer positioning, a computing device receives an instruction to enter a move mode. The computing device magnifies, in move mode, screen content to generate a virtual display. ... International Business Machines Corporation

11/30/17 / #20170344207

Contextual-based real-time text layout conversion control and management on a mobile electronic device

Various embodiments for real-time text layout conversion control on a mobile electronic device, by a processor device, are provided. On a mobile electronic device having a touch-screen display, a set of text layout conversion control signals are defined and associated with at least one of a plurality of contextual attributes, for text layout conversion management. ... International Business Machines Corporation

11/30/17 / #20170344131

Pointer-based gui for mobile devices

In an approach to pointer positioning, a computing device receives an instruction to enter a move mode. The computing device magnifies, in move mode, screen content to generate a virtual display. ... International Business Machines Corporation

11/30/17 / #20170344108

Modifying screen content based on gaze tracking and user distance from the screen

Systems, methods, and computer program products to perform an operation to enhance readability of on-screen objects, the operation comprising determining a distance of a user from a screen displaying a plurality of objects, monitoring, by a gaze module, a gaze of the user, determining a focal point of the gaze of the user relative to the screen, and modifying, based on the distance and the focal point, one or more attributes of a first object corresponding to the focal point, wherein the one or more attributes comprise at least one of a size of the first object and a zoom factor applied to the first object.. . ... International Business Machines Corporation

11/30/17 / #20170344106

Reducing hazards during mobile device use

Techniques for reducing hazards associated with mobile device use are provided. In one aspect, a method for increasing user awareness during mobile device use is provided. ... International Business Machines Corporation

11/30/17 / #20170344087

Enhancing performance of one or more slower partitions of an integrated circuit to improve performance of the integrated circuit

On a semiconductor die, a testing controller identifies a first partition unit with a first operating frequency lower than a second operating frequency of an adjacent second partition unit. A metal mask is added between one or more first header switches of the first partition unit and one or more second header switches of the second partition unit to allow the first partition unit to use a selection of the one or more second header switches for power distribution to the first partition unit.. ... International Business Machines Corporation

11/30/17 / #20170344003

Directing movement of self-driving vehicles in a delineated vehicular area

A method, system, and/or computer program product controls movement of one or more self-driving vehicles within a delineated vehicular area. One or more processor(s) receive an image of a vehicular area in which self-driving vehicles are authorized to travel, which is displayed on a display. ... International Business Machines Corporation

11/30/17 / #20170343601

Built-in device testing of integrated circuits

Embodiments are directed to a computer implemented method and system for the testing, characterization and diagnostics of integrated circuits. A system might include a device under test, such as an integrated circuit, that includes an adaptive microcontroller. ... International Business Machines Corporation

11/30/17 / #20170343363

Route navigation system, method, and recording medium for cognitive enhancement

A route navigation method, system, and non-transitory computer readable medium, include a route navigation circuit configured to provide a navigation route for a user including navigation instructions, a route querying circuit configured to send queries to the user for a response from the user regarding information of the route, and a route query managing circuit configured to manage a delivery state of the queries sent to the user and to manage the user response such that the delivery state is modified so as to change a cognitive state of the user.. . ... International Business Machines Corporation

11/30/17 / #20170342478

Magnetic flux density based dna sequencing

In an approach to magnetic flux density based dna sequencing, a static magnetic field is provided. A chain of nucleotides is passed through the magnetic field. ... International Business Machines Corporation

11/30/17 / #20170342212

Tailorable viscoelastic properties of peg-hemiaminal organogel networks

Methods, compounds, and compositions described herein generally relate to hemiaminal organogel networks (hdcns) and methods of forming hdcns. In some embodiments, a hemiaminal organogel has a plurality of first polymers, each having a first end and a second end, a plurality of second polymers, each having a first end and a second end, and a plurality of trivalent aminal-hemiaminal linkages. ... International Business Machines Corporation

11/30/17 / #20170342203

Ladder polybenzodifurans

A polybenzodifuran ladder polymer is disclosed.. . ... International Business Machines Corporation

11/30/17 / #20170342202

Ladder polybenzodifurans

A polybenzodifuran ladder polymer is disclosed.. . ... International Business Machines Corporation

11/30/17 / #20170341931

Small wafer area mems switch

Deep via technology is used to construct an integrated silicon cantilever and cavity oriented in a vertical plane which creates an electrostatically-switched mems switch in a small wafer area. Another embodiment is a small wafer area electrostatically-switched, vertical-cantilever mems switch wherein the switch cavity is etched within a volume defined by walls grown internally within a silicon substrate using through vias.. ... International Business Machines Corporation

11/30/17 / #20170341930

Small wafer area mems switch

Deep via technology is used to construct an integrated silicon cantilever and cavity oriented in a vertical plane which creates an electrostatically-switched mems switch in a small wafer area. Another embodiment is a small wafer area electrostatically-switched, vertical-cantilever mems switch wherein the switch cavity is etched within a volume defined by walls grown internally within a silicon substrate using through vias.. ... International Business Machines Corporation

11/30/17 / #20170341843

Surface distortion detector for packaging

Detecting mishandling of a packaging container. The apparatus includes: a first layer, a second layer to detect pressure placed on the packaging container, a third layer to provide spacing between the second layer and the packaging container, and an adhesive layer. ... International Business Machines Corporation

11/30/17 / #20170341747

Delivery of payloads using aircraft

Aspects of the disclosure include a method, system, and computer program for delivering a product. The method includes determining a delivery location and time for a payload using an aircraft. ... International Business Machines Corporation

11/30/17 / #20170341746

Unmanned aerial vehicle for crowd control amelioration

An unmanned aerial vehicle for providing ameliorative action. The unmanned aerial vehicle includes a processor-based monitoring device to monitor a plurality of individuals to determine crowd data associated with the plurality of individuals, a crowd estimator configured to receive the crowd data to estimate a crowd pressure estimation value indicative of a likelihood of a crowd event, the crowd pressure estimation value being based on the crowd data, and an ameliorative action generator to automatically perform a function when the crowd pressure estimation value exceeds a predetermined threshold value, wherein the function includes activating one or more feedback outputs configured to provide an ameliorative action. ... International Business Machines Corporation

11/30/17 / #20170341002

Air quality monitoring, analysis and reporting system

Tools, methods and systems for filtering air, identifying contaminants in the air being filtered, collectivizing the contaminant data from a network of filtering systems to identify the source of the contaminant, allowing for real-time mapping of the flow of contaminants in the air and predictive location mapping. Filtration systems receive, analyze, identify, track and report the presence of contaminants in the air using one or more computing systems, or specialized air filtration systems which may be either a self-contained computing systems, connected to a computing system or connected to a computing network. ... International Business Machines Corporation

11/30/17 / #20170340972

Aggregating and utilizing meta-game data for artificial intelligence in video games

Control of artificial intelligence (ai) entities in a video game is enhanced using a meta-game template which reflects successful human player styles, strategies and tactics. Multiple game histories having game environment data and meta-game data relating to human behavior are analyzed, and specific meta-game data is statistically correlated with successful play. ... International Business Machines Corporation

11/23/17 / #20170339559

Over-the-air personalization of network devices

Embodiments of the present invention may provide the capability to personalize end devices over-the-air (ota) without the involvement of device manufacturers, for example, in a federated large scale wireless iot network, such as lorawan. Preset with factory settings, end devices may securely connect to the network before they are finally personalized for their target service. ... International Business Machines Corporation

11/23/17 / #20170339523

Supporting management of groups of mobile devices

A method comprising: storing, by a computer, a list of mobile devices; creating, by the computer, a plurality of groups of the mobile devices, each group including at least one mobile device, based on locations of the mobile devices; providing, by the computer, at least one mobile device of the plurality of groups with information of a target location; and handling, by the computer, information for a mutual interaction between at least two groups of the plurality of groups.. . ... International Business Machines Corporation

11/23/17 / #20170339340

Device, system and method for cognitive image capture

An image capture device includes a camera lens capturing image data, a microphone receiving a voice command from a user, a network interface, a memory storing a computer program, and a processor configured to execute the computer program. The computer program is configured to identify a target subject and an image capture function based on the voice command and user preference data. ... International Business Machines Corporation

11/23/17 / #20170339339

Device, system and method for cognitive image capture

An image capture device includes a camera lens. A microphone receives a voice command from a user. ... International Business Machines Corporation

11/23/17 / #20170339334

Device, system and method for cognitive image capture

An image capture device includes a camera lens configured to capture image data, a microphone configured to receive a voice command from a user, a network interface configured to establish a network connection, a memory storing a computer program, and a processor configured to execute the computer program. The computer program is configured to identify a target subject and an image capture function included in the voice command using natural language processing (nlp). ... International Business Machines Corporation

11/23/17 / #20170339246

Dynamic content reordering for delivery to mobile devices

Systems, methods, and computer program products to perform an operation comprising receiving, by a mobile backend as a service (mbaas) server from an application executing on a mobile device, a request to access content, identifying a set of objects as responsive to the request, determining a respective priority for each object in the set of objects, wherein the priority of each object is based at least in part on a context of the mobile device, and transmitting at least one object in the set of objects according to the determined priorities of each object.. . ... International Business Machines Corporation

11/23/17 / #20170339219

Transparent wide-area service migration with mptcp

A system for server migration includes a first computer hosting a service during a first period of time. A second computer hosts the service during a second, third and fourth period of time. ... International Business Machines Corporation

11/23/17 / #20170339205

Using social shares to unlock media files

Embodiments are directed to a computer implemented method and system of restricting access to portions of a media file. The method includes marking a media file such that it has at least two portions. ... International Business Machines Corporation

11/23/17 / #20170339201

Streaming data on data processes

A method, system and computer program product for servicing media content. In one embodiment, the media content is processed by having each of a group of services process increments of the media content, one increment at a time; and the order in which the services process these increments is orchestrated to process all of the media content in accordance with a defined procedure. ... International Business Machines Corporation

11/23/17 / #20170339176

Modifying a user session lifecycle in a cloud broker environment

A method for modifying a user session lifecycle is provided. The method may include verifying a user session on a cloud service provider is valid. ... International Business Machines Corporation

11/23/17 / #20170339175

Using natural language processing for detection of intended or unexpected application behavior

Detection of unintended application behaviors, where natural language processing (nlp) techniques are used to analyze the application, and specifically its graphical user interface (gui), and construct an acceptable (or expected) list per-context actions. Actions executed by the application in a given context that do not fall within the list are flagged as unexpected (or anomalous).. ... International Business Machines Corporation

11/23/17 / #20170339174

Computer security apparatus

Aspects provide for an automated computer security apparatus. A first sequential action data set of different actions performed sequentially in engaging a computer system to execute a data operation on the computer system is categorized as a normal or abnormal operation. ... International Business Machines Corporation

11/23/17 / #20170339167

Remote monitoring of software

A software signature transceiver includes a signature receiver configured to couple to a programmable electronic device and sense a signature signal generated by the programmable electronic device, wherein the signature signal varies according to computer program codes executed by the programmable electronic device, and a signature transmitter operably connected to the signature receiver, the signature transmitter configured to transmit a signature transmission signal corresponding to the signature signal. A corresponding method to use the software signature transceiver and a software monitoring device to determine whether unknown software is executing on a programmable electronic device is also disclosed herein. ... International Business Machines Corporation

11/23/17 / #20170339160

Threat-aware provisioning and governance

A management component of a computing system evaluates end-users, end-user devices, and user accounts for access to provisioned-resources of the computing system. The management component utilizes device compliance attributes to form a device risk vector associated with an end-user device. ... International Business Machines Corporation

11/23/17 / #20170339157

Secure assertion attribute for a federated log in

Embodiments of the present invention disclose a method, computer program product, and system for authenticating a user. The application server receives a user log in request and determines if a unique identification accompanies the received user log in request. ... International Business Machines Corporation

11/23/17 / #20170339150

Detecting malicious data access in a distributed environment

Systems, methods, and computer program products to perform an operation comprising identifying a first access to a first subset of a first database table on a first storage node, of a plurality of storage nodes, identifying a second access to a second subset of the first database table on a second storage node, of the plurality of storage nodes, and performing a predefined operation to restrict access to the first database table on the plurality of storage nodes based on the first and second accesses.. . ... International Business Machines Corporation

11/23/17 / #20170339108

Network traffic analysis to enhance rule-based network security

A method of interpreting a rule and a rule-interpreting apparatus for rule-based security apparatus, and an apparatus implementing the method. The method comprises the following steps: designating a suspicious timeslot; if any packet does not present in the designated timeslot, capturing current incoming packets or capturing other incoming packets in the designated timeslot next time; automatically associating the packets in the designated timeslot to form at least one traffic flow corresponding to a connection or call; analyzing the at least one traffic flow to select at least one suspicious target traffic flow; and outputting the at least one selected suspicious target flow.. ... International Business Machines Corporation

11/23/17 / #20170339091

Cognitive communication assistant to bridge incompatible audience

A cognitive communication assistant receives a message transmitted over a communication network from a sender to a recipient. A sender's industry identified with the sender and a recipient's industry identified with the recipient are determined. ... International Business Machines Corporation

11/23/17 / #20170339083

Validating an attachment of an electronic communication based on recipients

A mechanism is provided for validating an attachment to an electronic communication being composed based on the recipients of the electronic communication. An associated tone or theme of the at least one attachment to the electronic communication being composed by a sender and an identity of each of one or more recipients to whom the electronic communication is to be sent and the sender are identified. ... International Business Machines Corporation

11/23/17 / #20170339082

Validating the tone of an electronic communication based on recipients

A mechanism is provided for validating the tone of an electronic communication being composed based on the recipients of the electronic communication. At least one tone of the electronic communication being composed by a sender and an identity of each of one or more recipients to whom the electronic communication is to be sent and the sender are identified. ... International Business Machines Corporation

11/23/17 / #20170338955

Reduced size key allocation descriptors

Space-efficient methods of defining a key allocation scheme within a broadcast encryption system are provided. In some embodiments, a descriptor is received. ... International Business Machines Corporation

11/23/17 / #20170338953

Generating and utilizing a secondary security key

A method, system, and/or computer program product generate a secondary security key from a primary security key. One or more processors, receive a primary security key. ... International Business Machines Corporation

11/23/17 / #20170338827

Digital phase locked loop for low jitter applications

A phase locked loop circuit is disclosed. The phase locked loop circuit includes a ring oscillator. ... International Business Machines Corporation

11/23/17 / #20170338677

Wireless charging surface

A surface with various layers that provide wireless charging may include at least one of a top surface layer, a second layer, comprising a plurality of lights and a power grid, disposed under the top surface layer, a charging pad disposed on a portion of the power grid, and a third layer, comprising a power supply which provides power to the plurality of lights and the power grid, disposed under the second layer.. . ... International Business Machines Corporation

11/23/17 / #20170338621

Laser on silicon made with 2d material gain medium

A laser structure includes a substrate and a first dielectric layer formed on the substrate. A multi-quantum well is formed on the first dielectric layer and has a plurality of alternating layers. ... International Business Machines Corporation

11/23/17 / #20170338564

Millimeter-wave communications on a multifunction platform

A millimeter-wave (mmw) communication system may include an antenna array structure operating within a mmw band, having both a first antenna coupling point and a second antenna coupling point, whereby the first and the second location of the antenna coupling points are within a coplanar surface on which the antenna array structure is formed. The system may further include a single mmw transmitter device having a power splitter that splits a data modulated mmw signal into a first mmw data modulated signal and a second mmw data modulated signal identical to the first mmw data modulated signal, such that the first data modulated mmw signal is coupled to the first antenna coupling point for radio propagation at a first direction, and the second data modulated mmw signal is coupled to the second antenna coupling point for radio propagation at a second direction.. ... International Business Machines Corporation

11/23/17 / #20170338563

Millimeter-wave communications on a multifunction platform

A millimeter-wave (mmw) communication system may include an antenna array structure operating within a mmw band, having both a first antenna coupling point and a second antenna coupling point, whereby the first and the second location of the antenna coupling points are within a coplanar surface on which the antenna array structure is formed. The system may further include a first mmw transmitter that couples a first data modulated mmw signal to the first antenna coupling point and a second mmw transmitter that couples a second data modulated mmw signal to the second antenna coupling point. ... International Business Machines Corporation

11/23/17 / #20170338407

Spin transfer torque cell for magnetic random access memory

Embodiments are directed to stt mram devices. One embodiment of an stt mram device includes a reference layer, a tunnel barrier layer, a free layer and one or more conductive vias. ... International Business Machines Corporation

11/23/17 / #20170338403

Magnetic memory device having cobalt-iron-beryllium magnetic layers

Example embodiments relate to magnetic memory devices and methods for manufacturing the same. The magnetic memory device includes a magnetic tunnel junction layer including a first magnetic layer, a second magnetic layer, and a first tunnel barrier layer between the first and second magnetic layers. ... International Business Machines Corporation

11/23/17 / #20170338368

Monolithically integrated thin-film electronic conversion unit for lateral multijunction thin-film solar cells

An integrated thin-film lateral multi junction solar device and fabrication method are provided. The device includes, for instance, a substrate, and a plurality of stacks extending vertically from the substrate. ... International Business Machines Corporation

11/23/17 / #20170338364

Mechanically stacked, lateral multi-junction photovoltaic cells

Lateral multi junction photovoltaic cells, devices, and methods of fabrication are provided. The photovoltaic cells include a plurality of photovoltaic subcells mechanically stacked together in a stack. ... International Business Machines Corporation

11/23/17 / #20170338344

Substantially defect free relaxed heterogeneous semiconductor fins on bulk substrates

A semiconductor structure is provided that includes a bulk semiconductor substrate of a first semiconductor material. The structure further includes a plurality of fin pedestal structures of a second semiconductor material located on the bulk semiconductor substrate of the first semiconductor material, wherein the second semiconductor material is different from the first semiconductor material. ... International Business Machines Corporation

11/23/17 / #20170338334

Vertical transistors with buried metal silicide bottom contact

A method of fabricating the vertical field effect transistor includes forming a dielectric layer on a metal semiconductor alloy layer that is present on a substrate of a semiconductor material. The dielectric layer is bonded to a supporting substrate. ... International Business Machines Corporation

11/23/17 / #20170338323

Dummy dielectric fins for finfets with silicon and silicon germanium channels

A method for forming a semiconductor device includes forming first fins from a first semiconductor material and second fins from a second semiconductor material and encapsulating the first fins and the second fins with a protective dielectric. Semiconductor material between the first fins and the second fins is etched to form trenches. ... International Business Machines Corporation

11/23/17 / #20170338322

Dummy dielectric fins for finfets with silicon and silicon germanium channels

A method for forming a semiconductor device includes forming first fins from a first semiconductor material and second fins from a second semiconductor material and encapsulating the first fins and the second fins with a protective dielectric. Semiconductor material between the first fins and the second fins is etched to form trenches. ... International Business Machines Corporation

11/23/17 / #20170338308

Digital alloy vertical lamellae finfet with current flow in alloy layer direction

After forming semiconductor fins including vertically oriented alternating first digital alloy sublayer portions comprised of sige and second digital alloy sublayer portions comprised of si on sidewalls of a sacrificial fin located on a substrate, the sacrificial fin is removed, leaving the semiconductor fins protruding from a top surface of the substrate. The sige and si digital alloy sublayer portions are formed using isotopically enriched si and ge source gases to minimize isotopic mass variation in the sige and si digital alloy sublayer portions.. ... International Business Machines Corporation

11/23/17 / #20170338152

Solder fill into high aspect through holes

A method for filling a through hole with solder includes mounting a substrate having a through hole formed therein on a permeable barrier layer having pores that enable gas to flow through the permeable barrier. A solder source is positioned over the through hole. ... International Business Machines Corporation

11/23/17 / #20170338145

Semiconductor structure with integrated passive structures

A metal-oxide-semiconductor field-effect transistor (mosfet) with integrated passive structures and methods of manufacturing the same is disclosed. The method includes forming a stacked structure in an active region and at least one shallow trench isolation (sti) structure adjacent to the stacked structure. ... International Business Machines Corporation

11/23/17 / #20170337944

Protective layer for mitigating protruding defects in magnetic tape recording media

A magnetic recording medium according to one embodiment includes an underlayer and a magnetic layer above the underlayer. The magnetic layer includes a first magnetic material and particulates. ... International Business Machines Corporation

11/23/17 / #20170337942

Tape heads with sub-ambient pressure cavities

A unidirectional and bi-directional tape head with sub-ambient pressure cavities. The tape head is adapted for reading and/or writing to a magnetic tape. ... International Business Machines Corporation

11/23/17 / #20170337792

Tracking objects in a two dimensional space

A method for tracking objects in a two-dimensional space includes first tracking devices that are activated to read tagged objects within the reading ranges of the first tracking devices. Second tracking devices are activated to read tagged objects within the reading ranges of the second tracking devices. ... International Business Machines Corporation

11/23/17 / #20170337753

Vehicle accident reporting system

A vehicle accident reporting system and method identifies a sudden event when a measured acceleration of the vehicle exceeds a predefined maximum acceleration or deceleration indicative of an accident. A notification that a sudden event has occurred is transmitted to an accident management hub, the notification including a vehicle identification, current video data, and gps coordinates. ... International Business Machines Corporation

11/23/17 / #20170337727

Digital surface rendering

A method for digital surface rendering. The method includes providing a programmable display covering a portion of a surface of an object. ... International Business Machines Corporation

11/23/17 / #20170337654

Importing of information in a computing system

A method and system. An information content is displayed on one or more respective screens in corresponding locations. ... International Business Machines Corporation

11/23/17 / #20170337639

Visual focal point composition for media capture based on a target recipient audience

Visual focal point composition of media capture based on a target audience is provided. An aspect includes activating a profile selection function via a media recording device and receiving, via the profile selection function, an identifier of a target viewer of media content. ... International Business Machines Corporation

11/23/17 / #20170337607

Intelligently determining buying online and picking up in store based on commute patterns of connections in a social network and store parameters

A method for determining buying online and picking up in store. A computer receives from a shopper a request for buying online and picking up in store. ... International Business Machines Corporation

11/23/17 / #20170337606

Intelligently determining buying online and picking up in store based on commute patterns of connections in a social network and store parameters

A method, a computer program product, and a computer system for determining buying online and picking up in store. A computer receives from a shopper a request for buying online and picking up in store. ... International Business Machines Corporation

11/23/17 / #20170337605

Automated generation and assembly of proposal elements

A computer-implemented method comprises: generating, by a computing device, a computer-accessible corpus including evidence passage generation information; storing, by the computing device, the corpus; automatically generating, by the computing device, evidence passages that support a proposer's response to a customer's proposal request, wherein the evidence passages include a narrative identifying the proposer's capabilities to satisfy evaluation criteria in the proposal request, and wherein the narrative is based on customer-specific information, wherein the generating includes accessing and searching the corpus via an application programming interface (api); and outputting, by the computing device, the evidence passages as an electronic document that is editable via software running on a user device via a user interface.. . ... International Business Machines Corporation

11/23/17 / #20170337590

System, method, and recording medium for cognitive and contextual queue management

A queue management method, system, and non-transitory computer readable medium, include a queue management system including a device recognition circuit configured to recognize when a user device enters a queuing zone, and place a user having the user device into a queue with a plurality of users, a user data retrieving circuit configured to retrieve at least one of cognitive data and contextual data of the user, and a queue managing circuit configured to analyze the contextual data and the cognitive data to create a queue property for each user of the plurality of users in the queue based on the analyzed contextual data and the analyzed cognitive data.. . ... International Business Machines Corporation

11/23/17 / #20170337570

Analytics system for product retention management

A computer analytically determines market acceptance of a softline good (sg) to assist a user whether he or she should retain the sg. The computer determines background data associated with the sg from a code upon the sg and may determine additional background data associated with the sg from another computer, such as a computer of a sg supply chain entity, via a network. ... International Business Machines Corporation

11/23/17 / #20170337530

Sensory feedback indicators for transactional processes

A method for providing web transaction feedback includes a client device receiving a response indicating a success or a failure of a user operation pertaining to a potential web transaction. The client device then provides a web transaction feedback to the user using a human interface element capable of causing the client device to perform a set of motions and/or emit a range of temperatures. ... International Business Machines Corporation

11/23/17 / #20170337529

Sensory feedback indicators for transactional processes

A method for providing web transaction feedback includes a client device receiving a response indicating a success or a failure of a user operation pertaining to a potential web transaction. The client device then provides a web transaction feedback to the user using a human interface element capable of causing the client device to perform a set of motions and/or emit a range of temperatures. ... International Business Machines Corporation

11/23/17 / #20170337503

Automated zone location characterization

A method and system for automatically characterizing retail zones is provided. The method includes determining, via a mobile device of a user, that a user has entered a first zone of a plurality of zones internal to a first entity structure. ... International Business Machines Corporation

11/23/17 / #20170337499

Balancing assignment of alerts across endpoints

A method and system for dynamically assigning alerts to endpoints. Topic dependent technical skill points are individually assigned to each endpoint of at least two endpoints. ... International Business Machines Corporation

11/23/17 / #20170337494

Zone naming and tagging based on behaviors

Embodiments of the present invention provide systems and methods for naming and tagging zones. The method includes receiving a set of attributes and a map of a venue, and analyzing the set of attributes and map. ... International Business Machines Corporation

11/23/17 / #20170337492

Workflow scheduling and optimization tools

Computing systems, methods and management tools for scheduling, optimizing and completing a dynamically adjustable workflow process. The computing systems, methods and management tools being capable of evaluating the availability of resources available for completing the workflow process and ascertaining the reliability of the resources in order to pre-generate a workflow process schedule. ... International Business Machines Corporation

11/23/17 / #20170337477

System for determination of automated response follow-up

Aspects include determination of automated response follow-up. A response to a question is received at a response follow-up system. ... International Business Machines Corporation

11/23/17 / #20170337475

System, method, and recording medium for geofence filtering

A geofence filtering method, system, and non-transitory computer readable medium, include a user location monitoring circuit configured to monitor a pinpoint location of a user and a boundary location of the user, a geofence determining circuit configured to determine a plurality of geofences that overlap with the boundary location of the user, the plurality of geofences being stored in a database, and a cognitive filtering and ranking circuit configured to filter the plurality of geofences that overlap with the boundary location of the user based on a cognitive factor and to rank the filtered geofences based on the cognitive factor to deliver to a user device when a pinpoint location of the user overlaps with the plurality of geofences.. . ... International Business Machines Corporation

11/23/17 / #20170337399

Privacy enabled runtime

Technical solutions are described for preventing unauthorized transmission of data by a communication apparatus. An example computer-implemented method includes monitoring a data transmission request from an application being executed by the communication apparatus. ... International Business Machines Corporation

11/23/17 / #20170337392

Enhanced data security platform

A method for providing data security comprises operatively connecting one or more sensing elements with a user, sensing one or more characteristics of the user via the one or more sensing elements, wherein each of the one or more sensing elements comprises at least one unique semiconductor identifier, transmitting the at least one unique semiconductor identifier and data concerning the one or more sensed characteristics from the one or more sensing elements to a data analytics engine, attaching at least one unique biological identifier associated with the user to the transmission of the at least one unique semiconductor identifier and the data concerning the one or more sensed characteristics, verifying by the data analytics engine that the at least one unique semiconductor identifier of the one or more sensing elements and the at least one biological identifier are valid, analyzing by the data analytics engine the data concerning the one or more sensed characteristics, generating a response based on the analysis, and transmitting the response from the data analytics engine to an integration device associated with the user.. . ... International Business Machines Corporation

11/23/17 / #20170337382

Privacy enabled runtime

Technical solutions are described for securing data by a communication apparatus. An example computer-implemented method includes receiving, by an encryption engine, a request to apply cryptography to input data. ... International Business Machines Corporation

11/23/17 / #20170337359

Tiered code obfuscation in a development environment

A method for viewing a plurality of encrypted code displayed within an integrated development environment with a pair of augmented reality (ar) glasses. A plurality of user login credentials submitted by a user utilizing the pair of ar glasses to access a plurality of encrypted code. ... International Business Machines Corporation

11/23/17 / #20170337351

Subset-difference broadcast encryption with blacklisting

An encryption scheme is provided in which subset-difference lists are generated by blacklisting subsets corresponding to compromised devices and splitting subset difference lists corresponding to the blacklisted subsets into multiple subset difference lists. In some embodiments, a subset-difference tree is generated. ... International Business Machines Corporation

11/23/17 / #20170337314

Enabling an incremental sign-off process using design data

A computer system may obtain a first schematic design netlist for a first ic design and a second schematic design netlist for a second ic design. The computer system may normalize the first netlist and the second netlist. ... International Business Machines Corporation

11/23/17 / #20170337313

Clock domain-independent abstracts

A system and method to generate a clock domain-independent abstract of a component in an integrated circuit design. The method includes performing an initial analysis of the component using an initial clock value for each clock domain type, the clock domain types including a functional clock and a test clock, executing an abstractor to obtain a reduced order model of the initial analysis as a clock domain-dependent abstract, and obtaining original constraints associated with one or more circuit elements within the component from the clock domain-dependent abstract. ... International Business Machines Corporation

11/23/17 / #20170337312

Cross-current power modelling using logic simulation

A processor may receive a transistor level integrated circuit (ic) design to be modelled. The processor may determine that the transistor level ic design has a first stage and a second stage. ... International Business Machines Corporation

11/23/17 / #20170337311

Cross-current power modelling using logic simulation

A processor may receive a transistor level integrated circuit (ic) design to be modelled. The processor may determine that the transistor level ic design has a first stage and a second stage. ... International Business Machines Corporation

11/23/17 / #20170337294

Determining answer stability in a question answering system

An approach is provided to determine answer stability in a question answering (qa) system. In the approach, a question submitted to a question answering (qa) system is selected and data pertaining to a candidate answers generated by the qa system are analyzed. ... International Business Machines Corporation

11/23/17 / #20170337279

Allocating computing resources

A computer-implemented method includes generating a query. The query is directed to a database server. ... International Business Machines Corporation

11/23/17 / #20170337275

Allocating computing resources

A computer-implemented method includes generating a query. The query is directed to a database server. ... International Business Machines Corporation

11/23/17 / #20170337264

System for generation of automated response follow-up

Aspects include generation of automated response follow-up. A response to a question is received at a response follow-up system. ... International Business Machines Corporation

11/23/17 / #20170337258

Classifying uniform resource locators

Classifying a uniform resource locator (url) includes: generating a first bloom filter to associate a uniform resource locator (url) with a first url category from a pre-determined set of url categories, programming the first bloom filter with a set of identified urls in a url database, each identified url respectively corresponding to at least one url category from the pre-determined set of url categories, extracting a target url from a network packet stream, determining a set of hash strides for the target url, and querying the first bloom filter with each hash stride of the set of hash strides to identify a corresponding url category for the target url from the set of url categories.. . ... International Business Machines Corporation

11/23/17 / #20170337257

Categorically filtering search results

A computer-implemented method according to one embodiment includes identifying a search query, determining a first set of categories associated with the search query, determining a second set of categories associated with preliminary results of the search query, and filtering the preliminary results of the search query based on an analysis utilizing the first set of categories and the second set of categories.. . ... International Business Machines Corporation

11/23/17 / #20170337245

Extreme value computation

The method may include providing a plurality of synopsis techniques for determining a plurality of attribute value information indicative of the at least one attribute. The method may include determining a data characteristic describing the plurality of data rows of the current data block. ... International Business Machines Corporation

11/23/17 / #20170337239

Opportunistic mitigation for corrupted deduplicated data

Various embodiments for managing data integrity in a data deduplication system in a computing storage environment, by a processor device, are provided. In one embodiment, a method comprises, in a data deduplication system using a data scrubber process, overwriting a stored data chunk declared as corrupted with an identical fresh data chunk discovered in an incoming data stream.. ... International Business Machines Corporation

11/23/17 / #20170337236

Verifying configuration management database configuration items

A verification check is performed for a configuration management database (cmdb) configuration item (ci), the cmdb ci being an information technology asset of a computing environment and being previously discovered as part of a cmdb ci discovery procedure for a cmdb system, and discovered on a hosting component hosting the cmdb ci. The discovery procedure provides configuration data associated with the cmdb ci, and the configuration data is stored as part of cmdb configuration information of the cmdb system. ... International Business Machines Corporation

11/23/17 / #20170337235

Life cycle data set repository

A method for tracking actions performed in association with a data set includes identifying multiple sources of historical information describing actions performed on the data set. The method periodically gathers this historical information from the multiple sources and compiles the historical information in a centralized repository. ... International Business Machines Corporation

11/23/17 / #20170337223

Zone naming and tagging based on behaviors

Embodiments of the present invention provide systems and methods for naming and tagging zones. The method includes receiving a set of attributes and a map of a venue, and analyzing the set of attributes and map. ... International Business Machines Corporation

11/23/17 / #20170337210

Dynamic column synopsis for analytical databases

A method, computer program product, and system for processing attribute value information for a data set. The method, computer program product, and system includes receiving a first data query on the data set. ... International Business Machines Corporation

11/23/17 / #20170337190

Method for detecting original language

A system for detecting an original language of a translated document retrieves the translated document, and identifies a language of the retrieved document. The system calculates a language model for the language of the retrieved document (lm(rd)). ... International Business Machines Corporation

11/23/17 / #20170337183

Generating distributed word embeddings using structured information

A computer program that generates a vector representation of a set of natural language text in a natural language processing system by: (i) receiving a first set of natural language text and a set of information pertaining to the first set of natural language text, where the information includes a dependency parse tree including a root node and a plurality of nodes that depend from the root node, where the root node represents the first set of natural language text, and where the plurality of nodes that depend from the root node represent context features of the first set of natural language text; and (ii) generating, by the natural language processing system, a first vector representation of the first set of natural language text, wherein the generating includes adding vector representations for the context features represented by the plurality of nodes that depend from the root node.. . ... International Business Machines Corporation

11/23/17 / #20170337171

Providing data quality feedback while end users enter data in electronic forms

An automated feedback may be provided while data is entered in an electronic form. Input entered into an input field of a form fillable window provided on a user interface display screen may be detected. ... International Business Machines Corporation

11/23/17 / #20170337167

Misaligned annotation processing

Aspects of processing misaligned annotations include receiving a tokenized document and offset annotation file at a processor. The tokenized document includes a source document and corresponding tokens resulting from a low-level segmentation process. ... International Business Machines Corporation

11/23/17 / #20170337166

Website validation for mobile devices

Systems, methods, and computer program products to perform an operation for validating and adapting a gui structure to a screen of a client device. The operation comprises receiving by the client device a software agent together with a device dependent arrangement rule. ... International Business Machines Corporation

11/23/17 / #20170337141

System architecture for encrypting external memory

A system architecture providing memory encryption suitable for protection against liquid nitrogen and trace probe attacks. In one embodiment, a method of and system for memory encryption are provided. ... International Business Machines Corporation

11/23/17 / #20170337138

Dynamic cache management for in-memory data analytic platforms

At a cache manager of a directed acyclic graph-based data analytic platform, from each of a plurality of monitor components on a plurality of worker nodes, statistics are obtained for a plurality of tasks, including which of the tasks have been processed and which are in a task queue. Each of the tasks has at least one associated distributed dataset. ... International Business Machines Corporation

11/23/17 / #20170337135

Dynamic memory tuning for in-memory data analytic platforms

At a cache manager of a directed acyclic graph-based data analytic platform, memory usage statistics are obtained from each of a plurality of monitor components on a plurality of worker nodes. The worker nodes have a plurality of tasks executing thereon, and each of the tasks has at least one distributed dataset associated therewith. ... International Business Machines Corporation

11/23/17 / #20170337132

Accessing partial cachelines in a data cache

Accessing partial cachelines in a data cache including storing a first portion of a cacheline in a cache entry of the data cache; relaunching a load instruction targeting a second portion of the cacheline, wherein the second portion of the cacheline is not stored in the data cache; determining that the load instruction targets a portion of the cacheline not stored in the cache entry; storing the second portion of the cacheline in the data cache; and reading the second portion of the cacheline from the data cache according to the load instruction.. . ... International Business Machines Corporation

11/23/17 / #20170337123

Using multiple sequence alignment to identify security vulnerability code paths

A static analysis tool is augmented to provide for enhanced security vulnerability determination from generated code traces. According to this disclosure, a multiple sequence alignment is applied to a set of traces generated by static analysis of application source code. ... International Business Machines Corporation

11/23/17 / #20170337120

Runtime detection of uninitialized variable across functions

The disclosure provides a method for detection of an uninitialized variable. The method includes running a first function, wherein the first function comprises a local variable and a first flag associated with the local variable for indicating an initialization state of the local variable; calling a second function from the first function, with the local variable as a parameter of the second function, wherein the second function comprises a second flag associated with the parameter for indicating an initialization state of the parameter; and updating the first flag based at least on the second flag returned from the second function.. ... International Business Machines Corporation

11/23/17 / #20170337119

Runtime detection of uninitialized variable across functions

The disclosure provides a method for detection of an uninitialized variable. The method includes running a first function, wherein the first function comprises a local variable and a first flag associated with the local variable for indicating an initialization state of the local variable; calling a second function from the first function, with the local variable as a parameter of the second function, wherein the second function comprises a second flag associated with the parameter for indicating an initialization state of the parameter; and updating the first flag based at least on the second flag returned from the second function.. ... International Business Machines Corporation

11/23/17 / #20170337112

Code update based on detection of change in runtime code during debugging

A method, and associated computer system and computer program product. A change of runtime code is detected by one or more processors of the computer system. ... International Business Machines Corporation

11/23/17 / #20170337108

Storing and retrieving data using proxies

A method begins by a storage unit receiving a read request for a decode threshold number of encoded data slices (edss) of a set of edss. The method continues with the first storage unit determining whether to service the read request for an eds stored in the storage unit, and when determining not to service the request, generating, by the storage unit, a read request for a second storage unit, where the second storage unit is in substantially the same geographic location, and stores one or more eds of the set of edss that is not included in the decode threshold number of edss. ... International Business Machines Corporation

11/23/17 / #20170337096

Diagnostic stackframe buffer

This invention relates to a system, method, and computer program product for providing diagnostic data for execution of a program, the program executable in a virtual machine having a program stack for individual program elements, the system comprising: a historical event buffer comprising historical execution data associated with at least one runtime error; an event buffer for saving each program element from the program stack as each program element is executed and updated with a new program element in the program stack; a buffer similarity engine for determining a similarity of the event buffer with any one of the loaded historical event buffers; and a diagnostic engine for requesting diagnostic information with the execution of the program in the event buffer when the similarity of the event buffer and a loaded historical event buffer is more than a threshold similarity.. . ... International Business Machines Corporation

11/23/17 / #20170337093

Method and system for reducing message passing for contention detection in distributed sip server environments

A method, a system, and a computer program product are provided for reducing message passing for contention detection in distributed sip server environments. The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable to determine that a first site is waiting for a first object locked by a second site. ... International Business Machines Corporation

11/23/17 / #20170337092

Prioritization of low active thread count virtual machines in virtualized computing environment

Virtual machines with low active thread counts are prioritized during periods of high system load in a virtualized computing environment to improve the performance of such virtual machines.. . ... International Business Machines Corporation

11/23/17 / #20170337091

Allocating compute offload resources

Systems, methods, and computer program products to perform an operation comprising receiving, by a fog computing platform, a request from a wireless device to perform a compute task on behalf of the wireless device, determining a first computing resource, of a plurality of computing resources, required to perform the compute task, associating the request with a first level of priority, of a plurality of levels of priority, for accessing the first computing resource, allocating, based at least in part on the first level of priority, a portion of the first computing resource to perform the requested compute task.. . ... International Business Machines Corporation

11/23/17 / #20170337090

Timeout processing for messages

A method and system for message handling in a work dispatcher system that includes a client and one or more processing nodes. A message is received from the client. ... International Business Machines Corporation

11/23/17 / #20170337076

Prioritization of low active thread count virtual machines in virtualized computing environment

Virtual machines with low active thread counts are prioritized during periods of high system load in a virtualized computing environment to improve the performance of such virtual machines.. . ... International Business Machines Corporation

11/23/17 / #20170337075

Identifying pages in a migration management system

A computer-implemented method includes identifying a page. The page is associated with a request for migration. ... International Business Machines Corporation

11/23/17 / #20170337072

Interface and interruption management

The method includes identifying, by one or more computer processors, a program being utilized by a user. The method further includes identifying, by one or more computer processors, an environmental factor related to a user of the program. ... International Business Machines Corporation

11/23/17 / #20170337067

Adjusting a computing environment for processing a data stream with dummy tuples

Adjusting a computing environment for processing a data stream involves identifying one or more dummy tuples in the data stream processed by the computing environment. Propagation of the identified dummy tuples to be processed through a plurality of operators in the computing environment is controlled in order to control adjustment of the computing environment. ... International Business Machines Corporation

11/23/17 / #20170337059

Extendable conditional permute simd instructions

A method, apparatus and non-transitory computer readable medium are provided for permuting data registers to a target register. Two or more data registers are concatenated to form a concatenated data register. ... International Business Machines Corporation

11/23/17 / #20170337058

Executing system call vectored instructions in a multi-slice processor

Executing system call vectored (scv) instructions in a multi-slice processor including receiving, by an instruction fetch unit, a scv instruction, wherein the scv instruction is a system call from an operating system; sending the scv instruction to a branch issue queue; determining, by the branch issue queue, that the scv instruction is next-to-complete; issuing the scv instruction to a branch resolution unit; and executing the scv instruction by the branch resolution unit.. . ... International Business Machines Corporation

11/23/17 / #20170337055

Summarized illustrative representation of software changes

An approach, for creating summarized illustrative representation of software changes. A change summary illustrator, receives a software product change identifier and associated components. ... International Business Machines Corporation

11/23/17 / #20170337042

Reusable modeling for solving problems

A computer program product comprising a non-transitory computer readable storage medium retaining program instructions configured to cause a processor to perform actions, which program instructions implement: a framework for creating a model of an np-hard problem, the model comprising at least one entity selected from the group comprising: an objective, a variable, an equation and a constraint, wherein the framework provides methods for automatically transforming the model, comprising: one or more methods for manipulating or changing a status of the entity of the model, the methods comprising a method for imposing or ignoring the constraint; and one or more methods related to operations to be applied to the entity of the model.. . ... International Business Machines Corporation

11/23/17 / #20170337026

Dynamic display arrangement

An apparatus, method, system, and program product are disclosed for dynamic display arrangement. One method includes receiving first information including one or more of location information corresponding to a first display of the multiple displays and information from an information handling device worn or held by a user. ... International Business Machines Corporation

11/23/17 / #20170336994